From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web10.9158.1672992328394197625 for ; Fri, 06 Jan 2023 00:05:29 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=R96Ln5Y1; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672992328; x=1704528328; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=DcN6O+YYgRjhi/MmttM6hOwXopeMaMCSHwYMU4tKB0A=; b=R96Ln5Y1P3EPWwjps9tdoOqvhAFrJXRnsymTkYzNmOr4nIsPnItKWCJe qhyw9oAYZaP1sCWO37nmsKoRojjozy40J/F4tk7LWmZGaVG3enPlBK+Ke g5QCf0FUy8gMBhn99CKEdQw07nHlgWc9OIZPd6CL4D174FWQOFmdUHFsx h4ktR6vcwrinDgGPfhiUzFwbLik9oTm1eyAPFeTXNLMfBXQIEQIPF6+ta VVpCnHEyKz3GSysXIgFq5euZ9+/NHjtEJb7vQTZzlQE+lJxRVJTNbGjRQ V7gnl5SM8R4MH0aIoTFdB4EKH5yx39WzLAanefh3BEpGix+QZzGJWI5Y4 g==; X-IronPort-AV: E=McAfee;i="6500,9779,10581"; a="324447765" X-IronPort-AV: E=Sophos;i="5.96,304,1665471600"; d="scan'208";a="324447765" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jan 2023 00:05:27 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10581"; a="763442593" X-IronPort-AV: E=Sophos;i="5.96,304,1665471600"; d="scan'208";a="763442593" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by fmsmga002.fm.intel.com with ESMTP; 06 Jan 2023 00:05:26 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Fri, 6 Jan 2023 00:05:25 -0800 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Fri, 6 Jan 2023 00:05:25 -0800 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Fri, 6 Jan 2023 00:05:25 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PqNdXMjfSfYPUFvmphIr88lvEIhoLsXGsy7b6+oNmLTZ3QgcooXFruVqZZrw1xb0oK1z8CQM3GPH/FF1cC+NJeyD0cHGfRG/M4Xp3rSSl5xwLRUS50fNK2/bon07jPvDKyB86qWn+QQKry/Bes5Pnc7GbBOk8adLLVJ9Qnev0zcGYq2yhjfFNan8DN7xZBX3MNwAXPOu04dF1/M1+J61Kp3XPlekB8gvO+n13lQDQ6H7j2LYfSTbdeW3SnqQdKj+UwOGk9MTiZs4gBIRraUBsI3rFLOzGVYj+lrF2xnxmy/km0LPJ1gZIrEKHBr7Nv982QarhlDoiFEkLjo/1q4v6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=I0MlAxPF4EGVDYNe0OyqonWtrRgzHQTxjOXCc8wp50Q=; b=dFaM00+/UC3DXK/OxjHa5ud87uzYr3yzde1acdZSgL9ZMOIaG6p0Al6VknpfSiSoIJ8kDBxBckEbEOghBLcl7cmV7avao4vruV7J9dJxQcxTsF31vkpNBfeA82nCVKmJlFBun1C/MuQSIHMgcAZGJfAoXuY56QLtPePJw/OpRMluylf083hzIaHRL7LI9HqLWvPTYXc3sBEQOF6ESbeyuNRhTK3Se5aaaQIgd/rtd6aMblB08DaAp08zcnXPVxiMCv8ryucxVDgLm1UCcJ91gPPlRLn6yXFiutbLSD5Wax64+G7msaKJoFDUcdv93IN9Zk82OUbDp5D7/GYSSlHaMw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by SJ0PR11MB4845.namprd11.prod.outlook.com (2603:10b6:a03:2d1::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Fri, 6 Jan 2023 08:05:24 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041%9]) with mapi id 15.20.5944.019; Fri, 6 Jan 2023 08:05:23 +0000 From: "Yao, Jiewen" To: "Xu, Min M" , "devel@edk2.groups.io" CC: "Wang, Jian J" , Arti Gupta Subject: Re: [PATCH V1 1/1] SecurityPkg: Move TdTcg2Dxe from OvmfPkg to SecurityPkg Thread-Topic: [PATCH V1 1/1] SecurityPkg: Move TdTcg2Dxe from OvmfPkg to SecurityPkg Thread-Index: AQHZID56vG/EQhD+eEC+rOj4uptR366RCrew Date: Fri, 6 Jan 2023 08:05:23 +0000 Message-ID: References: <20230104131405.1729-1-min.m.xu@intel.com> In-Reply-To: <20230104131405.1729-1-min.m.xu@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|SJ0PR11MB4845:EE_ x-ms-office365-filtering-correlation-id: 97e6564d-6b9b-4505-6659-08daefbcc37c x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(6029001)(39860400002)(346002)(376002)(136003)(396003)(366004)(451199015)(76116006)(5660300002)(52536014)(316002)(66556008)(15650500001)(41300700001)(2906002)(54906003)(66446008)(19627235002)(64756008)(4326008)(66476007)(8936002)(8676002)(66946007)(478600001)(71200400001)(6506007)(83380400001)(53546011)(966005)(33656002)(26005)(110136005)(186003)(9686003)(7696005)(55016003)(86362001)(38070700005)(122000001)(38100700002)(82960400001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?+SBNfQAjiTsqJdOrDuiOY2lmuQdBVSlLdpHTnTHFCi8w1/Dk2PhuQYHG7o2H?= =?us-ascii?Q?5ADL5VJvLvM1gUsGgvFj6OE86LvhX1AcmyLGR5mG1y3vlaQQf+Rj4XIODXBu?= =?us-ascii?Q?mLKwxDohjygj+SD9y8q5xoaHEDA0DMOFC6H5eBWtqxuo1zGcHB88l5TvTPzl?= =?us-ascii?Q?qug3E44YCY5MPzTZqF9kiii8i7Z+pVYKEQAhBCPjbnovv01f90RZN/4yj7s5?= =?us-ascii?Q?EBxl83meylq3gR5Yc2zji9ww/TAZnyl/fArUv/iSdp8d4GM9ht1ymDEqsW61?= =?us-ascii?Q?g3GjygvMTL4J7NRxmsrIx77elZtNymflGm0U3TwM6N2G8Ir/c9Zzioz0Kjhn?= =?us-ascii?Q?vL1KVkQZkiI3YLWjrgyrPE70B6iQSeUbXRDlTJCe4EfJjP27Fd7/vasHmqeg?= =?us-ascii?Q?VzZTccR3T769Vn6BJHyu3SphbLGIuLyCs75xABuFP8ufSCvgyjOP4XCMOjw2?= =?us-ascii?Q?5yoEjUms8SaNbYnU3hpJw2FGs4T6R4ahBd0DyG5zN9KseHNj4qqjuxc99St+?= =?us-ascii?Q?ZtxXCmLZYzsEuu4FkAuYOfdJXj+IafLW6DweXxdXmEHI0JYidwmamdyaPBBG?= =?us-ascii?Q?nlLZ7vOhP7Wl4CqLm9BmWTADL1MhZMk0OdVvfMEvyDkrCFUksA5+ot4/g4eC?= =?us-ascii?Q?pLwPAy5c8J+kAVbLMFIbKxH3Fi2xQDePmbXyWysSlcAYpqf4irLpsZ/N838F?= =?us-ascii?Q?Ulhzy0Im8X3bDMcr/0JeTSckCGvZnXeVb6CPkdnCkNYWzmsoS0c6JcsmBfa1?= =?us-ascii?Q?XW8pl7ntKUY5Xdv5O6WKvWsB4aZRTicBEYcp+oQgVKBhtk7PQITvWLY4G2Ni?= =?us-ascii?Q?R11mcJH6CAHa5XaXLoD3ATqtWQ//HwOqPa4BtoC+VMo9ujZjOfGklRVBLfQs?= =?us-ascii?Q?0H4fkN0jaFmSNi2T51hDmWCQqYUACBEfsAsTIN+Ffjm9Od6w73/HwuFzosry?= =?us-ascii?Q?Sz17vjfWb+fI1DFE0WA837IudtaOERX2EwPxiyS4shcpfh5hrBOfdXqWgg9Q?= =?us-ascii?Q?H/9fXkZyZLjwu6Ap2N0u4roSh4RVPAjLtEBAh90X7BIOvYQpV/GhDaOz2I5W?= =?us-ascii?Q?6mlPPEdwQ+0GcF1trkoNbVYYX2Oi+XHzTmxdnld9KnlckBonAQMb+XhZ72cm?= =?us-ascii?Q?RAiIqhRanpv6d6EnUpYT5HuSZ3D16QQNnFTCAzdVh2Ruj/TlaSvzTx+fVx3T?= =?us-ascii?Q?Y/WIZldHxcdk9M1Qd0f2Dd0Ev6Vl/Zn1tIeb74b4hCAuWwqK/nKC+FCtzh3/?= =?us-ascii?Q?LqNIiY7DMDazX4MI+bhBULo9+De3o6XtR4HF8qr1mLL/SLq0RqePK3dD8rPI?= =?us-ascii?Q?3K5/ZLkLnQwmGppAt7sCSv9N0BWnMRhr8F6mjaWxB961+8VYYwERCrH0HbR4?= =?us-ascii?Q?r+j0JH4iPLzqwgs7HZir+LqHsmEQlGlb7smWyTbuUAN16eGMrJvZj/Q3yF3d?= =?us-ascii?Q?zl2+0qTfJ5xAgfdPfGYKx2dOqS0uqfdUUyutVPb/V9drW2T/cRIweruGnK+b?= =?us-ascii?Q?TQ7rJWt1YnU5ulZNtsLHn0Yh5pb+0HVQPTbWlmvJtU3GnQ+FjQTUR/ysj4L6?= =?us-ascii?Q?BX8oG3foqMmZLGLctkoUB4VwSnLnTSeLRQVuWJEu?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 97e6564d-6b9b-4505-6659-08daefbcc37c X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jan 2023 08:05:23.8321 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FqTtl1fTCrpAESdfBK03TBT/fvQFldzXq1y013CvIIwwh5LC3XbkpHu1igTBaoDxNlGCPU6DJPaVmWgDzC/50w== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4845 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Jiewen Yao > -----Original Message----- > From: Xu, Min M > Sent: Wednesday, January 4, 2023 9:14 PM > To: devel@edk2.groups.io > Cc: Xu, Min M ; Yao, Jiewen ; > Wang, Jian J ; Arti Gupta > Subject: [PATCH V1 1/1] SecurityPkg: Move TdTcg2Dxe from OvmfPkg to > SecurityPkg >=20 > From: Min M Xu >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4194 >=20 > The TdTcg2Dxe lives in the OvmfPkg instead of the SecurityPkg. Having > the TdTcg2Dxe at the same place as Tcg2Dxe will be easier for platforms t= o > consume. >=20 > Definition of PcdCcEventlogAcpiTableLaml and PcdCcEventlogAcpiTableLasa > are also moved from OvmfPkg.dec to SecurityPkg.dec. >=20 > Cc: Jiewen Yao > Cc: Jian J Wang > Cc: Arti Gupta > Signed-off-by: Min Xu > --- > OvmfPkg/IntelTdx/IntelTdxX64.dsc | 2 +- > OvmfPkg/IntelTdx/IntelTdxX64.fdf | 2 +- > OvmfPkg/OvmfPkg.dec | 6 ------ > SecurityPkg/SecurityPkg.dec | 6 ++++++ > SecurityPkg/SecurityPkg.dsc | 5 +++++ > .../Tcg}/TdTcg2Dxe/MeasureBootPeCoff.c | 0 > {OvmfPkg/IntelTdx =3D> SecurityPkg/Tcg}/TdTcg2Dxe/TdTcg2Dxe.c | 0 > .../IntelTdx =3D> SecurityPkg/Tcg}/TdTcg2Dxe/TdTcg2Dxe.inf | 5 ++--- > 8 files changed, 15 insertions(+), 11 deletions(-) > rename {OvmfPkg/IntelTdx =3D> > SecurityPkg/Tcg}/TdTcg2Dxe/MeasureBootPeCoff.c (100%) > rename {OvmfPkg/IntelTdx =3D> SecurityPkg/Tcg}/TdTcg2Dxe/TdTcg2Dxe.c > (100%) > rename {OvmfPkg/IntelTdx =3D> SecurityPkg/Tcg}/TdTcg2Dxe/TdTcg2Dxe.inf > (93%) >=20 > diff --git a/OvmfPkg/IntelTdx/IntelTdxX64.dsc > b/OvmfPkg/IntelTdx/IntelTdxX64.dsc > index 6ec64df91871..5bd74639b448 100644 > --- a/OvmfPkg/IntelTdx/IntelTdxX64.dsc > +++ b/OvmfPkg/IntelTdx/IntelTdxX64.dsc > @@ -774,7 +774,7 @@ > # > # Cc Measurement Protocol for Td guest > # > - OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf { > + SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf { > > HashLib|SecurityPkg/Library/HashLibTdx/HashLibTdx.inf >=20 > NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.in > f > diff --git a/OvmfPkg/IntelTdx/IntelTdxX64.fdf > b/OvmfPkg/IntelTdx/IntelTdxX64.fdf > index e79ad3e10217..a57bbcee8986 100644 > --- a/OvmfPkg/IntelTdx/IntelTdxX64.fdf > +++ b/OvmfPkg/IntelTdx/IntelTdxX64.fdf > @@ -298,7 +298,7 @@ INF > MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf > # > # EFI_CC_MEASUREMENT_PROTOCOL > # > -INF OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf > +INF SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf >=20 >=20 > ################################################################ > ################ >=20 > diff --git a/OvmfPkg/OvmfPkg.dec b/OvmfPkg/OvmfPkg.dec > index 693925a1dc7a..e07546f4a701 100644 > --- a/OvmfPkg/OvmfPkg.dec > +++ b/OvmfPkg/OvmfPkg.dec > @@ -459,12 +459,6 @@ > # 2 - set by GOP Driver. > gUefiOvmfPkgTokenSpaceGuid.PcdVideoResolutionSource|0|UINT8|0x64 >=20 > - ## This PCD records LAML field in CC EVENTLOG ACPI table. > - > gUefiOvmfPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLaml|0|UINT32|0x66 > - > - ## This PCD records LASA field in CC EVENTLOG ACPI table. > - > gUefiOvmfPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLasa|0|UINT64|0x67 > - > [PcdsFeatureFlag] >=20 > gUefiOvmfPkgTokenSpaceGuid.PcdQemuBootOrderPciTranslation|TRUE|BO > OLEAN|0x1c >=20 > gUefiOvmfPkgTokenSpaceGuid.PcdQemuBootOrderMmioTranslation|FALSE| > BOOLEAN|0x1d > diff --git a/SecurityPkg/SecurityPkg.dec b/SecurityPkg/SecurityPkg.dec > index 358b3dc543a1..8257f11d17c7 100644 > --- a/SecurityPkg/SecurityPkg.dec > +++ b/SecurityPkg/SecurityPkg.dec > @@ -574,5 +574,11 @@ > # @Prompt Tpm2AcpiTableLasa