CINXE.COM
UEFI - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>UEFI - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"d748b4bb-6dfb-47c8-84b9-a85571ff35dd","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"UEFI","wgTitle":"UEFI","wgCurRevisionId":1255965030,"wgRevisionId":1255965030,"wgArticleId":866065,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: url-status","CS1 Dutch-language sources (nl)","Webarchive template wayback links","Articles with short description","Short description is different from Wikidata","Use dmy dates from February 2020","All articles lacking reliable references","Articles lacking reliable references from September 2013","All articles with vague or ambiguous time","Vague or ambiguous time from October 2024","All articles with unsourced statements","Articles with unsourced statements from October 2024", "Articles containing potentially dated statements from January 2024","All articles containing potentially dated statements","Articles with unsourced statements from December 2021","All articles with failed verification","Articles with failed verification from November 2024","Articles with failed verification from December 2020","All articles with specifically marked weasel-worded phrases","Articles with specifically marked weasel-worded phrases from October 2017","Articles with unsourced statements from October 2017","Commons category link is on Wikidata","Articles with example C code","Unified Extensible Firmware Interface"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"UEFI","wgRelevantArticleId":866065,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status": {"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":100000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q859398","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready", "site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","ext.pygments":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","ext.pygments.view","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging", "ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.pygments%2CwikimediaBadges%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/1200px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="978"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/800px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="652"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/640px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="522"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="UEFI - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/UEFI"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=UEFI&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/UEFI"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-UEFI rootpage-UEFI skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=UEFI" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=UEFI" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=UEFI" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=UEFI" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Advantages" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Advantages"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Advantages</span> </div> </a> <ul id="toc-Advantages-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Compatibility" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Compatibility"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Compatibility</span> </div> </a> <button aria-controls="toc-Compatibility-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Compatibility subsection</span> </button> <ul id="toc-Compatibility-sublist" class="vector-toc-list"> <li id="toc-Processor_compatibility" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Processor_compatibility"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Processor compatibility</span> </div> </a> <ul id="toc-Processor_compatibility-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Disk_device_compatibility" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Disk_device_compatibility"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Disk device compatibility</span> </div> </a> <ul id="toc-Disk_device_compatibility-sublist" class="vector-toc-list"> <li id="toc-Linux" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Linux"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.1</span> <span>Linux</span> </div> </a> <ul id="toc-Linux-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Microsoft_Windows" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Microsoft_Windows"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.2</span> <span>Microsoft Windows</span> </div> </a> <ul id="toc-Microsoft_Windows-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Features" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Features"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Features</span> </div> </a> <button aria-controls="toc-Features-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Features subsection</span> </button> <ul id="toc-Features-sublist" class="vector-toc-list"> <li id="toc-Services" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Services"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Services</span> </div> </a> <ul id="toc-Services-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Applications" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Applications"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Applications</span> </div> </a> <ul id="toc-Applications-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Protocols" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Protocols"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Protocols</span> </div> </a> <ul id="toc-Protocols-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Device_drivers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Device_drivers"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Device drivers</span> </div> </a> <ul id="toc-Device_drivers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Graphics_features" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Graphics_features"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>Graphics features</span> </div> </a> <ul id="toc-Graphics_features-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-EFI_system_partition" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#EFI_system_partition"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>EFI system partition</span> </div> </a> <ul id="toc-EFI_system_partition-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Booting" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Booting"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>Booting</span> </div> </a> <ul id="toc-Booting-sublist" class="vector-toc-list"> <li id="toc-UEFI_booting" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#UEFI_booting"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7.1</span> <span>UEFI booting</span> </div> </a> <ul id="toc-UEFI_booting-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-CSM_booting" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#CSM_booting"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7.2</span> <span>CSM booting</span> </div> </a> <ul id="toc-CSM_booting-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Network_booting" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Network_booting"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7.3</span> <span>Network booting</span> </div> </a> <ul id="toc-Network_booting-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Secure_Boot" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Secure_Boot"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7.4</span> <span>Secure Boot</span> </div> </a> <ul id="toc-Secure_Boot-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-UEFI_shell" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#UEFI_shell"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>UEFI shell</span> </div> </a> <ul id="toc-UEFI_shell-sublist" class="vector-toc-list"> <li id="toc-Commands" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Commands"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8.1</span> <span>Commands</span> </div> </a> <ul id="toc-Commands-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Extensions" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Extensions"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>Extensions</span> </div> </a> <ul id="toc-Extensions-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-UEFI_Capsule" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#UEFI_Capsule"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.10</span> <span>UEFI Capsule</span> </div> </a> <ul id="toc-UEFI_Capsule-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Hardware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Hardware"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.11</span> <span>Hardware</span> </div> </a> <ul id="toc-Hardware-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Classes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Classes"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Classes</span> </div> </a> <ul id="toc-Classes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Boot_stages" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Boot_stages"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Boot stages</span> </div> </a> <button aria-controls="toc-Boot_stages-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Boot stages subsection</span> </button> <ul id="toc-Boot_stages-sublist" class="vector-toc-list"> <li id="toc-SEC_–_Security_Phase" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#SEC_–_Security_Phase"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>SEC – Security Phase</span> </div> </a> <ul id="toc-SEC_–_Security_Phase-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-PEI_–_Pre-EFI_Initialization" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#PEI_–_Pre-EFI_Initialization"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>PEI – Pre-EFI Initialization</span> </div> </a> <ul id="toc-PEI_–_Pre-EFI_Initialization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-DXE_–_Driver_Execution_Environment" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#DXE_–_Driver_Execution_Environment"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.3</span> <span>DXE – Driver Execution Environment</span> </div> </a> <ul id="toc-DXE_–_Driver_Execution_Environment-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-BDS_–_Boot_Device_Select" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#BDS_–_Boot_Device_Select"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.4</span> <span>BDS – Boot Device Select</span> </div> </a> <ul id="toc-BDS_–_Boot_Device_Select-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-TSL_–_Transient_System_Load" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#TSL_–_Transient_System_Load"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.5</span> <span>TSL – Transient System Load</span> </div> </a> <ul id="toc-TSL_–_Transient_System_Load-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-RT_–_Runtime" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#RT_–_Runtime"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.6</span> <span>RT – Runtime</span> </div> </a> <ul id="toc-RT_–_Runtime-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Usage" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Usage"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Usage</span> </div> </a> <button aria-controls="toc-Usage-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Usage subsection</span> </button> <ul id="toc-Usage-sublist" class="vector-toc-list"> <li id="toc-Implementations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Implementations"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>Implementations</span> </div> </a> <ul id="toc-Implementations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Platforms" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Platforms"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.2</span> <span>Platforms</span> </div> </a> <ul id="toc-Platforms-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Operating_systems" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Operating_systems"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.3</span> <span>Operating systems</span> </div> </a> <ul id="toc-Operating_systems-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-With_virtualization" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#With_virtualization"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.4</span> <span>With virtualization</span> </div> </a> <ul id="toc-With_virtualization-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Applications_development" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Applications_development"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Applications development</span> </div> </a> <ul id="toc-Applications_development-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Criticism" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Criticism"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Criticism</span> </div> </a> <button aria-controls="toc-Criticism-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Criticism subsection</span> </button> <ul id="toc-Criticism-sublist" class="vector-toc-list"> <li id="toc-Secure_Boot_2" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Secure_Boot_2"> <div class="vector-toc-text"> <span class="vector-toc-numb">9.1</span> <span>Secure Boot</span> </div> </a> <ul id="toc-Secure_Boot_2-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Firmware_problems" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Firmware_problems"> <div class="vector-toc-text"> <span class="vector-toc-numb">9.2</span> <span>Firmware problems</span> </div> </a> <ul id="toc-Firmware_problems-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Notes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Notes"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>Notes</span> </div> </a> <ul id="toc-Notes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">13</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">14</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">UEFI</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 36 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-36" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">36 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%88%D8%A7%D8%AC%D9%87%D8%A9_%D8%A7%D9%84%D8%A8%D8%B1%D9%86%D8%A7%D9%85%D8%AC_%D8%A7%D9%84%D8%AB%D8%A7%D8%A8%D8%AA_%D8%A7%D9%84%D9%85%D9%85%D8%AA%D8%AF" title="واجهة البرنامج الثابت الممتد – Arabic" lang="ar" hreflang="ar" data-title="واجهة البرنامج الثابت الممتد" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%87%E0%A6%89%E0%A6%A8%E0%A6%BF%E0%A6%AB%E0%A6%BE%E0%A6%87%E0%A6%A1_%E0%A6%8F%E0%A6%95%E0%A7%8D%E0%A6%B8%E0%A6%9F%E0%A7%87%E0%A6%A8%E0%A6%B8%E0%A6%BF%E0%A6%AC%E0%A6%B2_%E0%A6%AB%E0%A6%BE%E0%A6%B0%E0%A7%8D%E0%A6%AE%E0%A6%93%E0%A6%AF%E0%A6%BC%E0%A7%8D%E0%A6%AF%E0%A6%BE%E0%A6%B0_%E0%A6%87%E0%A6%A8%E0%A7%8D%E0%A6%9F%E0%A6%BE%E0%A6%B0%E0%A6%AB%E0%A7%87%E0%A6%B8" title="ইউনিফাইড এক্সটেনসিবল ফার্মওয়্যার ইন্টারফেস – Bangla" lang="bn" hreflang="bn" data-title="ইউনিফাইড এক্সটেনসিবল ফার্মওয়্যার ইন্টারফেস" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%A3%D0%BD%D0%B8%D1%84%D0%B8%D1%86%D0%B8%D1%80%D0%B0%D0%BD_%D1%80%D0%B0%D0%B7%D1%88%D0%B8%D1%80%D1%8F%D0%B5%D0%BC_%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D1%84%D0%B5%D0%B9%D1%81_%D0%B7%D0%B0_%D1%84%D1%8A%D1%80%D0%BC%D1%83%D0%B5%D1%80_(UEFI)" title="Унифициран разширяем интерфейс за фърмуер (UEFI) – Bulgarian" lang="bg" hreflang="bg" data-title="Унифициран разширяем интерфейс за фърмуер (UEFI)" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Bosnian" lang="bs" hreflang="bs" data-title="Unified Extensible Firmware Interface" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/UEFI" title="UEFI – Catalan" lang="ca" hreflang="ca" data-title="UEFI" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Czech" lang="cs" hreflang="cs" data-title="Unified Extensible Firmware Interface" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – German" lang="de" hreflang="de" data-title="Unified Extensible Firmware Interface" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/EFI" title="EFI – Estonian" lang="et" hreflang="et" data-title="EFI" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Spanish" lang="es" hreflang="es" data-title="Unified Extensible Firmware Interface" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%B1%D8%A7%D8%A8%D8%B7_%D9%85%D8%AA%D8%AD%D8%AF_%D8%AA%D9%88%D8%B3%D8%B9%D9%87%E2%80%8C%D9%BE%D8%B0%DB%8C%D8%B1_%D8%B3%DB%8C%D8%B3%D8%AA%D9%85%E2%80%8C%D8%B9%D8%A7%D9%85%D9%84" title="رابط متحد توسعهپذیر سیستمعامل – Persian" lang="fa" hreflang="fa" data-title="رابط متحد توسعهپذیر سیستمعامل" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/UEFI" title="UEFI – French" lang="fr" hreflang="fr" data-title="UEFI" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%ED%86%B5%EC%9D%BC_%ED%99%95%EC%9E%A5_%ED%8E%8C%EC%9B%A8%EC%96%B4_%EC%9D%B8%ED%84%B0%ED%8E%98%EC%9D%B4%EC%8A%A4" title="통일 확장 펌웨어 인터페이스 – Korean" lang="ko" hreflang="ko" data-title="통일 확장 펌웨어 인터페이스" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Croatian" lang="hr" hreflang="hr" data-title="Unified Extensible Firmware Interface" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/UEFI" title="UEFI – Indonesian" lang="id" hreflang="id" data-title="UEFI" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/UEFI" title="UEFI – Italian" lang="it" hreflang="it" data-title="UEFI" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/UEFI" title="UEFI – Hebrew" lang="he" hreflang="he" data-title="UEFI" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-lt mw-list-item"><a href="https://lt.wikipedia.org/wiki/UEFI" title="UEFI – Lithuanian" lang="lt" hreflang="lt" data-title="UEFI" data-language-autonym="Lietuvių" data-language-local-name="Lithuanian" class="interlanguage-link-target"><span>Lietuvių</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%8F%E0%B4%95%E0%B5%80%E0%B4%95%E0%B5%83%E0%B4%A4_%E0%B4%B5%E0%B4%BF%E0%B4%AA%E0%B5%81%E0%B4%B2%E0%B5%80%E0%B4%95%E0%B4%B0%E0%B4%BF%E0%B4%95%E0%B5%8D%E0%B4%95%E0%B4%BE%E0%B4%B5%E0%B5%81%E0%B4%A8%E0%B5%8D%E0%B4%A8_%E0%B4%AB%E0%B5%87%E0%B4%82%E0%B4%B5%E0%B5%86%E0%B4%AF%E0%B5%BC_%E0%B4%87%E0%B4%A8%E0%B5%8D%E0%B4%B1%E0%B5%BC%E0%B4%AB%E0%B5%87%E0%B4%B8%E0%B5%8D" title="ഏകീകൃത വിപുലീകരിക്കാവുന്ന ഫേംവെയർ ഇന്റർഫേസ് – Malayalam" lang="ml" hreflang="ml" data-title="ഏകീകൃത വിപുലീകരിക്കാവുന്ന ഫേംവെയർ ഇന്റർഫേസ്" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Extensible_Firmware_Interface" title="Extensible Firmware Interface – Dutch" lang="nl" hreflang="nl" data-title="Extensible Firmware Interface" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Japanese" lang="ja" hreflang="ja" data-title="Unified Extensible Firmware Interface" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Unified Extensible Firmware Interface" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Polish" lang="pl" hreflang="pl" data-title="Unified Extensible Firmware Interface" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Portuguese" lang="pt" hreflang="pt" data-title="Unified Extensible Firmware Interface" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/UEFI" title="UEFI – Romanian" lang="ro" hreflang="ro" data-title="UEFI" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/Extensible_Firmware_Interface" title="Extensible Firmware Interface – Russian" lang="ru" hreflang="ru" data-title="Extensible Firmware Interface" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/UEFI" title="UEFI – Albanian" lang="sq" hreflang="sq" data-title="UEFI" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Simple English" lang="en-simple" hreflang="en-simple" data-title="Unified Extensible Firmware Interface" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Slovak" lang="sk" hreflang="sk" data-title="Unified Extensible Firmware Interface" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Raz%C5%A1irljiv_strojno-programski_vmesnik" title="Razširljiv strojno-programski vmesnik – Slovenian" lang="sl" hreflang="sl" data-title="Razširljiv strojno-programski vmesnik" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/UEFI" title="UEFI – Finnish" lang="fi" hreflang="fi" data-title="UEFI" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface" title="Unified Extensible Firmware Interface – Swedish" lang="sv" hreflang="sv" data-title="Unified Extensible Firmware Interface" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/UEFI" title="UEFI – Turkish" lang="tr" hreflang="tr" data-title="UEFI" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/UEFI" title="UEFI – Ukrainian" lang="uk" hreflang="uk" data-title="UEFI" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/UEFI" title="UEFI – Vietnamese" lang="vi" hreflang="vi" data-title="UEFI" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/%E7%BB%9F%E4%B8%80%E5%8F%AF%E6%89%A9%E5%B1%95%E5%9B%BA%E4%BB%B6%E6%8E%A5%E5%8F%A3" title="统一可扩展固件接口 – Wu" lang="wuu" hreflang="wuu" data-title="统一可扩展固件接口" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%B5%B1%E4%B8%80%E5%8F%AF%E5%BB%B6%E4%BC%B8%E9%9F%8C%E9%AB%94%E4%BB%8B%E9%9D%A2" title="統一可延伸韌體介面 – Chinese" lang="zh" hreflang="zh" data-title="統一可延伸韌體介面" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q859398#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/UEFI" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:UEFI" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/UEFI"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=UEFI&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=UEFI&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/UEFI"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=UEFI&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=UEFI&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/UEFI" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/UEFI" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=UEFI&oldid=1255965030" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=UEFI&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=UEFI&id=1255965030&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUEFI"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUEFI"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=UEFI&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=UEFI&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Extensible_Firmware_Interface" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q859398" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Technical specification for firmware architecture</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1257001546">.mw-parser-output .infobox-subbox{padding:0;border:none;margin:-3px;width:auto;min-width:100%;font-size:100%;clear:none;float:none;background-color:transparent}.mw-parser-output .infobox-3cols-child{margin:auto}.mw-parser-output .infobox .navbar{font-size:100%}@media screen{html.skin-theme-clientpref-night .mw-parser-output .infobox-full-data:not(.notheme)>div:not(.notheme)[style]{background:#1f1f23!important;color:#f8f9fa}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .infobox-full-data:not(.notheme) div:not(.notheme){background:#1f1f23!important;color:#f8f9fa}}@media(min-width:640px){body.skin--responsive .mw-parser-output .infobox-table{display:table!important}body.skin--responsive .mw-parser-output .infobox-table>caption{display:table-caption!important}body.skin--responsive .mw-parser-output .infobox-table>tbody{display:table-row-group}body.skin--responsive .mw-parser-output .infobox-table tr{display:table-row!important}body.skin--responsive .mw-parser-output .infobox-table th,body.skin--responsive .mw-parser-output .infobox-table td{padding-left:inherit;padding-right:inherit}}</style><table class="infobox hproduct"><caption class="infobox-title fn">Unified Extensible Firmware Interface</caption><tbody><tr><td colspan="2" class="infobox-image"><span typeof="mw:File"><a href="/wiki/File:Logo_of_the_UEFI_Forum.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Logo_of_the_UEFI_Forum.svg/100px-Logo_of_the_UEFI_Forum.svg.png" decoding="async" width="100" height="115" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/89/Logo_of_the_UEFI_Forum.svg/150px-Logo_of_the_UEFI_Forum.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/89/Logo_of_the_UEFI_Forum.svg/200px-Logo_of_the_UEFI_Forum.svg.png 2x" data-file-width="368" data-file-height="425" /></a></span></td></tr><tr><th scope="row" class="infobox-label">Abbreviation</th><td class="infobox-data">UEFI</td></tr><tr><th scope="row" class="infobox-label">Status</th><td class="infobox-data">Published</td></tr><tr><th scope="row" class="infobox-label">Year started</th><td class="infobox-data">2006<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>a<span class="cite-bracket">]</span></a></sup></td></tr><tr><th scope="row" class="infobox-label">Latest version</th><td class="infobox-data">2.10<br />August 29, 2022</td></tr><tr><th scope="row" class="infobox-label">Organization</th><td class="infobox-data"><a href="/wiki/UEFI_Forum" title="UEFI Forum">UEFI Forum</a></td></tr><tr><th scope="row" class="infobox-label">Related standards</th><td class="infobox-data"><a href="/wiki/ACPI" title="ACPI">ACPI</a>, <a href="/wiki/UEFI_Platform_Initialization" title="UEFI Platform Initialization">UEFI Platform Initialization</a></td></tr><tr><th scope="row" class="infobox-label">Predecessor</th><td class="infobox-data"><a href="/wiki/BIOS" title="BIOS">BIOS</a> on <a href="/wiki/IBM_PC_compatible" class="mw-redirect" title="IBM PC compatible">IBM PC compatible</a> computers<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>b<span class="cite-bracket">]</span></a></sup></td></tr><tr><th scope="row" class="infobox-label">Domain</th><td class="infobox-data"><a href="/wiki/Firmware" title="Firmware">Firmware</a></td></tr><tr><th scope="row" class="infobox-label">Website</th><td class="infobox-data"><span class="url"><a rel="nofollow" class="external text" href="https://uefi.org/">uefi<wbr />.org</a></span></td></tr></tbody></table> <style data-mw-deduplicate="TemplateStyles:r1237032888/mw-parser-output/.tmulti">.mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}</style> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237032888/mw-parser-output/.tmulti"><div class="thumb tmulti tright" style="background-color:#FFFFFF"><div class="multiimageinner" style="width:204px;max-width:204px;background-color:#FFFFFF;border:none"><div class="trow"><div class="tsingle" style="background-color:#FFFFFF;width:202px;max-width:202px"><div style="border: none;"><span typeof="mw:File"><a href="/wiki/File:Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/200px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG" decoding="async" width="200" height="163" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/300px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/eb/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG/400px-Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG 2x" data-file-width="3596" data-file-height="2932" /></a></span></div><div>Boot order selection menu on a <a href="/wiki/ThinkPad_T470" class="mw-redirect" title="ThinkPad T470">Lenovo ThinkPad T470</a> with UEFI</div></div></div><div class="trow"><div class="tsingle" style="background-color:#FFFFFF;width:202px;max-width:202px"><div style="border: none;"><span typeof="mw:File"><a href="/wiki/File:WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/200px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" decoding="async" width="200" height="200" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/300px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/400px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 2x" data-file-width="1535" data-file-height="1535" /></a></span></div><div>The UEFI implementation is usually stored on a <a href="/wiki/NOR_flash" class="mw-redirect" title="NOR flash">NOR</a>-based <a href="/wiki/Flash_memory" title="Flash memory">flash memory</a><sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> located on the <a href="/wiki/Mainboard" class="mw-redirect" title="Mainboard">mainboard</a>. Various I/O protocols can be used, <a href="/wiki/Serial_Peripheral_Interface" title="Serial Peripheral Interface">SPI</a> being the most common.</div></div></div></div></div> <p><b>Unified Extensible Firmware Interface</b> (<b>UEFI</b>, <span class="rt-commentedText nowrap"><span class="IPA nopopups noexcerpt" lang="en-fonipa"><a href="/wiki/Help:IPA/English" title="Help:IPA/English">/<span style="border-bottom:1px dotted"><span title="/ˈ/: primary stress follows">ˈ</span><span title="/juː/: 'u' in 'cute'">juː</span><span title="/ɪ/: 'i' in 'kit'">ɪ</span><span title="'f' in 'find'">f</span><span title="/aɪ/: 'i' in 'tide'">aɪ</span></span>/</a></span></span> or as an acronym)<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>c<span class="cite-bracket">]</span></a></sup> is a <a href="/wiki/Specification_(technical_standard)" title="Specification (technical standard)">specification</a> for the firmware <a href="/wiki/Software_architecture" title="Software architecture">architecture</a> of a <a href="/wiki/Computing_platform" title="Computing platform">computing platform</a>. When a computer <a href="/wiki/Booting" title="Booting">is powered on</a>, the UEFI-implementation is typically the first that runs, before starting the <a href="/wiki/Operating_system" title="Operating system">operating system</a>. Examples include <a href="/wiki/AMI_Aptio" class="mw-redirect" title="AMI Aptio">AMI Aptio</a>, <a href="/wiki/Phoenix_Technologies" title="Phoenix Technologies">Phoenix SecureCore</a>, <a href="/wiki/TianoCore_EDK_II" title="TianoCore EDK II">TianoCore EDK II</a>, <a href="/wiki/InsydeH2O" class="mw-redirect" title="InsydeH2O">InsydeH2O</a>. </p><p>UEFI replaces the <a href="/wiki/BIOS" title="BIOS">BIOS</a> which was present in the <a href="/wiki/Boot_ROM" title="Boot ROM">boot ROM</a> of all <a href="/wiki/Personal_computers" class="mw-redirect" title="Personal computers">personal computers</a> that are <a href="/wiki/IBM_PC_compatible" class="mw-redirect" title="IBM PC compatible">IBM PC compatible</a>,<sup id="cite_ref-Intel2000_7-0" class="reference"><a href="#cite_note-Intel2000-7"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-ElReg1_8-0" class="reference"><a href="#cite_note-ElReg1-8"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> although it can provide <a href="/wiki/Backward_compatibility" title="Backward compatibility">backwards compatibility</a> with the BIOS using <a href="#CSM_booting">CSM booting</a>. Contrary to its predecessor BIOS which is a <a href="/wiki/De_facto" title="De facto">de facto</a> standard originally created by <a href="/wiki/IBM" title="IBM">IBM</a> as proprietary software, UEFI is an open standard maintained by an industry <a href="/wiki/Consortium" title="Consortium">consortium</a>. </p><p><a href="/wiki/Intel" title="Intel">Intel</a> developed the original <i>Extensible Firmware Interface</i> (<i>EFI</i>) specification. The last Intel version of EFI was 1.10 released in 2005. Subsequent versions have been developed as UEFI by the <a href="/wiki/Unified_EFI_Forum" class="mw-redirect" title="Unified EFI Forum">Unified EFI Forum</a>. </p><p>UEFI is independent of platform and programming language, but <a href="/wiki/C_(programming_language)" title="C (programming language)">C</a> is used for the reference implementation TianoCore EDKII. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The original motivation for EFI came during early development of the first Intel–HP <a href="/wiki/Itanium" title="Itanium">Itanium</a> systems in the mid-1990s. <a href="/wiki/BIOS" title="BIOS">BIOS</a> limitations (such as 16-bit <a href="/wiki/Real_mode" title="Real mode">real mode</a>, 1 MB addressable memory space,<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Assembly_language" title="Assembly language">assembly language</a> programming, and <a href="/wiki/PC_AT" class="mw-redirect" title="PC AT">PC AT</a> hardware) had become too restrictive for the larger server platforms Itanium was targeting.<sup id="cite_ref-EmulexUEFI_10-0" class="reference"><a href="#cite_note-EmulexUEFI-10"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> The effort to address these concerns began in 1998 and was initially called <i>Intel Boot Initiative</i>.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> It was later renamed to <i>Extensible Firmware Interface</i> (EFI).<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> </p><p>The first <a href="/wiki/Open_source" title="Open source">open source</a> UEFI implementation, Tiano, was released by Intel in 2004. Tiano has since then been superseded by EDK<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> and EDK II<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> and is now maintained by the TianoCore community.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p><p>In July 2005, Intel ceased its development of the EFI specification at version 1.10, and contributed it to the <a href="/wiki/Unified_EFI_Forum" class="mw-redirect" title="Unified EFI Forum">Unified EFI Forum</a>, which has developed the specification as the <i>Unified Extensible Firmware Interface</i> (UEFI). The original EFI specification remains owned by Intel, which exclusively provides licenses for EFI-based products, but the UEFI specification is owned by the UEFI Forum.<sup id="cite_ref-EmulexUEFI_10-1" class="reference"><a href="#cite_note-EmulexUEFI-10"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p><p>Version 2.0 of the UEFI specification was released on 31 January 2006. It added <a href="/wiki/Cryptography" title="Cryptography">cryptography</a> and security. </p><p>Version 2.1 of the UEFI specification was released on 7 January 2007. It added network authentication and the <a href="/wiki/User_interface" title="User interface">user interface</a> architecture ('Human Interface Infrastructure' in UEFI). </p><p>In October 2018, Arm announced <a rel="nofollow" class="external text" href="https://developer.arm.com/architectures/platform-design/server-systems">Arm ServerReady</a>, a compliance certification program for landing the generic off-the-shelf operating systems and <a href="/wiki/Hypervisor" title="Hypervisor">hypervisors</a> on Arm-based servers. The program requires the system firmware to comply with Server Base Boot Requirements (SBBR). SBBR requires UEFI, <a href="/wiki/Advanced_Configuration_and_Power_Interface" class="mw-redirect" title="Advanced Configuration and Power Interface">ACPI</a> and <a href="/wiki/System_Management_BIOS" title="System Management BIOS">SMBIOS</a> compliance. In October 2020, Arm announced the extension of the program to the <a href="/wiki/Edge_computing" title="Edge computing">edge</a> and <a href="/wiki/Internet_of_things" title="Internet of things">IoT</a> market. The new program name is <a rel="nofollow" class="external text" href="https://developer.arm.com/architectures/system-architectures/arm-systemready">Arm SystemReady</a>. Arm SystemReady defined the Base Boot Requirements (<a rel="nofollow" class="external text" href="https://developer.arm.com/documentation/den0044/latest">BBR</a>) specification that currently provides three recipes, two of which are related to UEFI: 1) SBBR: which requires UEFI, ACPI and SMBIOS compliance suitable for enterprise level operating environments such as Windows, Red Hat Enterprise Linux, and VMware ESXi; and 2) EBBR: which requires compliance to a set of UEFI interfaces as defined in the Embedded Base Boot Requirements (<a rel="nofollow" class="external text" href="https://github.com/ARM-software/ebbr">EBBR</a>) suitable for embedded environments such as Yocto. Many Linux and BSD distros can support both recipes. </p><p>In December 2018, <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> announced Project Mu, a fork of TianoCore EDK II used in <a href="/wiki/Microsoft_Surface" title="Microsoft Surface">Microsoft Surface</a> and <a href="/wiki/Hyper-V" title="Hyper-V">Hyper-V</a> products. The project promotes the idea of <a href="/wiki/Firmware_as_a_service" class="mw-redirect" title="Firmware as a service">firmware as a service</a>.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p><p>The latest UEFI specification, version 2.10, was published in August 2022.<sup id="cite_ref-UEFISpec2.10_19-0" class="reference"><a href="#cite_note-UEFISpec2.10-19"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Advantages">Advantages</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=2" title="Edit section: Advantages"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The interface defined by the EFI specification includes data tables that contain platform information, and boot and runtime services that are available to the OS loader and OS. UEFI firmware provides several technical advantages over a BIOS:<sup id="cite_ref-UEFI2009Microsoft_20-0" class="reference"><a href="#cite_note-UEFI2009Microsoft-20"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p> <ul><li>Ability to boot a disk containing large partitions (over 2 <a href="/wiki/Terabyte" class="mw-redirect" title="Terabyte">TB</a>) with a <a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GUID Partition Table</a> (GPT)<sup id="cite_ref-grub-bios-installation_21-0" class="reference"><a href="#cite_note-grub-bios-installation-21"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-note1_22-0" class="reference"><a href="#cite_note-note1-22"><span class="cite-bracket">[</span>d<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Non-boot_GPT_disk_23-0" class="reference"><a href="#cite_note-Non-boot_GPT_disk-23"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup></li> <li>Flexible pre-OS environment, including network capability, GUI, multi language</li> <li>32-bit (for example <a href="/wiki/IA-32" title="IA-32">IA-32</a>, <a href="/wiki/ARM32" class="mw-redirect" title="ARM32">ARM32</a>) or 64-bit (for example <a href="/wiki/X64" class="mw-redirect" title="X64">x64</a>, <a href="/wiki/AArch64" title="AArch64">AArch64</a>) pre-OS environment</li> <li><a href="/wiki/C_(programming_language)" title="C (programming language)">C language</a> programming</li> <li>Python programming using <a rel="nofollow" class="external text" href="https://github.com/tianocore/edk2-libc/blob/master/AppPkg/Applications/Python/Python-3.6.8/Py368ReadMe.txt">Python interpreter for UEFI</a> shell</li> <li>Modular design</li> <li>Backward and forward compatibility</li></ul> <p>With UEFI, it is possible to store product keys for operating systems such as Windows, on the UEFI firmware of the device.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> UEFI is required for devices shipping with Windows 8<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> and above. </p><p>It is also possible for operating systems to access UEFI configuration data.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Compatibility">Compatibility</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=3" title="Edit section: Compatibility"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Processor_compatibility"><span class="anchor" id="HANDOVER"></span><span class="anchor" id="BOOT-STUB"></span>Processor compatibility</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=4" title="Edit section: Processor compatibility"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As of version 2.5, processor bindings exist for Itanium, x86, x86-64, <a href="/wiki/ARM_architecture_family" title="ARM architecture family">ARM</a> (AArch32) and <a href="/wiki/ARM64" class="mw-redirect" title="ARM64">ARM64</a> (AArch64).<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Only <a href="/wiki/Endianness" title="Endianness">little-endian</a> processors can be supported.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> Unofficial UEFI support is under development for POWERPC64 by implementing <a href="#Intel_EFI">TianoCore</a> on top of OPAL,<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> the OpenPOWER abstraction layer, running in little-endian mode.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> Similar projects exist for <a href="/wiki/MIPS_architecture" title="MIPS architecture">MIPS</a><sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/RISC-V" title="RISC-V">RISC-V</a>.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> As of UEFI 2.7, RISC-V processor bindings have been officially established for 32-, 64- and 128-bit modes.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> </p><p>Standard PC BIOS is limited to a 16-bit processor mode and 1 MB of addressable memory space, resulting from the design based on the <a href="/wiki/IBM_Personal_Computer" title="IBM Personal Computer">IBM 5150</a> that used a 16-bit <a href="/wiki/Intel_8088" title="Intel 8088">Intel 8088</a> processor.<sup id="cite_ref-EmulexUEFI_10-2" class="reference"><a href="#cite_note-EmulexUEFI-10"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-BitTechUEFI_37-0" class="reference"><a href="#cite_note-BitTechUEFI-37"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> In comparison, the processor mode in a UEFI environment can be either 32-bit (<a href="/wiki/IA-32" title="IA-32">IA-32</a>, AArch32) or 64-bit (<a href="/wiki/X86-64" title="X86-64">x86-64</a>, Itanium, and AArch64).<sup id="cite_ref-EmulexUEFI_10-3" class="reference"><a href="#cite_note-EmulexUEFI-10"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-AskBIOSGuyWhyUEFI_38-0" class="reference"><a href="#cite_note-AskBIOSGuyWhyUEFI-38"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> 64-bit UEFI firmware implementations support <a href="/wiki/Long_mode" title="Long mode">long mode</a>, which allows applications in the preboot environment to use 64-bit addressing to get direct access to all of the machine's memory.<sup id="cite_ref-WinHec2008UEFI_39-0" class="reference"><a href="#cite_note-WinHec2008UEFI-39"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p><p>UEFI requires the firmware and operating system loader (or kernel) to be size-matched; that is, a 64-bit UEFI firmware implementation can load only a 64-bit operating system (OS) boot loader or kernel (unless the CSM-based <i>legacy boot</i> is used) and the same applies to 32-bit. After the system transitions from <i>boot services</i> to <i>runtime services</i>, the operating system kernel takes over. At this point, the kernel can change processor modes if it desires, but this bars usage of the runtime services (unless the kernel switches back again).<sup id="cite_ref-uefi-spec-24_40-0" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup><sup class="reference nowrap"><span title="Page / location: sections 2.3.2 and 2.3.4">: sections 2.3.2 and 2.3.4 </span></sup> As of version 3.15, the <a href="/wiki/Linux_kernel" title="Linux kernel">Linux kernel</a> supports 64-bit kernels to be <a href="/wiki/Booting" title="Booting">booted</a> on 32-bit UEFI firmware implementations running on <a href="/wiki/X86-64" title="X86-64">x86-64</a> CPUs, with <i>UEFI handover</i> support from a UEFI boot loader as the requirement.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> UEFI handover protocol <a href="/wiki/Data_deduplication" title="Data deduplication">deduplicates</a> the UEFI initialization code between the kernel and UEFI boot loaders, leaving the initialization to be performed only by the Linux kernel's <i>UEFI boot stub</i>.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Disk_device_compatibility"><span class="anchor" id="DISKDEVCOMPAT"></span>Disk device compatibility</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=5" title="Edit section: Disk device compatibility"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/GUID_Partition_Table#OSSUPPORT" title="GUID Partition Table">GPT § Operating systems support</a>, and <a href="/wiki/Protective_MBR" class="mw-redirect" title="Protective MBR">Protective MBR</a></div> <p>In addition to the standard PC disk partition scheme that uses a <a href="/wiki/Master_boot_record" title="Master boot record">master boot record</a> (MBR), UEFI also works with the <a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GUID Partition Table</a> (GPT) partitioning scheme, which is free from many of the limitations of MBR. In particular, the MBR limits on the number and size of disk partitions (up to four <a href="/wiki/Primary_partition" class="mw-redirect" title="Primary partition">primary partitions</a> per disk, and up to 2 <a href="/wiki/Terabyte" class="mw-redirect" title="Terabyte">TB</a> <span class="nowrap">(2 × 2<sup>40</sup> <a href="/wiki/Byte" title="Byte">bytes</a>)</span> per disk) are relaxed.<sup id="cite_ref-UEFI_Drive_Partition_Limits_Fact_Sheet_44-0" class="reference"><a href="#cite_note-UEFI_Drive_Partition_Limits_Fact_Sheet-44"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> More specifically, GPT allows for a maximum disk and partition size of 8 <a href="/wiki/Zebibyte" class="mw-redirect" title="Zebibyte">ZiB</a> <span class="nowrap">(8 × 2<sup>70</sup> bytes)</span>.<sup id="cite_ref-UEFIDrivePartitionFAQ_45-0" class="reference"><a href="#cite_note-UEFIDrivePartitionFAQ-45"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-IBMLargeDrivesGPT_46-0" class="reference"><a href="#cite_note-IBMLargeDrivesGPT-46"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Linux">Linux</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=6" title="Edit section: Linux"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/EFI_System_partition#Linux" class="mw-redirect" title="EFI System partition">EFI System partition § Linux</a></div> <p>Support for GPT in <a href="/wiki/Linux" title="Linux">Linux</a> is enabled by turning on the option <code>CONFIG_EFI_PARTITION</code> (EFI GUID Partition Support) during kernel configuration.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> This option allows Linux to recognize and use GPT disks after the system firmware passes control over the system to Linux. </p><p>For reverse compatibility, Linux can use GPT disks in BIOS-based systems for both data storage and booting, as both <a href="/wiki/GRUB_2" class="mw-redirect" title="GRUB 2">GRUB 2</a> and Linux are GPT-aware. Such a setup is usually referred to as <i>BIOS-GPT</i>.<sup id="cite_ref-arch-grub_48-0" class="reference"><a href="#cite_note-arch-grub-48"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup> As GPT incorporates the protective MBR, a BIOS-based computer can boot from a GPT disk using a GPT-aware boot loader stored in the protective MBR's <a href="/wiki/Master_boot_record#Sector_layout" title="Master boot record">bootstrap code area</a>.<sup id="cite_ref-IBMLargeDrivesGPT_46-1" class="reference"><a href="#cite_note-IBMLargeDrivesGPT-46"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> In the case of GRUB, such a configuration requires a <a href="/wiki/BIOS_boot_partition" title="BIOS boot partition">BIOS boot partition</a> for GRUB to embed its second-stage code due to absence of the post-MBR gap in GPT partitioned disks (which is taken over by the GPT's <i>Primary Header</i> and <i>Primary Partition Table</i>). Commonly 1 <a href="/wiki/Megabyte" title="Megabyte">MB</a> in size, this partition's <a href="/wiki/Globally_Unique_Identifier" class="mw-redirect" title="Globally Unique Identifier">Globally Unique Identifier</a> (GUID) in GPT scheme is <style data-mw-deduplicate="TemplateStyles:r886049734">.mw-parser-output .monospaced{font-family:monospace,monospace}</style><span class="monospaced">21686148-6449-6E6F-744E-656564454649</span> and is used by GRUB only in BIOS-GPT setups. From GRUB's perspective, no such partition type exists in case of MBR partitioning. This partition is not required if the system is UEFI-based because no embedding of the second-stage code is needed in that case.<sup id="cite_ref-grub-bios-installation_21-1" class="reference"><a href="#cite_note-grub-bios-installation-21"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-IBMLargeDrivesGPT_46-2" class="reference"><a href="#cite_note-IBMLargeDrivesGPT-46"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-arch-grub_48-1" class="reference"><a href="#cite_note-arch-grub-48"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p><p>UEFI systems can access GPT disks and boot directly from them, which allows Linux to use UEFI boot methods. Booting Linux from GPT disks on UEFI systems involves creation of an <a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a> (ESP), which contains UEFI applications such as bootloaders, operating system kernels, and utility software.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-arch-uefi-loaders_51-0" class="reference"><a href="#cite_note-arch-uefi-loaders-51"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup> Such a setup is usually referred to as <i>UEFI-GPT</i>, while ESP is recommended to be at least 512 MB in size and formatted with a FAT32 filesystem for maximum compatibility.<sup id="cite_ref-IBMLargeDrivesGPT_46-3" class="reference"><a href="#cite_note-IBMLargeDrivesGPT-46"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-arch-grub_48-2" class="reference"><a href="#cite_note-arch-grub-48"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-arch-uefi_52-0" class="reference"><a href="#cite_note-arch-uefi-52"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup> </p><p>For <a href="/wiki/Backward_compatibility" title="Backward compatibility">backward compatibility</a>, some UEFI implementations also support booting from MBR-partitioned disks through the Compatibility Support Module (CSM) that provides legacy BIOS compatibility.<sup id="cite_ref-arch-forum-uefi-mbr_53-0" class="reference"><a href="#cite_note-arch-forum-uefi-mbr-53"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> In that case, booting Linux on UEFI systems is the same as on legacy BIOS-based systems. </p> <div class="mw-heading mw-heading4"><h4 id="Microsoft_Windows">Microsoft Windows</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=7" title="Edit section: Microsoft Windows"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some of the EFI's practices and data formats mirror those of <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Microsoft Windows</a>.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Matthew_Garrett_55-0" class="reference"><a href="#cite_note-Matthew_Garrett-55"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> </p><p>The 64-bit versions of <a href="/wiki/Windows_Vista" title="Windows Vista">Windows Vista</a> SP1 and later and 64-bit versions of <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a>, <a href="/wiki/Windows_8.1" title="Windows 8.1">8.1</a>, <a href="/wiki/Windows_10" title="Windows 10">10</a>, and <a href="/wiki/Windows_11" title="Windows 11">11</a> can boot from a GPT disk that is larger than 2 <a href="/wiki/Terabyte" class="mw-redirect" title="Terabyte">TB</a>. </p> <div class="mw-heading mw-heading2"><h2 id="Features">Features</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=8" title="Edit section: Features"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Services"><span class="anchor" id="GOP"></span><span class="anchor" id="MM"></span><span class="anchor" id="VARIABLE"></span><span class="anchor" id="TIME"></span>Services</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=9" title="Edit section: Services"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:UEFI_variables_on_Linux_screenshot.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/ba/UEFI_variables_on_Linux_screenshot.png/330px-UEFI_variables_on_Linux_screenshot.png" decoding="async" width="330" height="489" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/b/ba/UEFI_variables_on_Linux_screenshot.png 1.5x" data-file-width="478" data-file-height="708" /></a><figcaption>Example of UEFI variables</figcaption></figure> <p>EFI defines two types of services: <i>boot services</i> and <i>runtime services</i>. Boot services are available only while the firmware owns the platform (i.e., before the <code>ExitBootServices()</code> call), and they include text and graphical consoles on various devices, and bus, block and file services. Runtime services are still accessible while the operating system is running; they include services such as date, time and <a href="/wiki/Non-volatile_random-access_memory" title="Non-volatile random-access memory">NVRAM</a> access. </p> <dl><dt>Graphics Output Protocol (GOP) services</dt> <dd>The <i>Graphics Output Protocol</i> (GOP) provides runtime services; see also <a href="#Graphics_features">Graphics features</a> section below. The operating system is permitted to directly write to the framebuffer provided by GOP during runtime mode.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup></dd></dl> <dl><dt>UEFI <a href="/wiki/Memory_map" title="Memory map">Memory map</a> services</dt></dl> <dl><dt><a href="/wiki/System_Management_Mode" title="System Management Mode">SMM</a> services</dt></dl> <dl><dt><a href="/wiki/ACPI" title="ACPI">ACPI</a> services</dt></dl> <dl><dt><a href="/wiki/System_Management_BIOS" title="System Management BIOS">SMBIOS</a> services</dt></dl> <dl><dt><a href="/wiki/Devicetree" title="Devicetree">Devicetree</a> services (for RISC processors)</dt></dl> <dl><dt>Variable services</dt> <dd>UEFI variables provide a way to store data, in particular non-volatile data. Some UEFI variables are shared between platform firmware and operating systems. Variable namespaces are identified by GUIDs, and variables are key/value pairs. For example, UEFI variables can be used to keep crash messages in <a href="/wiki/NVRAM" class="mw-redirect" title="NVRAM">NVRAM</a> after a crash for the operating system to retrieve after a reboot.<sup id="cite_ref-theh-brickwindows_57-0" class="reference"><a href="#cite_note-theh-brickwindows-57"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup></dd></dl> <dl><dt>Time services</dt> <dd>UEFI provides time services. Time services include support for time zone and daylight saving fields, which allow the hardware <a href="/wiki/Real-time_clock" title="Real-time clock">real-time clock</a> to be set to local time or UTC.<sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> On machines using a PC-AT real-time clock, by default the hardware clock still has to be set to local time for compatibility with BIOS-based Windows,<sup id="cite_ref-Matthew_Garrett_55-1" class="reference"><a href="#cite_note-Matthew_Garrett-55"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> unless using recent versions and an entry in the <a href="/wiki/Windows_registry" class="mw-redirect" title="Windows registry">Windows registry</a> is set to indicate the use of UTC.</dd></dl> <div class="mw-heading mw-heading3"><h3 id="Applications"><span class="anchor" id="APPLICATIONS"></span>Applications</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=10" title="Edit section: Applications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Efi_flowchart_extended.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Efi_flowchart_extended.svg/420px-Efi_flowchart_extended.svg.png" decoding="async" width="420" height="394" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Efi_flowchart_extended.svg/630px-Efi_flowchart_extended.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Efi_flowchart_extended.svg/840px-Efi_flowchart_extended.svg.png 2x" data-file-width="557" data-file-height="522" /></a><figcaption>Interaction between the EFI boot manager and EFI drivers</figcaption></figure> <p>Beyond loading an OS, UEFI can run <i>UEFI applications</i>, which reside as files on the <a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a>. They can be executed from the UEFI Shell, by the firmware's <a href="#BOOT-MANAGER">boot manager</a>, or by other UEFI applications. <i>UEFI applications</i> can be developed and installed independently of the <a href="/wiki/Original_equipment_manufacturer" title="Original equipment manufacturer">original equipment manufacturers</a> (OEMs). </p><p>A type of UEFI application is an OS boot loader such as <a href="/wiki/GRUB" class="mw-redirect" title="GRUB">GRUB</a>, <a href="/wiki/REFInd" title="REFInd">rEFInd</a>, <a href="/wiki/Gummiboot_(software)" class="mw-redirect" title="Gummiboot (software)">Gummiboot</a>, and <a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a>, which loads some OS files into memory and executes them. Also, an OS boot loader can provide a user interface to allow the selection of another UEFI application to run. Utilities like the UEFI Shell are also UEFI applications. </p> <div class="mw-heading mw-heading3"><h3 id="Protocols">Protocols</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=11" title="Edit section: Protocols"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>EFI defines protocols as a set of software interfaces used for communication between two binary modules. All EFI drivers must provide services to others via protocols. The EFI Protocols are similar to the <a href="/wiki/BIOS_interrupt_calls" class="mw-redirect" title="BIOS interrupt calls">BIOS interrupt calls</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Device_drivers"><span class="anchor" id="EBC"></span>Device drivers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=12" title="Edit section: Device drivers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In addition to standard <a href="/wiki/Instruction_set_architecture" title="Instruction set architecture">instruction set architecture</a>-specific device drivers, EFI provides for a ISA-independent <a href="/wiki/Device_driver" title="Device driver">device driver</a> stored in <a href="/wiki/Non-volatile_memory" title="Non-volatile memory">non-volatile memory</a> as <i>EFI byte code</i> or <i>EBC</i>. System firmware has an interpreter for EBC images. In that sense, EBC is analogous to <a href="/wiki/Open_Firmware" title="Open Firmware">Open Firmware</a>, the ISA-independent firmware used in <a href="/wiki/PowerPC" title="PowerPC">PowerPC</a>-based <a href="/wiki/Apple_Macintosh" class="mw-redirect" title="Apple Macintosh">Apple Macintosh</a> and <a href="/wiki/Sun_Microsystems" title="Sun Microsystems">Sun Microsystems</a> <a href="/wiki/SPARC" title="SPARC">SPARC</a> computers, among others. </p><p>Some architecture-specific (non-EFI Byte Code) EFI drivers for some device types can have interfaces for use by the OS. This allows the OS to rely on EFI for drivers to perform basic graphics and network functions before, and if, operating-system-specific drivers are loaded. </p><p>In other cases, the EFI driver can be filesystem drivers that allow for booting from other types of disk volumes. Examples include <i>efifs</i> for 37 file systems (based on <a href="/wiki/GRUB2" class="mw-redirect" title="GRUB2">GRUB2</a> code),<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> used by <a href="/wiki/Rufus_(software)" title="Rufus (software)">Rufus</a> for chain-loading NTFS ESPs.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Graphics_features">Graphics features</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=13" title="Edit section: Graphics features"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The EFI 1.0 specification defined a UGA (Universal Graphic Adapter) protocol as a way to support graphics features. UEFI did not include UGA and replaced it with <a href="/wiki/Graphics_Output_Protocol" class="mw-redirect" title="Graphics Output Protocol">GOP (Graphics Output Protocol)</a>.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> </p><p>UEFI 2.1 defined a "Human Interface Infrastructure" (HII) to manage user input, localized strings, fonts, and forms (in the <a href="/wiki/HTML" title="HTML">HTML</a> sense). These enable <a href="/wiki/Original_equipment_manufacturer" title="Original equipment manufacturer">original equipment manufacturers</a> (OEMs) or <a href="/wiki/Independent_BIOS_vendor" class="mw-redirect" title="Independent BIOS vendor">independent BIOS vendors</a> (IBVs) to design graphical interfaces for pre-boot configuration. UEFI uses <a href="/wiki/UTF-16" title="UTF-16">UTF-16</a> to encode strings by default. </p><p>Most early UEFI firmware implementations were console-based. Today many UEFI firmware implementations are GUI-based. </p> <div class="mw-heading mw-heading3"><h3 id="EFI_system_partition">EFI system partition</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=14" title="Edit section: EFI system partition"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a></div> <p>An EFI system partition, often abbreviated to ESP, is a <a href="/wiki/Data_storage_device" class="mw-redirect" title="Data storage device">data storage device</a> partition that is used in computers adhering to the UEFI specification. Accessed by the UEFI firmware when a computer is powered up, it stores UEFI applications and the files these applications need to run, including operating system <a href="/wiki/Boot_loader" class="mw-redirect" title="Boot loader">boot loaders</a>. Supported <a href="/wiki/Partition_table" class="mw-redirect" title="Partition table">partition table</a> schemes include <a href="/wiki/Master_boot_record" title="Master boot record">MBR</a> and <a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GPT</a>, as well as <a href="/wiki/El_Torito_(CD-ROM_standard)" class="mw-redirect" title="El Torito (CD-ROM standard)">El Torito</a> volumes on optical discs.<sup id="cite_ref-uefi-spec-24_40-1" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup><sup class="reference nowrap"><span title="Page / location: section 2.6.2">: section 2.6.2 </span></sup> For use on ESPs, UEFI defines a specific version of the <a href="/wiki/FAT_file_system" class="mw-redirect" title="FAT file system">FAT file system</a>, which is maintained as part of the UEFI specification and independently from the original FAT specification, encompassing the <a href="/wiki/FAT32" class="mw-redirect" title="FAT32">FAT32</a>, <a href="/wiki/FAT16" class="mw-redirect" title="FAT16">FAT16</a> and <a href="/wiki/FAT12" class="mw-redirect" title="FAT12">FAT12</a> file systems.<sup id="cite_ref-uefi-spec-24_40-2" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup><sup class="reference nowrap"><span title="Page / location: section 12.3">: section 12.3 </span></sup><sup id="cite_ref-uefi-spec-2.5_62-0" class="reference"><a href="#cite_note-uefi-spec-2.5-62"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> The ESP also provides space for a boot sector as part of the backward BIOS compatibility.<sup id="cite_ref-arch-forum-uefi-mbr_53-1" class="reference"><a href="#cite_note-arch-forum-uefi-mbr-53"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Booting">Booting</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=15" title="Edit section: Booting"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading4"><h4 id="UEFI_booting"><span class="anchor" id="UEFIBOOT"></span><span class="anchor" id="BOOT-MANAGER"></span>UEFI booting</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=16" title="Edit section: UEFI booting"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Unlike the legacy PC BIOS, UEFI does not rely on <a href="/wiki/Boot_sector" title="Boot sector">boot sectors</a>, defining instead a boot manager as part of the UEFI specification. When a computer is powered on, the boot manager checks the boot configuration and, based on its settings, then executes the specified OS <a href="/wiki/Boot_loader" class="mw-redirect" title="Boot loader">boot loader</a> or <a href="/wiki/Operating_system_kernel" class="mw-redirect" title="Operating system kernel">operating system kernel</a> (usually boot loader<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup>). The boot configuration is defined by variables stored in <a href="/wiki/NVRAM" class="mw-redirect" title="NVRAM">NVRAM</a>, including variables that indicate the file system paths to OS loaders or OS kernels. </p><p>OS boot loaders can be automatically detected by UEFI, which enables easy <a href="/wiki/Booting" title="Booting">booting</a> from removable devices such as <a href="/wiki/USB_flash_drive" title="USB flash drive">USB flash drives</a>. This automated detection relies on standardized file paths to the OS boot loader, with the path varying depending on the <a href="/wiki/Computer_architecture" title="Computer architecture">computer architecture</a>. The format of the file path is defined as <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734"><span class="monospaced"><EFI_SYSTEM_PARTITION>\EFI\BOOT\BOOT<MACHINE_TYPE_SHORT_NAME>.EFI</span>; for example, the file path to the OS loader on an <a href="/wiki/X86-64" title="X86-64">x86-64</a> system is <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734"><span class="monospaced">\efi\boot\bootx64.efi</span>,<sup id="cite_ref-uefi-spec-24_40-3" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> and <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734"><span class="monospaced">\efi\boot\bootaa64.efi</span> on ARM64 architecture. </p> <figure typeof="mw:File/Thumb"><a href="/wiki/File:UEFI_boot_process.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/17/UEFI_boot_process.png/541px-UEFI_boot_process.png" decoding="async" width="541" height="117" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/17/UEFI_boot_process.png/812px-UEFI_boot_process.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/17/UEFI_boot_process.png/1082px-UEFI_boot_process.png 2x" data-file-width="6394" data-file-height="1380" /></a><figcaption>Boot process</figcaption></figure> <p>Booting UEFI systems from GPT-partitioned disks is commonly called <i>UEFI-GPT booting</i>. Despite the fact that the UEFI specification requires MBR partition tables to be fully supported,<sup id="cite_ref-uefi-spec-24_40-4" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> some UEFI firmware implementations immediately switch to the BIOS-based CSM booting depending on the type of boot disk's partition table, effectively preventing UEFI booting to be performed from <a href="/wiki/EFI_System_Partition" class="mw-redirect" title="EFI System Partition">EFI System Partition</a> on MBR-partitioned disks.<sup id="cite_ref-arch-forum-uefi-mbr_53-2" class="reference"><a href="#cite_note-arch-forum-uefi-mbr-53"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> Such a boot scheme is commonly called <i>UEFI-MBR</i>. </p><p>It is also common for a boot manager to have a textual user interface so the user can select the desired OS (or setup utility) from a list of available boot options. </p> <div class="mw-heading mw-heading4"><h4 id="CSM_booting"><span class="anchor" id="CSMBOOT"></span>CSM booting</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=17" title="Edit section: CSM booting"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>To ensure backward compatibility, UEFI firmware implementations on PC-class machines could support booting in legacy BIOS mode from MBR-partitioned disks through the <i>Compatibility Support Module (CSM)</i> that provides legacy BIOS compatibility. In this scenario, booting is performed in the same way as on legacy BIOS-based systems, by ignoring the partition table and relying on the content of a <a href="/wiki/Boot_sector" title="Boot sector">boot sector</a>.<sup id="cite_ref-arch-forum-uefi-mbr_53-3" class="reference"><a href="#cite_note-arch-forum-uefi-mbr-53"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> </p><p>BIOS-style booting from MBR-partitioned disks is commonly called <i>BIOS-MBR</i>, regardless of it being performed on UEFI or legacy BIOS-based systems. Furthermore, booting legacy BIOS-based systems from GPT disks is also possible, and such a boot scheme is commonly called <i>BIOS-GPT</i>. </p><p>The <i>Compatibility Support Module</i> allows legacy operating systems and some legacy <a href="/wiki/Option_ROM" title="Option ROM">option ROMs</a> that do not support UEFI to still be used.