From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.3 required=5.0 tests=BAYES_00, REPLYTO_WITHOUT_TO_CC autolearn=no autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "G.B." Newsgroups: comp.lang.ada Subject: Re: Ada 2012 Constraints (WRT an Ada IR) Date: Mon, 12 Dec 2016 16:51:04 +0100 Organization: A noiseless patient Spider Message-ID: References: <47366b42-c0a3-41bf-a44a-5241c109d60f@googlegroups.com> <87eg1e2f2c.fsf@nightsong.com> Reply-To: nonlegitur@notmyhomepage.de Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Mon, 12 Dec 2016 15:49:41 -0000 (UTC) Injection-Info: mx02.eternal-september.org; posting-host="2bd15e9ad73c93509b7db25068f7dfe4"; logging-data="2961"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19/itQYjl6lEcO3VF0v5JbkI/4G3s9MELg=" User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 In-Reply-To: Cancel-Lock: sha1:8c9j8dcST4MJ0qwPtfd4rRgKuhA= Xref: news.eternal-september.org comp.lang.ada:32753 Date: 2016-12-12T16:51:04+01:00 List-Id: On 12/12/2016 16:23, G.B. wrote: > On 12/12/2016 09:33, Dmitry A. Kazakov wrote: >> On 12/12/2016 00:58, Paul Rubin wrote: > >>> Ada certainly allows Pre=> to be checked at runtime. >> >> Because they are not preconditions, > > Right, the aspect is called Pre, not Precondition. Good Thing. > The language makers aren't usually shy about using full > names, so... The Rationale outlines their intent. A bit more: function F (...) return T is Result : T; begin if DEFENSIVE_CHECK (...) then ... else -- hidden assumption is true Result := perform_algorithm(...) end if; return Result; end F; The above is plain old defensive programming. I understand you want to prevent more aggressive, DbC like programming without DEFENSIVE_CHECK and would favor program analysis instructing the optimizer to optimize DEFENSIVE_CHECK away if possible. Is that right? I.e., only the compiler is allowed to prove that DEFENSIVE_CHECK should not be in there?