Knowledge

UEFI

Source 📝

1377:. The mechanical details of how precisely these drivers are to be signed are not specified. When Secure Boot is enabled, it is initially placed in "setup" mode, which allows a public key known as the "platform key" (PK) to be written to the firmware. Once the key is written, Secure Boot enters "User" mode, where only UEFI drivers and OS boot loaders signed with the platform key can be loaded by the firmware. Additional "key exchange keys" (KEK) can be added to a database stored in memory to allow other certificates to be used, but they must still have a connection to the private portion of the platform key. Secure Boot can also be placed in "Custom" mode, where additional public keys can be added to the system that do not match the private key. 140: 158: 7657: 2659: 1354: 2667: 1449: 910: 29: 1188: 1836:) and firmware recovery operations. Additionally, it is responsible for discovery of the current boot mode and handling many ACPI S3 operations. In the case of ACPI S3 resume, it is responsible for restoring many hardware registers to a pre-sleep state. PEI also uses CAR. Initialization at this stage involves creating data structures in memory and establishing default values within these structures. 1910: 426:) specification that currently provides three recipes, two of which are related to UEFI: 1) SBBR: which requires UEFI, ACPI and SMBIOS compliance suitable for enterprise level operating environments such as Windows, Red Hat Enterprise Linux, and VMware ESXi; and 2) EBBR: which requires compliance to a set of UEFI interfaces as defined in the Embedded Base Boot Requirements ( 790: 2080:, which produces a Windows drivers disk and a non-destructive partitioning tool to allow the installation of Windows XP or Vista without requiring a reinstallation of Mac OS X (now macOS). A firmware update was also released that added BIOS compatibility to its EFI implementation. Subsequent Macintosh models shipped with the newer firmware. 2764:
to compromise the security of the system. In Windows, if Secure Boot is enabled, all kernel drivers must be digitally signed; non-WHQL drivers may be refused to load. In February 2013, another Red Hat developer attempted to submit a patch to the Linux kernel that would allow it to parse Microsoft's authenticode signing using a master
2921:
the bug was actually triggered by storing too many UEFI variables to memory, and that the bug could also be triggered under Windows under certain conditions. In conclusion, he determined that the offending kernel module had caused kernel message dumps to be written to the firmware, thus triggering the bug.
2920:
after installing a Linux distribution in UEFI mode. While potential conflicts with a kernel module designed to access system features on Samsung laptops were initially blamed (also prompting kernel maintainers to disable the module on UEFI systems as a safety measure), Matthew Garrett discovered that
2801:
In August 2016 it was reported that two security researchers had found the "golden key" security key Microsoft uses in signing operating systems. Technically, no key was exposed, however, an exploitable binary signed by the key was. This allows any software to run as though it was genuinely signed by
2763:
It has been disputed whether the operating system kernel and its modules must be signed as well; while the UEFI specifications do not require it, Microsoft has asserted that their contractual requirements do, and that it reserves the right to revoke any certificates used to sign code that can be used
4359:
The file system supported by the Extensible Firmware Interface is based on the FAT file system. EFI defines a specific version of FAT that is explicitly documented and testable. Conformance to the EFI specification and its associate reference documents is the only definition of FAT that needs to be
2083:
During 2005, more than one million Intel systems shipped with Intel's implementation of UEFI. New mobile, desktop and server products, using Intel's implementation of UEFI, started shipping in 2006. For instance, boards that use the Intel 945 chipset series use Intel's UEFI firmware implementation.
878:
UEFI variables provide a way to store data, in particular non-volatile data. Some UEFI variables are shared between platform firmware and operating systems. Variable namespaces are identified by GUIDs, and variables are key/value pairs. For example, UEFI variables can be used to keep crash messages
5816:
System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby ... Platforms shall be UEFI Class Three (see UEFI Industry Group, Evaluating UEFI using Commercially Available Platforms and Solutions, version 0.3, for a definition) with no Compatibility Support Module installed or installable. BIOS
3344:
Q: What is the relationship between EFI and UEFI? A: The UEFI specification is based on the EFI 1.10 specification published by Intel with corrections and changes managed by the Unified EFI Forum. Intel still holds the copyright on the EFI 1.10 specification, but has contributed it to the Forum so
2366:
kernel and bootloader. The changes were initially stored in a discrete branch of the FreeBSD source code, but were merged into the mainline source on 4 April 2014 (revision 264095); the changes include support in the installer as well. UEFI boot support for amd64 first appeared in FreeBSD 10.1 and
2105:
In 2008, more x86-64 systems adopted UEFI. While many of these systems still allow booting only the BIOS-based OSes via the Compatibility Support Module (CSM) (thus not appearing to the user to be UEFI-based), other systems started to allow booting UEFI-based OSes. For example, IBM x3450 server,
2755:
as well, without the need to reconfigure the system. Canonical also maintains its own private key to sign installations of Ubuntu pre-loaded on certified OEM computers that run the operating system, and also plans to enforce a Secure Boot requirement as well—requiring both a Canonical key and a
1199:. Despite the fact that the UEFI specification requires MBR partition tables to be fully supported, some UEFI firmware implementations immediately switch to the BIOS-based CSM booting depending on the type of boot disk's partition table, effectively preventing UEFI booting to be performed from 584:
UEFI requires the firmware and operating system loader (or kernel) to be size-matched; that is, a 64-bit UEFI firmware implementation can load only a 64-bit operating system (OS) boot loader or kernel (unless the CSM-based Legacy boot is used) and the same applies to 32-bit. After the system
2734:
that could function with Secure Boot enabled without self-signing them. Other developers suggested that signed builds of Linux with another key could be provided, but noted that it would be difficult to persuade OEMs to ship their computers with the required key alongside the Microsoft key.
1844:
This stage consist of C modules and a dependency-aware dispatcher. With main memory now available, CPU, chipset, mainboard and other I/O devices are initialized in DXE and BDS. Initialization at this stage involves assigning EFI device paths to the hardware connected to the motherboard, and
3051: 2637:, a digital rights activist, have criticized UEFI as an attempt to remove the ability of the user to truly control the computer. It does not solve the BIOS's long-standing problems of requiring two different drivers—one for the firmware and one for the operating system—for most hardware. 2822:
On March 1, 2023, researchers from ESET Cybersecurity Firm reported “The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot” named ‘BlackLotus’ in their public analyses findings describing the theory behind its mechanics exploiting the patches that “do not (and cannot) remove the
2738:
Several major Linux distributions have developed different implementations for Secure Boot. Garrett himself developed a minimal bootloader known as a shim, which is a precompiled, signed bootloader that allows the user to individually trust keys provided by Linux distributions.
1019:
Some architecture-specific (non-EFI Byte Code) EFI drivers for some device types can have interfaces for use by the OS. This allows the OS to rely on EFI for drivers to perform basic graphics and network functions before, and if, operating-system-specific drivers are loaded.
2678:
operating system had to ship with Microsoft's public key enrolled and Secure Boot enabled, which implies that using UEFI is a requirement for these devices. Following the announcement, the company was accused by critics and free software/open source advocates (including the
585:
transitions from "Boot Services" to "Runtime Services", the operating system kernel takes over. At this point, the kernel can change processor modes if it desires, but this bars usage of the runtime services (unless the kernel switches back again). As of version 3.15, the
3345:
that the Forum can evolve it. There will be no future versions of the EFI specification, but customers who license it can still use it under the terms of their license from Intel. The license to the Unified EFI Specification comes from the Forum, not from Intel
718:
and is used by GRUB only in BIOS-GPT setups. From GRUB's perspective, no such partition type exists in case of MBR partitioning. This partition is not required if the system is UEFI-based because no embedding of the second-stage code is needed in that case.
6118:
Microsoft determined that vendors would not have any interest in producing native UEFI 32-bit firmware because of the current status of mainstream 64-bit computing and platform costs. Therefore, Microsoft originally did not to ship support for 32-bit UEFI
737:, some UEFI implementations also support booting from MBR-partitioned disks through the Compatibility Support Module (CSM) that provides legacy BIOS compatibility. In that case, booting Linux on UEFI systems is the same as on legacy BIOS-based systems. 2163:, with an almost instantaneous return from standby mode), then the firmware is not permitted to contain a Compatibility Support Module (CSM). As such, systems that support Connected Standby are incapable of booting Legacy BIOS operating systems. 460:
The interface defined by the EFI specification includes data tables that contain platform information, and boot and runtime services that are available to the OS loader and OS. UEFI firmware provides several technical advantages over a BIOS:
1087:
partition that is used in computers adhering to the UEFI specification. Accessed by the UEFI firmware when a computer is powered up, it stores UEFI applications and the files these applications need to run, including operating system
2747:'s own key that verifies only the bootloader and allows unsigned kernels to be loaded; developers believed that the practice of signing only the bootloader is more feasible, since a trusted kernel is effective at securing only the 895:
to be set to local time or UTC. On machines using a PC-AT real-time clock, by default the hardware clock still has to be set to local time for compatibility with BIOS-based Windows, unless using recent versions and an entry in the
956:, which loads some OS files into memory and executes them. Also, an OS boot loader can provide a user interface to allow the selection of another UEFI application to run. Utilities like the UEFI Shell are also UEFI applications. 809:
call), and they include text and graphical consoles on various devices, and bus, block and file services. Runtime services are still accessible while the operating system is running; they include services such as date, time and
2166:
In October 2017, Intel announced that it would remove legacy PC BIOS support from all its products by 2020, in favor of UEFI Class 3. By 2019, all computers based on Intel platforms no longer have legacy PC BIOS support.
1502:. Some other systems have an already embedded UEFI shell which can be launched by appropriate key press combinations. For other systems, the solution is either creating an appropriate USB flash drive or adding manually ( 1815:
for the specific architecture. It initializes a temporary memory (often CPU cache as RAM, or SoC on-chip SRAM, CAR) and serves as the system's software root of trust with the option of verifying PEI before hand-off.
1266:
In July, of 2022, Kaspersky Labs published information regarding a Rootkit designed to chain boot malicious code on machines using Intel's H81 chipset and the Compatibility Support module of affected motherboards.
2154:
With the release of Windows 8 in October 2012, Microsoft's certification requirements now require that computers include firmware that implements the UEFI specification. Furthermore, if the computer supports the
2834:
security updates applied the Secure Boot Advanced Targeting (SBAT) settings to device's UEFI NVRAM, which may caused some Linux distributions failed to load. SBAT is a protocol that supported in new versions of
2810:
attacks. This also makes patching the fault impossible, since any patch can be replaced (downgraded) by the (signed) exploitable binary. Microsoft responded in a statement that the vulnerability only exists in
1141:, defining instead a boot manager as part of the UEFI specification. When a computer is powered on, the boot manager checks the boot configuration and, based on its settings, then executes the specified OS 964:
EFI defines protocols as a set of software interfaces used for communication between two binary modules. All EFI drivers must provide services to others via protocols. The EFI Protocols are similar to the
5719: 2730:
has since clarified its position, assuring that the responsibility to make keys available was held by the hardware manufacturer), and that it would also be difficult for advanced users to build custom
2644:, of which TianoCore is one of many payload options. The development of coreboot requires cooperation from chipset manufacturers to provide the specifications needed to develop initialization drivers. 1881:
is executed. A UEFI compatible OS is now responsible for exiting boot services triggering the firmware to unload all no longer needed code and data, leaving only runtime services code/data, e.g.
1491:
UDK/EDK2 project. A pre-built ShellBinPkg is also available. Shell v2 works best in UEFI 2.3+ systems and is recommended over Shell v1 in those systems. Shell v1 should work in all UEFI systems.
1233:, regardless of it being performed on UEFI or legacy BIOS-based systems. Furthermore, booting legacy BIOS-based systems from GPT disks is also possible, and such a boot scheme is commonly called 5209: 1222:
that provides legacy BIOS compatibility. In this scenario, booting is performed in the same way as on legacy BIOS-based systems, by ignoring the partition table and relying on the content of a
2335:
are compatible with UEFI Class 2. 32-bit UEFI was originally not supported since vendors did not have any interest in producing native 32-bit UEFI firmware because of the mainstream status of
2223:
added support for UEFI Secure Boot as of version 12.10. Furthermore, the Linux kernel can be compiled with the option to run as an EFI bootloader on its own through the EFI boot stub feature.
2239:
has used EFI on IA-64 since its initial evaluation release in December 2003, and for production releases since January 2005. OpenVMS on x86-64 also uses UEFI to boot the operating system.
518:
With UEFI, it is possible to store product keys for operating systems such as Windows, on the UEFI firmware of the device. UEFI is required for devices shipping with Windows 8 and above.
3712: 2121:
HS22 with UEFI capability. Dell shipped PowerEdge T610, R610, R710, M610 and M710 servers with UEFI capability. More commercially available systems are mentioned in a UEFI whitepaper.
1256:, as an addition to features provided by the UEFI SMM. An example of such a legacy SMM functionality is providing USB legacy support for keyboard and mouse, by emulating their classic 679:(EFI GUID Partition Support) during kernel configuration. This option allows Linux to recognize and use GPT disks after the system firmware passes control over the system to Linux. 7066: 6429: 2695:, and clarified its requirements by stating that x86-based systems certified for Windows 8 must allow Secure Boot to enter custom mode or be disabled, but not on systems using the 2343:
finally introduced further optimizations for UEFI systems, including Graphics Output Protocol (GOP) support, a faster startup, 32-bit UEFI support, and Secure Boot support. Since
6037: 5278: 3739: 377:(UEFI). The original EFI specification remains owned by Intel, which exclusively provides licenses for EFI-based products, but the UEFI specification is owned by the UEFI Forum. 7538: 722:
UEFI systems can access GPT disks and boot directly from them, which allows Linux to use UEFI boot methods. Booting Linux from GPT disks on UEFI systems involves creation of an
1464:. Apart from that, commands available in the UEFI shell can be used for obtaining various other information about the system or the firmware, including getting the memory map ( 2434:
version 11 and above supports UEFI, independently of whether the physical host system is UEFI-based. VMware Workstation 14 (and accordingly, Fusion 10) adds support for the
7146: 4530: 2819:
devices, and has released two patches; however, the patches do not (and cannot) remove the vulnerability, which would require key replacements in end user firmware to fix.
1865:
This is the stage between boot device selection and hand-off to the OS. At this point one may enter UEFI shell, or execute an UEFI application such as the OS boot loader.
6926:"Free Software Foundation recommendations for free operating system distributions considering Secure Boot — Free Software Foundation — working together for free software" 6693: 4036: 351:
hardware) had become too restrictive for the larger server platforms Itanium was targeting. The effort to address these concerns began in 1998 and was initially called
4544: 5883: 1824:
The second stage of UEFI boot consists of a dependency-aware dispatcher that loads and runs PEI modules (PEIMs) to handle early hardware initialization tasks such as
1218:
To ensure backward compatibility, UEFI firmware implementations on PC-class machines could support booting in legacy BIOS mode from MBR-partitioned disks through the
1210:
It is also common for a boot manager to have a textual user interface so the user can select the desired OS (or setup utility) from a list of available boot options.
2798:
in August 2013, a group of security researchers presented a series of exploits in specific vendor implementations of UEFI that could be used to exploit Secure Boot.
7475: 2102:
application. But no direct hardware access is allowed by EDK NT32. This means only a subset of EFI application and drivers can be executed by the EDK NT32 target.
6846: 3529: 1043:
The EFI 1.0 specification defined a UGA (Universal Graphic Adapter) protocol as a way to support graphics features. UEFI did not include UGA and replaced it with
635:(GPT) partitioning scheme, which is free from many of the limitations of MBR. In particular, the MBR limits on the number and size of disk partitions (up to four 366:
UEFI implementation, Tiano, was released by Intel in 2004. Tiano has since then been superseded by EDK and EDK2 and is now maintained by the TianoCore community.
5716: 2454:
has implemented UEFI since 3.1, but is limited to Unix/Linux operating systems and Windows 8 and later (does not work with Windows Vista x64 and Windows 7 x64).
3976: 2179:
means directly booting the system using a (U)EFI operating system loader stored on any storage device. The default location for the operating system loader is
7450: 5664: 3484: 3107: 2640:
Open-source project TianoCore also provides UEFIs. TianoCore lacks the specialized drivers that initialize chipset functions, which are instead provided by
7022: 2626: 5773: 2993:
Originally started in 1998 as Intel Boot Initiative and later as Extensible Firmware Interface (EFI), which was deprecated in 2005 and replaced by UEFI.
1498:. Some of them already provide a direct option in firmware setup for launching, e.g. compiled x86-64 version of the shell needs to be made available as 6899: 4372: 690:. As GPT incorporates the protective MBR, a BIOS-based computer can boot from a GPT disk using a GPT-aware boot loader stored in the protective MBR's 7000: 6824: 6142: 6877: 4314: 3470: 726:(ESP), which contains UEFI applications such as bootloaders, operating system kernels, and utility software. Such a setup is usually referred to as 2751:, and not the pre-boot state for which Secure Boot is designed to add protection. That also allows users to build their own kernels and use custom 6459: 5279:"Framework-Laptop-16/Mainboard/Mainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.PDF at main · FrameworkComputer/Framework-Laptop-16" 2710:
Other developers raised concerns about the legal and practical issues of implementing support for Secure Boot on Linux systems in general. Former
5924: 2890:
The increased prominence of UEFI firmware in devices has also led to a number of technical problems blamed on their respective implementations.
8464: 7585: 6860: 5946: 4451: 3716: 3543: 2175:
An operating system that can be booted from a (U)EFI is called a (U)EFI-aware operating system, defined by (U)EFI specification. Here the term
7553: 7548: 6093: 4480: 5608: 2974: 605:
the UEFI initialization code between the kernel and UEFI boot loaders, leaving the initialization to be performed only by the Linux kernel's
505: 6301: 6204: 5632: 5228: 2351:
protocol is a mandatory requirement for ARM-based Microsoft Windows operating systems. Microsoft began requiring UEFI to run Windows with
1730:, UEFI initializes and tests system hardware components (e.g. Memory training, PCIe link training, USB link training), and then loads the 7543: 7338: 7074: 6437: 6164: 3002:
Part of the BIOS that is required for booting an operating system that is not UEFI-compatible can be implemeted as a CSM DXE module, see
561:
Standard PC BIOS is limited to a 16-bit processor mode and 1 MB of addressable memory space, resulting from the design based on the
6571: 3911: 2384:
5.9 introduced UEFI boot support for 64-bit x86 systems using its own custom loader, OpenBSD 6.0 extended that support to include ARMv7.
