]> git.proxmox.com Git - mirror_lxc.git/blobdiff - doc/ko/lxc.container.conf.sgml.in
spelling: syscall
[mirror_lxc.git] / doc / ko / lxc.container.conf.sgml.in
index 1781d330baa8b009ce7a2d1b5e641b37ff20be60..b72c88122af2838b6833debb08c3480d59039b17 100644 (file)
@@ -87,10 +87,12 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <!--
       Each option in the configuration file has the form <command>key
       = value</command> fitting in one line. The '#' character means
-      the line is a comment.
+      the line is a comment. List options, like capabilities and cgroups
+      options, can be used with no value to clear any previously
+      defined values of that option.
       -->
       설정파일의 옵션은 <command>key = value</command>의 한 줄로 이루어져 있다.
-      '#' 문자를 앞에 붙여 주석임을 나타낼 수 있다.
+      '#' 문자를 앞에 붙여 주석임을 나타낼 수 있다. capability와 cgroup 옵션과 같은 리스트 옵션들은, 값을 지정하지 않고 사용할 수 있다. 값이 지정되지 않은 경우 이전에 설정했던 모든 값들을 지운다.
     </para>
 
     <refsect2>
@@ -185,7 +187,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.utsname</option>
+           <option>lxc.uts.name</option>
          </term>
          <listitem>
            <para>
@@ -217,7 +219,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
         <varlistentry>
           <term>
-            <option>lxc.haltsignal</option>
+            <option>lxc.signal.halt</option>
           </term>
           <listitem>
             <para>
@@ -246,7 +248,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
           <variablelist>
         <varlistentry>
           <term>
-            <option>lxc.rebootsignal</option>
+            <option>lxc.signal.reboot</option>
           </term>
           <listitem>
             <para>
@@ -275,7 +277,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
         <varlistentry>
           <term>
-            <option>lxc.stopsignal</option>
+            <option>lxc.signal.stop</option>
           </term>
           <listitem>
             <para>
@@ -306,7 +308,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
         <varlistentry>
           <term>
-            <option>lxc.init_cmd</option>
+            <option>lxc.init.cmd</option>
           </term>
           <listitem>
             <para>
@@ -320,6 +322,80 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       </variablelist>
     </refsect2>
 
+    <refsect2>
+      <title><!-- Init ID -->Init이 사용할 ID</title>
+      <para>
+        <!--
+        Sets the UID/GID to use for the init system, and subsequent command, executed by lxc-execute.
+        -->
+        lxc-execute가 실행하는 컨테이너의 init 및 명령어가 사용할 UID/GID를 지정한다.
+
+        <!--
+        These options are only used when lxc-execute is started in a private user namespace.
+        -->
+        이 옵션들은 lxc-execute가 사용자 네임스페이스 안에서 실행될 때만 적용된다.
+
+        <!--
+        Defaults to: UID(0), GID(0)
+        -->
+        기본 값: UID(0), GID(0)
+      </para>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>lxc.init.uid</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              UID to use within a private user namespace for init.
+                -->
+              init이 사용자 네임스페이스 안에서 사용할 UID.
+            </para>
+          </listitem>
+        </varlistentry>
+        <varlistentry>
+          <term>
+            <option>lxc.init.gid</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              GID to use within a private user namespace for init.
+                -->
+              init이 사용자 네임스페이스 안에서 사용할 GID.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+    </refsect2>
+
+    <refsect2>
+      <title><!-- Ephemeral -->임시 컨테이너</title>
+      <para>
+        <!--
+        Allows one to specify whether a container will be destroyed on shutdown.
+          -->
+        컨테이너가 종료될 때, 해당 컨테이너를 제거할지 여부를 지정할 수 있다.
+      </para>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>lxc.ephemeral</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              The only allowed values are 0 and 1. Set this to 1 to destroy a
+              container on shutdown.
+                -->
+              지정 가능한 값은 0 또는 1이다. 1로 설정하면, 컨테이너를 종료할 때 해당 컨테이너를 제거한다.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+    </refsect2>
+
     <refsect2>
       <title><!-- Network -->네트워크</title>
       <para>
@@ -337,16 +413,29 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
         네트워크 가상화를 위해서, 컨테이너의 네트워크 인터페이스가 인수로 지정되어야 한다. 시스템이 하나의 물리적인 네트워크 인터페이스를 갖고 있어도, 컨테이너 내에서 여러개의 가상화 인터페이스들을 사용할 수 있다.
       </para>
       <variablelist>
+        <varlistentry>
+          <term>
+            <option>lxc.net</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              may be used without a value to clear all previous network options.
+              -->
+              값을 지정하지 않고 사용하여 이전에 설정했던 모든 네트워크 옵션들을 초기화할 수 있다.
+            </para>
+          </listitem>
+        </varlistentry>
        <varlistentry>
          <term>
-           <option>lxc.network.type</option>
+           <option>lxc.net.[i].type</option>
          </term>
          <listitem>
            <para>
               <!--
              specify what kind of network virtualization to be used
              for the container. Each time
-             a <option>lxc.network.type</option> field is found a new
+             a <option>lxc.net.[i].type</option> field is found a new
              round of network configuration begins. In this way,
              several network virtualization types can be specified
              for the same container, as well as assigning several
@@ -354,7 +443,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
              virtualization types can be:
               -->
               컨테이너가 어떤 종류의 네트워크 가상화를 사용할지 지정한다.
-              <option>lxc.network.type</option> 필드부터 새로운 네트워크 설정이 시작된다. 이 방법으로 여러개의 네트워크 가상화 형태를 같은 컨테이너에 지정할 수 있다. 그리고 여러개의 네트워크 인터페이스를 하나의 컨테이너에 지정할 수도 있다.
+              <option>lxc.net.[i].type</option> 필드부터 새로운 네트워크 설정이 시작된다. 이 방법으로 여러개의 네트워크 가상화 형태를 같은 컨테이너에 지정할 수 있다. 그리고 여러개의 네트워크 인터페이스를 하나의 컨테이너에 지정할 수도 있다.
               지정 가능한 형태는 아래와 같다.
            </para>
 
@@ -384,7 +473,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
               <option>veth:</option> a virtual ethernet pair
               device is created with one side assigned to the container
               and the other side attached to a bridge specified by
-              the <option>lxc.network.link</option> option.
+              the <option>lxc.net.[i].link</option> option.
               If the bridge is not specified, then the veth pair device
               will be created but not attached to any bridge.
               Otherwise, the bridge has to be created on the system
@@ -396,33 +485,33 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
               container, but if you wish to handle
               this name yourselves, you can tell <command>lxc</command>
               to set a specific name with
-              the <option>lxc.network.veth.pair</option> option (except for
+              the <option>lxc.net.[i].veth.pair</option> option (except for
               unprivileged containers where this option is ignored for security
               reasons).
               -->
-              <option>veth:</option> 한 쪽은 컨테이너로, 다른 한쪽은 <option>lxc.network.link</option> 옵션으로 지정한 브리지로 붙은 가상 이더넷(veth) 장치 쌍을 생성한다.
+              <option>veth:</option> 한 쪽은 컨테이너로, 다른 한쪽은 <option>lxc.net.[i].link</option> 옵션으로 지정한 브리지로 붙은 가상 이더넷(veth) 장치 쌍을 생성한다.
               만약 브리지가 지정되지 않았다면, 어떤 브리지에도 붙지 않은  veth 장치 쌍을 만든다. 브리지는 컨테이너 시작전에 시스템에서 생성해야 한다.
-              <command>lxc</command>는 컨테이너 이외의 설정에 대해서는 다루지 않는다. 기본값으로 <command>lxc</command>는 컨테이너 바깥에 속할 네트워크 디바이스의 이름을 정해준다. 이름을 변경하기 원한다면, <command>lxc</command>가 지정한 이름으로 설정하도록 <option>lxc.network.veth.pair</option> 옵션을 사용하여야 한다. (비특권 컨테이너는 불가능하다. 이 옵션은 보안상의 이유로 무시될 것이다)
+              <command>lxc</command>는 컨테이너 이외의 설정에 대해서는 다루지 않는다. 기본값으로 <command>lxc</command>는 컨테이너 바깥에 속할 네트워크 디바이스의 이름을 정해준다. 이름을 변경하기 원한다면, <command>lxc</command>가 지정한 이름으로 설정하도록 <option>lxc.net.[i].veth.pair</option> 옵션을 사용하여야 한다. (비특권 컨테이너는 불가능하다. 이 옵션은 보안상의 이유로 무시될 것이다)
             </para>
 
            <para>
               <!--
              <option>vlan:</option> a vlan interface is linked with
              the interface specified by
-             the <option>lxc.network.link</option> and assigned to
+             the <option>lxc.net.[i].link</option> and assigned to
              the container. The vlan identifier is specified with the
-             option <option>lxc.network.vlan.id</option>.
+             option <option>lxc.net.[i].vlan.id</option>.
               -->
-              <option>vlan:</option> vlan 인터페이스는 <option>lxc.network.link</option>로 지정한 인터페이스에 연결되고, 컨테이너로 할당된다. vlan의 식별자는 <option>lxc.network.vlan.id</option> 옵션으로 지정한다.
+              <option>vlan:</option> vlan 인터페이스는 <option>lxc.net.[i].link</option>로 지정한 인터페이스에 연결되고, 컨테이너로 할당된다. vlan의 식별자는 <option>lxc.net.[i].vlan.id</option> 옵션으로 지정한다.
            </para>
 
            <para>
               <!--
              <option>macvlan:</option> a macvlan interface is linked
              with the interface specified by
-             the <option>lxc.network.link</option> and assigned to
+             the <option>lxc.net.[i].link</option> and assigned to
              the container.
-             <option>lxc.network.macvlan.mode</option> specifies the
+             <option>lxc.net.[i].macvlan.mode</option> specifies the
              mode the macvlan will use to communicate between
              different macvlan on the same upper device. The accepted
               modes are <option>private</option>, <option>vepa</option>,
@@ -451,8 +540,8 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
               interface. Only one macvlan interface in <option>passthru</option>
               mode is possible for one physical interface.
               -->
-              <option>macvlan:</option> macvlan 인터페이스는 <option>lxc.network.link</option>로 지정한 인터페이스에 연결되고, 컨테이너로 할당된다.
-              <option>lxc.network.macvlan.mode</option>은 같은 상위 디바이스에 있는 다른 macvlan과 통신할 때 사용하는 모드를 지정한다.
+              <option>macvlan:</option> macvlan 인터페이스는 <option>lxc.net.[i].link</option>로 지정한 인터페이스에 연결되고, 컨테이너로 할당된다.
+              <option>lxc.net.[i].macvlan.mode</option>은 같은 상위 디바이스에 있는 다른 macvlan과 통신할 때 사용하는 모드를 지정한다.
               지정할 수 있는 모드는 <option>private</option>、<option>vepa</option>、<option>bridge</option>、<option>passthru</option>이다.
               <option>private</option>모드는 디바이스가 같은 상위디바이스의 어떤 장치와도 통신하지 않는다. (기본값)
               새로운 가상 이더넷 포트 통합모드(Virtual Ethernet Port Aggregator), 즉 <option>vepa</option> 모드는 인접한 브리지가 소스와 목적지가 로컬인 모든 프레임들을 macvlan 포트로 반환한다고 가정한다. 즉,  브리지가 reflective relay로 설정되어 있다는 것이다.
@@ -469,17 +558,17 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
            <para>
               <!--
              <option>phys:</option> an already existing interface
-             specified by the <option>lxc.network.link</option> is
+             specified by the <option>lxc.net.[i].link</option> is
              assigned to the container.
               -->
-              <option>phys:</option> <option>lxc.network.link</option>로 지정한 이미 존재하는 인터페이스를 컨테이너로 할당된다.
+              <option>phys:</option> <option>lxc.net.[i].link</option>로 지정한 이미 존재하는 인터페이스를 컨테이너로 할당된다.
            </para>
          </listitem>
          </varlistentry>
 
        <varlistentry>
          <term>
-           <option>lxc.network.flags</option>
+           <option>lxc.net.[i].flags</option>
          </term>
          <listitem>
            <para>
@@ -501,7 +590,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.link</option>
+           <option>lxc.net.[i].link</option>
          </term>
          <listitem>
            <para>
@@ -516,7 +605,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.mtu</option>
+           <option>lxc.net.[i].mtu</option>
          </term>
          <listitem>
            <para>
@@ -530,7 +619,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.name</option>
+           <option>lxc.net.[i].name</option>
          </term>
          <listitem>
            <para>
@@ -549,7 +638,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.hwaddr</option>
+           <option>lxc.net.[i].hwaddr</option>
          </term>
          <listitem>
            <para>
@@ -569,7 +658,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.ipv4</option>
+           <option>lxc.net.[i].ipv4.address</option>
          </term>
          <listitem>
            <para>
@@ -590,7 +679,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.ipv4.gateway</option>
+           <option>lxc.net.[i].ipv4.gateway</option>
          </term>
          <listitem>
            <para>
@@ -602,7 +691,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
              Can also have the special value <option>auto</option>,
              which means to take the primary address from the bridge
              interface (as specified by the
-             <option>lxc.network.link</option> option) and use that as
+             <option>lxc.net.[i].link</option> option) and use that as
              the gateway. <option>auto</option> is only available when
              using the <option>veth</option> and
              <option>macvlan</option> network types.
@@ -611,7 +700,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
               주소 형식은 x.y.z.t로, 예를 들면 192.168.1.123이다.
 
               <option>auto</option>라는 특별한 값을 지정할 수있다.
-              이것은 (<option>lxc.network.link</option> 에서 지정된) 브리지 인터페이스의 첫번째 주소를 가져와 게이트 주소로 사용한다.
+              이것은 (<option>lxc.net.[i].link</option> 에서 지정된) 브리지 인터페이스의 첫번째 주소를 가져와 게이트 주소로 사용한다.
               <option>auto</option>는 네트워크 형태가 <option>veth</option>나 <option>macvlan</option>일 때만 지정 가능하다.
            </para>
          </listitem>
@@ -620,7 +709,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.ipv6</option>
+           <option>lxc.net.[i].ipv6.address</option>
          </term>
          <listitem>
            <para>
@@ -639,7 +728,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.ipv6.gateway</option>
+           <option>lxc.net.[i].ipv6.gateway</option>
          </term>
          <listitem>
            <para>
@@ -651,7 +740,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
              Can also have the special value <option>auto</option>,
              which means to take the primary address from the bridge
              interface (as specified by the
-             <option>lxc.network.link</option> option) and use that as
+             <option>lxc.net.[i].link</option> option) and use that as
              the gateway. <option>auto</option> is only available when
              using the <option>veth</option> and
              <option>macvlan</option> network types.
@@ -660,7 +749,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
               주소 형식은 x::y로, 예를 들면 2003:db8:1:0::1이다.
 
               <option>auto</option>라는 특별한 값을 지정할 수있다.
-              이것은 (<option>lxc.network.link</option> 에서 지정된) 브리지 인터페이스의 첫번째 주소를 가져와 게이트 주소로 사용한다.
+              이것은 (<option>lxc.net.[i].link</option> 에서 지정된) 브리지 인터페이스의 첫번째 주소를 가져와 게이트 주소로 사용한다.
 <option>auto</option>는 네트워크 형태가 <option>veth</option>나 <option>macvlan</option>일 때만 지정 가능하다.
            </para>
          </listitem>
@@ -668,7 +757,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.script.up</option>
+           <option>lxc.net.[i].script.up</option>
          </term>
          <listitem>
            <para>
@@ -701,7 +790,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
 
        <varlistentry>
          <term>
-           <option>lxc.network.script.down</option>
+           <option>lxc.net.[i].script.down</option>
          </term>
          <listitem>
            <para>
@@ -748,7 +837,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.pts</option>
+           <option>lxc.pty.max</option>
          </term>
          <listitem>
            <para>
@@ -792,7 +881,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
        </varlistentry>
        <varlistentry>
          <term>
-           <option>lxc.console</option>
+           <option>lxc.console.path</option>
          </term>
          <listitem>
            <para>
@@ -831,7 +920,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.tty</option>
+           <option>lxc.tty.max</option>
          </term>
          <listitem>
            <para>
@@ -868,7 +957,7 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.devttydir</option>
+           <option>lxc.tty.dir</option>
          </term>
          <listitem>
            <para>
@@ -893,13 +982,13 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
        <filename>/dev</filename> to be set up as needed in the container
        rootfs.  If lxc.autodev is set to 1, then after mounting the container's
        rootfs LXC will mount a fresh tmpfs under <filename>/dev</filename>
-       (limited to 100k) and fill in a minimal set of initial devices.
+       (limited to 500k) and fill in a minimal set of initial devices.
         This is generally required when starting a container containing
         a "systemd" based "init" but may be optional at other times.  Additional
         devices in the containers /dev directory may be created through the
         use of the <option>lxc.hook.autodev</option> hook.
         -->
-        기본적으로 lxc는 약간의 심볼릭 링크(fd, stdin, stdout, stderr)를 컨테이너의 <filename>/dev</filename> 디렉토리에 생성한다. 그러나 자동으로 장치 노드 항목들을 생성해주지 않는다. 컨테이너의 루트 파일시스템에서 필요로하는 <filename>/dev</filename>를 생성할 수 있게 하는 것이다. lxc.autodev가 1로 지정되었다면, 컨테이너 루트 파일시스템을 마운트 한 후, LXC가 <filename>/dev</filename> 밑에 새로운 tmpfs(최대 100k)를 마운트 해준다. 그리고 최소한의 장치만을 채워준다.
+        기본적으로 lxc는 약간의 심볼릭 링크(fd, stdin, stdout, stderr)를 컨테이너의 <filename>/dev</filename> 디렉토리에 생성한다. 그러나 자동으로 장치 노드 항목들을 생성해주지 않는다. 컨테이너의 루트 파일시스템에서 필요로하는 <filename>/dev</filename>를 생성할 수 있게 하는 것이다. lxc.autodev가 1로 지정되었다면, 컨테이너 루트 파일시스템을 마운트 한 후, LXC가 <filename>/dev</filename> 밑에 새로운 tmpfs(최대 500k)를 마운트 해준다. 그리고 최소한의 장치만을 채워준다.
         이것은 "systemd" 기반의 "init" 환경의 컨테이너를 시작할 때 일반적으로 필요하지만, 다른 환경의 경우는 선택적인 요소이다.
          컨테이너의 부가적인 장치들은 <option>lxc.hook.autodev</option> 훅 스크립트를 사용하여 /dev 디렉토리에 생성할 수 있다.
       </para>
@@ -960,10 +1049,27 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
         이 마운트 포인트들은 컨테이너에서만 보이고 외부에서 실행하는 프로세스들에겐 보이지 않는다.
         이는 예를 들어  /etc, /var, /home을 마운트할 때 유용하다.
       </para>
+      <para>
+        <!--
+        NOTE - LXC will generally ensure that mount targets and relative
+        bind-mount sources are properly confined under the container
+        root, to avoid attacks involving over-mounting host directories
+        and files.  (Symbolic links in absolute mount sources are ignored)
+        However, if the container configuration first mounts a directory which
+        is under the control of the container user, such as /home/joe, into
+        the container at some <filename>path</filename>, and then mounts
+        under <filename>path</filename>, then a TOCTTOU attack would be
+        possible where the container user modifies a symbolic link under
+        his home directory at just the right time.
+        -->
+        주의 - 보통 LXC는 마운트 대상과 상대 경로로 된 바인드 마운트 소스들이 컨테이너의 루트 아래에 있도록 보장할 것이다. 이는 호스트 디렉토리와 파일들을 겹쳐서 마운트하는 유형의 공격을 피하기 위한 것이다. (절대 경로로 된 마운트 소스 내에 존재하는 심볼릭 링크들은 무시될 것이다.)
+        하지만, 만약 컨테이너 설정에서 컨테이너 사용자가 제어할 수 있는, 예를 들어 /home/joe와 같은 디렉토리를 컨테이너 내의 <filename>path</filename>에 먼저 마운트 하고 나서,  <filename>path</filename> 내에 또 마운트를 하는 경우가 있다면,
+        컨테이너 사용자가 자신의 home 디렉토리에 있는 심볼릭링크를 정확한 시간에 조작하여, TOCTTOU (역주 : Time of check to time of use) 공격이 가능할 것이다.
+      </para>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.mount</option>
+           <option>lxc.mount.fstab</option>
          </term>
          <listitem>
            <para>
@@ -1021,6 +1127,16 @@ proc proc proc nodev,noexec,nosuid 0 0
              fstab format.
               -->
               fstab의 형식으로, 한 줄당 마운트 포인트 하나를 지정한다.
+
+              <!--
+             Moreover lxc add two options to mount.
+              <option>optional</option> don't fail if mount does not work.
+              <option>create=dir</option> or <option>create=file</option>
+              to create dir (or file) when the point will be mounted.
+              -->
+              또한 마운트 옵션에 아래 2가지 옵션을 추가적으로 사용할 수 있다. 이는 LXC 자체적으로 사용하는 옵션이다.
+              <option>optional</option>은 마운트를 못하더라도, 실패로 처리하지 않게 한다.
+              <option>create=dir</option>와 <option>create=file</option>는 마운트할 때, 디렉토리(dir) 또는 파일(file)을 생성한다.
            </para>
          </listitem>
        </varlistentry>
@@ -1117,7 +1233,7 @@ proc proc proc nodev,noexec,nosuid 0 0
                  the container's own cgroup into that directory.
                  The container will be able to write to its own
                  cgroup directory, but not the parents, since they
-                 will be remounted read-only
+                 will be remounted read-only.
                </para>
                 -->
                 <para>
@@ -1244,6 +1360,15 @@ proc proc proc nodev,noexec,nosuid 0 0
                </para>
              </listitem>
            </itemizedlist>
+            <para>
+              <!--
+              If cgroup namespaces are enabled, then any <option>cgroup</option>
+              auto-mounting request will be ignored, since the container can
+              mount the filesystems itself, and automounting can confuse the
+              container init.
+              -->
+              cgroup 네임스페이스가 사용 가능한 경우, <option>cgroup</option> 마운트 옵션들은 전부 무시될 것이다. 컨테이너가 직접 파일시스템을 마운트하기 때문이며, 컨테이너 초기화시 해당 옵션이 혼란을 줄 수 있기 때문이다.
+            </para>
            <para>
               <!--
              Note that if automatic mounting of the cgroup filesystem
@@ -1301,7 +1426,7 @@ proc proc proc nodev,noexec,nosuid 0 0
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.rootfs</option>
+           <option>lxc.rootfs.path</option>
          </term>
          <listitem>
            <para>
@@ -1325,13 +1450,15 @@ proc proc proc nodev,noexec,nosuid 0 0
           specifies that the rootfs should be an overlay with <filename>/upper</filename>
           being mounted read-write over a read-only mount of <filename>/lower</filename>.
           <filename>aufs:/lower:/upper</filename> does the same using aufs in place
-          of overlayfs. <filename>loop:/file</filename> tells lxc to attach
+          of overlayfs. For both <filename>overlayfs</filename> and
+          <filename>aufs</filename> multiple <filename>/lower</filename>
+          directories can be specified. <filename>loop:/file</filename> tells lxc to attach
           <filename>/file</filename> to a loop device and mount the loop device.
           -->
               디렉토리 또는 간단한 블록 장치로 구성된 컨테이너를 위해서 경로이름이 사용될 수 있다. 만약 루트 파일시스템이 nbd 장치의 경우, <filename>nbd:file:1</filename>는 <filename>file</filename>을 nbd 장치로 사용하고 1번 파티션이 루트 파일시스템으로 마운트되도록 지정한다.
               <filename>nbd:file</filename>는 nbd 장치 자체가 마운트되어야 한다고 지정한다.
               <filename>overlayfs:/lower:/upper</filename>는 루트 파일시스템이 읽기전용으로 마운트된 <filename>/lower</filename>를 <filename>/upper</filename>가 읽기/쓰기 가능으로 오버레이 마운트되도록 지정한다.
-              <filename>aufs:/lower:/upper</filename>는 aufs에서 위와같이 지정한다.
+              <filename>aufs:/lower:/upper</filename>는 aufs에서 위와같이 지정한다. <filename>overlayfs</filename>와 <filename>aufs</filename>는 여러개의 <filename>/lower</filename> 디렉토리를 지정할 수 있다.
               <filename>loop:/file</filename>는 lxc가 <filename>/file</filename>을 loop 장치로 사용하고 loop 장치를 마운트하도록 지정한다.
            </para>
          </listitem>
@@ -1344,7 +1471,7 @@ proc proc proc nodev,noexec,nosuid 0 0
          <listitem>
            <para>
               <!--
-             where to recursively bind <option>lxc.rootfs</option>
+             where to recursively bind <option>lxc.rootfs.path</option>
              before pivoting.  This is to ensure success of the
              <citerefentry>
                <refentrytitle><command>pivot_root</command></refentrytitle>
@@ -1353,11 +1480,12 @@ proc proc proc nodev,noexec,nosuid 0 0
              syscall.  Any directory suffices, the default should
              generally work.
               -->
-              루트파일시스템을 변경하기 전에, <option>lxc.rootfs</option>을 어디에 재귀적으로 바인드할지 정한다. 이는 다음 시스템콜의 성공을 보장한다.
+              루트 파일시스템을 변경하기 전에, <option>lxc.rootfs.path</option>을 어디에 재귀적으로 바인드할지 정한다. 이는 
              <citerefentry>
                <refentrytitle><command>pivot_root</command></refentrytitle>
                <manvolnum>8</manvolnum>
-             </citerefentry>
+             </citerefentry> 
+              시스템 콜의 성공을 보장한다.
               어떤 디렉토리도 좋으며, 기본값으로도 보통 동작할 것이다.
            </para>
          </listitem>
@@ -1448,7 +1576,9 @@ proc proc proc nodev,noexec,nosuid 0 0
              <citerefentry>
                <refentrytitle><command>capabilities</command></refentrytitle>
                <manvolnum>7</manvolnum>
-             </citerefentry>,
+              </citerefentry>.
+              If used with no value, lxc will clear any drop capabilities
+              specified up to this point.
               -->
               컨테이너에서 제거할 capability를 지정한다.
               한 줄에 여러개의 capability를 공백(space)으로 구분하여 정의할 수 있다.
@@ -1458,6 +1588,7 @@ proc proc proc nodev,noexec,nosuid 0 0
                <refentrytitle><command>capabilities</command></refentrytitle>
                <manvolnum>7</manvolnum>
              </citerefentry>
+               값을 공백으로 지정하면, 해당 설정 이전에 지정했던 capability를 모두 취소한다. (lxc.cap.drop에 아무 것도 지정하지 않은 상태가 된다.)
            </para>
          </listitem>
        </varlistentry>
@@ -1490,14 +1621,16 @@ proc proc proc nodev,noexec,nosuid 0 0
        If lxc was compiled and installed with apparmor support, and the host
        system has apparmor enabled, then the apparmor profile under which the
        container should be run can be specified in the container
-       configuration.  The default is <command>lxc-container-default</command>.
+        configuration.  The default is <command>lxc-container-default-cgns</command>
+       if the host kernel is cgroup namespace aware, or
+       <command>lxc-container-default</command> otherwise.
         -->
-        lxc가 apparmor를 지원하도록 컴파일된 후 설치되었고, 호스트 시스템에서 apparmor가 활성화되었다면, 컨테이너에서 따라야할 apparmor 프로파일을 컨테이너 설정에서 지정할 수 있다. 기본값은 <command>lxc-container-default</command>이다.
+        lxc가 apparmor를 지원하도록 컴파일된 후 설치되었고, 호스트 시스템에서 apparmor가 활성화되었다면, 컨테이너에서 따라야할 apparmor 프로파일을 컨테이너 설정에서 지정할 수 있다. 기본값은 호스트 커널이 cgroup 네임스페이스를 지원하면 <command>lxc-container-default-cgns</command>이고, 그렇지 않다면 <command>lxc-container-default</command>이다.
       </para>
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.aa_profile</option>
+           <option>lxc.apparmor.profile</option>
          </term>
          <listitem>
            <para>
@@ -1509,12 +1642,20 @@ proc proc proc nodev,noexec,nosuid 0 0
               컨테이너가 따라야할 apparmor 프로파일을 지정한다.
               컨테이너가 apparmor로 인한 제한을 받지 않도록 하려면, 아래와 같이 지정하면 된다.
            </para>
-             <programlisting>lxc.aa_profile = unconfined</programlisting>
+             <programlisting>lxc.apparmor.profile = unconfined</programlisting>
+            <para>
+             <!--
+              If the apparmor profile should remain unchanged (i.e. if you
+             are nesting containers and are already confined), then use
+             -->
+              apparmor 프로파일이 변경되지 않아야 한다면(중첩 컨테이너 안에 있고, 이미 confined된 경우), 아래와 같이 지정하면 된다.
+            </para>
+              <programlisting>lxc.apparmor.profile = unchanged</programlisting>
          </listitem>
        </varlistentry>
        <varlistentry>
          <term>
-           <option>lxc.aa_allow_incomplete</option>
+           <option>lxc.apparmor.allow_incomplete</option>
          </term>
          <listitem>
            <para>
@@ -1563,7 +1704,7 @@ proc proc proc nodev,noexec,nosuid 0 0
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.se_context</option>
+           <option>lxc.selinux.context</option>
          </term>
          <listitem>
            <para>
@@ -1573,7 +1714,7 @@ proc proc proc nodev,noexec,nosuid 0 0
               -->
               컨테이너가 따라야할 SELinux 컨텍스트를 지정하거나, <command>unconfined_t</command>를 지정할 수 있다. 예를 들어 아래와 같이 지정 가능하다.
