# The request readMemory with count 18446744073709551615 triggers address
# sanitizer. Suppress the error, leaving us with just this warning:
# WARNING: AddressSanitizer failed to allocate 0xffffffffffffffff bytes
- set_sanitizer ASAN_OPTIONS allocator_may_return_null 1
- set_sanitizer TSAN_OPTIONS allocator_may_return_null 1
+ append_environment ASAN_OPTIONS allocator_may_return_null 1
+ append_environment TSAN_OPTIONS allocator_may_return_null 1
if {[dap_initialize] == ""} {
return
# triggers address sanitizer. Suppress the error, leaving us with just
# this warning:
# WARNING: AddressSanitizer failed to allocate 0xffffffffffffffff bytes
- set_sanitizer ASAN_OPTIONS allocator_may_return_null 1
- set_sanitizer TSAN_OPTIONS allocator_may_return_null 1
+ append_environment ASAN_OPTIONS allocator_may_return_null 1
+ append_environment TSAN_OPTIONS allocator_may_return_null 1
clean_restart ${testfile}
}
}
}
-# Helper function for set_sanitizer/set_sanitizer_default.
+# Helper function for append_environment/append_environment_default.
-proc set_sanitizer_1 { env_var var_id val default} {
+proc append_environment_1 { env_var var_id val default} {
global env
if { ![info exists env($env_var) ]
# Add VAR_ID=VAL to ENV_VAR.
-proc set_sanitizer { env_var var_id val } {
- set_sanitizer_1 $env_var $var_id $val 0
+proc append_environment { env_var var_id val } {
+ append_environment_1 $env_var $var_id $val 0
}
# Add VAR_ID=VAL to ENV_VAR, unless ENV_VAR already contains a VAR_ID setting.
-proc set_sanitizer_default { env_var var_id val } {
- set_sanitizer_1 $env_var $var_id $val 1
+proc append_environment_default { env_var var_id val } {
+ append_environment_1 $env_var $var_id $val 1
}
-set_sanitizer_default TSAN_OPTIONS suppressions \
+append_environment_default TSAN_OPTIONS suppressions \
$srcdir/../tsan-suppressions.txt
# When using ThreadSanitizer we may run into the case that a race is detected,
# Try to prevent this by setting history_size to the maximum (7) by default.
# See also the ThreadSanitizer docs (
# https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags ).
-set_sanitizer_default TSAN_OPTIONS history_size 7
+append_environment_default TSAN_OPTIONS history_size 7
# If GDB is built with ASAN (and because there are leaks), it will output a
# leak report when exiting as well as exit with a non-zero (failure) status.
# This can affect tests that are sensitive to what GDB prints on stderr or its
# exit status. Add `detect_leaks=0` to the ASAN_OPTIONS environment variable
# (which will affect any spawned sub-process) to avoid this.
-set_sanitizer_default ASAN_OPTIONS detect_leaks 0
+append_environment_default ASAN_OPTIONS detect_leaks 0
# List of procs to run in gdb_finish.
set gdb_finish_hooks [list]