1377:. The mechanical details of how precisely these drivers are to be signed are not specified. When Secure Boot is enabled, it is initially placed in "setup" mode, which allows a public key known as the "platform key" (PK) to be written to the firmware. Once the key is written, Secure Boot enters "User" mode, where only UEFI drivers and OS boot loaders signed with the platform key can be loaded by the firmware. Additional "key exchange keys" (KEK) can be added to a database stored in memory to allow other certificates to be used, but they must still have a connection to the private portion of the platform key. Secure Boot can also be placed in "Custom" mode, where additional public keys can be added to the system that do not match the private key.
140:
158:
7657:
2659:
1354:
2667:
1449:
910:
29:
1188:
1836:) and firmware recovery operations. Additionally, it is responsible for discovery of the current boot mode and handling many ACPI S3 operations. In the case of ACPI S3 resume, it is responsible for restoring many hardware registers to a pre-sleep state. PEI also uses CAR. Initialization at this stage involves creating data structures in memory and establishing default values within these structures.
1910:
426:) specification that currently provides three recipes, two of which are related to UEFI: 1) SBBR: which requires UEFI, ACPI and SMBIOS compliance suitable for enterprise level operating environments such as Windows, Red Hat Enterprise Linux, and VMware ESXi; and 2) EBBR: which requires compliance to a set of UEFI interfaces as defined in the Embedded Base Boot Requirements (
790:
2080:, which produces a Windows drivers disk and a non-destructive partitioning tool to allow the installation of Windows XP or Vista without requiring a reinstallation of Mac OS X (now macOS). A firmware update was also released that added BIOS compatibility to its EFI implementation. Subsequent Macintosh models shipped with the newer firmware.
2764:
to compromise the security of the system. In
Windows, if Secure Boot is enabled, all kernel drivers must be digitally signed; non-WHQL drivers may be refused to load. In February 2013, another Red Hat developer attempted to submit a patch to the Linux kernel that would allow it to parse Microsoft's authenticode signing using a master
2921:
the bug was actually triggered by storing too many UEFI variables to memory, and that the bug could also be triggered under
Windows under certain conditions. In conclusion, he determined that the offending kernel module had caused kernel message dumps to be written to the firmware, thus triggering the bug.
2920:
after installing a Linux distribution in UEFI mode. While potential conflicts with a kernel module designed to access system features on
Samsung laptops were initially blamed (also prompting kernel maintainers to disable the module on UEFI systems as a safety measure), Matthew Garrett discovered that
2801:
In August 2016 it was reported that two security researchers had found the "golden key" security key
Microsoft uses in signing operating systems. Technically, no key was exposed, however, an exploitable binary signed by the key was. This allows any software to run as though it was genuinely signed by
2763:
It has been disputed whether the operating system kernel and its modules must be signed as well; while the UEFI specifications do not require it, Microsoft has asserted that their contractual requirements do, and that it reserves the right to revoke any certificates used to sign code that can be used
4359:
The file system supported by the
Extensible Firmware Interface is based on the FAT file system. EFI defines a specific version of FAT that is explicitly documented and testable. Conformance to the EFI specification and its associate reference documents is the only definition of FAT that needs to be
2083:
During 2005, more than one million Intel systems shipped with Intel's implementation of UEFI. New mobile, desktop and server products, using Intel's implementation of UEFI, started shipping in 2006. For instance, boards that use the Intel 945 chipset series use Intel's UEFI firmware implementation.
878:
UEFI variables provide a way to store data, in particular non-volatile data. Some UEFI variables are shared between platform firmware and operating systems. Variable namespaces are identified by GUIDs, and variables are key/value pairs. For example, UEFI variables can be used to keep crash messages
5816:
System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby ... Platforms shall be UEFI Class Three (see UEFI Industry Group, Evaluating UEFI using
Commercially Available Platforms and Solutions, version 0.3, for a definition) with no Compatibility Support Module installed or installable. BIOS
3344:
Q: What is the relationship between EFI and UEFI? A: The UEFI specification is based on the EFI 1.10 specification published by Intel with corrections and changes managed by the
Unified EFI Forum. Intel still holds the copyright on the EFI 1.10 specification, but has contributed it to the Forum so
2366:
kernel and bootloader. The changes were initially stored in a discrete branch of the FreeBSD source code, but were merged into the mainline source on 4 April 2014 (revision 264095); the changes include support in the installer as well. UEFI boot support for amd64 first appeared in FreeBSD 10.1 and
2105:
In 2008, more x86-64 systems adopted UEFI. While many of these systems still allow booting only the BIOS-based OSes via the
Compatibility Support Module (CSM) (thus not appearing to the user to be UEFI-based), other systems started to allow booting UEFI-based OSes. For example, IBM x3450 server,
2755:
as well, without the need to reconfigure the system. Canonical also maintains its own private key to sign installations of Ubuntu pre-loaded on certified OEM computers that run the operating system, and also plans to enforce a Secure Boot requirement as well—requiring both a
Canonical key and a
1199:. Despite the fact that the UEFI specification requires MBR partition tables to be fully supported, some UEFI firmware implementations immediately switch to the BIOS-based CSM booting depending on the type of boot disk's partition table, effectively preventing UEFI booting to be performed from
584:
UEFI requires the firmware and operating system loader (or kernel) to be size-matched; that is, a 64-bit UEFI firmware implementation can load only a 64-bit operating system (OS) boot loader or kernel (unless the CSM-based Legacy boot is used) and the same applies to 32-bit. After the system
2734:
that could function with Secure Boot enabled without self-signing them. Other developers suggested that signed builds of Linux with another key could be provided, but noted that it would be difficult to persuade OEMs to ship their computers with the required key alongside the
Microsoft key.
1844:
This stage consist of C modules and a dependency-aware dispatcher. With main memory now available, CPU, chipset, mainboard and other I/O devices are initialized in DXE and BDS. Initialization at this stage involves assigning EFI device paths to the hardware connected to the motherboard, and
3051:
2637:, a digital rights activist, have criticized UEFI as an attempt to remove the ability of the user to truly control the computer. It does not solve the BIOS's long-standing problems of requiring two different drivers—one for the firmware and one for the operating system—for most hardware.
2822:
On March 1, 2023, researchers from ESET Cybersecurity Firm reported “The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot” named ‘BlackLotus’ in their public analyses findings describing the theory behind its mechanics exploiting the patches that “do not (and cannot) remove the
2738:
Several major Linux distributions have developed different implementations for Secure Boot. Garrett himself developed a minimal bootloader known as a shim, which is a precompiled, signed bootloader that allows the user to individually trust keys provided by Linux distributions.
1019:
Some architecture-specific (non-EFI Byte Code) EFI drivers for some device types can have interfaces for use by the OS. This allows the OS to rely on EFI for drivers to perform basic graphics and network functions before, and if, operating-system-specific drivers are loaded.
2678:
operating system had to ship with Microsoft's public key enrolled and Secure Boot enabled, which implies that using UEFI is a requirement for these devices. Following the announcement, the company was accused by critics and free software/open source advocates (including the
585:
transitions from "Boot Services" to "Runtime Services", the operating system kernel takes over. At this point, the kernel can change processor modes if it desires, but this bars usage of the runtime services (unless the kernel switches back again). As of version 3.15, the
3345:
that the Forum can evolve it. There will be no future versions of the EFI specification, but customers who license it can still use it under the terms of their license from Intel. The license to the Unified EFI Specification comes from the Forum, not from Intel
718:
and is used by GRUB only in BIOS-GPT setups. From GRUB's perspective, no such partition type exists in case of MBR partitioning. This partition is not required if the system is UEFI-based because no embedding of the second-stage code is needed in that case.
6118:
Microsoft determined that vendors would not have any interest in producing native UEFI 32-bit firmware because of the current status of mainstream 64-bit computing and platform costs. Therefore, Microsoft originally did not to ship support for 32-bit UEFI
737:, some UEFI implementations also support booting from MBR-partitioned disks through the Compatibility Support Module (CSM) that provides legacy BIOS compatibility. In that case, booting Linux on UEFI systems is the same as on legacy BIOS-based systems.
2163:, with an almost instantaneous return from standby mode), then the firmware is not permitted to contain a Compatibility Support Module (CSM). As such, systems that support Connected Standby are incapable of booting Legacy BIOS operating systems.
460:
The interface defined by the EFI specification includes data tables that contain platform information, and boot and runtime services that are available to the OS loader and OS. UEFI firmware provides several technical advantages over a BIOS:
1087:
partition that is used in computers adhering to the UEFI specification. Accessed by the UEFI firmware when a computer is powered up, it stores UEFI applications and the files these applications need to run, including operating system
2747:'s own key that verifies only the bootloader and allows unsigned kernels to be loaded; developers believed that the practice of signing only the bootloader is more feasible, since a trusted kernel is effective at securing only the
895:
to be set to local time or UTC. On machines using a PC-AT real-time clock, by default the hardware clock still has to be set to local time for compatibility with BIOS-based Windows, unless using recent versions and an entry in the
956:, which loads some OS files into memory and executes them. Also, an OS boot loader can provide a user interface to allow the selection of another UEFI application to run. Utilities like the UEFI Shell are also UEFI applications.
809:
call), and they include text and graphical consoles on various devices, and bus, block and file services. Runtime services are still accessible while the operating system is running; they include services such as date, time and
2166:
In October 2017, Intel announced that it would remove legacy PC BIOS support from all its products by 2020, in favor of UEFI Class 3. By 2019, all computers based on Intel platforms no longer have legacy PC BIOS support.
1502:. Some other systems have an already embedded UEFI shell which can be launched by appropriate key press combinations. For other systems, the solution is either creating an appropriate USB flash drive or adding manually (
1815:
for the specific architecture. It initializes a temporary memory (often CPU cache as RAM, or SoC on-chip SRAM, CAR) and serves as the system's software root of trust with the option of verifying PEI before hand-off.
1266:
In July, of 2022, Kaspersky Labs published information regarding a Rootkit designed to chain boot malicious code on machines using Intel's H81 chipset and the Compatibility Support module of affected motherboards.
2154:
With the release of Windows 8 in October 2012, Microsoft's certification requirements now require that computers include firmware that implements the UEFI specification. Furthermore, if the computer supports the
2834:
security updates applied the Secure Boot Advanced Targeting (SBAT) settings to device's UEFI NVRAM, which may caused some Linux distributions failed to load. SBAT is a protocol that supported in new versions of
2810:
attacks. This also makes patching the fault impossible, since any patch can be replaced (downgraded) by the (signed) exploitable binary. Microsoft responded in a statement that the vulnerability only exists in
1141:, defining instead a boot manager as part of the UEFI specification. When a computer is powered on, the boot manager checks the boot configuration and, based on its settings, then executes the specified OS
964:
EFI defines protocols as a set of software interfaces used for communication between two binary modules. All EFI drivers must provide services to others via protocols. The EFI Protocols are similar to the
5719:
2730:
has since clarified its position, assuring that the responsibility to make keys available was held by the hardware manufacturer), and that it would also be difficult for advanced users to build custom
2644:, of which TianoCore is one of many payload options. The development of coreboot requires cooperation from chipset manufacturers to provide the specifications needed to develop initialization drivers.
1881:
is executed. A UEFI compatible OS is now responsible for exiting boot services triggering the firmware to unload all no longer needed code and data, leaving only runtime services code/data, e.g.
1491:
UDK/EDK2 project. A pre-built ShellBinPkg is also available. Shell v2 works best in UEFI 2.3+ systems and is recommended over Shell v1 in those systems. Shell v1 should work in all UEFI systems.
1233:, regardless of it being performed on UEFI or legacy BIOS-based systems. Furthermore, booting legacy BIOS-based systems from GPT disks is also possible, and such a boot scheme is commonly called
5209:
1222:
that provides legacy BIOS compatibility. In this scenario, booting is performed in the same way as on legacy BIOS-based systems, by ignoring the partition table and relying on the content of a
2335:
are compatible with UEFI Class 2. 32-bit UEFI was originally not supported since vendors did not have any interest in producing native 32-bit UEFI firmware because of the mainstream status of
2223:
added support for UEFI Secure Boot as of version 12.10. Furthermore, the Linux kernel can be compiled with the option to run as an EFI bootloader on its own through the EFI boot stub feature.
2239:
has used EFI on IA-64 since its initial evaluation release in December 2003, and for production releases since January 2005. OpenVMS on x86-64 also uses UEFI to boot the operating system.
518:
With UEFI, it is possible to store product keys for operating systems such as Windows, on the UEFI firmware of the device. UEFI is required for devices shipping with Windows 8 and above.
3712:
2121:
HS22 with UEFI capability. Dell shipped PowerEdge T610, R610, R710, M610 and M710 servers with UEFI capability. More commercially available systems are mentioned in a UEFI whitepaper.
1256:, as an addition to features provided by the UEFI SMM. An example of such a legacy SMM functionality is providing USB legacy support for keyboard and mouse, by emulating their classic
679:(EFI GUID Partition Support) during kernel configuration. This option allows Linux to recognize and use GPT disks after the system firmware passes control over the system to Linux.
7066:
6429:
2695:, and clarified its requirements by stating that x86-based systems certified for Windows 8 must allow Secure Boot to enter custom mode or be disabled, but not on systems using the
2343:
finally introduced further optimizations for UEFI systems, including Graphics Output Protocol (GOP) support, a faster startup, 32-bit UEFI support, and Secure Boot support. Since
6037:
5278:
3739:
377:(UEFI). The original EFI specification remains owned by Intel, which exclusively provides licenses for EFI-based products, but the UEFI specification is owned by the UEFI Forum.
7538:
722:
UEFI systems can access GPT disks and boot directly from them, which allows Linux to use UEFI boot methods. Booting Linux from GPT disks on UEFI systems involves creation of an
1464:. Apart from that, commands available in the UEFI shell can be used for obtaining various other information about the system or the firmware, including getting the memory map (
2434:
version 11 and above supports UEFI, independently of whether the physical host system is UEFI-based. VMware Workstation 14 (and accordingly, Fusion 10) adds support for the
7146:
4530:
2819:
devices, and has released two patches; however, the patches do not (and cannot) remove the vulnerability, which would require key replacements in end user firmware to fix.
1865:
This is the stage between boot device selection and hand-off to the OS. At this point one may enter UEFI shell, or execute an UEFI application such as the OS boot loader.
6926:"Free Software Foundation recommendations for free operating system distributions considering Secure Boot — Free Software Foundation — working together for free software"
6693:
4036:
351:
hardware) had become too restrictive for the larger server platforms Itanium was targeting. The effort to address these concerns began in 1998 and was initially called
4544:
5883:
1824:
The second stage of UEFI boot consists of a dependency-aware dispatcher that loads and runs PEI modules (PEIMs) to handle early hardware initialization tasks such as
1218:
To ensure backward compatibility, UEFI firmware implementations on PC-class machines could support booting in legacy BIOS mode from MBR-partitioned disks through the
1210:
It is also common for a boot manager to have a textual user interface so the user can select the desired OS (or setup utility) from a list of available boot options.
2798:
in August 2013, a group of security researchers presented a series of exploits in specific vendor implementations of UEFI that could be used to exploit Secure Boot.
7475:
2102:
application. But no direct hardware access is allowed by EDK NT32. This means only a subset of EFI application and drivers can be executed by the EDK NT32 target.
6846:
3529:
1043:
The EFI 1.0 specification defined a UGA (Universal Graphic Adapter) protocol as a way to support graphics features. UEFI did not include UGA and replaced it with
635:(GPT) partitioning scheme, which is free from many of the limitations of MBR. In particular, the MBR limits on the number and size of disk partitions (up to four
366:
UEFI implementation, Tiano, was released by Intel in 2004. Tiano has since then been superseded by EDK and EDK2 and is now maintained by the TianoCore community.
5716:
2454:
has implemented UEFI since 3.1, but is limited to Unix/Linux operating systems and Windows 8 and later (does not work with Windows Vista x64 and Windows 7 x64).
3976:
2179:
means directly booting the system using a (U)EFI operating system loader stored on any storage device. The default location for the operating system loader is
7450:
5664:
3484:
3107:
2640:
Open-source project TianoCore also provides UEFIs. TianoCore lacks the specialized drivers that initialize chipset functions, which are instead provided by
7022:
2626:
5773:
2993:
Originally started in 1998 as Intel Boot Initiative and later as Extensible Firmware Interface (EFI), which was deprecated in 2005 and replaced by UEFI.
1498:. Some of them already provide a direct option in firmware setup for launching, e.g. compiled x86-64 version of the shell needs to be made available as
6899:
4372:
690:. As GPT incorporates the protective MBR, a BIOS-based computer can boot from a GPT disk using a GPT-aware boot loader stored in the protective MBR's
7000:
6824:
6142:
6877:
4314:
3470:
726:(ESP), which contains UEFI applications such as bootloaders, operating system kernels, and utility software. Such a setup is usually referred to as
2751:, and not the pre-boot state for which Secure Boot is designed to add protection. That also allows users to build their own kernels and use custom
6459:
5279:"Framework-Laptop-16/Mainboard/Mainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.PDF at main · FrameworkComputer/Framework-Laptop-16"
2710:
Other developers raised concerns about the legal and practical issues of implementing support for Secure Boot on Linux systems in general. Former
5924:
2890:
The increased prominence of UEFI firmware in devices has also led to a number of technical problems blamed on their respective implementations.
8464:
7585:
6860:
5946:
4451:
3716:
3543:
2175:
An operating system that can be booted from a (U)EFI is called a (U)EFI-aware operating system, defined by (U)EFI specification. Here the term
7553:
7548:
6093:
4480:
5608:
2974:
605:
the UEFI initialization code between the kernel and UEFI boot loaders, leaving the initialization to be performed only by the Linux kernel's
505:
6301:
6204:
5632:
5228:
2351:
protocol is a mandatory requirement for ARM-based Microsoft Windows operating systems. Microsoft began requiring UEFI to run Windows with
1730:, UEFI initializes and tests system hardware components (e.g. Memory training, PCIe link training, USB link training), and then loads the
7543:
7338:
7074:
6437:
6164:
3002:
Part of the BIOS that is required for booting an operating system that is not UEFI-compatible can be implemeted as a CSM DXE module, see
561:
Standard PC BIOS is limited to a 16-bit processor mode and 1 MB of addressable memory space, resulting from the design based on the
6571:
3911:
2384:
5.9 introduced UEFI boot support for 64-bit x86 systems using its own custom loader, OpenBSD 6.0 extended that support to include ARMv7.
402:
on Arm-based servers. The program requires the system firmware to comply with Server Base Boot Requirements (SBBR). SBBR requires UEFI,
7558:
6056:
6043:
3743:
3024:
1886:
403:
5510:
698:
for GRUB to embed its second-stage code due to absence of the post-MBR gap in GPT partitioned disks (which is taken over by the GPT's
5973:
5690:
4250:
581:, which allows applications in the preboot environment to use 64-bit addressing to get direct access to all of the machine's memory.
7097:
6130:
1023:
In other cases, the EFI driver can be filesystem drivers that allow for booting from other types of disk volumes. Examples include
5459:
5093:
4360:
implemented to support EFI. To differentiate the EFI file system from pure FAT, a new partition file system type has been defined.
4115:
5829:
4574:
312:) specification. The last Intel version of EFI was 1.10 released in 2005. Subsequent versions have been developed as UEFI by the
1112:, which is maintained as part of the UEFI specification and independently from the original FAT specification, encompassing the
4151:
3886:
3196:
730:, while ESP is recommended to be at least 512 MB in size and formatted with a FAT32 filesystem for maximum compatibility.
8234:
6549:
5798:
4709:
891:
UEFI provides time services. Time services include support for time zone and daylight saving fields, which allow the hardware
5406:
5379:
5316:
3568:
3250:
3090:
5253:
1050:
UEFI 2.1 defined a "Human Interface Infrastructure" (HII) to manage user input, localized strings, fonts, and forms (in the
7272:
1164:. This automated detection relies on standardized file paths to the OS boot loader, with the path varying depending on the
6009:
5340:
4734:
2509:
interpreter is made available as a UEFI application by using the EADK. The development has moved to GitHub since UDK2015.
2415:
provides UEFI boot on HP Integrity Servers. It also provides a virtualized UEFI environment for the guest UEFI-aware OSes.
829:
section below. The operating system is permitted to directly write to the framebuffer provided by GOP during runtime mode.
8158:
7497:
2141:
1765:
Class 1: UEFI with a CSM interface and no external UEFI interface. The only UEFI interfaces are internal to the firmware.
1306:
4903:
3689:
7643:
7578:
220:
7245:"SUSE Linux Enterprise Server 15 SP1: Chapter 13. UEFI (Unified Extensible Firmware Interface) (Administration Guide)"
4772:
4061:
8227:
7620:
7491:
6596:
6523:
5860:
3065:
1896:
When a legacy OS is used, CSM will handle this call ensuring the system is compatible with legacy BIOS expectations.
1069:
Most early UEFI firmware implementations were console-based. Today many UEFI firmware implementations are GUI-based.
811:
7120:
5735:
5668:
5583:
3808:
2098:
The EDK (EFI Developer Kit) includes an NT32 target, which allows EFI firmware and EFI applications to run within a
682:
For reverse compatibility, Linux can use GPT disks in BIOS-based systems for both data storage and booting, as both
7458:
7169:
6232:
5151:
3221:
3114:
2203:. Some operating systems vendors may have their own boot loaders. They may also change the default boot location.
1690:
on the hard drive, which would add additional functions to the standard UEFI firmware stored on the motherboard's
139:
4630:
3620:
2719:
2704:
1683:
1055:
934:
3515:
1310:
419:
369:
In July 2005, Intel ceased its development of the EFI specification at version 1.10, and contributed it to the
6925:
5122:
2517:
1369:, which can secure the boot process by preventing the loading of UEFI drivers or OS boot loaders that are not
387:
Version 2.1 of the UEFI specification was released on 7 January 2007. It added network authentication and the
8292:
7897:
7627:
7571:
6950:
6714:
5782:
5123:"Basic Instructions for Using EFI for Server Configuration on Intel® Server Boards and Intel® Server Systems"
2506:
2412:
1799:
This is the first stage of the UEFI boot but may have platform specific binary code that precedes it. (e.g.,
1282:
558:. As of UEFI 2.7, RISC-V processor bindings have been officially established for 32-, 64- and 128-bit modes.
7656:
5061:
4339:
3427:
157:
7751:
3400:
2940:
2461:
2246:
2069:
978:
550:
on top of OPAL, the OpenPOWER abstraction layer, running in little-endian mode. Similar projects exist for
236:
87:
6832:
6105:
3371:
1786:). Legacy boot with those CPUs requires a Legacy Video BIOS, which can still be provided by a video card.
1758:
UEFI machines can have one of the following classes, which were used to help ease the transition to UEFI:
8322:
7919:
7244:
6069:
5811:
2909:
laptop models with Secure Boot that were missing certain certificates required for its proper operation.
2315:
is supported; Graphics Output Protocol (GOP) is not supported. Therefore, PCs running 64-bit versions of
1329:
1263:
In November 2017, Intel announced that it planned to phase out support CSM for client platforms by 2020.
1105:
430:) suitable for embedded environments such as Yocto. Many Linux and BSD distros can support both recipes.
395:
176:
7316:
7044:
6780:
1124:
file systems. The ESP also provides space for a boot sector as part of the backward BIOS compatibility.
546:
processors can be supported. Unofficial UEFI support is under development for POWERPC64 by implementing
7613:
6465:
5308:
2788:
2371:
1270:
In August 2023, Intel announced that it planned to phase out support CSM for server platforms by 2024.
711:
6757:
6633:
3671:
7960:
7786:
7758:
7364:
4935:
2867:
2757:
2740:
2277:
1783:
1425:
1417:
691:
650:
per disk) are relaxed. More specifically, GPT allows for a maximum disk and partition size of 8
618:
6186:
5952:
4505:
2257:
Leopard implement EFI v1.10 in 32-bit mode even on newer 64-bit CPUs, but full support arrived with
1944:
processors, and is proprietary software, although a portion of the code has been released under the
7636:
3142:
2902:
2727:
2680:
2137:
2107:
2076:, which had been used on its previous PowerPC-based systems. On 5 April 2006, Apple first released
1424:(since version 12.3), RHEL (since version 7), CentOS (since version 7), Debian (since version 10),
1044:
498:
320:
7294:
2897:
computer models with Secure Boot had firmware that was hardcoded to allow only executables named "
2430:
prior to version 11 unofficially supports UEFI, but is manually enabled by editing the .vmx file.
5031:
4200:
2958:
2272:(Advanced Server Limited Edition and Datacenter Server Limited Edition; based on the pre-release
1370:
1146:
1059:
666:
535:
398:, a compliance certification program for landing the generic off-the-shelf operating systems and
5422:
3603:"GitHub - andreiw/ppc64le-edk2: TianoCore UEFI for OPAL/PowerNV (PPC64/PowerPC64 Little-Endian)"
1702:
UEFI Capsule defines a Firmware-to-OS firmware update interface, marketed as modern and secure.
6276:
5639:
2952:
2776:, who attacked Red Hat for supporting Microsoft's control over the Secure Boot infrastructure.
2332:
1949:
1882:
1857:
of PCI devices are executed according to system configuration, and boot options are processed.
1302:
1249:
859:
843:
734:
407:
279:
5180:
3014:
Historically also written as Unified EFI, when UEFI was the newly introduced successor to EFI.
2219:. Grub+Linux also supports booting from a GUID partition table without UEFI. The distribution
7369:
7098:"Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open [Updated]"
3951:
3918:
3265:
2787:, contending that Microsoft's Secure Boot requirements on OEM systems were "obstructive" and
2478:
1165:
562:
446:
224:
6671:
5717:
Universal Binary Programming Guidelines, Second Edition: Extensible Firmware Interface (EFI)
4988:
4656:
2355:, with IoT Enterprise editions of Windows 11 since version 24H2 exempt from the requirement.
8167:
8133:
8083:
7953:
7848:
7765:
7689:
7682:
5514:
3509:
2898:
2836:
2077:
1997:
1963:
1687:
1528:
1321:
1200:
1101:
1078:
966:
953:
949:
922:
723:
632:
470:
248:
5984:
5751:
5694:
3303:
2374:
11.1 and later support UEFI boot for x86 systems with UEFI firmware version 2.1 or later.
805:. Boot services are available only while the firmware owns the platform (i.e., before the
8:
8174:
8147:
7978:
7818:
7772:
4603:
4007:
2917:
2851:
2795:
2784:
2769:
2328:
2308:
2285:
2273:
2133:
1981:
released an open source version of its TianoCore EDK2-based UEFI implementation from the
1967:
1735:
1679:
1623:
1612:
1523:
1515:
1494:
Methods used for launching UEFI shell depend on the manufacturer and model of the system
1405:
1401:
1397:
1389:
1084:
986:
695:
569:
processor. In comparison, the processor mode in a UEFI environment can be either 32-bit (
423:
6649:
4090:
3860:
3357:
997:. System firmware has an interpreter for EBC images. In that sense, EBC is analogous to
8435:
8206:
8140:
6739:
5837:
5536:
5467:
4222:
4189:
3809:"Linux kernel 3.15, Section 1.3. EFI 64-bit kernels can be booted from 32-bit firmware"
3499:
UEFI pre-boot guidelines and Microsoft® Windows® 8 UEFI Secure Boot for HP Business PCs
2905:" to load, regardless of any other setting. Other problems were encountered by several
2691:. Microsoft denied that the Secure Boot requirement was intended to serve as a form of
2494:
2431:
2427:
2359:
2258:
1853:
BDS is a part of the DXE. In this stage, boot devices are initialized, UEFI drivers or
1653:
1648:
1590:
1570:
1556:
1546:
1413:
1153:, including variables that indicate the file system paths to OS loaders or OS kernels.
1097:
628:
602:
415:
271:
7410:
4824:
3498:
2658:
1353:
8442:
8111:
8104:
7890:
7487:
5402:
5398:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
5375:
5371:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
5322:
5312:
4172:
3564:
3560:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
3246:
3086:
3082:
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition
2760:
also uses shim, but requires that both the kernel and its modules be signed as well.
2320:
2316:
2304:
2156:
2099:
2042:
1982:
1913:
1829:
1812:
1666:
1661:
1541:
1457:
1374:
1290:
789:
746:
636:
551:
438:
370:
344:
313:
275:
101:
6377:
4849:
4602:
Racherla, Sangam; Erdenberger, Silvio; Rajagopal, Harish; Ruth, Kai (January 2014).
4147:
2390:
supports UEFI booting since the 5.1 release. ArcaOS' UEFI support emulates specific
2159:" feature of Windows 8 (which allows devices to have power management comparable to
331:
The original motivation for EFI came during early development of the first Intel–HP
8407:
8354:
8347:
7933:
7855:
5561:
5460:"The Unified Extensible Firmware Interface (UEFI) — The Linux Kernel documentation"
5304:
Modern embedded computing : designing connected, pervasive, media-rich systems
2812:
2707:
to decide whether or not Secure Boot can be managed by users of their x86 systems.
2696:
2336:
2254:
1953:
1874:
1691:
1637:
1598:
1551:
1536:
1286:
1032:
1010:
897:
252:
240:
196:
2448:
5.0 hypervisor officially supports UEFI. Version 6.5 adds support for Secure Boot.
1335:
Version 2.5 of the UEFI specification adds support for accessing boot images over
1108:
volumes on optical discs. For use on ESPs, UEFI defines a specific version of the
8283:
7841:
7696:
7147:"Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw"
6209:
5723:
5396:
5369:
4581:
3558:
3080:
2772:
files signed by Microsoft. However, the proposal was criticized by Linux creator
2715:
2118:
2088:
2034:
1992:
An implementation of the UEFI API was introduced into the Universal Boot Loader (
1971:
1739:
1161:
1109:
1093:
1006:
892:
6501:
5584:"Microsoft Announces "Project Mu" For Open-Source UEFI Alternative To TianoCore"
2893:
Following the release of Windows 8 in late 2012, it was discovered that certain
1273:
As of today, all computers based on Intel platforms no longer have CSM support.
1149:(usually boot loader). The boot configuration is defined by variables stored in
380:
Version 2.0 of the UEFI specification was released on 31 January 2006. It added
7811:
6502:"Using EFI/UEFI firmware in a VMware Virtual Machine | VMware Communities"
6479:
6015:
5442:
4423:
3197:"Emulex UEFI Implementation Delivers Industry-leading Features for IBM Systems"
2839:
and shim, which refuse buggy or vulnerability intermediate bootloader (usually
2773:
2744:
2692:
2684:
2653:
2296:
family of processors, implement EFI, a requirement of the platform through the
2250:
1257:
622:
411:
410:
compliance. In October 2020, Arm announced the extension of the program to the
388:
6802:
6402:
5013:
476:
Flexible pre-OS environment, including network capability, GUI, multi language
8458:
8006:
7999:
7737:
7666:
7390:
5326:
4194:
2783:
free software development group Hispalinux filed a formal complaint with the
2752:
2666:
2634:
2424:
3 software for Mac OS X can boot Mac OS X Server virtual machines using UEFI.
2421:
2394:
functionality which the operating system depends on (particularly interrupts
2073:
1890:
1170:<EFI_SYSTEM_PARTITION>\EFI\BOOT\BOOT<MACHINE_TYPE_SHORT_NAME>.EFI
998:
982:
753:
521:
It is also possible for operating systems to access UEFI configuration data.
146:
3639:
2756:
Microsoft key (for compatibility reasons) to be included in their firmware.
2726:
without a distribution's developer disclosing the private key (however, the
1448:
1248:
that do not support UEFI to still be used. It also provides required legacy
1062:(IBVs) to design graphical interfaces for pre-boot configuration. UEFI uses
294:
as proprietary software, UEFI is an open standard maintained by an industry
8261:
8027:
7779:
6381:
5812:"Windows Hardware Certification Requirements for Client and Server Systems"
2731:
2513:
2281:
2269:
2208:
2148:
2114:
2087:
Since 2005, EFI has also been implemented on non-PC architectures, such as
601:
support from a UEFI boot loader as the requirement. UEFI handover protocol
586:
452:
The latest UEFI specification, version 2.10, was published in August 2022.
381:
168:
6602:
5896:
5302:
3602:
3456:
3164:
1771:
Class 3: UEFI without a CSM interface and with an external UEFI interface.
1156:
OS boot loaders can be automatically detected by UEFI, which enables easy
8393:
8329:
7992:
7944:
7559:
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
5039:
4799:
4481:"The PC BIOS will be killed off by 2020 as Intel plans move to pure UEFI"
3372:"Unified Extensible Firmware Interface (UEFI) Specification Version 2.10"
3358:"Microsoft announces Project Mu, an open-source release of the UEFI core"
2840:
2502:
2181:<EFI_SYSTEM_PARTITION>/BOOT/BOOT<MACHINE_TYPE_SHORT_NAME>.EFI
1945:
1825:
1731:
1707:
1495:
1461:
1385:
1281:
The UEFI specification includes support for booting over network via the
1223:
1142:
1138:
1089:
909:
761:
363:
28:
7045:"Exclusive: Open software group files complaint against Microsoft to EU"
6616:
2041:
systems, released in 2002, implemented EFI 1.10; they were able to boot
8428:
8414:
8254:
7926:
7728:
7563:
5188:
5159:
5101:
4911:
4531:"Removal of Legacy Boot Support for Intel Platforms Technical Advisory"
4296:
4015:
3864:
3227:
2969:
2930:
2879:
2831:
2827:
2816:
2748:
2700:
2497:
functions in UEFI applications. EADK can be freely downloaded from the
2451:
2352:
2242:
2160:
2065:
2009:
1993:
1986:
1854:
1779:
1778:
Starting from the 10th Gen Intel Core, Intel no longer provides Legacy
1711:
1460:, which can be used to execute other UEFI applications, including UEFI
1429:
1409:
1393:
1245:
867:
835:
769:
765:
566:
543:
427:
399:
295:
73:
7194:
6057:
Unified Extensible Firmware Interface (UEFI) Implementation Guidelines
5736:
Apple's Transition from Open Firmware to Extensible Firmware Interface
4874:
4759:
4506:"CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit"
3879:
2464:
can be used with the Open Virtual Machine Firmware (OVMF) provided by
2284:
Advanced Server Limited Edition (pre-release Windows Server 2003) and
577:, Itanium, and AArch64). 64-bit UEFI firmware implementations support
534:
As of version 2.5, processor bindings exist for Itanium, x86, x86-64,
8400:
8048:
7883:
7876:
7832:
7544:
Microsoft UEFI Support and Requirements for Windows Operating Systems
7219:
6190:
4963:
3783:
3457:"Non-boot disks can use a GPT partition table even with no UEFI bios"
2675:
2344:
2340:
2324:
2038:
2004:
distributions use the U-Boot UEFI implementation in conjunction with
1978:
1808:
1747:
1703:
1433:
1381:
757:
578:
434:
340:
256:
244:
172:
164:
7023:"Linus Torvalds: I will not change Linux to "deep-throat Microsoft""
6378:"ArcaOS 5.1 gives vintage OS/2 a UEFI facelift for the 21st century"
5775:
Evaluating UEFI using Commercially Available Platforms and Solutions
5489:
2418:
Intel hosts an Open Virtual Machine Firmware project on SourceForge.
1966:' implementation of UEFI is branded as SecureCore Technology (SCT).
