Loading scripts/parse_usan_errors_from_xml_report.py +8 −1 Original line number Diff line number Diff line Loading @@ -64,6 +64,8 @@ class MsanError(SanitizerError): def parse_commandlines_from_sysout(sysout: str) -> dict: commandlines = { "IVAS_cod": "", "networkSimulator_g192": "", "eid-xor": "", "IVAS_dec": "", "IVAS_rend": "", "ISAR_post_rend": "", Loading @@ -72,7 +74,12 @@ def parse_commandlines_from_sysout(sysout: str) -> dict: for exe in commandlines: # search for name of executable in line # it is repeated in the sanitizer traceback, hence the "not in" part if re.search(exe, line) is not None and "_start" not in line: # the "not at the start" condition is for eid-xor (there are also lines like this: "eid-xor command:") if ( re.search(exe, line) is not None and "_start" not in line and not line.strip().startswith(exe) ): assert commandlines[exe] == "" commandlines[exe] = line.strip() break Loading Loading
scripts/parse_usan_errors_from_xml_report.py +8 −1 Original line number Diff line number Diff line Loading @@ -64,6 +64,8 @@ class MsanError(SanitizerError): def parse_commandlines_from_sysout(sysout: str) -> dict: commandlines = { "IVAS_cod": "", "networkSimulator_g192": "", "eid-xor": "", "IVAS_dec": "", "IVAS_rend": "", "ISAR_post_rend": "", Loading @@ -72,7 +74,12 @@ def parse_commandlines_from_sysout(sysout: str) -> dict: for exe in commandlines: # search for name of executable in line # it is repeated in the sanitizer traceback, hence the "not in" part if re.search(exe, line) is not None and "_start" not in line: # the "not at the start" condition is for eid-xor (there are also lines like this: "eid-xor command:") if ( re.search(exe, line) is not None and "_start" not in line and not line.strip().startswith(exe) ): assert commandlines[exe] == "" commandlines[exe] = line.strip() break Loading