EFI and SMC firmware updates for Intel-based Macs

 
Thread Tools Search this Thread
Operating Systems OS X (Apple) OS X Support RSS EFI and SMC firmware updates for Intel-based Macs
# 1  
Old 10-31-2010
EFI and SMC firmware updates for Intel-based Macs

This article lists firmware updates that were released for Intel-based Macintosh computers. They update the firmware that originally shipped from the factory. If your computer does not appear on this list, an update from the factory firmware is not necessary. Some firmware updates for Intel-based Macs may not be displayed automatically using Software Update. If they do not appear in Software Update, they must be manually downloaded from the Apple Downloads site. If you are unsure whether your computer needs a particular update, simply download and open the update installer. The installer will alert you if the firmware update is already installed or not needed.

More from Apple OS X Support ...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. AIX

HMC updates managed system firmware on both T and P sides ?

Hi, I'm planning to update managed system firmware to new release using HMC. This is cite from IBM documentation describing HMC managed system updates: What I know we install new firmware to T side and in case some problems we boot P side and reject new fw on T. So if HMC updates both T and... (0 Replies)
Discussion started by: vilius
0 Replies

2. UNIX for Advanced & Expert Users

ILOM Alert messages to Solaris OS - X4250 (Intel based NO ALOM)

Hi, I have a problem when running some tests. I unplug one power cable from the server. No message is sent to/var/adm/messages On the ILOM GUI, it shows power state deasserted. Anyone knows how to forward this message to the OS, perhaps using the alert management settings? IPMI,snmp?... (1 Reply)
Discussion started by: ulemsee
1 Replies

3. Solaris

Intel Based Solaris

Hello all mentor. I am a new in this furom and also just self studying unix environment. :confused: I have installed intel solaris 9 in my laptop and i have forgotten the root password nor maybe the numlock or capslock of the keyboard was enabled during I enter the password installation... (3 Replies)
Discussion started by: eykyn17
3 Replies
Login or Register to Ask a Question
EFICHECK(8)						    BSD System Manager's Manual 					       EFICHECK(8)

NAME
eficheck -- check the integrity of the x86 flash chip firmware. SYNOPSIS
eficheck --integrity-check [-h EFI-hash-input-file] [-b EFI-binary-input-file] eficheck --show-hashes [-h EFI-hash-input-file] [-b EFI-binary-input-file] eficheck --generate-hashes [-h EFI-hash-output-file] [-p output-path] eficheck --save [-b EFI-binary-output-file] eficheck --cleanup [-b EFI-binary-input-and-output-file>] eficheck --version eficheck --help DESCRIPTION
eficheck is a tool to check the x86 flash chip firmware. The following commands can be used with eficheck: --integrity-check hashes portion of the firmware and compares against known-good hashes --generate-hashes outputs hashes for a given firmware to be used as known-good hashes --show-hashes shows the hashes for the sub-sections of the firmware which are measured --save saves the full flash chip contents to a binary file. Requires root privileges. --cleanup zeros any privacy-sensitive data (such as nvram), enabling the file to be shared for analysis. --version print out eficheck version number. --help display a short help. EXAMPLES
'eficheck --save -b firmware.bin' Save this system's EFI firmware as firmware.bin 'eficheck --cleanup -b firmware.bin' Overwrite the EFI variables portion of the firmware.bin, in place 'eficheck --generate-hashes' Analyze the current system's installed EFI firmware, and store the hashes into hash file(s) in current folder File name(s) will be selected according to image's EFI version(s) 'eficheck --generate-hashes -b firmware.bin' Analyze the firmware.bin, and store the hashes into hash file(s) in current folder. Filename will be based on the detected firmware version. 'eficheck --generate-hashes -p /usr/local/allowlists' Analyze the current system's installed EFI firmware, and store the hashes into hash file(s) in /usr/local/allowlists folder 'eficheck --integrity-check' Attempt to automatically determine which firmware you are running, and integrity check against the appropriate file, and report any differences 'eficheck --integrity-check -h /usr/libexec/firmwarecheckers/eficheck/EFIAllowListShipping.bun- dle/allowlists/IM171.88Z.0105.B08.1604111319.0.ealf' Compare the current system's EFI firmware against the Apple-provided expected measurements for an "iMac17,1" at firmware revision B08, and report any differences 'eficheck --integrity-check -h hash.ealf -b firmware.bin' Compare the given hash file against against the given firmware image and report any differences 'eficheck --show-hashes' Print the hashes for the current system's installed EFI firmware to stdout 'eficheck --show-hashes -b firmware.bin' Print the hashes for the given firmware.bin to stdout 'eficheck --show-hashes -h IM171.88Z.0105.B08.1604111319.0.ealf' Print the hashes for the given allowlist to stdout May 25, 2017