Lines Matching defs:Match
113 regex: The actual regex used to match against scraped reports.
128 def Match(self, suppression_from_report):
132 We match our suppressions against generated suppressions
146 return self.regex.match('\n'.join(lines) + '\n') is not None
220 # * Memcheck:Unaddressable should also match Addr* reports,
221 # * Memcheck:Uninitialized should also match Cond and Value reports,
225 # * Memcheck:Addr[1248] suppressions should match Unaddressable reports,
226 # * Memcheck:Cond and Memcheck:Value[1248] should match Uninitialized.
321 elif re.match("^fun:.*|^obj:.*|^\.\.\.$", line):
391 instr: The instruction to match.
409 # them, so these suppressions will always fail to match. We should override
410 # Match to fetch the instruction from the report and try to match against
423 # Ignore case for the module match, but not the function match.
429 regex += '(.*\n)*' # Match anything left in the stack.
460 # Regexes to match valid drmemory frames.
509 if not any([regex.match(line) for regex in DRMEMORY_FRAME_PATTERNS]):
548 stack: the stack to match the suppressions.
549 positive: the list of suppressions that must match the given stack.
550 negative: the list of suppressions that should not match.
558 assert parsed[0].Match(stack.split("\n")), (
559 "Suppression:\n%s\ndidn't match stack:\n%s" % (supp, stack))
562 assert not parsed[0].Match(stack.split("\n")), (
563 "Suppression:\n%s\ndid match stack:\n%s" % (supp, stack))
580 # If parsing raised an exception, match the error text here.
596 """Tests the Suppression.Match() capabilities."""
851 # Make sure we don't wildcard away the "not" part and match ntdll.dll by