> On Dec 18, 2024, at 5:19 AM, Mark Johnston <ma...@freebsd.org> wrote:
> 
> We have a number of sysctls which are defined as tunables, whose values
> cannot be changed after boot.  Some of these sysctls, such as net.fibs,
> are per-VNET so could in principle be changed at jail creation time.

For current/15, it is actually doable since my previous work [1] and [2].

A usage example is the test plan in https://reviews.freebsd.org/D41825 
<https://reviews.freebsd.org/D41825> .

For short, `kenv some.kenv=foo`, and then create vnet jail, `jail -c xxx 
persist` .

Those commits are not MFCed to stable/14 and stable/13, as I'm not satisfied
with the implementation. The current implementation is somewhat hacky
and I planed to re-work it.

> I'd find it useful to be able to pass a set of tunables to jail_set(2),
> so that corresponding VNET jail has tunables set to the specified
> values.  For instance, it'd be useful in test suites where I want to
> exercise the network stack with different VNET sysctl settings, without
> having to configure the test runner at boot time.
> 
> I think the implementation would involve passing an environment to
> vnet_alloc(), which would copy the parent VNET context and then iterate
> over all VNET tunables in the system, invoking
> sysctl_load_tunable_by_oid_locked() in such a way that the custom
> environment is used to update the tunable's value.

That is per-jail kenv, quite close to my working copy.

> 
> Is there already some way to do what I want?  If not, is there some
> reason we shouldn't implement this feature?  Are there examples of VNET
> tunables for which it'd be unsafe to have values differing from the
> parent VNET?  One can print a list of such variables with "sysctl
> -aVNT"; the list is pretty short and I don't see many obvious problems
> with allowing them to be modified.
> 

Best regards,
Zhenlei

Reply via email to