untrusted comment: signature from openbsd 5.8 base secret key RWQNNZXtC/MqP/bjuXmLUMxY+CsDLMxdUkTz4XVrmhXW0FMJOxvDH/b+PNta27NsnaTtjlqOkpSoEK4tCjxdGNZ6rAeto934RwA= OpenBSD 5.8 errata 20, Jul 14, 2016: The mmap extension __MAP_NOFAULT could overcommit resources and crash the system. Apply by doing: signify -Vep /etc/signify/openbsd-58-base.pub -x 020_mmap.patch.sig \ -m - | (cd /usr/src && patch -p0) And then rebuild and install a kernel: cd /usr/src/sys/arch/`machine`/conf KK=`sysctl -n kern.osversion | cut -d# -f1` config $KK cd ../compile/$KK make make install Index: sys/uvm/uvm_mmap.c =================================================================== RCS file: /cvs/src/sys/uvm/uvm_mmap.c,v retrieving revision 1.112 diff -u -p -r1.112 uvm_mmap.c --- sys/uvm/uvm_mmap.c 20 Jul 2015 22:41:41 -0000 1.112 +++ sys/uvm/uvm_mmap.c 14 Jul 2016 03:12:08 -0000 @@ -486,7 +486,7 @@ sys_mmap(struct proc *p, void *v, regist /* MAP_PRIVATE mappings can always write to */ maxprot |= PROT_WRITE; } - if ((flags & MAP_ANON) != 0 || + if ((flags & MAP_ANON) != 0 || (flags & __MAP_NOFAULT) != 0 || ((flags & MAP_PRIVATE) != 0 && (prot & PROT_WRITE) != 0)) { if (size > (p->p_rlimit[RLIMIT_DATA].rlim_cur - ptoa(p->p_vmspace->vm_dused))) { @@ -505,7 +505,7 @@ sys_mmap(struct proc *p, void *v, regist is_anon: /* label for SunOS style /dev/zero */ - if ((flags & MAP_ANON) != 0 || + if ((flags & MAP_ANON) != 0 || (flags & __MAP_NOFAULT) != 0 || ((flags & MAP_PRIVATE) != 0 && (prot & PROT_WRITE) != 0)) { if (size > (p->p_rlimit[RLIMIT_DATA].rlim_cur - ptoa(p->p_vmspace->vm_dused))) {