summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLans Zhang <jia.zhang@windriver.com>2017-08-11 14:14:39 +0800
committerLans Zhang <jia.zhang@windriver.com>2017-08-11 14:14:39 +0800
commit104a01a25d106fe8ed8e344bd4fb96d323afe3d1 (patch)
treecbb2284b5c961942468b2fb4c0c904d7f1801ff4
parent0951a620b55378e9e43f92d240a98bb42fd5f8ce (diff)
downloadmeta-secure-core-104a01a25d106fe8ed8e344bd4fb96d323afe3d1.tar.gz
shim: refresh fallback patchset
Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-fix-double-free-of-dp.patch35
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-work-around-the-issue-of-boot-option-creati.patch197
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim/0015-fallback-allow-to-search-.csv-in-EFI-BOOT.patch (renamed from meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-allow-to-search-.csv-in-EFI-BOOT.patch)8
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim/0016-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch (renamed from meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch)25
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim/0017-fallback-always-try-to-boot-the-option-recorded-in-c.patch36
-rw-r--r--meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb7
6 files changed, 294 insertions, 14 deletions
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-fix-double-free-of-dp.patch b/meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-fix-double-free-of-dp.patch
new file mode 100644
index 0000000..e9d3b47
--- /dev/null
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-fix-double-free-of-dp.patch
@@ -0,0 +1,35 @@
1From 2003b828be0e0fe774e119922e81ee0bb0d2ecdd Mon Sep 17 00:00:00 2001
2From: Lans Zhang <jia.zhang@windriver.com>
3Date: Wed, 9 Aug 2017 16:10:14 +0800
4Subject: [PATCH 1/2] fallback: fix double free of dp
5
6If the boot option recorded in csv is not in a media device path, the
7corresponding full device path will be referred for creating the boot
8variable.
9
10However, the current code logic always frees the full device path
11(full_device_path) and the media device path (dp) separately. In order
12to resolve this issue, always check whether dp equals to full_device_path
13before freeing dp.
14
15Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
16---
17 fallback.c | 2 +-
18 1 file changed, 1 insertion(+), 1 deletion(-)
19
20diff --git a/fallback.c b/fallback.c
21index 9b64077..2ef1b86 100644
22--- a/fallback.c
23+++ b/fallback.c
24@@ -482,7 +482,7 @@ add_to_boot_list(CHAR16 *dirname, CHAR16 *filename, CHAR16 *label, CHAR16 *argum
25 err:
26 if (full_device_path)
27 FreePool(full_device_path);
28- if (dp)
29+ if (dp && dp != full_device_path)
30 FreePool(dp);
31 if (fullpath)
32 FreePool(fullpath);
33--
342.13.2
35
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-work-around-the-issue-of-boot-option-creati.patch b/meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-work-around-the-issue-of-boot-option-creati.patch
new file mode 100644
index 0000000..cad1cc2
--- /dev/null
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-work-around-the-issue-of-boot-option-creati.patch
@@ -0,0 +1,197 @@
1From 0fbd5a6375bbfe463979cc1958bc721353e49625 Mon Sep 17 00:00:00 2001
2From: Lans Zhang <jia.zhang@windriver.com>
3Date: Fri, 11 Aug 2017 13:42:20 +0800
4Subject: [PATCH 2/2] fallback: work around the issue of boot option creation
5 with AMI BIOS
6
7AMI BIOS (e.g, Intel NUC5i3MYHE) may automatically hide and patch BootXXXX
8variables with ami_masked_device_path_guid.
