This website requires JavaScript.
Explore
Help
Sign In
maemachinebroke
/
hakurei
Watch
1
Star
0
Fork
0
You've already forked hakurei
forked from
security/hakurei
Code
Pull Requests
Activity
Files
a6887f7253ae822357f0d4d019675acc8c3e0b4d
hakurei
/
sandbox
History
Ophestra
a6887f7253
sandbox/seccomp: import dot for syscall
...
This significantly increases readability in some places. Signed-off-by: Ophestra <
cat@gensokyo.uk
>
2025-07-02 02:30:35 +09:00
..
seccomp
sandbox/seccomp: prepare -> export
2025-07-02 00:32:48 +09:00
vfs
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
wl
treewide: switch to hakurei.app
2025-06-26 04:01:02 +09:00
container_test.go
sandbox/seccomp: resolve rules natively
2025-07-01 22:11:32 +09:00
container.go
sandbox/seccomp: import dot for syscall
2025-07-02 02:30:35 +09:00
executable_test.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
executable.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
init.go
sandbox/seccomp: import dot for syscall
2025-07-02 02:30:35 +09:00
mount.go
sandbox/seccomp: import dot for syscall
2025-07-02 02:30:35 +09:00
msg.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
ops.go
sandbox/seccomp: import dot for syscall
2025-07-02 02:30:35 +09:00
output.go
sandbox: wrap error with its own text message
2025-03-25 19:42:20 +09:00
params.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
path.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
syscall.go
sandbox: support privileged container
2025-03-27 19:40:19 +09:00
sysctl.go
sandbox: cache kernel.cap_last_cap value
2025-03-26 06:19:19 +09:00