On Wed, 29 Mar 2017, Xen.org security team wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Xen Security Advisory XSA-206
version 9
xenstore denial of service via repeated update
I am seeing a build failure from these patches when using gcc 7. The
problem is with
xsa206-4.80002-xenstored-Log-when-the-write-transaction-rate-limit-.patch
because in tools/xenstore/xenstored_domain.c the patch adds the boolean
wrl_delay_logged to the structure "domain" but later it tries to increment
it, resulting in the error
xenstored_domain.c: In function 'wrl_apply_debit_actual':
xenstored_domain.c:949:32: error: increment of a boolean expression
[-Werror=bool-operation]
if (!domain->wrl_delay_logged++) {
Michael Young
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel