From e7806b2effd844992f2eb2215ea1497de1aa7ec9 Mon Sep 17 00:00:00 2001 From: Christian Brauner Date: Wed, 21 Feb 2018 10:06:56 +0100 Subject: [PATCH] doc: document cgroup-full:{mixed,ro,rw}:force Signed-off-by: Christian Brauner --- doc/lxc.container.conf.sgml.in | 41 ++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/doc/lxc.container.conf.sgml.in b/doc/lxc.container.conf.sgml.in index 27b518e03..23c213e99 100644 --- a/doc/lxc.container.conf.sgml.in +++ b/doc/lxc.container.conf.sgml.in @@ -1203,6 +1203,7 @@ dev/null proc/kcore none bind,relative 0 0 otherwise. + : @@ -1222,6 +1223,19 @@ dev/null proc/kcore none bind,relative 0 0 container. + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + : similar to @@ -1229,6 +1243,19 @@ dev/null proc/kcore none bind,relative 0 0 will be mounted read-only. + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + : similar to @@ -1240,6 +1267,19 @@ dev/null proc/kcore none bind,relative 0 0 do so anyway.) + + + + : + The option will cause LXC to perform + the cgroup mounts for the container under all circumstances. + Otherwise it is similar to . + This is mainly useful when the cgroup namespaces are enabled + where LXC will normally leave mounting cgroups to the init + binary of the container since it is perfectly safe to do so. + + + (without specifier): @@ -1248,6 +1288,7 @@ dev/null proc/kcore none bind,relative 0 0 otherwise. + If cgroup namespaces are enabled, then any