diff --git a/coverage-tool/coverage-reporting/intermediate_layer.py b/coverage-tool/coverage-reporting/intermediate_layer.py index 2cb1a8143c97a148ea191863cd8e2498572e5d63..b565236733396c1b4e2177be9cabe9740dbc8cb3 100644 --- a/coverage-tool/coverage-reporting/intermediate_layer.py +++ b/coverage-tool/coverage-reporting/intermediate_layer.py @@ -436,7 +436,7 @@ class BinaryParser(object): :param asm_code: Lines of assembly code within the dump :return: AssemblyLine object. """ - lines = re.findall(r"^\s+([a-fA-F0-9]+):\t(.+?)\n", asm_code, + lines = re.findall(r"^(?:\s+)?([a-fA-F0-9]+):\t(.+?)\n", asm_code, re.DOTALL | re.MULTILINE) for line in lines: if len(line) != 2: @@ -648,8 +648,8 @@ class IntermediateCodeCoverage(object): command = "%s -Sl %s | tee %s" % (OBJDUMP, elf_filename, elf_filename.replace(".elf", ".dump")) dump = os_command(command, show_command=True) - # with open(elf_filename.replace(".elf", ".dump"), "r") as f: - # dump = f.read() + with open(elf_filename.replace(".elf", ".dump"), "r") as f: + dump = f.read() dump += "\n\n" # For pattern matching the last function logger.info(f"Parsing assembly file {elf_filename}") elf_name = os.path.splitext(os.path.basename(elf_filename))[0]