Bug 22451 – ASAN reports stack-overflow on mtype.d

Status
NEW
Severity
critical
Priority
P2
Component
dmd
Product
D
Version
D2
Platform
x86_64
OS
Linux
Creation time
2021-10-29T17:48:17Z
Last change time
2024-12-13T19:18:59Z
Assigned to
No Owner
Creator
Luís Ferreira
Moved to GitHub: dmd#18062 →

Comments

Comment #0 by contact — 2021-10-29T17:48:17Z
AddressSanitizer: stack-overflow src/dmd/mtype.d:404 in Type::equals(RootObject const*) const This occurs when running test fail_compilation/ctfe13612.d with the compiler compiled with an address sanitizer.
Comment #1 by contact — 2021-10-29T18:00:34Z
Along with other recursive expansions, the compiler should be able to detect the stack overflows before exploding with stack protection mechanisms by reading and comparing the stack size at runtime when such recursive expansions happen.
Comment #2 by robert.schadek — 2024-12-13T19:18:59Z
THIS ISSUE HAS BEEN MOVED TO GITHUB https://github.com/dlang/dmd/issues/18062 DO NOT COMMENT HERE ANYMORE, NOBODY WILL SEE IT, THIS ISSUE HAS BEEN MOVED TO GITHUB