<sup id="cite_ref-intel-csm-r097_66-0" class="reference"><a href="#cite_note-intel-csm-r097-66"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> It also provides required legacy <a href="/wiki/System_Management_Mode" title="System Management Mode">System Management Mode</a> (SMM) functionality, called <i>CompatibilitySmm</i>, as an addition to features provided by the UEFI SMM. An example of such a legacy SMM functionality is providing USB legacy support for keyboard and mouse, by emulating their classic <a href="/wiki/PS/2_connector" class="mw-redirect" title="PS/2 connector">PS/2</a> counterparts.<sup id="cite_ref-intel-csm-r097_66-1" class="reference"><a href="#cite_note-intel-csm-r097-66"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> </p><p>In November 2017, Intel announced that it planned to phase out support CSM for client platforms by 2020.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> </p><p>In July, of 2022, Kaspersky Labs published information regarding a Rootkit designed to chain boot malicious code on machines using Intel's H81 chipset and the Compatibility Support module of affected motherboards.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup> </p><p>In August 2023, Intel announced that it planned to phase out support CSM for server platforms by 2024.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup> </p><p>As of today,<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items" title="Wikipedia:Manual of Style/Dates and numbers"><span title="The time period mentioned near this tag is ambiguous. (October 2024)">when?</span></a></i>]</sup> all computers based on Intel platforms no longer have CSM support.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (October 2024)">citation needed</span></a></i>]</sup> </p> <div class="mw-heading mw-heading4"><h4 id="Network_booting">Network booting</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=18" title="Edit section: Network booting"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The UEFI specification includes support for booting over network via the <a href="/wiki/Preboot_eXecution_Environment" class="mw-redirect" title="Preboot eXecution Environment">Preboot eXecution Environment</a> (PXE). PXE booting <a href="/wiki/Network_protocol" class="mw-redirect" title="Network protocol">network protocols</a> include <a href="/wiki/Internet_Protocol" title="Internet Protocol">Internet Protocol</a> (<a href="/wiki/IPv4" title="IPv4">IPv4</a> and <a href="/wiki/IPv6" title="IPv6">IPv6</a>), <a href="/wiki/User_Datagram_Protocol" title="User Datagram Protocol">User Datagram Protocol</a> (UDP), <a href="/wiki/Dynamic_Host_Configuration_Protocol" title="Dynamic Host Configuration Protocol">Dynamic Host Configuration Protocol</a> (DHCP), <a href="/wiki/Trivial_File_Transfer_Protocol" title="Trivial File Transfer Protocol">Trivial File Transfer Protocol</a> (TFTP) and <a href="/wiki/ISCSI" title="ISCSI">iSCSI</a>.<sup id="cite_ref-uefi-spec-24_40-5" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup> </p><p>OS images can be remotely stored on <a href="/wiki/Storage_area_network" title="Storage area network">storage area networks</a> (SANs), with <a href="/wiki/ISCSI" title="ISCSI">Internet Small Computer System Interface</a> (iSCSI) and <a href="/wiki/Fibre_Channel_over_Ethernet" title="Fibre Channel over Ethernet">Fibre Channel over Ethernet</a> (FCoE) as supported protocols for accessing the SANs.<sup id="cite_ref-uefi-spec-24_40-6" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> </p><p>Version 2.5 of the UEFI specification adds support for accessing boot images over <a href="/wiki/HTTP" title="HTTP">HTTP</a>.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Secure_Boot"><span class="anchor" id="SECURE-BOOT"></span>Secure Boot</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=19" title="Edit section: Secure Boot"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="#Secure_Boot_criticism">Secure Boot criticism</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:REFInd_0.13.2_about_menu_screenshot.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/ad/REFInd_0.13.2_about_menu_screenshot.png/310px-REFInd_0.13.2_about_menu_screenshot.png" decoding="async" width="310" height="249" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/ad/REFInd_0.13.2_about_menu_screenshot.png/465px-REFInd_0.13.2_about_menu_screenshot.png 1.5x, //upload.wikimedia.org/wikipedia/commons/a/ad/REFInd_0.13.2_about_menu_screenshot.png 2x" data-file-width="512" data-file-height="411" /></a><figcaption>Example of an active Secure Boot as detected by <a href="/wiki/REFInd" title="REFInd">rEFInd</a> boot manager</figcaption></figure> <p>The UEFI specification defines a protocol known as <i>Secure Boot</i>, which can secure the boot process by preventing the loading of UEFI drivers or OS boot loaders that are not <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">signed</a> with an acceptable <a href="/wiki/Digital_signature" title="Digital signature">digital signature</a>. The mechanical details of how precisely these drivers are to be signed are not specified.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> When Secure Boot is enabled, it is initially placed in "setup" mode, which allows a public key known as the "platform key" (PK) to be written to the firmware. Once the key is written, Secure Boot enters "User" mode, where only UEFI drivers and OS boot loaders signed with the platform key can be loaded by the firmware. Additional "key exchange keys" (KEK) can be added to a database stored in memory to allow other certificates to be used, but they must still have a connection to the private portion of the platform key.<sup id="cite_ref-uefi-secureboot_75-0" class="reference"><a href="#cite_note-uefi-secureboot-75"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> Secure Boot can also be placed in "Custom" mode, where additional public keys can be added to the system that do not match the private key.<sup id="cite_ref-pcw-ueficontroversy_76-0" class="reference"><a href="#cite_note-pcw-ueficontroversy-76"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p><p>Secure Boot is supported by <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a> and <a href="/wiki/Windows_8.1" title="Windows 8.1">8.1</a>, <a href="/wiki/Windows_Server_2012" title="Windows Server 2012">Windows Server 2012</a> and 2012 R2, <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a>, <a href="/wiki/Windows_Server_2016" title="Windows Server 2016">Windows Server 2016</a>, <a href="/wiki/Windows_Server_2019" title="Windows Server 2019">2019</a>, and <a href="/wiki/Windows_Server_2022" title="Windows Server 2022">2022</a>, and <a href="/wiki/Windows_11" title="Windows 11">Windows 11</a>, VMware vSphere 6.5<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> and a number of <a href="/wiki/Linux_distribution" title="Linux distribution">Linux distributions</a> including <a href="/wiki/Fedora_(operating_system)" class="mw-redirect" title="Fedora (operating system)">Fedora</a> (since version 18), <a href="/wiki/OpenSUSE" title="OpenSUSE">openSUSE</a> (since version 12.3), RHEL (since version 7), CentOS (since version 7<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup>), Debian (since version 10),<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Ubuntu_(operating_system)" class="mw-redirect" title="Ubuntu (operating system)">Ubuntu</a> (since version 12.04.2), <a href="/wiki/Linux_Mint" title="Linux Mint">Linux Mint</a> (since version 21.3).,<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/AlmaLinux" title="AlmaLinux">AlmaLinux OS</a> (since version 8.4<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup>). As of January 2024<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=UEFI&action=edit">[update]</a></sup>, <a href="/wiki/FreeBSD" title="FreeBSD">FreeBSD</a> support is in a planning stage.<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="UEFI_shell"><span class="anchor" id="SHELL"></span>UEFI shell</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=20" title="Edit section: UEFI shell"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:UEFI_shell_2.2_screenshot.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/59/UEFI_shell_2.2_screenshot.png/310px-UEFI_shell_2.2_screenshot.png" decoding="async" width="310" height="164" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/59/UEFI_shell_2.2_screenshot.png/465px-UEFI_shell_2.2_screenshot.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/59/UEFI_shell_2.2_screenshot.png/620px-UEFI_shell_2.2_screenshot.png 2x" data-file-width="652" data-file-height="344" /></a><figcaption>Example of an UEFI shell 2.2 session</figcaption></figure> <p>UEFI provides a <a href="/wiki/Shell_(computing)" title="Shell (computing)">shell environment</a>, which can be used to execute other UEFI applications, including UEFI <a href="/wiki/Boot_loader" class="mw-redirect" title="Boot loader">boot loaders</a>.<sup id="cite_ref-arch-uefi-loaders_51-1" class="reference"><a href="#cite_note-arch-uefi-loaders-51"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> Apart from that, commands available in the UEFI shell can be used for obtaining various other information about the system or the firmware, including getting the memory map (<code>memmap</code>), modifying boot manager variables (<code>bcfg</code>), running partitioning programs (<code>diskpart</code>), loading UEFI drivers, and editing text files (<code>edit</code>).<sup id="cite_ref-arch-uefi-shell_84-0" class="reference"><a href="#cite_note-arch-uefi-shell-84"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup><sup id="cite_ref-EFI-Shells-and-Scripting_85-0" class="reference"><a href="#cite_note-EFI-Shells-and-Scripting-85"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-uefi-shell-spec-2_86-0" class="reference"><a href="#cite_note-uefi-shell-spec-2-86"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> </p><p>Source code for a UEFI shell can be downloaded from the <a href="/wiki/Intel" title="Intel">Intel</a>'s <a href="#Intel_EFI">TianoCore</a> UDK/EDK2 project.<sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> A pre-built ShellBinPkg is also available.<sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> Shell v2 works best in UEFI 2.3+ systems and is recommended over Shell v1 in those systems. Shell v1 should work in all UEFI systems.<sup id="cite_ref-arch-uefi-shell_84-1" class="reference"><a href="#cite_note-arch-uefi-shell-84"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> </p><p>Methods used for launching UEFI shell depend on the manufacturer and model of the system <a href="/wiki/Motherboard" title="Motherboard">motherboard</a>. Some of them already provide a direct option in firmware setup for launching, e.g. compiled x86-64 version of the shell needs to be made available as <code><EFI_SYSTEM_PARTITION>/SHELLX64.EFI</code>. Some other systems have an already embedded UEFI shell which can be launched by appropriate key press combinations.<sup id="cite_ref-arch-uefi-shell-launching_91-0" class="reference"><a href="#cite_note-arch-uefi-shell-launching-91"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup><sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup> For other systems, the solution is either creating an appropriate USB flash drive or adding manually (<code>bcfg</code>) a boot option associated with the compiled version of shell.<sup id="cite_ref-uefi-shell-spec-2_86-1" class="reference"><a href="#cite_note-uefi-shell-spec-2-86"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-arch-uefi-shell-launching_91-1" class="reference"><a href="#cite_note-arch-uefi-shell-launching-91"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup><sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (September 2013)">unreliable source?</span></a></i>]</sup> </p> <div class="mw-heading mw-heading4"><h4 id="Commands">Commands</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=21" title="Edit section: Commands"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The following is a list of <a href="/wiki/Command_(computing)" title="Command (computing)">commands</a> supported by the EFI shell.<sup id="cite_ref-EFI-Shells-and-Scripting_85-1" class="reference"><a href="#cite_note-EFI-Shells-and-Scripting-85"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> </p> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 9em;"> <ul><li><a href="/wiki/Alias_(EFI_command)" class="mw-redirect" title="Alias (EFI command)">alias</a></li> <li><a href="/wiki/Attrib_(EFI_command)" class="mw-redirect" title="Attrib (EFI command)">attrib</a></li> <li>bcfg</li> <li><a href="/wiki/Cd_(EFI_command)" class="mw-redirect" title="Cd (EFI command)">cd</a></li> <li><a href="/wiki/Cls_(EFI_command)" class="mw-redirect" title="Cls (EFI command)">cls</a></li> <li><a href="/wiki/Comp_(EFI_command)" class="mw-redirect" title="Comp (EFI command)">comp</a></li> <li><a href="/wiki/Cp_(EFI_command)" class="mw-redirect" title="Cp (EFI command)">cp</a></li> <li><a href="/wiki/Date_(EFI_command)" class="mw-redirect" title="Date (EFI command)">date</a></li> <li>dblk</li> <li>dh</li> <li>dmpstore</li> <li><a href="/wiki/Echo_(EFI_command)" class="mw-redirect" title="Echo (EFI command)">echo</a></li> <li>Edd30</li> <li>EddDebug</li> <li>edit</li> <li>err</li> <li>guid</li> <li><a href="/wiki/Help_(EFI_command)" class="mw-redirect" title="Help (EFI command)">help</a></li> <li>load</li> <li><a href="/wiki/Ls_(EFI_command)" class="mw-redirect" title="Ls (EFI command)">ls</a></li> <li>map</li> <li>mem</li> <li>memmap</li> <li><a href="/wiki/Mkdir_(EFI_command)" class="mw-redirect" title="Mkdir (EFI command)">mkdir</a></li> <li>mm</li> <li>mode</li> <li><a href="/wiki/Mount_(EFI_command)" class="mw-redirect" title="Mount (EFI command)">mount</a></li> <li>pause</li> <li>pci</li> <li>reset</li> <li><a href="/wiki/Rm_(EFI_command)" class="mw-redirect" title="Rm (EFI command)">rm</a></li> <li>set</li> <li>stall</li> <li><a href="/wiki/Time_(EFI_command)" class="mw-redirect" title="Time (EFI command)">time</a></li> <li><a href="/wiki/Type_(EFI_command)" class="mw-redirect" title="Type (EFI command)">type</a></li> <li>unload</li> <li><a href="/wiki/Ver_(EFI_command)" class="mw-redirect" title="Ver (EFI command)">ver</a></li> <li><a href="/wiki/Vol_(EFI_command)" class="mw-redirect" title="Vol (EFI command)">vol</a></li></ul> </div> <div class="mw-heading mw-heading3"><h3 id="Extensions">Extensions</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=22" title="Edit section: Extensions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Extensions to UEFI can be loaded from virtually any <a href="/wiki/Non-volatile_memory" title="Non-volatile memory">non-volatile</a> storage device attached to the computer. For example, an <a href="/wiki/Original_equipment_manufacturer" title="Original equipment manufacturer">original equipment manufacturer</a> (OEM) can distribute systems with an <a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a> on the hard drive, which would add additional functions to the standard UEFI firmware stored on the motherboard's <a href="/wiki/Read-only_memory" title="Read-only memory">ROM</a>. </p> <div class="mw-heading mw-heading3"><h3 id="UEFI_Capsule">UEFI Capsule</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=23" title="Edit section: UEFI Capsule"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>UEFI Capsule defines a Firmware-to-OS firmware update interface, marketed as modern and secure.<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a>, <a href="/wiki/Windows_8.1" title="Windows 8.1">Windows 8.1</a>, <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a>,<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Fwupd" title="Fwupd">Fwupd</a> for Linux each support the UEFI Capsule. </p> <div class="mw-heading mw-heading3"><h3 id="Hardware">Hardware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=24" title="Edit section: Hardware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Like <a href="/wiki/BIOS" title="BIOS">BIOS</a>, UEFI initializes and tests system hardware components (e.g. memory training, PCIe link training, USB link training on typical x86 systems), and then loads the <a href="/wiki/Boot_loader" class="mw-redirect" title="Boot loader">boot loader</a> from a <a href="/wiki/Mass_storage_device" class="mw-redirect" title="Mass storage device">mass storage device</a> or through a <a href="/wiki/Network_booting" title="Network booting">network connection</a>. In <a href="/wiki/X86" title="X86">x86</a> systems, the UEFI firmware is usually stored in the <a href="/wiki/NOR_flash" class="mw-redirect" title="NOR flash">NOR flash</a> chip of the motherboard.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup> In some ARM-based Android devices, the UEFI boot loader is stored in the <a href="/wiki/EUFS" class="mw-redirect" title="EUFS">eUFS</a> flash memory. </p> <div class="mw-heading mw-heading2"><h2 id="Classes">Classes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=25" title="Edit section: Classes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>UEFI machines can have one of the following classes, which were used to help ease the transition to UEFI:<sup id="cite_ref-99" class="reference"><a href="#cite_note-99"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup> </p> <ul><li>Class 0: Legacy BIOS</li> <li>Class 1: UEFI with a CSM interface and no external UEFI interface. The only UEFI interfaces are internal to the firmware.</li> <li>Class 2: UEFI with CSM and external UEFI interfaces, eg. UEFI Boot.</li> <li>Class 3: UEFI without a CSM interface and with an external UEFI interface.</li> <li>Class 3+: UEFI class 3 that has Secure Boot enabled.<sup id="cite_ref-100" class="reference"><a href="#cite_note-100"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup></li></ul> <p>Starting from the 10th Gen Intel Core, Intel no longer provides Legacy <a href="/wiki/Video_BIOS" title="Video BIOS">Video BIOS</a> for the iGPU (<a href="/wiki/Intel_Graphics_Technology" title="Intel Graphics Technology">Intel Graphics Technology</a>). Legacy boot with those CPUs requires a Legacy Video BIOS, which can still be provided by a video card.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (December 2021)">citation needed</span></a></i>]</sup> </p> <div class="mw-heading mw-heading2"><h2 id="Boot_stages">Boot stages</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=26" title="Edit section: Boot stages"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="SEC_–_Security_Phase"><span id="SEC_.E2.80.93_Security_Phase"></span>SEC – Security Phase</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=27" title="Edit section: SEC – Security Phase"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>This is the first stage of the UEFI boot but may have platform specific binary code that precedes it. (e.g., <a href="/wiki/Intel_ME" class="mw-redirect" title="Intel ME">Intel ME</a>, <a href="/wiki/AMD_PSP" class="mw-redirect" title="AMD PSP">AMD PSP</a>, CPU <a href="/wiki/Microcode" title="Microcode">microcode</a>). It consists of minimal code written in <a href="/wiki/Assembly_language" title="Assembly language">assembly language</a> for the specific architecture. It initializes a temporary memory (often CPU cache-as-RAM (CAR), or SoC on-chip SRAM) and serves as the system's software root of trust with the option of verifying PEI before hand-off. </p> <div class="mw-heading mw-heading3"><h3 id="PEI_–_Pre-EFI_Initialization"><span id="PEI_.E2.80.93_Pre-EFI_Initialization"></span>PEI – Pre-EFI Initialization</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=28" title="Edit section: PEI – Pre-EFI Initialization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The second stage of UEFI boot consists of a dependency-aware dispatcher that loads and runs PEI modules (PEIMs) to handle early hardware initialization tasks such as <a href="/wiki/Main_memory" class="mw-redirect" title="Main memory">main memory</a> initialization (initialize <a href="/wiki/Memory_controller" title="Memory controller">memory controller</a> and <a href="/wiki/DRAM" class="mw-redirect" title="DRAM">DRAM</a>) and firmware recovery operations. Additionally, it is responsible for discovery of the current boot mode and handling many ACPI S3 operations. In the case of ACPI S3 resume, it is responsible for restoring many hardware registers to a pre-sleep state. PEI also uses CAR. Initialization at this stage involves creating data structures in memory and establishing default values within these structures.<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="DXE_–_Driver_Execution_Environment"><span id="DXE_.E2.80.93_Driver_Execution_Environment"></span>DXE – Driver Execution Environment</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=29" title="Edit section: DXE – Driver Execution Environment"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>This stage consist of C modules and a dependency-aware dispatcher. With main memory now available, CPU, chipset, mainboard and other I/O devices are initialized in DXE and BDS. Initialization at this stage involves assigning EFI device paths to the hardware connected to the motherboard, and transferring configuration data to the hardware.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="BDS_–_Boot_Device_Select"><span id="BDS_.E2.80.93_Boot_Device_Select"></span>BDS – Boot Device Select</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=30" title="Edit section: BDS – Boot Device Select"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>BDS is a part of the DXE.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> In this stage, boot devices are initialized, UEFI drivers or <a href="/wiki/Option_ROM" title="Option ROM">Option ROMs</a> of PCI devices are executed according to system configuration, and boot options are processed. </p> <div class="mw-heading mw-heading3"><h3 id="TSL_–_Transient_System_Load"><span id="TSL_.E2.80.93_Transient_System_Load"></span>TSL – Transient System Load</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=31" title="Edit section: TSL – Transient System Load"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>This is the stage between boot device selection and hand-off to the OS. At this point one may enter UEFI shell, or execute an UEFI application such as the OS boot loader. </p> <div class="mw-heading mw-heading3"><h3 id="RT_–_Runtime"><span id="RT_.E2.80.93_Runtime"></span>RT – Runtime</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=32" title="Edit section: RT – Runtime"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The UEFI hands off to the <a href="/wiki/Operating_system" title="Operating system">operating system</a> (OS) after <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734"><span class="monospaced">ExitBootServices()</span> is executed. A UEFI compatible OS is now responsible for exiting boot services triggering the firmware to unload all no longer needed code and data, leaving only runtime services code/data, e.g. <a href="/wiki/System_Management_Mode" title="System Management Mode">SMM</a> and <a href="/wiki/Advanced_Configuration_and_Power_Interface" class="mw-redirect" title="Advanced Configuration and Power Interface">ACPI</a>.<sup id="cite_ref-105" class="reference"><a href="#cite_note-105"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="The material near this tag failed verification of its source citation(s). (November 2024)">failed verification</span></a></i>]</sup> A typical modern OS will prefer to use its own programs (such as <a href="/wiki/Kernel_driver" class="mw-redirect" title="Kernel driver">kernel drivers</a>) to control hardware devices. </p><p>When a legacy OS is used, CSM will handle this call ensuring the system is compatible with legacy BIOS expectations. </p> <div class="mw-heading mw-heading2"><h2 id="Usage">Usage</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=33" title="Edit section: Usage"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Implementations">Implementations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=34" title="Edit section: Implementations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Surface_UEFI.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Surface_UEFI.png/310px-Surface_UEFI.png" decoding="async" width="310" height="175" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Surface_UEFI.png/465px-Surface_UEFI.png 1.5x, //upload.wikimedia.org/wikipedia/commons/e/ef/Surface_UEFI.png 2x" data-file-width="520" data-file-height="293" /></a><figcaption><a href="/wiki/Microsoft_Surface" title="Microsoft Surface">Microsoft Surface</a> UEFI, the UEFI used on all Surface models made after 2015</figcaption></figure> <p>Intel's implementation of EFI is the <i>Intel Platform Innovation Framework</i>, codenamed <i>Tiano</i>. Tiano runs on Intel's <a href="/wiki/XScale" title="XScale">XScale</a>, <a href="/wiki/Itanium" title="Itanium">Itanium</a>, <a href="/wiki/IA-32" title="IA-32">IA-32</a> and <a href="/wiki/X86-64" title="X86-64">x86-64</a> processors, and is proprietary software, although a portion of the code has been released under the <a href="/wiki/BSD_license" class="mw-redirect" title="BSD license">BSD license</a> or <a href="/wiki/Eclipse_Public_License" title="Eclipse Public License">Eclipse Public License</a> (EPL) as <a href="/wiki/TianoCore_EDK_II" title="TianoCore EDK II">TianoCore EDK II</a>. TianoCore can be used as a payload for <a href="/wiki/Coreboot" title="Coreboot">coreboot</a>.<sup id="cite_ref-TianoCoreboot_106-0" class="reference"><a href="#cite_note-TianoCoreboot-106"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Phoenix_Technologies" title="Phoenix Technologies">Phoenix Technologies</a>' implementation of UEFI is branded as SecureCore Technology (SCT).<sup id="cite_ref-PhoenixSecureCoreTiano_107-0" class="reference"><a href="#cite_note-PhoenixSecureCoreTiano-107"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> <a href="/wiki/American_Megatrends" title="American Megatrends">American Megatrends</a> offers its own UEFI firmware implementation known as Aptio,<sup id="cite_ref-AMIAptio4_108-0" class="reference"><a href="#cite_note-AMIAptio4-108"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> while <a href="/wiki/Insyde_Software" title="Insyde Software">Insyde Software</a> offers InsydeH2O,<sup id="cite_ref-InsydeH2O_109-0" class="reference"><a href="#cite_note-InsydeH2O-109"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> and Byosoft offers ByoCore. </p><p>In December 2018, <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> released an open source version of its TianoCore EDK2-based UEFI implementation from the <a href="/wiki/Microsoft_Surface" title="Microsoft Surface">Surface</a> line, <a href="/wiki/Project_Mu" class="mw-redirect" title="Project Mu">Project Mu</a>.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> </p><p>An implementation of the UEFI API was introduced into the Universal Boot Loader (<a href="/wiki/Das_U-Boot" title="Das U-Boot">Das U-Boot</a>) in 2017.<sup id="cite_ref-MarryingU-BootUEFIandGRUB_111-0" class="reference"><a href="#cite_note-MarryingU-BootUEFIandGRUB-111"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> On the <a href="/wiki/ARM_architecture#AArch64" class="mw-redirect" title="ARM architecture">ARMv8</a> architecture <a href="/wiki/Linux" title="Linux">Linux</a> distributions use the U-Boot UEFI implementation in conjunction with <a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRUB</a> for booting (e.g. <a href="/wiki/SUSE_Linux" class="mw-redirect" title="SUSE Linux">SUSE Linux</a><sup id="cite_ref-SuseU-BootGRUB_112-0" class="reference"><a href="#cite_note-SuseU-BootGRUB-112"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup>), the same holds true for OpenBSD.<sup id="cite_ref-OpenBSD63onRPi3_113-0" class="reference"><a href="#cite_note-OpenBSD63onRPi3-113"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup> For booting from iSCSI <a href="/wiki/IPXE" title="IPXE">iPXE</a> can be used as a UEFI application loaded by U-Boot.<sup id="cite_ref-UBootiPXE_114-0" class="reference"><a href="#cite_note-UBootiPXE-114"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Platforms">Platforms</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=35" title="Edit section: Platforms"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Intel" title="Intel">Intel</a>'s first <a href="/wiki/Itanium" title="Itanium">Itanium</a> workstations and servers, released in 2000, implemented EFI 1.02. </p><p><a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">Hewlett-Packard</a>'s first <a href="/wiki/Itanium_2" class="mw-redirect" title="Itanium 2">Itanium 2</a> systems, released in 2002, implemented EFI 1.10; they were able to boot <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Windows</a>, <a href="/wiki/Linux" title="Linux">Linux</a>, <a href="/wiki/FreeBSD" title="FreeBSD">FreeBSD</a> and <a href="/wiki/HP-UX" title="HP-UX">HP-UX</a>; <a href="/wiki/OpenVMS" title="OpenVMS">OpenVMS</a> added UEFI capability in June 2003. </p><p>In January 2006, <a href="/wiki/Apple_Inc." title="Apple Inc.">Apple Inc.</a> shipped its first <a href="/wiki/Apple%E2%80%93Intel_architecture" title="Apple–Intel architecture">Intel-based Macintosh computers</a>. These systems used EFI instead of <a href="/wiki/Open_Firmware" title="Open Firmware">Open Firmware</a>, which had been used on its previous PowerPC-based systems.<sup id="cite_ref-115" class="reference"><a href="#cite_note-115"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> On 5 April 2006, Apple first released <a href="/wiki/Boot_Camp_(software)" title="Boot Camp (software)">Boot Camp</a>, which produces a Windows drivers disk and a non-destructive partitioning tool to allow the installation of Windows XP or Vista without requiring a reinstallation of Mac OS X (now macOS). A firmware update was also released that added BIOS compatibility to its EFI implementation. Subsequent Macintosh models shipped with the newer firmware.<sup id="cite_ref-116" class="reference"><a href="#cite_note-116"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p><p>During 2005, more than one million Intel systems shipped with Intel's implementation of UEFI.<sup id="cite_ref-IntelFrameworkOverviewUEFI_117-0" class="reference"><a href="#cite_note-IntelFrameworkOverviewUEFI-117"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="The material near this tag failed verification of its source citation(s). (December 2020)">failed verification</span></a></i>]</sup> New mobile, desktop and server products, using Intel's implementation of UEFI, started shipping in 2006. For instance, boards that use the Intel 945 chipset series use Intel's UEFI firmware implementation. </p><p>Since 2005, EFI has also been implemented on non-PC architectures, such as <a href="/wiki/Embedded_system" title="Embedded system">embedded systems</a> based on <a href="/wiki/XScale" title="XScale">XScale</a> cores.<sup id="cite_ref-IntelFrameworkOverviewUEFI_117-1" class="reference"><a href="#cite_note-IntelFrameworkOverviewUEFI-117"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup> </p><p>The EDK (EFI Developer Kit) includes an NT32 target, which allows EFI firmware and EFI applications to run within a <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Windows</a> application. But no direct hardware access is allowed by EDK NT32. This means only a subset of EFI application and drivers can be executed by the EDK NT32 target. </p><p>In 2008, more x86-64 systems adopted UEFI. While many of these systems still allow booting only the BIOS-based OSes via the Compatibility Support Module (CSM) (thus not appearing to the user to be UEFI-based), other systems started to allow booting UEFI-based OSes. For example, IBM x3450 server, <a href="/wiki/Micro-Star_International" title="Micro-Star International">MSI</a> motherboards with ClickBIOS, HP EliteBook Notebook PCs. </p><p>In 2009, IBM shipped <a href="/wiki/IBM_System_x" class="mw-redirect" title="IBM System x">System x</a> machines (x3550 M2, x3650 M2, iDataPlex dx360 M2) and <a href="/wiki/IBM_BladeCenter" title="IBM BladeCenter">BladeCenter</a> HS22 with UEFI capability. Dell shipped PowerEdge T610, R610, R710, M610 and M710 servers with UEFI capability. More commercially available systems are mentioned in a UEFI whitepaper.<sup id="cite_ref-118" class="reference"><a href="#cite_note-118"><span class="cite-bracket">[</span>114<span class="cite-bracket">]</span></a></sup> </p><p>In 2011, major vendors (such as <a href="/wiki/ASRock" title="ASRock">ASRock</a>, <a href="/wiki/Asus" title="Asus">Asus</a>, <a href="/wiki/Gigabyte_Technology" title="Gigabyte Technology">Gigabyte</a>, and <a href="/wiki/Micro-Star_International" title="Micro-Star International">MSI</a>) launched several consumer-oriented motherboards using the Intel <a href="/wiki/List_of_Intel_chipsets#5/6/7/8/9_Series_chipsets" title="List of Intel chipsets">6-series</a> <a href="/wiki/LGA_1155" title="LGA 1155">LGA 1155</a> chipset and AMD 9 Series <a href="/wiki/Socket_AM3%2B" title="Socket AM3+">AM3+</a> chipsets with UEFI.<sup id="cite_ref-Asus_Motherboard_119-0" class="reference"><a href="#cite_note-Asus_Motherboard-119"><span class="cite-bracket">[</span>115<span class="cite-bracket">]</span></a></sup> </p><p>With the release of Windows 8 in October 2012, Microsoft's certification requirements now require that computers include firmware that implements the UEFI specification. Furthermore, if the computer supports the "<a href="/wiki/Connected_Standby" class="mw-redirect" title="Connected Standby">Connected Standby</a>" feature of Windows 8 (which allows devices to have power management comparable to <a href="/wiki/Smartphone" title="Smartphone">smartphones</a>, with an almost instantaneous return from standby mode), then the firmware is not permitted to contain a Compatibility Support Module (CSM). As such, systems that support Connected Standby are incapable of booting Legacy BIOS operating systems.