Server IP : 15.235.198.142 / Your IP : 216.73.216.234 Web Server : Apache/2.4.58 (Ubuntu) System : Linux ballsack 6.8.0-45-generic #45-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 30 12:02:04 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 8.3.6 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /usr/src/linux-headers-6.8.0-45/scripts/coccinelle/tests/ |
Upload File : |
// SPDX-License-Identifier: GPL-2.0-only /// Find &&/|| operations that include the same argument more than once //# A common source of false positives is when the expression, or //# another expresssion in the same && or || operation, performs a //# side effect. /// // Confidence: Moderate // Copyright: (C) 2010 Nicolas Palix, DIKU. // Copyright: (C) 2010 Julia Lawall, DIKU. // Copyright: (C) 2010 Gilles Muller, INRIA/LiP6. // URL: https://coccinelle.gitlabpages.inria.fr/website // Comments: // Options: --no-includes --include-headers virtual context virtual org virtual report @r expression@ expression E; position p; @@ ( E@p || ... || E | E@p && ... && E ) @bad@ expression r.E,e1,e2,fn; position r.p; assignment operator op; @@ ( E@p & <+... \(fn(...)\|e1 op e2\|e1++\|e1--\|++e1\|--e1\) ...+> ) @depends on context && !bad@ expression r.E; position r.p; @@ *E@p @script:python depends on org && !bad@ p << r.p; @@ cocci.print_main("duplicated argument to && or ||",p) @script:python depends on report && !bad@ p << r.p; @@ coccilib.report.print_report(p[0],"duplicated argument to && or ||")