File path: /jruby-1.4.0/src/org/jruby/util/WeakIdentityHashMap.java | File path: /jruby-1.4.0/src/org/jruby/ast/DAsgnNode.java | |||
Method name: void Entry(int, Object, Object, Entry, ReferenceQueue)
|
Method name: void DAsgnNode(ISourcePosition, String, int, Node)
|
|||
Number of AST nodes: 4 | Number of AST nodes: 3 | |||
1 | super(masked_key, q);↵ | 1 | super(position, valueNode);↵ | |
2 | this.key_hash = key_hash;↵ | 2 | this.name = name;↵ | |
3 | this.value = value;↵ | 3 | this.↵ | |
4 | this.next = next; | 4 | location = location; | |
See real code fragment | See real code fragment |
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.0 |
Clones location | Clones are in different classes |
Number of node comparisons | 8 |
Number of mapped statements | 1 |
Number of unmapped statements in the first code fragment | 3 |
Number of unmapped statements in the second code fragment | 2 |
Time elapsed for statement mapping (ms) | 0.0 |
Clone type | Type 3 |
ID | Statement | ID | Statement | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | super(position, valueNode); | |||||||||||||||||
1 | super(masked_key, q); | | |||||||||||||||||
| 2 | this.name = name; | |||||||||||||||||
2 | this.key_hash = key_hash; |
| 3 | this.location = location; | |||||||||||||||
3 | this.value = value; | | |||||||||||||||||
4 | this.next = next; | |
Row | Violation |
---|---|
1 | Expression this.key_hash is a field being modified, and thus it cannot be parameterized |
2 | Expression this.location is a field being modified, and thus it cannot be parameterized |