            </para>
-           <programlisting>lxc.se_context = system_u:system_r:lxc_t:s0:c22</programlisting>
+           <programlisting>lxc.selinux.context = system_u:system_r:lxc_t:s0:c22</programlisting>
          </listitem>
        </varlistentry>
       </variablelist>
@@ -1597,7 +1738,7 @@ proc proc proc nodev,noexec,nosuid 0 0
         Versions 1 and 2 are currently supported.  In version 1, the
        policy is a simple whitelist.  The second line therefore must
        read "whitelist", with the rest of the file containing one (numeric)
-       sycall number per line.  Each syscall number is whitelisted,
+       syscall number per line.  Each syscall number is whitelisted,
        while every unlisted number is blacklisted for use in the container
         -->
         현재는 버전1과 2만 지원된다. 버전 1에서는 정책은 단순한 화이트리스트이다. 그러므로 두번째 라인은 반드시 "whitelist"여야 한다. 파일의 나머지 내용은 한 줄에 하나의 시스템콜 번호로 채워진다. 화이트리스트에 없는 번호는 컨테이너에서 블랙리스트로 들어간다.
@@ -1627,7 +1768,7 @@ mknod errno 0
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.seccomp</option>
+           <option>lxc.seccomp.profile</option>
          </term>
          <listitem>
            <para>
@@ -1642,6 +1783,42 @@ mknod errno 0
       </variablelist>
     </refsect2>
 
+    <refsect2>
+      <title>PR_SET_NO_NEW_PRIVS</title>
+      <para>
+        <!--
+              With PR_SET_NO_NEW_PRIVS active execve() promises not to grant
+              privileges to do anything that could not have been done without
+              the execve() call (for example, rendering the set-user-ID and
+              set-group-ID mode bits, and file capabilities non-functional).
+              Once set, this bit cannot be unset. The setting of this bit is
+              inherited by children created by fork() and clone(), and preserved
+              across execve().
+              Note that PR_SET_NO_NEW_PRIVS is applied after the container has
+              changed into its intended AppArmor profile or SElinux context.
+          -->
+        PR_SET_NO_NEW_PRIVS가 적용되면, execve()는, execve()를 호출되기 전에는 실행하지 못했던 것을 수행하기 위해 권한을 부여하는 류의 동작을 하지 않게 된다. (예를 들어, set-user-ID와 set-group-ID 모드, 파일 캐퍼빌리티가 동작하지 않는 것이다.)
+        일단 적용되면 이 비트는 해제할 수 없다. 이 비트는 fork()와 clone()으로 생성된 자식에게도 상속되며, execve() 이후에도 그대로 적용된다.
+        PR_SET_NO_NEW_PRIVS는 컨테이너의 AppArmor 프로필 또는 SELinux 문맥이 변경된 이후에 적용된다.
+      </para>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>lxc.no_new_privs</option>
+          </term>
+          <listitem>
+            <para>
+             <!--
+              Specify whether the PR_SET_NO_NEW_PRIVS flag should be set for the
+              container. Set to 1 to activate.
+                 -->
+             PR_SET_NO_NEW_PRIVS가 컨테이너에 적용되어야 하는지 여부를 지정한다. 1을 지정하면 적용된다.
+           </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+    </refsect2>
+
     <refsect2>
       <title><!-- UID mappings -->UID 매핑</title>
       <para>
@@ -1662,7 +1839,7 @@ mknod errno 0
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.id_map</option>
+           <option>lxc.idmap</option>
          </term>
          <listitem>
            <para>
@@ -1699,9 +1876,12 @@ mknod errno 0
          <listitem><para> Container name. </para></listitem>
          <listitem><para> Section (always 'lxc'). </para></listitem>
          <listitem><para> The hook type (i.e. 'clone' or 'pre-mount'). </para></listitem>
-         <listitem><para> Additional arguments In the
+         <listitem><para> Additional arguments. In the
          case of the clone hook, any extra arguments passed to
-         lxc-clone will appear as further arguments to the hook. </para></listitem>
+         lxc-clone will appear as further arguments to the hook.
+         In the case of the stop hook, paths to filedescriptors
+         for each of the container's namespaces along with their types
+         are passed. </para></listitem>
        </itemizedlist>
        The following environment variables are set:
        <itemizedlist>
@@ -1709,7 +1889,7 @@ mknod errno 0
          <listitem><para> LXC_ROOTFS_MOUNT: the path to the mounted root filesystem. </para></listitem>
          <listitem><para> LXC_CONFIG_FILE: the path to the container configuration file. </para></listitem>
          <listitem><para> LXC_SRC_NAME: in the case of the clone hook, this is the original container's name. </para></listitem>
-         <listitem><para> LXC_ROOTFS_PATH: this is the lxc.rootfs entry for the container.  Note this is likely not where the mounted rootfs is to be found, use LXC_ROOTFS_MOUNT for that. </para></listitem>
+         <listitem><para> LXC_ROOTFS_PATH: this is the lxc.rootfs.path entry for the container.  Note this is likely not where the mounted rootfs is to be found, use LXC_ROOTFS_MOUNT for that. </para></listitem>
        </itemizedlist>
         -->
         컨테이너 훅이 실행될 때, 정보는 명령어 인수나 환경 변수를 통해 넘겨진다.
@@ -1718,7 +1898,7 @@ mknod errno 0
          <listitem><para>컨테이너 이름</para></listitem>
          <listitem><para>섹션 (보통 'lxc')</para></listitem>
          <listitem><para>훅 종류 ('clone', 'pre-mount' 등)</para></listitem>
-         <listitem><para>clone 훅일 경우 추가인수. lxc-clone에 전달된 인수가 훅으로 전달된다.</para></listitem>
+         <listitem><para>추가 인수. clone 훅일 경우, lxc-clone에게 넘였던 추가 인수들이 넘어온다. stop 훅일 경우, 컨테이너의 네임스페이스 각각에 대한 이름과 파일 디스크립터의 경로가 넘어온다.</para></listitem>
        </itemizedlist>
         환경 변수 :
        <itemizedlist>
@@ -1726,7 +1906,7 @@ mknod errno 0
          <listitem><para> LXC_ROOTFS_MOUNT: 마운트될 루트 파일시스템의 경로</para></listitem>
          <listitem><para> LXC_CONFIG_FILE: 컨테이너 설정파일의 경로</para></listitem>
          <listitem><para> LXC_SRC_NAME: clone 훅의 경우, 원본 컨테이너의 이름</para></listitem>
-         <listitem><para> LXC_ROOTFS_PATH: 컨테이너의 lxc.rootfs 항목. 이 것은 마운트된 루트 파일시스템을 나타내지 않음에 주의해야한다. 그 목적을 위해서는  LXC_ROOTFS_MOUNT를 사용해야 한다.</para></listitem>
+         <listitem><para> LXC_ROOTFS_PATH: 컨테이너의 lxc.rootfs.path 항목. 이 것은 마운트된 루트 파일시스템을 가리키는 것이 아님에 주의해야한다. 그 목적을 위해서는  LXC_ROOTFS_MOUNT를 사용해야 한다.</para></listitem>
         </itemizedlist>
       </para>
       <para>
@@ -1835,6 +2015,31 @@ mknod errno 0
          </listitem>
        </varlistentry>
       </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>lxc.hook.stop</option>
+         </term>
+         <listitem>
+           <para>
+             <!--
+             A hook to be run in the host's namespace with references
+             to the container's namespaces after the container has been shut
+             down. For each namespace an extra argument is passed to the hook
+             containing the namespace's type and a filename that can be used to
+             obtain a file descriptor to the corresponding namespace, separated
+             by a colon. The type is the name as it would appear in the
+             <filename>/proc/PID/ns</filename> directory.
