* Anyone got a good example of using acpica.org to execute AML code under EFI?
@ 2018-01-17 2:58 Andrew Fish
2018-01-17 15:04 ` Laszlo Ersek
0 siblings, 1 reply; 2+ messages in thread
From: Andrew Fish @ 2018-01-17 2:58 UTC (permalink / raw)
To: edk2-devel@lists.01.org
I was looking for some code to execute AML under ACPI. I see the acpica github supports building acpidump... Does anyone know of an example that supports executing AML from EFI?
Thanks,
Andrew Fish
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Anyone got a good example of using acpica.org to execute AML code under EFI?
2018-01-17 2:58 Anyone got a good example of using acpica.org to execute AML code under EFI? Andrew Fish
@ 2018-01-17 15:04 ` Laszlo Ersek
0 siblings, 0 replies; 2+ messages in thread
From: Laszlo Ersek @ 2018-01-17 15:04 UTC (permalink / raw)
To: Andrew Fish; +Cc: edk2-devel@lists.01.org, Josh Triplett
On 01/17/18 03:58, Andrew Fish wrote:
> I was looking for some code to execute AML under ACPI. I see the
> acpica github supports building acpidump... Does anyone know of an
> example that supports executing AML from EFI?
Yes, I have tested (called) AML methods using ACPICA from EFI. The BIOS
Bits project provides (among other things) a UEFI bootable ISO image
that contains an EFI build of ACPICA. The ACPICA functionality is
exposed via Python methods. If I remember correctly, the interface is
simple enough for the user to call AML methods directly from the Python
REPL.
https://biosbits.org/
We've discussed the project on edk2-devel in the past, minimally under:
http://mid.mail-archive.com/55E80FF8.10200@redhat.com
Also CC'ing Josh.
Thanks
Laszlo
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-01-17 14:58 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-01-17 2:58 Anyone got a good example of using acpica.org to execute AML code under EFI? Andrew Fish
2018-01-17 15:04 ` Laszlo Ersek
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox