OpenBSD Journal

OpenBSD Journal

Another subprocess for vmd(8)

Contributed by rueda on from the spawn me a sub dept.

Dave Voutila (dv@) has continued his work on moving vmd(8) to a multi-process model. (Undeadly first reported on this in 2023.) This time the virtio scsi device has been converted to a subprocess:

CVSROOT:	/cvs
Module name:	src
Changes by:	dv@cvs.openbsd.org	2026/02/22 15:54:54

Modified files:
	usr.sbin/vmd   : vioscsi.c virtio.c virtio.h vmd.c vmd.h 

Log message:
vmd(8): convert virtio scsi device to a subprocess.

Break the virtio scsi device (used as a cd-rom drive) into a
subprocess like the virtio block and network devices. This leaves
only the entropy device (viornd) and vmmci device running in-process
with the vcpus.

ok mlarkin@

bsd.rd breakdown

Contributed by Janne Johansson on from the ram-a-llama-ding-dong dept.

Every OpenBSD admin has booted bsd.rd at least once — to install, upgrade, or rescue a broken system. But few people stop to look at what’s actually inside that file.

In this article over at the OpenBSD Jumpstart site, they take a look at just that.

The contents and format of the bsd.rd ramdisk kernel is shown, so you can understand and customize it for your own needs.

Enjoy!

pf: make af-to less magical

Contributed by Peter N. M. Hansteen on from the raising my family dept.

Seasoned networkers will know to tell you that legacy IPv4 and modern IPv6 are, in fact, not directly compatible, and shipping traffic between IPv4 and IPv6 networks requires address family translation.

On our favorite operating system and its siblings, that special case has been handled via the af-to option and special case rules since back in the OpenBSD 5.1 days.

But that special case has always felt a bit awkward to some, and now David Gwynne (dlg@) is airing a patch on tech@ with a view to making af-to "less magical".

In the message titled pf: make af-to less magical, David explains the motivation,

List:       openbsd-tech
Subject:    pf: make af-to less magical
From:       David Gwynne <david () gwynne ! id ! au>
Date:       2026-01-16 2:11:57
Message-ID: aWmebWvdwBi6z98j () animata ! net

i only recently figured out that af-to is very special in pf, but i dont
think it should be.

currently af-to has the following restrictions:

1. it only works for incoming packets, ie, you can only use it on "pass
in" rules in pf.

2. it forces the translated packet to be forwarded.

a consequence of these, and 2 in particular, is that only one state is
created for an af-to connection over the firewall. this is unlike other
forwarded connections where there's generally two states created, one
when the packet comes in from the wire into the stack, and another when
the packet goes out from the stack to the wire.

Read more…

OpenBSD-current now runs as guest under Apple Hypervisor

Contributed by Peter N. M. Hansteen on from the hyper-armed dept.

Following a recent series of commits by Helg Bredow (helg@) and Stefan Fritsch (sf@), OpenBSD/arm64 now works as a guest operating system under the Apple Hypervisor.

The commits read

List:       openbsd-cvs
Subject:    CVS: cvs.openbsd.org: src
From:       Helg Bredow <helg () cvs ! openbsd ! org>
Date:       2026-01-12 18:15:33


CVSROOT:	/cvs
Module name:	src
Changes by:	helg@cvs.openbsd.org	2026/01/12 11:15:33

Modified files:
	sys/dev/pv     : viogpu.c 

Log message:
viogpu_wsmmap() returns a kva but instead should return a physical
address via bus_dmamem_mmap(9). Without this, QEMU would only show a
black screen when starting X11. On the Apple Hypervisor, the kernel
would panic.

Read more…

MAXCPUS on OpenBSD/amd64-current is now 255

Contributed by Peter N. M. Hansteen on from the strengthen your core muscles dept.

With these two commits, Mike Larkin (mlarkin@) set the stage for, and next up, bumped the maximum number of processors supported on OpenBSD/amd64 from 64 to 255.

The first commit message reads,

List:       openbsd-cvs
Subject:    CVS: cvs.openbsd.org: src
From:       Mike Larkin <mlarkin () cvs ! openbsd ! org>
Date:       2026-01-14 21:25:26

CVSROOT:	/cvs
Module name:	src
Changes by:	mlarkin@cvs.openbsd.org	2026/01/14 14:25:26

Modified files:
	sys/arch/amd64/amd64: pmap.c 

Log message:
Support more than 64 bits for amd64 TLB shootdown IPI masks

Read more…

Donate!

Donate to OpenBSD

Features

We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.

OpenBSD Errata

Unofficial RSS feed of OpenBSD errata

OpenBSD 7.8

0142026-02-09 SECURITY In libexpat fix denial of service due to NULL dereference and integer overflow. CVE-2026-24515 CVE-2026-25210
0132026-02-02 SECURITY Fix a use-after-free in httpd(8) when using chunked encoding.
0122026-01-14 RELIABILITY A malicious RPKI Certification Authority can cause a NULL dereference. A malicious RPKI Trust Anchor can cause memory exhaustion.
0112025-12-03 RELIABILITY Due to a race, the kernel could crash when adding IPv6 neighbor discovery entries.
0102025-12-03 SECURITY Fix incomplete mitigation of DNS cache poisoning vulnerabilities in unbound. CVE-2025-11411
0092025-12-03 SECURITY Fix incorrect handling of invalid inputs to xkbcomp(1). CVE-2018-15853 CVE-2018-15859 CVE-2018-15861 CVE-2018-15863

OpenBSD 7.7

0202026-02-09 SECURITY In libexpat fix denial of service due to NULL dereference and integer overflow. CVE-2026-24515 CVE-2026-25210
0192026-02-02 SECURITY Fix a use-after-free in httpd(8) when using chunked encoding.
0182026-01-14 RELIABILITY A malicious RPKI Trust Anchor can cause memory exhaustion.
0172025-12-03 SECURITY Fix incomplete mitigation of DNS cache poisoning vulnerabilities in unbound. CVE-2025-11411
0162025-12-03 SECURITY Fix incorrect handling of invalid inputs to xkbcomp(1). CVE-2018-15853 CVE-2018-15859 CVE-2018-15861 CVE-2018-15863
0152025-12-03 RELIABILITY Fix drm(4) to avoid spurious sleep errors leading to crashes.

XML/RSS/RDF

Users wishing RSS/RDF summary files of OpenBSD Journal can retrieve: RSS feed

Options are available.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]