The reduced test case for m68k showed a TLS symbol
given to emit_single_push_insn, which resulted in
a call insn inside a sequence that I didn't expect.

We don't see this on i686 because we pretend that
the TLS call isn't a call.  Or something.

Bootstrapped on i586 for sanity.

Committed.


r~
        PR bootstrap/50018
        * expr.c (fixup_args_size_notes): Accept and ignore normal calls.


diff --git a/gcc/expr.c b/gcc/expr.c
index f0b76e1..997eb3e 100644
--- a/gcc/expr.c
+++ b/gcc/expr.c
@@ -3567,8 +3567,10 @@ fixup_args_size_notes (rtx prev, rtx last, int 
end_args_size)
       /* Look for a call_pop pattern.  */
       if (CALL_P (insn))
        {
-         /* We're not supposed to see non-pop call patterns here.  */
-         gcc_assert (GET_CODE (pat) == PARALLEL);
+          /* We have to allow non-call_pop patterns for the case
+            of emit_single_push_insn of a TLS address.  */
+         if (GET_CODE (pat) != PARALLEL)
+           continue;
 
          /* All call_pop have a stack pointer adjust in the parallel.
             The call itself is always first, and the stack adjust is
@@ -3583,7 +3585,8 @@ fixup_args_size_notes (rtx prev, rtx last, int 
end_args_size)
                break;
            }
          /* We'd better have found the stack pointer adjust.  */
-         gcc_assert (i > 0);
+         if (i == 0)
+           continue;
          /* Fall through to process the extracted SET and DEST
             as if it was a standalone insn.  */
        }

Reply via email to