summaryrefslogtreecommitdiffstats
path: root/lldb/packages/Python/lldbsuite/test
diff options
context:
space:
mode:
authorAdrian Prantl <aprantl@apple.com>2018-01-30 19:40:09 +0000
committerAdrian Prantl <aprantl@apple.com>2018-01-30 19:40:09 +0000
commitee2d2bfbcd90158abac4f8f20cd4883269392176 (patch)
treeb9080fcb63c6c5209d9566511df431af97d612ea /lldb/packages/Python/lldbsuite/test
parent7d8f6fa86c1d10a8f01b2bec00c250b8acea1862 (diff)
downloadbcm5719-llvm-ee2d2bfbcd90158abac4f8f20cd4883269392176.tar.gz
bcm5719-llvm-ee2d2bfbcd90158abac4f8f20cd4883269392176.zip
Add more diagnostics to help diagnose flaky test
llvm-svn: 323808
Diffstat (limited to 'lldb/packages/Python/lldbsuite/test')
-rw-r--r--lldb/packages/Python/lldbsuite/test/functionalities/breakpoint/address_breakpoints/TestBadAddressBreakpoints.py10
-rw-r--r--lldb/packages/Python/lldbsuite/test/lldbutil.py2
2 files changed, 7 insertions, 5 deletions
diff --git a/lldb/packages/Python/lldbsuite/test/functionalities/breakpoint/address_breakpoints/TestBadAddressBreakpoints.py b/lldb/packages/Python/lldbsuite/test/functionalities/breakpoint/address_breakpoints/TestBadAddressBreakpoints.py
index f3b9a637360..5014c1cd4a2 100644
--- a/lldb/packages/Python/lldbsuite/test/functionalities/breakpoint/address_breakpoints/TestBadAddressBreakpoints.py
+++ b/lldb/packages/Python/lldbsuite/test/functionalities/breakpoint/address_breakpoints/TestBadAddressBreakpoints.py
@@ -30,11 +30,13 @@ class BadAddressBreakpointTestCase(TestBase):
def address_breakpoints(self):
"""Test that breakpoints set on a bad address say they are bad."""
- (target, process, thread, bkpt) = lldbutil.run_to_source_breakpoint(
- self, "Set a breakpoint here", lldb.SBFileSpec("main.c"))
+ target, process, thread, bkpt = \
+ lldbutil.run_to_source_breakpoint(self,
+ "Set a breakpoint here",
+ lldb.SBFileSpec("main.c"))
- # Now see if we can read from 0. If I can't do that, I don't have a good way to know
- # what an illegal address is...
+ # Now see if we can read from 0. If I can't do that, I don't
+ # have a good way to know what an illegal address is...
error = lldb.SBError()
ptr = process.ReadPointerFromMemory(0x0, error)
diff --git a/lldb/packages/Python/lldbsuite/test/lldbutil.py b/lldb/packages/Python/lldbsuite/test/lldbutil.py
index 00b65ab8a55..45f23b565dd 100644
--- a/lldb/packages/Python/lldbsuite/test/lldbutil.py
+++ b/lldb/packages/Python/lldbsuite/test/lldbutil.py
@@ -766,7 +766,7 @@ def run_to_source_breakpoint(test, bkpt_pattern, source_spec,
breakpoint = target.BreakpointCreateBySourceRegex(
bkpt_pattern, source_spec)
test.assertTrue(breakpoint.GetNumLocations() > 0,
- 'No locations found for source breakpoint: "%s"'%(bkpt_pattern))
+ 'No locations found for source breakpoint: "%s", file: "%s", dir: "%s"'%(bkpt_pattern, source_spec.GetFilename(), source_spec.GetDirectory()))
# Launch the process, and do not stop at the entry point.
if not launch_info:
OpenPOWER on IntegriCloud