I am curious to know what happens when the stack and the heap collide. If anybody has encountered this, please could they explain the scenario.
In a modern languages running on a modern OS, you'll get either a stack overflow (hurray!) or malloc()
or sbrk()
or mmap()
will fail when you try to grow the heap. But not all software is modern, so let's look at the failure modes:
If the stack grows into the heap, the typically C compiler will silently start to overwrite the heap's data structures. On a modern OS, there will be one or more virtual memory guard pages which prevent the stack from growing indefinitely. As long as the amount of memory in the guard pages is at least as large as the size of the growing procedure's activation record, the OS will guarantee you a segfault. If you're DOS running on a machine with no MMU, you're probably hosed.
If the heap grows into the stack, the operating system should always be aware of the situation and some sort of system call will fail. The implementation of
malloc()
almost certainly notices the failure and returnsNULL
. What happens after that is up to you.
I'm always amazed at the willingness of compiler writers to hope that the OS puts guard pages in place to prevent stack overflow. Of course, this trick works well until you start having thousands of threads, each with its own stack...
-fstack-check
flag with multi-threaded programs (and this flag also allows the collision to be detected in my example). –
Illogicality -fsanitise=thread -g
(the -g
is to add line numbers). Program runs 2x to 20x slower, but it detects a boatload of threading-safety issues. Also detected with -fsanitise=address
. On any issue, it prints the exact line number where it occurred. Running sample program from said link from @Illogicality under Ubuntu 18.04 + gcc 9.3.0 reveals no issue: program correct terminates immediately with a segmentation fault
even if compiled witih -O3
. Adding the -fsanitise=X
options (above) reveals the exact line of code. –
Doublet GETADDR(c)
before its printf
, even with GCC 4.6.4 (released in 2013-04). So it seems that something has changed in the system to enable fast protection against stack-heap collision, independently from GCC (binutils? Linux kernel?). I would be interested to know. Things may also have changed in GCC, but later (2017+), so that GCC 4.6.4 is not concerned: gcc.gnu.org/legacy-ml/gcc-patches/2017-06/msg01343.html –
Illogicality This would be platform dependent. On many platforms it actually can't happen at all (the heap and stack are allocated in different pages and ne'r the twain shall meet.
Keep in mind that the idea of the heap growing upward and the stack growing downward is only conceptual. On very small systems (like the old 8-bit micros that ran CP/M) and on some PICs and other flat memory model systems (those without an MMU nor any other virtual or protected memory support) then the heap and stack might be actually implemented this way. In that case the behavior would be undefined ... but it would almost certainly crash as soon as the code tried to return to some address on the top of the corrupted stack or follow an indirect pointer from one part of the heap to another or ...
In any event you won't see it on any modern, general purpose workstation or server. You'll hit a resource limit and get malloc failures, or you'll run into virtual memory and eventually the system will thrash itself into quivering pile of "hit the red switch."
In times like those it's time to turn to the sage words of Dr Egon Spengler....
- Dr. Egon Spengler: There's something very important I forgot to tell you.
- Dr. Peter Venkman: What?
- Dr. Egon Spengler: Don't let the heap collide with the stack.
- Dr. Peter Venkman: Why?
- Dr. Egon Spengler: It would be bad.
- Dr. Peter Venkman: I'm a little fuzzy on the whole "good/bad" thing here. What do you mean, "bad"?
- Dr. Egon Spengler: Try to imagine all life as you know it stopping instantaneously and every molecule in your body exploding at the speed of light.
- Dr. Ray Stantz: Total protonic reversal!
- Dr. Peter Venkman: That's bad. Okay. All right, important safety tip. Thanks, Egon.
universed -debug
frees all it's memory! –
Fascicule You get an out of memory exception or stack exception if you are lucky. If you are unlucky the program heads off into a invalid memory and either throws a bad memory exception. If you are extremely unlucky the program carries on and trashes something it shouldn't and you never know why your program failed.
Finally of course the universe may crack.
You will get segmentation fault or memory allocation error if stack/heap overflow occurs. Here is an example :
void recursiveFun ()
{
static int i;
// char *str= (char *)malloc (100);
printf ("%d\t", i++);
recursiveFun ();
// free (str);
}
Suppose, you call above function, it will run out of stack and program will crash. Now, remove the commented lines and call the function again, you will find segmentation fault occurs in less time than and less recursion than earlier version. [ In my test environment, Stack Overflow happened after 5237765 recursion in first case, whereas in second scenario it occured after 2616325 recursion.]
It will give stack overflow error. Or it will fail the new heap memory allocation functions like malloc().
© 2022 - 2024 — McMap. All rights reserved.