<sup id="cite_ref-120" class="reference"><a href="#cite_note-120"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-pcmag-connected_121-0" class="reference"><a href="#cite_note-pcmag-connected-121"><span class="cite-bracket">[</span>117<span class="cite-bracket">]</span></a></sup> </p><p>In October 2017, Intel announced that it would remove legacy PC BIOS support from all its products by 2020, in favor of UEFI Class 3.<sup id="cite_ref-122" class="reference"><a href="#cite_note-122"><span class="cite-bracket">[</span>118<span class="cite-bracket">]</span></a></sup> By 2019, all computers based on Intel platforms no longer have legacy PC BIOS support. </p> <div class="mw-heading mw-heading3"><h3 id="Operating_systems">Operating systems</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=36" title="Edit section: Operating systems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>An operating system that can be booted from a (U)EFI is called a (U)EFI-aware operating system, defined by (U)EFI specification. Here the term <i>booted from a (U)EFI</i> means directly booting the system using a (U)EFI operating system loader stored on any storage device. The default location for the operating system loader is <code><EFI_SYSTEM_PARTITION>/BOOT/BOOT<MACHINE_TYPE_SHORT_NAME>.EFI</code>, where short name of the machine type can be <code>IA32</code>, <code>X64</code>, <code>IA64</code>, <code>ARM</code> or <code>AA64</code>.<sup id="cite_ref-uefi-spec-24_40-7" class="reference"><a href="#cite_note-uefi-spec-24-40"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> Some operating systems vendors may have their own boot loaders. They may also change the default boot location. </p> <ul><li>The <a href="/wiki/Linux_kernel" title="Linux kernel">Linux kernel</a> has been able to use EFI at boot time since early 2000s,<sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">[</span>119<span class="cite-bracket">]</span></a></sup> using the <a href="/wiki/Elilo" class="mw-redirect" title="Elilo">elilo</a> EFI boot loader or, more recently, EFI versions of <a href="/wiki/GNU_GRUB" title="GNU GRUB">GRUB</a>.<sup id="cite_ref-debiangrubexample_124-0" class="reference"><a href="#cite_note-debiangrubexample-124"><span class="cite-bracket">[</span>120<span class="cite-bracket">]</span></a></sup> Grub+Linux also supports booting from a GUID partition table without UEFI.<sup id="cite_ref-grub-bios-installation_21-2" class="reference"><a href="#cite_note-grub-bios-installation-21"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> The distribution <a href="/wiki/Ubuntu" title="Ubuntu">Ubuntu</a> added support for UEFI Secure Boot as of version 12.10.<sup id="cite_ref-h-ubuntusecureboot_125-0" class="reference"><a href="#cite_note-h-ubuntusecureboot-125"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup> Furthermore, the Linux kernel can be compiled with the option to run as an EFI bootloader on its own through the EFI boot stub feature.</li> <li><a href="/wiki/HP-UX" title="HP-UX">HP-UX</a> has used (U)EFI as its boot mechanism on <a href="/wiki/IA-64" title="IA-64">IA-64</a> systems since 2002.</li> <li><a href="/wiki/OpenVMS" title="OpenVMS">OpenVMS</a> has used EFI on IA-64 since its initial evaluation release in December 2003, and for production releases since January 2005.<sup id="cite_ref-126" class="reference"><a href="#cite_note-126"><span class="cite-bracket">[</span>122<span class="cite-bracket">]</span></a></sup> OpenVMS on x86-64 also uses UEFI to boot the operating system.<sup id="cite_ref-127" class="reference"><a href="#cite_note-127"><span class="cite-bracket">[</span>123<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Apple_Inc." title="Apple Inc.">Apple</a> uses EFI for its line of <a href="/wiki/Apple%E2%80%93Intel_architecture" title="Apple–Intel architecture">Intel-based Macs</a>. <a href="/wiki/Mac_OS_X_Tiger" title="Mac OS X Tiger">Mac OS X v10.4</a> Tiger and <a href="/wiki/Mac_OS_X_Leopard" title="Mac OS X Leopard">Mac OS X v10.5</a> Leopard implement EFI v1.10 in 32-bit mode even on newer 64-bit CPUs, but full support arrived with <a href="/wiki/OS_X_Mountain_Lion" title="OS X Mountain Lion">OS X v10.8 Mountain Lion</a>.<sup id="cite_ref-appleuefiversion1_128-0" class="reference"><a href="#cite_note-appleuefiversion1-128"><span class="cite-bracket">[</span>124<span class="cite-bracket">]</span></a></sup></li> <li>The <a href="/wiki/Itanium" title="Itanium">Itanium</a> versions of <a href="/wiki/Windows_2000" title="Windows 2000">Windows 2000</a> (Advanced Server Limited Edition and Datacenter Server Limited Edition; based on the pre-release <a href="/wiki/Windows_Server_2003" title="Windows Server 2003">Windows Server 2003</a> codebase) implemented EFI 1.10 in 2002. <a href="/wiki/Windows_XP_64-bit_Edition" class="mw-redirect" title="Windows XP 64-bit Edition">Windows XP 64-bit Edition</a>, <a href="/wiki/Windows_2000" title="Windows 2000">Windows 2000</a> Advanced Server Limited Edition (pre-release Windows Server 2003) and <a href="/wiki/Windows_Server_2003" title="Windows Server 2003">Windows Server 2003</a> for <a href="/wiki/IA-64" title="IA-64">IA-64</a>, all of which are for the Intel <a href="/wiki/Itanium" title="Itanium">Itanium</a> family of processors, implement EFI, a requirement of the platform through the <a href="/wiki/DIG64" title="DIG64">DIG64</a> specification.<sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">[</span>125<span class="cite-bracket">]</span></a></sup></li> <li>Microsoft introduced UEFI for x64 Windows operating systems with <a href="/wiki/Windows_Vista_SP1" class="mw-redirect" title="Windows Vista SP1">Windows Vista SP1</a><sup id="cite_ref-130" class="reference"><a href="#cite_note-130"><span class="cite-bracket">[</span>126<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Windows_Server_2008" title="Windows Server 2008">Windows Server 2008</a> however only UGA (Universal Graphic Adapter) 1.1 or Legacy BIOS <a href="/wiki/INT_10h" class="mw-redirect" title="INT 10h">INT 10h</a> is supported; Graphics Output Protocol (GOP) is not supported. Therefore, PCs running 64-bit versions of <a href="/wiki/Windows_Vista_SP1" class="mw-redirect" title="Windows Vista SP1">Windows Vista SP1</a>, <a href="/wiki/Windows_Vista_SP2" class="mw-redirect" title="Windows Vista SP2">Windows Vista SP2</a>, <a href="/wiki/Windows_7" title="Windows 7">Windows 7</a>, <a href="/wiki/Windows_Server_2008" title="Windows Server 2008">Windows Server 2008</a> and <a href="/wiki/Windows_Server_2008_R2" title="Windows Server 2008 R2">Windows Server 2008 R2</a> are compatible with UEFI Class 2.<sup id="cite_ref-131" class="reference"><a href="#cite_note-131"><span class="cite-bracket">[</span>127<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-132" class="reference"><a href="#cite_note-132"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup> 32-bit UEFI was originally not supported since vendors did not have any interest in producing native 32-bit UEFI firmware because of the mainstream status of <a href="/wiki/64-bit_computing" title="64-bit computing">64-bit computing</a>.<sup id="cite_ref-WindowsVistaUEFI_133-0" class="reference"><a href="#cite_note-WindowsVistaUEFI-133"><span class="cite-bracket">[</span>129<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a> finally introduced further optimizations for UEFI systems, including Graphics Output Protocol (GOP) support,<sup id="cite_ref-134" class="reference"><a href="#cite_note-134"><span class="cite-bracket">[</span>130<span class="cite-bracket">]</span></a></sup> a faster startup, 32-bit UEFI support, and Secure Boot support.<sup id="cite_ref-135" class="reference"><a href="#cite_note-135"><span class="cite-bracket">[</span>131<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Windows8UEFISecureBoot_136-0" class="reference"><a href="#cite_note-Windows8UEFISecureBoot-136"><span class="cite-bracket">[</span>132<span class="cite-bracket">]</span></a></sup> Since <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a>, the UEFI firmware with <a href="/wiki/ACPI" title="ACPI">ACPI</a> protocol is a mandatory requirement for ARM-based Microsoft Windows operating systems. Microsoft began requiring UEFI to run Windows with <a href="/wiki/Windows_11" title="Windows 11">Windows 11</a>,<sup id="cite_ref-137" class="reference"><a href="#cite_note-137"><span class="cite-bracket">[</span>133<span class="cite-bracket">]</span></a></sup> with IoT Enterprise editions of Windows 11 since version 24H2 exempt from the requirement.<sup id="cite_ref-138" class="reference"><a href="#cite_note-138"><span class="cite-bracket">[</span>134<span class="cite-bracket">]</span></a></sup></li> <li>On 5 March 2013, the <a href="/wiki/FreeBSD_Foundation" title="FreeBSD Foundation">FreeBSD Foundation</a> awarded a grant to a developer seeking to add UEFI support to the <a href="/wiki/FreeBSD" title="FreeBSD">FreeBSD</a> kernel and bootloader.<sup id="cite_ref-fbsd-uefi_139-0" class="reference"><a href="#cite_note-fbsd-uefi-139"><span class="cite-bracket">[</span>135<span class="cite-bracket">]</span></a></sup> The changes were initially stored in a discrete branch of the FreeBSD source code, but were merged into the mainline source on 4 April 2014 (revision 264095); the changes include support in the installer as well.<sup id="cite_ref-fbsd-uefi-merge_140-0" class="reference"><a href="#cite_note-fbsd-uefi-merge-140"><span class="cite-bracket">[</span>136<span class="cite-bracket">]</span></a></sup> UEFI boot support for amd64 first appeared in FreeBSD 10.1 and for arm64 in FreeBSD 11.0.<sup id="cite_ref-141" class="reference"><a href="#cite_note-141"><span class="cite-bracket">[</span>137<span class="cite-bracket">]</span></a></sup></li> <li>Oracle <a href="/wiki/Solaris_(operating_system)" class="mw-redirect" title="Solaris (operating system)">Solaris</a> 11.1 and later support UEFI boot for x86 systems with UEFI firmware version 2.1 or later. <a href="/wiki/GNU_GRUB" title="GNU GRUB">GRUB</a> 2 is used as the boot loader on x86.<sup id="cite_ref-solaris-uefi_142-0" class="reference"><a href="#cite_note-solaris-uefi-142"><span class="cite-bracket">[</span>138<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/OpenBSD" title="OpenBSD">OpenBSD</a> 5.9<sup id="cite_ref-143" class="reference"><a href="#cite_note-143"><span class="cite-bracket">[</span>139<span class="cite-bracket">]</span></a></sup> introduced UEFI boot support for 64-bit x86 systems using its own custom loader, OpenBSD 6.0 extended that support to include ARMv7.<sup id="cite_ref-144" class="reference"><a href="#cite_note-144"><span class="cite-bracket">[</span>140<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/ArcaOS" title="ArcaOS">ArcaOS</a> supports UEFI booting since the 5.1 release.<sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">[</span>141<span class="cite-bracket">]</span></a></sup> ArcaOS' UEFI support emulates specific <a href="/wiki/BIOS" title="BIOS">BIOS</a> functionality which the operating system depends on (particularly interrupts <a href="/wiki/INT_10H" title="INT 10H">INT 10H</a> and <a href="/wiki/INT_13H" title="INT 13H">INT 13H</a>).<sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">[</span>143<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="With_virtualization">With virtualization</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=37" title="Edit section: With virtualization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/HP_Integrity_Virtual_Machines" title="HP Integrity Virtual Machines">HP Integrity Virtual Machines</a> provides UEFI boot on HP Integrity Servers. It also provides a virtualized UEFI environment for the guest UEFI-aware OSes.</li> <li>Intel hosts an Open Virtual Machine Firmware project on SourceForge.<sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">[</span>144<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/VMware_Fusion" title="VMware Fusion">VMware Fusion</a> 3 software for Mac OS X can boot Mac OS X Server virtual machines using UEFI.</li> <li><a href="/wiki/VMware_Workstation" title="VMware Workstation">VMware Workstation</a> prior to version 11 unofficially supports UEFI, but is manually enabled by editing the .vmx file.<sup id="cite_ref-149" class="reference"><a href="#cite_note-149"><span class="cite-bracket">[</span>145<span class="cite-bracket">]</span></a></sup> <a href="/wiki/VMware_Workstation" title="VMware Workstation">VMware Workstation</a> version 11 and above supports UEFI, independently of whether the physical host system is UEFI-based. VMware Workstation 14 (and accordingly, Fusion 10) adds support for the <a href="#Secure_Boot">Secure Boot</a> feature of UEFI.<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">[</span>146<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-151" class="reference"><a href="#cite_note-151"><span class="cite-bracket">[</span>147<span class="cite-bracket">]</span></a></sup></li> <li>The <a href="/wiki/VMware" title="VMware">VMware</a> <a href="/wiki/ESXi" class="mw-redirect" title="ESXi">ESXi</a> 5.0 hypervisor officially supports UEFI. Version 6.5 adds support for Secure Boot.<sup id="cite_ref-152" class="reference"><a href="#cite_note-152"><span class="cite-bracket">[</span>148<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">[</span>149<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/VirtualBox" title="VirtualBox">VirtualBox</a> has implemented UEFI since 3.1,<sup id="cite_ref-154" class="reference"><a href="#cite_note-154"><span class="cite-bracket">[</span>150<span class="cite-bracket">]</span></a></sup> but is limited to Unix/Linux operating systems and Windows 8 and later (does not work with Windows Vista x64 and Windows 7 x64).<sup id="cite_ref-155" class="reference"><a href="#cite_note-155"><span class="cite-bracket">[</span>151<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-156" class="reference"><a href="#cite_note-156"><span class="cite-bracket">[</span>152<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/QEMU" title="QEMU">QEMU</a>/<a href="/wiki/Kernel-based_Virtual_Machine" title="Kernel-based Virtual Machine">KVM</a> can be used with the Open Virtual Machine Firmware (OVMF) provided by <a href="#Intel_EFI">TianoCore</a>.<sup id="cite_ref-157" class="reference"><a href="#cite_note-157"><span class="cite-bracket">[</span>153<span class="cite-bracket">]</span></a></sup></li> <li>The second generation of the Microsoft <a href="/wiki/Hyper-V" title="Hyper-V">Hyper-V</a> virtual machine supports virtualized UEFI.<sup id="cite_ref-158" class="reference"><a href="#cite_note-158"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Google_Cloud_Platform" title="Google Cloud Platform">Google Cloud Platform</a> Shielded VMs support virtualized UEFI to enable Secure Boot.<sup id="cite_ref-159" class="reference"><a href="#cite_note-159"><span class="cite-bracket">[</span>155<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Applications_development"><span class="anchor" id="EADK"></span>Applications development</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=38" title="Edit section: Applications development"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><i>EDK2 Application Development Kit</i> (EADK) makes it possible to use <a href="/wiki/C_standard_library" title="C standard library">standard C library</a> functions in UEFI applications. EADK can be freely downloaded from the <a href="/wiki/Intel" title="Intel">Intel</a>'s TianoCore UDK / EDK2 <a href="/wiki/SourceForge" title="SourceForge">SourceForge</a> project. As an example, a port of the <a href="/wiki/Python_(programming_language)" title="Python (programming language)">Python</a> interpreter is made available as a UEFI application by using the EADK.<sup id="cite_ref-160" class="reference"><a href="#cite_note-160"><span class="cite-bracket">[</span>156<span class="cite-bracket">]</span></a></sup> The development has moved to GitHub since UDK2015.<sup id="cite_ref-161" class="reference"><a href="#cite_note-161"><span class="cite-bracket">[</span>157<span class="cite-bracket">]</span></a></sup> </p><p>A minimalistic "<a href="/wiki/Hello,_world" class="mw-redirect" title="Hello, world">hello, world</a>" C program written using EADK looks similar to its <a href="/wiki/C_(programming_language)#HELLOWORLD" title="C (programming language)">usual C counterpart</a>: </p> <div class="mw-highlight mw-highlight-lang-c mw-content-ltr" dir="ltr"><pre><span></span><span class="cp">#include</span><span class="w"> </span><span class="cpf"><Uefi.h></span> <span class="cp">#include</span><span class="w"> </span><span class="cpf"><Library/UefiLib.h></span> <span class="cp">#include</span><span class="w"> </span><span class="cpf"><Library/ShellCEntryLib.h></span> <span class="n">EFI_STATUS</span><span class="w"> </span><span class="n">EFIAPI</span><span class="w"> </span><span class="n">ShellAppMain</span><span class="p">(</span><span class="n">IN</span><span class="w"> </span><span class="n">UINTN</span><span class="w"> </span><span class="n">Argc</span><span class="p">,</span><span class="w"> </span><span class="n">IN</span><span class="w"> </span><span class="n">CHAR16</span><span class="w"> </span><span class="o">**</span><span class="n">Argv</span><span class="p">)</span> <span class="p">{</span> <span class="w"> </span><span class="n">Print</span><span class="p">(</span><span class="sa">L</span><span class="s">"hello, world</span><span class="se">\n</span><span class="s">"</span><span class="p">);</span> <span class="w"> </span><span class="k">return</span><span class="w"> </span><span class="n">EFI_SUCCESS</span><span class="p">;</span> <span class="p">}</span> </pre></div> <div class="mw-heading mw-heading2"><h2 id="Criticism">Criticism</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=39" title="Edit section: Criticism"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Numerous digital rights activists have protested UEFI. <a href="/w/index.php?title=Ronald_G._Minnich&action=edit&redlink=1" class="new" title="Ronald G. Minnich (page does not exist)">Ronald G. Minnich</a>, a co-author of <a href="/wiki/Coreboot" title="Coreboot">coreboot</a>, and <a href="/wiki/Cory_Doctorow" title="Cory Doctorow">Cory Doctorow</a>, a digital rights activist, have criticized UEFI as an attempt to remove the ability of the user to truly control the computer.<sup id="cite_ref-FosdemInterviewRonaldGMinnich_162-0" class="reference"><a href="#cite_note-FosdemInterviewRonaldGMinnich-162"><span class="cite-bracket">[</span>158<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-163" class="reference"><a href="#cite_note-163"><span class="cite-bracket">[</span>159<span class="cite-bracket">]</span></a></sup> It does not solve the BIOS's long-standing problems of requiring two different drivers—one for the firmware and one for the operating system—for most hardware.<sup id="cite_ref-YouTubeCorebootFirmware_164-0" class="reference"><a href="#cite_note-YouTubeCorebootFirmware-164"><span class="cite-bracket">[</span>160<span class="cite-bracket">]</span></a></sup> </p><p>Open-source project TianoCore also provides UEFIs.<sup id="cite_ref-165" class="reference"><a href="#cite_note-165"><span class="cite-bracket">[</span>161<span class="cite-bracket">]</span></a></sup> TianoCore lacks the specialized drivers that initialize chipset functions, which are instead provided by <a href="/wiki/Coreboot" title="Coreboot">coreboot</a>, of which TianoCore is one of many payload options. The development of coreboot requires cooperation from chipset manufacturers to provide the specifications needed to develop initialization drivers. </p> <div class="mw-heading mw-heading3"><h3 id="Secure_Boot_2"><span class="anchor" id="Secure_Boot_criticism"></span>Secure Boot</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=40" title="Edit section: Secure Boot"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Windows_8#Reception" title="Windows 8">Windows 8 § Reception</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Secure_Boot_keys_example_screenshot.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Secure_Boot_keys_example_screenshot.png/310px-Secure_Boot_keys_example_screenshot.png" decoding="async" width="310" height="237" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/41/Secure_Boot_keys_example_screenshot.png/465px-Secure_Boot_keys_example_screenshot.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/41/Secure_Boot_keys_example_screenshot.png/620px-Secure_Boot_keys_example_screenshot.png 2x" data-file-width="987" data-file-height="755" /></a><figcaption>Examples of custom Secure Boot public keys</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Shim_MokManager_screenshot.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Shim_MokManager_screenshot.png/310px-Shim_MokManager_screenshot.png" decoding="async" width="310" height="134" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Shim_MokManager_screenshot.png/465px-Shim_MokManager_screenshot.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Shim_MokManager_screenshot.png/620px-Shim_MokManager_screenshot.png 2x" data-file-width="800" data-file-height="345" /></a><figcaption>MokManager, a part of Shim bootloader</figcaption></figure> <p>In 2011, Microsoft announced that computers certified to run its <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a> operating system had to ship with Microsoft's public key enrolled and Secure Boot enabled, which implies that using UEFI is a requirement for these devices.<sup id="cite_ref-166" class="reference"><a href="#cite_note-166"><span class="cite-bracket">[</span>162<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-167" class="reference"><a href="#cite_note-167"><span class="cite-bracket">[</span>163<span class="cite-bracket">]</span></a></sup> Following the announcement, the company was accused by critics and free software/open source advocates (including the <a href="/wiki/Free_Software_Foundation" title="Free Software Foundation">Free Software Foundation</a>) of trying to use the Secure Boot functionality of UEFI to <a href="/wiki/Vendor_lock-in" title="Vendor lock-in">hinder or outright prevent</a> the installation of alternative operating systems such as <a href="/wiki/Linux" title="Linux">Linux</a>. Microsoft denied that the Secure Boot requirement was intended to serve as a form of <a href="/wiki/Vendor_lock-in" title="Vendor lock-in">lock-in</a>, and clarified its requirements by stating that x86-based systems certified for Windows 8 must allow Secure Boot to enter custom mode or be disabled, but not on systems using the <a href="/wiki/ARM_architecture" class="mw-redirect" title="ARM architecture">ARM architecture</a>.<sup id="cite_ref-pcw-ueficontroversy_76-1" class="reference"><a href="#cite_note-pcw-ueficontroversy-76"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-cwuk-arm_168-0" class="reference"><a href="#cite_note-cwuk-arm-168"><span class="cite-bracket">[</span>164<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a> allows <a href="/wiki/Original_equipment_manufacturer" title="Original equipment manufacturer">OEMs</a> to decide whether or not Secure Boot can be managed by users of their x86 systems.<sup id="cite_ref-arstechnica-securebootw10_169-0" class="reference"><a href="#cite_note-arstechnica-securebootw10-169"><span class="cite-bracket">[</span>165<span class="cite-bracket">]</span></a></sup> </p><p>Other developers raised concerns about the legal and practical issues of implementing support for Secure Boot on Linux systems in general. Former <a href="/wiki/Red_Hat" title="Red Hat">Red Hat</a> developer <a href="/wiki/Matthew_Garrett" title="Matthew Garrett">Matthew Garrett</a> noted that conditions in the <a href="/wiki/GNU_General_Public_License#Version_3" title="GNU General Public License">GNU General Public License version 3</a> may prevent the use of the <a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRand Unified Bootloader</a> without a distribution's developer disclosing the private key (however, the <a href="/wiki/Free_Software_Foundation" title="Free Software Foundation">Free Software Foundation</a> has since clarified its position, assuring that the responsibility to make keys available was held by the hardware manufacturer),<sup id="cite_ref-170" class="reference"><a href="#cite_note-170"><span class="cite-bracket">[</span>166<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-h-ubuntusecureboot_125-1" class="reference"><a href="#cite_note-h-ubuntusecureboot-125"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup> and that it would also be difficult for advanced users to build custom <a href="/wiki/Linux_kernel" title="Linux kernel">kernels</a> that could function with Secure Boot enabled without self-signing them.<sup id="cite_ref-cwuk-arm_168-1" class="reference"><a href="#cite_note-cwuk-arm-168"><span class="cite-bracket">[</span>164<span class="cite-bracket">]</span></a></sup> Other developers suggested that signed builds of Linux with another key could be provided, but noted that it would be difficult to persuade OEMs to ship their computers with the required key alongside the Microsoft key.<sup id="cite_ref-ElReg1_8-1" class="reference"><a href="#cite_note-ElReg1-8"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> </p><p>Several major Linux distributions have developed different implementations for Secure Boot. Garrett himself developed a minimal bootloader known as a shim, which is a precompiled, signed bootloader that allows the user to individually trust keys provided by Linux distributions.<sup id="cite_ref-171" class="reference"><a href="#cite_note-171"><span class="cite-bracket">[</span>167<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Ubuntu_(operating_system)" class="mw-redirect" title="Ubuntu (operating system)">Ubuntu 12.10</a> uses an older version of shim<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Avoid_weasel_words" class="mw-redirect" title="Wikipedia:Avoid weasel words"><span title="The material near this tag possibly uses too vague attribution or weasel words. (October 2017)">which?</span></a></i>]</sup> pre-configured for use with <a href="/wiki/Canonical_Ltd." class="mw-redirect" title="Canonical Ltd.">Canonical</a>'s own key that verifies only the bootloader and allows unsigned kernels to be loaded; developers believed that the practice of signing only the bootloader is more feasible, since a trusted kernel is effective at securing only the <a href="/wiki/User_space" class="mw-redirect" title="User space">user space</a>, and not the pre-boot state for which Secure Boot is designed to add protection. That also allows users to build their own kernels and use custom <a href="/wiki/Kernel_module" class="mw-redirect" title="Kernel module">kernel modules</a> as well, without the need to reconfigure the system.<sup id="cite_ref-h-ubuntusecureboot_125-2" class="reference"><a href="#cite_note-h-ubuntusecureboot-125"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-lwn-efilinux_172-0" class="reference"><a href="#cite_note-lwn-efilinux-172"><span class="cite-bracket">[</span>168<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-h-mscert_173-0" class="reference"><a href="#cite_note-h-mscert-173"><span class="cite-bracket">[</span>169<span class="cite-bracket">]</span></a></sup> Canonical also maintains its own private key to sign installations of Ubuntu pre-loaded on certified OEM computers that run the operating system, and also plans to enforce a Secure Boot requirement as well—requiring both a Canonical key and a Microsoft key (for compatibility reasons) to be included in their firmware. <a href="/wiki/Fedora_(operating_system)" class="mw-redirect" title="Fedora (operating system)">Fedora</a> also uses shim,<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Avoid_weasel_words" class="mw-redirect" title="Wikipedia:Avoid weasel words"><span title="The material near this tag possibly uses too vague attribution or weasel words. (October 2017)">which?</span></a></i>]</sup> but requires that both the kernel and its modules be signed as well.<sup id="cite_ref-lwn-efilinux_172-1" class="reference"><a href="#cite_note-lwn-efilinux-172"><span class="cite-bracket">[</span>168<span class="cite-bracket">]</span></a></sup> </p><p>It has been disputed whether the operating system kernel and its modules must be signed as well; while the UEFI specifications do not require it, Microsoft has asserted that their contractual requirements do, and that it reserves the right to revoke any certificates used to sign code that can be used to compromise the security of the system.<sup id="cite_ref-h-mscert_173-1" class="reference"><a href="#cite_note-h-mscert-173"><span class="cite-bracket">[</span>169<span class="cite-bracket">]</span></a></sup> In Windows, if Secure Boot is enabled, all kernel drivers must be digitally signed; non-WHQL drivers may be refused to load. In February 2013, another Red Hat developer attempted to submit a patch to the Linux kernel that would allow it to parse Microsoft's authenticode signing using a master <a href="/wiki/X.509" title="X.509">X.509</a> key embedded in <a href="/wiki/Portable_Executable" title="Portable Executable">PE</a> files signed by Microsoft. However, the proposal was criticized by Linux creator <a href="/wiki/Linus_Torvalds" title="Linus Torvalds">Linus Torvalds</a>, who attacked Red Hat for supporting Microsoft's control over the Secure Boot infrastructure.<sup id="cite_ref-ars-linus_174-0" class="reference"><a href="#cite_note-ars-linus-174"><span class="cite-bracket">[</span>170<span class="cite-bracket">]</span></a></sup> </p><p>On 26 March 2013, the <a href="/wiki/Spain" title="Spain">Spanish</a> free software development group Hispalinux filed a formal complaint with the <a href="/wiki/European_Commission" title="European Commission">European Commission</a>, contending that Microsoft's Secure Boot requirements on OEM systems were "obstructive" and <a href="/wiki/Anti-competitive_practices" title="Anti-competitive practices">anti-competitive</a>.<sup id="cite_ref-reuters-hispalinuxuefi_175-0" class="reference"><a href="#cite_note-reuters-hispalinuxuefi-175"><span class="cite-bracket">[</span>171<span class="cite-bracket">]</span></a></sup> </p><p>At the <a href="/wiki/Black_Hat_Briefings" title="Black Hat Briefings">Black Hat conference</a> in August 2013, a group of security researchers presented a series of exploits in specific vendor implementations of UEFI that could be used to exploit Secure Boot.<sup id="cite_ref-itworld-securebootexploit_176-0" class="reference"><a href="#cite_note-itworld-securebootexploit-176"><span class="cite-bracket">[</span>172<span class="cite-bracket">]</span></a></sup> </p><p>In August 2016 it was reported that two security researchers had found the "golden key" security key Microsoft uses in signing operating systems.<sup id="cite_ref-177" class="reference"><a href="#cite_note-177"><span class="cite-bracket">[</span>173<span class="cite-bracket">]</span></a></sup> Technically, no key was exposed, however, an exploitable binary signed by the key was. This allows any software to run as though it was genuinely signed by Microsoft and exposes the possibility of <a href="/wiki/Rootkit" title="Rootkit">rootkit</a> and <a href="/wiki/Bootkit" class="mw-redirect" title="Bootkit">bootkit</a> attacks. This also makes patching the fault impossible, since any patch can be replaced (downgraded) by the (signed) exploitable binary. Microsoft responded in a statement that the vulnerability only exists in <a href="/wiki/ARM_architecture" class="mw-redirect" title="ARM architecture">ARM architecture</a> and <a href="/wiki/Windows_RT" title="Windows RT">Windows RT</a> devices, and has released two patches; however, the patches do not (and cannot) remove the vulnerability, which would require key replacements in end user firmware to fix.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (October 2017)">citation needed</span></a></i>]</sup> </p><p>On March 1, 2023, researchers from ESET Cybersecurity Firm reported “The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot” named ‘BlackLotus’ in their public analyses findings describing the theory behind its mechanics exploiting the patches that “do not (and cannot) remove the vulnerability”.<sup id="cite_ref-178" class="reference"><a href="#cite_note-178"><span class="cite-bracket">[</span>174<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-179" class="reference"><a href="#cite_note-179"><span class="cite-bracket">[</span>175<span class="cite-bracket">]</span></a></sup> </p><p>In August 2024 the <a href="/wiki/Windows_11" title="Windows 11">Windows 11</a> and <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a> security updates applied the Secure Boot Advanced Targeting (SBAT) settings to device's UEFI NVRAM, which may caused some Linux distributions failed to load. SBAT is a protocol that supported in new versions of <a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a> and shim, which refuse buggy or vulnerability intermediate bootloader (usually <a href="/wiki/Winload.efi" class="mw-redirect" title="Winload.efi">winload.efi</a> and <a href="/wiki/GNU_GRUB" title="GNU GRUB">GRUB</a>) to load in the boot process.<sup id="cite_ref-180" class="reference"><a href="#cite_note-180"><span class="cite-bracket">[</span>176<span class="cite-bracket">]</span></a></sup> </p><p>Many <a href="/wiki/Linux_distributions" class="mw-redirect" title="Linux distributions">Linux distributions</a> support UEFI Secure Boot now, such as <a href="/wiki/RHEL" class="mw-redirect" title="RHEL">RHEL</a> (RHEL 7 and later), <a href="/wiki/CentOS" title="CentOS">CentOS</a> (CentOS 7 and later<sup id="cite_ref-181" class="reference"><a href="#cite_note-181"><span class="cite-bracket">[</span>177<span class="cite-bracket">]</span></a></sup>), <a href="/wiki/Ubuntu" title="Ubuntu">Ubuntu</a>, <a href="/wiki/Fedora_(operating_system)" class="mw-redirect" title="Fedora (operating system)">Fedora</a>, <a href="/wiki/Debian" title="Debian">Debian</a> (Debian 10 and later<sup id="cite_ref-182" class="reference"><a href="#cite_note-182"><span class="cite-bracket">[</span>178<span class="cite-bracket">]</span></a></sup>), <a href="/wiki/OpenSUSE" title="OpenSUSE">OpenSUSE</a>, <a href="/wiki/SUSE_Linux" class="mw-redirect" title="SUSE Linux">SUSE Linux</a>.<sup id="cite_ref-183" class="reference"><a href="#cite_note-183"><span class="cite-bracket">[</span>179<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Firmware_problems">Firmware problems</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=41" title="Edit section: Firmware problems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The increased prominence of UEFI firmware in devices has also led to a number of technical problems blamed on their respective implementations.<sup id="cite_ref-zdnet-linux8_184-0" class="reference"><a href="#cite_note-zdnet-linux8-184"><span class="cite-bracket">[</span>180<span class="cite-bracket">]</span></a></sup> </p><p>Following the release of Windows 8 in late 2012, it was discovered that certain <a href="/wiki/Lenovo" title="Lenovo">Lenovo</a> computer models with Secure Boot had firmware that was hardcoded to allow only executables named "<a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a>" or "<a href="/wiki/Red_Hat_Enterprise_Linux" title="Red Hat Enterprise Linux">Red Hat Enterprise Linux</a>" to load, regardless of any other setting.<sup id="cite_ref-p-lenovo_185-0" class="reference"><a href="#cite_note-p-lenovo-185"><span class="cite-bracket">[</span>181<span class="cite-bracket">]</span></a></sup> Other problems were encountered by several <a href="/wiki/Toshiba" title="Toshiba">Toshiba</a> laptop models with Secure Boot that were missing certain certificates required for its proper operation.<sup id="cite_ref-zdnet-linux8_184-1" class="reference"><a href="#cite_note-zdnet-linux8-184"><span class="cite-bracket">[</span>180<span class="cite-bracket">]</span></a></sup> </p><p>In January 2013, a bug surrounding the UEFI implementation on some <a href="/wiki/Samsung" title="Samsung">Samsung</a> laptops was publicized, which caused them to be <a href="/wiki/Brick_(electronics)" title="Brick (electronics)">bricked</a> after installing a Linux distribution in UEFI mode. While potential conflicts with a kernel module designed to access system features on Samsung laptops were initially blamed (also prompting kernel maintainers to disable the module on UEFI systems as a safety measure), Matthew Garrett discovered that the bug was actually triggered by storing too many UEFI variables to memory, and that the bug could also be triggered under Windows under certain conditions. In conclusion, he determined that the offending kernel module had caused kernel message dumps to be written to the firmware, thus triggering the bug.<sup id="cite_ref-theh-brickwindows_57-1" class="reference"><a href="#cite_note-theh-brickwindows-57"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-bittech-uefideath_186-0" class="reference"><a href="#cite_note-bittech-uefideath-186"><span class="cite-bracket">[</span>182<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-theh-samsungbrick_187-0" class="reference"><a href="#cite_note-theh-samsungbrick-187"><span class="cite-bracket">[</span>183<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=42" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Bootloader" title="Bootloader">Bootloader</a></li> <li><a href="/wiki/OpenBIOS" title="OpenBIOS">OpenBIOS</a></li> <li><a href="/wiki/UEFI_Platform_Initialization" title="UEFI Platform Initialization">UEFI Platform Initialization</a> (UEFI PI)</li> <li><a href="/wiki/ACPI" title="ACPI">ACPI</a> (Advanced Configuration and Power Interface)</li> <li><a href="/wiki/System_Management_BIOS" title="System Management BIOS">System Management BIOS</a> (SMBIOS)</li> <li><a href="/wiki/Trusted_Platform_Module" title="Trusted Platform Module">Trusted Platform Module</a> (TPM)</li> <li><a href="/wiki/UEFITool" title="UEFITool">UEFITool</a></li> <li><a href="/wiki/MoonBounce" title="MoonBounce">MoonBounce</a></li> <li><a rel="nofollow" class="external text" href="https://github.com/tianocore/edk2-libc/blob/master/AppPkg/Applications/Python/Python-3.6.8/Py368ReadMe.txt">Python Interpreter for UEFI Shell</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="Notes">Notes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=43" title="Edit section: Notes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-lower-alpha"> <div class="mw-references-wrap"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text">Originally started in 1998 as Intel Boot Initiative and later as Extensible Firmware Interface (EFI), which was deprecated in 2005 and replaced by UEFI.</span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text">Part of the BIOS that is required for booting an operating system that is not UEFI-compatible can be implemeted as a CSM DXE module, see <a href="#CSM_booting">§ CSM booting</a></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text">Historically also written as Unified EFI, when UEFI was the newly introduced successor to EFI.</span> </li> <li id="cite_note-note1-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-note1_22-0">^</a></b></span> <span class="reference-text">Large disk support and features such as <a href="/wiki/Advanced_Configuration_and_Power_Interface" class="mw-redirect" title="Advanced Configuration and Power Interface">Advanced Configuration and Power Interface</a> (ACPI) and <a href="/wiki/SMBIOS" class="mw-redirect" title="SMBIOS">System Management BIOS</a> (SMBIOS) were subsequently implemented in BIOS-based systems.</span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=44" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239543626"><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.winbond.com/hq/support/documentation/?__locale=en&line=/product/code-storage-flash-memory/index.html&family=/product/code-storage-flash-memory/serial-nor-flash/index.html&pno=W25X20CL&category=/.categories/resources/datasheet/">"Documentation - Winbond"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Documentation+-+Winbond&rft_id=https%3A%2F%2Fwww.winbond.com%2Fhq%2Fsupport%2Fdocumentation%2F%3F__locale%3Den%26line%3D%2Fproduct%2Fcode-storage-flash-memory%2Findex.html%26family%3D%2Fproduct%2Fcode-storage-flash-memory%2Fserial-nor-flash%2Findex.html%26pno%3DW25X20CL%26category%3D%2F.categories%2Fresources%2Fdatasheet%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ifixit.com/Guide/Microsoft+Surface+Laptop+7+(13.8-inch)+Chip+ID/173921">"Microsoft Surface Laptop 7 (13.8-inch) Chip ID"</a>. 22 June 2024.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Microsoft+Surface+Laptop+7+%2813.8-inch%29+Chip+ID&rft.date=2024-06-22&rft_id=https%3A%2F%2Fwww.ifixit.com%2FGuide%2FMicrosoft%2BSurface%2BLaptop%2B7%2B%2813.8-inch%29%2BChip%2BID%2F173921&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZimmerRothmanMarisetty2017" class="citation book cs1">Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=wylDDgAAQBAJ"><i>Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition</i></a>. Walter de Gruyter GmbH & Co KG. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-5015-0569-0" title="Special:BookSources/978-1-5015-0569-0"><bdi>978-1-5015-0569-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Beyond+BIOS%3A+Developing+with+the+Unified+Extensible+Firmware+Interface%2C+Third+Edition&rft.pub=Walter+de+Gruyter+GmbH+%26+Co+KG&rft.date=2017&rft.isbn=978-1-5015-0569-0&rft.aulast=Zimmer&rft.aufirst=Vincent&rft.au=Rothman%2C+Michael&rft.au=Marisetty%2C+Suresh&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DwylDDgAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-Intel2000-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-Intel2000_7-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKinney2000" class="citation web cs1">Kinney, Michael (1 September 2000). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20070123141151/http://systems.cs.colorado.edu/Documentation/IntelDataSheets/xscalemagazine.pdf">"Solving BIOS Boot Issues with EFI"</a> <span class="cs1-format">(PDF)</span>. pp. 47–50. Archived from <a rel="nofollow" class="external text" href="http://systems.cs.colorado.edu/Documentation/IntelDataSheets/xscalemagazine.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 23 January 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Solving+BIOS+Boot+Issues+with+EFI&rft.pages=47-50&rft.date=2000-09-01&rft.aulast=Kinney&rft.aufirst=Michael&rft_id=http%3A%2F%2Fsystems.cs.colorado.edu%2FDocumentation%2FIntelDataSheets%2Fxscalemagazine.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-ElReg1-8"><span class="mw-cite-backlink">^ <a href="#cite_ref-ElReg1_8-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ElReg1_8-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2011/09/23/ms_denies_uefi_lock_in/">"MS denies secure boot will exclude Linux"</a>. The Register. 23 September 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MS+denies+secure+boot+will+exclude+Linux&rft.date=2011-09-23&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2011%2F09%2F23%2Fms_denies_uefi_lock_in%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.osdev.org/Memory_Map_(x86)">"Memory Map (x86) - OSDev Wiki"</a>. <i>wiki.osdev.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.osdev.org&rft.atitle=Memory+Map+%28x86%29+-+OSDev+Wiki&rft_id=https%3A%2F%2Fwiki.osdev.org%2FMemory_Map_%28x86%29&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-EmulexUEFI-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-EmulexUEFI_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-EmulexUEFI_10-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-EmulexUEFI_10-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-EmulexUEFI_10-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.emulex.com/artifacts/757d23e7-8acb-41a7-872a-afb733ab0688/elx_tb_all_uefi_ibm.pdf">"Emulex UEFI Implementation Delivers Industry-leading Features for IBM Systems"</a> <span class="cs1-format">(PDF)</span>. Emulex<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Emulex+UEFI+Implementation+Delivers+Industry-leading+Features+for+IBM+Systems&rft_id=http%3A%2F%2Fwww.emulex.com%2Fartifacts%2F757d23e7-8acb-41a7-872a-afb733ab0688%2Felx_tb_all_uefi_ibm.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100105051711/http://www.intel.com/technology/efi/"><i>Extensible Firmware Interface (EFI) and Unified EFI (UEFI)</i></a>, Intel, archived from <a rel="nofollow" class="external text" href="http://www.intel.com/technology/efi/">the original</a> on 5 January 2010</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Extensible+Firmware+Interface+%28EFI%29+and+Unified+EFI+%28UEFI%29&rft.pub=Intel&rft_id=http%3A%2F%2Fwww.intel.com%2Ftechnology%2Fefi%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWei2006" class="citation cs2">Wei, Dong (2006), "foreword", <i>Beyond BIOS</i>, Intel Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-9743649-0-2" title="Special:BookSources/978-0-9743649-0-2"><bdi>978-0-9743649-0-2</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=foreword&rft.btitle=Beyond+BIOS&rft.pub=Intel+Press&rft.date=2006&rft.isbn=978-0-9743649-0-2&rft.aulast=Wei&rft.aufirst=Dong&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://www.intel.com/technology/efi/main_specification.htm">"1.10 Specification overview"</a>, <i>Extensible Firmware Interface</i>, Intel</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=1.10+Specification+overview&rft.btitle=Extensible+Firmware+Interface&rft.pub=Intel&rft_id=http%3A%2F%2Fwww.intel.com%2Ftechnology%2Fefi%2Fmain_specification.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/edk">"GitHub - tianocore/Edk: Git mirror of EDK"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. 19 March 2019.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=GitHub+-+tianocore%2FEdk%3A+Git+mirror+of+EDK.&rft.date=2019-03-19&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Fedk&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/tianocore.github.io/wiki/EDK-II">"GitHub - tianocore/Tianocore.github.io: Tianocore website"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. 8 August 2019.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=GitHub+-+tianocore%2FTianocore.github.io%3A+Tianocore+website.&rft.date=2019-08-08&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FEDK-II&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.tianocore.org/">"What is TianoCore?"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What+is+TianoCore%3F&rft_id=https%3A%2F%2Fwww.tianocore.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://www.uefi.org/about/"><i>About</i></a>, Unified EFI Forum, <q>Q: What is the relationship between EFI and UEFI? A: The UEFI specification is based on the EFI 1.10 specification published by Intel with corrections and changes managed by the Unified EFI Forum. Intel still holds the copyright on the EFI 1.10 specification, but has contributed it to the Forum so that the Forum can evolve it. There will be no future versions of the EFI specification, but customers who license it can still use it under the terms of their license from Intel. The license to the Unified EFI Specification comes from the Forum, not from Intel</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=About&rft.pub=Unified+EFI+Forum&rft_id=http%3A%2F%2Fwww.uefi.org%2Fabout%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://betanews.com/2018/12/20/microsoft-project-mu/">"Microsoft announces Project Mu, an open-source release of the UEFI core"</a>. 20 December 2018.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Microsoft+announces+Project+Mu%2C+an+open-source+release+of+the+UEFI+core&rft.date=2018-12-20&rft_id=https%3A%2F%2Fbetanews.com%2F2018%2F12%2F20%2Fmicrosoft-project-mu%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-UEFISpec2.10-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-UEFISpec2.10_19-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf">"Unified Extensible Firmware Interface (UEFI) Specification Version 2.10"</a> <span class="cs1-format">(PDF)</span>. <i>www.uefi.org</i>. August 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">16 January</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.uefi.org&rft.atitle=Unified+Extensible+Firmware+Interface+%28UEFI%29+Specification+Version+2.10&rft.date=2022-08&rft_id=https%3A%2F%2Fuefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FUEFI_Spec_2_10_Aug29.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-UEFI2009Microsoft-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-UEFI2009Microsoft_20-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.microsoft.com/whdc/system/platform/firmware/UEFI_Windows.mspx">"UEFI and Windows"</a>. Microsoft. 15 September 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+and+Windows&rft.pub=Microsoft&rft.date=2009-09-15&rft_id=http%3A%2F%2Fwww.microsoft.com%2Fwhdc%2Fsystem%2Fplatform%2Ffirmware%2FUEFI_Windows.mspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-grub-bios-installation-21"><span class="mw-cite-backlink">^ <a href="#cite_ref-grub-bios-installation_21-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-grub-bios-installation_21-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-grub-bios-installation_21-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gnu.org/software/grub/manual/html_node/BIOS-installation.html">"Installation"</a>. <i>3.4 BIOS installation</i>. <a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRUB</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=3.4+BIOS+installation&rft.atitle=Installation&rft_id=https%3A%2F%2Fwww.gnu.org%2Fsoftware%2Fgrub%2Fmanual%2Fhtml_node%2FBIOS-installation.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-Non-boot_GPT_disk-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-Non-boot_GPT_disk_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://superuser.com/a/1245320/1291014">"Non-boot disks can use a GPT partition table even with no UEFI bios"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Non-boot+disks+can+use+a+GPT+partition+table+even+with+no+UEFI+bios&rft_id=https%3A%2F%2Fsuperuser.com%2Fa%2F1245320%2F1291014&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/oa3-using-on-factory-floor?view=windows-11">"Using the OA 3.0 Tool on the factory floor"</a>. 25 October 2021.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Using+the+OA+3.0+Tool+on+the+factory+floor&rft.date=2021-10-25&rft_id=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fwindows-hardware%2Fmanufacture%2Fdesktop%2Foa3-using-on-factory-floor%3Fview%3Dwindows-11&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/oa3-command-line-config-file-syntax?view=windows-11">"OA 3.0 Tool: Command-line and config file syntax"</a>. 29 July 2021.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=OA+3.0+Tool%3A+Command-line+and+config+file+syntax&rft.date=2021-07-29&rft_id=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fwindows-hardware%2Fmanufacture%2Fdesktop%2Foa3-command-line-config-file-syntax%3Fview%3Dwindows-11&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation report cs1"><a rel="nofollow" class="external text" href="https://h10032.www1.hp.com/ctg/Manual/c03857419.pdf">UEFI pre-boot guidelines and Microsoft® Windows® 8 UEFI Secure Boot for HP Business PCs</a> <span class="cs1-format">(PDF)</span> (Report).</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=report&rft.btitle=UEFI+pre-boot+guidelines+and+Microsoft%C2%AE+Windows%C2%AE+8+UEFI+Secure+Boot+for+HP+Business+PCs&rft_id=https%3A%2F%2Fh10032.www1.hp.com%2Fctg%2FManual%2Fc03857419.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_report" title="Template:Cite report">cite report</a>}}</code>: CS1 maint: url-status (<a href="/wiki/Category:CS1_maint:_url-status" title="Category:CS1 maint: url-status">link</a>)</span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.networkworld.com/article/738394/microsoft-subnet-next-gen-boot-spec-could-forever-lock-linux-off-windows-8-pcs.html">"Next-gen boot spec could forever lock Linux off Windows 8 PCS"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Next-gen+boot+spec+could+forever+lock+Linux+off+Windows+8+PCS&rft_id=https%3A%2F%2Fwww.networkworld.com%2Farticle%2F738394%2Fmicrosoft-subnet-next-gen-boot-spec-could-forever-lock-linux-off-windows-8-pcs.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2011/09/windows-8-secure-boot-will-complicate-linux-installs/">"Windows 8 secure boot could complicate Linux installs"</a>. 21 September 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Windows+8+secure+boot+could+complicate+Linux+installs&rft.date=2011-09-21&rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2011%2F09%2Fwindows-8-secure-boot-will-complicate-linux-installs%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZimmerRothmanMarisetty2017" class="citation book cs1">Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=wylDDgAAQBAJ"><i>Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition</i></a>. Walter de Gruyter GmbH & Co KG. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-5015-0569-0" title="Special:BookSources/978-1-5015-0569-0"><bdi>978-1-5015-0569-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Beyond+BIOS%3A+Developing+with+the+Unified+Extensible+Firmware+Interface%2C+Third+Edition&rft.pub=Walter+de+Gruyter+GmbH+%26+Co+KG&rft.date=2017&rft.isbn=978-1-5015-0569-0&rft.aulast=Zimmer&rft.aufirst=Vincent&rft.au=Rothman%2C+Michael&rft.au=Marisetty%2C+Suresh&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DwylDDgAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text">UEFI Specification 2.4, section 2.3</span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text">UEFI specification 2.3.1, section 1.8.1.</span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/andreiw/ppc64le-edk2">"GitHub - andreiw/ppc64le-edk2: TianoCore UEFI for OPAL/PowerNV (PPC64/PowerPC64 Little-Endian)"</a>. <i>GitHub</i>. 3 May 2021.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=GitHub+-+andreiw%2Fppc64le-edk2%3A+TianoCore+UEFI+for+OPAL%2FPowerNV+%28PPC64%2FPowerPC64+Little-Endian%29&rft.date=2021-05-03&rft_id=https%3A%2F%2Fgithub.com%2Fandreiw%2Fppc64le-edk2&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://firmwaresecurity.com/2015/10/12/tianocore-for-openpower/comment-page-1/">"Tianocore for OpenPOWER"</a>. <i>Firmware Security</i>. 12 October 2015.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Firmware+Security&rft.atitle=Tianocore+for+OpenPOWER&rft.date=2015-10-12&rft_id=http%3A%2F%2Ffirmwaresecurity.com%2F2015%2F10%2F12%2Ftianocore-for-openpower%2Fcomment-page-1%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFkontais2015" class="citation web cs1">kontais (3 September 2015). <a rel="nofollow" class="external text" href="http://sourceforge.net/projects/efi-mips/">"EFI-MIPS"</a>. <i>SourceForge</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=SourceForge&rft.atitle=EFI-MIPS&rft.date=2015-09-03&rft.au=kontais&rft_id=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fefi-mips%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.lowrisc.org/">"lowRISC · lowRISC"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=lowRISC+%C2%B7+lowRISC&rft_id=http%3A%2F%2Fwww.lowrisc.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.uefi.org/sites/default/files/resources/UEFI_Spec_2_7.pdf">"Unified Extensible Firmware Interface Specification, Version 2.7"</a> <span class="cs1-format">(PDF)</span>. May 2017.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Unified+Extensible+Firmware+Interface+Specification%2C+Version+2.7&rft.date=2017-05&rft_id=http%3A%2F%2Fwww.uefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FUEFI_Spec_2_7.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-BitTechUEFI-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-BitTechUEFI_37-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHardwidge2010" class="citation news cs1">Hardwidge, Ben (1 June 2010). <a rel="nofollow" class="external text" href="http://www.bit-tech.net/hardware/storage/2010/06/01/are-we-ready-for-3tb-hard-disks/2">"LBA explained — Solving the 3TB Problem?"</a>. bit-tech<span class="reference-accessdate">. Retrieved <span class="nowrap">18 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=LBA+explained+%E2%80%94+Solving+the+3TB+Problem%3F&rft.date=2010-06-01&rft.aulast=Hardwidge&rft.aufirst=Ben&rft_id=http%3A%2F%2Fwww.bit-tech.net%2Fhardware%2Fstorage%2F2010%2F06%2F01%2Fare-we-ready-for-3tb-hard-disks%2F2&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-AskBIOSGuyWhyUEFI-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-AskBIOSGuyWhyUEFI_38-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichardson2010" class="citation news cs1">Richardson, Brian (10 May 2010). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20101009214219/http://community.edc.intel.com/t5/New-to-Intel-Architecture-Blog/Ask-a-BIOS-Guy-quot-Why-UEFI-quot/ba-p/2781">"Ask a BIOS Guy: "Why UEFI"<span class="cs1-kern-right"></span>"</a>. Intel Architecture Blog. Archived from <a rel="nofollow" class="external text" href="http://community.edc.intel.com/t5/New-to-Intel-Architecture-Blog/Ask-a-BIOS-Guy-quot-Why-UEFI-quot/ba-p/2781">the original</a> on 9 October 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">18 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Ask+a+BIOS+Guy%3A+%22Why+UEFI%22&rft.date=2010-05-10&rft.aulast=Richardson&rft.aufirst=Brian&rft_id=http%3A%2F%2Fcommunity.edc.intel.com%2Ft5%2FNew-to-Intel-Architecture-Blog%2FAsk-a-BIOS-Guy-quot-Why-UEFI-quot%2Fba-p%2F2781&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-WinHec2008UEFI-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-WinHec2008UEFI_39-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSimpson" class="citation news cs1">Simpson, Gary. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140104004546/http://download.microsoft.com/download/5/e/6/5e66b27b-988b-4f50-af3a-c2ff1e62180f/cor-t605_wh08.pptx">"UEFI Momentum — The AMD perspective"</a>. AMD. Archived from <a rel="nofollow" class="external text" href="http://download.microsoft.com/download/5/e/6/5e66b27b-988b-4f50-af3a-c2ff1e62180f/cor-t605_wh08.pptx">the original</a> <span class="cs1-format">(PPTX)</span> on 4 January 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">20 September</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UEFI+Momentum+%E2%80%94+The+AMD+perspective&rft.aulast=Simpson&rft.aufirst=Gary&rft_id=http%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F5%2Fe%2F6%2F5e66b27b-988b-4f50-af3a-c2ff1e62180f%2Fcor-t605_wh08.pptx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-uefi-spec-24-40"><span class="mw-cite-backlink">^ <a href="#cite_ref-uefi-spec-24_40-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-4"><sup><i><b>e</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-5"><sup><i><b>f</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-6"><sup><i><b>g</b></i></sup></a> <a href="#cite_ref-uefi-spec-24_40-7"><sup><i><b>h</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.uefi.org/specifications">"UEFI Specifications (version 2.4 and older)"</a> <span class="cs1-format">(PDF)</span>. Unified EFI, Inc. June 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+Specifications+%28version+2.4+and+older%29&rft.pub=Unified+EFI%2C+Inc.&rft.date=2013-06&rft_id=http%3A%2F%2Fwww.uefi.org%2Fspecifications&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://kernelnewbies.org/Linux_3.15#head-e6cf8178e4d5eafc23b0abda81974d2b71ffecf4">"Linux kernel 3.15, Section 1.3. EFI 64-bit kernels can be booted from 32-bit firmware"</a>. <i>kernelnewbies.org</i>. 8 June 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">15 June</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=kernelnewbies.org&rft.atitle=Linux+kernel+3.15%2C+Section+1.3.+EFI+64-bit+kernels+can+be+booted+from+32-bit+firmware&rft.date=2014-06-08&rft_id=http%3A%2F%2Fkernelnewbies.org%2FLinux_3.15%23head-e6cf8178e4d5eafc23b0abda81974d2b71ffecf4&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://lwn.net/Articles/507827/">"x86, efi: Handover Protocol"</a>. <a href="/wiki/LWN.net" title="LWN.net">LWN.net</a>. 19 July 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">15 June</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=x86%2C+efi%3A+Handover+Protocol&rft.pub=LWN.net&rft.date=2012-07-19&rft_id=https%3A%2F%2Flwn.net%2FArticles%2F507827%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.kernel.org/doc/Documentation/efi-stub.txt">"Linux kernel documentation: Documentation/efi-stub.txt"</a>. <a href="/wiki/Kernel.org" title="Kernel.org">kernel.org</a>. 1 February 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">15 June</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Linux+kernel+documentation%3A+Documentation%2Fefi-stub.txt&rft.pub=kernel.org&rft.date=2014-02-01&rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2FDocumentation%2Fefi-stub.txt&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-UEFI_Drive_Partition_Limits_Fact_Sheet-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-UEFI_Drive_Partition_Limits_Fact_Sheet_44-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.uefi.org/sites/default/files/resources/UEFI_Drive_Partition_Limits_Fact_Sheet.pdf">"FAQ: Drive Partition Limits"</a> <span class="cs1-format">(PDF)</span>. UEFI Forum<span class="reference-accessdate">. Retrieved <span class="nowrap">5 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=FAQ%3A+Drive+Partition+Limits&rft_id=http%3A%2F%2Fwww.uefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FUEFI_Drive_Partition_Limits_Fact_Sheet.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-UEFIDrivePartitionFAQ-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-UEFIDrivePartitionFAQ_45-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130322172831/http://www.uefi.org/learning_center/UEFI_MBR_Limits_v2.pdf">"FAQ: Drive Partition Limits"</a> <span class="cs1-format">(PDF)</span>. UEFI Forum. Archived from <a rel="nofollow" class="external text" href="http://www.uefi.org/learning_center/UEFI_MBR_Limits_v2.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 22 March 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=FAQ%3A+Drive+Partition+Limits&rft_id=http%3A%2F%2Fwww.uefi.org%2Flearning_center%2FUEFI_MBR_Limits_v2.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-IBMLargeDrivesGPT-46"><span class="mw-cite-backlink">^ <a href="#cite_ref-IBMLargeDrivesGPT_46-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-IBMLargeDrivesGPT_46-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-IBMLargeDrivesGPT_46-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-IBMLargeDrivesGPT_46-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2012" class="citation web cs1">Smith, Roderick W. (3 July 2012). <a rel="nofollow" class="external text" href="http://www.ibm.com/developerworks/library/l-gpt/index.html">"Make the most of large drives with GPT and Linux"</a>. <a href="/wiki/IBM" title="IBM">IBM</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Make+the+most+of+large+drives+with+GPT+and+Linux&rft.pub=IBM&rft.date=2012-07-03&rft.aulast=Smith&rft.aufirst=Roderick+W.&rft_id=http%3A%2F%2Fwww.ibm.com%2Fdeveloperworks%2Flibrary%2Fl-gpt%2Findex.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/tree/block/partitions/Kconfig?id=refs/tags/v3.11.1#n247">"block/partitions/Kconfig (3.11.1)"</a>. <i>CONFIG_EFI_PARTITION (line #247)</i>. kernel.org<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CONFIG_EFI_PARTITION+%28line+%23247%29&rft.atitle=block%2Fpartitions%2FKconfig+%283.11.1%29&rft_id=https%3A%2F%2Fgit.kernel.org%2Fcgit%2Flinux%2Fkernel%2Fgit%2Fstable%2Flinux-stable.git%2Ftree%2Fblock%2Fpartitions%2FKconfig%3Fid%3Drefs%2Ftags%2Fv3.11.1%23n247&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-grub-48"><span class="mw-cite-backlink">^ <a href="#cite_ref-arch-grub_48-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-arch-grub_48-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-arch-grub_48-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/GRUB#BIOS_systems">"GRUB"</a>. <i>BIOS systems</i>. <a href="/wiki/Arch_Linux" title="Arch Linux">Arch Linux</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=BIOS+systems&rft.atitle=GRUB&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FGRUB%23BIOS_systems&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Installation_Guide/s2-grub-whatis-booting-uefi.html">"GRUB and the boot process on UEFI-based x86 systems"</a>. <i>redhat.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=redhat.com&rft.atitle=GRUB+and+the+boot+process+on+UEFI-based+x86+systems&rft_id=https%3A%2F%2Faccess.redhat.com%2Fsite%2Fdocumentation%2Fen-US%2FRed_Hat_Enterprise_Linux%2F6%2Fhtml%2FInstallation_Guide%2Fs2-grub-whatis-booting-uefi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://blog.fpmurphy.com/2010/09/uefi-booting-64-bit-redhat-enterprise-linux-6.html">"UEFI Booting 64-bit Redhat Enterprise Linux 6"</a>. <i>fpmurphy.com</i>. September 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=fpmurphy.com&rft.atitle=UEFI+Booting+64-bit+Redhat+Enterprise+Linux+6&rft.date=2010-09&rft_id=http%3A%2F%2Fblog.fpmurphy.com%2F2010%2F09%2Fuefi-booting-64-bit-redhat-enterprise-linux-6.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-uefi-loaders-51"><span class="mw-cite-backlink">^ <a href="#cite_ref-arch-uefi-loaders_51-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-arch-uefi-loaders_51-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/UEFI_Bootloaders">"UEFI Bootloaders"</a>. <i>archlinux.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=archlinux.org&rft.atitle=UEFI+Bootloaders&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FUEFI_Bootloaders&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-uefi-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-arch-uefi_52-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/Unified_Extensible_Firmware_Interface#EFI_System_Partition">"Unified Extensible Firmware Interface: EFI System Partition"</a>. <i>archlinux.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=archlinux.org&rft.atitle=Unified+Extensible+Firmware+Interface%3A+EFI+System+Partition&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FUnified_Extensible_Firmware_Interface%23EFI_System_Partition&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-forum-uefi-mbr-53"><span class="mw-cite-backlink">^ <a href="#cite_ref-arch-forum-uefi-mbr_53-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-arch-forum-uefi-mbr_53-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-arch-forum-uefi-mbr_53-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-arch-forum-uefi-mbr_53-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://bbs.archlinux.org/viewtopic.php?id=142637">"UEFI system booting from MBR partition table and GRUB legacy"</a>. Arch Linux Forums. June 2012. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20231208223031/https://bbs.archlinux.org/viewtopic.php?id=142637">Archived</a> from the original on 8 December 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">6 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+system+booting+from+MBR+partition+table+and+GRUB+legacy&rft.pub=Arch+Linux+Forums&rft.date=2012-06&rft_id=https%3A%2F%2Fbbs.archlinux.org%2Fviewtopic.php%3Fid%3D142637&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.cl.cam.ac.uk/~mgk25/mswish/ut-rtc.html">IBM PC Real Time Clock should run in UT</a>. Cl.cam.ac.uk. Retrieved on 30 October 2013.</span> </li> <li id="cite_note-Matthew_Garrett-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-Matthew_Garrett_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Matthew_Garrett_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGarrett2012" class="citation web cs1">Garrett, Matthew (19 January 2012). <a rel="nofollow" class="external text" href="https://www.youtube.com/watch?v=V2aq5M3Q76U#t=14m45s">"EFI and Linux: The Future Is Here, and It's Awful"</a>. <i><a href="/wiki/Linux.conf.au" title="Linux.conf.au">linux.conf.au</a> 2012</i>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/varchive/youtube/20211113/V2aq5M3Q76U">Archived</a> from the original on 13 November 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">2 April</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=linux.conf.au+2012&rft.atitle=EFI+and+Linux%3A+The+Future+Is+Here%2C+and+It%27s+Awful&rft.date=2012-01-19&rft.aulast=Garrett&rft.aufirst=Matthew&rft_id=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DV2aq5M3Q76U%23t%3D14m45s&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.kernel.org/doc/html/latest/fb/efifb.html">"What is efifb? — The Linux Kernel documentation"</a>. <i>www.kernel.