The hash implementation casts the input pointer to uint64_t* and directly reads from this, which may cause unaligned accesses. Use memcpy() instead so this code will not crash with SIGBUS on sparc. --- a/Python/pyhash.c 2017-11-29 10:21:20.283094068 +0100 +++ b/Python/pyhash.c 2017-11-29 10:24:26.733087813 +0100 @@ -369,7 +369,7 @@ uint64_t k0 = _le64toh(_Py_HashSecret.siphash.k0); uint64_t k1 = _le64toh(_Py_HashSecret.siphash.k1); uint64_t b = (uint64_t)src_sz << 56; - const uint64_t *in = (uint64_t*)src; + const uint8_t *in = (uint8_t*)src; uint64_t v0 = k0 ^ 0x736f6d6570736575ULL; uint64_t v1 = k1 ^ 0x646f72616e646f6dULL; @@ -378,11 +378,13 @@ uint64_t t; uint8_t *pt; - uint8_t *m; + const uint8_t *m; while (src_sz >= 8) { - uint64_t mi = _le64toh(*in); - in += 1; - src_sz -= 8; + uint64_t mi; + memcpy(&mi, in, sizeof(mi)); + mi = _le64toh(mi); + in += sizeof(mi); + src_sz -= sizeof(mi); v3 ^= mi; DOUBLE_ROUND(v0,v1,v2,v3); @@ -391,7 +393,7 @@ t = 0; pt = (uint8_t *)&t; - m = (uint8_t *)in; + m = in; switch (src_sz) { case 7: pt[6] = m[6]; /* fall through */ case 6: pt[5] = m[5]; /* fall through */