diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 27b518e03..23c213e99 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1203,6 +1203,7 @@ dev/null proc/kcore none bind,relative 0 0 otherwise. + : @@ -1222,6 +1223,19 @@ dev/null proc/kcore none bind,relative 0 0 container. + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + : similar to @@ -1229,6 +1243,19 @@ dev/null proc/kcore none bind,relative 0 0 will be mounted read-only. + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + : similar to @@ -1240,6 +1267,19 @@ dev/null proc/kcore none bind,relative 0 0 do so anyway.) + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + (without specifier): @@ -1248,6 +1288,7 @@ dev/null proc/kcore none bind,relative 0 0 otherwise. + If cgroup namespaces are enabled, then any