Focal has that as well via CVE fixes:
d/p/ubuntu/hw-riscv-Allow-64-bit-access-to-SiFive-CLINT.patch
debian/patches/ubuntu/CVE-2020-13754-1.patch
Chances are we need this later follow on fix as well.
I wanted to check for Focal for stable patches of 4.2 (<email address hidden>) anyway (but there is not 4.2.2 yet). This would be one of them, but one step at a time.
This looks a lot like /mail.gnu. org/archive/ html/qemu- devel/2020- 09/msg00212. html
https:/
You'd think the offending commit mentioned there is actually in 5.1 and not earlier. /bugs.debian. org/964793 /bugs.debian. org/964247 /bugs.launchpad .net/qemu/ +bug/1886318 allow-64- bit-access- to-SiFive- CLINT.patch
But it is backported in Groovy as part of
Bug-Debian: https:/
Bug-Debian: https:/
https:/
It already had one follow on fix in
d/p/riscv-
Focal has that as well via CVE fixes: hw-riscv- Allow-64- bit-access- to-SiFive- CLINT.patch patches/ ubuntu/ CVE-2020- 13754-1. patch
d/p/ubuntu/
debian/
Chances are we need this later follow on fix as well.
I wanted to check for Focal for stable patches of 4.2 (<email address hidden>) anyway (but there is not 4.2.2 yet). This would be one of them, but one step at a time.
I guess we need to backport https:/ /git.qemu. org/?p= qemu.git; a=commit; h=ab3d207fe89bc 0c63739db19e177 af49179aa457
@Sean - if I'd build you qemu with that fix could you test it? If so what would you need qemu for F&G ?