...
Expressions should never write to memory that they subsequently read, and they should never write to any memory twice. Memory writing and reading can occur directly in the expression from assignments or indirectly through side effects in functions called in the expression.
Noncompliant Code Example (Order of Evaluation)
This noncompliant code example shows how side effects in expressions can lead to unanticipated outcomes. The programmer intends to write access control logic based on different threshold levels. Each user has a rating that must be above the threshold to be granted access. As shown, a simple function can calculate the rating. The get()
method is expected to return a non-zero factor for users who are authorized, and a zero value for those who are unauthorized.
...
Code Block | ||
---|---|---|
| ||
class BadPrecedence { public static void main(String[] args) { int number = 17; int[] threshold = new int[20]; threshold[0] = 10; number = (number > threshold[0]? 0 : -2) + ((31 * ++number) * (number = get())); // ... if(number == 0) { System.out.println("Access granted"); } else { System.out.println("Denied access"); // number = -2 } } public static int get() { int number = 0; // Assign number to non zero value if authorized else 0 return number; } } |
Noncompliant Code Example (Order of Evaluation)
This noncompliant code example reorders the previous expression so that the left-to-right evaluation order of the operands corresponds with the programmer's intent.
...
Code Block | ||
---|---|---|
| ||
int number = 17; number = ((31 * ++number) * (number=get())) + (number > threshold[0]? 0 : -2); |
Compliant Solution (Order of Evaluation)
This compliant solution uses equivalent code with no side effects. It performs only one write, to number
. The resulting expression can be reordered without concern for the evaluation order of the component expressions, making the code easier to understand and maintain.
Code Block | ||
---|---|---|
| ||
int number = 17; final int authnum = get(); number = ((31 * (number + 1)) * authnum) + (authnum > threshold[0]? 0 : -2); |
Exceptions
EXP08-EX1: The postfix increment and postfix decrement operators (++
and --
) assign a new value to a variable and then subsequently read it. These are well-understood and are an exception to the rule against reading memory that was written in the same expression.
...
Although the overall conditional expression violates this rule, this code is compliant because the sub-expressions on either side of the &&
operator do not violate it. Each has exactly one assignment and one side effect (the reading of a character from in
).
Risk Assessment
Failure to understand the evaluation order of expressions containing side effects can result in unexpected output.
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP08-J | low | unlikely | medium | P2 | L3 |
Automated Detection
Detection of all expressions involving both side effects and also multiple operator precedence levels is straightforward. Determining the correctness of such uses is infeasible in the general case; heuristic warnings could be useful.
Related Guidelines
C Coding Standard | "EXP30-C. Do not depend on order of evaluation between sequence points" |
C++ Coding Standard | "EXP30-CPP. Do not depend on order of evaluation between sequence points" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ea1a5f7b9e686874-b2473624-47804f4e-a07f859d-fa0a1faee7d8f310fab9edbc"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | [§15.7, "Evaluation Order" | http://java.sun.com/docs/books/jls/third_edition/html/expressions.html#15.7] | ]]></ac:plain-text-body></ac:structured-macro> |
|
...