402:
on Arm-based servers. The program requires the system firmware to comply with Server Base Boot Requirements (SBBR). SBBR requires UEFI,
7558: 6056: 6043: 3743: 3024: 1886: 403: 5510: 698:
for GRUB to embed its second-stage code due to absence of the post-MBR gap in GPT partitioned disks (which is taken over by the GPT's
5973: 5690: 4250: 581:, which allows applications in the preboot environment to use 64-bit addressing to get direct access to all of the machine's memory. 7097: 6130: 1023:
In other cases, the EFI driver can be filesystem drivers that allow for booting from other types of disk volumes. Examples include
5459: 5093: 4360:
implemented to support EFI. To differentiate the EFI file system from pure FAT, a new partition file system type has been defined.
4115: 5829: 4574: 312:) specification. The last Intel version of EFI was 1.10 released in 2005. Subsequent versions have been developed as UEFI by the 1112:, which is maintained as part of the UEFI specification and independently from the original FAT specification, encompassing the 4151: 3886: 3196: 730:, while ESP is recommended to be at least 512 MB in size and formatted with a FAT32 filesystem for maximum compatibility. 8234: 6549: 5798: 4709: 891:
UEFI provides time services. Time services include support for time zone and daylight saving fields, which allow the hardware
5406: 5379: 5316: 3568: 3250: 3090: 5253: 1050:
UEFI 2.1 defined a "Human Interface Infrastructure" (HII) to manage user input, localized strings, fonts, and forms (in the
7272: 1164:. This automated detection relies on standardized file paths to the OS boot loader, with the path varying depending on the 6009: 5340: 4734: 2509:
interpreter is made available as a UEFI application by using the EADK. The development has moved to GitHub since UDK2015.
2415:
provides UEFI boot on HP Integrity Servers. It also provides a virtualized UEFI environment for the guest UEFI-aware OSes.
829:
section below. The operating system is permitted to directly write to the framebuffer provided by GOP during runtime mode.
8158: 7497: 2141: 1765:
Class 1: UEFI with a CSM interface and no external UEFI interface. The only UEFI interfaces are internal to the firmware.
1306: 4903: 3689: 7643: 7578: 220: 7245:"SUSE Linux Enterprise Server 15 SP1: Chapter 13. UEFI (Unified Extensible Firmware Interface) (Administration Guide)" 4772: 4061: 8227: 7620: 7491: 6596: 6523: 5860: 3065: 1896:
When a legacy OS is used, CSM will handle this call ensuring the system is compatible with legacy BIOS expectations.
1069:
Most early UEFI firmware implementations were console-based. Today many UEFI firmware implementations are GUI-based.
811: 7120: 5735: 5668: 5583: 3808: 2098:
The EDK (EFI Developer Kit) includes an NT32 target, which allows EFI firmware and EFI applications to run within a
682:
For reverse compatibility, Linux can use GPT disks in BIOS-based systems for both data storage and booting, as both
7458: 7169: 6232: 5151: 3221: 3114: 2203:. Some operating systems vendors may have their own boot loaders. They may also change the default boot location. 1690:
on the hard drive, which would add additional functions to the standard UEFI firmware stored on the motherboard's
139: 4630: 3620: 2719: 2704: 1683: 1055: 934: 3515: 1310: 419: 369:
In July 2005, Intel ceased its development of the EFI specification at version 1.10, and contributed it to the
6925: 5122: 2517: 1369:, which can secure the boot process by preventing the loading of UEFI drivers or OS boot loaders that are not 387:
Version 2.1 of the UEFI specification was released on 7 January 2007. It added network authentication and the
8292: 7897: 7627: 7571: 6950: 6714: 5782: 5123:"Basic Instructions for Using EFI for Server Configuration on Intel® Server Boards and Intel® Server Systems" 2506: 2412: 1799:
This is the first stage of the UEFI boot but may have platform specific binary code that precedes it. (e.g.,
1282: 558:. As of UEFI 2.7, RISC-V processor bindings have been officially established for 32-, 64- and 128-bit modes. 7656: 5061: 4339: 3427: 157: 7751: 3400: 2940: 2461: 2246: 2069: 978: 550:
on top of OPAL, the OpenPOWER abstraction layer, running in little-endian mode. Similar projects exist for
236: 87: 6832: 6105: 3371: 1786:). Legacy boot with those CPUs requires a Legacy Video BIOS, which can still be provided by a video card. 1758:
UEFI machines can have one of the following classes, which were used to help ease the transition to UEFI:
8322: 7919: 7244: 6069: 5811: 2909:
laptop models with Secure Boot that were missing certain certificates required for its proper operation.
2315:
is supported; Graphics Output Protocol (GOP) is not supported. Therefore, PCs running 64-bit versions of
1329: 1263:
In November 2017, Intel announced that it planned to phase out support CSM for client platforms by 2020.
1105: 430:) suitable for embedded environments such as Yocto. Many Linux and BSD distros can support both recipes. 395: 176: 7316: 7044: 6780: 1124:
file systems. The ESP also provides space for a boot sector as part of the backward BIOS compatibility.
546:
processors can be supported. Unofficial UEFI support is under development for POWERPC64 by implementing
7613: 6465: 5308: 2788: 2371: 1270:
In August 2023, Intel announced that it planned to phase out support CSM for server platforms by 2024.
711: 6757: 6633: 3671: 7960: 7786: 7758: 7364: 4935: 2867: 2757: 2740: 2277: 1783: 1425: 1417: 691: 650:
per disk) are relaxed. More specifically, GPT allows for a maximum disk and partition size of 8 
618: 6186: 5952: 4505: 2257:
Leopard implement EFI v1.10 in 32-bit mode even on newer 64-bit CPUs, but full support arrived with
1944:
processors, and is proprietary software, although a portion of the code has been released under the
7636: 3142: 2902: 2727: 2680: 2137: 2107: 2076:, which had been used on its previous PowerPC-based systems. On 5 April 2006, Apple first released 1424:(since version 12.3), RHEL (since version 7), CentOS (since version 7), Debian (since version 10), 1044: 498: 320: 7294: 2897:
computer models with Secure Boot had firmware that was hardcoded to allow only executables named "
2430:
prior to version 11 unofficially supports UEFI, but is manually enabled by editing the .vmx file.
5031: 4200: 2958: 2272:(Advanced Server Limited Edition and Datacenter Server Limited Edition; based on the pre-release 1370: 1146: 1059: 666: 535: 398:, a compliance certification program for landing the generic off-the-shelf operating systems and 5422: 3603:"GitHub - andreiw/ppc64le-edk2: TianoCore UEFI for OPAL/PowerNV (PPC64/PowerPC64 Little-Endian)" 1702:
UEFI Capsule defines a Firmware-to-OS firmware update interface, marketed as modern and secure.
6276: 5639: 2952: 2776:, who attacked Red Hat for supporting Microsoft's control over the Secure Boot infrastructure. 2332: 1949: 1882: 1857:
of PCI devices are executed according to system configuration, and boot options are processed.
1302: 1249: 859: 843: 734: 407: 279: 5180: 3014:
Historically also written as Unified EFI, when UEFI was the newly introduced successor to EFI.
2219:. Grub+Linux also supports booting from a GUID partition table without UEFI. The distribution 7369: 7098:"Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open [Updated]" 3951: 3918: 3265: 2787:, contending that Microsoft's Secure Boot requirements on OEM systems were "obstructive" and 2478: 1165: 562: 446: 224: 6671: 5717:
Universal Binary Programming Guidelines, Second Edition: Extensible Firmware Interface (EFI)
4988: 4656: 2355:, with IoT Enterprise editions of Windows 11 since version 24H2 exempt from the requirement. 8167: 8133: 8083: 7953: 7848: 7765: 7689: 7682: 5514: 3509: 2898: 2836: 2077: 1997: 1963: 1687: 1528: 1321: 1200: 1101: 1078: 966: 953: 949: 922: 723: 632: 470: 248: 5984: 5751: 5694: 3303: 2374:
11.1 and later support UEFI boot for x86 systems with UEFI firmware version 2.1 or later.
805:. Boot services are available only while the firmware owns the platform (i.e., before the 8: 8174: 8147: 7978: 7818: 7772: 4603: 4007: 2917: 2851: 2795: 2784: 2769: 2328: 2308: 2285: 2273: 2133: 1981:
released an open source version of its TianoCore EDK2-based UEFI implementation from the
1967: 1735: 1679: 1623: 1612: 1523: 1515: 1494:
Methods used for launching UEFI shell depend on the manufacturer and model of the system
1405: 1401: 1397: 1389: 1084: 986: 695: 569:
processor. In comparison, the processor mode in a UEFI environment can be either 32-bit (
423: 6649: 4090: 3860: 3357: 997:. System firmware has an interpreter for EBC images. In that sense, EBC is analogous to 8435: 8206: 8140: 6739: 5837: 5536: 5467: 4222: 4189: 3809:"Linux kernel 3.15, Section 1.3. EFI 64-bit kernels can be booted from 32-bit firmware" 3499:
UEFI pre-boot guidelines and Microsoft® Windows® 8 UEFI Secure Boot for HP Business PCs
2905:" to load, regardless of any other setting. Other problems were encountered by several 2691:. Microsoft denied that the Secure Boot requirement was intended to serve as a form of 2494: 2431: 2427: 2359: 2258: 1853:
BDS is a part of the DXE. In this stage, boot devices are initialized, UEFI drivers or
1653: 1648: 1590: 1570: 1556: 1546: 1413: 1153:, including variables that indicate the file system paths to OS loaders or OS kernels. 1097: 628: 602: 415: 271: 7410: 4824: 3498: 2658: 1353: 8442: 8111: 8104: 7890: 7487: 5402: 5398:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
5375: 5371:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
5322: 5312: 4172: 3564: 3560:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
3246: 3086: 3082:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
2760:
also uses shim, but requires that both the kernel and its modules be signed as well.
2320: 2316: 2304: 2156: 2099: 2042: 1982: 1913: 1829: 1812: 1666: 1661: 1541: 1457: 1374: 1290: 789: 746: 636: 551: 438: 370: 344: 313: 275: 101: 6377: 4849: 4602:
Racherla, Sangam; Erdenberger, Silvio; Rajagopal, Harish; Ruth, Kai (January 2014).
4147: 2390:
supports UEFI booting since the 5.1 release. ArcaOS' UEFI support emulates specific
2159:" feature of Windows 8 (which allows devices to have power management comparable to 331:
The original motivation for EFI came during early development of the first Intel–HP
8407: 8354: 8347: 7933: 7855: 5561: 5460:"The Unified Extensible Firmware Interface (UEFI) — The Linux Kernel documentation" 5304:
Modern embedded computing : designing connected, pervasive, media-rich systems
2812: 2707:
to decide whether or not Secure Boot can be managed by users of their x86 systems.
2696: 2336: 2254: 1953: 1874: 1691: 1637: 1598: 1551: 1536: 1286: 1032: 1010: 897: 252: 240: 196: 2448:
5.0 hypervisor officially supports UEFI. Version 6.5 adds support for Secure Boot.
1335:
Version 2.5 of the UEFI specification adds support for accessing boot images over
1108:
volumes on optical discs. For use on ESPs, UEFI defines a specific version of the
8283: 7841: 7696: 7147:"Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw" 6209: 5723: 5396: 5369: 4581: 3558: 3080: 2772:
files signed by Microsoft. However, the proposal was criticized by Linux creator
2715: 2118: 2088: 2034: 1992:
An implementation of the UEFI API was introduced into the Universal Boot Loader (
1971: 1739: 1161: 1109: 1093: 1006: 892: 6501: 5584:"Microsoft Announces "Project Mu" For Open-Source UEFI Alternative To TianoCore" 2893:
Following the release of Windows 8 in late 2012, it was discovered that certain
1273:
As of today, all computers based on Intel platforms no longer have CSM support.
1149:(usually boot loader). The boot configuration is defined by variables stored in 380:
Version 2.0 of the UEFI specification was released on 31 January 2006. It added
7811: 6502:"Using EFI/UEFI firmware in a VMware Virtual Machine | VMware Communities" 6479: 6015: 5442: 4423: 3197:"Emulex UEFI Implementation Delivers Industry-leading Features for IBM Systems" 2839:
and shim, which refuse buggy or vulnerability intermediate bootloader (usually
2773: 2744: 2692: 2684: 2653: 2296:
family of processors, implement EFI, a requirement of the platform through the
2250: 1257: 622: 411: 410:
compliance. In October 2020, Arm announced the extension of the program to the
388: 6802: 6402: 5013: 476:
Flexible pre-OS environment, including network capability, GUI, multi language
8458: 8006: 7999: 7737: 7666: 7390: 5326: 4194: 2783:
free software development group Hispalinux filed a formal complaint with the
2752: 2666: 2634: 2424:
3 software for Mac OS X can boot Mac OS X Server virtual machines using UEFI.
2421: 2394:
functionality which the operating system depends on (particularly interrupts
2073: 1890: 1170:<EFI_SYSTEM_PARTITION>\EFI\BOOT\BOOT<MACHINE_TYPE_SHORT_NAME>.EFI 998: 982: 753: 521:
It is also possible for operating systems to access UEFI configuration data.
146: 3639: 2756:
Microsoft key (for compatibility reasons) to be included in their firmware.
2726:
without a distribution's developer disclosing the private key (however, the
1448: 1248:
that do not support UEFI to still be used. It also provides required legacy
1062:(IBVs) to design graphical interfaces for pre-boot configuration. UEFI uses 294:
as proprietary software, UEFI is an open standard maintained by an industry
8261: 8027: 7779: 6381: 5812:"Windows Hardware Certification Requirements for Client and Server Systems" 2731: 2513: 2281: 2269: 2208: 2148: 2114: 2087:
Since 2005, EFI has also been implemented on non-PC architectures, such as
601:
support from a UEFI boot loader as the requirement. UEFI handover protocol
586: 452:
The latest UEFI specification, version 2.10, was published in August 2022.
381: 168: 6602: 5896: 5302: 3602: 3456: 3164: 1771:
Class 3: UEFI without a CSM interface and with an external UEFI interface.
1156:
OS boot loaders can be automatically detected by UEFI, which enables easy
8393: 8329: 7992: 7944: 7559:
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
5039: 4799: 4481:"The PC BIOS will be killed off by 2020 as Intel plans move to pure UEFI" 3372:"Unified Extensible Firmware Interface (UEFI) Specification Version 2.10" 3358:"Microsoft announces Project Mu, an open-source release of the UEFI core" 2840: 2502: 2181:<EFI_SYSTEM_PARTITION>/BOOT/BOOT<MACHINE_TYPE_SHORT_NAME>.EFI 1945: 1825: 1731: 1707: 1495: 1461: 1385: 1281:
The UEFI specification includes support for booting over network via the
1223: 1142: 1138: 1089: 909: 761: 363: 28: 7045:"Exclusive: Open software group files complaint against Microsoft to EU" 6616: 2041:
systems, released in 2002, implemented EFI 1.10; they were able to boot
8428: 8414: 8254: 7926: 7728: 7563: 5188: 5159: 5101: 4911: 4531:"Removal of Legacy Boot Support for Intel Platforms Technical Advisory" 4296: 4015: 3864: 3227: 2969: 2930: 2879: 2831: 2827: 2816: 2748: 2700: 2497:
functions in UEFI applications. EADK can be freely downloaded from the
2451: 2352: 2242: 2160: 2065: 2009: 1993: 1986: 1854: 1779: 1778:
Starting from the 10th Gen Intel Core, Intel no longer provides Legacy
1711: 1460:, which can be used to execute other UEFI applications, including UEFI 1429: 1409: 1393: 1245: 867: 835: 769: 765: 566: 543: 427: 399: 295: 73: 7194: 6057:
Unified Extensible Firmware Interface (UEFI) Implementation Guidelines
5736:
Apple's Transition from Open Firmware to Extensible Firmware Interface
4874: 4759: 4506:"CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit" 3879: 2464:
can be used with the Open Virtual Machine Firmware (OVMF) provided by
2284:
Advanced Server Limited Edition (pre-release Windows Server 2003) and
577:, Itanium, and AArch64). 64-bit UEFI firmware implementations support 534:
As of version 2.5, processor bindings exist for Itanium, x86, x86-64,
8400: 8048: 7883: 7876: 7832: 7544:
Microsoft UEFI Support and Requirements for Windows Operating Systems
7219: 6190: 4963: 3783: 3457:"Non-boot disks can use a GPT partition table even with no UEFI bios" 2675: 2344: 2340: 2324: 2038: 2004:
distributions use the U-Boot UEFI implementation in conjunction with
1978: 1808: 1747: 1703: 1433: 1381: 757: 578: 434: 340: 256: 244: 172: 164: 7023:"Linus Torvalds: I will not change Linux to "deep-throat Microsoft"" 6378:"ArcaOS 5.1 gives vintage OS/2 a UEFI facelift for the 21st century" 5775:
Evaluating UEFI using Commercially Available Platforms and Solutions
5489: 2418:
Intel hosts an Open Virtual Machine Firmware project on SourceForge.
1966:' implementation of UEFI is branded as SecureCore Technology (SCT). 1187: 8421: 8386: 8220: 8076: 8013: 7869: 7862: 7594: 6975: 6715:"TianoCore on SourceForge: EDK2 Application Development Kit (EADK)" 6430:"Modern OS/2 distribution ArcaOS adds support for booting via UEFI" 5345: 4679: 3834: 3435: 3283: 2964: 2935: 2912:
In January 2013, a bug surrounding the UEFI implementation on some
2875: 2844: 2723: 2641: 2630: 2375: 2216: 2211:
has been able to use EFI at boot time since early 2000s, using the
2144: 2005: 1957: 1889:. A typical modern OS will prefer to use its own programs (such as 1800: 1768:
Class 2: UEFI with CSM and external UEFI interfaces, eg. UEFI Boot.