LASA field in TPM2 ACPI table. >=20 > gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableLasa|0|UINT64|0x000100 > 23 >=20 > + ## This PCD records LAML field in CC EVENTLOG ACPI table. > + > gEfiSecurityPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLaml|0|UINT32|0x0 > 0010025 > + > + ## This PCD records LASA field in CC EVENTLOG ACPI table. > + > gEfiSecurityPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLasa|0|UINT64|0x00 > 010026 > + > [UserExtensions.TianoCore."ExtraFiles"] > SecurityPkgExtra.uni > diff --git a/SecurityPkg/SecurityPkg.dsc b/SecurityPkg/SecurityPkg.dsc > index 2f679c87a92f..3bad5375c01a 100644 > --- a/SecurityPkg/SecurityPkg.dsc > +++ b/SecurityPkg/SecurityPkg.dsc > @@ -296,6 +296,11 @@ > [Components.X64] > SecurityPkg/Library/HashLibTdx/HashLibTdx.inf >=20 > SecurityPkg/Library/SecTpmMeasurementLib/SecTpmMeasurementLibTdx.in > f > + SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf { > + > + HashLib|SecurityPkg/Library/HashLibTdx/HashLibTdx.inf > + > NULL|SecurityPkg/Library/HashInstanceLibSha384/HashInstanceLibSha384.in > f > + } >=20 > [Components.IA32, Components.X64] >=20 > SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfig > Dxe.inf > diff --git a/OvmfPkg/IntelTdx/TdTcg2Dxe/MeasureBootPeCoff.c > b/SecurityPkg/Tcg/TdTcg2Dxe/MeasureBootPeCoff.c > similarity index 100% > rename from OvmfPkg/IntelTdx/TdTcg2Dxe/MeasureBootPeCoff.c > rename to SecurityPkg/Tcg/TdTcg2Dxe/MeasureBootPeCoff.c > diff --git a/OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.c > b/SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.c > similarity index 100% > rename from OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.c > rename to SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.c > diff --git a/OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf > b/SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf > similarity index 93% > rename from OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf > rename to SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf > index 5efe7ef479f1..6861a1452d51 100644 > --- a/OvmfPkg/IntelTdx/TdTcg2Dxe/TdTcg2Dxe.inf > +++ b/SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf > @@ -31,7 +31,6 @@ > MdeModulePkg/MdeModulePkg.dec > SecurityPkg/SecurityPkg.dec > CryptoPkg/CryptoPkg.dec > - OvmfPkg/OvmfPkg.dec >=20 > [LibraryClasses] > MemoryAllocationLib > @@ -85,8 +84,8 @@ > gEfiSecurityPkgTokenSpaceGuid.PcdTcg2NumberOfPCRBanks = ## > CONSUMES > gEfiSecurityPkgTokenSpaceGuid.PcdTcgLogAreaMinLen = ## > CONSUMES > gEfiSecurityPkgTokenSpaceGuid.PcdTcg2FinalLogAreaLen = ## > CONSUMES > - gUefiOvmfPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLaml = ## > PRODUCES > - gUefiOvmfPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLasa = ## > PRODUCES > + gEfiSecurityPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLaml = ## > PRODUCES > + gEfiSecurityPkgTokenSpaceGuid.PcdCcEventlogAcpiTableLasa = ## > PRODUCES > gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemId = ## > CONSUMES > gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemTableId > ## CONSUMES > gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiDefaultOemRevision > ## CONSUMES > -- > 2.29.2.windows.2