+             For instance for the mount namespace the argument usually looks
+             like <filename>mnt:/proc/PID/fd/12</filename>.
+             -->
+             컨테이너가 종료된 후 컨테이너 네임스페이스에 대한 참조를 넘겨받는 호스트의 네임스페이스에서 실행되는 훅.
+             각각의 네임스페이스들은 훅에 추가인수로 넘겨진다. 해당 인수는 네임스페이스의 이름과 네임스페이스의 파일 디스크립터를 얻어올 수 있는 파일이름을 가지고 있으며, 콜론으로 구분된다.
+             네임스페이스 이름은 <filename>/proc/PID/ns</filename> 디렉토리 내의 파일 이름이다. 예를 들어 마운트 네임스페이스에 대응하는 인수는 일반적으로 <filename>mnt:/proc/PID/fd/12</filename>와 같이 된다.
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
       <variablelist>
        <varlistentry>
          <term>
@@ -1945,10 +2150,10 @@ mknod errno 0
            <para>
               <!--
              The path to the console output of the container if not NULL.
-             [<option>-c</option>] [<option>lxc.console</option>]
+             [<option>-c</option>] [<option>lxc.console.path</option>]
               -->
               NULL이 아니라면, 컨테이너의 콘솔의 출력이 저장될 경로.
-             [<option>-c</option>] [<option>lxc.console</option>]
+             [<option>-c</option>] [<option>lxc.console.path</option>]
            </para>
          </listitem>
        </varlistentry>
@@ -2001,15 +2206,64 @@ mknod errno 0
               <!--
              The host relative path to the container root which has been
              mounted to the rootfs.mount location.
-             [<option>lxc.rootfs</option>]
+             [<option>lxc.rootfs.path</option>]
               -->
               rootfs.mount에 마운트된 컨테이너 루트의 호스트에서의 경로이다.
-              [<option>lxc.rootfs</option>]
+              [<option>lxc.rootfs.path</option>]
            </para>
          </listitem>
        </varlistentry>
       </variablelist>
-
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>LXC_SRC_NAME</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              Only for the clone hook. Is set to the original container name.
+              -->
+              clone 훅에서만 사용된다. 원본 컨테이너의 이름을 지정한다.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>LXC_TARGET</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              Only for the stop hook. Is set to "stop" for a container
+              shutdown or "reboot" for a container reboot.
+              -->
+              stop 훅에서만 사용된다. 값이 "stop"이면 컨테이너가 종료되는 것을, "reboot"이면 컨테이너가 재부팅되는 것을 의미한다.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
+      <variablelist>
+        <varlistentry>
+          <term>
+            <option>LXC_CGNS_AWARE</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+             If unset, then this version of lxc is not aware of cgroup
+             namespaces.  If set, it will be set to 1, and lxc is aware
+             of cgroup namespaces.  Note this does not guarantee that
+             cgroup namespaces are enabled in the kernel.  This is used
+             by the lxcfs mount hook.
+             -->
+             이 변수가 지정되지 않았다면, 현재 버전의 lxc는 cgroup 네임스페이스를 지원하지 않는다. 만약 지정되었고 값이 1이라면, lxc는 cgroup 네임스페이스를 지원하는 것이다. 단, kernel에서의 cgroup 네임스페이스 지원을 보장하는 것이 아님에 주의해야 한다. lxcfs 마운트 훅에서 사용된다.
+            </para>
+          </listitem>
+        </varlistentry>
+      </variablelist>
     </refsect2>
 
     <refsect2>
@@ -2037,7 +2291,7 @@ mknod errno 0
       <variablelist>
        <varlistentry>
          <term>
-           <option>lxc.loglevel</option>
+           <option>lxc.log.level</option>
          </term>
          <listitem>
            <para>
@@ -2067,7 +2321,7 @@ mknod errno 0
        </varlistentry>
        <varlistentry>
          <term>
-           <option>lxc.logfile</option>
+           <option>lxc.log</option>
          </term>
          <listitem>
            <para>
@@ -2078,6 +2332,22 @@ mknod errno 0
            </para>
          </listitem>
        </varlistentry>
+       <varlistentry>
+         <term>
+           <option>lxc.log.syslog</option>
+         </term>
+         <listitem>
+           <para>
+             <!--
+                 Send logging info to syslog. It respects the log level defined in
+                 <command>lxc.log.level</command>. The argument should be the syslog
+                 facility to use, valid ones are: daemon, local0, local1, local2,
+                 local3, local4, local5, local5, local7.
+             -->
+             로그정보를 syslog에 보낸다. 로그 수준은 <command>lxc.log.level</command>로 지정할 수 있다. 인자는 syslog에 정의된 값으로만 지정할 수 있다. 사용 가능한 값은 다음과 같다 : daemon, local0, local1, local2, local3, local4, local5, local5, local7 
+           </para>
+         </listitem>
+       </varlistentry>
       </variablelist>
     </refsect2>
 
@@ -2137,6 +2407,22 @@ mknod errno 0
             </para>
           </listitem>
         </varlistentry>
+        <varlistentry>
+          <term>
+            <option>lxc.monitor.unshare</option>
+          </term>
+          <listitem>
+            <para>
+              <!--
+              If not zero the mount namespace will be unshared from the host
+              before initializing the container (before running any pre-start
+              hooks). This requires the CAP_SYS_ADMIN capability at startup.