1421: 1195:
Booting UEFI systems from GPT-partitioned disks is commonly called
773: 707: 651: 640: 466: 287: 267: 228: 112: 7528: 7430: 3672:"Unified Extensible Firmware Interface Specification, Version 2.7" 2362:
awarded a grant to a developer seeking to add UEFI support to the
2140:) launched several consumer-oriented motherboards using the Intel 2031:
workstations and servers, released in 2000, implemented EFI 1.02.
1970:
offers its own UEFI firmware implementation known as Aptio, while
883:
after a crash for the operating system to retrieve after a reboot.
8315: 8055: 8034: 7985: 7825: 7804: 7598: 7374: 6351: 6326: 4684: 4552: 4340:"UEFI Specification Version 2.5, Section 12.3 File System Format" 3838: 2913: 2906: 2807: 2803: 2711: 2674:
In 2011, Microsoft announced that computers certified to run its
2472: 2399: 2395: 2381: 2363: 2312: 2303:
Microsoft introduced UEFI for x64 Windows operating systems with
2293: 2265: 2236: 2058: 2050: 2028: 1933: 1804: 1437: 1229:
BIOS-style booting from MBR-partitioned disks is commonly called
1157: 1002: 627:
In addition to the standard PC disk partition scheme that uses a
590: 492: 442: 332: 232: 7001:"No Microsoft certificate support in Linux kernel says Torvalds" 6254: 4601: 2311:
however only UGA (Universal Graphic Adapter) 1.1 or Legacy BIOS
1203:
on MBR-partitioned disks. Such a boot scheme is commonly called
686:
and Linux are GPT-aware. Such a setup is usually referred to as
465:
Ability to boot a disk containing large partitions (over 2 
8368: 8097: 8062: 7363:
Zimmer, Vincent; Rothman, Michael; Hale, Robert (10 May 2007).
6847:"Next-gen boot spec could forever lock Linux off Windows 8 PCS" 5427: 5286: 3530:"Next-gen boot spec could forever lock Linux off Windows 8 PCS" 3308: 3288: 3028: 2894: 2871: 2863: 2859: 2442: 2387: 2220: 2125: 2092: 1941: 1929: 1909: 1506:) a boot option associated with the compiled version of shell. 1358: 1173: 1063: 945: 683: 594: 574: 555: 6900:"Windows 10 to make the Secure Boot alt-OS lock out a reality" 6750: 6524:"Announcing VMware Workstation 14 - VMware Workstation Zealot" 6106:"Unified Extended Firmware Interface support in Windows Vista" 5746: 5744: 4398: 4148:"UEFI system booting from MBR partition table and GRUB legacy" 925:. They can be executed from the UEFI Shell, by the firmware's 319:
UEFI is independent of platform and programming language, but
8361: 8213: 8069: 8041: 8020: 7533: 7273:"Linux on Windows 8 PCs: Some progress, but still a nuisance" 7067:"Researchers demo exploits that bypass Windows 8 Secure Boot" 6803:"coreboot (aka LinuxBIOS): The Free/Open-Source x86 Firmware" 6718: 5395:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
5368:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
5129: 5069: 4939: 4318: 4116:"Unified Extensible Firmware Interface: EFI System Partition" 3557:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
3337: 3323: 3079:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
3031:(SMBIOS) were subsequently implemented in BIOS-based systems. 2780: 2765: 2688: 2498: 2297: 2289: 2230: 2226: 2212: 2054: 2046: 2024: 2001: 1937: 1715: 1484: 1325: 1314: 1150: 1121: 1117: 1113: 1028: 1013: 981:-specific device drivers, EFI provides for a ISA-independent 880: 745:
Some of the EFI's practices and data formats mirror those of
672: 570: 539: 484: 480: 348: 301: 6187:"Find Windows 11 specs, features, and computer requirements" 5088: 5086: 2683:) of trying to use the Secure Boot functionality of UEFI to 2481:
Shielded VMs support virtualized UEFI to enable Secure Boot.
243:. Examples of firmware that implement the specification are 202: 8306: 8299: 8268: 8090: 7744: 7721: 6480:"VMWare Workstation EFI firmware | VMware Communities" 5925:"Ubuntu will use GRUB 2 for its Secure Boot implementation" 5741: 4930: 4928: 4773:"Debian Making Progress on UEFI SecureBoot Support in 2018" 3304:"GitHub - tianocore/Tianocore.github.io: Tianocore website" 2946: 2855: 2457: 2445: 2391: 2348: 2129: 2013: 2012:), the same holds true for OpenBSD. For booting from iSCSI 1833: 1727: 1336: 1298: 1294: 1051: 941: 851: 645: 336: 263: 211: 97: 83: 7059: 6892: 5601: 4459:
Compatibility Support Module Specification (revision 0.97)
3657: 3223:
Extensible Firmware Interface (EFI) and Unified EFI (UEFI)
2743:
uses an older version of shim pre-configured for use with
2687:
the installation of alternative operating systems such as
323:
is used for the reference implementation TianoCore EDKII.
7170:"Windows 11, version 23H2 known issues and notifications" 5229:"Windows UEFI firmware update platform - Windows drivers" 5083: 3955: 3422: 3420: 3418: 1916:
UEFI, the UEFI used on all Surface models made after 2015
1743: 1682:
storage device attached to the computer. For example, an
488: 391:
architecture ('Human Interface Infrastructure' in UEFI).
291: 205: 6795: 6205:"Minimum System Requirements for Windows IoT Enterprise" 5830:"Microsoft: All You Need to Know About Windows 8 on ARM" 5752:"Intel® Platform Innovation Framework for UEFI Overview" 4925: 4315:"Intel Embedded Graphics Drivers FAQ: BIOS and firmware" 3861:"Linux kernel documentation: Documentation/efi-stub.txt" 2110:
motherboards with ClickBIOS, HP EliteBook Notebook PCs.
1483:
Source code for a UEFI shell can be downloaded from the
1083:
An EFI system partition, often abbreviated to ESP, is a
940:
A type of UEFI application is an OS boot loader such as
913:
Interaction between the EFI boot manager and EFI drivers
7549:
How Windows 8 Hybrid Shutdown / Fast Boot feature works
7037: 6861:"Windows 8 secure boot could complicate Linux installs" 6165:"Windows 8 secure boot could complicate Linux installs" 6156: 5503: 4281: 3544:"Windows 8 secure boot could complicate Linux installs" 2625:
Numerous digital rights activists have protested UEFI.
694:. In the case of GRUB, such a configuration requires a 437:
announced Project Mu, a fork of TianoCore EDK2 used in
6878:"Is Microsoft Blocking Linux Booting on ARM Hardware?" 5919: 5917: 5915: 5394: 5367: 4704: 4702: 4142: 4140: 4138: 4136: 3556: 3415: 3078: 2117:
machines (x3550 M2, x3650 M2, iDataPlex dx360 M2) and
1332:(FCoE) as supported protocols for accessing the SANs. 422:. Arm SystemReady defined the Base Boot Requirements ( 7167: 5886:
by maintainer Brett Johnson made on 27 February 2004.
4037:"GRUB and the boot process on UEFI-based x86 systems" 3904: 1839: 208: 7534:
Intel-sponsored open-source EFI Framework initiative
7521: 7339:"Booting Linux using UEFI can brick Samsung laptops" 6070:"Open Virtual Machine Firmware (OVMF) Status Report" 4958: 4956: 4605:
Storage and Network Convergence Using FCoE and iSCSI
4245: 4243: 4085: 4083: 3945: 3943: 3941: 3939: 2516:" C program written using EADK looks similar to its 2016:
can be used as a UEFI application loaded by U-Boot.
1774:
Class 3+: UEFI class 3 that has Secure Boot enabled.
1746:
systems, the UEFI firmware is usually stored in the
1678:
Extensions to UEFI can be loaded from virtually any
1172:; for example, the file path to the OS loader on an 933:
can be developed and installed independently of the
772:
can boot from a GPT disk that is larger than 2 
123: 5912: 5423:"PI Boot Flow · tianocore/Tianocore.github.io Wiki" 4699: 4190:"EFI and Linux: The Future Is Here, and It's Awful" 4133: 2215:EFI boot loader or, more recently, EFI versions of 1365:The UEFI specification defines a protocol known as 593:on 32-bit UEFI firmware implementations running on 199: 7331: 7309: 6672:"What's New in Hyper-V for Windows Server 2012 R2" 6002: 5889: 4898: 4896: 4710:"Windows 8 Secure Boot: The Controversy Continues" 4183: 4181: 3952:"Make the most of large drives with GPT and Linux" 3485:"OA 3.0 Tool: Command-line and config file syntax" 7362: 6403:"Booting ArcaOS on UEFI hardware (demonstration)" 6143:"Microsoft Touts Incredible Windows 8 Boot Times" 6098: 5817:emulation and legacy PC/AT boot must be disabled. 5792: 5341:"Intel schrapt bios-compatibiliteit uefi in 2020" 4953: 4735:"Secure Boot for ESXi 6.5 - Hypervisor Assurance" 4446: 4444: 4251:"Samsung UEFI bug: Notebook bricked from Windows" 4240: 4223:"What is efifb? — The Linux Kernel documentation" 4080: 3936: 3704: 3449: 3393: 1845:transferring configuration data to the hardware. 1476:), loading UEFI drivers, and editing text files ( 1137:Unlike the legacy PC BIOS, UEFI does not rely on 8456: 7408: 7388: 7267: 7265: 6970: 6968: 6632:"Statement by sr. software engineer at Oracle", 6247: 5822: 5657: 4964:"UEFI Shell Specification Version 2.0, Errata A" 3066:"Microsoft Surface Laptop 7 (13.8-inch) Chip ID" 2916:laptops was publicized, which caused them to be 1357:Example of an active Secure Boot as detected by 1244:allows legacy operating systems and some legacy 7317:"Linux acquitted in Samsung laptop UEFI deaths" 5625: 4893: 4671: 4545:"Red Hat Enterprise Linux 6 Installation Guide" 4178: 4062:"UEFI Booting 64-bit Redhat Enterprise Linux 6" 3778: 3776: 3774: 3772: 3770: 3768: 3766: 3764: 1819: 373:, which has developed the specification as the 163:The UEFI implementation is usually stored on a 7970: 7409:de Boyne Pollard, Jonathan (8 December 2011). 7295:"Lenovo UEFI Only Wants To Boot Windows, RHEL" 5861:""Last Mile" Barriers to Removing Legacy BIOS" 5482: 4572: 4452:"Intel® Platform Innovation Framework for EFI" 4441: 3731: 2183:, where short name of the machine type can be 1974:offers InsydeH2O, and Byosoft offers ByoCore. 1860: 1436:(since version 8.4). As of January 2024, 286:. Contrary to its predecessor BIOS which is a 7579: 7262: 6965: 6951:"Shimming your way to Linux on Windows 8 PCs" 6782:The Coming War on General Purpose Computation 6294: 4631:"New UEFI HTTP Boot support in UEFI 2.5" 4332: 4175:. Cl.cam.ac.uk. Retrieved on 30 October 2013. 3784:"UEFI Specifications (version 2.4 and older)" 3191: 3189: 3187: 3185: 6995: 6993: 6872: 6870: 5537:"Aptio®: The Complete UEFI Product Solution" 5300: 4002: 4000: 3998: 3761: 3471:"Using the OA 3.0 Tool on the factory floor" 3364: 2949:(Advanced Configuration and Power Interface) 1168:. The format of the file path is defined as 612: 175:. They can use different I/O protocols, but 7389:de Boyne Pollard, Jonathan (11 July 2011). 6976:"Ubuntu details its UEFI Secure Boot plans" 5036:Inclusion of UEFI shell in Linux distro iso 4575:"Advances in Pre-OS Networking in UEFI 2.4" 4373:"Technical Note TN2166: Secrets of the GPT" 3681: 3284:"GitHub - tianocore/Edk: Git mirror of EDK" 2485: 1848: 445:products. The project promotes the idea of 16:Operating system and firmware specification 8181: 7586: 7572: 7095: 7015: 6225: 5858: 5683: 5554: 5529: 3710: 3690:"LBA explained — Solving the 3TB Problem?" 3182: 3143:"MS denies secure boot will exclude Linux" 3025:Advanced Configuration and Power Interface 2662:Examples of custom Secure Boot public keys 2475:virtual machine supports virtualized UEFI. 1811:). It consists of minimal code written in 1348: 825:(GOP) provides runtime services; see also 529: 7476:"UEFI Today: Bootstrapping the Continuum" 7287: 7121:"BlackLotus UEFI bootkit: Myth confirmed" 6990: 6867: 6504:. Communities.vmware.com. 6 December 2014 4108: 3995: 3715:. Intel Architecture Blog. Archived from 3687: 2802:Microsoft and exposes the possibility of 2229:has used (U)EFI as its boot mechanism on 1956:. TianoCore can be used as a payload for 1718:for Linux each support the UEFI Capsule. 1500:<EFI_SYSTEM_PARTITION>/SHELLX64.EFI 7593: 7451:"UEFI – Just How Important It Really Is" 7168:WindowsCommunications (26 August 2024). 6778: 6482:. Communities.vmware.com. 3 October 2012 6302:"Oracle Solaris 11.1 — What's New" 5254:"Getting Started | Microchip Technology" 3592:UEFI specification 2.3.1, section 1.8.1. 3137: 3135: 3099: 3023:Large disk support and features such as 2665: 2657: 2276:codebase) implemented EFI 1.10 in 2002. 1908: 1447: 1352: 1326:Internet Small Computer System Interface 1186: 908: 788: 7448: 6427: 6162: 5665:"Installing OpenBSD 6.3 on Raspberry 3" 5301:Barry, Peter; Crowley, Patrick (2012). 5226: 5152:"Unified Extensible Firmware Interface" 5094:"Unified Extensible Firmware Interface" 4904:"Unified Extensible Firmware Interface" 4797: 4770: 4187: 4173:IBM PC Real Time Clock should run in UT 3637: 2471:The second generation of the Microsoft 1794: 1072: 1001:, the ISA-independent firmware used in 818:Graphics Output Protocol (GOP) services 8457: 7473: 7144: 7118: 6375: 5513:. Phoenix Technologies. Archived from 5401:. Walter de Gruyter GmbH & Co KG. 5374:. Walter de Gruyter GmbH & Co KG. 4294: 3563:. Walter de Gruyter GmbH & Co KG. 3105: 3085:. Walter de Gruyter GmbH & Co KG. 2854:support UEFI Secure Boot now, such as 2505:project. As an example, a port of the 2406: 826: 343:, 1 MB addressable memory space, 8465:Unified Extensible Firmware Interface 7567: 7428: 6094:Boot to UEFI Mode or legacy BIOS mode 6067: 5859:Richardson, Brian (30 October 2017). 4798:Garrett, Matthew (27 December 2012). 4203:from the original on 13 November 2021 3949: 3740:"UEFI Momentum — The AMD perspective" 3132: 3017: 2670:MokManager, a part of Shim bootloader 1920:Intel's implementation of EFI is the 1686:(OEM) can distribute systems with an 1468:), modifying boot manager variables ( 1412:, VMware vSphere 6.5 and a number of 756:SP1 and later and 64-bit versions of 375:Unified Extensible Firmware Interface 187:Unified Extensible Firmware Interface 22:Unified Extensible Firmware Interface 7554:Securing the Windows 10 Boot Process 7449:Kothari, Rajiv (21 September 2011). 5691:"iSCSI booting with U-Boot and iPXE" 4549:30.2.2. Configuring PXE boot for EFI 4188:Garrett, Matthew (19 January 2012). 4154:from the original on 8 December 2023 3106:Kinney, Michael (1 September 2000). 2885: 2720:GNU General Public License version 3 2378:2 is used as the boot loader on x86. 2170: 2072:. These systems used EFI instead of 2061:added UEFI capability in June 2003. 1452:Example of an UEFI shell 2.2 session 1320:OS images can be remotely stored on 1038: 740: 716:21686148-6449-6E6F-744E-656564454649 675:is enabled by turning on the option 6779:Doctorow, Cory (27 December 2011), 4573:El-Haj-Mahmoud, Samer (July 2013). 3977:"block/partitions/Kconfig (3.11.1)" 3737: 3583:UEFI Specification 2.4, section 2.3 3240: 3108:"Solving BIOS Boot Issues with EFI" 1922:Intel Platform Innovation Framework 1307:Dynamic Host Configuration Protocol 917:Beyond loading an OS, UEFI can run 797:EFI defines two types of services: 13: 7356: 7096:MENDELSOHN, Tom (12 August 2016). 6572:"VMware vSphere 6.5 Release Notes" 6163:Brodkin, Jon (21 September 2011). 4800:"Secure Boot distribution support" 4771:Larabel, Michael (30 April 2018). 3950:Smith, Roderick W. (3 July 2012). 1904: 1840:DXE – Driver Execution Environment 1472:), running partitioning programs ( 1276: 1220:Compatibility Support Module (CSM) 900:is set to indicate the use of UTC. 514:Backward and forward compatibility 14: 8476: 7513: 6428:Sanders, James (13 August 2019). 6376:Proven, Liam (4 September 2023). 6036:"Extensible Firmware Interface", 3711:Richardson, Brian (10 May 2010). 3145:. The Register. 23 September 2011 2975:Python Interpreter for UEFI Shell 2292:, all of which are for the Intel 972: 929:, or by other UEFI applications. 926: 667:EFI System partition § Linux 7655: 7237: 7212: 7187: 7161: 7138: 7112: 7089: 7025:. Ars Technica. 26 February 2013 6943: 6918: 6853: 6839: 6817: 6772: 6732: 6707: 6686: 6664: 6642: 6625: 6609: 6589: 6564: 6542: 6516: 6494: 6472: 6452: 6421: 6395: 6369: 6344: 6319: 6269: 6197: 6179: 6135: 6124: 6087: 6061: 6050: 6029: 5983:. 6 October 2017. Archived from 5966: 5939: 5877: 5852: 5804: 5781:, UEFI, May 2011, archived from 5766: 5729: 5709: 5576: 5452: 5435: 5415: 5388: 5361: 5333: 4677: 4150:. Arch Linux Forums. June 2012. 3981:CONFIG_EFI_PARTITION (line #247) 3113:. pp. 47–50. Archived from 3003: 2647: 2540:<Library/ShellCEntryLib.h> 2493:(EADK) makes it possible to use 2491:EDK2 Application Development Kit 2435: 2124:In 2011, major vendors (such as 1440:support is in a planning stage. 1056:original equipment manufacturers 935:original equipment manufacturers 631:(MBR), UEFI also works with the 524: 418:market. The new program name is 283: 195: 156: 138: 27: 7431:"A BIOS to UEFI Transformation" 7411:"The Windows NT 6 boot process" 7119:Smolár, Martin (1 March 2023). 5884:Announcement of release 3.5pre1 5609:"Marrying U-Boot UEFI and GRUB" 5294: 5271: 5246: 5220: 5202: 5173: 5144: 5115: 5054: 5024: 5006: 4981: 4867: 4842: 4817: 4791: 4764: 4753: 4727: 4649: 4623: 4595: 4566: 4537: 4523: 4498: 4473: 4416: 4391: 4365: 4349:. April 2015. pp. 536, 537 4307: 4288: 4274: 4271:UEFI specification, section 7.3 4265: 4215: 4166: 4054: 4029: 3969: 3853: 3827: 3801: 3664: 3650: 3631: 3613: 3595: 3586: 3577: 3550: 3536: 3522: 3491: 3477: 3463: 3350: 3330: 3316: 3296: 3276: 3258: 3234: 3214: 3165:"Memory Map (x86) - OSDev Wiki" 2847:) to load in the boot process. 2070:Intel-based Macintosh computers 1893:) to control hardware devices. 1868: 1697: 1684:original equipment manufacturer 1160:from removable devices such as 1132: 921:, which reside as files on the 904: 619:GPT § Operating systems support 394:In October 2018, Arm announced 290:standard originally created by 145:Boot order selection menu on a 6131:Microsoft Basic Display Driver 6068:Ersek, Laszlo (January 2015). 4295:Batard, Pete (13 March 2020). 3688:Hardwidge, Ben (1 June 2010). 3403:. Microsoft. 15 September 2009 3241:Wei, Dong (2006), "foreword", 3157: 3072: 3058: 3044: 3008: 2996: 2987: 2465: 1789: 1488: 1342: 1311:Trivial File Transfer Protocol 1213: 1066:to encode strings by default. 1045:GOP (Graphics Output Protocol) 1027:for 37 file systems (based on 870:services (for RISC processors) 589:supports 64-bit kernels to be 547: 235:a computer's hardware and its 1: 8293:Preboot Execution Environment 7898:Run-Time Abstraction Services 6831:, SourceForge, archived from 6758:"Interview: Ronald G Minnich" 6650:"Testing secureboot with KVM" 6464:, SourceForge, archived from 6461:Open Virtual Machine Firmware 6233:"FreeBSD to get UEFI support" 6014:, SourceForge, archived from 6011:rEFIt — Windows Vista and EFI 5974:"State of the Port to x86-64" 4659:. Microsoft. 10 December 2014 3912:"FAQ: Drive Partition Limits" 3887:"FAQ: Drive Partition Limits" 3835:"x86, efi: Handover Protocol" 3789:. Unified EFI, Inc. June 2013 3270:Extensible Firmware Interface 3266:"1.10 Specification overview" 3038: 2718:noted that conditions in the 2413:HP Integrity Virtual Machines 1673: 1443: 1283:Preboot eXecution Environment 1035:for chain-loading NTFS ESPs. 455: 357:Extensible Firmware Interface 306:Extensible Firmware Interface 7752:MultiProcessor Specification 7435:Roderick W. Smith's Web Page 7145:Goodin, Dan (6 March 2023). 6601:, VirtualBox, archived from 6108:. Microsoft. 26 October 2006 5799:Asus P67 Motherboard Preview 4969:. Unified EFI, Inc. May 2012 4611:(2nd ed.). IBM Redbooks 3917:. UEFI Forum. Archived from 3713:"Ask a BIOS Guy: "Why UEFI"" 3638:kontais (3 September 2015). 2941:UEFI Platform Initialization 2724:GNU GRand Unified Bootloader 2620: 2019: 1820:PEI – Pre-EFI Initialization 1518:supported by the EFI shell. 1380:Secure Boot is supported by 1252:(SMM) functionality, called 1242:Compatibility Support Module 979:instruction set architecture 959: 339:limitations (such as 16-bit 88:UEFI Platform Initialization 7: 8323:Remote Initial Program Load 7920:Common Firmware Environment 7429:Smith, Roderick W. (2011). 7195:"HowTos/UEFI - CentOS Wiki" 6550:"What's New in vSphere 5.0" 6042:, Microsoft, archived from 5814:. Microsoft. January 2013. 5032:"Email Archive: edk2-devel" 4282:"Free Software EFI Drivers" 2924: 2722:may prevent the use of the 1861:TSL – Transient System Load 1828:initialization (initialize 1721: 1514:The following is a list of 1509: 1432:(since version 21.3)., and 1330:Fibre Channel over Ethernet 784: 779: 639:per disk, and up to 2  506:Python interpreter for UEFI 10: 8481: 7912:Hybrid firmware bootloader 7653: 7220:"SecureBoot - Debian Wiki" 6805:. YouTube. 31 October 2008 5542:. American Megatrends, Inc 5309:Morgan Kaufmann Publishers 5062:"TianoCore on SourceForge" 5014:"tianocore/edk2: releases" 4936:"EFI Shells and Scripting" 3514:: CS1 maint: url-status ( 2685:hinder or outright prevent 2654:Windows 8 § Reception 2651: 2367:for arm64 in FreeBSD 11.0. 1873:The UEFI hands off to the 1753: 1346: 1127: 1076: 712:Globally Unique Identifier 710:in size, this partition's 664: 616: 355:. It was later renamed to 335:systems in the mid-1990s. 326: 278:, although it can provide 8378: 8339: 8282: 8246: 8198: 8191: 8157: 8125: 7961:Comparison of bootloaders 7943: 7911: 7796: 7706: 7674: 7664: 7605: 6760:. Fosdem. 6 February 2007 6528:VMware Workstation Zealot 6039:Windows Server TechCenter 4760:HowTos/UEFI - CentOS Wiki 4461:. Intel. 4 September 2007 3621:"Tianocore for OpenPOWER" 3052:"Documentation - Winbond" 2534:<Library/UefiLib.h> 2347:, the UEFI firmware with 2278:Windows XP 64-bit Edition 2245:uses EFI for its line of 2147:chipset and AMD 9 Series 1784:Intel Graphics Technology 1750:chip of the motherboard. 1428:(since version 12.04.2), 1016:computers, among others. 793:Example of UEFI variables 613:Disk device compatibility 504:Python programming using 487:) or 64-bit (for example 266:which was present in the 239:for interaction with the 118: 108: 93: 79: 69: 59: 51: 43: 35: 26: 7480:Intel Technology Journal 7415:Frequently Given Answers 7395:Frequently Given Answers 7047:. Reuters. 26 March 2013 6930:Free Software Foundation 5214:tianocore-docs.github.io 4825:"Linux Mint Secure boot" 4680:"UEFI and "secure boot"" 2980: 2903:Red Hat Enterprise Linux 2728:Free Software Foundation 2681:Free Software Foundation 2522: 2501:'s TianoCore UDK / EDK2 2486:Applications development 2259:OS X v10.8 Mountain Lion 1928:. Tiano runs on Intel's 1899: 1849:BDS – Boot Device Select 1060:independent BIOS vendors 977:In addition to standard 823:Graphics Output Protocol 714:(GUID) in GPT scheme is 660: 7849:Phoenix SecureCore UEFI 5948:OpenVMS Release History 5633:"UEFI on Top of U-Boot" 5210:"Signed Capsule Update" 4510:Securelist by Kaspersky 3226:, Intel, archived from 2959:Trusted Platform Module 2874:(Debian 10 and later), 1184:on ARM64 architecture. 1147:operating system kernel 752:The 64-bit versions of 704:Primary Partition Table 530:Processor compatibility 304:developed the original 280:backwards compatibility 219:or as an acronym) is a 171:that is located on the 7391:"The EFI boot process" 7249:documentation.suse.com 5564:. Insyde Software Corp 5490:"TianoCore - coreboot" 5443:"Engineering Services" 4850:"8.4 | AlmaLinux Wiki" 4657:"Secure Boot Overview" 3029:System Management BIOS 2953:System Management BIOS 2862:(CentOS 7 and later), 2779:On 26 March 2013, the 2671: 2663: 2333:Windows Server 2008 R2 1950:Eclipse Public License 1917: 1453: 1362: 1303:User Datagram Protocol 1250:System Management Mode 1192: 1182:\efi\boot\bootaa64.efi 914: 794: 735:backward compatibility 573:, AArch32) or 64-bit ( 7539:Intel EFI/UEFI portal 7474:Fisher, Doug (2011). 6255:"UEFI - FreeBSD Wiki" 3742:. AMD. Archived from 3432:3.4 BIOS installation 3342:, Unified EFI Forum, 2669: 2661: 2479:Google Cloud Platform 2358:On 5 March 2013, the 2113:In 2009, IBM shipped 1912: 1451: 1356: 1349:Secure Boot criticism 1322:storage area networks 1190: 1178:\efi\boot\bootx64.efi 1166:computer architecture 1054:sense). These enable 912: 792: 447:Firmware as a Service 353:Intel Boot Initiative 8168:EFI system partition 8134:GUID Partition Table 8084:Windows Boot Manager 7954:Bootloader unlocking 7766:Legacy Plug and Play 7690:Open-source firmware 7683:Proprietary firmware 7500:on 27 September 2013 6863:. 21 September 2011. 6605:on 28 September 2010 5990:on 22 September 2020 5951:, HP, archived from 5722:24 July 2008 at the 5645:on 11 September 2018 5098:Launching UEFI Shell 4804:Mjg59.dreamwidth.org 4635:firmwaresecurity.com 4424:"EFISTUB - ArchWiki" 3546:. 21 September 2011. 3324:"What is TianoCore?" 2899:Windows Boot Manager 2858:(RHEL 7 and later), 2837:Windows Boot Manager 2796:Black Hat conference 2177:booted from a (U)EFI 2151:chipsets with UEFI. 1964:Phoenix Technologies 1795:SEC – Security Phase 1762:Class 0: Legacy BIOS 1688:EFI system partition 1420:(since version 18), 1201:EFI System Partition 1079:EFI system partition 1073:EFI system partition 967:BIOS interrupt calls 954:Windows Boot Manager 923:EFI system partition 724:EFI system partition 677:CONFIG_EFI_PARTITION 633:GUID Partition Table 495:) pre-OS environment 479:32-bit (for example 471:GUID Partition Table 282:with the BIOS using 147:Lenovo ThinkPad T470 8175:BIOS boot partition 8148:Apple Partition Map 7979:Acronis OS Selector 7819:American Megatrends 7529:UEFI Specifications 7174:learn.microsoft.com 6978:. Linux Weekly News 6018:on 5 September 2008 5898:EFI version of Grub 5840:on 6 September 2013 5671:on 21 November 2018 5517:on 6 September 2010 5511:"SecureCore Tiano™" 5181:"GRUB EFI Examples" 4739:VMware vSphere Blog 4399:"UEFI - OSDev Wiki" 4377:developer.apple.com 4297:"pbatard/uefi-ntfs" 3658:"lowRISC · lowRISC" 3360:. 20 December 2018. 2852:Linux distributions 2826:In August 2024 the 2785:European Commission 2518:usual C counterpart 2407:With virtualization 2329:Windows Server 2008 2309:Windows Server 2008 2286:Windows Server 2003 2274:Windows Server 2003 2233:systems since 2002. 1968:American Megatrends 1736:mass storage device 1414:Linux distributions 1398:Windows Server 2016 1390:Windows Server 2012 1373:with an acceptable 1285:(PXE). PXE booting 1085:data storage device 987:non-volatile memory 706:). Commonly 1  696:BIOS boot partition 692:bootstrap code area 671:Support for GPT in 565:that used a 16-bit 179:is the most common. 23: 8436:Power-on self-test 8141:Master boot record 7461:on 25 October 2012 7370:Dr. Dobb's Journal 7365:"EFI Architecture" 7125:welivesecurity.com 6880:. Computerworld UK 6674:. MicrosoftTechNet 6440:on 21 October 2019 5901:, Debian GNU/Linux 5470:on 25 October 2020 5233:docs.microsoft.com 4854:wiki.almalinux.org 4428:wiki.archlinux.org 4091:"UEFI Bootloaders" 3627:. 12 October 2015. 3473:. 25 October 2021. 3401:"UEFI and Windows" 3120:on 23 January 2007 3004:§ CSM booting 2672: 2664: 2594:"hello, world 2495:standard C library 2432:VMware Workstation 2428:VMware Workstation 2360:FreeBSD Foundation 2068:shipped its first 2008:for booting (e.g. 1996:) in 2017. On the 1977:In December 2018, 1918: 1879:ExitBootServices() 1740:network connection 1454: 1363: 1193: 915: 807:ExitBootServices() 795: 637:primary partitions 629:master boot record 433:In December 2018, 272:personal computers 262:UEFI replaces the 249:Phoenix SecureCore 21: 8452: 8451: 8278: 8277: 8126:Partition layouts 8121: 8120: 8105:Plop Boot Manager 7907: 7906: 6468:on 6 October 2011 6074:Linux KVM Project 6046:on 30 August 2006 5955:on 5 January 2009 5715:Apple Computer. " 5408:978-1-5015-0569-0 5381:978-1-5015-0569-0 5318:978-0-12-394407-8 5258:www.microchip.com 4379:. 6 November 2006 3867:. 1 February 2014 3813:kernelnewbies.org 3749:on 4 January 2014 3719:on 9 October 2010 3625:Firmware Security 3570:978-1-5015-0569-0 3252:978-0-9743649-0-2 3230:on 5 January 2010 3092:978-1-5015-0569-0 2886:Firmware problems 2629:, a co-author of 2627:Ronald G. Minnich 2321:Windows Vista SP2 2317:Windows Vista SP1 2305:Windows Vista SP1 2171:Operating systems 2157:Connected Standby 2064:In January 2006, 1914:Microsoft Surface 1830:memory controller 1813:assembly language 1458:shell environment 1375:digital signature 1291:Internet Protocol 1287:network protocols 1039:Graphics features 931:UEFI applications 919:UEFI applications 875:Variable services 827:Graphics features 747:Microsoft Windows 741:Microsoft Windows 439:Microsoft Surface 371:Unified EFI Forum 347:programming, and 345:assembly language 314:Unified EFI Forum 276:IBM PC compatible 227:for the platform 132: 131: 102:IBM PC compatible 80:Related standards 8472: 8445: 8438: 8431: 8424: 8417: 8410: 8408:Execute in place 8403: 8396: 8389: 8371: 8364: 8357: 8350: 8332: 8325: 8318: 8309: 8302: 8295: 8271: 8264: 8257: 8237: 8230: 8223: 8216: 8209: 8196: 8195: 8184: 8177: 8170: 8150: 8143: 8136: 8114: 8107: 8100: 8093: 8086: 8079: 8072: 8065: 8058: 8051: 8044: 8037: 8030: 8023: 8016: 8009: 8002: 7995: 7988: 7981: 7968: 7967: 7963: 7956: 7936: 7929: 7922: 7900: 7893: 7886: 7879: 7872: 7865: 7858: 7856:TianoCore EDK II 7851: 7844: 7835: 7828: 7821: 7814: 7807: 7789: 7782: 7775: 7768: 7761: 7754: 7747: 7740: 7731: 7724: 7717: 7699: 7692: 7685: 7672: 7671: 7659: 7646: 7639: 7630: 7623: 7616: 7588: 7581: 7574: 7565: 7564: 7525: 7524: 7522:Official website 7509: 7507: 7505: 7496:. Archived from 7470: 7468: 7466: 7457:. Archived from 7455:Hardware Secrets 7445: 7443: 7441: 7425: 7423: 7421: 7405: 7403: 7401: 7385: 7383: 7381: 7351: 7350: 7348: 7346: 7335: 7329: 7328: 7326: 7324: 7313: 7307: 7306: 7304: 7302: 7291: 7285: 7284: 7282: 7280: 7269: 7260: 7259: 7257: 7255: 7241: 7235: 7234: 7232: 7230: 7216: 7210: 7209: 7207: 7205: 7191: 7185: 7184: 7182: 7180: 7165: 7159: 7158: 7156: 7154: 7142: 7136: 7135: 7133: 7131: 7116: 7110: 7109: 7107: 7105: 7093: 7087: 7086: 7084: 7082: 7077:on 5 August 2013 7073:. Archived from 7063: 7057: 7056: 7054: 7052: 7041: 7035: 7034: 7032: 7030: 7019: 7013: 7012: 7010: 7008: 6997: 6988: 6987: 6985: 6983: 6972: 6963: 6962: 6960: 6958: 6947: 6941: 6940: 6938: 6936: 6922: 6916: 6915: 6913: 6911: 6896: 6890: 6889: 6887: 6885: 6874: 6865: 6864: 6857: 6851: 6850: 6843: 6837: 6836: 6835:on 23 April 2012 6821: 6815: 6814: 6812: 6810: 6799: 6793: 6792: 6791: 6789: 6776: 6770: 6769: 6767: 6765: 6754: 6748: 6747: 6740:"Tianocore: UDK" 6736: 6730: 6729: 6727: 6725: 6711: 6705: 6704: 6702: 6700: 6690: 6684: 6683: 6681: 6679: 6668: 6662: 6661: 6659: 6657: 6646: 6640: 6639: 6629: 6623: 6622: 6613: 6607: 6606: 6593: 6587: 6586: 6584: 6582: 6568: 6562: 6561: 6559: 6557: 6546: 6540: 6539: 6537: 6535: 6530:. 22 August 2017 6520: 6514: 6513: 6511: 6509: 6498: 6492: 6491: 6489: 6487: 6476: 6470: 6469: 6456: 6450: 6449: 6447: 6445: 6436:. Archived from 6434:techrepublic.com 6425: 6419: 6418: 6416: 6414: 6399: 6393: 6392: 6390: 6388: 6373: 6367: 6366: 6364: 6362: 6348: 6342: 6341: 6339: 6337: 6323: 6317: 6316: 6314: 6312: 6306: 6298: 6292: 6291: 6289: 6287: 6273: 6267: 6266: 6264: 6262: 6251: 6245: 6244: 6242: 6240: 6229: 6223: 6222: 6220: 6218: 6201: 6195: 6194: 6183: 6177: 6176: 6174: 6172: 6160: 6154: 6153: 6151: 6149: 6139: 6133: 6128: 6122: 6121: 6119:implementations. 6115: 6113: 6102: 6096: 6091: 6085: 6084: 6082: 6080: 6065: 6059: 6054: 6048: 6047: 6033: 6027: 6026: 6025: 6023: 6006: 6000: 5999: 5997: 5995: 5989: 5978: 5970: 5964: 5963: 5962: 5960: 5943: 5937: 5936: 5934: 5932: 5921: 5910: 5909: 5908: 5906: 5893: 5887: 5881: 5875: 5874: 5872: 5870: 5865: 5856: 5850: 5849: 5847: 5845: 5836:. Archived from 5826: 5820: 5819: 5808: 5802: 5796: 5790: 5789: 5788:on 22 March 2012 5787: 5780: 5770: 5764: 5763: 5761: 5759: 5748: 5739: 5738:, mactech, 2007. 5733: 5727: 5713: 5707: 5706: 5704: 5702: 5693:. Archived from 5687: 5681: 5680: 5678: 5676: 5667:. Archived from 5661: 5655: 5654: 5652: 5650: 5644: 5638:. Archived from 5637: 5629: 5623: 5622: 5620: 5618: 5613: 5605: 5599: 5598: 5596: 5594: 5580: 5574: 5573: 5571: 5569: 5558: 5552: 5551: 5549: 5547: 5541: 5533: 5527: 5526: 5524: 5522: 5507: 5501: 5500: 5498: 5496: 5486: 5480: 5479: 5477: 5475: 5466:. Archived from 5456: 5450: 5449: 5447: 5439: 5433: 5432: 5419: 5413: 5412: 5392: 5386: 5385: 5365: 5359: 5358: 5356: 5354: 5337: 5331: 5330: 5298: 5292: 5291: 5283: 5275: 5269: 5268: 5266: 5264: 5250: 5244: 5243: 5241: 5239: 5224: 5218: 5217: 5206: 5200: 5199: 5197: 5195: 5177: 5171: 5170: 5168: 5166: 5148: 5142: 5141: 5139: 5137: 5127: 5119: 5113: 5112: 5110: 5108: 5090: 5081: 5080: 5078: 5076: 5058: 5052: 5051: 5049: 5047: 5028: 5022: 5021: 5010: 5004: 5003: 5001: 4999: 4989:"EDK2: ShellPkg" 4985: 4979: 4978: 4976: 4974: 4968: 4960: 4951: 4950: 4948: 4946: 4932: 4923: 4922: 4920: 4918: 4900: 4891: 4890: 4888: 4886: 4871: 4865: 4864: 4862: 4860: 4846: 4840: 4839: 4837: 4835: 4821: 4815: 4814: 4812: 4810: 4795: 4789: 4788: 4786: 4784: 4779:. Phoronix Media 4768: 4762: 4757: 4751: 4750: 4748: 4746: 4731: 4725: 4724: 4722: 4720: 4706: 4697: 4696: 4694: 4692: 4675: 4669: 4668: 4666: 4664: 4653: 4647: 4646: 4644: 4642: 4627: 4621: 4620: 4618: 4616: 4610: 4599: 4593: 4592: 4590: 4588: 4579: 4570: 4564: 4563: 4561: 4559: 4541: 4535: 4534: 4527: 4521: 4520: 4518: 4516: 4502: 4496: 4495: 4493: 4491: 4477: 4471: 4470: 4468: 4466: 4456: 4448: 4439: 4438: 4436: 4434: 4420: 4414: 4413: 4411: 4409: 4395: 4389: 4388: 4386: 4384: 4369: 4363: 4362: 4356: 4354: 4344: 4336: 4330: 4329: 4327: 4325: 4311: 4305: 4304: 4292: 4286: 4285: 4278: 4272: 4269: 4263: 4262: 4260: 4258: 4247: 4238: 4237: 4235: 4233: 4219: 4213: 4212: 4210: 4208: 4185: 4176: 4170: 4164: 4163: 4161: 4159: 4144: 4131: 4130: 4128: 4126: 4112: 4106: 4105: 4103: 4101: 4087: 4078: 4077: 4075: 4073: 4068:. September 2010 4058: 4052: 4051: 4049: 4047: 4033: 4027: 4026: 4024: 4022: 4004: 3993: 3992: 3990: 3988: 3973: 3967: 3966: 3964: 3962: 3947: 3934: 3933: 3931: 3929: 3924:on 22 March 2013 3923: 3916: 3908: 3902: 3901: 3899: 3897: 3891: 3883: 3877: 3876: 3874: 3872: 3857: 3851: 3850: 3848: 3846: 3831: 3825: 3824: 3822: 3820: 3805: 3799: 3798: 3796: 3794: 3788: 3780: 3759: 3758: 3756: 3754: 3748: 3735: 3729: 3728: 3726: 3724: 3708: 3702: 3701: 3699: 3697: 3685: 3679: 3678: 3676: 3668: 3662: 3661: 3654: 3648: 3647: 3635: 3629: 3628: 3617: 3611: 3610: 3599: 3593: 3590: 3584: 3581: 3575: 3574: 3554: 3548: 3547: 3540: 3534: 3533: 3526: 3520: 3519: 3513: 3505: 3503: 3495: 3489: 3488: 3481: 3475: 3474: 3467: 3461: 3460: 3453: 3447: 3446: 3444: 3442: 3424: 3413: 3412: 3410: 3408: 3397: 3391: 3390: 3388: 3386: 3376: 3368: 3362: 3361: 3354: 3348: 3347: 3334: 3328: 3327: 3320: 3314: 3313: 3312:. 8 August 2019. 3300: 3294: 3293: 3292:. 19 March 2019. 3280: 3274: 3273: 3262: 3256: 3255: 3238: 3232: 3231: 3218: 3212: 3211: 3209: 3207: 3201: 3193: 3180: 3179: 3177: 3175: 3161: 3155: 3154: 3152: 3150: 3139: 3130: 3129: 3127: 3125: 3119: 3112: 3103: 3097: 3096: 3076: 3070: 3069: 3062: 3056: 3055: 3048: 3032: 3021: 3015: 3012: 3006: 3000: 2994: 2991: 2823:vulnerability”. 2813:ARM architecture 2789:anti-competitive 2768:key embedded in 2697:ARM architecture 2616: 2613: 2610: 2607: 2604: 2601: 2598: 2595: 2592: 2589: 2586: 2583: 2580: 2577: 2574: 2571: 2568: 2565: 2562: 2559: 2556: 2553: 2550: 2547: 2544: 2541: 2538: 2535: 2532: 2529: 2526: 2512:A minimalistic " 2438:feature of UEFI. 2337:64-bit computing 2247:Intel-based Macs 2202: 2198: 2194: 2190: 2186: 2182: 2089:embedded systems 1954:TianoCore EDK II 1880: 1875:operating system 1505: 1501: 1479: 1475: 1471: 1467: 1456:UEFI provides a 1254:CompatibilitySmm 1197:UEFI-GPT booting 1183: 1179: 1171: 1162:USB flash drives 1096:schemes include 1011:Sun Microsystems 898:Windows registry 808: 803:runtime services 717: 678: 656: 649: 542:(AArch64). Only 253:TianoCore EDK II 241:operating system 223:that defines an 218: 217: 214: 213: 210: 207: 204: 201: 160: 142: 128: 125: 31: 24: 20: 8480: 8479: 8475: 8474: 8473: 8471: 8470: 8469: 8455: 8454: 8453: 8448: 8441: 8434: 8427: 8420: 8413: 8406: 8399: 8392: 8385: 8374: 8367: 8360: 8353: 8346: 8335: 8328: 8321: 8314: 8305: 8298: 8291: 8274: 8267: 8260: 8253: 8242: 8233: 8226: 8219: 8212: 8205: 8187: 8180: 8173: 8166: 8153: 8146: 8139: 8132: 8117: 8110: 8103: 8096: 8089: 8082: 8075: 8068: 8061: 8054: 8047: 8040: 8033: 8026: 8019: 8012: 8005: 7998: 7991: 7984: 7977: 7971:Implementations 7966: 7959: 7952: 7939: 7932: 7925: 7918: 7903: 7896: 7889: 7882: 7875: 7868: 7861: 7854: 7847: 7840: 7831: 7824: 7817: 7810: 7803: 7797:Implementations 7792: 7785: 7778: 7771: 7764: 7757: 7750: 7743: 7736: 7727: 7720: 7713: 7702: 7697:Custom firmware 7695: 7688: 7681: 7660: 7651: 7642: 7635: 7626: 7619: 7612: 7601: 7592: 7520: 7519: 7516: 7503: 7501: 7494: 7464: 7462: 7439: 7437: 7419: 7417: 7399: 7397: 7379: 7377: 7359: 7357:Further reading 7354: 7344: 7342: 7337: 7336: 7332: 7322: 7320: 7315: 7314: 7310: 7300: 7298: 7293: 7292: 7288: 7278: 7276: 7271: 7270: 7263: 7253: 7251: 7243: 7242: 7238: 7228: 7226: 7224:wiki.debian.org 7218: 7217: 7213: 7203: 7201: 7199:wiki.centos.org 7193: 7192: 7188: 7178: 7176: 7166: 7162: 7152: 7150: 7143: 7139: 7129: 7127: 7117: 7113: 7103: 7101: 7094: 7090: 7080: 7078: 7065: 7064: 7060: 7050: 7048: 7043: 7042: 7038: 7028: 7026: 7021: 7020: 7016: 7006: 7004: 6999: 6998: 6991: 6981: 6979: 6974: 6973: 6966: 6956: 6954: 6949: 6948: 6944: 6934: 6932: 6924: 6923: 6919: 6909: 6907: 6906:. 20 March 2015 6898: 6897: 6893: 6883: 6881: 6876: 6875: 6868: 6859: 6858: 6854: 6845: 6844: 6840: 6823: 6822: 6818: 6808: 6806: 6801: 6800: 6796: 6787: 6785: 6777: 6773: 6763: 6761: 6756: 6755: 6751: 6738: 6737: 6733: 6723: 6721: 6713: 6712: 6708: 6698: 6696: 6692: 6691: 6687: 6677: 6675: 6670: 6669: 6665: 6655: 6653: 6652:. FedoraProject 6648: 6647: 6643: 6631: 6630: 6626: 6615: 6614: 6610: 6595: 6594: 6590: 6580: 6578: 6576:pubs.vmware.com 6570: 6569: 6565: 6555: 6553: 6548: 6547: 6543: 6533: 6531: 6522: 6521: 6517: 6507: 6505: 6500: 6499: 6495: 6485: 6483: 6478: 6477: 6473: 6458: 6457: 6453: 6443: 6441: 6426: 6422: 6412: 6410: 6409:. 8 August 2019 6401: 6400: 6396: 6386: 6384: 6374: 6370: 6360: 6358: 6356:www.openbsd.org 6350: 6349: 6345: 6335: 6333: 6331:www.openbsd.org 6325: 6324: 6320: 6310: 6308: 6304: 6300: 6299: 6295: 6285: 6283: 6281:www.freebsd.org 6275: 6274: 6270: 6260: 6258: 6253: 6252: 6248: 6238: 6236: 6231: 6230: 6226: 6216: 6214: 6210:Microsoft Learn 6203: 6202: 6198: 6185: 6184: 6180: 6170: 6168: 6161: 6157: 6147: 6145: 6141: 6140: 6136: 6129: 6125: 6111: 6109: 6104: 6103: 6099: 6092: 6088: 6078: 6076: 6066: 6062: 6055: 6051: 6035: 6034: 6030: 6021: 6019: 6008: 6007: 6003: 5993: 5991: 5987: 5981:vmssoftware.com 5976: 5972: 5971: 5967: 5958: 5956: 5945: 5944: 5940: 5930: 5928: 5923: 5922: 5913: 5904: 5902: 5895: 5894: 5890: 5882: 5878: 5868: 5866: 5863: 5857: 5853: 5843: 5841: 5828: 5827: 5823: 5810: 5809: 5805: 5797: 5793: 5785: 5778: 5772: 5771: 5767: 5757: 5755: 5750: 5749: 5742: 5734: 5730: 5724:Wayback Machine 5714: 5710: 5700: 5698: 5697:on 31 July 2020 5689: 5688: 5684: 5674: 5672: 5663: 5662: 5658: 5648: 5646: 5642: 5635: 5631: 5630: 5626: 5616: 5614: 5611: 5607: 5606: 5602: 5592: 5590: 5582: 5581: 5577: 5567: 5565: 5560: 5559: 5555: 5545: 5543: 5539: 5535: 5534: 5530: 5520: 5518: 5509: 5508: 5504: 5494: 5492: 5488: 5487: 5483: 5473: 5471: 5458: 5457: 5453: 5445: 5441: 5440: 5436: 5421: 5420: 5416: 5409: 5393: 5389: 5382: 5366: 5362: 5352: 5350: 5339: 5338: 5334: 5319: 5311:. p. 169. 