On Thu, Apr 04, 2019 at 07:54:55AM -0700, Jeffrey Hugo wrote: > Some UEFI implementations for ARM64 devices apply strict permissions on > the different allocation types. In these implementations, DATA > allocations have XN (execute never) permissions, preventing code execution > from those pages. > > On these implementations, the Linux kernel is loaded to DATA pages, which > causes a permission fault when GRUB attempts to kick off the kernel. This > results in a device crash. > > Fix this by allocating CODE pages for the Linux kernel. > > Signed-off-by: Jeffrey Hugo <jeffrey.l.h...@gmail.com>
Make sense for me but I would like to hear Leif's opinion too. I treat this a fix and if he is OK with it I am happy to take it into release. Daniel _______________________________________________ Grub-devel mailing list Grub-devel@gnu.org https://lists.gnu.org/mailman/listinfo/grub-devel