On 09/03/15 17:57, Moore, Robert wrote: > > >> -----Original Message----- >> From: Laszlo Ersek [mailto:ler...@redhat.com] >> Sent: Thursday, September 03, 2015 8:54 AM >> To: Josh Triplett >> Cc: edk2-devel-01; qemu devel list; Michael Tsirkin; Igor Mammedov; Marcel >> Apfelbaum; Paolo Bonzini; Shannon Zhao; Moore, Robert; Smith, Jonathan D; >> Jake Edge >> Subject: Re: "Using Python to investigate EFI and ACPI" >> >> Another question: when you execute an AML method that does, say, IO port >> access, does the AML interpreter of ACPICA actually *perform* that IO port >> access? Because, the one that is embedded in Linux obviously does, and the >> one that is embedded in the userspace ACPICA command line utility >> "acpiexec" obviously doesn't. > > We have recently integrated the ACPICA AML debugger with the Linux kernel, > and we have a userspace utility that allows communication with the debugger. > This allows the user to enter debugger commands such as "execute control > method", > and the commands are carried out by the kernel code -- thus talking to the > actual hardware.
... Was it merged in commit c91c5b276b? The series at <https://lkml.org/lkml/2015/8/24/921>? Or is that "only" a followup series to the main work? Can you please provide a pointer to the userspace tool as well? This thread is getting better and better. :) Thank you! Laszlo _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel