This website requires JavaScript.
Explore
Help
Sign In
maemachinebroke
/
hakurei
Watch
1
Star
0
Fork
0
You've already forked hakurei
forked from
security/hakurei
Code
Pull Requests
Activity
Files
e03d702d088ad78645d1cce448713ef71b12e803
hakurei
/
sandbox
History
Ophestra
e03d702d08
sandbox/seccomp: implement syscall lookup
...
This uses the Go map and is verified against libseccomp. Signed-off-by: Ophestra <
cat@gensokyo.uk
>
2025-07-01 00:35:27 +09:00
..
seccomp
sandbox/seccomp: implement syscall lookup
2025-07-01 00:35:27 +09:00
vfs
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
wl
treewide: switch to hakurei.app
2025-06-26 04:01:02 +09:00
container_test.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
container.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
executable_test.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
executable.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
init.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
mount.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
msg.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
ops.go
sandbox: relative autoetc links
2025-04-11 18:54:00 +09:00
output.go
sandbox: wrap error with its own text message
2025-03-25 19:42:20 +09:00
params.go
sandbox: move out of internal
2025-03-17 02:55:36 +09:00
path.go
treewide: rename to hakurei
2025-06-25 04:57:41 +09:00
syscall.go
sandbox: support privileged container
2025-03-27 19:40:19 +09:00
sysctl.go
sandbox: cache kernel.cap_last_cap value
2025-03-26 06:19:19 +09:00