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">24 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.kernel.org&rft.atitle=What+is+efifb%3F+%E2%80%94+The+Linux+Kernel+documentation&rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2Fhtml%2Flatest%2Ffb%2Fefifb.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-theh-brickwindows-57"><span class="mw-cite-backlink">^ <a href="#cite_ref-theh-brickwindows_57-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-theh-brickwindows_57-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.h-online.com/open/news/item/Samsung-UEFI-bug-Notebook-bricked-from-Windows-1801439.html">"Samsung UEFI bug: Notebook bricked from Windows"</a>. The H<span class="reference-accessdate">. Retrieved <span class="nowrap">27 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Samsung+UEFI+bug%3A+Notebook+bricked+from+Windows&rft.pub=The+H&rft_id=http%3A%2F%2Fwww.h-online.com%2Fopen%2Fnews%2Fitem%2FSamsung-UEFI-bug-Notebook-bricked-from-Windows-1801439.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text">UEFI specification, section 7.3</span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://efi.akeo.ie/">"Free Software EFI Drivers"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Free+Software+EFI+Drivers&rft_id=https%3A%2F%2Fefi.akeo.ie%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBatard2020" class="citation web cs1">Batard, Pete (13 March 2020). <a rel="nofollow" class="external text" href="https://github.com/pbatard/uefi-ntfs">"pbatard/uefi-ntfs"</a>. <i>GitHub</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=pbatard%2Fuefi-ntfs&rft.date=2020-03-13&rft.aulast=Batard&rft.aufirst=Pete&rft_id=https%3A%2F%2Fgithub.com%2Fpbatard%2Fuefi-ntfs&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.intel.com/content/www/us/en/intelligent-systems/intel-embedded-graphics-drivers/faq-bios-firmware.html">"Intel Embedded Graphics Drivers FAQ: BIOS and firmware"</a>. <a href="/wiki/Intel" title="Intel">Intel</a><span class="reference-accessdate">. Retrieved <span class="nowrap">19 May</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Intel+Embedded+Graphics+Drivers+FAQ%3A+BIOS+and+firmware&rft.pub=Intel&rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fintelligent-systems%2Fintel-embedded-graphics-drivers%2Ffaq-bios-firmware.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-uefi-spec-2.5-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-uefi-spec-2.5_62-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.uefi.org/sites/default/files/resources/UEFI%202_5.pdf#page=536">"UEFI Specification Version 2.5, Section 12.3 File System Format"</a> <span class="cs1-format">(PDF)</span>. <i>uefi.org</i>. April 2015. pp. 536, 537<span class="reference-accessdate">. Retrieved <span class="nowrap">29 May</span> 2015</span>. <q>The file system supported by the Extensible Firmware Interface is based on the FAT file system. EFI defines a specific version of FAT that is explicitly documented and testable. Conformance to the EFI specification and its associate reference documents is the only definition of FAT that needs to be implemented to support EFI. To differentiate the EFI file system from pure FAT, a new partition file system type has been defined.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=uefi.org&rft.atitle=UEFI+Specification+Version+2.5%2C+Section+12.3+File+System+Format&rft.pages=536%2C+537&rft.date=2015-04&rft_id=http%3A%2F%2Fwww.uefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FUEFI%25202_5.pdf%23page%3D536&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://developer.apple.com/library/mac/technotes/tn2166/_index.html#//apple_ref/doc/uid/DTS10003927-CH1-SUBSECTION6">"Technical Note TN2166: Secrets of the GPT"</a>. <i>developer.apple.com</i>. 6 November 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">6 May</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=developer.apple.com&rft.atitle=Technical+Note+TN2166%3A+Secrets+of+the+GPT&rft.date=2006-11-06&rft_id=https%3A%2F%2Fdeveloper.apple.com%2Flibrary%2Fmac%2Ftechnotes%2Ftn2166%2F_index.html%23%2F%2Fapple_ref%2Fdoc%2Fuid%2FDTS10003927-CH1-SUBSECTION6&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.osdev.org/UEFI">"UEFI - OSDev Wiki"</a>. <i>wiki.osdev.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">26 September</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.osdev.org&rft.atitle=UEFI+-+OSDev+Wiki&rft_id=https%3A%2F%2Fwiki.osdev.org%2FUEFI&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/EFISTUB">"EFISTUB - ArchWiki"</a>. <i>wiki.archlinux.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.archlinux.org&rft.atitle=EFISTUB+-+ArchWiki&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FEFISTUB&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-intel-csm-r097-66"><span class="mw-cite-backlink">^ <a href="#cite_ref-intel-csm-r097_66-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-intel-csm-r097_66-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.intel.com/content/dam/doc/reference-guide/efi-compatibility-support-module-specification-v097.pdf">"Intel® Platform Innovation Framework for EFI"</a> <span class="cs1-format">(PDF)</span>. <i>Compatibility Support Module Specification (revision 0.97)</i>. Intel. 4 September 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">6 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Compatibility+Support+Module+Specification+%28revision+0.97%29&rft.atitle=Intel%C2%AE+Platform+Innovation+Framework+for+EFI&rft.date=2007-09-04&rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fdoc%2Freference-guide%2Fefi-compatibility-support-module-specification-v097.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/gadgets/2017/11/intel-to-kill-off-the-last-vestiges-of-the-ancient-pc-bios-by-2020/">"The PC BIOS will be killed off by 2020 as Intel plans move to pure UEFI"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">29 May</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Ars+Technica&rft.atitle=The+PC+BIOS+will+be+killed+off+by+2020+as+Intel+plans+move+to+pure+UEFI&rft_id=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2017%2F11%2Fintel-to-kill-off-the-last-vestiges-of-the-ancient-pc-bios-by-2020%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://securelist.com/cosmicstrand-uefi-firmware-rootkit/106973/">"CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit"</a>. <i>Securelist by Kaspersky</i><span class="reference-accessdate">. Retrieved <span class="nowrap">4 August</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Securelist+by+Kaspersky&rft.atitle=CosmicStrand%3A+the+discovery+of+a+sophisticated+UEFI+firmware+rootkit&rft_id=https%3A%2F%2Fsecurelist.com%2Fcosmicstrand-uefi-firmware-rootkit%2F106973%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/content-details/630266/removal-of-legacy-boot-support-for-intel-platforms-technical-advisory.html">"Removal of Legacy Boot Support for Intel Platforms Technical Advisory"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Removal+of+Legacy+Boot+Support+for+Intel+Platforms+Technical+Advisory&rft_id=https%3A%2F%2Fwww.intel.com%2Fcontent%2Fwww%2Fus%2Fen%2Fcontent-details%2F630266%2Fremoval-of-legacy-boot-support-for-intel-platforms-technical-advisory.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Installation_Guide/s1-netboot-pxe-config-efi.html">"Red Hat Enterprise Linux 6 Installation Guide"</a>. <i>30.2.2. Configuring PXE boot for EFI</i>. <a href="/wiki/Red_Hat" title="Red Hat">Red Hat</a><span class="reference-accessdate">. Retrieved <span class="nowrap">9 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=30.2.2.+Configuring+PXE+boot+for+EFI&rft.atitle=Red+Hat+Enterprise+Linux+6+Installation+Guide&rft_id=https%3A%2F%2Faccess.redhat.com%2Fsite%2Fdocumentation%2Fen-US%2FRed_Hat_Enterprise_Linux%2F6%2Fhtml%2FInstallation_Guide%2Fs1-netboot-pxe-config-efi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEl-Haj-Mahmoud2013" class="citation web cs1">El-Haj-Mahmoud, Samer (July 2013). <a rel="nofollow" class="external text" href="http://www.uefi.org/sites/default/files/resources/UEFI_Summit_July_2013_UEFI2.4_Networking.pdf">"Advances in Pre-OS Networking in UEFI 2.4"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">Hewlett-Packard</a><span class="reference-accessdate">. Retrieved <span class="nowrap">29 May</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Advances+in+Pre-OS+Networking+in+UEFI+2.4&rft.pub=Hewlett-Packard&rft.date=2013-07&rft.aulast=El-Haj-Mahmoud&rft.aufirst=Samer&rft_id=http%3A%2F%2Fwww.uefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FUEFI_Summit_July_2013_UEFI2.4_Networking.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRacherlaErdenbergerRajagopalRuth2014" class="citation book cs1">Racherla, Sangam; Erdenberger, Silvio; Rajagopal, Harish; Ruth, Kai (January 2014). <a rel="nofollow" class="external text" href="http://www.redbooks.ibm.com/redbooks/pdfs/sg247986.pdf"><i>Storage and Network Convergence Using FCoE and iSCSI</i></a> <span class="cs1-format">(PDF)</span> (2nd ed.). IBM Redbooks<span class="reference-accessdate">. Retrieved <span class="nowrap">20 April</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Storage+and+Network+Convergence+Using+FCoE+and+iSCSI&rft.edition=2nd&rft.pub=IBM+Redbooks&rft.date=2014-01&rft.aulast=Racherla&rft.aufirst=Sangam&rft.au=Erdenberger%2C+Silvio&rft.au=Rajagopal%2C+Harish&rft.au=Ruth%2C+Kai&rft_id=http%3A%2F%2Fwww.redbooks.ibm.com%2Fredbooks%2Fpdfs%2Fsg247986.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://firmwaresecurity.com/2015/05/09/new-uefi-http-boot-support-in-uefi-2-5/">"New UEFI HTTP Boot support in UEFI 2.5"</a>. <i>firmwaresecurity.com</i>. 9 May 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">13 August</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=firmwaresecurity.com&rft.atitle=New+UEFI+HTTP+Boot+support+in+UEFI+2.5&rft.date=2015-05-09&rft_id=http%3A%2F%2Ffirmwaresecurity.com%2F2015%2F05%2F09%2Fnew-uefi-http-boot-support-in-uefi-2-5%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/hh824987.aspx">"Secure Boot Overview"</a>. Microsoft. 10 December 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Secure+Boot+Overview&rft.pub=Microsoft&rft.date=2014-12-10&rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fhh824987.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-uefi-secureboot-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-uefi-secureboot_75-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEdge" class="citation web cs1">Edge, Jake. <a rel="nofollow" class="external text" href="https://lwn.net/Articles/447381/">"UEFI and "secure boot"<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/LWN.net" title="LWN.net">LWN.net</a></i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=LWN.net&rft.atitle=UEFI+and+%22secure+boot%22&rft.aulast=Edge&rft.aufirst=Jake&rft_id=https%3A%2F%2Flwn.net%2FArticles%2F447381%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-pcw-ueficontroversy-76"><span class="mw-cite-backlink">^ <a href="#cite_ref-pcw-ueficontroversy_76-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-pcw-ueficontroversy_76-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pcworld.com/article/248342/windows_8_secure_boot_the_controversy_continues.html">"Windows 8 Secure Boot: The Controversy Continues"</a>. <i>PC World</i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=PC+World&rft.atitle=Windows+8+Secure+Boot%3A+The+Controversy+Continues&rft_id=https%3A%2F%2Fwww.pcworld.com%2Farticle%2F248342%2Fwindows_8_secure_boot_the_controversy_continues.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://blogs.vmware.com/vsphere/2017/05/secure-boot-esxi-6-5-hypervisor-assurance.html">"Secure Boot for ESXi 6.5 - Hypervisor Assurance"</a>. <i>VMware vSphere Blog</i>. 4 May 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">18 August</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=VMware+vSphere+Blog&rft.atitle=Secure+Boot+for+ESXi+6.5+-+Hypervisor+Assurance&rft.date=2017-05-04&rft_id=https%3A%2F%2Fblogs.vmware.com%2Fvsphere%2F2017%2F05%2Fsecure-boot-esxi-6-5-hypervisor-assurance.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://wiki.centos.org/HowTos/UEFI">HowTos/UEFI - CentOS Wiki</a></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLarabel2018" class="citation web cs1">Larabel, Michael (30 April 2018). <a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&px=Debian-UEFI-SecureBoot-2018">"Debian Making Progress on UEFI SecureBoot Support in 2018"</a>. <i>Phoronix</i>. Phoronix Media<span class="reference-accessdate">. Retrieved <span class="nowrap">23 May</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Phoronix&rft.atitle=Debian+Making+Progress+on+UEFI+SecureBoot+Support+in+2018&rft.date=2018-04-30&rft.aulast=Larabel&rft.aufirst=Michael&rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DDebian-UEFI-SecureBoot-2018&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGarrett2012" class="citation web cs1">Garrett, Matthew (27 December 2012). <a rel="nofollow" class="external text" href="http://mjg59.dreamwidth.org/20522.html">"Secure Boot distribution support"</a>. <i>Mjg59.dreamwidth.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Mjg59.dreamwidth.org&rft.atitle=Secure+Boot+distribution+support&rft.date=2012-12-27&rft.aulast=Garrett&rft.aufirst=Matthew&rft_id=http%3A%2F%2Fmjg59.dreamwidth.org%2F20522.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.linuxmint.com/rel_virginia_whatsnew.php">"Linux Mint Secure boot"</a>. <i>Linux Mint</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 January</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Linux+Mint&rft.atitle=Linux+Mint+Secure+boot&rft_id=https%3A%2F%2Fwww.linuxmint.com%2Frel_virginia_whatsnew.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.almalinux.org/release-notes/8.4.html">"8.4 | AlmaLinux Wiki"</a>. <i>wiki.almalinux.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">10 April</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.almalinux.org&rft.atitle=8.4+%7C+AlmaLinux+Wiki&rft_id=https%3A%2F%2Fwiki.almalinux.org%2Frelease-notes%2F8.4.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.freebsd.org/SecureBoot">"SecureBoot"</a>. <i>FreeBSD Wiki</i>. FreeBSD<span class="reference-accessdate">. Retrieved <span class="nowrap">16 June</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=FreeBSD+Wiki&rft.atitle=SecureBoot&rft_id=https%3A%2F%2Fwiki.freebsd.org%2FSecureBoot&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-uefi-shell-84"><span class="mw-cite-backlink">^ <a href="#cite_ref-arch-uefi-shell_84-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-arch-uefi-shell_84-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/Unified_Extensible_Firmware_Interface#UEFI_Shell">"Unified Extensible Firmware Interface"</a>. <i>UEFI Shell</i>. <a href="/wiki/Arch_Linux" title="Arch Linux">Arch Linux</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=UEFI+Shell&rft.atitle=Unified+Extensible+Firmware+Interface&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FUnified_Extensible_Firmware_Interface%23UEFI_Shell&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-EFI-Shells-and-Scripting-85"><span class="mw-cite-backlink">^ <a href="#cite_ref-EFI-Shells-and-Scripting_85-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-EFI-Shells-and-Scripting_85-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://software.intel.com/en-us/articles/efi-shells-and-scripting/">"EFI Shells and Scripting"</a>. <a href="/wiki/Intel" title="Intel">Intel</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=EFI+Shells+and+Scripting&rft.pub=Intel&rft_id=http%3A%2F%2Fsoftware.intel.com%2Fen-us%2Farticles%2Fefi-shells-and-scripting%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-uefi-shell-spec-2-86"><span class="mw-cite-backlink">^ <a href="#cite_ref-uefi-shell-spec-2_86-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-uefi-shell-spec-2_86-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.uefi.org/specifications">"UEFI Shell Specification Version 2.0, Errata A"</a> <span class="cs1-format">(PDF)</span>. Unified EFI, Inc. May 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+Shell+Specification+Version+2.0%2C+Errata+A&rft.pub=Unified+EFI%2C+Inc.&rft.date=2012-05&rft_id=http%3A%2F%2Fwww.uefi.org%2Fspecifications&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/tianocore.github.io/wiki/ShellPkg">"EDK2: ShellPkg"</a>. <i>GitHub</i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 March</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=EDK2%3A+ShellPkg&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FShellPkg&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/edk2/releases/">"tianocore/edk2: releases"</a>. <i>GitHub</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=tianocore%2Fedk2%3A+releases&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Fedk2%2Freleases%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://sourceforge.net/mailarchive/message.php?msg_id=28690732">"Email Archive: edk2-devel"</a>. <i>[edk2] Inclusion of UEFI shell in Linux distro iso</i>. <a href="/wiki/SourceForge" title="SourceForge">SourceForge</a>. 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=%5Bedk2%5D+Inclusion+of+UEFI+shell+in+Linux+distro+iso&rft.atitle=Email+Archive%3A+edk2-devel&rft.date=2012&rft_id=http%3A%2F%2Fsourceforge.net%2Fmailarchive%2Fmessage.php%3Fmsg_id%3D28690732&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=Shell_FAQ">"TianoCore on SourceForge"</a>. <i>Shell FAQ</i>. <a href="/wiki/Intel" title="Intel">Intel</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Shell+FAQ&rft.atitle=TianoCore+on+SourceForge&rft_id=http%3A%2F%2Fsourceforge.net%2Fapps%2Fmediawiki%2Ftianocore%2Findex.php%3Ftitle%3DShell_FAQ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arch-uefi-shell-launching-91"><span class="mw-cite-backlink">^ <a href="#cite_ref-arch-uefi-shell-launching_91-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-arch-uefi-shell-launching_91-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/Unified_Extensible_Firmware_Interface#Launching_UEFI_Shell">"Unified Extensible Firmware Interface"</a>. <i>Launching UEFI Shell</i>. <a href="/wiki/Arch_Linux" title="Arch Linux">Arch Linux</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Launching+UEFI+Shell&rft.atitle=Unified+Extensible+Firmware+Interface&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FUnified_Extensible_Firmware_Interface%23Launching_UEFI_Shell&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://download.intel.com/support/motherboards/server/sb/efi_whitepaper.pdf">"Basic Instructions for Using EFI for Server Configuration on Intel® Server Boards and Intel® Server Systems"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Intel" title="Intel">Intel</a>. 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Basic+Instructions+for+Using+EFI+for+Server+Configuration+on+Intel%C2%AE+Server+Boards+and+Intel%C2%AE+Server+Systems&rft.pub=Intel&rft.date=2008&rft_id=http%3A%2F%2Fdownload.intel.com%2Fsupport%2Fmotherboards%2Fserver%2Fsb%2Fefi_whitepaper.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/Unified_Extensible_Firmware_Interface#bcfg">"Unified Extensible Firmware Interface"</a>. <i>bcfg</i>. <a href="/wiki/Arch_Linux" title="Arch Linux">Arch Linux</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=bcfg&rft.atitle=Unified+Extensible+Firmware+Interface&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FUnified_Extensible_Firmware_Interface%23bcfg&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.archlinux.org/index.php/GRUB_EFI_Examples#Asus">"GRUB EFI Examples"</a>. <i>Asus</i>. <a href="/wiki/Arch_Linux" title="Arch Linux">Arch Linux</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Asus&rft.atitle=GRUB+EFI+Examples&rft_id=https%3A%2F%2Fwiki.archlinux.org%2Findex.php%2FGRUB_EFI_Examples%23Asus&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://tianocore-docs.github.io/Understanding_UEFI_Secure_Boot_Chain/draft/secure_boot_chain_in_uefi/boot_chain__putting_it_all_together/signed-capsule-update">"Signed Capsule Update"</a>. <i>tianocore-docs.github.io</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=tianocore-docs.github.io&rft.atitle=Signed+Capsule+Update&rft_id=https%3A%2F%2Ftianocore-docs.github.io%2FUnderstanding_UEFI_Secure_Boot_Chain%2Fdraft%2Fsecure_boot_chain_in_uefi%2Fboot_chain__putting_it_all_together%2Fsigned-capsule-update&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFbarrygolden" class="citation web cs1">barrygolden. <a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows-hardware/drivers/bringup/windows-uefi-firmware-update-platform">"Windows UEFI firmware update platform - Windows drivers"</a>. <i>docs.microsoft.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=docs.microsoft.com&rft.atitle=Windows+UEFI+firmware+update+platform+-+Windows+drivers&rft.au=barrygolden&rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-hardware%2Fdrivers%2Fbringup%2Fwindows-uefi-firmware-update-platform&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.microchip.com/en-us/products/memory/serial-and-parallel-flash/getting-started">"Getting Started | Microchip Technology"</a>. <i>www.microchip.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">24 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.microchip.com&rft.atitle=Getting+Started+%7C+Microchip+Technology&rft_id=https%3A%2F%2Fwww.microchip.com%2Fen-us%2Fproducts%2Fmemory%2Fserial-and-parallel-flash%2Fgetting-started&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/FrameworkComputer/Framework-Laptop-16/blob/main/Mainboard/Mainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.pdf">"Framework-Laptop-16/Mainboard/Mainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.PDF at main · FrameworkComputer/Framework-Laptop-16"</a> <span class="cs1-format">(PDF)</span>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=Framework-Laptop-16%2FMainboard%2FMainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.PDF+at+main+%C2%B7+FrameworkComputer%2FFramework-Laptop-16&rft_id=https%3A%2F%2Fgithub.com%2FFrameworkComputer%2FFramework-Laptop-16%2Fblob%2Fmain%2FMainboard%2FMainboard_Interfaces_Schematic_Framework_Laptop_16_7040_Series.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-99">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarryCrowley2012" class="citation book cs1">Barry, Peter; Crowley, Patrick (2012). <a rel="nofollow" class="external text" href="https://www.worldcat.org/oclc/810455404"><i>Modern embedded computing : designing connected, pervasive, media-rich systems</i></a>. Waltham, MA: <a href="/wiki/Morgan_Kaufmann_Publishers" title="Morgan Kaufmann Publishers">Morgan Kaufmann Publishers</a>. p. 169. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-12-394407-8" title="Special:BookSources/978-0-12-394407-8"><bdi>978-0-12-394407-8</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/810455404">810455404</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Modern+embedded+computing+%3A+designing+connected%2C+pervasive%2C+media-rich+systems&rft.place=Waltham%2C+MA&rft.pages=169&rft.pub=Morgan+Kaufmann+Publishers&rft.date=2012&rft_id=info%3Aoclcnum%2F810455404&rft.isbn=978-0-12-394407-8&rft.aulast=Barry&rft.aufirst=Peter&rft.au=Crowley%2C+Patrick&rft_id=https%3A%2F%2Fwww.worldcat.org%2Foclc%2F810455404&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-100">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="https://tweakers.net/nieuws/131947/intel-schrapt-bios-compatibiliteit-uefi-in-2020.html">"Intel schrapt bios-compatibiliteit uefi in 2020"</a>. <i><a href="/wiki/Tweakers" title="Tweakers">Tweakers</a></i> (in Dutch)<span class="reference-accessdate">. Retrieved <span class="nowrap">30 December</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Tweakers&rft.atitle=Intel+schrapt+bios-compatibiliteit+uefi+in+2020&rft_id=https%3A%2F%2Ftweakers.net%2Fnieuws%2F131947%2Fintel-schrapt-bios-compatibiliteit-uefi-in-2020.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZimmerRothmanMarisetty2017" class="citation book cs1">Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=wylDDgAAQBAJ"><i>Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition</i></a>. Walter de Gruyter GmbH & Co KG. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-5015-0569-0" title="Special:BookSources/978-1-5015-0569-0"><bdi>978-1-5015-0569-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Beyond+BIOS%3A+Developing+with+the+Unified+Extensible+Firmware+Interface%2C+Third+Edition&rft.pub=Walter+de+Gruyter+GmbH+%26+Co+KG&rft.date=2017&rft.isbn=978-1-5015-0569-0&rft.aulast=Zimmer&rft.aufirst=Vincent&rft.au=Rothman%2C+Michael&rft.au=Marisetty%2C+Suresh&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DwylDDgAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZimmerRothmanMarisetty2017" class="citation book cs1">Zimmer, Vincent; Rothman, Michael; Marisetty, Suresh (2017). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=wylDDgAAQBAJ"><i>Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition</i></a>. Walter de Gruyter GmbH & Co KG. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-5015-0569-0" title="Special:BookSources/978-1-5015-0569-0"><bdi>978-1-5015-0569-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Beyond+BIOS%3A+Developing+with+the+Unified+Extensible+Firmware+Interface%2C+Third+Edition&rft.pub=Walter+de+Gruyter+GmbH+%26+Co+KG&rft.date=2017&rft.isbn=978-1-5015-0569-0&rft.aulast=Zimmer&rft.aufirst=Vincent&rft.au=Rothman%2C+Michael&rft.au=Marisetty%2C+Suresh&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DwylDDgAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/tianocore.github.io/wiki/PI-Boot-Flow">"PI Boot Flow · tianocore/Tianocore.github.io Wiki"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=PI+Boot+Flow+%C2%B7+tianocore%2FTianocore.github.io+Wiki&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FPI-Boot-Flow&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://ami.com/en/?Aptio_V_Status_Codes.pdf">"Engineering Services"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Engineering+Services&rft_id=https%3A%2F%2Fami.com%2Fen%2F%3FAptio_V_Status_Codes.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-105">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.kernel.org/doc/html/latest/arch/arm/uefi.html">"The Unified Extensible Firmware Interface (UEFI)"</a>. The Linux Kernel documentation.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Unified+Extensible+Firmware+Interface+%28UEFI%29&rft.pub=The+Linux+Kernel+documentation&rft_id=https%3A%2F%2Fwww.kernel.org%2Fdoc%2Fhtml%2Flatest%2Farch%2Farm%2Fuefi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-TianoCoreboot-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-TianoCoreboot_106-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.coreboot.org/TianoCore">"TianoCore - coreboot"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 May</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=TianoCore+-+coreboot&rft_id=http%3A%2F%2Fwww.coreboot.org%2FTianoCore&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-PhoenixSecureCoreTiano-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-PhoenixSecureCoreTiano_107-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100906050148/http://www.phoenix.com/pages/phoenix-securecore-tiano-tm">"SecureCore Tiano™"</a>. Phoenix Technologies. Archived from <a rel="nofollow" class="external text" href="http://www.phoenix.com/pages/phoenix-securecore-tiano-tm">the original</a> on 6 September 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SecureCore+Tiano%E2%84%A2&rft.pub=Phoenix+Technologies&rft_id=http%3A%2F%2Fwww.phoenix.com%2Fpages%2Fphoenix-securecore-tiano-tm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-AMIAptio4-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-AMIAptio4_108-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://ami.com/ami_downloads/Aptio_4_Data_Sheet.pdf">"Aptio®: The Complete UEFI Product Solution"</a> <span class="cs1-format">(PDF)</span>. American Megatrends, Inc<span class="reference-accessdate">. Retrieved <span class="nowrap">2 May</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Aptio%C2%AE%3A+The+Complete+UEFI+Product+Solution&rft.pub=American+Megatrends%2C+Inc&rft_id=https%3A%2F%2Fami.com%2Fami_downloads%2FAptio_4_Data_Sheet.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-InsydeH2O-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-InsydeH2O_109-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.insyde.com/company/who-we-are/why-us">"Why US?"</a>. Insyde Software Corp<span class="reference-accessdate">. Retrieved <span class="nowrap">2 May</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Why+US%3F&rft.pub=Insyde+Software+Corp&rft_id=https%3A%2F%2Fwww.insyde.com%2Fcompany%2Fwho-we-are%2Fwhy-us&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&px=Microsoft-Project-Mu-UEFI">"Microsoft Announces "Project Mu" For Open-Source UEFI Alternative To TianoCore"</a>. <i>Phoronix</i><span class="reference-accessdate">. Retrieved <span class="nowrap">20 December</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Phoronix&rft.atitle=Microsoft+Announces+%22Project+Mu%22+For+Open-Source+UEFI+Alternative+To+TianoCore&rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DMicrosoft-Project-Mu-UEFI&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-MarryingU-BootUEFIandGRUB-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-MarryingU-BootUEFIandGRUB_111-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://events17.linuxfoundation.org/sites/events/files/slides/Marrying%20U-Boot%2C%20UEFI%20and%20grub.pdf">"Marrying U-Boot UEFI and GRUB"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">12 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Marrying+U-Boot+UEFI+and+GRUB&rft_id=http%3A%2F%2Fevents17.linuxfoundation.org%2Fsites%2Fevents%2Ffiles%2Fslides%2FMarrying%2520U-Boot%252C%2520UEFI%2520and%2520grub.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-SuseU-BootGRUB-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-SuseU-BootGRUB_112-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180911081903/https://www.suse.com/media/article/UEFI_on_Top_of_U-Boot.pdf">"UEFI on Top of U-Boot"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="https://www.suse.com/media/article/UEFI_on_Top_of_U-Boot.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 11 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">12 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+on+Top+of+U-Boot&rft_id=https%3A%2F%2Fwww.suse.com%2Fmedia%2Farticle%2FUEFI_on_Top_of_U-Boot.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-OpenBSD63onRPi3-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-OpenBSD63onRPi3_113-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20181121075131/http://bijanebrahimi.github.io/blog/installing-openbsd-63-on-raspberry-pi-3.html">"Installing OpenBSD 6.3 on Raspberry 3"</a>. Archived from <a rel="nofollow" class="external text" href="https://bijanebrahimi.github.io/blog/installing-openbsd-63-on-raspberry-pi-3.html">the original</a> on 21 November 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">12 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Installing+OpenBSD+6.3+on+Raspberry+3&rft_id=https%3A%2F%2Fbijanebrahimi.github.io%2Fblog%2Finstalling-openbsd-63-on-raspberry-pi-3.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-UBootiPXE-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-UBootiPXE_114-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200731050609/https://u-boot.readthedocs.io/en/latest/uefi/iscsi.html">"iSCSI booting with U-Boot and iPXE"</a>. Archived from <a rel="nofollow" class="external text" href="https://u-boot.readthedocs.io/en/latest/uefi/iscsi.html">the original</a> on 31 July 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">18 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=iSCSI+booting+with+U-Boot+and+iPXE&rft_id=https%3A%2F%2Fu-boot.readthedocs.io%2Fen%2Flatest%2Fuefi%2Fiscsi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-115"><span class="mw-cite-backlink"><b><a href="#cite_ref-115">^</a></b></span> <span class="reference-text">Apple Computer. "<a rel="nofollow" class="external text" href="https://developer.apple.com/documentation/MacOSX/Conceptual/universal_binary/universal_binary_diffs/chapter_3_section_10.html">Universal Binary Programming Guidelines, Second Edition: Extensible Firmware Interface (EFI)</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080724213607/http://developer.apple.com/documentation/MacOSX/Conceptual/universal_binary/universal_binary_diffs/chapter_3_section_10.html">Archived</a> 24 July 2008 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>"</span> </li> <li id="cite_note-116"><span class="mw-cite-backlink"><b><a href="#cite_ref-116">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.mactech.com/articles/mactech/Vol.23/23.05/OpenFirmwareToEFI/index.html">Apple's Transition from Open Firmware to Extensible Firmware Interface</a>, mactech, 2007.</span> </li> <li id="cite_note-IntelFrameworkOverviewUEFI-117"><span class="mw-cite-backlink">^ <a href="#cite_ref-IntelFrameworkOverviewUEFI_117-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-IntelFrameworkOverviewUEFI_117-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.intel.com/technology/framework/overview1.htm">"Intel® Platform Innovation Framework for UEFI Overview"</a>. Intel<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Intel%C2%AE+Platform+Innovation+Framework+for+UEFI+Overview&rft.pub=Intel&rft_id=http%3A%2F%2Fwww.intel.com%2Ftechnology%2Fframework%2Foverview1.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-118"><span class="mw-cite-backlink"><b><a href="#cite_ref-118">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120322062159/http://www.uefi.org/news/uefi_industry/UEFIEvaluationPlatforms_2011_05.pdf"><i>Evaluating UEFI using Commercially Available Platforms and Solutions</i></a> <span class="cs1-format">(PDF)</span>, UEFI, May 2011, archived from <a rel="nofollow" class="external text" href="http://www.uefi.org/news/uefi_industry/UEFIEvaluationPlatforms_2011_05.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 22 March 2012</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Evaluating+UEFI+using+Commercially+Available+Platforms+and+Solutions&rft.pub=UEFI&rft.date=2011-05&rft_id=http%3A%2F%2Fwww.uefi.org%2Fnews%2Fuefi_industry%2FUEFIEvaluationPlatforms_2011_05.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-Asus_Motherboard-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-Asus_Motherboard_119-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.bit-tech.net/hardware/motherboards/2010/11/16/asus-lga1155-motherboard-preview/1">Asus P67 Motherboard Preview</a>.</span> </li> <li id="cite_note-120"><span class="mw-cite-backlink"><b><a href="#cite_ref-120">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://msdn.microsoft.com/en-us/library/windows/hardware/jj128256.aspx">"Windows Hardware Certification Requirements for Client and Server Systems"</a>. Microsoft. January 2013. <q>System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby ... Platforms shall be UEFI Class Three (see UEFI Industry Group, Evaluating UEFI using Commercially Available Platforms and Solutions, version 0.3, for a definition) with no Compatibility Support Module installed or installable. BIOS emulation and legacy PC/AT boot must be disabled.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Windows+Hardware+Certification+Requirements+for+Client+and+Server+Systems&rft.pub=Microsoft&rft.date=2013-01&rft_id=http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fwindows%2Fhardware%2Fjj128256.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-pcmag-connected-121"><span class="mw-cite-backlink"><b><a href="#cite_ref-pcmag-connected_121-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130906173044/http://www.pcmag.com/article2/0,2817,2400059,00.asp">"Microsoft: All You Need to Know About Windows 8 on ARM"</a>. <i>PC Magazine</i>. Archived from <a rel="nofollow" class="external text" href="https://www.pcmag.com/article2/0,2817,2400059,00.asp">the original</a> on 6 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">30 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=PC+Magazine&rft.atitle=Microsoft%3A+All+You+Need+to+Know+About+Windows+8+on+ARM&rft_id=https%3A%2F%2Fwww.pcmag.com%2Farticle2%2F0%2C2817%2C2400059%2C00.asp&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-122"><span class="mw-cite-backlink"><b><a href="#cite_ref-122">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichardson2017" class="citation web cs1">Richardson, Brian (30 October 2017). <a rel="nofollow" class="external text" href="http://www.uefi.org/sites/default/files/resources/Brian_Richardson_Intel_Final.pdf">"<span class="cs1-kern-left"></span>"Last Mile" Barriers to Removing Legacy BIOS"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">22 November</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=%22Last+Mile%22+Barriers+to+Removing+Legacy+BIOS&rft.date=2017-10-30&rft.aulast=Richardson&rft.aufirst=Brian&rft_id=http%3A%2F%2Fwww.uefi.org%2Fsites%2Fdefault%2Ffiles%2Fresources%2FBrian_Richardson_Intel_Final.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://sourceforge.net/mailarchive/forum.php?thread_name=1077918495.14506.1.camel%40raphael.fc.hp.com&forum_name=elilo-announce">Announcement of release 3.5pre1</a> by maintainer Brett Johnson made on 27 February 2004.</span> </li> <li id="cite_note-debiangrubexample-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-debiangrubexample_124-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://packages.debian.org/sid/grub-efi"><i>EFI version of Grub</i></a>, Debian GNU/Linux<span class="reference-accessdate">, retrieved <span class="nowrap">1 May</span> 2008</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=EFI+version+of+Grub&rft.pub=Debian+GNU%2FLinux&rft_id=http%3A%2F%2Fpackages.debian.org%2Fsid%2Fgrub-efi&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-h-ubuntusecureboot-125"><span class="mw-cite-backlink">^ <a href="#cite_ref-h-ubuntusecureboot_125-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-h-ubuntusecureboot_125-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-h-ubuntusecureboot_125-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.h-online.com/open/news/item/Ubuntu-will-use-GRUB-2-for-its-Secure-Boot-implementation-1714232.html">"Ubuntu will use GRUB 2 for its Secure Boot implementation"</a>. The H Online<span class="reference-accessdate">. Retrieved <span class="nowrap">28 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Ubuntu+will+use+GRUB+2+for+its+Secure+Boot+implementation&rft.pub=The+H+Online&rft_id=http%3A%2F%2Fwww.h-online.com%2Fopen%2Fnews%2Fitem%2FUbuntu-will-use-GRUB-2-for-its-Secure-Boot-implementation-1714232.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-126">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090105052030/http://h71000.www7.hp.com/openvms/os/openvms-release-history.html"><i>OpenVMS Release History</i></a>, HP, archived from <a rel="nofollow" class="external text" href="http://h71000.www7.hp.com/openvms/os/openvms-release-history.html">the original</a> on 5 January 2009<span class="reference-accessdate">, retrieved <span class="nowrap">16 September</span> 2008</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=OpenVMS+Release+History&rft.pub=HP&rft_id=http%3A%2F%2Fh71000.www7.hp.com%2Fopenvms%2Fos%2Fopenvms-release-history.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-127">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200922100900/https://vmssoftware.com/pdfs/State_of_Port_20171006.pdf">"State of the Port to x86-64"</a> <span class="cs1-format">(PDF)</span>. <i>vmssoftware.com</i>. 6 October 2017. Archived from <a rel="nofollow" class="external text" href="https://vmssoftware.com/pdfs/State_of_Port_20171006.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 22 September 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=vmssoftware.com&rft.atitle=State+of+the+Port+to+x86-64&rft.date=2017-10-06&rft_id=https%3A%2F%2Fvmssoftware.com%2Fpdfs%2FState_of_Port_20171006.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-appleuefiversion1-128"><span class="mw-cite-backlink"><b><a href="#cite_ref-appleuefiversion1_128-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080905112841/http://refit.sourceforge.net/info/vista.html"><i>rEFIt — Windows Vista and EFI</i></a>, SourceForge, archived from <a rel="nofollow" class="external text" href="http://refit.sourceforge.net/info/vista.html">the original</a> on 5 September 2008<span class="reference-accessdate">, retrieved <span class="nowrap">31 May</span> 2008</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=rEFIt+%E2%80%94+Windows+Vista+and+EFI&rft.pub=SourceForge&rft_id=http%3A%2F%2Frefit.sourceforge.net%2Finfo%2Fvista.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Extensible Firmware Interface", <a rel="nofollow" class="external text" href="https://web.archive.org/web/20060830101936/http://technet2.microsoft.com/WindowsServer/en/library/6b03fad7-665e-49f3-8e7d-e1a6a5be9cf01033.mspx"><i>Windows Server TechCenter</i></a>, Microsoft, archived from <a rel="nofollow" class="external text" href="http://technet2.microsoft.com/WindowsServer/en/Library/6b03fad7-665e-49f3-8e7d-e1a6a5be9cf01033.mspx">the original</a> on 30 August 2006</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Extensible+Firmware+Interface&rft.btitle=Windows+Server+TechCenter&rft.pub=Microsoft&rft_id=http%3A%2F%2Ftechnet2.microsoft.com%2FWindowsServer%2Fen%2FLibrary%2F6b03fad7-665e-49f3-8e7d-e1a6a5be9cf01033.mspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-130"><span class="mw-cite-backlink"><b><a href="#cite_ref-130">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://download.microsoft.com/download/a/f/d/afdfd50d-6eb9-425e-84e1-b4085a80e34e/sys-t303_wh07.pptx">Unified Extensible Firmware Interface (UEFI) Implementation Guidelines</a></span> </li> <li id="cite_note-131"><span class="mw-cite-backlink"><b><a href="#cite_ref-131">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFErsek2015" class="citation web cs1">Ersek, Laszlo (January 2015). <a rel="nofollow" class="external text" href="https://www.linux-kvm.org/downloads/lersek/ovmf-whitepaper-c770f8c.txt">"Open Virtual Machine Firmware (OVMF) Status Report"</a>. <i>Linux KVM Project</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 November</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Linux+KVM+Project&rft.atitle=Open+Virtual+Machine+Firmware+%28OVMF%29+Status+Report&rft.date=2015-01&rft.aulast=Ersek&rft.aufirst=Laszlo&rft_id=https%3A%2F%2Fwww.linux-kvm.org%2Fdownloads%2Flersek%2Fovmf-whitepaper-c770f8c.txt&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-132">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/boot-to-uefi-mode-or-legacy-bios-mode">Boot to UEFI Mode or legacy BIOS mode</a></span> </li> <li id="cite_note-WindowsVistaUEFI-133"><span class="mw-cite-backlink"><b><a href="#cite_ref-WindowsVistaUEFI_133-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.betaarchive.com/wiki/index.php?title=Microsoft_KB_Archive/930061">"Unified Extended Firmware Interface support in Windows Vista"</a>. Microsoft. 26 October 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">12 June</span> 2010</span>. <q>Microsoft determined that vendors would not have any interest in producing native UEFI 32-bit firmware because of the current status of mainstream 64-bit computing and platform costs. Therefore, Microsoft originally did not to ship support for 32-bit UEFI implementations.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unified+Extended+Firmware+Interface+support+in+Windows+Vista&rft.date=2006-10-26&rft_id=https%3A%2F%2Fwww.betaarchive.com%2Fwiki%2Findex.php%3Ftitle%3DMicrosoft_KB_Archive%2F930061&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-134">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows-hardware/drivers/display/microsoft-basic-display-driver">Microsoft Basic Display Driver</a></span> </li> <li id="cite_note-135"><span class="mw-cite-backlink"><b><a href="#cite_ref-135">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.winsupersite.com/blog/supersite-blog-39/windows8/microsoft-touts-incredible-windows-8-boot-times-140515">"Microsoft Touts Incredible Windows 8 Boot Times"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">9 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Microsoft+Touts+Incredible+Windows+8+Boot+Times&rft_id=http%3A%2F%2Fwww.winsupersite.com%2Fblog%2Fsupersite-blog-39%2Fwindows8%2Fmicrosoft-touts-incredible-windows-8-boot-times-140515&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-Windows8UEFISecureBoot-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-Windows8UEFISecureBoot_136-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrodkin2011" class="citation news cs1">Brodkin, Jon (21 September 2011). <a rel="nofollow" class="external text" href="https://arstechnica.com/business/news/2011/09/windows-8-secure-boot-will-complicate-linux-installs.ars">"Windows 8 secure boot could complicate Linux installs"</a>. Ars Technica<span class="reference-accessdate">. Retrieved <span class="nowrap">23 September</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Windows+8+secure+boot+could+complicate+Linux+installs&rft.date=2011-09-21&rft.aulast=Brodkin&rft.aufirst=Jon&rft_id=https%3A%2F%2Farstechnica.com%2Fbusiness%2Fnews%2F2011%2F09%2Fwindows-8-secure-boot-will-complicate-linux-installs.ars&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-137"><span class="mw-cite-backlink"><b><a href="#cite_ref-137">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.microsoft.com/en-us/windows/windows-11-specifications">"Find Windows 11 specs, features, and computer requirements"</a>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Find+Windows+11+specs%2C+features%2C+and+computer+requirements&rft.pub=Microsoft&rft_id=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwindows%2Fwindows-11-specifications&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-138"><span class="mw-cite-backlink"><b><a href="#cite_ref-138">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://learn.microsoft.com/en-gb/windows/iot/iot-enterprise/Hardware/System_Requirements?tabs=Windows11">"Minimum System Requirements for Windows IoT Enterprise"</a>. <i><a href="/wiki/Microsoft_Learn" title="Microsoft Learn">Microsoft Learn</a></i>. 22 May 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">7 June</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Microsoft+Learn&rft.atitle=Minimum+System+Requirements+for+Windows+IoT+Enterprise&rft.date=2024-05-22&rft_id=https%3A%2F%2Flearn.microsoft.com%2Fen-gb%2Fwindows%2Fiot%2Fiot-enterprise%2FHardware%2FSystem_Requirements%3Ftabs%3DWindows11&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-fbsd-uefi-139"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbsd-uefi_139-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.h-online.com/open/news/item/FreeBSD-to-get-UEFI-support-1816670.html">"FreeBSD to get UEFI support"</a>. The H<span class="reference-accessdate">. Retrieved <span class="nowrap">7 March</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FreeBSD+to+get+UEFI+support&rft.pub=The+H&rft_id=http%3A%2F%2Fwww.h-online.com%2Fopen%2Fnews%2Fitem%2FFreeBSD-to-get-UEFI-support-1816670.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-fbsd-uefi-merge-140"><span class="mw-cite-backlink"><b><a href="#cite_ref-fbsd-uefi-merge_140-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.freebsd.org/UEFI">"UEFI - FreeBSD Wiki"</a>. FreeBSD.org<span class="reference-accessdate">. Retrieved <span class="nowrap">19 June</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UEFI+-+FreeBSD+Wiki&rft.pub=FreeBSD.org&rft_id=https%3A%2F%2Fwiki.freebsd.org%2FUEFI&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-141">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.freebsd.org/cgi/man.cgi?query=uefi&sektion=8">"uefi(8)"</a>. <i>www.freebsd.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 January</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.freebsd.org&rft.atitle=uefi%288%29&rft_id=https%3A%2F%2Fwww.freebsd.org%2Fcgi%2Fman.cgi%3Fquery%3Duefi%26sektion%3D8&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-solaris-uefi-142"><span class="mw-cite-backlink"><b><a href="#cite_ref-solaris-uefi_142-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.oracle.com/technetwork/server-storage/solaris11/documentation/solaris11-1-whatsnew-1732377.pdf">"Oracle Solaris 11.1 — What's New"</a> <span class="cs1-format">(PDF)</span>. oracle.com<span class="reference-accessdate">. Retrieved <span class="nowrap">4 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Oracle+Solaris+11.1+%26mdash%3B+What%27s+New&rft.pub=oracle.com&rft_id=http%3A%2F%2Fwww.oracle.com%2Ftechnetwork%2Fserver-storage%2Fsolaris11%2Fdocumentation%2Fsolaris11-1-whatsnew-1732377.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-143"><span class="mw-cite-backlink"><b><a href="#cite_ref-143">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.openbsd.org/59.html">"OpenBSD 5.9"</a>. <i>www.openbsd.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 September</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.openbsd.org&rft.atitle=OpenBSD+5.9&rft_id=http%3A%2F%2Fwww.openbsd.org%2F59.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-144"><span class="mw-cite-backlink"><b><a href="#cite_ref-144">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.openbsd.org/60.html">"OpenBSD 6.0"</a>. <i>www.openbsd.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 September</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.openbsd.org&rft.atitle=OpenBSD+6.0&rft_id=http%3A%2F%2Fwww.openbsd.org%2F60.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFProven2023" class="citation web cs1">Proven, Liam (4 September 2023). <a rel="nofollow" class="external text" href="https://www.theregister.com/2023/09/04/arcaos_51/">"ArcaOS 5.1 gives vintage OS/2 a UEFI facelift for the 21st century"</a>. <a href="/wiki/The_Register" title="The Register">The Register</a><span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=ArcaOS+5.1+gives+vintage+OS%2F2+a+UEFI+facelift+for+the+21st+century&rft.pub=The+Register&rft.date=2023-09-04&rft.aulast=Proven&rft.aufirst=Liam&rft_id=https%3A%2F%2Fwww.theregister.com%2F2023%2F09%2F04%2Farcaos_51%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.youtube.com/watch?v=X07tnbq8_sM">"Booting ArcaOS on UEFI hardware (demonstration)"</a>. <i>youtube.com</i>. 8 August 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">22 September</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=youtube.com&rft.atitle=Booting+ArcaOS+on+UEFI+hardware+%28demonstration%29&rft.date=2019-08-08&rft_id=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DX07tnbq8_sM&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSanders2019" class="citation journal cs1">Sanders, James (13 August 2019). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191021223549/https://www.techrepublic.com/article/modern-os2-distribution-arcaos-adds-support-for-booting-via-uefi/">"Modern OS/2 distribution ArcaOS adds support for booting via UEFI"</a>. <i>techrepublic.com</i>. Archived from <a rel="nofollow" class="external text" href="https://www.techrepublic.com/article/modern-os2-distribution-arcaos-adds-support-for-booting-via-uefi/">the original</a> on 21 October 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=techrepublic.com&rft.atitle=Modern+OS%2F2+distribution+ArcaOS+adds+support+for+booting+via+UEFI&rft.date=2019-08-13&rft.aulast=Sanders&rft.aufirst=James&rft_id=https%3A%2F%2Fwww.techrepublic.com%2Farticle%2Fmodern-os2-distribution-arcaos-adds-support-for-booting-via-uefi%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20111006173225/http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=OVMF"><i>Open Virtual Machine Firmware</i></a>, SourceForge, archived from <a rel="nofollow" class="external text" href="http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=OVMF">the original</a> on 6 October 2011</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Open+Virtual+Machine+Firmware&rft.pub=SourceForge&rft_id=http%3A%2F%2Fsourceforge.net%2Fapps%2Fmediawiki%2Ftianocore%2Findex.php%3Ftitle%3DOVMF&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-149">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://communities.vmware.com/thread/420405">"VMWare Workstation EFI firmware | VMware Communities"</a>. Communities.vmware.com. 3 October 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">28 February</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=VMWare+Workstation+EFI+firmware+%26%23124%3B+VMware+Communities&rft.pub=Communities.vmware.com&rft.date=2012-10-03&rft_id=https%3A%2F%2Fcommunities.vmware.com%2Fthread%2F420405&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://communities.vmware.com/docs/DOC-28494">"Using EFI/UEFI firmware in a VMware Virtual Machine | VMware Communities"</a>. Communities.vmware.com. 6 December 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">18 January</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Using+EFI%2FUEFI+firmware+in+a+VMware+Virtual+Machine+%26%23124%3B+VMware+Communities&rft.pub=Communities.vmware.com&rft.date=2014-12-06&rft_id=https%3A%2F%2Fcommunities.vmware.com%2Fdocs%2FDOC-28494&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-151">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://blogs.vmware.com/workstation/2017/08/announcing-vmware-workstation-14.html">"Announcing VMware Workstation 14 - VMware Workstation Zealot"</a>. <i>VMware Workstation Zealot</i>. 22 August 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">2 August</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=VMware+Workstation+Zealot&rft.atitle=Announcing+VMware+Workstation+14+-+VMware+Workstation+Zealot&rft.date=2017-08-22&rft_id=https%3A%2F%2Fblogs.vmware.com%2Fworkstation%2F2017%2F08%2Fannouncing-vmware-workstation-14.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-152"><span class="mw-cite-backlink"><b><a href="#cite_ref-152">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.vmware.com/support/vsphere5/doc/vsphere-esx-vcenter-server-50-new-features.html">"What's New in vSphere 5.0"</a>. Vmware.com<span class="reference-accessdate">. Retrieved <span class="nowrap">28 February</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What%27s+New+in+vSphere+5.0&rft.pub=Vmware.com&rft_id=https%3A%2F%2Fwww.vmware.com%2Fsupport%2Fvsphere5%2Fdoc%2Fvsphere-esx-vcenter-server-50-new-features.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://pubs.vmware.com/Release_Notes/en/vsphere/65/vsphere-esxi-vcenter-server-65-release-notes.html">"VMware vSphere 6.5 Release Notes"</a>. <i>pubs.vmware.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 January</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=pubs.vmware.com&rft.atitle=VMware+vSphere+6.5+Release+Notes&rft_id=https%3A%2F%2Fpubs.vmware.com%2FRelease_Notes%2Fen%2Fvsphere%2F65%2Fvsphere-esxi-vcenter-server-65-release-notes.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-154"><span class="mw-cite-backlink"><b><a href="#cite_ref-154">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100928210932/http://www.virtualbox.org/wiki/Changelog-3.1"><i>3.1 Changelog</i></a>, VirtualBox, archived from <a rel="nofollow" class="external text" href="http://www.virtualbox.org/wiki/Changelog-3.1">the original</a> on 28 September 2010</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=3.1+Changelog&rft.pub=VirtualBox&rft_id=http%3A%2F%2Fwww.virtualbox.org%2Fwiki%2FChangelog-3.1&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-155"><span class="mw-cite-backlink"><b><a href="#cite_ref-155">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://www.virtualbox.org/ticket/7702"><i>Ticket 7702</i></a>, VirtualBox</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Ticket+7702&rft.pub=VirtualBox&rft_id=http%3A%2F%2Fwww.virtualbox.org%2Fticket%2F7702&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-156"><span class="mw-cite-backlink"><b><a href="#cite_ref-156">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Statement by sr. software engineer at Oracle", <a rel="nofollow" class="external text" href="http://forums.virtualbox.org/viewtopic.php?f=1&p=183022#p114765"><i>Forum</i></a>, VirtualBox</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Statement+by+sr.+software+engineer+at+Oracle&rft.btitle=Forum&rft.pub=VirtualBox&rft_id=http%3A%2F%2Fforums.virtualbox.org%2Fviewtopic.php%3Ff%3D1%26p%3D183022%23p114765&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-157"><span class="mw-cite-backlink"><b><a href="#cite_ref-157">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://fedoraproject.org/wiki/Testing_secureboot_with_KVM">"Testing secureboot with KVM"</a>. FedoraProject<span class="reference-accessdate">. Retrieved <span class="nowrap">28 February</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Testing+secureboot+with+KVM&rft.pub=FedoraProject&rft_id=https%3A%2F%2Ffedoraproject.org%2Fwiki%2FTesting_secureboot_with_KVM&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-158"><span class="mw-cite-backlink"><b><a href="#cite_ref-158">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/dn282278.aspx">"What's New in Hyper-V for Windows Server 2012 R2"</a>. MicrosoftTechNet<span class="reference-accessdate">. Retrieved <span class="nowrap">24 June</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What%27s+New+in+Hyper-V+for+Windows+Server+2012+R2&rft.pub=MicrosoftTechNet&rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fdn282278.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-159"><span class="mw-cite-backlink"><b><a href="#cite_ref-159">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://cloud.google.com/shielded-vm?gclid=Cj0KCQiA7aPyBRChARIsAJfWCgLq4tbyWeZHT6RrfMxAP5_X6O52Dq64WfAS_3TupIV3_moxFlReSGUaAqz0EALw_wcB">"Shielded VMs"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">16 February</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Shielded+VMs&rft_id=https%3A%2F%2Fcloud.google.com%2Fshielded-vm%3Fgclid%3DCj0KCQiA7aPyBRChARIsAJfWCgLq4tbyWeZHT6RrfMxAP5_X6O52Dq64WfAS_3TupIV3_moxFlReSGUaAqz0EALw_wcB&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-160"><span class="mw-cite-backlink"><b><a href="#cite_ref-160">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=EDKII_EADK">"TianoCore on SourceForge: EDK2 Application Development Kit (EADK)"</a>. <a href="/wiki/Intel" title="Intel">Intel</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=TianoCore+on+SourceForge%3A+EDK2+Application+Development+Kit+%28EADK%29&rft.pub=Intel&rft_id=http%3A%2F%2Fsourceforge.net%2Fapps%2Fmediawiki%2Ftianocore%2Findex.php%3Ftitle%3DEDKII_EADK&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-161"><span class="mw-cite-backlink"><b><a href="#cite_ref-161">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tianocore/tianocore.github.io/wiki/UDK">"Tianocore: UDK"</a>. <i>GitHub</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=GitHub&rft.atitle=Tianocore%3A+UDK&rft_id=https%3A%2F%2Fgithub.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FUDK&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-FosdemInterviewRonaldGMinnich-162"><span class="mw-cite-backlink"><b><a href="#cite_ref-FosdemInterviewRonaldGMinnich_162-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.fosdem.org/2007/interview/ronald%2bg%2bminnich.html">"Interview: Ronald G Minnich"</a>. Fosdem. 6 February 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Interview%3A+Ronald+G+Minnich&rft.pub=Fosdem&rft.date=2007-02-06&rft_id=https%3A%2F%2Farchive.fosdem.org%2F2007%2Finterview%2Fronald%252bg%252bminnich.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-163"><span class="mw-cite-backlink"><b><a href="#cite_ref-163">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDoctorow2011" class="citation cs2">Doctorow, Cory (27 December 2011), <a rel="nofollow" class="external text" href="https://boingboing.net/2011/12/27/the-coming-war-on-general-purp.html"><i>The Coming War on General Purpose Computation</i></a><span class="reference-accessdate">, retrieved <span class="nowrap">25 September</span> 2013</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Coming+War+on+General+Purpose+Computation&rft.date=2011-12-27&rft.aulast=Doctorow&rft.aufirst=Cory&rft_id=http%3A%2F%2Fboingboing.net%2F2011%2F12%2F27%2Fthe-coming-war-on-general-purp.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-YouTubeCorebootFirmware-164"><span class="mw-cite-backlink"><b><a href="#cite_ref-YouTubeCorebootFirmware_164-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.youtube.com/watch?v=X72LgcMpM9k">"coreboot (aka LinuxBIOS): The Free/Open-Source x86 Firmware"</a>. YouTube. 31 October 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">14 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=coreboot+%28aka+LinuxBIOS%29%3A+The+Free%2FOpen-Source+x86+Firmware&rft.pub=YouTube&rft.date=2008-10-31&rft_id=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DX72LgcMpM9k&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-165"><span class="mw-cite-backlink"><b><a href="#cite_ref-165">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120423101551/http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=Welcome">"Welcome"</a>, <i>TianoCore</i>, SourceForge, archived from <a rel="nofollow" class="external text" href="http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=Welcome">the original</a> on 23 April 2012</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Welcome&rft.btitle=TianoCore&rft.pub=SourceForge&rft_id=http%3A%2F%2Fsourceforge.net%2Fapps%2Fmediawiki%2Ftianocore%2Findex.php%3Ftitle%3DWelcome&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-166"><span class="mw-cite-backlink"><b><a href="#cite_ref-166">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.networkworld.com/article/738394/microsoft-subnet-next-gen-boot-spec-could-forever-lock-linux-off-windows-8-pcs.html">"Next-gen boot spec could forever lock Linux off Windows 8 PCS"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Next-gen+boot+spec+could+forever+lock+Linux+off+Windows+8+PCS&rft_id=https%3A%2F%2Fwww.networkworld.com%2Farticle%2F738394%2Fmicrosoft-subnet-next-gen-boot-spec-could-forever-lock-linux-off-windows-8-pcs.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-167"><span class="mw-cite-backlink"><b><a href="#cite_ref-167">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2011/09/windows-8-secure-boot-will-complicate-linux-installs/">"Windows 8 secure boot could complicate Linux installs"</a>. 21 September 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Windows+8+secure+boot+could+complicate+Linux+installs&rft.date=2011-09-21&rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2011%2F09%2Fwindows-8-secure-boot-will-complicate-linux-installs%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-cwuk-arm-168"><span class="mw-cite-backlink">^ <a href="#cite_ref-cwuk-arm_168-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cwuk-arm_168-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.computerworlduk.com/blogs/open-enterprise/is-microsoft-blocking-linux-booting-on-arm-hardware-3569162/">"Is Microsoft Blocking Linux Booting on ARM Hardware?"</a>. Computerworld UK<span class="reference-accessdate">. Retrieved <span class="nowrap">6 March</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Is+Microsoft+Blocking+Linux+Booting+on+ARM+Hardware%3F&rft.pub=Computerworld+UK&rft_id=http%3A%2F%2Fwww.computerworlduk.com%2Fblogs%2Fopen-enterprise%2Fis-microsoft-blocking-linux-booting-on-arm-hardware-3569162%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-arstechnica-securebootw10-169"><span class="mw-cite-backlink"><b><a href="#cite_ref-arstechnica-securebootw10_169-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2015/03/windows-10-to-make-the-secure-boot-alt-os-lock-out-a-reality/">"Windows 10 to make the Secure Boot alt-OS lock out a reality"</a>. <i>Ars Technica</i>. 20 March 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">21 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Ars+Technica&rft.atitle=Windows+10+to+make+the+Secure+Boot+alt-OS+lock+out+a+reality&rft.date=2015-03-20&rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2015%2F03%2Fwindows-10-to-make-the-secure-boot-alt-os-lock-out-a-reality%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-170"><span class="mw-cite-backlink"><b><a href="#cite_ref-170">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/whitepaper-web">"Free Software Foundation recommendations for free operating system distributions considering Secure Boot — Free Software Foundation — working together for free software"</a>. <i>Free Software Foundation</i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 March</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Free+Software+Foundation&rft.atitle=Free+Software+Foundation+recommendations+for+free+operating+system+distributions+considering+Secure+Boot+%E2%80%94+Free+Software+Foundation+%E2%80%94+working+together+for+free+software&rft_id=https%3A%2F%2Fwww.fsf.org%2Fcampaigns%2Fsecure-boot-vs-restricted-boot%2Fwhitepaper-web&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-171"><span class="mw-cite-backlink"><b><a href="#cite_ref-171">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.zdnet.com/article/shimming-your-way-to-linux-on-windows-8-pcs/">"Shimming your way to Linux on Windows 8 PCs"</a>. ZDNet<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Shimming+your+way+to+Linux+on+Windows+8+PCs&rft.pub=ZDNet&rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fshimming-your-way-to-linux-on-windows-8-pcs%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-lwn-efilinux-172"><span class="mw-cite-backlink">^ <a href="#cite_ref-lwn-efilinux_172-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-lwn-efilinux_172-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://lwn.net/Articles/503803/">"Ubuntu details its UEFI Secure Boot plans"</a>. Linux Weekly News<span class="reference-accessdate">. Retrieved <span class="nowrap">11 September</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Ubuntu+details+its+UEFI+Secure+Boot+plans&rft.pub=Linux+Weekly+News&rft_id=https%3A%2F%2Flwn.net%2FArticles%2F503803%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-h-mscert-173"><span class="mw-cite-backlink">^ <a href="#cite_ref-h-mscert_173-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-h-mscert_173-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.h-online.com/open/news/item/No-Microsoft-certificate-support-in-Linux-kernel-says-Torvalds-1811883.html">"No Microsoft certificate support in Linux kernel says Torvalds"</a>. The H<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=No+Microsoft+certificate+support+in+Linux+kernel+says+Torvalds&rft.pub=The+H&rft_id=http%3A%2F%2Fwww.h-online.com%2Fopen%2Fnews%2Fitem%2FNo-Microsoft-certificate-support-in-Linux-kernel-says-Torvalds-1811883.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-ars-linus-174"><span class="mw-cite-backlink"><b><a href="#cite_ref-ars-linus_174-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2013/02/linus-torvalds-i-will-not-change-linux-to-deep-throat-microsoft/">"Linus Torvalds: I will not change Linux to "deep-throat Microsoft"<span class="cs1-kern-right"></span>"</a>. Ars Technica. 26 February 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Linus+Torvalds%3A+I+will+not+change+Linux+to+%22deep-throat+Microsoft%22&rft.pub=Ars+Technica&rft.date=2013-02-26&rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2013%2F02%2Flinus-torvalds-i-will-not-change-linux-to-deep-throat-microsoft%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-reuters-hispalinuxuefi-175"><span class="mw-cite-backlink"><b><a href="#cite_ref-reuters-hispalinuxuefi_175-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-microsoft-eu-idUSBRE92P0E120130326">"Exclusive: Open software group files complaint against Microsoft to EU"</a>. Reuters. 26 March 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">26 March</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exclusive%3A+Open+software+group+files+complaint+against+Microsoft+to+EU&rft.date=2013-03-26&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-microsoft-eu-idUSBRE92P0E120130326&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-itworld-securebootexploit-176"><span class="mw-cite-backlink"><b><a href="#cite_ref-itworld-securebootexploit_176-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130805113138/http://www.itworld.com/endpoint-security/367583/researchers-demo-exploits-bypass-windows-8-secure-boot">"Researchers demo exploits that bypass Windows 8 Secure Boot"</a>. <i>IT World</i>. Archived from <a rel="nofollow" class="external text" href="http://www.itworld.com/endpoint-security/367583/researchers-demo-exploits-bypass-windows-8-secure-boot">the original</a> on 5 August 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 August</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=IT+World&rft.atitle=Researchers+demo+exploits+that+bypass+Windows+8+Secure+Boot&rft_id=http%3A%2F%2Fwww.itworld.com%2Fendpoint-security%2F367583%2Fresearchers-demo-exploits-bypass-windows-8-secure-boot&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-177"><span class="mw-cite-backlink"><b><a href="#cite_ref-177">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMENDELSOHN2016" class="citation news cs1">MENDELSOHN, Tom (12 August 2016). <a rel="nofollow" class="external text" href="http://arstechnica.co.uk/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/">"Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open [Updated]"</a>. Ars Technica<span class="reference-accessdate">. Retrieved <span class="nowrap">12 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Boot+snafu%3A+Microsoft+leaks+backdoor+key%2C+firmware+flung+wide+open+%5BUpdated%5D&rft.date=2016-08-12&rft.aulast=MENDELSOHN&rft.aufirst=Tom&rft_id=http%3A%2F%2Farstechnica.co.uk%2Fsecurity%2F2016%2F08%2Fmicrosoft-secure-boot-firmware-snafu-leaks-golden-key%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-178"><span class="mw-cite-backlink"><b><a href="#cite_ref-178">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmolár2023" class="citation web cs1">Smolár, Martin (1 March 2023). <a rel="nofollow" class="external text" href="https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/">"BlackLotus UEFI bootkit: Myth confirmed"</a>. <i>welivesecurity.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">1 March</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=welivesecurity.com&rft.atitle=BlackLotus+UEFI+bootkit%3A+Myth+confirmed&rft.date=2023-03-01&rft.aulast=Smol%C3%A1r&rft.aufirst=Martin&rft_id=https%3A%2F%2Fwww.welivesecurity.com%2F2023%2F03%2F01%2Fblacklotus-uefi-bootkit-myth-confirmed%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-179"><span class="mw-cite-backlink"><b><a href="#cite_ref-179">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoodin2023" class="citation news cs1">Goodin, Dan (6 March 2023). <a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2023/03/unkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/">"Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw"</a>. Ars Technica<span class="reference-accessdate">. Retrieved <span class="nowrap">6 March</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stealthy+UEFI+malware+bypassing+Secure+Boot+enabled+by+unpatchable+Windows+flaw&rft.date=2023-03-06&rft.aulast=Goodin&rft.aufirst=Dan&rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2023%2F03%2Funkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-180"><span class="mw-cite-backlink"><b><a href="#cite_ref-180">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWindowsCommunications2024" class="citation web cs1">WindowsCommunications (26 August 2024). <a rel="nofollow" class="external text" href="https://learn.microsoft.com/en-us/windows/release-health/status-windows-11-23H2">"Windows 11, version 23H2 known issues and notifications"</a>. <i>learn.microsoft.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">3 September</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=learn.microsoft.com&rft.atitle=Windows+11%2C+version+23H2+known+issues+and+notifications&rft.date=2024-08-26&rft.au=WindowsCommunications&rft_id=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fwindows%2Frelease-health%2Fstatus-windows-11-23H2&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-181"><span class="mw-cite-backlink"><b><a href="#cite_ref-181">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.centos.org/HowTos/UEFI">"HowTos/UEFI - CentOS Wiki"</a>. <i>wiki.centos.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">10 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.centos.org&rft.atitle=HowTos%2FUEFI+-+CentOS+Wiki&rft_id=https%3A%2F%2Fwiki.centos.org%2FHowTos%2FUEFI&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-182"><span class="mw-cite-backlink"><b><a href="#cite_ref-182">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.debian.org/SecureBoot">"SecureBoot - Debian Wiki"</a>. <i>wiki.debian.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">10 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wiki.debian.org&rft.atitle=SecureBoot+-+Debian+Wiki&rft_id=https%3A%2F%2Fwiki.debian.org%2FSecureBoot&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-183"><span class="mw-cite-backlink"><b><a href="#cite_ref-183">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://documentation.suse.com/sles/15-SP1/html/SLES-all/cha-uefi.html">"SUSE Linux Enterprise Server 15 SP1: Chapter 13. UEFI (Unified Extensible Firmware Interface) (Administration Guide)"</a>. <i>documentation.suse.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">10 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=documentation.suse.com&rft.atitle=SUSE+Linux+Enterprise+Server+15+SP1%3A+Chapter+13.+UEFI+%28Unified+Extensible+Firmware+Interface%29+%28Administration+Guide%29&rft_id=https%3A%2F%2Fdocumentation.suse.com%2Fsles%2F15-SP1%2Fhtml%2FSLES-all%2Fcha-uefi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-zdnet-linux8-184"><span class="mw-cite-backlink">^ <a href="#cite_ref-zdnet-linux8_184-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-zdnet-linux8_184-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.zdnet.com/article/linux-on-windows-8-pcs-some-progress-but-still-a-nuisance/">"Linux on Windows 8 PCs: Some progress, but still a nuisance"</a>. ZDNet<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Linux+on+Windows+8+PCs%3A+Some+progress%2C+but+still+a+nuisance&rft.pub=ZDNet&rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Flinux-on-windows-8-pcs-some-progress-but-still-a-nuisance%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-p-lenovo-185"><span class="mw-cite-backlink"><b><a href="#cite_ref-p-lenovo_185-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&px=MTIyOTg">"Lenovo UEFI Only Wants To Boot Windows, RHEL"</a>. Phoronix<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Lenovo+UEFI+Only+Wants+To+Boot+Windows%2C+RHEL&rft.pub=Phoronix&rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DMTIyOTg&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-bittech-uefideath-186"><span class="mw-cite-backlink"><b><a href="#cite_ref-bittech-uefideath_186-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.bit-tech.net/news/bits/2013/02/11/linux-samsung-deaths-2/1">"Linux acquitted in Samsung laptop UEFI deaths"</a>. Bit-tech<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Linux+acquitted+in+Samsung+laptop+UEFI+deaths&rft.pub=Bit-tech&rft_id=http%3A%2F%2Fwww.bit-tech.net%2Fnews%2Fbits%2F2013%2F02%2F11%2Flinux-samsung-deaths-2%2F1&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> <li id="cite_note-theh-samsungbrick-187"><span class="mw-cite-backlink"><b><a href="#cite_ref-theh-samsungbrick_187-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.h-online.com/open/news/item/Booting-Linux-using-UEFI-can-brick-Samsung-laptops-1793958.html">"Booting Linux using UEFI can brick Samsung laptops"</a>. The H<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Booting+Linux+using+UEFI+can+brick+Samsung+laptops&rft.pub=The+H&rft_id=http%3A%2F%2Fwww.h-online.com%2Fopen%2Fnews%2Fitem%2FBooting-Linux-using-UEFI-can-brick-Samsung-laptops-1793958.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=45" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZimmerRothmanHale2007" class="citation web cs1">Zimmer, Vincent; Rothman, Michael; Hale, Robert (10 May 2007). <a rel="nofollow" class="external text" href="http://www.drdobbs.com/embedded-systems/efi-architecture/199500688">"EFI Architecture"</a>. <i><a href="/wiki/Dr._Dobb%27s_Journal" title="Dr. Dobb's Journal">Dr. Dobb's Journal</a></i>. <a href="/wiki/UBM_plc" title="UBM plc">UBM</a><span class="reference-accessdate">. Retrieved <span class="nowrap">12 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Dr.+Dobb%27s+Journal&rft.atitle=EFI+Architecture&rft.date=2007-05-10&rft.aulast=Zimmer&rft.aufirst=Vincent&rft.au=Rothman%2C+Michael&rft.au=Hale%2C+Robert&rft_id=http%3A%2F%2Fwww.drdobbs.com%2Fembedded-systems%2Fefi-architecture%2F199500688&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFde_Boyne_Pollard2011" class="citation web cs1">de Boyne Pollard, Jonathan (11 July 2011). <a rel="nofollow" class="external text" href="http://jdebp.eu./FGA/efi-boot-process.html">"The EFI boot process"</a>. <i>Frequently Given Answers</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Frequently+Given+Answers&rft.atitle=The+EFI+boot+process&rft.date=2011-07-11&rft.aulast=de+Boyne+Pollard&rft.aufirst=Jonathan&rft_id=http%3A%2F%2Fjdebp.eu.%2FFGA%2Fefi-boot-process.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFde_Boyne_Pollard2011" class="citation web cs1">de Boyne Pollard, Jonathan (8 December 2011). <a rel="nofollow" class="external text" href="http://jdebp.eu./FGA/windows-nt-6-boot-process.html">"The Windows NT 6 boot process"</a>. <i>Frequently Given Answers</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Frequently+Given+Answers&rft.atitle=The+Windows+NT+6+boot+process&rft.date=2011-12-08&rft.aulast=de+Boyne+Pollard&rft.aufirst=Jonathan&rft_id=http%3A%2F%2Fjdebp.eu.%2FFGA%2Fwindows-nt-6-boot-process.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2011" class="citation web cs1">Smith, Roderick W. (2011). <a rel="nofollow" class="external text" href="http://rodsbooks.com/bios2uefi/">"A BIOS to UEFI Transformation"</a>. <i>Roderick W. Smith's Web Page</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Roderick+W.+Smith%27s+Web+Page&rft.atitle=A+BIOS+to+UEFI+Transformation&rft.date=2011&rft.aulast=Smith&rft.aufirst=Roderick+W.&rft_id=http%3A%2F%2Frodsbooks.com%2Fbios2uefi%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKothari2011" class="citation web cs1">Kothari, Rajiv (21 September 2011). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121025093125/http://www.hardwaresecrets.com/article/UEFI-Just-How-Important-It-Really-Is/1385">"UEFI – Just How Important It Really Is"</a>. <i>Hardware Secrets</i>. Archived from <a rel="nofollow" class="external text" href="http://www.hardwaresecrets.com/article/UEFI-Just-How-Important-It-Really-Is/1385">the original</a> on 25 October 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">12 October</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Hardware+Secrets&rft.atitle=UEFI+%E2%80%93+Just+How+Important+It+Really+Is&rft.date=2011-09-21&rft.aulast=Kothari&rft.aufirst=Rajiv&rft_id=http%3A%2F%2Fwww.hardwaresecrets.com%2Farticle%2FUEFI-Just-How-Important-It-Really-Is%2F1385&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFisher2011" class="citation journal cs1">Fisher, Doug (2011). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130927155448/http://noggin.intel.com/technology-journal/2011/151/uefi-today-bootstrapping-continuum">"UEFI Today: Bootstrapping the Continuum"</a>. <i>Intel Technology Journal</i>. <b>15</b> (1). Intel. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781934053430" title="Special:BookSources/9781934053430"><bdi>9781934053430</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://noggin.intel.com/technology-journal/2011/151/uefi-today-bootstrapping-continuum">the original</a> on 27 September 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Intel+Technology+Journal&rft.atitle=UEFI+Today%3A+Bootstrapping+the+Continuum&rft.volume=15&rft.issue=1&rft.date=2011&rft.isbn=9781934053430&rft.aulast=Fisher&rft.aufirst=Doug&rft_id=http%3A%2F%2Fnoggin.intel.com%2Ftechnology-journal%2F2011%2F151%2Fuefi-today-bootstrapping-continuum&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUEFI" class="Z3988"></span></li></ul> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=UEFI&action=edit&section=46" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Extensible_Firmware_Interface" class="extiw" title="commons:Category:Extensible Firmware Interface">Extensible Firmware Interface</a></span>.</div></div> </div> <ul><li><span class="official-website"><span class="url"><a rel="nofollow" class="external text" href="https://uefi.org/">Official website</a></span></span></li> <li><a rel="nofollow" class="external text" href="https://uefi.org/specifications">UEFI Specifications</a></li> <li><a rel="nofollow" class="external text" href="https://www.tianocore.org/">Intel-sponsored open-source EFI Framework initiative</a></li> <li><a rel="nofollow" class="external text" href="https://www.intel.com/content/www/us/en/architecture-and-technology/unified-extensible-firmware-interface/efi-homepage-general-technology.html">Intel EFI/UEFI portal</a></li> <li><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/hh824898(v=win.10)">Microsoft UEFI Support and Requirements for Windows Operating Systems</a></li> <li><a rel="nofollow" class="external text" href="https://www.techrepublic.com/blog/windows-and-office/how-windows-8-hybrid-shutdown-fast-boot-feature-works/">How Windows 8 Hybrid Shutdown / Fast Boot feature works</a></li> <li><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process">Securing the Windows 10 Boot Process</a></li> <li><a rel="nofollow" class="external text" href="https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/">LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Firmware_and_booting" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Firmware_and_booting" title="Template:Firmware and booting"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Firmware_and_booting" title="Template talk:Firmware and booting"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Firmware_and_booting" title="Special:EditPage/Template:Firmware and booting"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Firmware_and_booting" style="font-size:114%;margin:0 4em"><a href="/wiki/Firmware" title="Firmware">Firmware</a> and <a href="/wiki/Booting" title="Booting">booting</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Processes</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows" title="Booting process of Windows">Windows</a></span> <ul><li><span class="nowrap"><a href="/wiki/Architecture_of_Windows_9x#Boot_sequence" title="Architecture of Windows 9x">9x</a></span></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows_NT" class="mw-redirect" title="Booting process of Windows NT">NT</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Linux" title="Booting process of Linux">Linux</a></span> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Android_devices" title="Booting process of Android devices">Android</a></span></li></ul></li></ul> </div></td><td class="noviewer navbox-image" rowspan="10" style="width:1px;padding:0 0 0 2px"><div><span typeof="mw:File"><a href="/wiki/File:WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/100px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" decoding="async" width="100" height="100" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/150px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/200px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 2x" data-file-width="1535" data-file-height="1535" /></a></span></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Booting <a href="/wiki/Firmware#Computers" title="Firmware">firmware</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Types</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Proprietary_firmware" title="Proprietary firmware">Proprietary firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Open-source_firmware" title="Open-source firmware">Open-source firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Custom_firmware" title="Custom firmware">Custom firmware</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Interfaces</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a class="mw-selflink selflink">UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS" title="BIOS">BIOS</a></span> <ul><li><span class="nowrap"><a href="/wiki/Video_BIOS" title="Video BIOS">Video BIOS</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Open_Firmware" title="Open Firmware">Open Firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/ACPI" title="ACPI">ACPI</a></span></li> <li><span class="nowrap"><a href="/wiki/MultiProcessor_Specification" title="MultiProcessor Specification">MultiProcessor Specification</a></span></li> <li><span class="nowrap"><a href="/wiki/Advanced_Power_Management" title="Advanced Power Management">APM</a></span></li> <li><span class="nowrap"><a href="/wiki/Legacy_Plug_and_Play" title="Legacy Plug and Play">Legacy Plug and Play</a></span></li> <li><span class="nowrap"><a href="/wiki/ARC_(specification)" title="ARC (specification)">AlphaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/SRM_firmware" title="SRM firmware">SRM</a></span></li> <li><span class="nowrap"><a href="/wiki/Simple_Firmware_Interface" title="Simple Firmware Interface">SFI</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/SeaBIOS" title="SeaBIOS">SeaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Award_Software" title="Award Software">Award BIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/American_Megatrends" title="American Megatrends">American Megatrends</a></span> <ul><li><span class="nowrap"><a href="/wiki/AMIBIOS" class="mw-redirect" title="AMIBIOS">AMIBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/AMI_Aptio" class="mw-redirect" title="AMI Aptio">AMI Aptio</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Insyde_Software" title="Insyde Software">InsydeH2O</a></span></li> <li><span class="nowrap"><a href="/wiki/Phoenix_Technologies" title="Phoenix Technologies">Phoenix SecureCore UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/TianoCore_EDK_II" title="TianoCore EDK II">TianoCore EDK II</a></span></li> <li><span class="nowrap"><a href="/wiki/OpenBIOS" title="OpenBIOS">OpenBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Coreboot" title="Coreboot">Coreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Libreboot" title="Libreboot">Libreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/LinuxBoot" title="LinuxBoot">LinuxBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Kickstart_(Amiga)" title="Kickstart (Amiga)">Kickstart</a></span></li> <li><span class="nowrap"><a href="/wiki/Run-Time_Abstraction_Services" title="Run-Time Abstraction Services">Run-Time Abstraction Services</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hybrid firmware bootloader</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Common_Firmware_Environment" title="Common Firmware Environment">Common Firmware Environment</a> </span></li> <li><span class="nowrap"><a href="/wiki/Das_U-Boot" title="Das U-Boot">Das U-Boot</a></span></li> <li><span class="nowrap"><a href="/wiki/ARCS_(computing)" title="ARCS (computing)">ARCS</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Bootloaders" class="mw-redirect" title="Bootloaders">Bootloaders</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bootloader_unlocking" title="Bootloader unlocking">Bootloader unlocking</a></span></li> <li><span class="nowrap"><a href="/wiki/Comparison_of_bootloaders" title="Comparison of bootloaders">Comparison of bootloaders</a></span></li></ul> </div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th id="Implementations" scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Acronis_OS_Selector" class="mw-redirect" title="Acronis OS Selector">Acronis OS Selector</a></span></li> <li><span class="nowrap"><a href="/wiki/Barebox" title="Barebox">Barebox</a></span></li> <li><span class="nowrap"><a href="/wiki/BootManager" class="mw-redirect" title="BootManager">BootManager</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Apple)" title="BootX (Apple)">BootX (Apple)</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Linux)" title="BootX (Linux)">BootX (Linux)</a></span></li> <li><span class="nowrap"><a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRUB</a></span></li> <li><span class="nowrap"><a href="/wiki/IBoot" title="IBoot">iBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Systemd-boot" title="Systemd-boot">systemd-boot</a></span></li> <li><span class="nowrap"><a href="/wiki/Loadlin" title="Loadlin">loadlin</a></span></li> <li><span class="nowrap"><a href="/wiki/NTLDR" title="NTLDR">NTLDR</a></span></li> <li><span class="nowrap"><a href="/wiki/OpeniBoot" title="OpeniBoot">OpeniBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/RedBoot" title="RedBoot">RedBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/REFInd" title="REFInd">rEFInd</a></span></li> <li><span class="nowrap"><a href="/wiki/REFIt" title="REFIt">rEFIt</a></span></li> <li><span class="nowrap"><a href="/wiki/SYSLINUX" title="SYSLINUX">SYSLINUX</a></span></li> <li><span class="nowrap"><a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/XOSL" title="XOSL">xOSL</a></span></li> <li><span class="nowrap"><a href="/wiki/Yaboot" title="Yaboot">Yaboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Plop_Boot_Manager" title="Plop Boot Manager">Plop Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/MILO_(bootloader)" title="MILO (bootloader)">MILO</a></span></li></ul> </div></td></tr></tbody></table><div> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Partition layouts</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GUID Partition Table</a></span></li> <li><span class="nowrap"><a href="/wiki/Master_boot_record" title="Master boot record">Master boot record</a></span></li> <li><span class="nowrap"><a href="/wiki/Apple_Partition_Map" title="Apple Partition Map">Apple Partition Map</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/System_partition_and_boot_partition" title="System partition and boot partition">Partitions</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS_boot_partition" title="BIOS boot partition">BIOS boot partition</a></span></li> <li><span class="nowrap"><a href="/wiki//boot/" title="/boot/">/boot/</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Utilities</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Software</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Flashrom_(utility)" title="Flashrom (utility)">flashrom</a></span></li> <li><span class="nowrap"><a href="/wiki/Fwupd" title="Fwupd">fwupd</a></span></li> <li><span class="nowrap"><a href="/wiki/UEFITool" title="UEFITool">UEFITool</a></span></li> <li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)" title="Odin (firmware flashing software)">Odin</a></span> <ul><li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)#Heimdall" title="Odin (firmware flashing software)">Heimdall</a></span></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hardware</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bus_Pirate" title="Bus Pirate">Bus Pirate</a></span></li> <li><span class="nowrap"><a href="/wiki/Raspberry_Pi" title="Raspberry Pi">Raspberry Pi</a></span></li> <li><span class="nowrap"><a href="/wiki/FTDI" title="FTDI">ft2232</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Network_booting" title="Network booting">Network boot</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Preboot_Execution_Environment" title="Preboot Execution Environment">Preboot Execution Environment</a></span> <ul><li><span class="nowrap"><a href="/wiki/GPXE" title="GPXE">gPXE</a></span></li> <li><span class="nowrap"><a href="/wiki/IPXE" title="IPXE">iPXE</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/NetBoot" title="NetBoot">NetBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Remote_Initial_Program_Load" title="Remote Initial Program Load">Remote Initial Program Load</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-LAN" title="Wake-on-LAN">Wake-on-LAN</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-ring" title="Wake-on-ring">Wake-on-ring</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">ROM variants</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Read-only_memory" title="Read-only memory">ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/Programmable_ROM" title="Programmable ROM">PROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EPROM" title="EPROM">EPROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EEPROM" title="EEPROM">EEPROM</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Boot_ROM" title="Boot ROM">Boot ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_hacking" title="ROM hacking">ROM hacking</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_image" title="ROM image">ROM image</a></span></li> <li><span class="nowrap"><a href="/wiki/Execute_in_place" title="Execute in place">Execute in place</a></span></li> <li><span class="nowrap"><a href="/wiki/Devicetree" title="Devicetree">Devicetree</a></span></li> <li><span class="nowrap"><a href="/wiki/Fastboot" title="Fastboot">Fastboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Instant-on" title="Instant-on">Instant-on</a></span></li> <li><span class="nowrap"><a href="/wiki/Power-on_self-test" title="Power-on self-test">Power-on self-test</a></span></li> <li><span class="nowrap"><a href="/wiki/Qualcomm_EDL_mode" title="Qualcomm EDL mode">EDL mode</a></span></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐2kd4h Cached time: 20241122140744 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.821 seconds Real time usage: 2.014 seconds Preprocessor visited node count: 12764/1000000 Post‐expand include size: 341099/2097152 bytes Template argument size: 12384/2097152 bytes Highest expansion depth: 23/100 Expensive parser function count: 17/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 617939/5000000 bytes Lua time usage: 1.085/10.000 seconds Lua memory usage: 8623547/52428800 bytes Lua Profile: ? 260 ms 22.0% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::callParserFunction 260 ms 22.0% dataWrapper <mw.lua:672> 120 ms 10.2% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::gsub 100 ms 8.5% recursiveClone <mwInit.lua:45> 60 ms 5.1% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::getExpandedArgument 40 ms 3.4% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::plain 40 ms 3.4% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::get 40 ms 3.4% tonumber 40 ms 3.4% select_one <Module:Citation/CS1/Utilities:426> 40 ms 3.4% [others] 180 ms 15.3% Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1748.579 1 -total 52.83% 923.810 2 Template:Reflist 35.69% 624.102 136 Template:Cite_web 6.59% 115.197 15 Template:Fix 6.28% 109.740 4 Template:Navbox 6.16% 107.684 1 Template:Firmware_and_booting 5.47% 95.689 1 Template:Short_description 4.52% 78.987 17 Template:Cite_news 4.19% 73.247 1 Template:Infobox_technology_standard 3.92% 68.584 1 Template:Infobox --> <!-- Saved in parser cache with key enwiki:pcache:idhash:866065-0!canonical and timestamp 20241122140744 and revision id 1255965030. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=UEFI&oldid=1255965030">https://en.wikipedia.org/w/index.php?title=UEFI&oldid=1255965030</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Category</a>: <ul><li><a href="/wiki/Category:Unified_Extensible_Firmware_Interface" title="Category:Unified Extensible Firmware Interface">Unified Extensible Firmware Interface</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_url-status" title="Category:CS1 maint: url-status">CS1 maint: url-status</a></li><li><a href="/wiki/Category:CS1_Dutch-language_sources_(nl)" title="Category:CS1 Dutch-language sources (nl)">CS1 Dutch-language sources (nl)</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_February_2020" title="Category:Use dmy dates from February 2020">Use dmy dates from February 2020</a></li><li><a href="/wiki/Category:All_articles_lacking_reliable_references" title="Category:All articles lacking reliable references">All articles lacking reliable references</a></li><li><a href="/wiki/Category:Articles_lacking_reliable_references_from_September_2013" title="Category:Articles lacking reliable references from September 2013">Articles lacking reliable references from September 2013</a></li><li><a href="/wiki/Category:All_articles_with_vague_or_ambiguous_time" title="Category:All articles with vague or ambiguous time">All articles with vague or ambiguous time</a></li><li><a href="/wiki/Category:Vague_or_ambiguous_time_from_October_2024" title="Category:Vague or ambiguous time from October 2024">Vague or ambiguous time from October 2024</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_October_2024" title="Category:Articles with unsourced statements from October 2024">Articles with unsourced statements from October 2024</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_January_2024" title="Category:Articles containing potentially dated statements from January 2024">Articles containing potentially dated statements from January 2024</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_December_2021" title="Category:Articles with unsourced statements from December 2021">Articles with unsourced statements from December 2021</a></li><li><a href="/wiki/Category:All_articles_with_failed_verification" title="Category:All articles with failed verification">All articles with failed verification</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_November_2024" title="Category:Articles with failed verification from November 2024">Articles with failed verification from November 2024</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_December_2020" title="Category:Articles with failed verification from December 2020">Articles with failed verification from December 2020</a></li><li><a href="/wiki/Category:All_articles_with_specifically_marked_weasel-worded_phrases" title="Category:All articles with specifically marked weasel-worded phrases">All articles with specifically marked weasel-worded phrases</a></li><li><a href="/wiki/Category:Articles_with_specifically_marked_weasel-worded_phrases_from_October_2017" title="Category:Articles with specifically marked weasel-worded phrases from October 2017">Articles with specifically marked weasel-worded phrases from October 2017</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_October_2017" title="Category:Articles with unsourced statements from October 2017">Articles with unsourced statements from October 2017</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li><li><a href="/wiki/Category:Articles_with_example_C_code" title="Category:Articles with example C code">Articles with example C code</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 7 November 2024, at 14:25<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=UEFI&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-j7v4x","wgBackendResponseTime":176,"wgPageParseReport":{"limitreport":{"cputime":"1.821","walltime":"2.014","ppvisitednodes":{"value":12764,"limit":1000000},"postexpandincludesize":{"value":341099,"limit":2097152},"templateargumentsize":{"value":12384,"limit":2097152},"expansiondepth":{"value":23,"limit":100},"expensivefunctioncount":{"value":17,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":617939,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1748.579 1 -total"," 52.83% 923.810 2 Template:Reflist"," 35.69% 624.102 136 Template:Cite_web"," 6.59% 115.197 15 Template:Fix"," 6.28% 109.740 4 Template:Navbox"," 6.16% 107.684 1 Template:Firmware_and_booting"," 5.47% 95.689 1 Template:Short_description"," 4.52% 78.987 17 Template:Cite_news"," 4.19% 73.247 1 Template:Infobox_technology_standard"," 3.92% 68.584 1 Template:Infobox"]},"scribunto":{"limitreport-timeusage":{"value":"1.085","limit":"10.000"},"limitreport-memusage":{"value":8623547,"limit":52428800},"limitreport-profile":[["?","260","22.0"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::callParserFunction","260","22.0"],["dataWrapper \u003Cmw.lua:672\u003E","120","10.2"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::gsub","100","8.5"],["recursiveClone \u003CmwInit.lua:45\u003E","60","5.1"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::getExpandedArgument","40","3.4"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::plain","40","3.4"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::get","40","3.4"],["tonumber","40","3.4"],["select_one \u003CModule:Citation/CS1/Utilities:426\u003E","40","3.4"],["[others]","180","15.3"]]},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-2kd4h","timestamp":"20241122140744","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"UEFI","url":"https:\/\/en.wikipedia.org\/wiki\/UEFI","sameAs":"http:\/\/www.wikidata.org\/entity\/Q859398","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q859398","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2004-07-29T20:57:22Z","dateModified":"2024-11-07T14:25:58Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/e\/eb\/Lenovo_ThinkPad_T470_UEFI_BIOS_1.75_setup_-_boot_menu_selection.JPG","headline":"specification that defines a software interface between an operating system and platform firmware"}</script> </body> </html>