lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <63b2087350d6990f0e348a8028f006924363c5d0.camel@physik.fu-berlin.de>
Date: Fri, 02 Jan 2026 18:57:28 +0100
From: John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
To: Magnus Lindholm <linmag7@...il.com>
Cc: linux-kernel@...r.kernel.org, linux-alpha@...r.kernel.org, 
	hch@...radead.org, macro@...am.me.uk, mattst88@...il.com, 
	richard.henderson@...aro.org, ink@...een.parts, Michael Cree
 <mcree@...on.net.nz>
Subject: Re: [PATCH 0/1] alpha: fix user-space corruption during memory
 compaction

Hi Magnus,

On Fri, 2026-01-02 at 18:30 +0100, Magnus Lindholm wrote:
> This patch fixes long-standing user-space crashes on Alpha systems
> when memory compaction is enabled.
> 
> Observed symptoms include:
>   - sporadic SIGSEGV in unrelated user programs
>   - glibc allocator failures (e.g. "unaligned tcache chunk detected")
>   - gcc "internal compiler error"
>   - heap corruption detected by malloc consistency checks
> 
> The failures occur only when page migration / compaction is active
> and disappear when compaction is disabled. They affect both UP and
> SMP kernels and are not specific to a particular Alpha CPU model.

Wow, thanks for fixing this! This has been indeed a longstanding issue and
seeing it fixed would be great.

I'm CC'ing Michael Cree who has been observing the issue as well and could
help testing your series.

I'll try to test your series as well.

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