diff --git a/tests/ui/abi/homogenous-floats-target-feature-mixup.rs b/tests/ui/abi/homogenous-floats-target-feature-mixup.rs index 2c78b794a8d7..f472b1aa9aff 100644 --- a/tests/ui/abi/homogenous-floats-target-feature-mixup.rs +++ b/tests/ui/abi/homogenous-floats-target-feature-mixup.rs @@ -6,6 +6,7 @@ //@ run-pass //@ needs-subprocess +//@ ignore-backends: gcc #![allow(overflowing_literals)] #![allow(unused_variables)] diff --git a/tests/ui/abi/segfault-no-out-of-stack.rs b/tests/ui/abi/segfault-no-out-of-stack.rs index 5e8b4e0dbf2a..b122079d36f7 100644 --- a/tests/ui/abi/segfault-no-out-of-stack.rs +++ b/tests/ui/abi/segfault-no-out-of-stack.rs @@ -2,6 +2,7 @@ //@ needs-subprocess //@ compile-flags: -Zub-checks=no -Zmir-enable-passes=-CheckNull //@ ignore-fuchsia must translate zircon signal to SIGSEGV/SIGBUS, FIXME (#58590) +//@ ignore-backends: gcc #![feature(rustc_private)] diff --git a/tests/ui/process/process-panic-after-fork.rs b/tests/ui/process/process-panic-after-fork.rs index 653ff6ce314d..154ff51878d6 100644 --- a/tests/ui/process/process-panic-after-fork.rs +++ b/tests/ui/process/process-panic-after-fork.rs @@ -5,6 +5,7 @@ //@ ignore-fuchsia no fork //@ ignore-tvos fork is prohibited //@ ignore-watchos fork is prohibited +//@ ignore-backends: gcc #![feature(rustc_private)] #![feature(never_type)] diff --git a/tests/ui/sanitizer/address.rs b/tests/ui/sanitizer/address.rs index 1688f46c2d55..badaa4db5c31 100644 --- a/tests/ui/sanitizer/address.rs +++ b/tests/ui/sanitizer/address.rs @@ -7,6 +7,7 @@ //@ run-fail-or-crash //@ error-pattern: AddressSanitizer: stack-buffer-overflow //@ error-pattern: 'xs' (line 14) <== Memory access at offset +//@ ignore-backends: gcc use std::hint::black_box; diff --git a/tests/ui/sanitizer/dataflow.rs b/tests/ui/sanitizer/dataflow.rs index d99a1a6ac247..e3e03fee08c3 100644 --- a/tests/ui/sanitizer/dataflow.rs +++ b/tests/ui/sanitizer/dataflow.rs @@ -5,6 +5,7 @@ //@ needs-sanitizer-dataflow //@ run-pass //@ compile-flags: -Zsanitizer=dataflow -Zsanitizer-dataflow-abilist={{src-base}}/sanitizer/dataflow-abilist.txt -C unsafe-allow-abi-mismatch=sanitizer +//@ ignore-backends: gcc use std::mem::size_of; use std::os::raw::{c_int, c_long, c_void}; diff --git a/tests/ui/sanitizer/memory-eager.rs b/tests/ui/sanitizer/memory-eager.rs index 9498336abb7d..59ad6eec0e32 100644 --- a/tests/ui/sanitizer/memory-eager.rs +++ b/tests/ui/sanitizer/memory-eager.rs @@ -12,6 +12,7 @@ //@ error-pattern: MemorySanitizer: use-of-uninitialized-value //@ [optimized]error-pattern: Uninitialized value was created by an allocation //@ [optimized]error-pattern: in the stack frame +//@ ignore-backends: gcc // // FIXME the unoptimized case actually has that text in the output too, per // diff --git a/tests/ui/sanitizer/memory.rs b/tests/ui/sanitizer/memory.rs index 1566637acd22..764d8b4432bf 100644 --- a/tests/ui/sanitizer/memory.rs +++ b/tests/ui/sanitizer/memory.rs @@ -12,6 +12,7 @@ //@ error-pattern: MemorySanitizer: use-of-uninitialized-value //@ error-pattern: Uninitialized value was created by an allocation //@ error-pattern: in the stack frame +//@ ignore-backends: gcc // // This test case intentionally limits the usage of the std, // since it will be linked with an uninstrumented version of it. diff --git a/tests/ui/sanitizer/new-llvm-pass-manager-thin-lto.rs b/tests/ui/sanitizer/new-llvm-pass-manager-thin-lto.rs index b66568474277..deeee694a1cf 100644 --- a/tests/ui/sanitizer/new-llvm-pass-manager-thin-lto.rs +++ b/tests/ui/sanitizer/new-llvm-pass-manager-thin-lto.rs @@ -15,6 +15,7 @@ //@[opt1]compile-flags: -Copt-level=1 //@ run-fail-or-crash //@ error-pattern: ERROR: AddressSanitizer: stack-use-after-scope +//@ ignore-backends: gcc static mut P: *mut usize = std::ptr::null_mut(); diff --git a/tests/ui/sanitizer/thread.rs b/tests/ui/sanitizer/thread.rs index 8f72b1b41a84..7ed21dce9f3e 100644 --- a/tests/ui/sanitizer/thread.rs +++ b/tests/ui/sanitizer/thread.rs @@ -19,6 +19,7 @@ //@ error-pattern: WARNING: ThreadSanitizer: data race //@ error-pattern: Location is heap block of size 4 //@ error-pattern: allocated by main thread +//@ ignore-backends: gcc #![feature(rustc_private)] extern crate libc; diff --git a/tests/ui/sanitizer/use-after-scope.rs b/tests/ui/sanitizer/use-after-scope.rs index 1c477d0be14b..523b35869074 100644 --- a/tests/ui/sanitizer/use-after-scope.rs +++ b/tests/ui/sanitizer/use-after-scope.rs @@ -5,6 +5,7 @@ //@ compile-flags: -Zsanitizer=address -C unsafe-allow-abi-mismatch=sanitizer //@ run-fail-or-crash //@ error-pattern: ERROR: AddressSanitizer: stack-use-after-scope +//@ ignore-backends: gcc static mut P: *mut usize = std::ptr::null_mut(); diff --git a/tests/ui/simd/target-feature-mixup.rs b/tests/ui/simd/target-feature-mixup.rs index 82902891b97f..014a9966f5cb 100644 --- a/tests/ui/simd/target-feature-mixup.rs +++ b/tests/ui/simd/target-feature-mixup.rs @@ -5,6 +5,7 @@ //@ needs-subprocess //@ ignore-fuchsia must translate zircon signal to SIGILL, FIXME (#58590) +//@ ignore-backends: gcc #![feature(repr_simd, target_feature, cfg_target_feature)]