Главная
Study mode:
on
1
Introduction
2
Container images
3
Container hardware resolution
4
Container vulnerability
5
Parent namespace
6
Network namespace
7
Unmapped
8
Management
9
Related Use Cases
10
Kernel Page Tables
11
Direct Map
12
Benchmarks
13
Cache
14
GFP Exclusive
15
Lab Exclusive
16
Metadata
17
Networking Stack
18
Conclusion
19
Testing
Description:
Explore container security through restricted address spaces in this 30-minute conference talk by IBM experts Mike Rapoport and James Bottomley. Delve into topics such as container images, hardware resolution, vulnerability, and parent namespaces. Examine network namespaces, unmapped management, and related use cases. Gain insights into kernel page tables, direct mapping, and benchmarks. Investigate cache considerations, GFP and Lab exclusives, metadata, and the networking stack. Conclude with testing methodologies and key takeaways for enhancing container security through address space restrictions.

Restricted Address Spaces for Container Security

Linux Foundation
Add to list