diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in
index 27b518e03..23c213e99 100644
--- a/doc/lxc.container.conf.sgml.in
+++ b/doc/lxc.container.conf.sgml.in
@@ -1203,6 +1203,7 @@ dev/null proc/kcore none bind,relative 0 0
otherwise.
+
:
@@ -1222,6 +1223,19 @@ dev/null proc/kcore none bind,relative 0 0
container.
+
+
+
+ :
+ The option will cause LXC to perform
+ the cgroup mounts for the container under all circumstances.
+ Otherwise it is similar to .
+ This is mainly useful when the cgroup namespaces are enabled
+ where LXC will normally leave mounting cgroups to the init
+ binary of the container since it is perfectly safe to do so.
+
+
+
: similar to
@@ -1229,6 +1243,19 @@ dev/null proc/kcore none bind,relative 0 0
will be mounted read-only.
+
+
+
+ :
+ The option will cause LXC to perform
+ the cgroup mounts for the container under all circumstances.
+ Otherwise it is similar to .
+ This is mainly useful when the cgroup namespaces are enabled
+ where LXC will normally leave mounting cgroups to the init
+ binary of the container since it is perfectly safe to do so.
+
+
+
: similar to
@@ -1240,6 +1267,19 @@ dev/null proc/kcore none bind,relative 0 0
do so anyway.)
+
+
+
+ :
+ The option will cause LXC to perform
+ the cgroup mounts for the container under all circumstances.
+ Otherwise it is similar to .
+ This is mainly useful when the cgroup namespaces are enabled
+ where LXC will normally leave mounting cgroups to the init
+ binary of the container since it is perfectly safe to do so.
+
+
+
(without specifier):
@@ -1248,6 +1288,7 @@ dev/null proc/kcore none bind,relative 0 0
otherwise.
+
If cgroup namespaces are enabled, then any