Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole.

Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole.

Scheduled Pinned Locked Moved Uncategorized
netbsd
3 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M This user is from outside of this forum
    M This user is from outside of this forum
    mpeterma@mastodon.bsd.cafe
    wrote last edited by
    #1

    Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole. The original guardrails remain unchanged: no modifications to existing kernel paths, no UVM hooks, no NPF integration, no hidden coupling. The scope stays explicit and the risk bounded.

    Progress has focused on operations. Logging, lightweight supervision, and basic metrics are in place, shifting the question from "can this work?" to "can this be run?". Networking remains intentionally simple and host-based; for hard isolation, Xen is still the right boundary. Jails provide an operational frame inside the host, not a replacement for virtualization.

    Resource budgeting is being prototyped again via the secmodel evaluation interface, touching allocation paths and scheduler run queues in a minimally invasive way, but it needs careful review.

    There is now also a small landing page to make the ideas visible, including an experimental amd64 ISO based on NetBSD 10.1 for testing. If it sparks upstream interest or discussion around lightweight, explicit isolation on NetBSD, that is already a win.

    Link Preview Image
    Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations

    Jails for NetBSD is an experimental NetBSD-native isolation model with kernel-enforced boundaries, supervised service execution, and snapshot telemetry for practical host-side operations.

    favicon

    Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations (netbsd-jails.petermann-digital.de)

    #netbsd

    mccd@merveilles.townM M 2 Replies Last reply
    1
    0
    • stefano@mastodon.bsd.cafeS stefano@mastodon.bsd.cafe shared this topic
    • M mpeterma@mastodon.bsd.cafe

      Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole. The original guardrails remain unchanged: no modifications to existing kernel paths, no UVM hooks, no NPF integration, no hidden coupling. The scope stays explicit and the risk bounded.

      Progress has focused on operations. Logging, lightweight supervision, and basic metrics are in place, shifting the question from "can this work?" to "can this be run?". Networking remains intentionally simple and host-based; for hard isolation, Xen is still the right boundary. Jails provide an operational frame inside the host, not a replacement for virtualization.

      Resource budgeting is being prototyped again via the secmodel evaluation interface, touching allocation paths and scheduler run queues in a minimally invasive way, but it needs careful review.

      There is now also a small landing page to make the ideas visible, including an experimental amd64 ISO based on NetBSD 10.1 for testing. If it sparks upstream interest or discussion around lightweight, explicit isolation on NetBSD, that is already a win.

      Link Preview Image
      Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations

      Jails for NetBSD is an experimental NetBSD-native isolation model with kernel-enforced boundaries, supervised service execution, and snapshot telemetry for practical host-side operations.

      favicon

      Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations (netbsd-jails.petermann-digital.de)

      #netbsd

      mccd@merveilles.townM This user is from outside of this forum
      mccd@merveilles.townM This user is from outside of this forum
      mccd@merveilles.town
      wrote last edited by
      #2

      @mpeterma it looks really cool! I love the simplicity of the interface 😁.

      I was curious if resource sharing is possible? Say I want some directory or file to be available to the jail. Will it have something like unveil or landlock?

      1 Reply Last reply
      0
      • M mpeterma@mastodon.bsd.cafe

        Since the last article, the secmodel_jail / jailctl / jailmgr stack has moved closer to a coherent whole. The original guardrails remain unchanged: no modifications to existing kernel paths, no UVM hooks, no NPF integration, no hidden coupling. The scope stays explicit and the risk bounded.

        Progress has focused on operations. Logging, lightweight supervision, and basic metrics are in place, shifting the question from "can this work?" to "can this be run?". Networking remains intentionally simple and host-based; for hard isolation, Xen is still the right boundary. Jails provide an operational frame inside the host, not a replacement for virtualization.

        Resource budgeting is being prototyped again via the secmodel evaluation interface, touching allocation paths and scheduler run queues in a minimally invasive way, but it needs careful review.

        There is now also a small landing page to make the ideas visible, including an experimental amd64 ISO based on NetBSD 10.1 for testing. If it sparks upstream interest or discussion around lightweight, explicit isolation on NetBSD, that is already a win.

        Link Preview Image
        Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations

        Jails for NetBSD is an experimental NetBSD-native isolation model with kernel-enforced boundaries, supervised service execution, and snapshot telemetry for practical host-side operations.

        favicon

        Jails for NetBSD - Kernel-enforced Isolation with User-friendly Operations (netbsd-jails.petermann-digital.de)

        #netbsd

        M This user is from outside of this forum
        M This user is from outside of this forum
        mpeterma@mastodon.bsd.cafe
        wrote last edited by
        #3

        Small follow-up on Jails for NetBSD.

        While experimenting with resource budgeting via the secmodel evaluation interface, it became clear that pushing resource limits into the jail mechanism introduces complexity in sensitive kernel paths and risks undermining system stability. That runs counter to one of the core guardrails of the project: keep the mechanism simple, explicit, and low-risk.

        As a result, resource control is now considered out of scope for Jails for NetBSD.

        Jails remain focused on lightweight service isolation and operational structure inside the host. Systems that require hard resource guarantees should use virtualization boundaries such as Xen.

        This keeps the design aligned with its original goal: pragmatic, minimally invasive process isolation on NetBSD.

        A short write-up explaining this scope refinement will be published on the project website later this week.

        1 Reply Last reply
        1
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups