{"id":2224862,"url":"http://patchwork.ozlabs.org/api/patches/2224862/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/patch/20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com/","project":{"id":27,"url":"http://patchwork.ozlabs.org/api/projects/27/?format=json","name":"Buildroot development","link_name":"buildroot","list_id":"buildroot.buildroot.org","list_email":"buildroot@buildroot.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com>","list_archive_url":null,"date":"2026-04-19T00:20:51","name":"[v2,1/2] boot/efibootguard: new boot package","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"51a73f81bd20644bfcf2330880ed493b7fe708b9","submitter":{"id":80843,"url":"http://patchwork.ozlabs.org/api/people/80843/?format=json","name":"Christopher Obbard","email":"obbardc@gmail.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/buildroot/patch/20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com/mbox/","series":[{"id":500478,"url":"http://patchwork.ozlabs.org/api/series/500478/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/list/?series=500478","date":"2026-04-19T00:20:50","name":"Add efibootguard bootloader package & example recipe","version":2,"mbox":"http://patchwork.ozlabs.org/series/500478/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2224862/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2224862/checks/","tags":{},"related":[],"headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=cJLhHJuJ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fyq6W34mvz1yHk\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Sun, 19 Apr 2026 10:21:23 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id C727981521;\n\tSun, 19 Apr 2026 00:21:20 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 05LwOcp9IYU0; Sun, 19 Apr 2026 00:21:20 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id D30968153D;\n\tSun, 19 Apr 2026 00:21:19 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 40E0D259\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:17 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 26C9B60EEE\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:17 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id D2QnhE3VloN1 for <buildroot@buildroot.org>;\n Sun, 19 Apr 2026 00:21:16 +0000 (UTC)","from mail-wm1-x333.google.com (mail-wm1-x333.google.com\n [IPv6:2a00:1450:4864:20::333])\n by smtp3.osuosl.org (Postfix) with ESMTPS id D4301608C5\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:15 +0000 (UTC)","by mail-wm1-x333.google.com with SMTP id\n 5b1f17b1804b1-4887ca8e529so13639995e9.0\n for <buildroot@buildroot.org>; Sat, 18 Apr 2026 17:21:15 -0700 (PDT)","from localhost (host86-170-11-80.range86-170.btcentralplus.com.