From owner-freebsd-hackers@FreeBSD.ORG Mon Mar 9 16:20:05 2015 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6EB0F169 for ; Mon, 9 Mar 2015 16:20:05 +0000 (UTC) Received: from tensor.andric.com (tensor.andric.com [IPv6:2001:7b8:3a7:1:2d0:b7ff:fea0:8c26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1AC55FAA for ; Mon, 9 Mar 2015 16:20:05 +0000 (UTC) Received: from coleburn.avinity.tv (unknown [77.243.161.229]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id B51C75C48; Mon, 9 Mar 2015 17:19:58 +0100 (CET) Subject: Re: Booting FreeBSD under UEFI x86-64 hardware Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\)) Content-Type: multipart/signed; boundary="Apple-Mail=_4A32D0FD-CAD5-4770-9092-FB8C6C002D9E"; protocol="application/pgp-signature"; micalg=pgp-sha1 X-Pgp-Agent: GPGMail 2.5b5 From: Dimitry Andric In-Reply-To: Date: Mon, 9 Mar 2015 17:19:54 +0100 Message-Id: <7C95EDD1-F2A3-4120-BF04-49E0A6DC83FF@FreeBSD.org> References: To: JCA <1.41421@gmail.com> X-Mailer: Apple Mail (2.2070.6) Cc: freebsd-hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Mar 2015 16:20:05 -0000 --Apple-Mail=_4A32D0FD-CAD5-4770-9092-FB8C6C002D9E Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii On 09 Mar 2015, at 17:12, JCA <1.41421@gmail.com> wrote: > > I have just started looking into what is involved in booting FreeBSD > on UEFI-based x86-64 hardware. I was wondering if anybody in this > group could provide some pointers where to start. I am interested in > the FreeBSD boot code under UEFI in general, with a particular > emphasis on how the FreeBSD loader exploits the secure boot > capabilities supported by recent UEFI versions. I'd be most grateful > if anybody can point me in the right direction on this. Start here: https://wiki.freebsd.org/UEFI Executive summary: it works, but with some caveats (e.g. no ZFS). -Dimitry --Apple-Mail=_4A32D0FD-CAD5-4770-9092-FB8C6C002D9E Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.26 iEYEARECAAYFAlT9yC0ACgkQsF6jCi4glqPfRACeMfNyMrnwH2LauaPwVc+LkeTt ZTsAoPivdxKRWLq+kbPxt1LGppPSl6dO =ZTnp -----END PGP SIGNATURE----- --Apple-Mail=_4A32D0FD-CAD5-4770-9092-FB8C6C002D9E--