* Anyone got a good example of using acpica.org to execute AML code under EFI? @ 2018-01-17 2:58 Andrew Fish 2018-01-17 15:04 ` Laszlo Ersek 0 siblings, 1 reply; 2+ messages in thread From: Andrew Fish @ 2018-01-17 2:58 UTC (permalink / raw) To: edk2-devel@lists.01.org I was looking for some code to execute AML under ACPI. I see the acpica github supports building acpidump... Does anyone know of an example that supports executing AML from EFI? Thanks, Andrew Fish ^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Anyone got a good example of using acpica.org to execute AML code under EFI? 2018-01-17 2:58 Anyone got a good example of using acpica.org to execute AML code under EFI? Andrew Fish @ 2018-01-17 15:04 ` Laszlo Ersek 0 siblings, 0 replies; 2+ messages in thread From: Laszlo Ersek @ 2018-01-17 15:04 UTC (permalink / raw) To: Andrew Fish; +Cc: edk2-devel@lists.01.org, Josh Triplett On 01/17/18 03:58, Andrew Fish wrote: > I was looking for some code to execute AML under ACPI. I see the > acpica github supports building acpidump... Does anyone know of an > example that supports executing AML from EFI? Yes, I have tested (called) AML methods using ACPICA from EFI. The BIOS Bits project provides (among other things) a UEFI bootable ISO image that contains an EFI build of ACPICA. The ACPICA functionality is exposed via Python methods. If I remember correctly, the interface is simple enough for the user to call AML methods directly from the Python REPL. https://biosbits.org/ We've discussed the project on edk2-devel in the past, minimally under: http://mid.mail-archive.com/55E80FF8.10200@redhat.com Also CC'ing Josh. Thanks Laszlo ^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-01-17 14:58 UTC | newest] Thread overview: 2+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-01-17 2:58 Anyone got a good example of using acpica.org to execute AML code under EFI? Andrew Fish 2018-01-17 15:04 ` Laszlo Ersek
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox