On Thu, Apr 04, 2019 at 07:54:55AM -0700, Jeffrey Hugo wrote:
> Some UEFI implementations for ARM64 devices apply strict permissions on
> the different allocation types.  In these implementations, DATA
> allocations have XN (execute never) permissions, preventing code execution
> from those pages.
>
> On these implementations, the Linux kernel is loaded to DATA pages, which
> causes a permission fault when GRUB attempts to kick off the kernel.  This
> results in a device crash.
>
> Fix this by allocating CODE pages for the Linux kernel.
>
> Signed-off-by: Jeffrey Hugo <jeffrey.l.h...@gmail.com>

Make sense for me but I would like to hear Leif's opinion too. I treat
this a fix and if he is OK with it I am happy to take it into release.

Daniel

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to