Skip to content

Handle cases where passing an overly long size could cause UB due to integer overflow #35

Handle cases where passing an overly long size could cause UB due to integer overflow

Handle cases where passing an overly long size could cause UB due to integer overflow #35

Triggered via pull request October 16, 2025 09:11
Status Cancelled
Total duration 4m 27s
Artifacts 2

clang-tidy.yml

on: pull_request
Matrix: clang-tidy
Fit to window
Zoom out
Zoom in

Annotations

6 errors and 1 warning
clang-tidy (debian:experimental)
Process completed with exit code 1.
clang-tidy (debian:testing)
The run was canceled by @kkaefer.
clang-tidy (debian:testing)
The operation was canceled.
clang-tidy
The run was canceled by @kkaefer.
clang-tidy (debian:bookworm)
The run was canceled by @kkaefer.
clang-tidy (debian:bookworm)
The operation was canceled.
clang-tidy (debian:experimental)
No files were found with the provided path: build/protozero-72bb155a9200ff2c1cafe1f8fdb5fcc30b47b06e-clang-tidy-22.log. No artifacts will be uploaded.

Artifacts

Produced during runtime
Name Size Digest
protozero-72bb155a9200ff2c1cafe1f8fdb5fcc30b47b06e-clang-tidy-15-log Expired
701 Bytes
sha256:ff9dc9c08e9a6ced6bd8309c6cf39161fa66daea78fc4b3e5951c08bf2bab6de
protozero-72bb155a9200ff2c1cafe1f8fdb5fcc30b47b06e-clang-tidy-19-log Expired
701 Bytes
sha256:6b11fa265a188de99bd2a04ae88c71357c2a781ed3f68c2348a0673222eee99c