Reviewed-by: Ruiyu Ni <[email protected]>
> -----Original Message-----
> From: edk2-devel [mailto:[email protected]] On Behalf Of
> Gary Lin
> Sent: Wednesday, October 19, 2016 3:01 PM
> To: [email protected]
> Cc: Ni, Ruiyu <[email protected]>
> Subject: [edk2] [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables
> 
> - discontiguous -> discontinuous
> - reloaced -> relocated
> - supresses -> suppresses
> - debuging -> debugging
> - suported -> supported
> - availble -> available
> - environmemt -> environment
> - Seperator -> Separator
> - remmeber -> remember
> - interperted -> interpreted
> - the a new -> the new
> - initailized -> initialized
> - attribue -> attribute
> - boundry -> boundary
> - nto -> not
> - permenent -> permanent
> - immediatly -> immediately
> - excuted -> executed
> 
> Cc: Ruiyu Ni <[email protected]>
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Gary Lin <[email protected]>
> ---
>  Nt32Pkg/Include/Ppi/NtAutoscan.h                                          |  
> 2 +-
> 
> Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLi
> b.c |  8 ++--
> Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.
> c |  6 +--
>  Nt32Pkg/Sec/SecMain.c                                                     | 
> 50 ++++++++++----------
>  Nt32Pkg/Sec/SecMain.h                                                     |  
> 6 +--
>  Nt32Pkg/Sec/WinNtThunk.c                                                  |  
> 2 +-
>  Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c                                 |  
> 2 +-
>  7 files changed, 38 insertions(+), 38 deletions(-)
> 
> diff --git a/Nt32Pkg/Include/Ppi/NtAutoscan.h
> b/Nt32Pkg/Include/Ppi/NtAutoscan.h
> index 49c0294..1891bb4 100644
> --- a/Nt32Pkg/Include/Ppi/NtAutoscan.h
> +++ b/Nt32Pkg/Include/Ppi/NtAutoscan.h
> @@ -41,7 +41,7 @@ EFI_STATUS
> 
>  Routine Description:
>    This service is called from Index == 0 until it returns EFI_UNSUPPORTED.
> -  It allows discontiguous memory regions to be supported by the emulator.
> +  It allows discontinuous memory regions to be supported by the emulator.
>    It uses gSystemMemory[] and gSystemMemoryCount that were created by
>    parsing the Windows environment variable EFI_MEMORY_SIZE.
>    The size comes from the varaible and the address comes from the call to
> diff --git
> a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraAction
> Lib.c
> b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActio
> nLib.c
> index 524d6c0..2f62d65 100644
> ---
> a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraAction
> Lib.c
> +++
> b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActi
> +++ onLib.c
> @@ -290,7 +290,7 @@ PeCoffLoaderRelocateImageExtraAction (
>    // If we load our own PE COFF images the Windows debugger can not
> source
>    //  level debug our code. If a valid PDB pointer exists usw it to load
>    //  the *.dll file as a library using Windows* APIs. This allows
> -  //  source level debug. The image is still loaded and reloaced
> +  //  source level debug. The image is still loaded and relocated
>    //  in the Framework memory space like on a real system (by the code
> above),
>    //  but the entry point points into the DLL loaded by the code bellow.
>    //
> @@ -335,11 +335,11 @@ PeCoffLoaderRelocateImageExtraAction (
>      if (Library != NULL) {
>        //
>        // InitializeDriver is the entry point we put in all our EFI DLL's. The
> -      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> +      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
>        // normal DLL entry point of DllMain, and prevents other modules that
> are
>        // referenced in side the DllFileName from being loaded. There is no 
> error
>        // checking as the we can point to the PE32 image loaded by Tiano. This
> -      // step is only needed for source level debuging
> +      // step is only needed for source level debugging
>        //
>        DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library,
> "InitializeDriver");
> 
> @@ -355,7 +355,7 @@ PeCoffLoaderRelocateImageExtraAction (
>          DEBUG ((EFI_D_ERROR, "WARNING: DLL already loaded.  No source level
> debug %s. \n", DllFileName));
>        } else {
>          //
> -        // This DLL is not already loaded, so source level debugging is 
> suported.
> +        // This DLL is not already loaded, so source level debugging is 
> supported.
>          //
>          ImageContext->EntryPoint  = (EFI_PHYSICAL_ADDRESS) (UINTN)
> DllEntryPoint;
>          DEBUG ((EFI_D_INFO, "LoadLibraryEx (%s,\n               NULL,
> DONT_RESOLVE_DLL_REFERENCES)\n", DllFileName));
> diff --git
> a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> index b05834e..682446a 100644
> ---
> a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> +++
> b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActi
> +++ onLib.c
> @@ -155,7 +155,7 @@ PeCoffLoaderRelocateImageExtraAction (
>    // If we load our own PE COFF images the Windows debugger can not
> source
>    //  level debug our code. If a valid PDB pointer exists usw it to load
>    //  the *.dll file as a library using Windows* APIs. This allows
> -  //  source level debug. The image is still loaded and reloaced
> +  //  source level debug. The image is still loaded and relocated
>    //  in the Framework memory space like on a real system (by the code
> above),
>    //  but the entry point points into the DLL loaded by the code bellow.
>    //
> @@ -200,11 +200,11 @@ PeCoffLoaderRelocateImageExtraAction (
>      if (Library != NULL) {
>        //
>        // InitializeDriver is the entry point we put in all our EFI DLL's. The
> -      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> +      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
>        // normal DLL entry point of DllMain, and prevents other modules that
> are
>        // referenced in side the DllFileName from being loaded. There is no 
> error
>        // checking as the we can point to the PE32 image loaded by Tiano. This
> -      // step is only needed for source level debuging
> +      // step is only needed for source level debugging
>        //
>        DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library,
> "InitializeDriver");
> 
> diff --git a/Nt32Pkg/Sec/SecMain.c b/Nt32Pkg/Sec/SecMain.c index
> e9f72df..80539fa 100644
> --- a/Nt32Pkg/Sec/SecMain.c
> +++ b/Nt32Pkg/Sec/SecMain.c
> @@ -22,7 +22,7 @@ Abstract:
>    will be, how may FD's will be loaded and also what the boot mode is.
> 
>    The SEC registers a set of services with the SEC core. 
> gPrivateDispatchTable
> -  is a list of PPI's produced by the SEC that are availble for usage in PEI.
> +  is a list of PPI's produced by the SEC that are available for usage in PEI.
> 
>    This code produces 128 K of temporary memory for the PEI stack by directly
>    allocate memory space with ReadWrite and Execute attribute.
> @@ -161,7 +161,7 @@ Routine Description:
>  Arguments:
>    Argc - Number of command line arguments
>    Argv - Array of command line argument strings
> -  Envp - Array of environmemt variable strings
> +  Envp - Array of environment variable strings
> 
>  Returns:
>    0 - Normal exit
> @@ -228,7 +228,7 @@ Returns:
>    //
>    // Allocate space for gSystemMemory Array
>    //
> -  gSystemMemoryCount  = CountSeperatorsInString (MemorySizeStr, '!') + 1;
> +  gSystemMemoryCount  = CountSeparatorsInString (MemorySizeStr, '!') +
> + 1;
>    gSystemMemory       = calloc (gSystemMemoryCount, sizeof
> (NT_SYSTEM_MEMORY));
>    if (gSystemMemory == NULL) {
>      SecPrint ("ERROR : Can not allocate memory for %S.  Exiting.\n",
> MemorySizeStr); @@ -237,7 +237,7 @@ Returns:
>    //
>    // Allocate space for gSystemMemory Array
>    //
> -  gFdInfoCount  = CountSeperatorsInString (FirmwareVolumesStr, '!') + 1;
> +  gFdInfoCount  = CountSeparatorsInString (FirmwareVolumesStr, '!') +
> + 1;
>    gFdInfo       = calloc (gFdInfoCount, sizeof (NT_FD_INFO));
>    if (gFdInfo == NULL) {
>      SecPrint ("ERROR : Can not allocate memory for %S.  Exiting.\n",
> FirmwareVolumesStr); @@ -291,7 +291,7 @@ Returns:
>      }
> 
>      //
> -    // Open the FD and remmeber where it got mapped into our processes
> address space
> +    // Open the FD and remember where it got mapped into our processes
> + address space
>      //
>      Status = WinNtOpenFile (
>                FileName,
> @@ -307,7 +307,7 @@ Returns:
> 
>      SecPrint ("  FD loaded from");
>      //
> -    // printf can't print filenames directly as the \ gets interperted as an
> +    // printf can't print filenames directly as the \ gets interpreted
> + as an
>      //  escape character.
