summaryrefslogtreecommitdiffstats
path: root/Nt32Pkg/Library
diff options
context:
space:
mode:
authorGary Lin <glin@suse.com>2016-10-19 15:01:29 +0800
committerRuiyu Ni <ruiyu.ni@intel.com>2016-11-15 11:05:33 +0800
commit8aa9d680329cb9fa5c8e517727dd14eb4bebc408 (patch)
tree9eefb523933dd84e30db1cae7f0db9e4d11452d4 /Nt32Pkg/Library
parent34f5c23452b3bbc43ebfe8aaa8f2fdcd35669dc3 (diff)
downloadedk2-8aa9d680329cb9fa5c8e517727dd14eb4bebc408.tar.gz
edk2-8aa9d680329cb9fa5c8e517727dd14eb4bebc408.tar.bz2
edk2-8aa9d680329cb9fa5c8e517727dd14eb4bebc408.zip
Nt32Pkg: Fix typos in comments and variables
- discontiguous -> discontinuous - reloaced -> relocated - supresses -> suppresses - debuging -> debugging - suported -> supported - availble -> available - environmemt -> environment - Seperator -> Separator - remmeber -> remember - interperted -> interpreted - the a new -> the new - initailized -> initialized - attribue -> attribute - boundry -> boundary - nto -> not - permenent -> permanent - immediatly -> immediately - excuted -> executed Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com> Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Gary Lin <glin@suse.com>
Diffstat (limited to 'Nt32Pkg/Library')
-rw-r--r--Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLib.c8
-rw-r--r--Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c6
2 files changed, 7 insertions, 7 deletions
diff --git a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLib.c b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLib.c
index 524d6c060d..2f62d656ec 100644
--- a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLib.c
+++ b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLib.c
@@ -290,7 +290,7 @@ PeCoffLoaderRelocateImageExtraAction (
// If we load our own PE COFF images the Windows debugger can not source
// level debug our code. If a valid PDB pointer exists usw it to load
// the *.dll file as a library using Windows* APIs. This allows
- // source level debug. The image is still loaded and reloaced
+ // source level debug. The image is still loaded and relocated
// in the Framework memory space like on a real system (by the code above),
// but the entry point points into the DLL loaded by the code bellow.
//
@@ -335,11 +335,11 @@ PeCoffLoaderRelocateImageExtraAction (
if (Library != NULL) {
//
// InitializeDriver is the entry point we put in all our EFI DLL's. The
- // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() supresses the
+ // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() suppresses the
// normal DLL entry point of DllMain, and prevents other modules that are
// referenced in side the DllFileName from being loaded. There is no error
// checking as the we can point to the PE32 image loaded by Tiano. This
- // step is only needed for source level debuging
+ // step is only needed for source level debugging
//
DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library, "InitializeDriver");
@@ -355,7 +355,7 @@ PeCoffLoaderRelocateImageExtraAction (
DEBUG ((EFI_D_ERROR, "WARNING: DLL already loaded. No source level debug %s. \n", DllFileName));
} else {
//
- // This DLL is not already loaded, so source level debugging is suported.
+ // This DLL is not already loaded, so source level debugging is supported.
//
ImageContext->EntryPoint = (EFI_PHYSICAL_ADDRESS) (UINTN) DllEntryPoint;
DEBUG ((EFI_D_INFO, "LoadLibraryEx (%s,\n NULL, DONT_RESOLVE_DLL_REFERENCES)\n", DllFileName));
diff --git a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c
index b05834e974..682446ad86 100644
--- a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c
+++ b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c
@@ -155,7 +155,7 @@ PeCoffLoaderRelocateImageExtraAction (
// If we load our own PE COFF images the Windows debugger can not source
// level debug our code. If a valid PDB pointer exists usw it to load
// the *.dll file as a library using Windows* APIs. This allows
- // source level debug. The image is still loaded and reloaced
+ // source level debug. The image is still loaded and relocated
// in the Framework memory space like on a real system (by the code above),
// but the entry point points into the DLL loaded by the code bellow.
//
@@ -200,11 +200,11 @@ PeCoffLoaderRelocateImageExtraAction (
if (Library != NULL) {
//
// InitializeDriver is the entry point we put in all our EFI DLL's. The
- // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() supresses the
+ // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() suppresses the
// normal DLL entry point of DllMain, and prevents other modules that are
// referenced in side the DllFileName from being loaded. There is no error
// checking as the we can point to the PE32 image loaded by Tiano. This
- // step is only needed for source level debuging
+ // step is only needed for source level debugging
//
DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library, "InitializeDriver");