# Linux ## Linux Namespaces ``` "namespaces": [ "process", "network", "mount", "ipc", "uts" ], ``` Namespaces for the container are specified as an array of strings under the namespaces key. The list of constants that can be used is portable across operating systems. Here is a table mapping these names to native OS equivalent. For Linux the mapping is * process -> pid: the process ID number space is specific to the container, meaning that processes in different PID namespaces can have the same PID * network -> network: the container will have an isolated network stack * mount -> mnt container can only access mounts local to itself * ipc -> ipc processes in the container can only communicate with other processes inside same container * uts -> uts Hostname and NIS domain name are specific to the container ## Linux Control groups ## Linux Seccomp ## Linux Process Capabilities ``` "capabilities": [ "AUDIT_WRITE", "KILL", "NET_BIND_SERVICE" ], ``` capabilities is an array of Linux process capabilities. Valid values are the string after `CAP_` for capabilities defined in http://linux.die.net/man/7/capabilities ## SELinux ## Apparmor