• zea@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    94
    ·
    8 months ago

    It makes more sense if you think of const as “read-only”. Volatile just means the compiler can’t make the assumption that the compiler is the only thing that can modify the variable. A const volatile variable can return different results when read different times.

    • fl42v@lemmy.mlOP
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      8 months ago

      I thought of it more in terms of changing constants (by casting the const away). AFAIK when it’s not volatile, the compiler can place it into read-only data segment or make it a part of some other data, etc. So, technically, changing a const volatile would be less of a UB compared to changing a regular const (?)

      • Scoopta@programming.dev
        link
        fedilink
        arrow-up
        66
        ·
        8 months ago

        const volatile is used a lot when doing HW programming. Const will prevent your code from editing it and volatile prevents the compiler from making assumptions. For example reading from a read only MMIO region. Hardware might change the value hence volatile but you can’t because it’s read only so marking it as const allows the compiler to catch it instead of allowing you to try and fail.

          • Suzune@ani.social
            link
            fedilink
            arrow-up
            22
            ·
            edit-2
            8 months ago

            When you program embedded you’ll also dereference NULL pointers at some point.

            More...

            Some platforms can have something interesting at memory address 0x0 (it’s often NULL in C).

            • Scoopta@programming.dev
              link
              fedilink
              arrow-up
              14
              ·
              8 months ago

              In amd64/x86 kernel space you can dereference null as well. My hobby kernel keeps critical kernel structures there XD.

            • humbletightband@lemmy.dbzer0.com
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              8 months ago

              I was thinking about telling them how in embedded systems it’s a good practice to allocate the memory by hand, having in mind the backlog, but yours will come first

      • mox@lemmy.sdf.org
        link
        fedilink
        arrow-up
        19
        ·
        edit-2
        8 months ago

        AFAIK when it’s not volatile, the compiler can place it into read-only data segment

        True, but preventing that is merely a side effect of the volatile qualifier when applied to any random variable. The reason for volatile’s existence is that some memory is changed by the underlying hardware, or by an external process, or by the act of accessing it.

        The qualifier was a necessary addition to C in order to support such cases, which you might not encounter if you mainly deal with application code, but you’ll see quite a bit in domains like hardware drivers and embedded systems.

        A const volatile variable is simply one of these that doesn’t accept explicit writes. A sensor output, for example.

      • TheEntity@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        8 months ago

        The very notion of “less of a UB” is against the concept of UB. If you have an UB in your program, all guarantees are out of the window.

        • fl42v@lemmy.mlOP
          link
          fedilink
          arrow-up
          2
          ·
          8 months ago

          I mean, changing a const is itself a questionable move (the question being whether the one doing it is insane)

    • QuaternionsRock@lemmy.world
      link
      fedilink
      arrow-up
      8
      arrow-down
      2
      ·
      8 months ago

      I’ve never really thought about this before, but const volatile value types don’t really make sense, do they? const volatile pointers make sense, since const pointers can point to non-const values, but const values are typically placed in read-only memory, in which case the volatile is kind of meaningless, no?

      • rooster_butt@lemm.ee
        link
        fedilink
        arrow-up
        23
        ·
        edit-2
        8 months ago

        They do in embedded when you are polling a read only register. The cpu can change the register but writing to it does nothing.

        • QuaternionsRock@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          That seems like a better fit for an intrinsic, doesn’t it? If it truly is a register, then referencing it through a (presumably global) variable doesn’t semantically align with its location, and if it’s a special memory location, then it should obviously be referenced through a pointer.

      • zea@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        4
        ·
        8 months ago

        Maybe there’s a signal handler or some other outside force that knows where that variable lives on the stack (maybe through DWARF) and can pause your program to modify it asynchronously. Very niche. More practical is purely to inhibit certain compiler optimizations.

  • wise_pancake@lemmy.ca
    link
    fedilink
    arrow-up
    83
    arrow-down
    2
    ·
    8 months ago

    Some people hate that C is dangerous, but personally I like its can-do attitude.

    “Hey C, can I write over the main function at runtime?”

    Sure, if you want to, just disable memory protection and memcpy whatever you want there! I trust you.

    It’s a great attitude for a computer to have.

    • mindbleach@sh.itjust.works
      link
      fedilink
      arrow-up
      68
      ·
      8 months ago

      C is dangerous like your uncle who drinks and smokes. Y’wanna make a weedwhacker-powered skateboard? Bitchin’! Nail that fucker on there good, she’ll be right. Get a bunch of C folks together and they’ll avoid all the stupid easy ways to kill somebody, in service to building something properly dangerous. They’ll raise the stakes from “accident” to “disaster.” Whether or not it works, it’s gonna blow people away.

      C++ is dangerous like a quiet librarian who knows exactly which forbidden tomes you’re looking for. He and his… associates… will gladly share all the dark magic you know how to ask about. They’ll assure you, oh no no no, the power cosmic would never pull someone inside-out, without sufficient warning. They don’t question why a loving god would allow the powers you crave. They will show you which runes to carve, and then, they will hand you the knife.

      • AVincentInSpace@pawb.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        8 months ago

        Rust is like a paranoid overprotective guardian. A “mom friend”, of sorts. Always the designated driver of the group, keeps you from staying up too late, stops you from eating things that might be choking hazards without proper precaution, and so on and so forth. You’ll never meet a person more concerned with your health and safety – until, that is, you say the magic word “unsafe”. Suddenly the alter ego that their hypnotist implanted gets activated, and their entire demeanor changes on a dime. BMX biking? Bungee jumping? Inline assembly? Sounds like a great idea! Let’s go, man! Rules are for NERDS! Then the minute the unsafe block ends, they’re back to normal, fully cognizant of the adventure they just went on and thinking absolutely nothing of it. “Whitewater rafting with you guys was really fun, especially the part where Jason jumped into the water and I went after him! I’d best go get the first aid kit, though – that scrape he got when he did that looks like it might get infected. I know he said it didn’t hurt, but better safe than sorry!”

        They kinda scare you when they’re like that, if you’re honest.

        • mindbleach@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          ·
          8 months ago

          I tried thinking of one for Rust, and ‘the mom friend with a safeword’ is alarmingly accurate.

          The secret basement is never locked. It’s fine to go down there, alone. You’ll only be scarred on the inside.

          It’s when you go down together that all bets are off.

    • SubArcticTundra@lemmy.ml
      link
      fedilink
      arrow-up
      27
      ·
      8 months ago

      Agreed. It’s a very adult approach. C hands you a running chainsaw and whatever happens after that is your responsibility. It is also your responsibility to decide when it’s not the right time to use C.

    • mox@lemmy.sdf.org
      link
      fedilink
      arrow-up
      21
      ·
      8 months ago

      This is sometimes practical, too. For example, hooking and extending functions in compiled code that will never be updated by the original author, while preserving the original executable/library files.

      • huginn@feddit.it
        link
        fedilink
        arrow-up
        8
        ·
        8 months ago

        You can do that in memory safe languages too. Kotlin extension functions, for example.

        • RonSijm@programming.dev
          link
          fedilink
          arrow-up
          16
          ·
          edit-2
          8 months ago

          Extension functions are not the same at all. Extension functions are syntactic sugar. For example if you have an extension function like

          public static class ObjectExtension
          {
              public static void DoSomething(this object input) { }
          }
          

          You can call that function on an object by doing object.DoSomething() - Yes. But underneath it’s the same as doing ObjectExtension.DoSomething(object)

          That function does not actually become part of the object, and you can’t use it to override existing functions

          A closer example of how to do something similar in a memory safe language would be - in C# - using something like Castle DynamicProxy - where through a lot of black magic - you can create a DynamicProxy and fool the CLR into thinking it’s talking to an object, while it’s actually talking to a DynamicProxy instead. And so then you can actually intercept invocations to existing methods and overrule them

          Generally overruling existing functions at runtime is not that easy

          • huginn@feddit.it
            link
            fedilink
            arrow-up
            5
            ·
            8 months ago

            Ah my bad, misunderstood the use case.

            I thought you were talking about keeping an unmaintained library intact but building onto it.