1187:
8421:
8386:
8220:
8076:
8013:
7869:
7862:
7594:
6975:
6715:"TianoCore on SourceForge: EDK2 Application Development Kit (EADK)"
6430:"Modern OS/2 distribution ArcaOS adds support for booting via UEFI"
5345:
4679:
3834:
3435:
3283:
2964:
2935:
2912:
In January 2013, a bug surrounding the UEFI implementation on some
2875:
2844:
2723:
2641:
2630:
2375:
2216:
2211:
has been able to use EFI at boot time since early 2000s, using the
2144:
2005:
1957:
1889:. A typical modern OS will prefer to use its own programs (such as
1800:
1768:
Class 2: UEFI with CSM and external UEFI interfaces, eg. UEFI Boot.
1421:
1195:
Booting UEFI systems from GPT-partitioned disks is commonly called
773:
707:
651:
640:
466:
287:
267:
228:
112:
7528:
7430:
3672:"Unified Extensible Firmware Interface Specification, Version 2.7"
2362:
awarded a grant to a developer seeking to add UEFI support to the
2140:) launched several consumer-oriented motherboards using the Intel
2031:
workstations and servers, released in 2000, implemented EFI 1.02.
1970:
offers its own UEFI firmware implementation known as Aptio, while
883:
after a crash for the operating system to retrieve after a reboot.
8315:
8055:
8034:
7985:
7825:
7804:
7598:
7374:
6351:
6326:
4684:
4552:
4340:"UEFI Specification Version 2.5, Section 12.3 File System Format"
3838:
2913:
2906:
2807:
2803:
2711:
2674:
In 2011, Microsoft announced that computers certified to run its
2472:
2399:
2395:
2381:
2363:
2312:
2303:
Microsoft introduced UEFI for x64 Windows operating systems with
2293:
2265:
2236:
2058:
2050:
2028:
1933:
1804:
1437:
1229:
BIOS-style booting from MBR-partitioned disks is commonly called
1157:
1002:
627:
In addition to the standard PC disk partition scheme that uses a
590:
492:
442:
332:
232:
7001:"No Microsoft certificate support in Linux kernel says Torvalds"
6254:
4601:
2311:
however only UGA (Universal Graphic Adapter) 1.1 or Legacy BIOS
1203:
on MBR-partitioned disks. Such a boot scheme is commonly called
686:
and Linux are GPT-aware. Such a setup is usually referred to as
465:
Ability to boot a disk containing large partitions (over 2
8368:
8097:
8062:
7363:
Zimmer, Vincent; Rothman, Michael; Hale, Robert (10 May 2007).
6847:"Next-gen boot spec could forever lock Linux off Windows 8 PCS"
5427:
5286:
3530:"Next-gen boot spec could forever lock Linux off Windows 8 PCS"
3308:
3288:
3028:
2894:
2871:
2863:
2859:
2442:
2387:
2220:
2125:
2092:
1941:
1929:
1909:
1506:) a boot option associated with the compiled version of shell.
1358:
1173:
1063:
945:
683:
594:
574:
555:
6900:"Windows 10 to make the Secure Boot alt-OS lock out a reality"
6750:
6524:"Announcing VMware Workstation 14 - VMware Workstation Zealot"
6106:"Unified Extended Firmware Interface support in Windows Vista"
5746:
5744:
4398:
4148:"UEFI system booting from MBR partition table and GRUB legacy"
925:. They can be executed from the UEFI Shell, by the firmware's
319:
UEFI is independent of platform and programming language, but
8361:
8213:
8069:
8041:
8020:
7533:
7273:"Linux on Windows 8 PCs: Some progress, but still a nuisance"
7067:"Researchers demo exploits that bypass Windows 8 Secure Boot"
6803:"coreboot (aka LinuxBIOS): The Free/Open-Source x86 Firmware"
6718:
5395:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
5368:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
5129:
5069:
4939:
4318:
4116:"Unified Extensible Firmware Interface: EFI System Partition"
3557:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
3337:
3323:
3079:
Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017).
3031:(SMBIOS) were subsequently implemented in BIOS-based systems.
2780:
2765:
2688:
2498:
2297:
2289:
2230:
2226:
2212:
2054:
2046:
2024:
2001:
1937:
1715:
1484:
1325:
1314:
1150:
1121:
1117:
1113:
1028:
1013:
981:-specific device drivers, EFI provides for a ISA-independent
880:
745:
Some of the EFI's practices and data formats mirror those of
672:
570:
539:
484:
480:
348:
301:
6187:"Find Windows 11 specs, features, and computer requirements"
5088:
5086:
2683:) of trying to use the Secure Boot functionality of UEFI to
2481:
Shielded VMs support virtualized UEFI to enable Secure Boot.
243:. Examples of firmware that implement the specification are
202:
8306:
8299:
8268:
8090:
7744:
7721:
6480:"VMWare Workstation EFI firmware | VMware Communities"
5925:"Ubuntu will use GRUB 2 for its Secure Boot implementation"
5741:
4930:
4928:
4773:"Debian Making Progress on UEFI SecureBoot Support in 2018"
3304:"GitHub - tianocore/Tianocore.github.io: Tianocore website"
2946:
2855:
2457:
2445:
2391:
2348:
2129:
2013:
2012:), the same holds true for OpenBSD. For booting from iSCSI
1833:
1727:
1336:
1298:
1294:
1051:
941:
851:
645:
336:
263:
211:
97:
83:
7059:
6892:
5601:
4459:
Compatibility Support Module Specification (revision 0.97)
3657:
3223:
Extensible Firmware Interface (EFI) and Unified EFI (UEFI)
2743:
uses an older version of shim pre-configured for use with
2687:
the installation of alternative operating systems such as
323:
is used for the reference implementation TianoCore EDKII.
7170:"Windows 11, version 23H2 known issues and notifications"
5229:"Windows UEFI firmware update platform - Windows drivers"
5083:
3955:
3422:
3420:
3418:
1916:
UEFI, the UEFI used on all Surface models made after 2015
1743:
1682:
storage device attached to the computer. For example, an
488:
391:
architecture ('Human Interface Infrastructure' in UEFI).
291:
205:
6795:
6205:"Minimum System Requirements for Windows IoT Enterprise"
5830:"Microsoft: All You Need to Know About Windows 8 on ARM"
5752:"Intel® Platform Innovation Framework for UEFI Overview"
4925:
4315:"Intel Embedded Graphics Drivers FAQ: BIOS and firmware"
3861:"Linux kernel documentation: Documentation/efi-stub.txt"
2110:
motherboards with ClickBIOS, HP EliteBook Notebook PCs.
1483:
Source code for a UEFI shell can be downloaded from the
1083:
An EFI system partition, often abbreviated to ESP, is a
940:
A type of UEFI application is an OS boot loader such as
913:
Interaction between the EFI boot manager and EFI drivers
7549:
How Windows 8 Hybrid Shutdown / Fast Boot feature works
7037:
6861:"Windows 8 secure boot could complicate Linux installs"
6165:"Windows 8 secure boot could complicate Linux installs"
6156:
5503:
4281:
3544:"Windows 8 secure boot could complicate Linux installs"
2625:
Numerous digital rights activists have protested UEFI.
694:. In the case of GRUB, such a configuration requires a
437:
announced Project Mu, a fork of TianoCore EDK2 used in
6878:"Is Microsoft Blocking Linux Booting on ARM Hardware?"
5919:
5917:
5915:
5394:
5367:
4704:
4702:
4142:
4140:
4138:
4136:
3556:
3415:
3078:
2117:
machines (x3550 M2, x3650 M2, iDataPlex dx360 M2) and
1332:(FCoE) as supported protocols for accessing the SANs.
422:. Arm SystemReady defined the Base Boot Requirements (
7167:
5886:
by maintainer Brett Johnson made on 27 February 2004.
4037:"GRUB and the boot process on UEFI-based x86 systems"
3904:
1839:
208:
7534:
Intel-sponsored open-source EFI Framework initiative
7521:
7339:"Booting Linux using UEFI can brick Samsung laptops"
6070:"Open Virtual Machine Firmware (OVMF) Status Report"
4958:
4956:
4605:
Storage and Network Convergence Using FCoE and iSCSI
4245:
4243:
4085:
4083:
3945:
3943:
3941:
3939:
2516:" C program written using EADK looks similar to its
2016:
can be used as a UEFI application loaded by U-Boot.
1774:
Class 3+: UEFI class 3 that has Secure Boot enabled.
1746:
systems, the UEFI firmware is usually stored in the
1678:
Extensions to UEFI can be loaded from virtually any
1172:; for example, the file path to the OS loader on an
933:
can be developed and installed independently of the
772:
can boot from a GPT disk that is larger than 2
123:
5912:
5423:"PI Boot Flow · tianocore/Tianocore.github.io Wiki"
4699:
4190:"EFI and Linux: The Future Is Here, and It's Awful"
4133:
2215:EFI boot loader or, more recently, EFI versions of
1365:The UEFI specification defines a protocol known as
593:on 32-bit UEFI firmware implementations running on
199:
7331:
7309:
6672:"What's New in Hyper-V for Windows Server 2012 R2"
6002:
5889:
4898:
4896:
4710:"Windows 8 Secure Boot: The Controversy Continues"
4183:
4181:
3952:"Make the most of large drives with GPT and Linux"
3485:"OA 3.0 Tool: Command-line and config file syntax"
7362:
6403:"Booting ArcaOS on UEFI hardware (demonstration)"
6143:"Microsoft Touts Incredible Windows 8 Boot Times"
6098:
5817:emulation and legacy PC/AT boot must be disabled.
5792:
5341:"Intel schrapt bios-compatibiliteit uefi in 2020"
4953:
4735:"Secure Boot for ESXi 6.5 - Hypervisor Assurance"
4446:
4444:
4251:"Samsung UEFI bug: Notebook bricked from Windows"
4240:
4223:"What is efifb? — The Linux Kernel documentation"
4080:
3936:
3704:
3449:
3393:
1845:transferring configuration data to the hardware.
1476:), loading UEFI drivers, and editing text files (
1137:Unlike the legacy PC BIOS, UEFI does not rely on
8456:
7408:
7388:
7267:
7265:
6970:
6968:
6632:"Statement by sr. software engineer at Oracle",
6247:
5822:
5657:
4964:"UEFI Shell Specification Version 2.0, Errata A"
3066:"Microsoft Surface Laptop 7 (13.8-inch) Chip ID"
2916:laptops was publicized, which caused them to be
1357:Example of an active Secure Boot as detected by
1244:allows legacy operating systems and some legacy
7317:"Linux acquitted in Samsung laptop UEFI deaths"
5625:
4893:
4671:
4545:"Red Hat Enterprise Linux 6 Installation Guide"
4178:
4062:"UEFI Booting 64-bit Redhat Enterprise Linux 6"
3778:
3776:
3774:
3772:
3770:
3768:
3766:
3764:
1819:
373:, which has developed the specification as the
163:The UEFI implementation is usually stored on a
7970:
7409:de Boyne Pollard, Jonathan (8 December 2011).
7295:"Lenovo UEFI Only Wants To Boot Windows, RHEL"
5861:""Last Mile" Barriers to Removing Legacy BIOS"
5482:
4572:
4452:"Intel® Platform Innovation Framework for EFI"
4441:
3731:
2183:, where short name of the machine type can be
1974:offers InsydeH2O, and Byosoft offers ByoCore.
1860:
1436:(since version 8.4). As of January 2024,
286:. Contrary to its predecessor BIOS which is a
7579:
7262:
6965:
6951:"Shimming your way to Linux on Windows 8 PCs"
6782:The Coming War on General Purpose Computation
6294:
4631:"New UEFI HTTP Boot support in UEFI 2.5"
4332:
4175:. Cl.cam.ac.uk. Retrieved on 30 October 2013.
3784:"UEFI Specifications (version 2.4 and older)"
3191:
3189:
3187:
3185:
6995:
6993:
6872:
6870:
5537:"Aptio®: The Complete UEFI Product Solution"
5300:
4002:
4000:
3998:
3761:
3471:"Using the OA 3.0 Tool on the factory floor"
3364:
2949:(Advanced Configuration and Power Interface)
1168:. The format of the file path is defined as
612:
175:. They can use different I/O protocols, but
7389:de Boyne Pollard, Jonathan (11 July 2011).
6976:"Ubuntu details its UEFI Secure Boot plans"
5036:Inclusion of UEFI shell in Linux distro iso
4575:"Advances in Pre-OS Networking in UEFI 2.4"
4373:"Technical Note TN2166: Secrets of the GPT"
3681:
3284:"GitHub - tianocore/Edk: Git mirror of EDK"
2485:
1848:
445:products. The project promotes the idea of
16:Operating system and firmware specification
8181:
7586:
7572:
7095:
7015:
6225:
5858:
5683:
5554:
5529:
3710:
3690:"LBA explained — Solving the 3TB Problem?"
3182:
3143:"MS denies secure boot will exclude Linux"
3025:Advanced Configuration and Power Interface
2662:Examples of custom Secure Boot public keys
2475:virtual machine supports virtualized UEFI.
1811:). It consists of minimal code written in
1348:
825:(GOP) provides runtime services; see also
529:
7476:"UEFI Today: Bootstrapping the Continuum"
7287:
7121:"BlackLotus UEFI bootkit: Myth confirmed"
6990:
6867:
6504:. Communities.vmware.com. 6 December 2014
4108:
3995:
3715:. Intel Architecture Blog. Archived from
3687:
2802:Microsoft and exposes the possibility of
2229:has used (U)EFI as its boot mechanism on
1956:. TianoCore can be used as a payload for
1718:for Linux each support the UEFI Capsule.
1500:<EFI_SYSTEM_PARTITION>/SHELLX64.EFI
7593:
7451:"UEFI – Just How Important It Really Is"
7168:WindowsCommunications (26 August 2024).
6778:
6482:. Communities.vmware.com. 3 October 2012
6302:"Oracle Solaris 11.1 — What's New"
5254:"Getting Started | Microchip Technology"
3592:UEFI specification 2.3.1, section 1.8.1.
3137:
3135:
3099:
3023:Large disk support and features such as
2665:
2657:
2276:codebase) implemented EFI 1.10 in 2002.
1908:
1447:
1352:
1326:Internet Small Computer System Interface
1186:
908:
788:
7448:
6427:
6162:
5665:"Installing OpenBSD 6.3 on Raspberry 3"
5301:Barry, Peter; Crowley, Patrick (2012).
5226:
5152:"Unified Extensible Firmware Interface"
5094:"Unified Extensible Firmware Interface"
4904:"Unified Extensible Firmware Interface"
4797:
4770:
4187:
4173:IBM PC Real Time Clock should run in UT
3637:
2471:The second generation of the Microsoft
1794:
1072:
1001:, the ISA-independent firmware used in
818:Graphics Output Protocol (GOP) services
8457:
7473:
7144:
7118:
6375:
5513:. Phoenix Technologies. Archived from
5401:. Walter de Gruyter GmbH & Co KG.
5374:. Walter de Gruyter GmbH & Co KG.
4294:
3563:. Walter de Gruyter GmbH & Co KG.
3105:
3085:. Walter de Gruyter GmbH & Co KG.
2854:support UEFI Secure Boot now, such as
2505:project. As an example, a port of the
2406:
826:
343:, 1 MB addressable memory space,
8465:Unified Extensible Firmware Interface
7567:
7428:
6094:Boot to UEFI Mode or legacy BIOS mode
6067:
5859:Richardson, Brian (30 October 2017).
4798:Garrett, Matthew (27 December 2012).
4203:from the original on 13 November 2021
3949:
3740:"UEFI Momentum — The AMD perspective"
3132:
3017:
2670:MokManager, a part of Shim bootloader
1920:Intel's implementation of EFI is the
1686:(OEM) can distribute systems with an
1468:), modifying boot manager variables (
1412:, VMware vSphere 6.5 and a number of
756:SP1 and later and 64-bit versions of
375:Unified Extensible Firmware Interface
187:Unified Extensible Firmware Interface
22:Unified Extensible Firmware Interface
7554:Securing the Windows 10 Boot Process
7449:Kothari, Rajiv (21 September 2011).
5691:"iSCSI booting with U-Boot and iPXE"
4549:30.2.2. Configuring PXE boot for EFI
4188:Garrett, Matthew (19 January 2012).
4154:from the original on 8 December 2023
3106:Kinney, Michael (1 September 2000).
2885:
2720:GNU General Public License version 3
2378:2 is used as the boot loader on x86.
2170:
2072:. These systems used EFI instead of
2061:added UEFI capability in June 2003.
1452:Example of an UEFI shell 2.2 session
1320:OS images can be remotely stored on
1038:
740:
716:21686148-6449-6E6F-744E-656564454649
675:is enabled by turning on the option
6779:Doctorow, Cory (27 December 2011),
4573:El-Haj-Mahmoud, Samer (July 2013).
3977:"block/partitions/Kconfig (3.11.1)"
3737:
3583:UEFI Specification 2.4, section 2.3
3240:
3108:"Solving BIOS Boot Issues with EFI"
1922:Intel Platform Innovation Framework
1307:Dynamic Host Configuration Protocol
917:Beyond loading an OS, UEFI can run
797:EFI defines two types of services:
13:
7356:
7096:MENDELSOHN, Tom (12 August 2016).
6572:"VMware vSphere 6.5 Release Notes"
6163:Brodkin, Jon (21 September 2011).
4800:"Secure Boot distribution support"
4771:Larabel, Michael (30 April 2018).
3950:Smith, Roderick W. (3 July 2012).
1904:
1840:DXE – Driver Execution Environment
1472:), running partitioning programs (
1276:
1220:Compatibility Support Module (CSM)
900:is set to indicate the use of UTC.
514:Backward and forward compatibility
14:
8476:
7513:
6428:Sanders, James (13 August 2019).
6376:Proven, Liam (4 September 2023).
6036:"Extensible Firmware Interface",
3711:Richardson, Brian (10 May 2010).
3145:. The Register. 23 September 2011
2975:Python Interpreter for UEFI Shell
2292:, all of which are for the Intel
972:
929:, or by other UEFI applications.
926:
667:EFI System partition § Linux
7655:
7237:
7212:
7187:
7161:
7138:
7112:
7089:
7025:. Ars Technica. 26 February 2013
6943:
6918:
6853:
6839:
6817:
6772:
6732:
6707:
6686:
6664:
6642:
6625:
6609:
6589:
6564:
6542:
6516:
6494:
6472:
6452:
6421:
6395:
6369:
6344:
6319:
6269:
6197:
6179:
6135:
6124:
6087:
6061:
6050:
6029:
5983:. 6 October 2017. Archived from
5966:
5939:
5877:
5852:
5804:
5781:, UEFI, May 2011, archived from
5766:
5729:
5709:
5576:
5452:
5435:
5415:
5388:
5361:
5333:
4677:
4150:. Arch Linux Forums. June 2012.
3981:CONFIG_EFI_PARTITION (line #247)
3113:. pp. 47–50. Archived from
3003:
2647:
2540:<Library/ShellCEntryLib.h>
2493:(EADK) makes it possible to use
2491:EDK2 Application Development Kit
2435:
2124:In 2011, major vendors (such as
1440:support is in a planning stage.
1056:original equipment manufacturers
935:original equipment manufacturers
631:(MBR), UEFI also works with the
524:
418:market. The new program name is
283:
195:
156:
138:
27:
7431:"A BIOS to UEFI Transformation"
7411:"The Windows NT 6 boot process"
7119:Smolár, Martin (1 March 2023).
5884:Announcement of release 3.5pre1
5609:"Marrying U-Boot UEFI and GRUB"
5294:
5271:
5246:
5220:
5202:
5173:
5144:
5115:
5054:
5024:
5006:
4981:
4867:
4842:
4817:
4791:
4764:
4753:
4727:
4649:
4623:
4595:
4566:
4537:
4523:
4498:
4473:
4416:
4391:
4365:
4349:. April 2015. pp. 536, 537
4307:
4288:
4274:
4271:UEFI specification, section 7.3
4265:
4215:
4166:
4054:
4029:
3969:
3853:
3827:
3801:
3664:
3650:
3631:
3613:
3595:
3586:
3577:
3550:
3536:
3522:
3491:
3477:
3463:
3350:
3330:
3316:
3296:
3276:
3258:
3234:
3214:
3165:"Memory Map (x86) - OSDev Wiki"
2847:) to load in the boot process.
2070:Intel-based Macintosh computers
1893:) to control hardware devices.
1868:
1697:
1684:original equipment manufacturer
1160:from removable devices such as
1132:
921:, which reside as files on the
904:
619:GPT § Operating systems support
394:In October 2018, Arm announced
290:standard originally created by
145:Boot order selection menu on a
6131:Microsoft Basic Display Driver
6068:Ersek, Laszlo (January 2015).
4295:Batard, Pete (13 March 2020).
3688:Hardwidge, Ben (1 June 2010).
3403:. Microsoft. 15 September 2009
3241:Wei, Dong (2006), "foreword",
3157:
3072:
3058:
3044:
3008:
2996:
2987:
2465:
1789:
1488:
1342:
1311:Trivial File Transfer Protocol
1213:
1066:to encode strings by default.
1045:GOP (Graphics Output Protocol)
1027:for 37 file systems (based on
870:services (for RISC processors)
589:supports 64-bit kernels to be
547:
235:a computer's hardware and its
1:
8293:Preboot Execution Environment
7898:Run-Time Abstraction Services
6831:, SourceForge, archived from
6758:"Interview: Ronald G Minnich"
6650:"Testing secureboot with KVM"
6464:, SourceForge, archived from
6461:Open Virtual Machine Firmware
6233:"FreeBSD to get UEFI support"
6014:, SourceForge, archived from
6011:rEFIt — Windows Vista and EFI
5974:"State of the Port to x86-64"
4659:. Microsoft. 10 December 2014
3912:"FAQ: Drive Partition Limits"
3887:"FAQ: Drive Partition Limits"
3835:"x86, efi: Handover Protocol"
3789:. Unified EFI, Inc. June 2013
3270:Extensible Firmware Interface
3266:"1.10 Specification overview"
3038:
2718:noted that conditions in the
2413:HP Integrity Virtual Machines
1673:
1443:
1283:Preboot eXecution Environment
1035:for chain-loading NTFS ESPs.
455:
357:Extensible Firmware Interface
306:Extensible Firmware Interface
7752:MultiProcessor Specification
7435:Roderick W. Smith's Web Page
7145:Goodin, Dan (6 March 2023).
6601:, VirtualBox, archived from
6108:. Microsoft. 26 October 2006
5799:Asus P67 Motherboard Preview
4969:. Unified EFI, Inc. May 2012
4611:(2nd ed.). IBM Redbooks
3917:. UEFI Forum. Archived from
3713:"Ask a BIOS Guy: "Why UEFI""
3638:kontais (3 September 2015).
2941:UEFI Platform Initialization
2724:GNU GRand Unified Bootloader
2620:
2019:
1820:PEI – Pre-EFI Initialization
1518:supported by the EFI shell.
1380:Secure Boot is supported by
1252:(SMM) functionality, called
1242:Compatibility Support Module
979:instruction set architecture
959:
339:limitations (such as 16-bit
88:UEFI Platform Initialization
7:
8323:Remote Initial Program Load
7920:Common Firmware Environment
7429:Smith, Roderick W. (2011).
7195:"HowTos/UEFI - CentOS Wiki"
6550:"What's New in vSphere 5.0"
6042:, Microsoft, archived from
5814:. Microsoft. January 2013.
5032:"Email Archive: edk2-devel"
4282:"Free Software EFI Drivers"
2924:
2722:may prevent the use of the
1861:TSL – Transient System Load
1828:initialization (initialize
1721:
1514:The following is a list of
1509:
1432:(since version 21.3)., and
1330:Fibre Channel over Ethernet
784:
779:
639:per disk, and up to 2
506:Python interpreter for UEFI
10:
8481:
7912:Hybrid firmware bootloader
7653:
7220:"SecureBoot - Debian Wiki"
6805:. YouTube. 31 October 2008
5542:. American Megatrends, Inc
5309:Morgan Kaufmann Publishers
5062:"TianoCore on SourceForge"
5014:"tianocore/edk2: releases"
4936:"EFI Shells and Scripting"
3514:: CS1 maint: url-status (
2685:hinder or outright prevent
2654:Windows 8 § Reception
2651:
2367:for arm64 in FreeBSD 11.0.
1873:The UEFI hands off to the
1753:
1346:
1127:
1076:
712:Globally Unique Identifier
710:in size, this partition's
664:
616:
355:. It was later renamed to
335:systems in the mid-1990s.
326:
278:, although it can provide
8378:
8339:
8282:
8246:
8198:
8191:
8157:
8125:
7961:Comparison of bootloaders
7943:
7911:
7796:
7706:
7674:
7664:
7605:
6760:. Fosdem. 6 February 2007
6528:VMware Workstation Zealot
6039:Windows Server TechCenter
4760:HowTos/UEFI - CentOS Wiki
4461:. Intel. 4 September 2007
3621:"Tianocore for OpenPOWER"
3052:"Documentation - Winbond"
2534:<Library/UefiLib.h>
2347:, the UEFI firmware with
2278:Windows XP 64-bit Edition
2245:uses EFI for its line of
2147:chipset and AMD 9 Series
1784:Intel Graphics Technology
1750:chip of the motherboard.
1428:(since version 12.04.2),
1016:computers, among others.
793:Example of UEFI variables
613:Disk device compatibility
504:Python programming using
487:) or 64-bit (for example
266:which was present in the
239:for interaction with the
118:
108:
93:
79:
69:
59:
51:
43:
35:
26:
7480:Intel Technology Journal
7415:Frequently Given Answers
7395:Frequently Given Answers
7047:. Reuters. 26 March 2013
6930:Free Software Foundation
5214:tianocore-docs.github.io
4825:"Linux Mint Secure boot"
4680:"UEFI and "secure boot""
2980:
2903:Red Hat Enterprise Linux
2728:Free Software Foundation
2681:Free Software Foundation
2522:
2501:'s TianoCore UDK / EDK2
2486:Applications development
2259:OS X v10.8 Mountain Lion
1928:. Tiano runs on Intel's
1899:
1849:BDS – Boot Device Select
1060:independent BIOS vendors
977:In addition to standard
823:Graphics Output Protocol
714:(GUID) in GPT scheme is
660:
7849:Phoenix SecureCore UEFI
5948:OpenVMS Release History
5633:"UEFI on Top of U-Boot"
5210:"Signed Capsule Update"
4510:Securelist by Kaspersky
3226:, Intel, archived from
2959:Trusted Platform Module
2874:(Debian 10 and later),
1184:on ARM64 architecture.
1147:operating system kernel
752:The 64-bit versions of
704:Primary Partition Table
530:Processor compatibility
304:developed the original
280:backwards compatibility
219:or as an acronym) is a
171:that is located on the
7391:"The EFI boot process"
7249:documentation.suse.com
5564:. Insyde Software Corp
5490:"TianoCore - coreboot"
5443:"Engineering Services"
4850:"8.4 | AlmaLinux Wiki"
4657:"Secure Boot Overview"
3029:System Management BIOS
2953:System Management BIOS
2862:(CentOS 7 and later),
2779:On 26 March 2013, the
2671:
2663:
2333:Windows Server 2008 R2
1950:Eclipse Public License
1917:
1453:
1362:
1303:User Datagram Protocol
1250:System Management Mode
1192:
1182:\efi\boot\bootaa64.efi
914:
794:
735:backward compatibility
573:, AArch32) or 64-bit (
7539:Intel EFI/UEFI portal
7474:Fisher, Doug (2011).
6255:"UEFI - FreeBSD Wiki"
3742:. AMD. Archived from
3432:3.4 BIOS installation
3342:, Unified EFI Forum,
2669:
2661:
2479:Google Cloud Platform
2358:On 5 March 2013, the
2113:In 2009, IBM shipped
1912:
1451:
1356:
1349:Secure Boot criticism
1322:storage area networks
1190:
1178:\efi\boot\bootx64.efi
1166:computer architecture
1054:sense). These enable
912:
792:
447:Firmware as a Service
353:Intel Boot Initiative
8168:EFI system partition
8134:GUID Partition Table
8084:Windows Boot Manager
7954:Bootloader unlocking
7766:Legacy Plug and Play
7690:Open-source firmware
7683:Proprietary firmware
7500:on 27 September 2013
6863:. 21 September 2011.
6605:on 28 September 2010
5990:on 22 September 2020
5951:, HP, archived from
5722:24 July 2008 at the
5645:on 11 September 2018
5098:Launching UEFI Shell
4804:Mjg59.dreamwidth.org
4635:firmwaresecurity.com
4424:"EFISTUB - ArchWiki"
3546:. 21 September 2011.
3324:"What is TianoCore?"
2899:Windows Boot Manager
2858:(RHEL 7 and later),
2837:Windows Boot Manager
2796:Black Hat conference
2177:booted from a (U)EFI
2151:chipsets with UEFI.
1964:Phoenix Technologies
1795:SEC – Security Phase
1762:Class 0: Legacy BIOS
1688:EFI system partition
1420:(since version 18),
1201:EFI System Partition
1079:EFI system partition
1073:EFI system partition
967:BIOS interrupt calls
954:Windows Boot Manager
923:EFI system partition
724:EFI system partition
677:CONFIG_EFI_PARTITION
633:GUID Partition Table
495:) pre-OS environment
479:32-bit (for example
471:GUID Partition Table
282:with the BIOS using
147:Lenovo ThinkPad T470
8175:BIOS boot partition
8148:Apple Partition Map
7979:Acronis OS Selector
7819:American Megatrends
7529:UEFI Specifications
7174:learn.microsoft.com
6978:. Linux Weekly News
6018:on 5 September 2008
5898:EFI version of Grub
5840:on 6 September 2013
5671:on 21 November 2018
5517:on 6 September 2010
5511:"SecureCore Tiano™"
5181:"GRUB EFI Examples"
4739:VMware vSphere Blog
4399:"UEFI - OSDev Wiki"
4377:developer.apple.com
4297:"pbatard/uefi-ntfs"
3658:"lowRISC · lowRISC"
3360:. 20 December 2018.
2852:Linux distributions
2826:In August 2024 the
2785:European Commission
2518:usual C counterpart
2407:With virtualization
2329:Windows Server 2008
2309:Windows Server 2008
2286:Windows Server 2003
2274:Windows Server 2003
2233:systems since 2002.
1968:American Megatrends
1736:mass storage device
1414:Linux distributions
1398:Windows Server 2016
1390:Windows Server 2012
1373:with an acceptable
1285:(PXE). PXE booting
1085:data storage device
987:non-volatile memory
706:). Commonly 1
696:BIOS boot partition
692:bootstrap code area
671:Support for GPT in
565:that used a 16-bit
179:is the most common.
23:
8436:Power-on self-test
8141:Master boot record
7461:on 25 October 2012
7370:Dr. Dobb's Journal
7365:"EFI Architecture"
7125:welivesecurity.com
6880:. Computerworld UK
6674:. MicrosoftTechNet
6440:on 21 October 2019
5901:, Debian GNU/Linux
5470:on 25 October 2020
5233:docs.microsoft.com
4854:wiki.almalinux.org
4428:wiki.archlinux.org
4091:"UEFI Bootloaders"
3627:. 12 October 2015.
3473:. 25 October 2021.
3401:"UEFI and Windows"
3120:on 23 January 2007
3004:§ CSM booting
2672:
2664:
2594:"hello, world
2495:standard C library
2432:VMware Workstation
2428:VMware Workstation
2360:FreeBSD Foundation
2068:shipped its first
2008:for booting (e.g.
1996:) in 2017. On the
1977:In December 2018,
1918:
1879:ExitBootServices()
1740:network connection
1454:
1363:
1193:
915:
807:ExitBootServices()
795:
637:primary partitions
629:master boot record
433:In December 2018,
272:personal computers
262:UEFI replaces the
249:Phoenix SecureCore
21:
8452:
8451:
8278:
8277:
8126:Partition layouts
8121:
8120:
8105:Plop Boot Manager
7907:
7906:
6468:on 6 October 2011
6074:Linux KVM Project
6046:on 30 August 2006
5955:on 5 January 2009
5715:Apple Computer. "
5408:978-1-5015-0569-0
5381:978-1-5015-0569-0
5318:978-0-12-394407-8
5258:www.microchip.com
4379:. 6 November 2006
3867:. 1 February 2014
3813:kernelnewbies.org
3749:on 4 January 2014
3719:on 9 October 2010
3625:Firmware Security
3570:978-1-5015-0569-0
3252:978-0-9743649-0-2
3230:on 5 January 2010
3092:978-1-5015-0569-0
2886:Firmware problems
2629:, a co-author of
2627:Ronald G. Minnich
2321:Windows Vista SP2
2317:Windows Vista SP1
2305:Windows Vista SP1
2171:Operating systems
2157:Connected Standby
2064:In January 2006,
1914:Microsoft Surface
1830:memory controller
1813:assembly language
1458:shell environment
1375:digital signature
1291:Internet Protocol
1287:network protocols
1039:Graphics features
931:UEFI applications
919:UEFI applications
875:Variable services
827:Graphics features
747:Microsoft Windows
741:Microsoft Windows
439:Microsoft Surface
371:Unified EFI Forum
347:programming, and
345:assembly language
314:Unified EFI Forum
276:IBM PC compatible
227:for the platform
132:
131:
102:IBM PC compatible
80:Related standards
8472:
8445:
8438:
8431:
8424:
8417:
8410:
8408:Execute in place
8403:
8396:
8389:
8371:
8364:
8357:
8350:
8332:
8325:
8318:
8309:
8302:
8295:
8271:
8264:
8257:
8237:
8230:
8223:
8216:
8209:
8196:
8195:
8184:
8177:
8170:
8150:
8143:
8136:
8114:
8107:
8100:
8093:
8086:
8079:
8072:
8065:
8058:
8051:
8044:
8037:
8030:
8023:
8016:
8009:
8002:
7995:
7988:
7981:
7968:
7967:
7963:
7956:
7936:
7929:
7922:
7900:
7893:
7886:
7879:
7872:
7865:
7858:
7856:TianoCore EDK II
7851:
7844:
7835:
7828:
7821:
7814:
7807:
7789:
7782:
7775:
7768:
7761:
7754:
7747:
7740:
7731:
7724:
7717:
7699:
7692:
7685:
7672:
7671:
7659:
7646:
7639:
7630:
7623:
7616:
7588:
7581:
7574:
7565:
7564:
7525:
7524:
7522:Official website
7509:
7507:
7505:
7496:. Archived from
7470:
7468:
7466:
7457:. Archived from
7455:Hardware Secrets
7445:
7443:
7441:
7425:
7423:
7421:
7405:
7403:
7401:
7385:
7383:
7381:
7351:
7350:
7348:
7346:
7335:
7329:
7328:
7326:
7324:
7313:
7307:
7306:
7304:
7302:
7291:
7285:
7284:
7282:
7280:
7269:
7260:
7259:
7257:
7255:
7241:
7235:
7234:
7232:
7230:
7216:
7210:
7209:
7207:
7205:
7191:
7185:
7184:
7182:
7180:
7165:
7159:
7158:
7156:
7154:
7142:
7136:
7135:
7133:
7131:
7116:
7110:
7109:
7107:
7105:
7093:
7087:
7086:
7084:
7082:
7077:on 5 August 2013
7073:. Archived from
7063:
7057:
7056:
7054:
7052:
7041:
7035:
7034:
7032:
7030:
7019:
7013:
7012:
7010:
7008:
6997:
6988:
6987:
6985:
6983:
6972:
6963:
6962:
6960:
6958:
6947:
6941:
6940:
6938:
6936:
6922:
6916:
6915:
6913:
6911:
6896:
6890:
6889:
6887:
6885:
6874:
6865:
6864:
6857:
6851:
6850:
6843:
6837:
6836:
6835:on 23 April 2012
6821:
6815:
6814:
6812:
6810:
6799:
6793:
6792:
6791:
6789:
6776:
6770:
6769:
6767:
6765:
6754:
6748:
6747:
6740:"Tianocore: UDK"
6736:
6730:
6729:
6727:
6725:
6711:
6705:
6704:
6702:
6700:
6690:
6684:
6683:
6681:
6679:
6668:
6662:
6661:
6659:
6657:
6646:
6640:
6639:
6629:
6623:
6622:
6613:
6607:
6606:
6593:
6587:
6586:
6584:
6582:
6568:
6562:
6561:
6559:
6557:
6546:
6540:
6539:
6537:
6535:
6530:. 22 August 2017
6520:
6514:
6513:
6511:
6509:
6498:
6492:
6491:
6489:
6487:
6476:
6470:
6469:
6456:
6450:
6449:
6447:
6445:
6436:. Archived from
6434:techrepublic.com
6425:
6419:
6418:
6416:
6414:
6399:
6393:
6392:
6390:
6388:
6373:
6367:
6366:
6364:
6362:
6348:
6342:
6341:
6339:
6337:
6323:
6317:
6316:
6314:
6312:
6306:
6298:
6292:
6291:
6289:
6287:
6273:
6267:
6266:
6264:
6262:
6251:
6245:
6244:
6242:
6240:
6229:
6223:
6222:
6220:
6218:
6201:
6195:
6194:
6183:
6177:
6176:
6174:
6172:
6160:
6154:
6153:
6151:
6149:
6139:
6133:
6128:
6122:
6121:
6119:implementations.
