Hi Alex, On 18 June 2018 at 09:23, Alexander Graf <ag...@suse.de> wrote: > With efi_loader, we may want to execute payloads from RAM. By default, > permissions on the RAM region don't allow us to execute from there though. > > So whenever we get into the efi_loader case, let's mark RAM as executable. > That way we still protect normal cases, but allow for efi binaries to > directly get executed from within RAM. > > For this, we hook into the already existing allow_unaligned() call which > also transitions the system over into semantics required by the UEFI > specification. > > Signed-off-by: Alexander Graf <ag...@suse.de> > --- > arch/sandbox/cpu/cpu.c | 14 ++++++++++++++ > arch/sandbox/cpu/os.c | 14 ++++++++++++++ > include/os.h | 19 +++++++++++++++++++ > 3 files changed, 47 insertions(+) >
What is this patch actually for? Does it make something work that did not before? Where is it called? Regards. Simon _______________________________________________ U-Boot mailing list U-Boot@lists.denx.de https://lists.denx.de/listinfo/u-boot