+              Default is 0.
+              -->
+              값이 0이 아니라면, 컨테이너가 초기화되기 전 (pre-start 훅이 실행 되기 전) 호스트로부터 마운트 네임스페이스를 unshare 한다. 시작시에 CAP_SYS_ADMIN 캐퍼빌리티가 요구된다. 기본값은 0이다.
+            </para>
+          </listitem>
+        </varlistentry>
         <varlistentry>
           <term>
             <option>lxc.group</option>
@@ -2260,14 +2546,14 @@ mknod errno 0
         이 설정은 컨테이너가 한 쪽은 (이전에 시스템에 이미 생성된) br0 브리지에 연결되어 있는 veth 장치 쌍을 사용하도록 세팅한다. 가상 네트워크 장치는 컨테이너 내에서 eth0라는 이름을 갖는다.
       </para>
       <programlisting>
-       lxc.utsname = myhostname
-       lxc.network.type = veth
-       lxc.network.flags = up
-       lxc.network.link = br0
-       lxc.network.name = eth0
-       lxc.network.hwaddr = 4a:49:43:49:79:bf
-       lxc.network.ipv4 = 1.2.3.5/24 1.2.3.255
-       lxc.network.ipv6 = 2003:db8:1:0:214:1234:fe0b:3597
+       lxc.uts.name = myhostname
+       lxc.net.0.type = veth
+       lxc.net.0.flags = up
+       lxc.net.0.link = br0
+       lxc.net.0.name = eth0
+       lxc.net.0.hwaddr = 4a:49:43:49:79:bf
+       lxc.net.0.ipv4.address = 1.2.3.5/24 1.2.3.255
+       lxc.net.0.ipv6.address = 2003:db8:1:0:214:1234:fe0b:3597
       </programlisting>
     </refsect2>
 
@@ -2278,8 +2564,8 @@ mknod errno 0
         이 설정은 UID와 GID 둘다를 컨테이너의 0 ~ 9999를 호스트의 100000 ~ 109999로 매핑한다.
       </para>
       <programlisting>
-       lxc.id_map = u 0 100000 10000
-       lxc.id_map = g 0 100000 10000
+       lxc.idmap = u 0 100000 10000
+       lxc.idmap = g 0 100000 10000
       </programlisting>
     </refsect2>
 
@@ -2310,35 +2596,35 @@ mknod errno 0
         아래의 예제는 복잡한 네트워크 스택, 컨트롤 그룹 사용, 호스트 이름 설정, 몇몇 장소 마운트, 루트 파일시스템 변경 등의 복잡한 설정을 보여준다.
       </para>
       <programlisting>
-       lxc.utsname = complex
-       lxc.network.type = veth
-       lxc.network.flags = up
-       lxc.network.link = br0
-       lxc.network.hwaddr = 4a:49:43:49:79:bf
-       lxc.network.ipv4 = 10.2.3.5/24 10.2.3.255
-       lxc.network.ipv6 = 2003:db8:1:0:214:1234:fe0b:3597
-       lxc.network.ipv6 = 2003:db8:1:0:214:5432:feab:3588
-       lxc.network.type = macvlan
-       lxc.network.flags = up
-       lxc.network.link = eth0
-       lxc.network.hwaddr = 4a:49:43:49:79:bd
-       lxc.network.ipv4 = 10.2.3.4/24
-       lxc.network.ipv4 = 192.168.10.125/24
-       lxc.network.ipv6 = 2003:db8:1:0:214:1234:fe0b:3596
-       lxc.network.type = phys
-       lxc.network.flags = up
-       lxc.network.link = dummy0
-       lxc.network.hwaddr = 4a:49:43:49:79:ff
-       lxc.network.ipv4 = 10.2.3.6/24
-       lxc.network.ipv6 = 2003:db8:1:0:214:1234:fe0b:3297
+       lxc.uts.name = complex
+       lxc.net.0.type = veth
+       lxc.net.0.flags = up
+       lxc.net.0.link = br0
+       lxc.net.0.hwaddr = 4a:49:43:49:79:bf
+       lxc.net.0.ipv4.address = 10.2.3.5/24 10.2.3.255
+       lxc.net.0.ipv6.address = 2003:db8:1:0:214:1234:fe0b:3597
+       lxc.net.0.ipv6.address = 2003:db8:1:0:214:5432:feab:3588
+       lxc.net.1.type = macvlan
+       lxc.net.1.flags = up
+       lxc.net.1.link = eth0
+       lxc.net.1.hwaddr = 4a:49:43:49:79:bd
+       lxc.net.1.ipv4.address = 10.2.3.4/24
+       lxc.net.1.ipv4.address = 192.168.10.125/24
+       lxc.net.1.ipv6.address = 2003:db8:1:0:214:1234:fe0b:3596
+       lxc.net.2.type = phys
+       lxc.net.2.flags = up
+       lxc.net.2.link = dummy0
+       lxc.net.2.hwaddr = 4a:49:43:49:79:ff
+       lxc.net.2.ipv4.address = 10.2.3.6/24
+       lxc.net.2.ipv6.address = 2003:db8:1:0:214:1234:fe0b:3297
        lxc.cgroup.cpuset.cpus = 0,1
        lxc.cgroup.cpu.shares = 1234
        lxc.cgroup.devices.deny = a
        lxc.cgroup.devices.allow = c 1:3 rw
        lxc.cgroup.devices.allow = b 8:0 rw
-       lxc.mount = /etc/fstab.complex
+       lxc.mount.fstab = /etc/fstab.complex
        lxc.mount.entry = /lib /root/myrootfs/lib none ro,bind 0 0
-       lxc.rootfs = /mnt/rootfs.complex
+       lxc.rootfs.path = dir:/mnt/rootfs.complex
        lxc.cap.drop = sys_module mknod setuid net_raw
        lxc.cap.drop = mac_override
       </programlisting>