6115:
6113:
6102:
6096:
6091:
6085:
6084:
6082:
6080:
6065:
6059:
6054:
6048:
6047:
6033:
6027:
6026:
6025:
6023:
6006:
6000:
5999:
5997:
5995:
5989:
5978:
5970:
5964:
5963:
5962:
5960:
5943:
5937:
5936:
5934:
5932:
5921:
5910:
5909:
5908:
5906:
5893:
5887:
5881:
5875:
5874:
5872:
5870:
5865:
5856:
5850:
5849:
5847:
5845:
5836:. Archived from
5826:
5820:
5819:
5808:
5802:
5796:
5790:
5789:
5788:on 22 March 2012
5787:
5780:
5770:
5764:
5763:
5761:
5759:
5748:
5739:
5738:, mactech, 2007.
5733:
5727:
5713:
5707:
5706:
5704:
5702:
5693:. Archived from
5687:
5681:
5680:
5678:
5676:
5667:. Archived from
5661:
5655:
5654:
5652:
5650:
5644:
5638:. Archived from
5637:
5629:
5623:
5622:
5620:
5618:
5613:
5605:
5599:
5598:
5596:
5594:
5580:
5574:
5573:
5571:
5569:
5558:
5552:
5551:
5549:
5547:
5541:
5533:
5527:
5526:
5524:
5522:
5507:
5501:
5500:
5498:
5496:
5486:
5480:
5479:
5477:
5475:
5466:. Archived from
5456:
5450:
5449:
5447:
5439:
5433:
5432:
5419:
5413:
5412:
5392:
5386:
5385:
5365:
5359:
5358:
5356:
5354:
5337:
5331:
5330:
5298:
5292:
5291:
5283:
5275:
5269:
5268:
5266:
5264:
5250:
5244:
5243:
5241:
5239:
5224:
5218:
5217:
5206:
5200:
5199:
5197:
5195:
5177:
5171:
5170:
5168:
5166:
5148:
5142:
5141:
5139:
5137:
5127:
5119:
5113:
5112:
5110:
5108:
5090:
5081:
5080:
5078:
5076:
5058:
5052:
5051:
5049:
5047:
5028:
5022:
5021:
5010:
5004:
5003:
5001:
4999:
4989:"EDK2: ShellPkg"
4985:
4979:
4978:
4976:
4974:
4968:
4960:
4951:
4950:
4948:
4946:
4932:
4923:
4922:
4920:
4918:
4900:
4891:
4890:
4888:
4886:
4871:
4865:
4864:
4862:
4860:
4846:
4840:
4839:
4837:
4835:
4821:
4815:
4814:
4812:
4810:
4795:
4789:
4788:
4786:
4784:
4779:. Phoronix Media
4768:
4762:
4757:
4751:
4750:
4748:
4746:
4731:
4725:
4724:
4722:
4720:
4706:
4697:
4696:
4694:
4692:
4675:
4669:
4668:
4666:
4664:
4653:
4647:
4646:
4644:
4642:
4627:
4621:
4620:
4618:
4616:
4610:
4599:
4593:
4592:
4590:
4588:
4579:
4570:
4564:
4563:
4561:
4559:
4541:
4535:
4534:
4527:
4521:
4520:
4518:
4516:
4502:
4496:
4495:
4493:
4491:
4477:
4471:
4470:
4468:
4466:
4456:
4448:
4439:
4438:
4436:
4434:
4420:
4414:
4413:
4411:
4409:
4395:
4389:
4388:
4386:
4384:
4369:
4363:
4362:
4356:
4354:
4344:
4336:
4330:
4329:
4327:
4325:
4311:
4305:
4304:
4292:
4286:
4285:
4278:
4272:
4269:
4263:
4262:
4260:
4258:
4247:
4238:
4237:
4235:
4233:
4219:
4213:
4212:
4210:
4208:
4185:
4176:
4170:
4164:
4163:
4161:
4159:
4144:
4131:
4130:
4128:
4126:
4112:
4106:
4105:
4103:
4101:
4087:
4078:
4077:
4075:
4073:
4068:. September 2010
4058:
4052:
4051:
4049:
4047:
4033:
4027:
4026:
4024:
4022:
4004:
3993:
3992:
3990:
3988:
3973:
3967:
3966:
3964:
3962:
3947:
3934:
3933:
3931:
3929:
3924:on 22 March 2013
3923:
3916:
3908:
3902:
3901:
3899:
3897:
3891:
3883:
3877:
3876:
3874:
3872:
3857:
3851:
3850:
3848:
3846:
3831:
3825:
3824:
3822:
3820:
3805:
3799:
3798:
3796:
3794:
3788:
3780:
3759:
3758:
3756:
3754:
3748:
3735:
3729:
3728:
3726:
3724:
3708:
3702:
3701:
3699:
3697:
3685:
3679:
3678:
3676:
3668:
3662:
3661:
3654:
3648:
3647:
3635:
3629:
3628:
3617:
3611:
3610:
3599:
3593:
3590:
3584:
3581:
3575:
3574:
3554:
3548:
3547:
3540:
3534:
3533:
3526:
3520:
3519:
3513:
3505:
3503:
3495:
3489:
3488:
3481:
3475:
3474:
3467:
3461:
3460:
3453:
3447:
3446:
3444:
3442:
3424:
3413:
3412:
3410:
3408:
3397:
3391:
3390:
3388:
3386:
3376:
3368:
3362:
3361:
3354:
3348:
3347:
3334:
3328:
3327:
3320:
3314:
3313:
3312:. 8 August 2019.
3300:
3294:
3293:
3292:. 19 March 2019.
3280:
3274:
3273:
3262:
3256:
3255:
3238:
3232:
3231:
3218:
3212:
3211:
3209:
3207:
3201:
3193:
3180:
3179:
3177:
3175:
3161:
3155:
3154:
3152:
3150:
3139:
3130:
3129:
3127:
3125:
3119:
3112:
3103:
3097:
3096:
3076:
3070:
3069:
3062:
3056:
3055:
3048:
3032:
3021:
3015:
3012:
3006:
3000:
2994:
2991:
2823:vulnerability”.
2813:ARM architecture
2789:anti-competitive
2768:key embedded in
2697:ARM architecture
2616:
2613:
2610:
2607:
2604:
2601:
2598:
2595:
2592:
2589:
2586:
2583:
2580:
2577:
2574:
2571:
2568:
2565:
2562:
2559:
2556:
2553:
2550:
2547:
2544:
2541:
2538:
2535:
2532:
2529:
2526:
2512:A minimalistic "
2438:feature of UEFI.
2337:64-bit computing
2247:Intel-based Macs
2202:
2198:
2194:
2190:
2186:
2182:
2089:embedded systems
1954:TianoCore EDK II
1880:
1875:operating system
1505:
1501:
1479:
1475:
1471:
1467:
1456:UEFI provides a
1254:CompatibilitySmm
1197:UEFI-GPT booting
1183:
1179:
1171:
1162:USB flash drives
1096:schemes include
1011:Sun Microsystems
898:Windows registry
808:
803:runtime services
717:
678:
656:
649:
542:(AArch64). Only
253:TianoCore EDK II
241:operating system
223:that defines an
218:
217:
214:
213:
210:
207:
204:
201:
160:
142:
128:
125:
31:
24:
20:
8480:
8479:
8475:
8474:
8473:
8471:
8470:
8469:
8455:
8454:
8453:
8448:
8441:
8434:
8427:
8420:
8413:
8406:
8399:
8392:
8385:
8374:
8367:
8360:
8353:
8346:
8335:
8328:
8321:
8314:
8305:
8298:
8291:
8274:
8267:
8260:
8253:
8242:
8233:
8226:
8219:
8212:
8205:
8187:
8180:
8173:
8166:
8153:
8146:
8139:
8132:
8117:
8110:
8103:
8096:
8089:
8082:
8075:
8068:
8061:
8054:
8047:
8040:
8033:
8026:
8019:
8012:
8005:
7998:
7991:
7984:
7977:
7971:Implementations
7966:
7959:
7952:
7939:
7932:
7925:
7918:
7903:
7896:
7889:
7882:
7875:
7868:
7861:
7854:
7847:
7840:
7831:
7824:
7817:
7810:
7803:
7797:Implementations
7792:
7785:
7778:
7771:
7764:
7757:
7750:
7743:
7736:
7727:
7720:
7713:
7702:
7697:Custom firmware
7695:
7688:
7681:
7660:
7651:
7642:
7635:
7626:
7619:
7612:
7601:
7592:
7520:
7519:
7516:
7503:
7501:
7494:
7464:
7462:
7439:
7437:
7419:
7417:
7399:
7397:
7379:
7377:
7359:
7357:Further reading
7354:
7344:
7342:
7337:
7336:
7332:
7322:
7320:
7315:
7314:
7310:
7300:
7298:
7293:
7292:
7288:
7278:
7276:
7271:
7270:
7263:
7253:
7251:
7243:
7242:
7238:
7228:
7226:
7224:wiki.debian.org
7218:
7217:
7213:
7203:
7201:
7199:wiki.centos.org
7193:
7192:
7188:
7178:
7176:
7166:
7162:
7152:
7150:
7143:
7139:
7129:
7127:
7117:
7113:
7103:
7101:
7094:
7090:
7080:
7078:
7065:
7064:
7060:
7050:
7048:
7043:
7042:
7038:
7028:
7026:
7021:
7020:
7016:
7006:
7004:
6999:
6998:
6991:
6981:
6979:
6974:
6973:
6966:
6956:
6954:
6949:
6948:
6944:
6934:
6932:
6924:
6923:
6919:
6909:
6907:
6906:. 20 March 2015
6898:
6897:
6893:
6883:
6881:
6876:
6875:
6868:
6859:
6858:
6854:
6845:
6844:
6840:
6823:
6822:
6818:
6808:
6806:
6801:
6800:
6796:
6787:
6785:
6777:
6773:
6763:
6761:
6756:
6755:
6751:
6738:
6737:
6733:
6723:
6721:
6713:
6712:
6708:
6698:
6696:
6692:
6691:
6687:
6677:
6675:
6670:
6669:
6665:
6655:
6653:
6652:. FedoraProject
6648:
6647:
6643:
6631:
6630:
6626:
6615:
6614:
6610:
6595:
6594:
6590:
6580:
6578:
6576:pubs.vmware.com
6570:
6569:
6565:
6555:
6553:
6548:
6547:
6543:
6533:
6531:
6522:
6521:
6517:
6507:
6505:
6500:
6499:
6495:
6485:
6483:
6478:
6477:
6473:
6458:
6457:
6453:
6443:
6441:
6426:
6422:
6412:
6410:
6409:. 8 August 2019
6401:
6400:
6396:
6386:
6384:
6374:
6370:
6360:
6358:
6356:www.openbsd.org
6350:
6349:
6345:
6335:
6333:
6331:www.openbsd.org
6325:
6324:
6320:
6310:
6308:
6304:
6300:
6299:
6295:
6285:
6283:
6281:www.freebsd.org
6275:
6274:
6270:
6260:
6258:
6253:
6252:
6248:
6238:
6236:
6231:
6230:
6226:
6216:
6214:
6210:Microsoft Learn
6203:
6202:
6198:
6185:
6184:
6180:
6170:
6168:
6161:
6157:
6147:
6145:
6141:
6140:
6136:
6129:
6125:
6111:
6109:
6104:
6103:
6099:
6092:
6088:
6078:
6076:
6066:
6062:
6055:
6051:
6035:
6034:
6030:
6021:
6019:
6008:
6007:
6003:
5993:
5991:
5987:
5981:vmssoftware.com
5976:
5972:
5971:
5967:
5958:
5956:
5945:
5944:
5940:
5930:
5928:
5923:
5922:
5913:
5904:
5902:
5895:
5894:
5890:
5882:
5878:
5868:
5866:
5863:
5857:
5853:
5843:
5841:
5828:
5827:
5823:
5810:
5809:
5805:
5797:
5793:
5785:
5778:
5772:
5771:
5767:
5757:
5755:
5750:
5749:
5742:
5734:
5730:
5724:Wayback Machine
5714:
5710:
5700:
5698:
5697:on 31 July 2020
5689:
5688:
5684:
5674:
5672:
5663:
5662:
5658:
5648:
5646:
5642:
5635:
5631:
5630:
5626:
5616:
5614:
5611:
5607:
5606:
5602:
5592:
5590:
5582:
5581:
5577:
5567:
5565:
5560:
5559:
5555:
5545:
5543:
5539:
5535:
5534:
5530:
5520:
5518:
5509:
5508:
5504:
5494:
5492:
5488:
5487:
5483:
5473:
5471:
5458:
5457:
5453:
5445:
5441:
5440:
5436:
5421:
5420:
5416:
5409:
5393:
5389:
5382:
5366:
5362:
5352:
5350:
5339:
5338:
5334:
5319:
5311:. p. 169.
5307:. Waltham, MA:
5299:
5295:
5281:
5277:
5276:
5272:
5262:
5260:
5252:
5251:
5247:
5237:
5235:
5225:
5221:
5208:
5207:
5203:
5193:
5191:
5179:
5178:
5174:
5164:
5162:
5150:
5149:
5145:
5135:
5133:
5125:
5121:
5120:
5116:
5106:
5104:
5092:
5091:
5084:
5074:
5072:
5060:
5059:
5055:
5045:
5043:
5030:
5029:
5025:
5012:
5011:
5007:
4997:
4995:
4987:
4986:
4982:
4972:
4970:
4966:
4962:
4961:
4954:
4944:
4942:
4934:
4933:
4926:
4916:
4914:
4902:
4901:
4894:
4884:
4882:
4873:
4872:
4868:
4858:
4856:
4848:
4847:
4843:
4833:
4831:
4823:
4822:
4818:
4808:
4806:
4796:
4792:
4782:
4780:
4769:
4765:
4758:
4754:
4744:
4742:
4733:
4732:
4728:
4718:
4716:
4708:
4707:
4700:
4690:
4688:
4676:
4672:
4662:
4660:
4655:
4654:
4650:
4640:
4638:
4629:
4628:
4624:
4614:
4612:
4608:
4600:
4596:
4586:
4584:
4582:Hewlett-Packard
4577:
4571:
4567:
4557:
4555:
4543:
4542:
4538:
4529:
4528:
4524:
4514:
4512:
4504:
4503:
4499:
4489:
4487:
4479:
4478:
4474:
4464:
4462:
4454:
4450:
4449:
4442:
4432:
4430:
4422:
4421:
4417:
4407:
4405:
4397:
4396:
4392:
4382:
4380:
4371:
4370:
4366:
4352:
4350:
4342:
4338:
4337:
4333:
4323:
4321:
4313:
4312:
4308:
4293:
4289:
4280:
4279:
4275:
4270:
4266:
4256:
4254:
4249:
4248:
4241:
4231:
4229:
4221:
4220:
4216:
4206:
4204:
4186:
4179:
4171:
4167:
4157:
4155:
4146:
4145:
4134:
4124:
4122:
4114:
4113:
4109:
4099:
4097:
4089:
4088:
4081:
4071:
4069:
4060:
4059:
4055:
4045:
4043:
4035:
4034:
4030:
4020:
4018:
4006:
4005:
3996:
3986:
3984:
3975:
3974:
3970:
3960:
3958:
3948:
3937:
3927:
3925:
3921:
3914:
3910:
3909:
3905:
3895:
3893:
3889:
3885:
3884:
3880:
3870:
3868:
3859:
3858:
3854:
3844:
3842:
3833:
3832:
3828:
3818:
3816:
3807:
3806:
3802:
3792:
3790:
3786:
3782:
3781:
3762:
3752:
3750:
3746:
3738:Simpson, Gary.
3736:
3732:
3722:
3720:
3709:
3705:
3695:
3693:
3686:
3682:
3674:
3670:
3669:
3665:
3656:
3655:
3651:
3636:
3632:
3619:
3618:
3614:
3601:
3600:
3596:
3591:
3587:
3582:
3578:
3571:
3555:
3551:
3542:
3541:
3537:
3528:
3527:
3523:
3507:
3506:
3501:
3497:
3496:
3492:
3487:. 29 July 2021.
3483:
3482:
3478:
3469:
3468:
3464:
3455:
3454:
3450:
3440:
3438:
3426:
3425:
3416:
3406:
3404:
3399:
3398:
3394:
3384:
3382:
3374:
3370:
3369:
3365:
3356:
3355:
3351:
3336:
3335:
3331:
3322:
3321:
3317:
3302:
3301:
3297:
3282:
3281:
3277:
3264:
3263:
3259:
3253:
3245:, Intel Press,
3239:
3235:
3220:
3219:
3215:
3205:
3203:
3199:
3195:
3194:
3183:
3173:
3171:
3163:
3162:
3158:
3148:
3146:
3141:
3140:
3133:
3123:
3121:
3117:
3110:
3104:
3100:
3093:
3077:
3073:
3068:. 22 June 2024.
3064:
3063:
3059:
3050:
3049:
3045:
3041:
3036:
3035:
3022:
3018:
3013:
3009:
3001:
2997:
2992:
2988:
2983:
2927:
2888:
2716:Matthew Garrett
2656:
2650:
2623:
2618:
2617:
2614:
2611:
2608:
2605:
2602:
2599:
2596:
2593:
2590:
2587:
2584:
2581:
2578:
2575:
2572:
2569:
2566:
2563:
2560:
2557:
2554:
2551:
2548:
2545:
2542:
2539:
2536:
2533:
2530:
2527:
2524:
2488:
2409:
2200:
2196:
2192:
2188:
2184:
2180:
2173:
2035:Hewlett-Packard
2022:
1972:Insyde Software
1907:
1905:Implementations
1902:
1878:
1871:
1863:
1851:
1842:
1822:
1797:
1792:
1756:
1724:
1700:
1676:
1671:
1512:
1503:
1499:
1477:
1473:
1469:
1465:
1446:
1351:
1345:
1279:
1277:Network booting
1216:
1181:
1177:
1169:
1135:
1130:
1110:FAT file system
1094:partition table
1081:
1075:
1041:
1031:code), used by
1007:Apple Macintosh
975:
962:
907:
893:real-time clock
806:
787:
782:
743:
715:
676:
669:
663:
654:
643:
625:
615:
532:
527:
458:
420:Arm SystemReady
396:Arm ServerReady
329:
198:
194:
184:
183:
182:
181:
180:
161:
152:
151:
150:
143:
122:
65:August 29, 2022
64:
17:
12:
11:
5:
8478:
8468:
8467:
8450:
8449:
8447:
8446:
8439:
8432:
8425:
8418:
8411:
8404:
8397:
8390:
8382:
8380:
8376:
8375:
8373:
8372:
8365:
8358:
8351:
8343:
8341:
8337:
8336:
8334:
8333:
8326:
8319:
8312:
8311:
8310:
8303:
8288:
8286:
8280:
8279:
8276:
8275:
8273:
8272:
8265:
8258:
8250:
8248:
8244:
8243:
8241:
8240:
8239:
8238:
8224:
8217:
8210:
8202:
8200:
8193:
8189:
8188:
8186:
8185:
8178:
8171:
8163:
8161:
8155:
8154:
8152:
8151:
8144:
8137:
8129:
8127:
8123:
8122:
8119:
8118:
8116:
8115:
8108:
8101:
8094:
8087:
8080:
8073:
8066:
8059:
8052:
8045:
8038:
8031:
8024:
8017:
8010:
8003:
7996:
7989:
7982:
7974:
7972:
7965:
7964:
7957:
7949:
7947:
7941:
7940:
7938:
7937:
7930:
7923:
7915:
7913:
7909:
7908:
7905:
7904:
7902:
7901:
7894:
7887:
7880:
7873:
7866:
7859:
7852:
7845:
7838:
7837:
7836:
7829:
7815:
7808:
7800:
7798:
7794:
7793:
7791:
7790:
7783:
7776:
7769:
7762:
7755:
7748:
7741:
7734:
7733:
7732:
7718:
7710:
7708:
7704:
7703:
7701:
7700:
7693:
7686:
7678:
7676:
7669:
7662:
7661:
7654:
7652:
7650:
7649:
7648:
7647:
7633:
7632:
7631:
7624:
7609:
7607:
7603:
7602:
7591:
7590:
7583:
7576:
7568:
7562:
7561:
7556:
7551:
7546:
7541:
7536:
7531:
7526:
7515:
7514:External links
7512:
7511:
7510:
7492:
7471:
7446:
7426:
7406:
7386:
7358:
7355:
7353:
7352:
7330:
7308:
7286:
7261:
7236:
7211:
7186:
7160:
7149:. Ars Technica
7137:
7111:
7100:. Ars Technica
7088:
7058:
7036:
7014:
6989:
6964:
6942:
6917:
6891:
6866:
6852:
6838:
6816:
6794:
6771:
6749:
6731:
6706:
6694:"Shielded VMs"
6685:
6663:
6641:
6624:
6608:
6588:
6563:
6541:
6515:
6493:
6471:
6451:
6420:
6394:
6368:
6343:
6318:
6293:
6268:
6246:
6224:
6196:
6178:
6167:. Ars Technica
6155:
6134:
6123:
6097:
6086:
6060:
6049:
6028:
6001:
5965:
5938:
5927:. The H Online
5911:
5888:
5876:
5851:
5821:
5803:
5791:
5765:
5740:
5728:
5708:
5682:
5656:
5624:
5600:
5575:
5553:
5528:
5502:
5481:
5464:www.kernel.org
5451:
5434:
5414:
5407:
5387:
5380:
5360:
5332:
5317:
5293:
5270:
5245:
5219:
5201:
5172:
5143:
5114:
5082:
5053:
5023:
5005:
4980:
4952:
4924:
4892:
4866:
4841:
4816:
4790:
4763:
4752:
4726:
4698:
4670:
4648:
4622:
4594:
4565:
4536:
4522:
4497:
4472:
4440:
4415:
4403:wiki.osdev.org
4390:
4364:
4331:
4306:
4287:
4273:
4264:
4239:
4227:www.kernel.org
4214:
4177:
4165:
4132:
4107:
4079:
4053:
4028:
3994:
3968:
3935:
3903:
3878:
3852:
3841:. 19 July 2012
3826:
3800:
3760:
3730:
3703:
3680:
3663:
3649:
3630:
3612:
3594:
3585:
3576:
3569:
3549:
3535:
3521:
3490:
3476:
3462:
3448:
3428:"Installation"
3414:
3392:
3363:
3349:
3329:
3315:
3295:
3275:
3257:
3251:
3233:
3213:
3181:
3169:wiki.osdev.org
3156:
3131:
3098:
3091:
3071:
3057:
3042:
3040:
3037:
3034:
3033:
3016:
3007:
2995:
2985:
2984:
2982:
2979:
2978:
2977:
2972:
2967:
2962:
2956:
2950:
2944:
2938:
2933:
2926:
2923:
2887:
2884:
2774:Linus Torvalds
2753:kernel modules
2649:
2646:
2622:
2619:
2528:<Uefi.h>
2523:
2487:
2484:
2483:
2482:
2476:
2469:
2455:
2449:
2439:
2425:
2419:
2416:
2408:
2405:
2404:
2403:
2385:
2379:
2368:
2356:
2301:
2300:specification.
2262:
2255:Mac OS X v10.5
2251:Mac OS X v10.4
2240:
2234:
2224:
2172:
2169:
2021:
2018:
1906:
1903:
1901:
1898:
1891:kernel drivers
1870:
1867:
1862:
1859:
1850:
1847:
1841:
1838:
1821:
1818:
1796:
1793:
1791:
1788:
1782:for the iGPU (
1776:
1775:
1772:
1769:
1766:
1763:
1755:
1752:
1723:
1720:
1699:
1696:
1675:
1672:
1670:
1669:
1664:
1659:
1656:
1651:
1646:
1643:
1640:
1635:
1632:
1629:
1626:
1621:
1618:
1615:
1610:
1607:
1604:
1601:
1596:
1593:
1588:
1585:
1582:
1579:
1576:
1573:
1568:
1565:
1562:
1559:
1554:
1549:
1544:
1539:
1534:
1531:
1526:
1520:
1511:
1508:
1445:
1442:
1344:
1341:
1278:
1275:
1260:counterparts.
1215:
1212:
1134:
1131:
1129:
1126:
1077:Main article:
1074:
1071:
1040:
1037:
974:
973:Device drivers
971:
961:
958:
906:
903:
902:
901:
889:
885:
884:
876:
872:
871:
864:
863:
856:
855:
848:
847:
840:
839:
831:
830:
819:
786:
783:
781:
778:
742:
739:
700:Primary Header
662:
659:
623:Protective MBR
614:
611:
607:UEFI boot stub
538:(AArch32) and
531:
528:
526:
523:
516:
515:
512:
511:Modular design
509:
502:
496:
477:
474:
457:
454:
389:user interface
384:and security.
328:
325:
162:
155:
154:
153:
144:
137:
136:
135:
134:
133:
130:
129:
120:
116:
115:
110:
106:
105:
95:
91:
90:
81:
77:
76:
71:
67:
66:
61:
60:Latest version
57:
56:
53:
49:
48:
45:
41:
40:
37:
33:
32:
15:
9:
6:
4:
3:
2:
8477:
8466:
8463:
8462:
8460:
8444:
8440:
8437:
8433:
8430:
8426:
8423:
8419:
8416:
8412:
8409:
8405:
8402:
8398:
8395:
8391:
8388:
8384:
8383:
8381:
8377:
8370:
8366:
8363:
8359:
8356:
8352:
8349:
8345:
8344:
8342:
8338:
8331:
8327:
8324:
8320:
8317:
8313:
8308:
8304:
8301:
8297:
8296:
8294:
8290:
8289:
8287:
8285:
8281:
8270:
8266:
8263:
8259:
8256:
8252:
8251:
8249:
8245:
8236:
8232:
8231:
8229:
8225:
8222:
8218:
8215:
8211:
8208:
8204:
8203:
8201:
8197:
8194:
8190:
8183:
8179:
8176:
8172:
8169:
8165:
8164:
8162:
8160:
8156:
8149:
8145:
8142:
8138:
8135:
8131:
8130:
8128:
8124:
8113:
8109:
8106:
8102:
8099:
8095:
8092:
8088:
8085:
8081:
8078:
8074:
8071:
8067:
8064:
8060:
8057:
8053:
8050:
8046:
8043:
8039:
8036:
8032:
8029:
8025:
8022:
8018:
8015:
8011:
8008:
8007:BootX (Linux)
8004:
8001:
8000:BootX (Apple)
7997:
7994:
7990:
7987:
7983:
7980:
7976:
7975:
7973:
7969:
7962:
7958:
7955:
7951:
7950:
7948:
7946:
7942:
7935:
7931:
7928:
7924:
7921:
7917:
7916:
7914:
7910:
7899:
7895:
7892:
7888:
7885:
7881:
7878:
7874:
7871:
7867:
7864:
7860:
7857:
7853:
7850:
7846:
7843:
7839:
7834:
7830:
7827:
7823:
7822:
7820:
7816:
7813:
7809:
7806:
7802:
7801:
7799:
7795:
7788:
7784:
7781:
7777:
7774:
7770:
7767:
7763:
7760:
7756:
7753:
7749:
7746:
7742:
7739:
7738:Open Firmware
7735:
7730:
7726:
7725:
7723:
7719:
7716:
7712:
7711:
7709:
7705:
7698:
7694:
7691:
7687:
7684:
7680:
7679:
7677:
7673:
7670:
7668:
7663:
7658:
7645:
7641:
7640:
7638:
7634:
7629:
7625:
7622:
7618:
7617:
7615:
7611:
7610:
7608:
7604:
7600:
7596:
7589:
7584:
7582:
7577:
7575:
7570:
7569:
7566:
7560:
7557:
7555:
7552:
7550:
7547:
7545:
7542:
7540:
7537:
7535:
7532:
7530:
7527:
7523:
7518:
7517:
7499:
7495:
7493:9781934053430
7489:
7485:
7481:
7477:
7472:
7460:
7456:
7452:
7447:
7436:
7432:
7427:
7416:
7412:
7407:
7396:
7392:
7387:
7376:
7372:
7371:
7366:
7361:
7360:
7340:
7334:
7318:
7312:
7296:
7290:
7274:
7268:
7266:
7250:
7246:
7240:
7225:
7221:
7215:
7200:
7196:
7190:
7175:
7171:
7164:
7148:
7141:
7126:
7122:
7115:
7099:
7092:
7076:
7072:
7068:
7062:
7046:
7040:
7024:
7018:
7002:
6996:
6994:
6977:
6971:
6969:
6952:
6946:
6931:
6927:
6921:
6905:
6901:
6895:
6879:
6873:
6871:
6862:
6856:
6848:
6842:
6834:
6830:
6826:
6820:
6804:
6798:
6784:
6783:
6775:
6759:
6753:
6745:
6741:
6735:
6720:
6716:
6710:
6695:
6689:
6673:
6667:
6651:
6645:
6637:
6636:
6628:
6620:
6619:
6612:
6604:
6600:
6599:
6598:3.1 Changelog
6592:
6577:
6573:
6567:
6551:
6545:
6529:
6525:
6519:
6503:
6497:
6481:
6475:
6467:
6463:
6462:
6455:
6439:
6435:
6431:
6424:
6408:
6404:
6398:
6383:
6379:
6372:
6357:
6353:
6352:"OpenBSD 6.0"
6347:
6332:
6328:
6327:"OpenBSD 5.9"
6322:
6303:
6297:
6282:
6278:
6272:
6257:. FreeBSD.org
6256:
6250:
6234:
6228:
6213:. 22 May 2024
6212:
6211:
6206:
6200:
6192:
6188:
6182:
6166:
6159:
6144:
6138:
6132:
6127:
6120:
6107:
6101:
6095:
6090:
6075:
6071:
6064:
6058:
6053:
6045:
6041:
6040:
6032:
6017:
6013:
6012:
6005:
5986:
5982:
5975:
5969:
5954:
5950:
5949:
5942:
5926:
5920:
5918:
5916:
5900:
5899:
5892:
5885:
5880:
5862:
5855:
5839:
5835:
5831:
5825:
5818:
5813:
5807:
5800:
5795:
5784:
5777:
5776:
5769:
5753:
5747:
5745:
5737:
5732:
5725:
5721:
5718:
5712:
5696:
5692:
5686:
5670:
5666:
5660:
5641:
5634:
5628:
5610:
5604:
5589:
5585:
5579:
5563:
5557:
5538:
5532:
5516:
5512:
5506:
5491:
5485:
5469:
5465:
5461:
5455:
5444:
5438:
5430:
5429:
5424:
5418:
5410:
5404:
5400:
5399:
5391:
5383:
5377:
5373:
5372:
5364:
5348:
5347:
5342:
5336:
5328:
5324:
5320:
5314:
5310:
5306:
5305:
5297:
5289:
5288:
5280:
5274:
5259:
5255:
5249:
5234:
5230:
5227:barrygolden.
5223:
5215:
5211:
5205:
5190:
5186:
5182:
5176:
5161:
5157:
5153:
5147:
5131:
5124:
5118:
5103:
5099:
5095:
5089:
5087:
5071:
5067:
5063:
5057:
5041:
5037:
5033:
5027:
5019:
5015:
5009:
4994:
4990:
4984:
4965:
4959:
4957:
4941:
4937:
4931:
4929:
4913:
4909:
4905:
4899:
4897:
4880:
4876:
4870:
4855:
4851:
4845:
4830:
4826:
4820:
4805:
4801:
4794:
4778:
4774:
4767:
4761:
4756:
4740:
4736:
4730:
4715:
4711:
4705:
4703:
4687:
4686:
4681:
4674:
4658:
4652:
4636:
4632:
4626:
4607:
4606:
4598:
4583:
4576:
4569:
4554:
4550:
4546:
4540:
4532:
4526:
4511:
4507:
4501:
4486:
4482:
4476:
4460:
4453:
4447:
4445:
4429:
4425:
4419:
4404:
4400:
4394:
4378:
4374:
4368:
4361:
4348:
4341:
4335:
4320:
4316:
4310:
4302:
4298:
4291:
4283:
4277:
4268:
4252:
4246:
4244:
4228:
4224:
4218:
4202:
4198:
4196:
4195:linux.conf.au
4191:
4184:
4182:
4174:
4169:
4153:
4149:
4143:
4141:
4139:
4137:
4121:
4120:archlinux.org
4117:
4111:
4096:
4095:archlinux.org
4092:
4086:
4084:
4067:
4063:
4057:
4042:
4038:
4032:
4017:
4013:
4009:
4003:
4001:
3999:
3982:
3978:
3972:
3957:
3953:
3946:
3944:
3942:
3940:
3920:
3913:
3907:
3888:
3882:
3866:
3862:
3856:
3840:
3836:
3830:
3815:. 8 June 2014
3814:
3810:
3804:
3785:
3779:
3777:
3775:
3773:
3771:
3769:
3767:
3765:
3745:
3741:
3734:
3718:
3714:
3707:
3691:
3684:
3673:
3667:
3659:
3653:
3645:
3641:
3634:
3626:
3622:
3616:
3609:. 3 May 2021.
3608:
3604:
3598:
3589:
3580:
3572:
3566:
3562:
3561:
3553:
3545:
3539:
3531:
3525:
3517:
3511:
3500:
3494:
3486:
3480:
3472:
3466:
3458:
3452:
3437:
3433:
3429:
3423:
3421:
3419:
3402:
3396:
3381:. August 2022
3380:
3373:
3367:
3359:
3353:
3346:
3341:
3340:
3333:
3325:
3319:
3311:
3310:
3305:
3299:
3291:
3290:
3285:
3279:
3271:
3267:
3261:
3254:
3248:
3244:
3237:
3229:
3225:
3224:
3217:
3198:
3192:
3190:
3188:
3186:
3170:
3166:
3160:
3144:
3138:
3136:
3116:
3109:
3102:
3094:
3088:
3084:
3083:
3075:
3067:
3061:
3053:
3047:
3043:
3030:
3026:
3020:
3011:
3005:
2999:
2990:
2986:
2976:
2973:
2971:
2968:
2966:
2963:
2960:
2957:
2954:
2951:
2948:
2945:
2942:
2939:
2937:
2934:
2932:
2929:
2928:
2922:
2919:
2915:
2910:
2908:
2904:
2900:
2896:
2891:
2883:
2881:
2877:
2873:
2869:
2865:
2861:
2857:
2853:
2848:
2846:
2842:
2838:
2833:
2829:
2824:
2820:
2818:
2814:
2809:
2805:
2799:
2797:
2792:
2790:
2786:
2782:
2777:
2775:
2771:
2767:
2761:
2759:
2754:
2750:
2746:
2742:
2736:
2733:
2729:
2725:
2721:
2717:
2713:
2708:
2706:
2702:
2698:
2694:
2690:
2686:
2682:
2677:
2668:
2660:
2655:
2645:
2643:
2638:
2636:
2635:Cory Doctorow
2632:
2628:
2521:
2519:
2515:
2510:
2508:
2504:
2500:
2496:
2492:
2480:
2477:
2474:
2470:
2467:
2463:
2459:
2456:
2453:
2450:
2447:
2444:
2440:
2437:
2433:
2429:
2426:
2423:
2422:VMware Fusion
2420:
2417:
2414:
2411:
2410:
2401:
2397:
2393:
2389:
2386:
2383:
2380:
2377:
2373:
2369:
2365:
2361:
2357:
2354:
2350:
2346:
2342:
2338:
2334:
2330:
2326:
2322:
2318:
2314:
2310:
2306:
2302:
2299:
2295:
2291:
2287:
2283:
2279:
2275:
2271:
2267:
2263:
2260:
2256:
2252:
2248:
2244:
2241:
2238:
2235:
2232:
2228:
2225:
2222:
2218:
2214:
2210:
2206:
2205:
2204:
2178:
2168:
2164:
2162:
2158:
2152:
2150:
2146:
2143:
2139:
2135:
2131:
2127:
2122:
2120:
2116:
2111:
2109:
2103:
2101:
2096:
2094:
2090:
2085:
2081:
2079:
2075:
2074:Open Firmware
2071:
2067:
2062:
2060:
2056:
2052:
2048:
2044:
2040:
2036:
2032:
2030:
2026:
2017:
2015:
2011:
2007:
2003:
2000:architecture
1999:
1995:
1990:
1988:
1984:
1980:
1975:
1973:
1969:
1965:
1961:
1959:
1955:
1951:
1947:
1943:
1939:
1935:
1931:
1927:
1923:
1915:
1911:
1897:
1894:
1892:
1888:
1884:
1876:
1866:
1858:
1856:
1846:
1837:
1835:
1831:
1827:
1817:
1814:
1810:
1806:
1802:
1787:
1785:
1781:
1773:
1770:
1767:
1764:
1761:
1760:
1759:
1751:
1749:
1745:
1741:
1738:or through a
1737:
1733:
1729:
1719:
1717:
1713:
1709:
1705:
1695:
1693:
1689:
1685:
1681:
1668:
1665:
1663:
1660:
1657:
1655:
1652:
1650:
1647:
1644:
1641:
1639:
1636:
1633:
1630:
1627:
1625:
1622:
1619:
1616:
1614:
1611:
1608:
1605:
1602:
1600:
1597:
1594:
1592:
1589:
1586:
1583:
1580:
1577:
1574:
1572:
1569:
1566:
1563:
1560:
1558:
1555:
1553:
1550:
1548:
1545:
1543:
1540:
1538:
1535:
1532:
1530:
1527:
1525:
1522:
1521:
1519:
1517:
1507:
1497:
1492:
1490:
1486:
1481:
1463:
1459:
1450:
1441:
1439:
1435:
1431:
1427:
1423:
1419:
1415:
1411:
1407:
1403:
1399:
1395:
1392:and 2012 R2,
1391:
1387:
1383:
1378:
1376:
1372:
1368:
1360:
1355:
1350:
1340:
1338:
1333:
1331:
1327:
1324:(SANs), with
1323:
1318:
1316:
1312:
1308:
1304:
1300:
1296:
1292:
1288:
1284:
1274:
1271:
1268:
1264:
1261:
1259:
1255:
1251:
1247:
1243:
1238:
1236:
1232:
1227:
1225:
1221:
1211:
1208:
1206:
1202:
1198:
1189:
1185:
1175:
1167:
1163:
1159:
1154:
1152:
1148:
1144:
1140:
1125:
1123:
1119:
1115:
1111:
1107:
1104:, as well as
1103:
1099:
1095:
1091:
1086:
1080:
1070:
1067:
1065:
1061:
1057:
1053:
1048:
1046:
1036:
1034:
1030:
1026:
1021:
1017:
1015:
1012:
1008:
1004:
1000:
999:Open Firmware
996:
992:
991:EFI byte code
988:
984:
983:device driver
980:
970:
968:
957:
955:
951:
947:
943:
938:
936:
932:
928:
924:
920:
911:
899:
894:
890:
888:Time services
887:
886:
882:
877:
874:
873:
869:
866:
865:
861:
858:
857:
853:
850:
849:
845:
842:
841:
837:
833:
832:
828:
824:
820:
817:
816:
815:
813:
804:
800:
799:boot services
791:
777:
775:
771:
767:
763:
759:
755:
754:Windows Vista
750:
748:
738:
736:
731:
729:
725:
720:
713:
709:
705:
701:
697:
693:
689:
685:
680:
674:
668:
658:
655:(8 × 2 bytes)
653:
647:
642:
638:
634:
630:
624:
620:
610:
608:
604:
600:
599:UEFI handover
596:
592:
588:
582:
580:
576:
572:
568:
564:
559:
557:
553:
549:
545:
544:little-endian
541:
537:
525:Compatibility
522:
519:
513:
510:
507:
503:
500:
497:
494:
490:
486:
482:
478:
475:
472:
468:
464:
463:
462:
453:
450:
448:
444:
440:
436:
431:
429:
425:
421:
417:
413:
409:
405:
401:
397:
392:
390:
385:
383:
378:
376:
372:
367:
365:
360:
358:
354:
350:
346:
342:
338:
334:
324:
322:
317:
315:
311:
307:
303:
299:
297:
293:
289:
285:
281:
277:
273:
269:
265:
260:
258:
254:
250:
246:
242:
238:
234:
230:
226:
222:
221:specification
216:
192:
188:
178:
174:
170:
166:
159:
148:
141:
127:
121:
117:
114:
111:
107:
103:
99:
96:
92:
89:
85:
82:
78:
75:
72:
68:
62:
58:
54:
50:
46:
42:
38:
34:
30:
25:
19:
8340:ROM variants
8284:Network boot
8262:Raspberry Pi
8028:systemd-boot
7714:
7504:24 September
7502:. Retrieved
7498:the original
7486:(1). Intel.
7483:
7479:
7463:. Retrieved
7459:the original
7454:
7438:. Retrieved
7434:
7418:. Retrieved
7414:
7398:. Retrieved
7394:
7378:. Retrieved
7368:
7343:. Retrieved
7333:
7321:. Retrieved
7311:
7299:. Retrieved
7289:
7277:. Retrieved
7252:. Retrieved
7248:
7239:
7227:. Retrieved
7223:
7214:
7202:. Retrieved
7198:
7189:
7177:. Retrieved
7173:
7163:
7151:. Retrieved
7140:
7128:. Retrieved
7124:
7114:
7102:. Retrieved
7091:
7079:. Retrieved
7075:the original
7070:
7061:
7049:. Retrieved
7039:
7027:. Retrieved
7017:
7005:. Retrieved
6982:11 September
6980:. Retrieved
6955:. Retrieved
6945:
6933:. Retrieved
6929:
6920:
6908:. Retrieved
6904:Ars Technica
6903:
6894:
6882:. Retrieved
6855:
6841:
6833:the original
6828:
6819:
6809:14 September
6807:. Retrieved
6797:
6788:25 September
6786:, retrieved
6781:
6774:
6764:14 September
6762:. Retrieved
6752:
6743:
6734:
6724:25 September
6722:. Retrieved
6709:
6697:. Retrieved
6688:
6676:. Retrieved
6666:
6654:. Retrieved
6644:
6638:, VirtualBox
6634:
6627:
6621:, VirtualBox
6617:
6611:
6603:the original
6597:
6591:
6579:. Retrieved
6575:
6566:
6554:. Retrieved
6552:. Vmware.com
6544:
6532:. Retrieved
6527:
6518:
6506:. Retrieved
6496:
6484:. Retrieved
6474:
6466:the original
6460:
6454:
6442:. Retrieved
6438:the original
6433:
6423:
6413:22 September
6411:. Retrieved
6406:
6397:
6385:. Retrieved
6382:The Register
6371:
6361:11 September
6359:. Retrieved
6355:
6346:
6336:11 September
6334:. Retrieved
6330:
6321:
6309:. Retrieved
6307:. oracle.com
6296:
6284:. Retrieved
6280:
6271:
6259:. Retrieved
6249:
6237:. Retrieved
6227:
6215:. Retrieved
6208:
6199:
6181:
6171:23 September
6169:. Retrieved
6158:
6146:. Retrieved
6137:
6126:
6117:
6110:. Retrieved
6100:
6089:
6077:. Retrieved
6073:
6063:
6052:
6044:the original
6038:
6031:
6020:, retrieved
6016:the original
6010:
6004:
5992:. Retrieved
5985:the original
5980:
5968:
5959:16 September
5957:, retrieved
5953:the original
5947:
5941:
5929:. Retrieved
5903:, retrieved
5897:
5891:
5879:
5867:. Retrieved
5854:
5844:30 September
5842:. Retrieved
5838:the original
5833:
5824:
5815:
5806:
5794:
5783:the original
5774:
5768:
5758:14 September
5756:. Retrieved
5731:
5711:
5699:. Retrieved
5695:the original
5685:
5675:12 September
5673:. Retrieved
5669:the original
5659:
5649:12 September
5647:. Retrieved
5640:the original
5627:
5617:12 September
5615:. Retrieved
5603:
5591:. Retrieved
5587:
5578:
5566:. Retrieved
5556:
5544:. Retrieved
5531:
5521:14 September
5519:. Retrieved
5515:the original
5505:
5493:. Retrieved
5484:
5472:. Retrieved
5468:the original
5463:
5454:
5437:
5426:
5417:
5397:
5390:
5370:
5363:
5351:. Retrieved
5344:
5335:
5303:
5296:
5285:
5273:
5261:. Retrieved
5257:
5248:
5238:25 September
5236:. Retrieved
5232:
5222:
5213:
5204:
5194:25 September
5192:. Retrieved
5184:
5175:
5165:25 September
5163:. Retrieved
5155:
5146:
5136:25 September
5134:. Retrieved
5117:
5107:25 September
5105:. Retrieved
5097:
5075:25 September
5073:. Retrieved
5065:
5056:
5046:25 September
5044:. Retrieved
5035:
5026:
5017:
5008:
4996:. Retrieved
4992:
4983:
4973:25 September
4971:. Retrieved
4945:25 September
4943:. Retrieved
4917:25 September
4915:. Retrieved
4907:
4883:. Retrieved
4879:FreeBSD Wiki
4878:
4875:"SecureBoot"
4869:
4857:. Retrieved
4853:
4844:
4832:. Retrieved
4828:
4819:
4807:. Retrieved
4803:
4793:
4781:. Retrieved
4776:
4766:
4755:
4743:. Retrieved
4741:. 4 May 2017
4738:
4729:
4717:. Retrieved
4713:
4689:. Retrieved
4683:
4678:Edge, Jake.
4673:
4661:. Retrieved
4651:
4639:. Retrieved
4637:. 9 May 2015
4634:
4625:
4613:. Retrieved
4604:
4597:
4585:. Retrieved
4568:
4556:. Retrieved
4548:
4539:
4525:
4513:. Retrieved
4509:
4500:
4488:. Retrieved
4485:Ars Technica
4484:
4475:
4463:. Retrieved
4458:
4431:. Retrieved
4427:
4418:
4408:26 September
4406:. Retrieved
4402:
4393:
4381:. Retrieved
4376:
4367:
4358:
4351:. Retrieved
4346:
4334:
4322:. Retrieved
4309:
4300:
4290:
4276:
4267:
4255:. Retrieved
4230:. Retrieved
4226:
4217:
4205:. Retrieved
4193:
4168:
4156:. Retrieved
4125:25 September
4123:. Retrieved
4119:
4110:
4100:25 September
4098:. Retrieved
4094:
4070:. Retrieved
4066:fpmurphy.com
4065:
4056:
4044:. Retrieved
4040:
4031:
4021:25 September
4019:. Retrieved
4012:BIOS systems
4011:
3987:25 September
3985:. Retrieved
3983:. kernel.org
3980:
3971:
3961:25 September
3959:. Retrieved
3926:. Retrieved
3919:the original
3906:
3894:. Retrieved
3892:. UEFI Forum
3881:
3869:. Retrieved
3855:
3843:. Retrieved
3829:
3817:. Retrieved
3812:
3803:
3793:25 September
3791:. Retrieved
3753:20 September
3751:. Retrieved
3744:the original
3733:
3721:. Retrieved
3717:the original
3706:
3694:. Retrieved
3683:
3666:
3652:
3643:
3633:
3624:
3615:
3606:
3597:
3588:
3579:
3559:
3552:
3538:
3524:
3493:
3479:
3465:
3451:
3441:25 September
3439:. Retrieved
3431:
3407:14 September
3405:. Retrieved
3395:
3383:. Retrieved
3379:www.uefi.org
3378:
3366:
3352:
3343:
3338:
3332:
3318:
3307:
3298:
3287:
3278:
3269:
3260:
3242:
3236:
3228:the original
3222:
3216:
3206:14 September
3204:. Retrieved
3172:. Retrieved
3168:
3159:
3149:24 September
3147:. Retrieved
3124:14 September
3122:. Retrieved
3115:the original
3101:
3081:
3074:
3060:
3046:
3019:
3010:
2998:
2989:
2911:
2892:
2889:
2849:
2825:
2821:
2800:
2793:
2778:
2762:
2741:Ubuntu 12.10
2737:
2709:
2673:
2639:
2624:
2549:ShellAppMain
2514:hello, world
2511:
2490:
2489:
2282:Windows 2000
2270:Windows 2000
2268:versions of
2209:Linux kernel
2176:
2174:
2165:
2153:
2123:
2112:
2104:
2097:
2086:
2082:
2063:
2033:
2023:
1991:
1976:
1962:
1925:
1924:, codenamed
1921:
1919:
1895:
1872:
1869:RT – Runtime
1864:
1852:
1843:
1823:
1798:
1777:
1757:
1725:
1701:
1698:UEFI Capsule
1680:non-volatile
1677:
1513:
1493:
1482:
1462:boot loaders
1455:
1434:AlmaLinux OS
1379:
1366:
1364:
1361:boot manager
1334:
1328:(iSCSI) and
1319:
1280:
1272:
1269:
1265:
1262:
1253:
1241:
1239:
1234:
1230:
1228:
1219:
1217:
1209:
1204:
1196:
1194:
1191:Boot process
1155:
1139:boot sectors
1136:
1133:UEFI booting
1092:. Supported
1090:boot loaders
1082:
1068:
1049:
1042:
1024:
1022:
1018:
994:
990:
976:
963:
939:
930:
927:boot manager
918:
916:
905:Applications
822:
802:
798:
796:
751:
744:
732:
727:
721:
703:
699:
687:
681:
670:
626:
606:
603:deduplicates
598:
587:Linux kernel
583:
560:
533:
520:
517:
459:
451:
432:
393:
386:
382:cryptography
379:
374:
368:
361:
356:
352:
330:
318:
309:
305:
300:
261:
225:architecture
190:
186:
185:
169:flash memory
70:Organization
52:Year started
36:Abbreviation
18:
8394:ROM hacking
8330:Wake-on-LAN
7993:BootManager
7945:Bootloaders
7345:26 February
7323:26 February
7301:26 February
7279:26 February
7254:10 November
7229:10 November
7204:10 November
7179:3 September
7029:26 February
7007:26 February
6957:26 February
6699:16 February
6656:28 February
6618:Ticket 7702
6556:28 February
6486:28 February
6444:4 September
6407:youtube.com
6387:4 September
6148:9 September
6079:13 November
5994:9 September
5869:22 November
5834:PC Magazine
5593:20 December
5353:30 December
5263:24 December
5040:SourceForge
4719:9 September
4691:9 September
4663:18 February
4257:27 February
4232:24 November
4072:14 November
4046:14 November
3677:. May 2017.
3644:SourceForge
3510:cite report
3243:Beyond BIOS
3174:11 December
3027:(ACPI) and
2841:winload.efi
2648:Secure Boot
2609:EFI_SUCCESS
2503:SourceForge
2436:Secure Boot
2161:smartphones
2119:BladeCenter
1946:BSD license
1877:(OS) after
1855:Option ROMs
1826:main memory
1790:Boot stages
1732:boot loader
1708:Windows 8.1
1496:motherboard
1367:Secure Boot
1343:Secure Boot
1313:(TFTP) and
1246:option ROMs
1224:boot sector
1214:CSM booting
1143:boot loader
597:CPUs, with
501:programming
400:hypervisors
364:open source
284:CSM booting
94:Predecessor
8429:Instant-on
8415:Devicetree
8255:Bus Pirate
8159:Partitions
7927:Das U-Boot
7812:Award BIOS
7729:Video BIOS
7707:Interfaces
7465:12 October
7440:12 October
7420:12 October
7400:12 October
7380:12 October
7319:. Bit-tech
7297:. Phoronix
6581:13 January
6508:18 January
6311:4 November
6286:11 January
5931:28 October
5474:7 November
5349:(in Dutch)
5189:Arch Linux
5160:Arch Linux
5102:Arch Linux
4912:Arch Linux
4908:UEFI Shell
4834:12 January
4829:Linux Mint
4433:27 October
4041:redhat.com
4016:Arch Linux
3896:5 December
3865:kernel.org
3692:. bit-tech
3640:"EFI-MIPS"
3385:16 January
3039:References
2970:MoonBounce
2931:Bootloader
2880:SUSE Linux
2832:Windows 10
2828:Windows 11
2817:Windows RT
2749:user space
2714:developer
2701:Windows 10
2652:See also:
2543:EFI_STATUS
2452:VirtualBox
2353:Windows 11
2253:Tiger and
2066:Apple Inc.
2010:SUSE Linux
1994:Das U-Boot
1987:Project Mu
1780:Video BIOS
1712:Windows 10
1674:Extensions
1444:UEFI shell
1430:Linux Mint
1416:including
1410:Windows 11
1394:Windows 10
1347:See also:
1176:system is
1058:(OEMs) or
985:stored in
868:Devicetree
836:Memory map
665:See also:
617:See also:
567:Intel 8088
499:C language
456:Advantages
362:The first
296:consortium
74:UEFI Forum
8401:ROM image
8192:Utilities
8049:OpeniBoot
7891:Kickstart
7884:LinuxBoot
7877:Libreboot
7842:InsydeH2O
7833:AMI Aptio
7773:AlphaBIOS
7606:Processes
7104:12 August
6829:TianoCore
6825:"Welcome"
6277:"uefi(8)"
6191:Microsoft
5562:"Why US?"
5327:810455404
5066:Shell FAQ
4881:. FreeBSD
4745:18 August
4641:13 August
4558:9 October
4465:6 October
4158:6 October
3504:(Report).
2943:(UEFI PI)
2745:Canonical
2676:Windows 8
2621:Criticism
2466:TianoCore
2345:Windows 8
2341:Windows 8
2325:Windows 7
2091:based on
2078:Boot Camp
2039:Itanium 2
2037:'s first
2027:'s first
2020:Platforms
1979:Microsoft
1952:(EPL) as
1809:microcode
1748:NOR flash
1704:Windows 8
1489:TianoCore
1382:Windows 8
1106:El Torito
960:Protocols
950:Gummiboot
758:Windows 8
579:long mode
548:TianoCore
469:) with a
435:Microsoft
341:real mode
274:that are
257:InsydeH2O
245:AMI Aptio
237:interface
231:used for
173:mainboard
149:with UEFI
104:computers
47:Published
8459:Category
8443:EDL mode
8422:Fastboot
8387:Boot ROM
8247:Hardware
8235:Heimdall
8221:UEFITool
8207:flashrom
8199:Software
8077:SYSLINUX
8014:GNU GRUB
7870:Coreboot
7863:OpenBIOS
7667:firmware
7665:Booting
7595:Firmware
7081:5 August
7071:IT World
7051:26 March
6935:18 March
6910:21 March
6534:2 August
5720:Archived
5588:Phoronix
5346:Tweakers
4998:18 March
4859:10 April
4809:20 March
4777:Phoronix
4714:PC World
4615:20 April
4515:4 August
4347:uefi.org
4201:Archived
4152:Archived
3436:GNU GRUB
3202:. Emulex
2965:UEFITool
2955:(SMBIOS)
2936:OpenBIOS
2925:See also
2876:OpenSUSE
2642:coreboot
2631:coreboot
2537:#include
2531:#include
2525:#include
2145:LGA 1155
2142:6-series
2134:Gigabyte
2115:System x
2006:GNU GRUB
1958:coreboot
1801:Intel ME
1722:Hardware
1578:EddDebug
1567:dmpstore
1516:commands
1510:Commands
1474:diskpart
1422:openSUSE
1309:(DHCP),
1289:include
1235:BIOS-GPT
1231:BIOS-MBR
1205:UEFI-MBR
937:(OEMs).
862:services
854:services
846:services
838:services
814:access.
785:Services
780:Features
728:UEFI-GPT
688:BIOS-GPT
563:IBM 5150
288:de facto
268:boot ROM
229:firmware
113:Firmware
8379:Related
8316:NetBoot
8056:RedBoot
8035:loadlin
7986:Barebox
7826:AMIBIOS
7805:SeaBIOS
7644:Android
7614:Windows
7599:booting
7341:. The H
7275:. ZDNet
7153:6 March
7130:1 March
7003:. The H
6953:. ZDNet
6884:6 March
6678:24 June
6261:19 June
6239:7 March
6235:. The H
6112:12 June
5754:. Intel
4885:16 June
4685:LWN.net
4553:Red Hat
4253:. The H
4207:2 April
3871:15 June
3845:15 June
3839:LWN.net
3819:15 June
3723:18 June
3696:18 June
3272:, Intel
2918:bricked
2914:Samsung
2907:Toshiba
2808:bootkit
2804:rootkit
2794:At the
2781:Spanish
2732:kernels
2712:Red Hat
2703:allows
2693:lock-in
2473:Hyper-V
2400:INT 13H
2396:INT 10H
2382:OpenBSD
2372:Solaris
2370:Oracle
2364:FreeBSD
2313:INT 10h
2294:Itanium
2266:Itanium
2237:OpenVMS
2100:Windows
2095:cores.
2059:OpenVMS
2051:FreeBSD
2043:Windows
2029:Itanium
1983:Surface
1934:Itanium
1805:AMD PSP
1754:Classes
1734:from a
1438:FreeBSD
1305:(UDP),
1158:booting
1128:Booting
1005:-based
1003:PowerPC
644:(2 × 2
493:AArch64
443:Hyper-V
359:(EFI).
333:Itanium
327:History
270:of all
233:booting
167:-based
119:Website
8369:EEPROM
8269:ft2232
8182:/boot/
8098:Yaboot
8063:rEFInd
7490:
6744:GitHub
6217:7 June
6022:31 May
5701:18 May
5495:25 May
5428:GitHub
5405:
5378:
5325:
5315:
5287:GitHub
5132:. 2008
5042:. 2012
5018:GitHub
4993:GitHub
4783:23 May
4587:29 May
4490:29 May
4353:29 May
4324:19 May
4301:GitHub
4008:"GRUB"
3928:9 June
3747:(PPTX)
3607:GitHub
3567:
3309:GitHub
3289:GitHub
3249:
3089:
2901:" or "
2895:Lenovo
2872:Debian
2868:Fedora
2864:Ubuntu
2860:CentOS
2758:Fedora
2633:, and
2606:return
2600:"
2570:CHAR16
2546:EFIAPI
2507:Python
2443:VMware
2388:ArcaOS
2221:Ubuntu
2136:, and
2126:ASRock
2093:XScale
1985:line,
1942:x86-64
1930:XScale
1807:, CPU
1714:, and
1658:unload
1609:memmap
1529:attrib
1466:memmap
1426:Ubuntu
1418:Fedora
1408:, and
1404:, and
1371:signed
1359:rEFInd
1180:, and
1174:x86-64
1064:UTF-16
952:, and
946:rEFInd
860:SMBIOS
768:, and
684:GRUB 2
621:, and
595:x86-64
591:booted
575:x86-64
556:RISC-V
408:SMBIOS
109:Domain
44:Status
8362:EPROM
8214:fwupd
8070:rEFIt
8042:NTLDR
8021:iBoot
7675:Types
7637:Linux
6719:Intel
6635:Forum
6305:(PDF)
5988:(PDF)
5977:(PDF)
5905:1 May
5864:(PDF)
5786:(PDF)
5779:(PDF)
5643:(PDF)
5636:(PDF)
5612:(PDF)
5568:2 May
5546:2 May
5540:(PDF)
5446:(PDF)
5282:(PDF)
5130:Intel
5126:(PDF)
5070:Intel
4967:(PDF)
4940:Intel
4609:(PDF)
4578:(PDF)
4455:(PDF)
4383:6 May
4343:(PDF)
4319:Intel
3922:(PDF)
3915:(PDF)
3890:(PDF)
3787:(PDF)
3675:(PDF)
3502:(PDF)
3375:(PDF)
3339:About
3200:(PDF)
3118:(PDF)
3111:(PDF)
2981:Notes
2961:(TPM)
2850:Many
2766:X.509
2689:Linux
2585:Print
2558:UINTN
2499:Intel
2298:DIG64
2290:IA-64
2243:Apple
2231:IA-64
2227:HP-UX
2213:elilo
2055:HP-UX
2047:Linux
2025:Intel
2002:Linux
1998:ARMv8
1938:IA-32
1926:Tiano
1900:Usage
1742:. In
1726:Like
1716:Fwupd
1645:stall
1634:reset
1628:pause
1624:mount
1613:mkdir
1575:Edd30
1524:alias
1485:Intel
1315:iSCSI
1151:NVRAM
1122:FAT12
1118:FAT16
1114:FAT32
1033:Rufus
1029:GRUB2
1025:efifs
1014:SPARC
881:NVRAM
834:UEFI
812:NVRAM
673:Linux
661:Linux
646:bytes
571:IA-32
540:ARM64
508:shell
485:ARM32
481:IA-32
473:(GPT)
349:PC AT
302:Intel
8355:PROM
8307:iPXE
8300:gPXE
8228:Odin
8112:MILO
8091:xOSL
7934:ARCS
7745:ACPI
7722:BIOS
7715:UEFI
7597:and
7506:2013
7488:ISBN
7467:2012
7442:2012
7422:2012
7402:2012
7382:2012
7347:2013
7325:2013
7303:2013
7281:2013
7256:2020
7231:2020
7206:2020
7181:2024
7155:2023
7132:2023
7106:2016
7083:2013
7053:2013
7031:2013
7009:2013
6984:2012
6959:2013
6937:2020
6912:2015
6886:2012
6811:2010
6790:2013
6766:2010
6726:2013
6701:2019
6680:2013
6658:2014
6583:2017
6558:2014
6536:2018
6510:2016
6488:2014
6446:2023
6415:2020
6389:2023
6363:2016
6338:2016
6313:2013
6288:2021
6263:2014
6241:2013
6219:2024
6173:2011
6150:2011
6114:2010
6081:2022
6024:2008
5996:2020
5961:2008
5933:2012
5907:2008
5871:2017
5846:2013
5760:2010
5703:2020
5677:2018
5651:2018
5619:2018
5595:2018
5570:2018
5548:2018
5523:2010
5497:2012
5476:2020
5403:ISBN
5376:ISBN
5355:2022
5323:OCLC
5313:ISBN
5265:2020
5240:2020
5196:2013
5185:Asus
5167:2013
5156:bcfg
5138:2013
5109:2013
5077:2013
5048:2013
5000:2020
4975:2013
4947:2013
4919:2013
4887:2015
4861:2024
4836:2024
4811:2014
4785:2018
4747:2017
4721:2012
4693:2012
4665:2016
4643:2015
4617:2022
4589:2019
4560:2013
4517:2022
4492:2018
4467:2013
4435:2020
4410:2020
4385:2015
4355:2015
4326:2014
4259:2013
4234:2020
4209:2012
4197:2012
4160:2013
4127:2013
4102:2013
4074:2013
4048:2013
4023:2013
3989:2013
3963:2013
3930:2010
3898:2019
3873:2014
3847:2014
3821:2014
3795:2013
3755:2014
3725:2010
3698:2010
3565:ISBN
3516:link
3443:2013
3409:2010
3387:2023
3247:ISBN
3208:2010
3176:2020
3151:2011
3126:2010
3087:ISBN
2947:ACPI
2856:RHEL
2845:GRUB
2843:and
2830:and
2815:and
2806:and
2705:OEMs
2576:Argv
2561:Argc
2458:QEMU
2446:ESXi
2441:The
2398:and
2392:BIOS
2376:GRUB
2349:ACPI
2331:and
2307:and
2288:for
2264:The
2217:GRUB
2207:The
2201:AA64
2193:IA64
2185:IA32
2149:AM3+
2130:Asus
2053:and
2014:iPXE
1940:and
1887:ACPI
1885:and
1834:DRAM
1832:and
1728:BIOS
1654:type
1649:time
1620:mode
1595:load
1591:help
1587:guid
1581:edit
1571:echo
1561:dblk
1557:date
1547:comp
1533:bcfg
1504:bcfg
1478:edit
1470:bcfg
1406:2022
1402:2019
1384:and
1337:HTTP
1299:IPv6
1297:and
1295:IPv4
1258:PS/2
1240:The
1120:and
1100:and
1052:HTML
1009:and
942:GRUB
852:ACPI
821:The
801:and
733:For
702:and
554:and
552:MIPS
441:and
428:EBBR
414:and
412:edge
406:and
404:ACPI
337:BIOS
264:BIOS
191:UEFI
126:.org
124:uefi
98:BIOS
84:ACPI
63:2.10
55:2006
39:UEFI
8348:ROM
7787:SFI
7780:SRM
7759:APM
7375:UBM
3956:IBM
2462:KVM
2199:or
2197:ARM
2189:X64
2138:MSI
2108:MSI
1948:or
1883:SMM
1744:x86
1692:ROM
1667:vol
1662:ver
1642:set
1631:pci
1606:mem
1603:map
1584:err
1542:cls
1487:'s
1480:).
1386:8.1
1301:),
1145:or
1102:GPT
1098:MBR
995:EBC
993:or
989:as
879:in
844:SMM
762:8.1
749:.
652:ZiB
536:ARM
489:x64
424:BBR
416:IoT
310:EFI
292:IBM
259:.
203:juː
177:SPI
165:NOR
100:on
8461::
7628:NT
7621:9x
7484:15
7482:.
7478:.
7453:.
7433:.
7413:.
7393:.
7373:.
7367:.
7264:^
7247:.
7222:.
7197:.
7172:.
7123:.
7069:.
6992:^
6967:^
6928:.
6902:.
6869:^
6827:,
6742:.
6717:.
6574:.
6526:.
6432:.
6405:.
6380:.
6354:.
6329:.
6279:.
6207:.
6189:.
6116:.
6072:.
5979:.
5914:^
5832:.
5743:^
5586:.
5462:.
5425:.
5343:.
5321:.
5284:.
5256:.
5231:.
5212:.
5187:.
5183:.
5158:.
5154:.
5128:.
5100:.
5096:.
5085:^
5068:.
5064:.
5038:.
5034:.
5016:.
4991:.
4955:^
4938:.
4927:^
4910:.
4906:.
4895:^
4877:.
4852:.
4827:.
4802:.
4775:.
4737:.
4712:.
4701:^
4682:.
4633:.
4580:.
4551:.
4547:.
4508:.
4483:.
4457:.
4443:^
4426:.
4401:.
4375:.
4357:.
4345:.
4317:.
4299:.
4242:^
4225:.
4199:.
4192:.
4180:^
4135:^
4118:.
4093:.
4082:^
4064:.
4039:.
4014:.
4010:.
3997:^
3979:.
3954:.
3938:^
3863:.
3837:.
3811:.
3763:^
3642:.
3623:.
3605:.
3512:}}
3508:{{
3434:.
3430:.
3417:^
3377:.
3306:.
3286:.
3268:,
3184:^
3167:.
3134:^
2882:.
2878:,
2870:,
2866:,
2791:.
2770:PE
2699:.
2603:);
2597:\n
2573:**
2567:IN
2555:IN
2520::
2402:).
2339:.
2327:,
2323:,
2319:,
2280:,
2249:.
2195:,
2191:,
2187:,
2132:,
2128:,
2057:;
2049:,
2045:,
1989:.
1960:.
1936:,
1932:,
1803:,
1710:,
1706:,
1694:.
1638:rm
1617:mm
1599:ls
1564:dh
1552:cp
1537:cd
1400:,
1396:,
1388:,
1339:.
1317:.
1237:.
1226:.
1207:.
1116:,
1047:.
969:.
948:,
944:,
776:.
774:TB
770:11
766:10
764:,
760:,
708:MB
657:.
641:TB
609:.
491:,
483:,
467:TB
449:.
316:.
298:.
255:,
251:,
247:,
212:aɪ
193:,
86:,
7587:e
7580:t
7573:v
7508:.
7469:.
7444:.
7424:.
7404:.
7384:.
7349:.
7327:.
7305:.
7283:.
7258:.
7233:.
7208:.
7183:.
7157:.
7134:.
7108:.
7085:.
7055:.
7033:.
7011:.
6986:.
6961:.
6939:.
6914:.
6888:.
6849:.
6813:.
6768:.
6746:.
6728:.
6703:.
6682:.
6660:.
6585:.
6560:.
6538:.
6512:.
6490:.
6448:.
6417:.
6391:.
6365:.
6340:.
6315:.
6290:.
6265:.
6243:.
6221:.
6193:.
6175:.
6152:.
6083:.
5998:.
5935:.
5873:.
5848:.
5801:.
5762:.
5726:"
5705:.
5679:.
5653:.
5621:.
5597:.
5572:.
5550:.
5525:.
5499:.
5478:.
5448:.
5431:.
5411:.
5384:.
5357:.
5329:.
5290:.
5267:.
5242:.
5216:.
5198:.
5169:.
5140:.
5111:.
5079:.
5050:.
5020:.
5002:.
4977:.
4949:.
4921:.
4889:.
4863:.
4838:.
4813:.
4787:.
4749:.
4723:.
4695:.
4667:.
4645:.
4619:.
4591:.
4562:.
4533:.
4519:.
4494:.
4469:.
4437:.
4412:.
4387:.
4328:.
4303:.
4284:.
4261:.
4236:.
4211:.
4162:.
4129:.
4104:.
4076:.
4050:.
4025:.
3991:.
3965:.
3932:.
3900:.
3875:.
3849:.
3823:.
3797:.
3757:.
3727:.
3700:.
3660:.
3646:.
3573:.
3532:.
3518:)
3459:.
3445:.
3411:.
3389:.
3326:.
3210:.
3178:.
3153:.
3128:.
3095:.
3054:.
2615:}
2612:;
2591:L
2588:(
2582:{
2579:)
2564:,
2552:(
2468:.
2460:/
2261:.
2155:"
1293:(
648:)
321:C
308:(
215:/
209:f
206:ɪ
200:ˈ
197:/
189:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.