9
10Initially, the normal boot option created by fallback looks like this:
1100000000 01 00 00 00 5e 00 42 00 6f 00 6f 00 74 00 6c 00 |....^.B.o.o.t.l.|
1200000010 6f 00 61 00 64 00 65 00 72 00 20 00 54 00 65 00 |o.a.d.e.r. .T.e.|
1300000020 73 00 74 00 20 00 28 00 36 00 34 00 2d 00 62 00 |s.t. .(.6.4.-.b.|
1400000030 69 00 74 00 29 00 00 00 04 01 2a 00 01 00 00 00 |i.t.).....*.....|
1500000040 00 08 00 00 00 00 00 00 00 00 08 00 00 00 00 00 |................|
1600000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1700000060 01 01 04 04 30 00 5c 00 45 00 46 00 49 00 5c 00 |....0.\.E.F.I.\.|
1800000070 42 00 4f 00 4f 00 54 00 5c 00 74 00 65 00 73 00 |B.O.O.T.\.t.e.s.|
1900000080 74 00 78 00 36 00 34 00 2e 00 65 00 66 00 69 00 |t.x.6.4...e.f.i.|
2000000090 00 00 7f ff 04 00 |......|
2100000096
22
23after reboot, fallback has to create a new one due to the previous boot
24option is hidden and masked by AMI BIOS:
2500000000 09 00 00 00 76 00 42 00 6f 00 6f 00 74 00 6c 00 |....v.B.o.o.t.l.|
2600000010 6f 00 61 00 64 00 65 00 72 00 20 00 54 00 65 00 |o.a.d.e.r. .T.e.|
2700000020 73 00 74 00 20 00 28 00 36 00 34 00 2d 00 62 00 |s.t. .(.6.4.-.b.|
2800000030 69 00 74 00 29 00 00 00 01 04 14 00 e7 75 e2 99 |i.t.)........u..|
2900000040 a0 75 37 4b a2 e6 c5 38 5e 6c 00 cb 7f ff 04 00 |.u7K...8^l......|
3000000050 04 01 2a 00 01 00 00 00 00 08 00 00 00 00 00 00 |..*.............|
3100000060 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
3200000070 00 00 00 00 00 00 00 00 01 01 04 04 30 00 5c 00 |............0.\.|
3300000080 45 00 46 00 49 00 5c 00 42 00 4f 00 4f 00 54 00 |E.F.I.\.B.O.O.T.|
3400000090 5c 00 74 00 65 00 73 00 74 00 78 00 36 00 34 00 |\.t.e.s.t.x.6.4.|
35000000a0 2e 00 65 00 66 00 69 00 00 00 7f ff 04 00 |..e.f.i.......|
36000000ae
37
38And after several reboot, fallback will have to create more boot options
39because AMI BIOS corrupts the previous ones.
40
41We can get the valid device path if just skipping the masked device path and
42its next end path.
43
44Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
45---
46 fallback.c | 114 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++---
47 1 file changed, 109 insertions(+), 5 deletions(-)
48
49diff --git a/fallback.c b/fallback.c
50index 2ef1b86..46894af 100644
51--- a/fallback.c
52+++ b/fallback.c
53@@ -287,6 +287,105 @@ add_boot_option(EFI_DEVICE_PATH *hddp, EFI_DEVICE_PATH *fulldp,
54 return EFI_OUT_OF_RESOURCES;
55 }
56
57+/*
58+ * AMI BIOS (e.g, Intel NUC5i3MYHE) may automatically hide and patch BootXXXX
59+ * variables with ami_masked_device_path_guid. We can get the valid device path
60+ * if just skipping it and its next end path.
61+ */
62+
63+static EFI_GUID ami_masked_device_path_guid = {
64+ 0x99e275e7, 0x75a0, 0x4b37,
65+ { 0xa2, 0xe6, 0xc5, 0x38, 0x5e, 0x6c, 0x0, 0xcb }
66+};
67+
68+static unsigned int
69+calc_masked_boot_option_size(unsigned int size)
70+{
71+ return size + sizeof(EFI_DEVICE_PATH) +
72+ sizeof(ami_masked_device_path_guid) + sizeof(EFI_DEVICE_PATH);
73+}
74+
75+static int
76+check_masked_boot_option(CHAR8 *candidate, unsigned int candidate_size,
77+ CHAR8 *data, unsigned int data_size)
78+{
79+ /*
80+ * The patched BootXXXX variables contain a hardware device path and
81+ * an end path, preceding the real device path.