\n [86.170.11.80]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488fc1070bfsm161989485e9.7.2026.04.18.17.21.12\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sat, 18 Apr 2026 17:21:12 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp1.osuosl.org D30968153D","OpenDKIM Filter v2.11.0 smtp3.osuosl.org D4301608C5"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776558079;\n\tbh=64aOIxSJ7+/mjnuTSpAyEscBNu5Z24hppJEW5hXEU6k=;\n\th=From:Date:References:In-Reply-To:To:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t Cc:From;\n\tb=cJLhHJuJCEwatgVlJL+y2gadAE9Z34vEQnO+v+j1M5q+4EWvU0ND4ijLzzhcAnXJ+\n\t FKA59V/RSI7TcZoS7eq5TU1Sso+cKtaX6LD3nnOqU7cYhF3DJ/buqTWBFNoIUhny82\n\t oecOes763/x7uJwF6sZ1s+kb3c6g/jXJQ2c60YlTVE++X3yCicG6/lr3LoZY/vUK34\n\t NJqyOEHxT896LabGTUW95vh8NtR57KlI2M6X0dfmouE90xC9OYggYuY+LQPTeY3zfC\n\t Xxi0XRoylb4wBagblPWtbGj+hDWaIW1vRlRki11qGPUfemRSLEPEFl5XvCI2wlQOol\n\t 2Ra/4hrhEk92g==","Received-SPF":"Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::333; helo=mail-wm1-x333.google.com;\n envelope-from=obbardc@gmail.com; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org D4301608C5","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776558073; x=1777162873;\n h=cc:to:in-reply-to:references:message-id:content-transfer-encoding\n :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=NBikY3UNRgajw4soLf0atIq/1MhIRTBNYWOLhIcnrK4=;\n b=U5Zur76Y2aTc7XqKVaXU7dWpXLxY66BzCOfH1NqRAW0EeLAPgTW9VbwwoQwa+1ghRj\n 6ntQ23MsfEBw1lxGfnDPlXvqgobcdLq+IuzIgLXcJsRqqvRjCMJOBNiyq53DBKCIiily\n l8g0Y7Ir3uiD1LpF6fU2kPj3fyG6ti52BXynMj8zDbIXHtNShjZfVNFOh5J9jN1A1WOi\n 1J13+mssqnsWLV0fWXyRZMtg1YyPgj7aWtKI3ZHf/dJvliIdOXtOo6PqB9UAO1biJDaW\n 7nRflvRktqPH+2HPCdjvvkZRMbX0bw2ImF38ADmUxo8eDMe362N5gr2aLB0NDgKoDSrx\n dm7Q==","X-Gm-Message-State":"AOJu0YyGDgbXZ6FokwEowApR/npcghyZgnVPePo8fShXHwB+Xy5TH+em\n C5EJGKi6+K9f59Uf9u9Bz0I7iE/6UIlhrLgPalKqUV8S4qP/8l4HfLub","X-Gm-Gg":"AeBDietvFtiRG/6bCfb6GduZkYOg4YtJWW2W9UmEdPMHXTFg207e0bvkwfepj51u4zw\n p+r/pNgsJK9z30uTDDXUhVcIhSk6kHeGRQ2v52qXEevdKXHuCd3czACMdg3f+JX5+4qdURLAJ0i\n rDY+5+4eJJoP15spXPOt607vj/sSyg7gW5Pv/C8j+gmeZz0PNQJ4fJ5zpTj/T1btkYV0lJexoFr\n fAZbE0jvfDjmqp/6j0fq7N1eZUwPfVpTLq1zvA5PWTG9BhP0S6Ljx+Z7h7fec625lfpiq1j//6r\n lR87RlwkRQQiu239un0Fb9s+OOMhEua9yow1jBiF5aYQ6l9t2/2C57cq+SiBK9Py+fRcvnWaETq\n yF6WNiwTJa8yvu6jKVkei0awhJ/tJODJ7BR95Y0qFu9t/DK9HNshjvleN7g9AM0v5kmGrLC+Y/o\n FVL6rGH5AUrlRpFuhFM5WXM3V4KfaFquFcmtzSTz89E6f7ET2tLG3psXIBPEPYurIYBwcv348/a\n 3xPEc1d+cTlsEM0ognwDwlZes6+zgEnncHT/Om3h5tXJE3BMSlf4bLiZz9m6Qt5P/EEQlus4g+d\n R6kLBshkwi67VyYM5rirBIvkp/IWmrqSFd3ec1IrfmwrBTjPH03VTZbeNRWTzz/YNT7ZQ7Pnmpc\n Ht/5a","X-Received":"by 2002:a05:600c:c0d8:b0:485:fbd2:f72 with SMTP id\n 5b1f17b1804b1-488fb8838abmr79793145e9.1.1776558073385;\n Sat, 18 Apr 2026 17:21:13 -0700 (PDT)","From":"Christopher Obbard <obbardc@gmail.com>","Date":"Sun, 19 Apr 2026 01:20:51 +0100","MIME-Version":"1.0","Message-Id":"\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com>","References":"\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-0-1420c48f78fa@gmail.com>","In-Reply-To":"\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-0-1420c48f78fa@gmail.com>","To":"buildroot@buildroot.org","X-Mailer":"b4 0.14.3","X-Developer-Signature":"v=1; a=openpgp-sha256; l=6207; i=obbardc@gmail.com;\n h=from:subject:message-id; bh=eJXF5bXoJL0OBz2ivUUstngkHA3TLtIzHBz3FGZWK6g=;\n b=owEBbQKS/ZANAwAKAWNNxPBocEb4AcsmYgBp5B/21A0UoIHDxqHyIpvRaqw6EjHHk27EB0R15\n Cg/0U+FSTGJAjMEAAEKAB0WIQTxi9yLbCX5CqI9UXRjTcTwaHBG+AUCaeQf9gAKCRBjTcTwaHBG\n +JVLD/407o1pvCidqV6CjOIHcLHXHShRAjH4sc5O6QL+ll0nJaF84V3AFcfAicHbPzUvHcCf47H\n Yq1xxgJ8Q9a7OtpiI684WrS908fCLkjes7lHdI8Cu61GyMKTbLAmg21i6N68Q6MxzfcXTOKY6K+\n UWcze8HNB8Dbee14J9xGSFdESwzCj/K+rm1mKzdFtu7DT9oOLI89MQmTkR9E1tmEvS6eZbFXeki\n /UISkyEG3Y39GxgKAX3cO/o7cHlwKMQZS6oQOVrCJj61XzjrbYvSPtvkXM2Tiwt2oA/tYRXyrHT\n KB8fkdryxLXRQrVx2GA5JU15+B943xlrSWjHBrjJ4qw18O3Ik9RR/SGwFdYrS6ETG0MgfhDNUTy\n 8uTYFVfCcZmJBaL0LVxUGFUi3ZcOOxDes3oHuuf6Wa+pURg6PrlorUu0BEEIjvK1heeX+aqdv82\n /lGS8whedEbwHFs/qpU4pDE5WdSQqJWCt3aTxIdGm03ch8D3pSJadM9oHekcwv0CDc/DUThsJ0x\n taLcY5N3KoqfFegc6sbVbJ/H4pcKQZnJmeW+ZYI4ZK8SJkKDnUiO2eCLWeWkBhdS6+NRkLhEpLQ\n 9v53AKdOqxrRWuRplJQbbnnXwtXqeFv6UnDxAnRGEo541WHa8fVvPMrp7Y5+m8jifRNzuALe50q\n 2xckz5dRRYTdQcQ==","X-Developer-Key":"i=obbardc@gmail.com; a=openpgp;\n fpr=F18BDC8B6C25F90AA23D5174634DC4F0687046F8","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1776558073; x=1777162873; darn=buildroot.org;\n h=cc:to:in-reply-to:references:message-id:content-transfer-encoding\n :mime-version:subject:date:from:from:to:cc:subject:date:message-id\n :reply-to;\n bh=NBikY3UNRgajw4soLf0atIq/1MhIRTBNYWOLhIcnrK4=;\n b=s+hrmhVRuUdcqCKZxyorHFlK7X5bWmCouHVc2G9fgXdqmDuU5xopxmCcTnEMuGRnqX\n NxrnAWObyOtIz1SCVzudIfq9wcop6uj5jfWDvYNnkevz5mxbiUk7Oh2/9rwK+7QEC9mX\n wS3O6bxllMoCcJj0XDUhcyzcpfYvA9tGBbN4aJTMBtM8GQ1ZiFPSoLYrP9oxgRnrpVfB\n 5fFuoDVNOrNKMj7NvnaoK93Tnu28zvyIKvFZ8UP6sGGjl5IqR5dNGykLBuFyMqD9TZo4\n zAoVVT45MCEoABYmYlfF8NmDim4S0lgPxbe2ryLNJL4s/76oEaQFEosAULRoVkRT7Xon\n QOoQ==","X-Mailman-Original-Authentication-Results":["smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=gmail.com","smtp3.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=s+hrmhVR"],"Subject":"[Buildroot] [PATCH v2 1/2] boot/efibootguard: new boot package","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","Cc":"James Hilliard <james.hilliard1@gmail.com>,\n Christopher Obbard <obbardc@gmail.com>, efibootguard-dev@googlegroups.com,\n Thomas Petazzoni <thomas.petazzoni@bootlin.com>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"},"content":"This patch adds a new boot package to Buildroot for building the\nefibootguard bootloader from the https://github.com/siemens/efibootguard\nrepository.\n\nefibootguard can be chainloaded as an EFI application or used as a\nstandalone bootloader and can be useful when building A/B systems.\n\nAdd a recipe to build the EFI bootloader application, user-space\ntooling & host tooling (both of which are used to manage efibootguard\nconfiguration).\n\nefibootguard supports multiple architectures, but for now only build\nthe EFI bootloader for x86_64.