5307:. Waltham, MA: 5299: 5295: 5281: 5277: 5276: 5272: 5262: 5260: 5252: 5251: 5247: 5237: 5235: 5225: 5221: 5208: 5207: 5203: 5193: 5191: 5179: 5178: 5174: 5164: 5162: 5150: 5149: 5145: 5135: 5133: 5125: 5121: 5120: 5116: 5106: 5104: 5092: 5091: 5084: 5074: 5072: 5060: 5059: 5055: 5045: 5043: 5030: 5029: 5025: 5012: 5011: 5007: 4997: 4995: 4987: 4986: 4982: 4972: 4970: 4966: 4962: 4961: 4954: 4944: 4942: 4934: 4933: 4926: 4916: 4914: 4902: 4901: 4894: 4884: 4882: 4873: 4872: 4868: 4858: 4856: 4848: 4847: 4843: 4833: 4831: 4823: 4822: 4818: 4808: 4806: 4796: 4792: 4782: 4780: 4769: 4765: 4758: 4754: 4744: 4742: 4733: 4732: 4728: 4718: 4716: 4708: 4707: 4700: 4690: 4688: 4676: 4672: 4662: 4660: 4655: 4654: 4650: 4640: 4638: 4629: 4628: 4624: 4614: 4612: 4608: 4600: 4596: 4586: 4584: 4582:Hewlett-Packard 4577: 4571: 4567: 4557: 4555: 4543: 4542: 4538: 4529: 4528: 4524: 4514: 4512: 4504: 4503: 4499: 4489: 4487: 4479: 4478: 4474: 4464: 4462: 4454: 4450: 4449: 4442: 4432: 4430: 4422: 4421: 4417: 4407: 4405: 4397: 4396: 4392: 4382: 4380: 4371: 4370: 4366: 4352: 4350: 4342: 4338: 4337: 4333: 4323: 4321: 4313: 4312: 4308: 4293: 4289: 4280: 4279: 4275: 4270: 4266: 4256: 4254: 4249: 4248: 4241: 4231: 4229: 4221: 4220: 4216: 4206: 4204: 4186: 4179: 4171: 4167: 4157: 4155: 4146: 4145: 4134: 4124: 4122: 4114: 4113: 4109: 4099: 4097: 4089: 4088: 4081: 4071: 4069: 4060: 4059: 4055: 4045: 4043: 4035: 4034: 4030: 4020: 4018: 4006: 4005: 3996: 3986: 3984: 3975: 3974: 3970: 3960: 3958: 3948: 3937: 3927: 3925: 3921: 3914: 3910: 3909: 3905: 3895: 3893: 3889: 3885: 3884: 3880: 3870: 3868: 3859: 3858: 3854: 3844: 3842: 3833: 3832: 3828: 3818: 3816: 3807: 3806: 3802: 3792: 3790: 3786: 3782: 3781: 3762: 3752: 3750: 3746: 3738:Simpson, Gary. 3736: 3732: 3722: 3720: 3709: 3705: 3695: 3693: 3686: 3682: 3674: 3670: 3669: 3665: 3656: 3655: 3651: 3636: 3632: 3619: 3618: 3614: 3601: 3600: 3596: 3591: 3587: 3582: 3578: 3571: 3555: 3551: 3542: 3541: 3537: 3528: 3527: 3523: 3507: 3506: 3501: 3497: 3496: 3492: 3487:. 29 July 2021. 3483: 3482: 3478: 3469: 3468: 3464: 3455: 3454: 3450: 3440: 3438: 3426: 3425: 3416: 3406: 3404: 3399: 3398: 3394: 3384: 3382: 3374: 3370: 3369: 3365: 3356: 3355: 3351: 3336: 3335: 3331: 3322: 3321: 3317: 3302: 3301: 3297: 3282: 3281: 3277: 3264: 3263: 3259: 3253: 3245:, Intel Press, 3239: 3235: 3220: 3219: 3215: 3205: 3203: 3199: 3195: 3194: 3183: 3173: 3171: 3163: 3162: 3158: 3148: 3146: 3141: 3140: 3133: 3123: 3121: 3117: 3110: 3104: 3100: 3093: 3077: 3073: 3068:. 22 June 2024. 3064: 3063: 3059: 3050: 3049: 3045: 3041: 3036: 3035: 3022: 3018: 3013: 3009: 3001: 2997: 2992: 2988: 2983: 2927: 2888: 2716:Matthew Garrett 2656: 2650: 2623: 2618: 2617: 2614: 2611: 2608: 2605: 2602: 2599: 2596: 2593: 2590: 2587: 2584: 2581: 2578: 2575: 2572: 2569: 2566: 2563: 2560: 2557: 2554: 2551: 2548: 2545: 2542: 2539: 2536: 2533: 2530: 2527: 2524: 2488: 2409: 2200: 2196: 2192: 2188: 2184: 2180: 2173: 2035:Hewlett-Packard 2022: 1972:Insyde Software 1907: 1905:Implementations 1902: 1878: 1871: 1863: 1851: 1842: 1822: 1797: 1792: 1756: 1724: 1700: 1676: 1671: 1512: 1503: 1499: 1477: 1473: 1469: 1465: 1446: 1351: 1345: 1279: 1277:Network booting 1216: 1181: 1177: 1169: 1135: 1130: 1110:FAT file system 1094:partition table 1081: 1075: 1041: 1031:code), used by 1007:Apple Macintosh 975: 962: 907: 893:real-time clock 806: 787: 782: 743: 715: 676: 669: 663: 654: 643: 625: 615: 532: 527: 458: 420:Arm SystemReady 396:Arm ServerReady 329: 198: 194: 184: 183: 182: 181: 180: 161: 152: 151: 150: 143: 122: 65:August 29, 2022 64: 17: 12: 11: 5: 8478: 8468: 8467: 8450: 8449: 8447: 8446: 8439: 8432: 8425: 8418: 8411: 8404: 8397: 8390: 8382: 8380: 8376: 8375: 8373: 8372: 8365: 8358: 8351: 8343: 8341: 8337: 8336: 8334: 8333: 8326: 8319: 8312: 8311: 8310: 8303: 8288: 8286: 8280: 8279: 8276: 8275: 8273: 8272: 8265: 8258: 8250: 8248: 8244: 8243: 8241: 8240: 8239: 8238: 8224: 8217: 8210: 8202: 8200: 8193: 8189: 8188: 8186: 8185: 8178: 8171: 8163: 8161: 8155: 8154: 8152: 8151: 8144: 8137: 8129: 8127: 8123: 8122: 8119: 8118: 8116: 8115: 8108: 8101: 8094: 8087: 8080: 8073: 8066: 8059: 8052: 8045: 8038: 8031: 8024: 8017: 8010: 8003: 7996: 7989: 7982: 7974: 7972: 7965: 7964: 7957: 7949: 7947: 7941: 7940: 7938: 7937: 7930: 7923: 7915: 7913: 7909: 7908: 7905: 7904: 7902: 7901: 7894: 7887: 7880: 7873: 7866: 7859: 7852: 7845: 7838: 7837: 7836: 7829: 7815: 7808: 7800: 7798: 7794: 7793: 7791: 7790: 7783: 7776: 7769: 7762: 7755: 7748: 7741: 7734: 7733: 7732: 7718: 7710: 7708: 7704: 7703: 7701: 7700: 7693: 7686: 7678: 7676: 7669: 7662: 7661: 7654: 7652: 7650: 7649: 7648: 7647: 7633: 7632: 7631: 7624: 7609: 7607: 7603: 7602: 7591: 7590: 7583: 7576: 7568: 7562: 7561: 7556: 7551: 7546: 7541: 7536: 7531: 7526: 7515: 7514:External links 7512: 7511: 7510: 7492: 7471: 7446: 7426: 7406: 7386: 7358: 7355: 7353: 7352: 7330: 7308: 7286: 7261: 7236: 7211: 7186: 7160: 7149:. Ars Technica 7137: 7111: 7100:. Ars Technica 7088: 7058: 7036: 7014: 6989: 6964: 6942: 6917: 6891: 6866: 6852: 6838: 6816: 6794: 6771: 6749: 6731: 6706: 6694:"Shielded VMs" 6685: 6663: 6641: 6624: 6608: 6588: 6563: 6541: 6515: 6493: 6471: 6451: 6420: 6394: 6368: 6343: 6318: 6293: 6268: 6246: 6224: 6196: 6178: 6167:. Ars Technica 6155: 6134: 6123: 6097: 6086: 6060: 6049: 6028: 6001: 5965: 5938: 5927:. The H Online 5911: 5888: 5876: 5851: 5821: 5803: 5791: 5765: 5740: 5728: 5708: 5682: 5656: 5624: 5600: 5575: 5553: 5528: 5502: 5481: 5464:www.kernel.org 5451: 5434: 5414: 5407: 5387: 5380: 5360: 5332: 5317: 5293: 5270: 5245: 5219: 5201: 5172: 5143: 5114: 5082: 5053: 5023: 5005: 4980: 4952: 4924: 4892: 4866: 4841: 4816: 4790: 4763: 4752: 4726: 4698: 4670: 4648: 4622: 4594: 4565: 4536: 4522: 4497: 4472: 4440: 4415: 4403:wiki.osdev.org 4390: 4364: 4331: 4306: 4287: 4273: 4264: 4239: 4227:www.kernel.org 4214: 4177: 4165: 4132: 4107: 4079: 4053: 4028: 3994: 3968: 3935: 3903: 3878: 3852: 3841:. 19 July 2012 3826: 3800: 3760: 3730: 3703: 3680: 3663: 3649: 3630: 3612: 3594: 3585: 3576: 3569: 3549: 3535: 3521: 3490: 3476: 3462: 3448: 3428:"Installation" 3414: 3392: 3363: 3349: 3329: 3315: 3295: 3275: 3257: 3251: 3233: 3213: 3181: 3169:wiki.osdev.org 3156: 3131: 3098: 3091: 3071: 3057: 3042: 3040: 3037: 3034: 3033: 3016: 3007: 2995: 2985: 2984: 2982: 2979: 2978: 2977: 2972: 2967: 2962: 2956: 2950: 2944: 2938: 2933: 2926: 2923: 2887: 2884: 2774:Linus Torvalds 2753:kernel modules 2649: 2646: 2622: 2619: 2528:<Uefi.h> 2523: 2487: 2484: 2483: 2482: 2476: 2469: 2455: 2449: 2439: 2425: 2419: 2416: 2408: 2405: 2404: 2403: 2385: 2379: 2368: 2356: 2301: 2300:specification. 2262: 2255:Mac OS X v10.5 2251:Mac OS X v10.4 2240: 2234: 2224: 2172: 2169: 2021: 2018: 1906: 1903: 1901: 1898: 1891:kernel drivers 1870: 1867: 1862: 1859: 1850: 1847: 1841: 1838: 1821: 1818: 1796: 1793: 1791: 1788: 1782:for the iGPU ( 1776: 1775: 1772: 1769: 1766: 1763: 1755: 1752: 1723: 1720: 1699: 1696: 1675: 1672: 1670: 1669: 1664: 1659: 1656: 1651: 1646: 1643: 1640: 1635: 1632: 1629: 1626: 1621: 1618: 1615: 1610: 1607: 1604: 1601: 1596: 1593: 1588: 1585: 1582: 1579: 1576: 1573: 1568: 1565: 1562: 1559: 1554: 1549: 1544: 1539: 1534: 1531: 1526: 1520: 1511: 1508: 1445: 1442: 1344: 1341: 1278: 1275: 1260:counterparts. 1215: 1212: 1134: 1131: 1129: 1126: 1077:Main article: 1074: 1071: 1040: 1037: 974: 973:Device drivers 971: 961: 958: 906: 903: 902: 901: 889: 885: 884: 876: 872: 871: 864: 863: 856: 855: 848: 847: 840: 839: 831: 830: 819: 786: 783: 781: 778: 742: 739: 700:Primary Header 662: 659: 623:Protective MBR 614: 611: 607:UEFI boot stub 538:(AArch32) and 531: 528: 526: 523: 516: 515: 512: 511:Modular design 509: 502: 496: 477: 474: 457: 454: 389:user interface 384:and security. 328: 325: 162: 155: 154: 153: 144: 137: 136: 135: 134: 133: 130: 129: 120: 116: 115: 110: 106: 105: 95: 91: 90: 81: 77: 76: 71: 67: 66: 61: 60:Latest version 57: 56: 53: 49: 48: 45: 41: 40: 37: 33: 32: 15: 9: 6: 4: 3: 2: 8477: 8466: 8463: 8462: 8460: 8444: 8440: 8437: 8433: 8430: 8426: 8423: 8419: 8416: 8412: 8409: 8405: 8402: 8398: 8395: 8391: 8388: 8384: 8383: 8381: 8377: 8370: 8366: 8363: 8359: 8356: 8352: 8349: 8345: 8344: 8342: 8338: 8331: 8327: 8324: 8320: 8317: 8313: 8308: 8304: 8301: 8297: 8296: 8294: 8290: 8289: 8287: 8285: 8281: 8270: 8266: 8263: 8259: 8256: 8252: 8251: 8249: 8245: 8236: 8232: 8231: 8229: 8225: 8222: 8218: 8215: 8211: 8208: 8204: 8203: 8201: 8197: 8194: 8190: 8183: 8179: 8176: 8172: 8169: 8165: 8164: 8162: 8160: 8156: 8149: 8145: 8142: 8138: 8135: 8131: 8130: 8128: 8124: 8113: 8109: 8106: 8102: 8099: 8095: 8092: 8088: 8085: 8081: 8078: 8074: 8071: 8067: 8064: 8060: 8057: 8053: 8050: 8046: 8043: 8039: 8036: 8032: 8029: 8025: 8022: 8018: 8015: 8011: 8008: 8007:BootX (Linux) 8004: 8001: 8000:BootX (Apple) 7997: 7994: 7990: 7987: 7983: 7980: 7976: 7975: 7973: 7969: 7962: 7958: 7955: 7951: 7950: 7948: 7946: 7942: 7935: 7931: 7928: 7924: 7921: 7917: 7916: 7914: 7910: 7899: 7895: 7892: 7888: 7885: 7881: 7878: 7874: 7871: 7867: 7864: 7860: 7857: 7853: 7850: 7846: 7843: 7839: 7834: 7830: 7827: 7823: 7822: 7820: 7816: 7813: 7809: 7806: 7802: 7801: 7799: 7795: 7788: 7784: 7781: 7777: 7774: 7770: 7767: 7763: 7760: 7756: 7753: 7749: 7746: 7742: 7739: 7738:Open Firmware 7735: 7730: 7726: 7725: 7723: 7719: 7716: 7712: 7711: 7709: 7705: 7698: 7694: 7691: 7687: 7684: 7680: 7679: 7677: 7673: 7670: 7668: 7663: 7658: 7645: 7641: 7640: 7638: 7634: 7629: 7625: 7622: 7618: 7617: 7615: 7611: 7610: 7608: 7604: 7600: 7596: 7589: 7584: 7582: 7577: 7575: 7570: 7569: 7566: 7560: 7557: 7555: 7552: 7550: 7547: 7545: 7542: 7540: 7537: 7535: 7532: 7530: 7527: 7523: 7518: 7517: 7499: 7495: 7493:9781934053430 7489: 7485: 7481: 7477: 7472: 7460: 7456: 7452: 7447: 7436: 7432: 7427: 7416: 7412: 7407: 7396: 7392: 7387: 7376: 7372: 7371: 7366: 7361: 7360: 7340: 7334: 7318: 7312: 7296: 7290: 7274: 7268: 7266: 7250: 7246: 7240: 7225: 7221: 7215: 7200: 7196: 7190: 7175: 7171: 7164: 7148: 7141: 7126: 7122: 7115: 7099: 7092: 7076: 7072: 7068: 7062: 7046: 7040: 7024: 7018: 7002: 6996: 6994: 6977: 6971: 6969: 6952: 6946: 6931: 6927: 6921: 6905: 6901: 6895: 6879: 6873: 6871: 6862: 6856: 6848: 6842: 6834: 6830: 6826: 6820: 6804: 6798: 6784: 6783: 6775: 6759: 6753: 6745: 6741: 6735: 6720: 6716: 6710: 6695: 6689: 6673: 6667: 6651: 6645: 6637: 6636: 6628: 6620: 6619: 6612: 6604: 6600: 6599: 6598:3.1 Changelog 6592: 6577: 6573: 6567: 6551: 6545: 6529: 6525: 6519: 6503: 6497: 6481: 6475: 6467: 6463: 6462: 6455: 6439: 6435: 6431: 6424: 6408: 6404: 6398: 6383: 6379: 6372: 6357: 6353: 6352:"OpenBSD 6.0" 6347: 6332: 6328: 6327:"OpenBSD 5.9" 6322: 6303: 6297: 6282: 6278: 6272: 6257:. FreeBSD.org 6256: 6250: 6234: 6228: 6213:. 22 May 2024 6212: 6211: 6206: 6200: 6192: 6188: 6182: 6166: 6159: 6144: 6138: 6132: 6127: 6120: 6107: 6101: 6095: 6090: 6075: 6071: 6064: 6058: 6053: 6045: 6041: 6040: 6032: 6017: 6013: 6012: 6005: 5986: 5982: 5975: 5969: 5954: 5950: 5949: 5942: 5926: 5920: 5918: 5916: 5900: 5899: 5892: 5885: 5880: 5862: 5855: 5839: 5835: 5831: 5825: 5818: 5813: 5807: 5800: 5795: 5784: 5777: 5776: 5769: 5753: 5747: 5745: 5737: 5732: 5725: 5721: 5718: 5712: 5696: 5692: 5686: 5670: 5666: 5660: 5641: 5634: 5628: 5610: 5604: 5589: 5585: 5579: 5563: 5557: 5538: 5532: 5516: 5512: 5506: 5491: 5485: 5469: 5465: 5461: 5455: 5444: 5438: 5430: 5429: 5424: 5418: 5410: 5404: 5400: 5399: 5391: 5383: 5377: 5373: 5372: 5364: 5348: 5347: 5342: 5336: 5328: 5324: 5320: 5314: 5310: 5306: 5305: 5297: 5289: 5288: 5280: 5274: 5259: 5255: 5249: 5234: 5230: 5227:barrygolden. 5223: 5215: 5211: 5205: 5190: 5186: 5182: 5176: 5161: 5157: 5153: 5147: 5131: 5124: 5118: 5103: 5099: 5095: 5089: 5087: 5071: 5067: 5063: 5057: 5041: 5037: 5033: 5027: 5019: 5015: 5009: 4994: 4990: 4984: 4965: 4959: 4957: 4941: 4937: 4931: 4929: 4913: 4909: 4905: 4899: 4897: 4880: 4876: 4870: 4855: 4851: 4845: 4830: 4826: 4820: 4805: 4801: 4794: 4778: 4774: 4767: 4761: 4756: 4740: 4736: 4730: 4715: 4711: 4705: 4703: 4687: 4686: 4681: 4674: 4658: 4652: 4636: 4632: 4626: 4607: 4606: 4598: 4583: 4576: 4569: 4554: 4550: 4546: 4540: 4532: 4526: 4511: 4507: 4501: 4486: 4482: 4476: 4460: 4453: 4447: 4445: 4429: 4425: 4419: 4404: 4400: 4394: 4378: 4374: 4368: 4361: 4348: 4341: 4335: 4320: 4316: 4310: 4302: 4298: 4291: 4283: 4277: 4268: 4252: 4246: 4244: 4228: 4224: 4218: 4202: 4198: 4196: 4195:linux.conf.au 4191: 4184: 4182: 4174: 4169: 4153: 4149: 4143: 4141: 4139: 4137: 4121: 4120:archlinux.org 4117: 4111: 4096: 4095:archlinux.org 4092: 4086: 4084: 4067: 4063: 4057: 4042: 4038: 4032: 4017: 4013: 4009: 4003: 4001: 3999: 3982: 3978: 3972: 3957: 3953: 3946: 3944: 3942: 3940: 3920: 3913: 3907: 3888: 3882: 3866: 3862: 3856: 3840: 3836: 3830: 3815:. 8 June 2014 3814: 3810: 3804: 3785: 3779: 3777: 3775: 3773: 3771: 3769: 3767: 3765: 3745: 3741: 3734: 3718: 3714: 3707: 3691: 3684: 3673: 3667: 3659: 3653: 3645: 3641: 3634: 3626: 3622: 3616: 3609:. 3 May 2021. 3608: 3604: 3598: 3589: 3580: 3572: 3566: 3562: 3561: 3553: 3545: 3539: 3531: 3525: 3517: 3511: 3500: 3494: 3486: 3480: 3472: 3466: 3458: 3452: 3437: 3433: 3429: 3423: 3421: 3419: 3402: 3396: 3381:. August 2022 3380: 3373: 3367: 3359: 3353: 3346: 3341: 3340: 3333: 3325: 3319: 3311: 3310: 3305: 3299: 3291: 3290: 3285: 3279: 3271: 3267: 3261: 3254: 3248: 3244: 3237: 3229: 3225: 3224: 3217: 3198: 3192: 3190: 3188: 3186: 3170: 3166: 3160: 3144: 3138: 3136: 3116: 3109: 3102: 3094: 3088: 3084: 3083: 3075: 3067: 3061: 3053: 3047: 3043: 3030: 3026: 3020: 3011: 3005: 2999: 2990: 2986: 2976: 2973: 2971: 2968: 2966: 2963: 2960: 2957: 2954: 2951: 2948: 2945: 2942: 2939: 2937: 2934: 2932: 2929: 2928: 2922: 2919: 2915: 2910: 2908: 2904: 2900: 2896: 2891: 2883: 2881: 2877: 2873: 2869: 2865: 2861: 2857: 2853: 2848: 2846: 2842: 2838: 2833: 2829: 2824: 2820: 2818: 2814: 2809: 2805: 2799: 2797: 2792: 2790: 2786: 2782: 2777: 2775: 2771: 2767: 2761: 2759: 2754: 2750: 2746: 2742: 2736: 2733: 2729: 2725: 2721: 2717: 2713: 2708: 2706: 2702: 2698: 2694: 2690: 2686: 2682: 2677: 2668: 2660: 2655: 2645: 2643: 2638: 2636: 2635:Cory Doctorow 2632: 2628: 2521: 2519: 2515: 2510: 2508: 2504: 2500: 2496: 2492: 2480: 2477: 2474: 2470: 2467: 2463: 2459: 2456: 2453: 2450: 2447: 2444: 2440: 2437: 2433: 2429: 2426: 2423: 2422:VMware Fusion 2420: 2417: 2414: 2411: 2410: 2401: 2397: 2393: 2389: 2386: 2383: 2380: 2377: 2373: 2369: 2365: 2361: 2357: 2354: 2350: 2346: 2342: 2338: 2334: 2330: 2326: 2322: 2318: 2314: 2310: 2306: 2302: 2299: 2295: 2291: 2287: 2283: 2279: 2275: 2271: 2267: 2263: 2260: 2256: 2252: 2248: 2244: 2241: 2238: 2235: 2232: 2228: 2225: 2222: 2218: 2214: 2210: 2206: 2205: 2204: 2178: 2168: 2164: 2162: 2158: 2152: 2150: 2146: 2143: 2139: 2135: 2131: 2127: 2122: 2120: 2116: 2111: 2109: 2103: 2101: 2096: 2094: 2090: 2085: 2081: 2079: 2075: 2074:Open Firmware 2071: 2067: 2062: 2060: 2056: 2052: 2048: 2044: 2040: 2036: 2032: 2030: 2026: 2017: 2015: 2011: 2007: 2003: 2000:architecture 1999: 1995: 1990: 1988: 1984: 1980: 1975: 1973: 1969: 1965: 1961: 1959: 1955: 1951: 1947: 1943: 1939: 1935: 1931: 1927: 1923: 1915: 1911: 1897: 1894: 1892: 1888: 1884: 1876: 1866: 1858: 1856: 1846: 1837: 1835: 1831: 1827: 1817: 1814: 1810: 1806: 1802: 1787: 1785: 1781: 1773: 1770: 1767: 1764: 1761: 1760: 1759: 1751: 1749: 1745: 1741: 1738:or through a 1737: 1733: 1729: 1719: 1717: 1713: 1709: 1705: 1695: 1693: 1689: 1685: 1681: 1668: 1665: 1663: 1660: 1657: 1655: 1652: 1650: 1647: 1644: 1641: 1639: 1636: 1633: 1630: 1627: 1625: 1622: 1619: 1616: 1614: 1611: 1608: 1605: 1602: 1600: 1597: 1594: 1592: 1589: 1586: 1583: 1580: 1577: 1574: 1572: 1569: 1566: 1563: 1560: 1558: 1555: 1553: 1550: 1548: 1545: 1543: 1540: 1538: 1535: 1532: 1530: 1527: 1525: 1522: 1521: 1519: 1517: 1507: 1497: 1492: 1490: 1486: 1481: 1463: 1459: 1450: 1441: 1439: 1435: 1431: 1427: 1423: 1419: 1415: 1411: 1407: 1403: 1399: 1395: 1392:and 2012 R2, 1391: 1387: 1383: 1378: 1376: 1372: 1368: 1360: 1355: 1350: 1340: 1338: 1333: 1331: 1327: 1324:(SANs), with 1323: 1318: 1316: 1312: 1308: 1304: 1300: 1296: 1292: 1288: 1284: 1274: 1271: 1268: 1264: 1261: 1259: 1255: 1251: 1247: 1243: 1238: 1236: 1232: 1227: 1225: 1221: 1211: 1208: 1206: 1202: 1198: 1189: 1185: 1175: 1167: 1163: 1159: 1154: 1152: 1148: 1144: 1140: 1125: 1123: 1119: 1115: 1111: 1107: 1104:, as well as 1103: 1099: 1095: 1091: 1086: 1080: 1070: 1067: 1065: 1061: 1057: 1053: 1048: 1046: 1036: 1034: 1030: 1026: 1021: 1017: 1015: 1012: 1008: 1004: 1000: 999:Open Firmware 996: 992: 991:EFI byte code 988: 984: 983:device driver 980: 970: 968: 957: 955: 951: 947: 943: 938: 936: 932: 928: 924: 920: 911: 899: 894: 890: 888:Time services 887: 886: 882: 877: 874: 873: 869: 866: 865: 861: 858: 857: 853: 850: 849: 845: 842: 841: 837: 833: 832: 828: 824: 820: 817: 816: 815: 813: 804: 800: 799:boot services 791: 777: 775: 771: 767: 763: 759: 755: 754:Windows Vista 750: 748: 738: 736: 731: 729: 725: 720: 713: 709: 705: 701: 697: 693: 689: 685: 680: 674: 668: 658: 655:(8 × 2 bytes) 653: 647: 642: 638: 634: 630: 624: 620: 610: 608: 604: 600: 599:UEFI handover 596: 592: 588: 582: 580: 576: 572: 568: 564: 559: 557: 553: 549: 545: 544:little-endian 541: 537: 525:Compatibility 522: 519: 513: 510: 507: 503: 500: 497: 494: 490: 486: 482: 478: 475: 472: 468: 464: 463: 462: 453: 450: 448: 444: 440: 436: 431: 429: 425: 421: 417: 413: 409: 405: 401: 397: 392: 390: 385: 383: 378: 376: 372: 367: 365: 360: 358: 354: 350: 346: 342: 338: 334: 324: 322: 317: 315: 311: 307: 303: 299: 297: 293: 289: 285: 281: 277: 273: 269: 265: 260: 258: 254: 250: 246: 242: 238: 234: 230: 226: 222: 221:specification 216: 192: 188: 178: 174: 170: 166: 159: 148: 141: 127: 121: 117: 114: 111: 107: 103: 99: 96: 92: 89: 85: 82: 78: 75: 72: 68: 62: 58: 54: 50: 46: 42: 38: 34: 30: 25: 19: 8340:ROM variants 8284:Network boot 8262:Raspberry Pi 8028:systemd-boot 7714: 7504:24 September 7502:. Retrieved 7498:the original 7486:(1). Intel. 7483: 7479: 7463:. Retrieved 7459:the original 7454: 7438:. Retrieved 7434: 7418:. Retrieved 7414: 7398:. Retrieved 7394: 7378:. Retrieved 7368: 7343:. Retrieved 7333: 7321:. Retrieved 7311: 7299:. Retrieved 7289: 7277:. Retrieved 7252:. Retrieved 7248: 7239: 7227:. Retrieved 7223: 7214: 7202:. Retrieved 7198: 7189: 7177:. Retrieved 7173: 7163: 7151:. Retrieved 7140: 7128:. Retrieved 7124: 7114: 7102:. Retrieved 7091: 7079:. Retrieved 7075:the original 7070: 7061: 7049:. Retrieved 7039: 7027:. Retrieved 7017: 7005:. Retrieved 6982:11 September 6980:. Retrieved 6955:. Retrieved 6945: 6933:. Retrieved 6929: 6920: 6908:. Retrieved 6904:Ars Technica 6903: 6894: 6882:. Retrieved 6855: 6841: 6833:the original 6828: 6819: 6809:14 September 6807:. Retrieved 6797: 6788:25 September 6786:, retrieved 6781: 6774: 6764:14 September 6762:. Retrieved 6752: 6743: 6734: 6724:25 September 6722:. Retrieved 6709: 6697:. Retrieved 6688: 6676:. Retrieved 6666: 6654:. Retrieved 6644: 6638:, VirtualBox 6634: 6627: 6621:, VirtualBox 6617: 6611: 6603:the original 6597: 6591: 6579:. Retrieved 6575: 6566: 6554:. Retrieved 6552:. Vmware.com 6544: 6532:. Retrieved 6527: 6518: 6506:. Retrieved 6496: 6484:. Retrieved 6474: 6466:the original 6460: 6454: 6442:. Retrieved 6438:the original 6433: 6423: 6413:22 September 6411:. Retrieved 6406: 6397: 6385:. Retrieved 6382:The Register 6371: 6361:11 September 6359:. Retrieved 6355: 6346: 6336:11 September 6334:. Retrieved 6330: 6321: 6309:. Retrieved 6307:. oracle.com 6296: 6284:. Retrieved 6280: 6271: 6259:. Retrieved 6249: 6237:. Retrieved 6227: 6215:. Retrieved 6208: 6199: 6181: 6171:23 September 6169:. Retrieved 6158: 6146:. Retrieved 6137: 6126: 6117: 6110:. Retrieved 6100: 6089: 6077:. Retrieved 6073: 6063: 6052: 6044:the original 6038: 6031: 6020:, retrieved 6016:the original 6010: 6004: 5992:. Retrieved 5985:the original 5980: 5968: 5959:16 September 5957:, retrieved 5953:the original 5947: 5941: 5929:. Retrieved 5903:, retrieved 5897: 5891: 5879: 5867:. Retrieved 5854: 5844:30 September 5842:. Retrieved 5838:the original 5833: 5824: 5815: 5806: 5794: 5783:the original 5774: 5768: 5758:14 September 5756:. Retrieved 5731: 5711: 5699:. Retrieved 5695:the original 5685: 5675:12 September 5673:. Retrieved 5669:the original 5659: 5649:12 September 5647:. Retrieved 5640:the original 5627: 5617:12 September 5615:. Retrieved 5603: 5591:. Retrieved 5587: 5578: 5566:. Retrieved 5556: 5544:. Retrieved 5531: 5521:14 September 5519:. Retrieved 5515:the original 5505: 5493:. Retrieved 5484: 5472:. Retrieved 5468:the original 5463: 5454: 5437: 5426: 5417: 5397: 5390: 5370: 5363: 5351:. Retrieved 5344: 5335: 5303: 5296: 5285: 5273: 5261:. Retrieved 5257: 5248: 5238:25 September 5236:. Retrieved 5232: 5222: 5213: 5204: 5194:25 September 5192:. Retrieved 5184: 5175: 5165:25 September 5163:. Retrieved 5155: 5146: 5136:25 September 5134:. Retrieved 5117: 5107:25 September 5105:. Retrieved 5097: 5075:25 September 5073:. Retrieved 5065: 5056: 5046:25 September 5044:. Retrieved 5035: 5026: 5017: 5008: 4996:. Retrieved 4992: 4983: 4973:25 September 4971:. Retrieved 4945:25 September 4943:. Retrieved 4917:25 September 4915:. Retrieved 4907: 4883:. Retrieved 4879:FreeBSD Wiki 4878: 4875:"SecureBoot" 4869: 4857:. Retrieved 4853: 4844: 4832:. Retrieved 4828: 4819: 4807:. Retrieved 4803: 4793: 4781:. Retrieved 4776: 4766: 4755: 4743:. Retrieved 4741:. 4 May 2017 4738: 4729: 4717:. Retrieved 4713: 4689:. Retrieved 4683: 4678:Edge, Jake. 4673: 4661:. Retrieved 4651: 4639:. Retrieved 4637:. 9 May 2015 4634: 4625: 4613:. Retrieved 4604: 4597: 4585:. Retrieved 4568: 4556:. Retrieved 4548: 4539: 4525: 4513:. Retrieved 4509: 4500: 4488:. Retrieved 4485:Ars Technica 4484: 4475: 4463:. Retrieved 4458: 4431:. Retrieved 4427: 4418: 4408:26 September 4406:. Retrieved 4402: 4393: 4381:. Retrieved 4376: 4367: 4358: 4351:. Retrieved 4346: 4334: 4322:. Retrieved 4309: 4300: 4290: 4276: 4267: 4255:. Retrieved 4230:. Retrieved 4226: 4217: 4205:. Retrieved 4193: 4168: 4156:. Retrieved 4125:25 September 4123:. Retrieved 4119: 4110: 4100:25 September 4098:. Retrieved 4094: 4070:. Retrieved 4066:fpmurphy.com 4065: 4056: 4044:. Retrieved 4040: 4031: 4021:25 September 4019:. Retrieved 4012:BIOS systems 4011: 3987:25 September 3985:. Retrieved 3983:. kernel.org 3980: 3971: 3961:25 September 3959:. Retrieved 3926:. Retrieved 3919:the original 3906: 3894:. Retrieved 3892:. UEFI Forum 3881: 3869:. Retrieved 3855: 3843:. Retrieved 3829: 3817:. Retrieved 3812: 3803: 3793:25 September 3791:. Retrieved 3753:20 September 3751:. Retrieved 3744:the original 3733: 3721:. Retrieved 3717:the original 3706: 3694:. Retrieved 3683: 3666: 3652: 3643: 3633: 3624: 3615: 3606: 3597: 3588: 3579: 3559: 3552: 3538: 3524: 3493: 3479: 3465: 3451: 3441:25 September 3439:. Retrieved 3431: 3407:14 September 3405:. Retrieved 3395: 3383:. Retrieved 3379:www.uefi.org 3378: 3366: 3352: 3343: 3338: 3332: 3318: 3307: 3298: 3287: 3278: 3269: 3260: 3242: 3236: 3228:the original 3222: 3216: 3206:14 September 3204:. Retrieved 3172:. Retrieved 3168: 3159: 3149:24 September 3147:. Retrieved 3124:14 September 3122:. Retrieved 3115:the original 3101: 3081: 3074: 3060: 3046: 3019: 3010: 2998: 2989: 2911: 2892: 2889: 2849: 2825: 2821: 2800: 2793: 2778: 2762: 2741:Ubuntu 12.10 2737: 2709: 2673: 2639: 2624: 2549:ShellAppMain 2514:hello, world 2511: 2490: 2489: 2282:Windows 2000 2270:Windows 2000 2268:versions of 2209:Linux kernel 2176: 2174: 2165: 2153: 2123: 2112: 2104: 2097: 2086: 2082: 2063: 2033: 2023: 1991: 1976: 1962: 1925: 1924:, codenamed 1921: 1919: 1895: 1872: 1869:RT – Runtime 1864: 1852: 1843: 1823: 1798: 1777: 1757: 1725: 1701: 1698:UEFI Capsule 1680:non-volatile 1677: 1513: 1493: 1482: 1462:boot loaders 1455: 1434:AlmaLinux OS 1379: 1366: 1364: 1361:boot manager 1334: 1328:(iSCSI) and 1319: 1280: 1272: 1269: 1265: 1262: 1253: 1241: 1239: 1234: 1230: 1228: 1219: 1217: 1209: 1204: 1196: 1194: 1191:Boot process 1155: 1139:boot sectors 1136: 1133:UEFI booting 1092:. Supported 1090:boot loaders 1082: 1068: 1049: 1042: 1024: 1022: 1018: 994: 990: 976: 963: 939: 930: 927:boot manager 918: 916: 905:Applications 822: 802: 798: 796: 751: 744: 732: 727: 721: 703: 699: 687: 681: 670: 626: 606: 603:deduplicates 598: 587:Linux kernel 583: 560: 533: 520: 517: 459: 451: 432: 393: 386: 382:cryptography 379: 374: 368: 361: 356: 352: 330: 318: 309: 305: 300: 261: 225:architecture 190: 186: 185: 169:flash memory 70:Organization 52:Year started 36:Abbreviation 18: 8394:ROM hacking 8330:Wake-on-LAN 7993:BootManager 7945:Bootloaders 7345:26 February 7323:26 February 7301:26 February 7279:26 February 7254:10 November 7229:10 November 7204:10 November 7179:3 September 7029:26 February 7007:26 February 6957:26 February 6699:16 February 6656:28 February 6618:Ticket 7702 6556:28 February 6486:28 February 6444:4 September 6407:youtube.com 6387:4 September 6148:9 September 6079:13 November 5994:9 September 5869:22 November 5834:PC Magazine 5593:20 December 5353:30 December 5263:24 December 5040:SourceForge 4719:9 September 4691:9 September 4663:18 February 4257:27 February 4232:24 November 4072:14 November 4046:14 November 3677:. May 2017. 