82+ */
83+ if (calc_masked_boot_option_size(data_size) != candidate_size)
84+ return 1;
85+
86+ CHAR8 *cursor = candidate;
87+
88+ /* Check whether the BootXXXX is patched */
89+ cursor += sizeof(UINT32) + sizeof(UINT16);
90+ cursor += StrSize((CHAR16 *)cursor);
91+
92+ unsigned int min_valid_size = cursor - candidate + sizeof(EFI_DEVICE_PATH);
93+
94+ if (candidate_size <= min_valid_size)
95+ return 1;
96+
97+ EFI_DEVICE_PATH *dp = (EFI_DEVICE_PATH *)cursor;
98+ unsigned int node_size = DevicePathNodeLength(dp) - sizeof(EFI_DEVICE_PATH);
99+
100+ min_valid_size += node_size;
101+ if (candidate_size <= min_valid_size ||
102+ DevicePathType(dp) != HARDWARE_DEVICE_PATH ||
103+ DevicePathSubType(dp) != HW_VENDOR_DP ||
104+ node_size != sizeof(ami_masked_device_path_guid) ||
105+ CompareGuid((EFI_GUID *)(cursor + sizeof(EFI_DEVICE_PATH)),
106+ &ami_masked_device_path_guid))
107+ return 1;
108+
109+ /* Check whether the patched guid is followed by an end path */
110+ min_valid_size += sizeof(EFI_DEVICE_PATH);
111+ if (candidate_size <= min_valid_size)
112+ return 1;
113+
114+ dp = NextDevicePathNode(dp);
115+ if (!IsDevicePathEnd(dp))
116+ return 1;
117+
118+ /*
119+ * OK. We may really get a masked BootXXXX variable. The next
120+ * step is to test whether it is hidden.
121+ */
122+ UINT32 attrs = *(UINT32 *)candidate;
123+#ifndef LOAD_OPTION_HIDDEN
124+# define LOAD_OPTION_HIDDEN 0x00000008
125+#endif
126+ if (!(attrs & LOAD_OPTION_HIDDEN))
127+ return 1;
128+
129+ attrs &= ~LOAD_OPTION_HIDDEN;
130+
131+ /* Compare the field Attributes */
132+ if (attrs != *(UINT32 *)data)
133+ return 1;
134+
135+ /* Compare the field FilePathListLength */
136+ data += sizeof(UINT32);
137+ candidate += sizeof(UINT32);
138+ if (calc_masked_boot_option_size(*(UINT16 *)data) !=
139+ *(UINT16 *)candidate)
140+ return 1;
141+
142+ /* Compare the field Description */
143+ data += sizeof(UINT16);
144+ candidate += sizeof(UINT16);
145+ if (CompareMem(candidate, data, cursor - candidate))
146+ return 1;
147+
148+ /* Compare the filed FilePathList */
149+ cursor = (CHAR8 *)NextDevicePathNode(dp);
150+ data += sizeof(UINT16);
151+ data += StrSize((CHAR16 *)data);
152+
153+ return CompareMem(cursor, data, candidate_size - min_valid_size);
154+}
155+
156 EFI_STATUS
157 find_boot_option(EFI_DEVICE_PATH *dp, EFI_DEVICE_PATH *fulldp,
158 CHAR16 *filename, CHAR16 *label, CHAR16 *arguments,
159@@ -316,7 +415,8 @@ find_boot_option(EFI_DEVICE_PATH *dp, EFI_DEVICE_PATH *fulldp,
160 EFI_GUID global = EFI_GLOBAL_VARIABLE;
161 EFI_STATUS rc;
162
163- CHAR8 *candidate = AllocateZeroPool(size);
164+ UINTN max_candidate_size = calc_masked_boot_option_size(size);
165+ CHAR8 *candidate = AllocateZeroPool(max_candidate_size);
166 if (!candidate) {
167 FreePool(data);
168 return EFI_OUT_OF_RESOURCES;
169@@ -328,17 +428,21 @@ find_boot_option(EFI_DEVICE_PATH *dp, EFI_DEVICE_PATH *fulldp,
170 varname[6] = hexmap[(bootorder[i] & 0x00f0) >> 4];
171 varname[7] = hexmap[(bootorder[i] & 0x000f) >> 0];
172
173- UINTN candidate_size = size;
174+ UINTN candidate_size = max_candidate_size;
175 rc = uefi_call_wrapper(RT->GetVariable, 5, varname, &global,
176 NULL, &candidate_size, candidate);
177 if (EFI_ERROR(rc))
178 continue;
179
180- if (candidate_size != size)
181+ if (candidate_size != size) {
182+ if (check_masked_boot_option(candidate, candidate_size,
183+ data, size))
184+ continue;
185+ } else if (CompareMem(candidate, data, size))
186 continue;
187
188- if (CompareMem(candidate, data, size))
189- continue;
190+ VerbosePrint(L"Found boot entry \"%s\" with label \"%s\" "
191+ L"for file \"%s\"\n", varname, label, filename);
192
193 /* at this point, we have duplicate data. */
194 if (!first_new_option) {
195--
1962.13.2
197
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-allow-to-search-.csv-in-EFI-BOOT.patch b/meta-efi-secure-boot/recipes-bsp/shim/shim/0015-fallback-allow-to-search-.csv-in-EFI-BOOT.patch
index a876179..404e3de 100644
--- a/meta-efi-secure-boot/recipes-bsp/shim/shim/0013-fallback-allow-to-search-.csv-in-EFI-BOOT.patch
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim/0015-fallback-allow-to-search-.csv-in-EFI-BOOT.patch
@@ -1,7 +1,7 @@
1From d008d75860433bc640aaf1c2dabe5742912bdac4 Mon Sep 17 00:00:00 2001 1From 8990fdd360bc5db39e33e3a15c447bed0c1ca46e Mon Sep 17 00:00:00 2001
2From: Lans Zhang <jia.zhang@windriver.com> 2From: Lans Zhang <jia.zhang@windriver.com>
3Date: Mon, 24 Jul 2017 15:15:33 +0800 3Date: Mon, 24 Jul 2017 15:15:33 +0800
4Subject: [PATCH] fallback: allow to search .csv in \EFI\BOOT 4Subject: [PATCH 3/5] fallback: allow to search .csv in \EFI\BOOT
5 5
6Signed-off-by: Lans Zhang <jia.zhang@windriver.com> 6Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
7--- 7---
@@ -9,10 +9,10 @@ Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
9 1 file changed, 1 insertion(+), 2 deletions(-) 9 1 file changed, 1 insertion(+), 2 deletions(-)
10 10
11diff --git a/fallback.c b/fallback.c 11diff --git a/fallback.c b/fallback.c
12index 5e4a396..8c408fd 100644 12index 423b3ee..b55755b 100644
13--- a/fallback.c 13--- a/fallback.c
14+++ b/fallback.c 14+++ b/fallback.c
15@@ -729,8 +729,7 @@ find_boot_options(EFI_HANDLE device) 15@@ -874,8 +874,7 @@ find_boot_options(EFI_HANDLE device)
16 continue; 16 continue;
17 } 17 }
18 if (!StrCmp(fi->FileName, L".") || 18 if (!StrCmp(fi->FileName, L".") ||
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch b/meta-efi-secure-boot/recipes-bsp/shim/shim/0016-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch
index 03d62b8..7f23caf 100644
--- a/meta-efi-secure-boot/recipes-bsp/shim/shim/0014-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim/0016-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch
@@ -1,19 +1,19 @@
1From 9f6d9f6b7f88b9d15dd2f25ae7f16b68a980922a Mon Sep 17 00:00:00 2001 1From b992209b060f7916de20a5926788a751f1c6636f Mon Sep 17 00:00:00 2001
2From: Lans Zhang <jia.zhang@windriver.com> 2From: Lans Zhang <jia.zhang@windriver.com>
3Date: Tue, 1 Aug 2017 10:25:45 +0800 3Date: Tue, 1 Aug 2017 10:25:45 +0800
4Subject: [PATCH] fallback: don't set the csv entry as the first boot by 4Subject: [PATCH 4/5] fallback: don't set the csv entry as the first boot by
5 default 5 default
6 6
7Signed-off-by: Lans Zhang <jia.zhang@windriver.com> 7Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
8--- 8---
9 fallback.c | 10 +++++++++- 9 fallback.c | 12 ++++++++++--
10 1 file changed, 9 insertions(+), 1 deletion(-) 10 1 file changed, 10 insertions(+), 2 deletions(-)
11 11
12diff --git a/fallback.c b/fallback.c 12diff --git a/fallback.c b/fallback.c
13index 8c408fd..c39f280 100644 13index b55755b..2794cc1 100644
14--- a/fallback.c 14--- a/fallback.c
15+++ b/fallback.c 15+++ b/fallback.c
16@@ -138,6 +138,11 @@ make_full_path(CHAR16 *dirname, CHAR16 *filename, CHAR16 **out, UINT64 *outlen) 16@@ -199,6 +199,11 @@ make_full_path(CHAR16 *dirname, CHAR16 *filename, CHAR16 **out, UINT64 *outlen)
17 CHAR16 *bootorder = NULL; 17 CHAR16 *bootorder = NULL;
18 int nbootorder = 0; 18 int nbootorder = 0;
19 19
@@ -25,7 +25,7 @@ index 8c408fd..c39f280 100644
25 EFI_DEVICE_PATH *first_new_option = NULL; 25 EFI_DEVICE_PATH *first_new_option = NULL;
26 VOID *first_new_option_args = NULL; 26 VOID *first_new_option_args = NULL;
27 UINTN first_new_option_size = 0; 27 UINTN first_new_option_size = 0;
28@@ -199,6 +204,9 @@ add_boot_option(EFI_DEVICE_PATH *hddp, EFI_DEVICE_PATH *fulldp, 28@@ -260,6 +265,9 @@ add_boot_option(EFI_DEVICE_PATH *hddp, EFI_DEVICE_PATH *fulldp,
29 return rc; 29 return rc;
30 } 30 }
31 31
@@ -35,7 +35,7 @@ index 8c408fd..c39f280 100644
35 CHAR16 *newbootorder = AllocateZeroPool(sizeof (CHAR16) 35 CHAR16 *newbootorder = AllocateZeroPool(sizeof (CHAR16)
36 * (nbootorder + 1)); 36 * (nbootorder + 1));
37 if (!newbootorder) 37 if (!newbootorder)
38@@ -414,7 +422,7 @@ add_to_boot_list(EFI_FILE_HANDLE fh, CHAR16 *dirname, CHAR16 *filename, CHAR16 * 38@@ -569,7 +577,7 @@ add_to_boot_list(CHAR16 *dirname, CHAR16 *filename, CHAR16 *label, CHAR16 *argum
39 rc = find_boot_option(dp, full_device_path, fullpath, label, arguments, &option); 39 rc = find_boot_option(dp, full_device_path, fullpath, label, arguments, &option);
40 if (EFI_ERROR(rc)) { 40 if (EFI_ERROR(rc)) {
41 add_boot_option(dp, full_device_path, fullpath, label, arguments); 41 add_boot_option(dp, full_device_path, fullpath, label, arguments);
@@ -44,6 +44,15 @@ index 8c408fd..c39f280 100644
44 CHAR16 *newbootorder; 44 CHAR16 *newbootorder;
45 newbootorder = AllocateZeroPool(sizeof (CHAR16) * nbootorder); 45 newbootorder = AllocateZeroPool(sizeof (CHAR16) * nbootorder);
46 if (!newbootorder) 46 if (!newbootorder)
47@@ -899,7 +907,7 @@ find_boot_options(EFI_HANDLE device)
48
49 } while (1);
50
51- if (rc == EFI_SUCCESS && nbootorder > 0)
52+ if (run_as_first_boot && rc == EFI_SUCCESS && nbootorder > 0)
53 rc = update_boot_order();
54
55 uefi_call_wrapper(fh2->Close, 1, fh2);
47-- 56--
482.7.5 572.7.5
49 58
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim/0017-fallback-always-try-to-boot-the-option-recorded-in-c.patch b/meta-efi-secure-boot/recipes-bsp/shim/shim/0017-fallback-always-try-to-boot-the-option-recorded-in-c.patch
new file mode 100644
index 0000000..470693b
--- /dev/null
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim/0017-fallback-always-try-to-boot-the-option-recorded-in-c.patch
@@ -0,0 +1,36 @@
1From 92ed1e297632a718d1392c8d163beb713c00ccbf Mon Sep 17 00:00:00 2001
2From: Lans Zhang <jia.zhang@windriver.com>
3Date: Wed, 9 Aug 2017 16:29:08 +0800
4Subject: [PATCH 5/5] fallback: always try to boot the option recorded in csv
5
6We intend to use fallback to work around MSFT for the next bootloader
7of shim. Thus, we don't mind fallback is involved for PCR measurement
8at all.
9
10Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
11---
12 fallback.c | 8 +-------
13 1 file changed, 1 insertion(+), 7 deletions(-)
14
15diff --git a/fallback.c b/fallback.c
16index 2794cc1..0a645a4 100644
17--- a/fallback.c
18+++ b/fallback.c
19@@ -1016,13 +1016,7 @@ efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *systab)
20 return rc;
21 }
22
23- rc = fallback_should_prefer_reset();
24- if (EFI_ERROR(rc)) {
25- VerbosePrint(L"tpm not present, starting the first image\n");
26- try_start_first_option(image);
27- } else {
28- VerbosePrint(L"tpm present, resetting system\n");
29- }
30+ try_start_first_option(image);
31
32 Print(L"Reset System\n");
33
34--
352.7.5
36
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb b/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb
index 6e21cf8..001de7d 100644
--- a/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb
+++ b/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb
@@ -31,8 +31,11 @@ SRC_URI = "\
31 file://0010-Makefile-do-not-sign-the-efi-file.patch \ 31 file://0010-Makefile-do-not-sign-the-efi-file.patch \
32 file://0011-Update-verification_method-if-the-loaded-image-is-si.patch;apply=0 \ 32 file://0011-Update-verification_method-if-the-loaded-image-is-si.patch;apply=0 \
33 file://0012-netboot-replace-the-depreciated-EFI_PXE_BASE_CODE.patch \ 33 file://0012-netboot-replace-the-depreciated-EFI_PXE_BASE_CODE.patch \
34 file://0013-fallback-allow-to-search-.csv-in-EFI-BOOT.patch \ 34 file://0013-fallback-fix-double-free-of-dp.patch \
35 file://0014-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch \ 35 file://0014-fallback-work-around-the-issue-of-boot-option-creati.patch \
36 file://0015-fallback-allow-to-search-.csv-in-EFI-BOOT.patch \
37 file://0016-fallback-don-t-set-the-csv-entry-as-the-first-boot-b.patch \
38 file://0017-fallback-always-try-to-boot-the-option-recorded-in-c.patch \
36" 39"
37SRC_URI_append_x86-64 = "\ 40SRC_URI_append_x86-64 = "\
38 ${@bb.utils.contains('DISTRO_FEATURES', 'msft', \ 41 ${@bb.utils.contains('DISTRO_FEATURES', 'msft', \