            I thought C was a really dangerous way to use that syntactic sugar pattern. Actual manipulation of the bytecode to maintain and extend a compiled binary is wild

            • mox@lemmy.sdf.org
              link
              fedilink
              arrow-up
              9
              ·
              8 months ago

              Actual manipulation of the bytecode to maintain and extend a compiled binary is wild

              Just wait until you learn about machine code. :)

              • huginn@feddit.it
                link
                fedilink
                arrow-up
                1
                ·
                8 months ago

                I do have a degree in this. I am aware.

                This is sometimes practical, too. For example, hooking and extending functions in compiled code that will never be updated by the original author, while preserving the original executable/library files.

                Your original comment made it seem more like extensions - extend and preserve. That’s the misunderstanding.

                When I said it’s wild to manipulate bytecode I means “wow that’s a terrifying practice, I would hate to check that PR”

                • mox@lemmy.sdf.org
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  edit-2
                  8 months ago

                  Fair enough. What threw me is that you said “bytecode”, which is generally not used when referring to hardware machine instructions. My original comment is about patching the in-memory image of a running program or library, replacing machine instructions in order to intercept certain calls and extend their behavior.

                  I thought my phrase “compiled code” would convey this, but I guess nowadays bytecode-compiled languages are so common that some people assume that instead.

          • wise_pancake@lemmy.ca
            link
            fedilink
            arrow-up
            2
            ·
            8 months ago

            That actually sounds pretty cool

            Sometimes what I’d like to be able to do is treat part of an app as a core and the rest like user provided scripts, but written and evaluated in the host language and not running an embedded scripting language like lua with all the extra burden.

            E.g. you have an image editor and you want the user to be able to write native functions to process the image. Or you have a game engine and you want to inject new game code from the user without the engine being a compiler or the game logic being bundled scripts.

            • RonSijm@programming.dev
              link
              fedilink
              arrow-up
              4
              ·
              8 months ago

              You’d probably use a different approach for that. Like you’d make your program dynamically load all the .dlls in a “plugins” folder -

              Then you’d provide some plugin interface for the users to create plugins, for example:

              public interface IImageEditorPlugin
              {
                  public void BeforeImageEdit(int[,] imageData);
                  public void AfterImageEdit(int[,] imageData);
              }
              

              And then you can load plugin classes from all the dlls with dependency injection, and execute them though something like this:

              public class ImageEditor(IEnumerable plugins)
              {
                  public void EditImage(int[,] imageData)
                  {
                      foreach (var imageEditorPlugin in plugins)
                      {
                          imageEditorPlugin.BeforeImageEdit(imageData);
                          // Do internal image edit function
                          imageEditorPlugin.AfterImageEdit(imageData);
                      }
                  }
              }
              

              This is a very simple example obviously, normally you’d send more meta-data to the plugins, or have multiple different interfaces depending on the kinda plugin it is, or have some methods to ask plugins when they’re suitable to be used. But this way a user can provide compiled versions of their plugins (in the same language as the core application) - instead of having to provide something like lua scripts

    • derpgon@programming.dev
      link
      fedilink
      arrow-up
      11
      ·
      8 months ago

      I loved C/C++ in university, finally the damn piece of rock we forced into thinking was doing exactly what I told him to do, no more and no less.

  • nothacking@discuss.tchncs.de
    link
    fedilink
    arrow-up
    48
    ·
    8 months ago

    This is actually how you should declare something that you will never change, but something might change externally, like an input pin or status register.

    Writing to it might do something completely different or just crash, but you also don’t want the compiler getting creative with reads; You don’t want the compiler optimizing out a check for a button press because the “constant” value is never changed.

    • sunbeam60@lemmy.one
      link
      fedilink
      arrow-up
      4
      ·
      8 months ago

      Yeah I stumbled on this too. Surely the joke should be const mutable, not const volatile.

  • Kevin@lemmy.world
    link
    fedilink
    English
    arrow-up
    24
    ·
    8 months ago

    If you have a memory-mapped peripheral where there’s a readonly register, I could see it being const volatile.

  • Hobbes_Dent@lemmy.world
    link
    fedilink
    arrow-up
    17
    ·
    edit-2
    8 months ago

    Just spin the pipe wrench open and slide it up then you can switch it back real quick.

