<html>
    <head>
      <base href="https://bugs.llvm.org/">
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_NEW "
   title="NEW - different result from __builtin_add_overflow in constant expresion"
   href="https://bugs.llvm.org/show_bug.cgi?id=41552">41552</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>different result from __builtin_add_overflow in constant expresion
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>clang
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>7.0
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>PC
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>Linux
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>NEW
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>P
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>C++
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>unassignedclangbugs@nondot.org
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>john@mcfarlane.name
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>blitzrakete@gmail.com, dgregor@apple.com, erik.pilkington@gmail.com, llvm-bugs@lists.llvm.org, richard-llvm@metafoo.co.uk
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Description:
Normally, when passing a combination of large signed and unsigned integer
values to the generic overload of __builtin_add_overflow and requesting back an
unsigned integer, the function correctly identifies overflow. When the same
operation takes place in a constant expression, __builtin_add_overflow fails to
identify that the overflow took place.

Example:
<a href="https://wandbox.org/permlink/hDCXNEThgH3NmdLz">https://wandbox.org/permlink/hDCXNEThgH3NmdLz</a>

Affected:
This affects 7.x and upward. Earlier versions do not support
__builtin_add_overflow in constant expressions. 
This affects C++14 and later. A repro for C++11 is not possible due to
limitations imposed on constexpr fns.</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are on the CC list for the bug.</li>
      </ul>
    </body>
</html>