3644:SourceForge 3510:cite report 3243:Beyond BIOS 3174:11 December 3027:(ACPI) and 2841:winload.efi 2648:Secure Boot 2609:EFI_SUCCESS 2503:SourceForge 2436:Secure Boot 2161:smartphones 2119:BladeCenter 1946:BSD license 1877:(OS) after 1855:Option ROMs 1826:main memory 1790:Boot stages 1732:boot loader 1708:Windows 8.1 1496:motherboard 1367:Secure Boot 1343:Secure Boot 1313:(TFTP) and 1246:option ROMs 1224:boot sector 1214:CSM booting 1143:boot loader 597:CPUs, with 501:programming 400:hypervisors 364:open source 284:CSM booting 94:Predecessor 8429:Instant-on 8415:Devicetree 8255:Bus Pirate 8159:Partitions 7927:Das U-Boot 7812:Award BIOS 7729:Video BIOS 7707:Interfaces 7465:12 October 7440:12 October 7420:12 October 7400:12 October 7380:12 October 7319:. Bit-tech 7297:. Phoronix 6581:13 January 6508:18 January 6311:4 November 6286:11 January 5931:28 October 5474:7 November 5349:(in Dutch) 5189:Arch Linux 5160:Arch Linux 5102:Arch Linux 4912:Arch Linux 4908:UEFI Shell 4834:12 January 4829:Linux Mint 4433:27 October 4041:redhat.com 4016:Arch Linux 3896:5 December 3865:kernel.org 3692:. bit-tech 3640:"EFI-MIPS" 3385:16 January 3039:References 2970:MoonBounce 2931:Bootloader 2880:SUSE Linux 2832:Windows 10 2828:Windows 11 2817:Windows RT 2749:user space 2714:developer 2701:Windows 10 2652:See also: 2543:EFI_STATUS 2452:VirtualBox 2353:Windows 11 2253:Tiger and 2066:Apple Inc. 2010:SUSE Linux 1994:Das U-Boot 1987:Project Mu 1780:Video BIOS 1712:Windows 10 1674:Extensions 1444:UEFI shell 1430:Linux Mint 1416:including 1410:Windows 11 1394:Windows 10 1347:See also: 1176:system is 1058:(OEMs) or 985:stored in 868:Devicetree 836:Memory map 665:See also: 617:See also: 567:Intel 8088 499:C language 456:Advantages 362:The first 296:consortium 74:UEFI Forum 8401:ROM image 8192:Utilities 8049:OpeniBoot 7891:Kickstart 7884:LinuxBoot 7877:Libreboot 7842:InsydeH2O 7833:AMI Aptio 7773:AlphaBIOS 7606:Processes 7104:12 August 6829:TianoCore 6825:"Welcome" 6277:"uefi(8)" 6191:Microsoft 5562:"Why US?" 5327:810455404 5066:Shell FAQ 4881:. FreeBSD 4745:18 August 4641:13 August 4558:9 October 4465:6 October 4158:6 October 3504:(Report). 2943:(UEFI PI) 2745:Canonical 2676:Windows 8 2621:Criticism 2466:TianoCore 2345:Windows 8 2341:Windows 8 2325:Windows 7 2091:based on 2078:Boot Camp 2039:Itanium 2 2037:'s first 2027:'s first 2020:Platforms 1979:Microsoft 1952:(EPL) as 1809:microcode 1748:NOR flash 1704:Windows 8 1489:TianoCore 1382:Windows 8 1106:El Torito 960:Protocols 950:Gummiboot 758:Windows 8 579:long mode 548:TianoCore 469:) with a 435:Microsoft 341:real mode 274:that are 257:InsydeH2O 245:AMI Aptio 237:interface 231:used for 173:mainboard 149:with UEFI 104:computers 47:Published 8459:Category 8443:EDL mode 8422:Fastboot 8387:Boot ROM 8247:Hardware 8235:Heimdall 8221:UEFITool 8207:flashrom 8199:Software 8077:SYSLINUX 8014:GNU GRUB 7870:Coreboot 7863:OpenBIOS 7667:firmware 7665:Booting 7595:Firmware 7081:5 August 7071:IT World 7051:26 March 6935:18 March 6910:21 March 6534:2 August 5720:Archived 5588:Phoronix 5346:Tweakers 4998:18 March 4859:10 April 4809:20 March 4777:Phoronix 4714:PC World 4615:20 April 4515:4 August 4347:uefi.org 4201:Archived 4152:Archived 3436:GNU GRUB 3202:. Emulex 2965:UEFITool 2955:(SMBIOS) 2936:OpenBIOS 2925:See also 2876:OpenSUSE 2642:coreboot 2631:coreboot 2537:#include 2531:#include 2525:#include 2145:LGA 1155 2142:6-series 2134:Gigabyte 2115:System x 2006:GNU GRUB 1958:coreboot 1801:Intel ME 1722:Hardware 1578:EddDebug 1567:dmpstore 1516:commands 1510:Commands 1474:diskpart 1422:openSUSE 1309:(DHCP), 1289:include 1235:BIOS-GPT 1231:BIOS-MBR 1205:UEFI-MBR 937:(OEMs). 862:services 854:services 846:services 838:services 814:access. 785:Services 780:Features 728:UEFI-GPT 688:BIOS-GPT 563:IBM 5150 288:de facto 268:boot ROM 229:firmware 113:Firmware 8379:Related 8316:NetBoot 8056:RedBoot 8035:loadlin 7986:Barebox 7826:AMIBIOS 7805:SeaBIOS 7644:Android 7614:Windows 7599:booting 7341:. The H 7275:. ZDNet 7153:6 March 7130:1 March 7003:. The H 6953:. ZDNet 6884:6 March 6678:24 June 6261:19 June 6239:7 March 6235:. The H 6112:12 June 5754:. Intel 4885:16 June 4685:LWN.net 4553:Red Hat 4253:. The H 4207:2 April 3871:15 June 3845:15 June 3839:LWN.net 3819:15 June 3723:18 June 3696:18 June 3272:, Intel 2918:bricked 2914:Samsung 2907:Toshiba 2808:bootkit 2804:rootkit 2794:At the 2781:Spanish 2732:kernels 2712:Red Hat 2703:allows 2693:lock-in 2473:Hyper-V 2400:INT 13H 2396:INT 10H 2382:OpenBSD 2372:Solaris 2370:Oracle 2364:FreeBSD 2313:INT 10h 2294:Itanium 2266:Itanium 2237:OpenVMS 2100:Windows 2095:cores. 2059:OpenVMS 2051:FreeBSD 2043:Windows 2029:Itanium 1983:Surface 1934:Itanium 1805:AMD PSP 1754:Classes 1734:from a 1438:FreeBSD 1305:(UDP), 1158:booting 1128:Booting 1005:-based 1003:PowerPC 644:(2 × 2 493:AArch64 443:Hyper-V 359:(EFI). 333:Itanium 327:History 270:of all 233:booting 167:-based 119:Website 8369:EEPROM 8269:ft2232 8182:/boot/ 8098:Yaboot 8063:rEFInd 7490:  6744:GitHub 6217:7 June 6022:31 May 5701:18 May 5495:25 May 5428:GitHub 5405:  5378:  5325:  5315:  5287:GitHub 5132:. 2008 5042:. 2012 5018:GitHub 4993:GitHub 4783:23 May 4587:29 May 4490:29 May 4353:29 May 4324:19 May 4301:GitHub 4008:"GRUB" 3928:9 June 3747:(PPTX) 3607:GitHub 3567:  3309:GitHub 3289:GitHub 3249:  3089:  2901:" or " 2895:Lenovo 2872:Debian 2868:Fedora 2864:Ubuntu 2860:CentOS 2758:Fedora 2633:, and 2606:return 2600:" 2570:CHAR16 2546:EFIAPI 2507:Python 2443:VMware 2388:ArcaOS 2221:Ubuntu 2136:, and 2126:ASRock 2093:XScale 1985:line, 1942:x86-64 1930:XScale 1807:, CPU 1714:, and 1658:unload 1609:memmap 1529:attrib 1466:memmap 1426:Ubuntu 1418:Fedora 1408:, and 1404:, and 1371:signed 1359:rEFInd 1180:, and 1174:x86-64 1064:UTF-16 952:, and 946:rEFInd 860:SMBIOS 768:, and 684:GRUB 2 621:, and 595:x86-64 591:booted 575:x86-64 556:RISC-V 408:SMBIOS 109:Domain 44:Status 8362:EPROM 8214:fwupd 8070:rEFIt 8042:NTLDR 8021:iBoot 7675:Types 7637:Linux 6719:Intel 6635:Forum 6305:(PDF) 5988:(PDF) 5977:(PDF) 5905:1 May 5864:(PDF) 5786:(PDF) 5779:(PDF) 5643:(PDF) 5636:(PDF) 5612:(PDF) 5568:2 May 5546:2 May 5540:(PDF) 5446:(PDF) 5282:(PDF) 5130:Intel 5126:(PDF) 5070:Intel 4967:(PDF) 4940:Intel 4609:(PDF) 4578:(PDF) 4455:(PDF) 4383:6 May 4343:(PDF) 4319:Intel 3922:(PDF) 3915:(PDF) 3890:(PDF) 3787:(PDF) 3675:(PDF) 3502:(PDF) 3375:(PDF) 3339:About 3200:(PDF) 3118:(PDF) 3111:(PDF) 2981:Notes 2961:(TPM) 2850:Many 2766:X.509 2689:Linux 2585:Print 2558:UINTN 2499:Intel 2298:DIG64 2290:IA-64 2243:Apple 2231:IA-64 2227:HP-UX 2213:elilo 2055:HP-UX 2047:Linux 2025:Intel 2002:Linux 1998:ARMv8 1938:IA-32 1926:Tiano 1900:Usage 1742:. In 1726:Like 1716:Fwupd 1645:stall 1634:reset 1628:pause 1624:mount 1613:mkdir 1575:Edd30 1524:alias 1485:Intel 1315:iSCSI 1151:NVRAM 1122:FAT12 1118:FAT16 1114:FAT32 1033:Rufus 1029:GRUB2 1025:efifs 1014:SPARC 881:NVRAM 834:UEFI 812:NVRAM 673:Linux 661:Linux 646:bytes 571:IA-32 540:ARM64 508:shell 485:ARM32 481:IA-32 473:(GPT) 349:PC AT 302:Intel 8355:PROM 8307:iPXE 8300:gPXE 8228:Odin 8112:MILO 8091:xOSL 7934:ARCS 7745:ACPI 7722:BIOS 7715:UEFI 7597:and 7506:2013 7488:ISBN 7467:2012 7442:2012 7422:2012 7402:2012 7382:2012 7347:2013 7325:2013 7303:2013 7281:2013 7256:2020 7231:2020 7206:2020 7181:2024 7155:2023 7132:2023 7106:2016 7083:2013 7053:2013 7031:2013 7009:2013 6984:2012 6959:2013 6937:2020 6912:2015 6886:2012 6811:2010 6790:2013 6766:2010 6726:2013 6701:2019 6680:2013 6658:2014 6583:2017 6558:2014 6536:2018 6510:2016 6488:2014 6446:2023 6415:2020 6389:2023 6363:2016 6338:2016 6313:2013 6288:2021 6263:2014 6241:2013 6219:2024 6173:2011 6150:2011 6114:2010 6081:2022 6024:2008 5996:2020 5961:2008 5933:2012 5907:2008 5871:2017 5846:2013 5760:2010 5703:2020 5677:2018 5651:2018 5619:2018 5595:2018 5570:2018 5548:2018 5523:2010 5497:2012 5476:2020 5403:ISBN 5376:ISBN 5355:2022 5323:OCLC 5313:ISBN 5265:2020 5240:2020 5196:2013 5185:Asus 5167:2013 5156:bcfg 5138:2013 5109:2013 5077:2013 5048:2013 5000:2020 4975:2013 4947:2013 4919:2013 4887:2015 4861:2024 4836:2024 4811:2014 4785:2018 4747:2017 4721:2012 4693:2012 4665:2016 4643:2015 4617:2022 4589:2019 4560:2013 4517:2022 4492:2018 4467:2013 4435:2020 4410:2020 4385:2015 4355:2015 4326:2014 4259:2013 4234:2020 4209:2012 4197:2012 4160:2013 4127:2013 4102:2013 4074:2013 4048:2013 4023:2013 3989:2013 3963:2013 3930:2010 3898:2019 3873:2014 3847:2014 3821:2014 3795:2013 3755:2014 3725:2010 3698:2010 3565:ISBN 3516:link 3443:2013 3409:2010 3387:2023 3247:ISBN 3208:2010 3176:2020 3151:2011 3126:2010 3087:ISBN 2947:ACPI 2856:RHEL 2845:GRUB 2843:and 2830:and 2815:and 2806:and 2705:OEMs 2576:Argv 2561:Argc 2458:QEMU 2446:ESXi 2441:The 2398:and 2392:BIOS 2376:GRUB 2349:ACPI 2331:and 2307:and 2288:for 2264:The 2217:GRUB 2207:The 2201:AA64 2193:IA64 2185:IA32 2149:AM3+ 2130:Asus 2053:and 2014:iPXE 1940:and 1887:ACPI 1885:and 1834:DRAM 1832:and 1728:BIOS 1654:type 1649:time 1620:mode 1595:load 1591:help 1587:guid 1581:edit 1571:echo 1561:dblk 1557:date 1547:comp 1533:bcfg 1504:bcfg 1478:edit 1470:bcfg 1406:2022 1402:2019 1384:and 1337:HTTP 1299:IPv6 1297:and 1295:IPv4 1258:PS/2 1240:The 1120:and 1100:and 1052:HTML 1009:and 942:GRUB 852:ACPI 821:The 801:and 733:For 702:and 554:and 552:MIPS 441:and 428:EBBR 414:and 412:edge 406:and 404:ACPI 337:BIOS 264:BIOS 191:UEFI 126:.org 124:uefi 98:BIOS 84:ACPI 63:2.10 55:2006 39:UEFI 8348:ROM 7787:SFI 7780:SRM 7759:APM 7375:UBM 3956:IBM 2462:KVM 2199:or 2197:ARM 2189:X64 2138:MSI 2108:MSI 1948:or 1883:SMM 1744:x86 1692:ROM 1667:vol 1662:ver 1642:set 1631:pci 1606:mem 1603:map 1584:err 1542:cls 1487:'s 1480:). 1386:8.1 1301:), 1145:or 1102:GPT 1098:MBR 995:EBC 993:or 989:as 879:in 844:SMM 762:8.1 749:. 652:ZiB 536:ARM 489:x64 424:BBR 416:IoT 310:EFI 292:IBM 259:. 203:juː 177:SPI 165:NOR 100:on 8461:: 7628:NT 7621:9x 7484:15 7482:. 7478:. 7453:. 7433:. 7413:. 7393:. 7373:. 7367:. 7264:^ 7247:. 7222:. 7197:. 7172:. 7123:. 7069:. 6992:^ 6967:^ 6928:. 6902:. 6869:^ 6827:, 6742:. 6717:. 6574:. 6526:. 6432:. 6405:. 6380:. 6354:. 6329:. 6279:. 6207:. 6189:. 6116:. 6072:. 5979:. 5914:^ 5832:. 5743:^ 5586:. 5462:. 5425:. 5343:. 5321:. 5284:. 5256:. 5231:. 5212:. 5187:. 5183:. 5158:. 5154:. 5128:. 5100:. 5096:. 5085:^ 5068:. 5064:. 5038:. 5034:. 5016:. 4991:. 4955:^ 4938:. 4927:^ 4910:. 4906:. 4895:^ 4877:. 4852:. 4827:. 4802:. 4775:. 4737:. 4712:. 4701:^ 4682:. 4633:. 4580:. 4551:. 4547:. 4508:. 4483:. 4457:. 4443:^ 4426:. 4401:. 4375:. 4357:. 4345:. 4317:. 4299:. 4242:^ 4225:. 4199:. 4192:. 4180:^ 4135:^ 4118:. 4093:. 4082:^ 4064:. 4039:. 4014:. 4010:. 3997:^ 3979:. 3954:. 3938:^ 3863:. 3837:. 3811:. 3763:^ 3642:. 3623:. 3605:. 3512:}} 3508:{{ 3434:. 3430:. 3417:^ 3377:. 3306:. 3286:. 3268:, 3184:^ 3167:. 3134:^ 2882:. 2878:, 2870:, 2866:, 2791:. 2770:PE 2699:. 2603:); 2597:\n 2573:** 2567:IN 2555:IN 2520:: 2402:). 2339:. 2327:, 2323:, 2319:, 2280:, 2249:. 2195:, 2191:, 2187:, 2132:, 2128:, 2057:; 2049:, 2045:, 1989:. 1960:. 1936:, 1932:, 1803:, 1710:, 1706:, 1694:. 1638:rm 1617:mm 1599:ls 1564:dh 1552:cp 1537:cd 1400:, 1396:, 1388:, 1339:. 1317:. 1237:. 1226:. 1207:. 1116:, 1047:. 969:. 948:, 944:, 776:. 774:TB 770:11 766:10 764:, 760:, 708:MB 657:. 641:TB 609:. 491:, 483:, 467:TB 449:. 316:. 298:. 255:, 251:, 247:, 212:aɪ 193:, 86:, 7587:e 7580:t 7573:v 7508:. 7469:. 7444:. 7424:. 7404:. 7384:. 7349:. 7327:. 7305:. 7283:. 7258:. 7233:. 7208:. 7183:. 7157:. 7134:. 7108:. 7085:. 7055:. 7033:. 7011:. 6986:. 6961:. 6939:. 6914:. 6888:. 6849:. 6813:. 6768:. 6746:. 6728:. 6703:. 6682:. 6660:. 6585:. 6560:. 6538:. 6512:. 6490:. 6448:. 6417:. 6391:. 6365:. 6340:. 6315:. 6290:. 6265:. 6243:. 6221:. 6193:. 6175:. 6152:. 6083:. 5998:. 5935:. 5873:. 5848:. 5801:. 5762:. 5726:" 5705:. 5679:. 5653:. 5621:. 5597:. 5572:. 5550:. 5525:. 5499:. 5478:. 5448:. 5431:. 5411:. 5384:. 5357:. 5329:. 5290:. 5267:. 5242:. 5216:. 5198:. 5169:. 5140:. 5111:. 5079:. 5050:. 5020:. 5002:. 4977:. 4949:. 4921:. 4889:. 4863:. 4838:. 4813:. 4787:. 4749:. 4723:. 4695:. 4667:. 4645:. 4619:. 4591:. 4562:. 4533:. 4519:. 4494:. 4469:. 4437:. 4412:. 4387:. 4328:. 4303:. 4284:. 4261:. 4236:. 4211:. 4162:. 4129:. 4104:. 4076:. 4050:. 4025:. 3991:. 3965:. 3932:. 3900:. 3875:. 3849:. 3823:. 3797:. 3757:. 3727:. 3700:. 3660:. 3646:. 3573:. 3532:. 3518:) 3459:. 3445:. 3411:. 3389:. 3326:. 3210:. 3178:. 3153:. 3128:. 3095:. 3054:. 2615:} 2612:; 2591:L 2588:( 2582:{ 2579:) 2564:, 2552:( 2468:. 2460:/ 2261:. 2155:" 1293:( 648:) 321:C 308:( 215:/ 209:f 206:ɪ 200:ˈ 197:/ 189:(

Index


UEFI Forum
ACPI
UEFI Platform Initialization
BIOS
IBM PC compatible
Firmware
uefi.org

Lenovo ThinkPad T470

NOR
flash memory
mainboard
SPI
/ˈjuːɪf/
specification
architecture
firmware
booting
interface
operating system
AMI Aptio
Phoenix SecureCore
TianoCore EDK II
InsydeH2O
BIOS
boot ROM
personal computers
IBM PC compatible

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.