The reduced test case for m68k showed a TLS symbol given to emit_single_push_insn, which resulted in a call insn inside a sequence that I didn't expect.
We don't see this on i686 because we pretend that the TLS call isn't a call. Or something. Bootstrapped on i586 for sanity. Committed. r~
PR bootstrap/50018 * expr.c (fixup_args_size_notes): Accept and ignore normal calls. diff --git a/gcc/expr.c b/gcc/expr.c index f0b76e1..997eb3e 100644 --- a/gcc/expr.c +++ b/gcc/expr.c @@ -3567,8 +3567,10 @@ fixup_args_size_notes (rtx prev, rtx last, int end_args_size) /* Look for a call_pop pattern. */ if (CALL_P (insn)) { - /* We're not supposed to see non-pop call patterns here. */ - gcc_assert (GET_CODE (pat) == PARALLEL); + /* We have to allow non-call_pop patterns for the case + of emit_single_push_insn of a TLS address. */ + if (GET_CODE (pat) != PARALLEL) + continue; /* All call_pop have a stack pointer adjust in the parallel. The call itself is always first, and the stack adjust is @@ -3583,7 +3585,8 @@ fixup_args_size_notes (rtx prev, rtx last, int end_args_size) break; } /* We'd better have found the stack pointer adjust. */ - gcc_assert (i > 0); + if (i == 0) + continue; /* Fall through to process the extracted SET and DEST as if it was a standalone insn. */ }