    Thank you for watching this OHSA message on bad lockout procedure, now back to your regularly scheduled programming.

      • hstde@feddit.de
        link
        fedilink
        arrow-up
        26
        arrow-down
        1
        ·
        8 months ago

        It could be about sending a message.

        A missing knob is easy to fix. Bolting a wrench to the housing holding the knob in place is very explicit. It screams “don’t touch”

        • setVeryLoud(true);@lemmy.ca
          link
          fedilink
          arrow-up
          15
          ·
          edit-2
          8 months ago

          Idk to me it screams “solve this puzzle and win a free wrench” /s

          I like the creativity of it, and it does solve the problem in a way that’s user-safe. I thought of removing the knob because that’s what I do with my barbecue as I store items on the grill when not in use. Remove knobs, put on grill, close barbecue, cover.

          • Omega_Haxors@lemmy.ml
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            8 months ago

            Idk to me it screams “solve this puzzle and win a free wrench” /s

            What too many video games does to a mfer 😄

      • octobob@lemmy.ml
        link
        fedilink
        arrow-up
        16
        ·
        8 months ago

        I work on industrial controls. Very likely that the switch is momentary, meaning it’ll go back when released.

        Sometimes there’s a little piece of plastic in them to remove the momentary setting, but this works too lol. Fuck it, it’s maintenance.

        • setVeryLoud(true);@lemmy.ca
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          8 months ago

          That actually makes sense, thank you for the tidbit!

          Still kind of an overkill solution, but at least it’s funny

    • Fubarberry@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      I’m sure they just needed a way to lock the selector knob to the primary position, and didn’t want to rewire it.

      • octobob@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        8 months ago

        Drills and taps two holes, adds a metal strap, and sacrifices a tool to save a 5 minute fix of jumping over the contact with a 2" piece of wire lmfao

        • Fubarberry@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          8 months ago

          A lot of people won’t touch electrical, and the problem with modifying the wiring is you need to be able to clearly document or show what was changed in case it needs to be reversed later.

          This is ugly, but it’s immediately obvious how to reverse it to anyone who looks at it. And that pipe wrench probably wasn’t being used anymore anyways. I doubt they tapped the holes, those are probably just self-tap screws that both drilled the hole and cut the thread as they screwed in. No one will call this an elegant solution, but if it works it works.

          • octobob@lemmy.ml
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            8 months ago

            “documenting the change” is a pipe dream.

            If you’ve ever worked in maintenance, active production, etc, you’ll be lucky to even have schematics. And trust me, there are a lot of hacks of people fucking with controls for 30+ years straight that soooo much of it is full of “fixes” like this, whether it’s something pushing a button in, or pieces of metal instead of fuses, or wires jumping over what’s “in the way” like whole safety systems and e-stops, contactors forced to run, etc etc etc.

    • blackstrat@lemmy.fwgx.uk
      link
      fedilink
      arrow-up
      4
      ·
      8 months ago

      Volatile means that the value should be read each time its accessed. It can’t be cached in a register or the read be otherwise assumed and optimized away or the instructions around its access be reordered.

  • PriorityMotif@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    8 months ago

    Looks like they didn’t want anybody using the secondary tank. Probably haven’t had time to pull Dave’s body out yet.

  • FruitfullyYours@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    8 months ago

    I’ve used it in the past when having flash memory blocks that could change but you need the compiler to put them into flash memory and not RAM. It’s mainly to get the compiler to stop assuming that it can optimize using the default value.

  • 🐍🩶🐢@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    laughs in evil PLC programmer A little forces enabled, a change here, and maybe just move this wire over there while I am at it…

  • JATtho@sopuli.xyz
    link
    fedilink
    arrow-up
    2
    ·
    8 months ago
    volatile int blackhole;
    blackhole = 1;
    const int X = blackhole;
    const int Y = blackhole;
    

    Compiler is forbidden to assume that X == 1 would be true. It’s also forbidden to assume that X == Y. const just means the address and/or the data at the address is read only. const volatile int* const hwreg; -> “read only volatile value at read only address hwreg”. Compiler can assume the hwreg address won’t magically change, but can’t assume the value read from that address won’t.