\n\nSigned-off-by: Christopher Obbard <obbardc@gmail.com>\n---\n DEVELOPERS                          |  3 ++\n boot/Config.in                      |  2 ++\n boot/efibootguard/Config.in         | 37 +++++++++++++++++++++++\n boot/efibootguard/Config.in.host    |  8 +++++\n boot/efibootguard/efibootguard.hash |  3 ++\n boot/efibootguard/efibootguard.mk   | 60 +++++++++++++++++++++++++++++++++++++\n 6 files changed, 113 insertions(+)","diff":"diff --git a/DEVELOPERS b/DEVELOPERS\nindex 9e983ae113..f64a5d6370 100644\n--- a/DEVELOPERS\n+++ b/DEVELOPERS\n@@ -697,6 +697,9 @@ F:\tpackage/perl-sys-mmap/\n F:\tpackage/perl-time-parsedate/\n F:\tpackage/perl-x10/\n \n+N:\tChristopher Obbard <obbardc@gmail.com>\n+F:\tboot/efibootguard/\n+\n N:\tClayton Shotwell <clayton.shotwell@collins.com>\n F:\tpackage/audit/\n F:\tpackage/checkpolicy/\ndiff --git a/boot/Config.in b/boot/Config.in\nindex d73d221431..8e6dc7a5cc 100644\n--- a/boot/Config.in\n+++ b/boot/Config.in\n@@ -15,6 +15,8 @@ source \"boot/barebox/Config.in\"\n source \"boot/binaries-marvell/Config.in\"\n source \"boot/boot-wrapper-aarch64/Config.in\"\n source \"boot/edk2/Config.in\"\n+source \"boot/efibootguard/Config.in\"\n+source \"boot/efibootguard/Config.in.host\"\n source \"boot/grub2/Config.in\"\n source \"boot/mv-ddr-marvell/Config.in\"\n source \"boot/mxs-bootlets/Config.in\"\ndiff --git a/boot/efibootguard/Config.in b/boot/efibootguard/Config.in\nnew file mode 100644\nindex 0000000000..47fd478e8b\n--- /dev/null\n+++ b/boot/efibootguard/Config.in\n@@ -0,0 +1,37 @@\n+config BR2_TARGET_EFIBOOTGUARD_ARCH_SUPPORTS\n+\tbool\n+\tdefault y if BR2_x86_64\n+\tdepends on BR2_USE_MMU\n+\n+config BR2_TARGET_EFIBOOTGUARD\n+\tbool \"efibootguard\"\n+\tdepends on BR2_TARGET_EFIBOOTGUARD_ARCH_SUPPORTS\n+\tdepends on BR2_USE_WCHAR\n+\tselect BR2_PACKAGE_GNU_EFI\n+\tselect BR2_PACKAGE_PCIUTILS if BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS\n+\thelp\n+\t  EFI Boot Guard is a UEFI bootloader intended for robust\n+\t  A/B style updates. It arms a hardware watchdog before\n+\t  handing over control to the OS and supports a fail-safe\n+\t  boot mechanism to roll back if a boot attempt fails.\n+\n+\t  https://github.com/siemens/efibootguard\n+\n+if BR2_TARGET_EFIBOOTGUARD\n+\n+config BR2_TARGET_EFIBOOTGUARD_X86_64\n+\tbool \"x86-64\"\n+\tdepends on BR2_x86_64\n+\thelp\n+\t  Select this option if the platform you're targeting has a\n+\t  64 bits EFI BIOS.\n+\n+config BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS\n+\tbool \"install tools\"\n+\thelp\n+\t  Install the efibootguard user-space tools (e.g.\n+\t  bg_printenv and bg_setenv) on the target. These tools\n+\t  allow reading and updating efibootguard's configuration\n+\t  in user-space.