I've noticed something really strange. say I've got the following structure defined
typedef struct
{
uint32_t a;
uint16_t b;
uint32_t c;
} foo;
This structure is contained in a big buffer I receive from network.
The following code works in x86, but I receive SIGBUS
on ARM.
extern void * buffer;
foo my_foo;
my_foo = (( foo * ) buffer)[0];
replacing the pointer dereferencing with memcpy solved the issue.
Searching about SIGBUS in ARM pointed me to the fact that this is related to memory alignment somwhow.
Can someone explain what's going on ?
ARM-based systems expect structures to be aligned on a word boundary. If it is not the case you can have different behaviours (in the linux kernel for instance, these behaviours are described in
/proc/cpu/alignement
and one of them is to send a SIGBUS).What you did with
memcpy()
is that you have forced the data structure alignment.You said it yourself: there are memory alignment restrictions on your particular processor, and
buffer
is not aligned right to permit reading larger than a byte from it. The assignment is probably compiled into three moves of larger entities.With
memcpy()
, there are no alignment restrictions, it has to be able to copy between any two addresses, so it does whatever is needed to implement that. Probably copying byte-by-byte until the addresses are aligned, that's a common pattern.As an aside, I find it clearer to write your code without array indexing:
i was developing some download application on freescale imx a while back....had a memory alignment problem there(requirement was that executable be in multiple of 512 bytes)...Fundamental difference between arm and x86...But the thing to remember with memcpy is that it does a byte by byte copy ...So, it might work but please be sure to check for run-time problems...Donot be fooled by memcpy...Always a good idea to have a memory aligned structure for your specific platform.
C Standard [ISO/IEC 9899:2011] - 6.3.2.3, paragraph 7:
Source: CERT Secure Coding Standards