• zea@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    0
    ·
    6 months ago

    It makes more sense if you think of const as “read-only”. Volatile just means the compiler can’t make the assumption that the compiler is the only thing that can modify the variable. A const volatile variable can return different results when read different times.

    • fl42v@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      6 months ago

      I thought of it more in terms of changing constants (by casting the const away). AFAIK when it’s not volatile, the compiler can place it into read-only data segment or make it a part of some other data, etc. So, technically, changing a const volatile would be less of a UB compared to changing a regular const (?)

      • TheEntity@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        6 months ago

        The very notion of “less of a UB” is against the concept of UB. If you have an UB in your program, all guarantees are out of the window.

        • fl42v@lemmy.mlOP
          link
          fedilink
          arrow-up
          0
          ·
          6 months ago

          I mean, changing a const is itself a questionable move (the question being whether the one doing it is insane)

      • Scoopta@programming.dev
        link
        fedilink
        arrow-up
        0
        ·
        6 months ago

        const volatile is used a lot when doing HW programming. Const will prevent your code from editing it and volatile prevents the compiler from making assumptions. For example reading from a read only MMIO region. Hardware might change the value hence volatile but you can’t because it’s read only so marking it as const allows the compiler to catch it instead of allowing you to try and fail.

          • Suzune@ani.social
            link
            fedilink
            arrow-up
            0
            ·
            edit-2
            6 months ago

            When you program embedded you’ll also dereference NULL pointers at some point.

            More...

            Some platforms can have something interesting at memory address 0x0 (it’s often NULL in C).

            • humbletightband@lemmy.dbzer0.com
              link
              fedilink
              arrow-up
              0
              ·
              edit-2
              6 months ago

              I was thinking about telling them how in embedded systems it’s a good practice to allocate the memory by hand, having in mind the backlog, but yours will come first

            • Scoopta@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              6 months ago

              In amd64/x86 kernel space you can dereference null as well. My hobby kernel keeps critical kernel structures there XD.

      • mox@lemmy.sdf.org
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        6 months ago

        AFAIK when it’s not volatile, the compiler can place it into read-only data segment

        That’s true, but preventing that is merely a side effect of the volatile qualifier. The reason for its existence is that some memory is changed by the underlying hardware, or by an external process, or by the act of accessing it.

        The qualifier was a necessary addition to C in order to support such cases, which you might not encounter if you mainly deal with application code, but you’ll see quite a bit in domains like hardware drivers and embedded systems.

        A const volatile variable is simply one that doesn’t accept explicit writes. A sensor value, for example.

    • QuaternionsRock@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      6 months ago

      I’ve never really thought about this before, but const volatile value types don’t really make sense, do they? const volatile pointers make sense, since const pointers can point to non-const values, but const values are typically placed in read-only memory, in which case the volatile is kind of meaningless, no?

      • rooster_butt@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        6 months ago

        They do in embedded when you are polling a read only register. The cpu can change the register but writing to it does nothing.

      • zea@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        0
        ·
        6 months ago

        Maybe there’s a signal handler or some other outside force that knows where that variable lives on the stack (maybe through DWARF) and can pause your program to modify it asynchronously. Very niche. More practical is purely to inhibit certain compiler optimizations.