\n+\n+endif # BR2_TARGET_EFIBOOTGUARD\ndiff --git a/boot/efibootguard/Config.in.host b/boot/efibootguard/Config.in.host\nnew file mode 100644\nindex 0000000000..845c14c079\n--- /dev/null\n+++ b/boot/efibootguard/Config.in.host\n@@ -0,0 +1,8 @@\n+config BR2_TARGET_HOST_EFIBOOTGUARD\n+\tbool \"host efibootguard\"\n+\thelp\n+\t  Build efibootguard companion tools for the host. These\n+\t  can be used during image creation to inspect and\n+\t  modify the efibootguard configuration data.\n+\n+\t  https://github.com/siemens/efibootguard\ndiff --git a/boot/efibootguard/efibootguard.hash b/boot/efibootguard/efibootguard.hash\nnew file mode 100644\nindex 0000000000..6f5a5cf25c\n--- /dev/null\n+++ b/boot/efibootguard/efibootguard.hash\n@@ -0,0 +1,3 @@\n+# Locally calculated\n+sha256  6c68c541311dcc8c2be0042f7887acc2a24d2ac68a88d426380fdbda9f476ae8  efibootguard-0.22.tar.gz\n+sha256  8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643  COPYING\ndiff --git a/boot/efibootguard/efibootguard.mk b/boot/efibootguard/efibootguard.mk\nnew file mode 100644\nindex 0000000000..c40cef13ac\n--- /dev/null\n+++ b/boot/efibootguard/efibootguard.mk\n@@ -0,0 +1,60 @@\n+################################################################################\n+#\n+# efibootguard\n+#\n+################################################################################\n+\n+EFIBOOTGUARD_VERSION = 0.22\n+EFIBOOTGUARD_SITE = $(call github,siemens,efibootguard,refs/tags/v$(EFIBOOTGUARD_VERSION))\n+EFIBOOTGUARD_LICENSE = GPL-2.0-only\n+EFIBOOTGUARD_LICENSE_FILES = COPYING\n+\n+EFIBOOTGUARD_DEPENDENCIES = \\\n+\tgnu-efi \\\n+\thost-autoconf-archive\n+\n+ifeq ($(BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS),y)\n+EFIBOOTGUARD_DEPENDENCIES += pciutils\n+EFIBOOTGUARD_INSTALL_TARGET = YES\n+else\n+EFIBOOTGUARD_INSTALL_TARGET = NO\n+endif\n+\n+EFIBOOTGUARD_INSTALL_IMAGES = YES\n+\n+EFIBOOTGUARD_AUTORECONF = YES\n+\n+EFIBOOTGUARD_AUTORECONF_OPTS = \\\n+\t-I $(HOST_DIR)/share/autoconf-archive\n+\n+EFIBOOTGUARD_CONF_OPTS = \\\n+\t--with-gnuefi-sys-dir=$(STAGING_DIR) \\\n+\t--with-gnuefi-include-dir=$(STAGING_DIR)/usr/include/efi \\\n+\t--with-gnuefi-lib-dir=$(STAGING_DIR)/usr/lib \\\n+\t--disable-completion \\\n+\t--disable-tests\n+\n+# TODO: Perhaps take inspiration from Debian patch https://salsa.debian.org/debian/efibootguard/-/blob/master/debian/patches/always-override-stack-protector-variables-in-EFI-bui.patch?ref_type=heads\n+EFIBOOTGUARD_CONF_ENV = \\\n+\tLDFLAGS=\"$(LDFLAGS) -no-pie\"\n+\n+define EFIBOOTGUARD_INSTALL_IMAGES_CMDS\n+\t$(INSTALL) -d $(BINARIES_DIR)/efibootguard\n+\t$(INSTALL) -m 0644 $(@D)/efibootguardx64.efi $(BINARIES_DIR)/efibootguard/\n+endef\n+\n+HOST_EFIBOOTGUARD_DEPENDENCIES = \\\n+\thost-autoconf-archive\n+\n+HOST_EFIBOOTGUARD_AUTORECONF = YES\n+\n+HOST_EFIBOOTGUARD_AUTORECONF_OPTS = \\\n+\t-I $(HOST_DIR)/share/autoconf-archive\n+\n+HOST_EFIBOOTGUARD_CONF_OPTS = \\\n+\t--disable-bootloader \\\n+\t--disable-completion \\\n+\t--disable-tests\n+\n+$(eval $(autotools-package))\n+$(eval $(host-autotools-package))\n","prefixes":["v2","1/2"]}