AddressSanitizer: stack-overflow src/dmd/mtype.d:404 in Type::equals(RootObject const*) const
This occurs when running test fail_compilation/ctfe13612.d with the compiler compiled with an address sanitizer.
Comment #1 by contact — 2021-10-29T18:00:34Z
Along with other recursive expansions, the compiler should be able to detect the stack overflows before exploding with stack protection mechanisms by reading and comparing the stack size at runtime when such recursive expansions happen.
Comment #2 by robert.schadek — 2024-12-13T19:18:59Z