>      //
>      for (Index2 = 0; FileName[Index2] != '\0'; Index2++) { @@ -385,7 +385,7
> @@ Arguments:
>    CreationDisposition - The flags to pass to CreateFile().  Use to create new
> files for
>                          memory emulation, and exiting files for firmware 
> volume
> emulation
>    BaseAddress         - The base address of the mapped file in the user 
> address
> space.
> -                         If passed in as NULL the a new memory region is 
> used.
> +                         If passed in as NULL the new memory region is used.
>                           If passed in as non NULL the request memory region 
> is used for
>                            the mapping of the file into the process space.
>    Length              - The size of the mapped region in bytes
> @@ -701,7 +701,7 @@ SecWinNtPeiAutoScan (
> 
>  Routine Description:
>    This service is called from Index == 0 until it returns EFI_UNSUPPORTED.
> -  It allows discontiguous memory regions to be supported by the emulator.
> +  It allows discontinuous memory regions to be supported by the emulator.
>    It uses gSystemMemory[] and gSystemMemoryCount that were created by
>    parsing PcdWinNtMemorySizeForSecMain value.
>    The size comes from the Pcd value and the address comes from the
> memory space @@ -746,7 +746,7 @@ SecWinNtWinNtThunkAddress
> (  Routine Description:
>    Since the SEC is the only Windows program in stack it must export
>    an interface to do Win API calls. That's what the WinNtThunk address
> -  is for. gWinNt is initailized in WinNtThunk.c.
> +  is for. gWinNt is initialized in WinNtThunk.c.
> 
>  Arguments:
>    InterfaceSize - sizeof (EFI_WIN_NT_THUNK_PROTOCOL); @@ -799,7 +799,7
> @@ Returns:
>      return Status;
>    }
>    //
> -  // Allocate space in NT (not emulator) memory with ReadWrite and
> Execute attribue.
> +  // Allocate space in NT (not emulator) memory with ReadWrite and
> Execute attribute.
>    // Extra space is for alignment
>    //
>    ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS) (UINTN)
> VirtualAlloc (NULL, (SIZE_T) (ImageContext.ImageSize +
> (ImageContext.SectionAlignment * 2)), MEM_COMMIT,
> PAGE_EXECUTE_READWRITE); @@ -807,7 +807,7 @@ Returns:
>      return EFI_OUT_OF_RESOURCES;
>    }
>    //
> -  // Align buffer on section boundry
> +  // Align buffer on section boundary
>    //
>    ImageContext.ImageAddress += ImageContext.SectionAlignment - 1;
>    ImageContext.ImageAddress &=
> ~((EFI_PHYSICAL_ADDRESS)ImageContext.SectionAlignment - 1); @@ -853,7
> +853,7 @@ Arguments:
> 
>  Returns:
>    EFI_SUCCESS     - Return the Base address and size of the FV
> -  EFI_UNSUPPORTED - Index does nto map to an FD in the system
> +  EFI_UNSUPPORTED - Index does not map to an FD in the system
> 
>  --*/
>  {
> @@ -956,28 +956,28 @@ Returns:
>  }
> 
>  UINTN
> -CountSeperatorsInString (
> +CountSeparatorsInString (
>    IN  CONST CHAR16   *String,
> -  IN  CHAR16         Seperator
> +  IN  CHAR16         Separator
>    )
>  /*++
> 
>  Routine Description:
> -  Count the number of seperators in String
> +  Count the number of separators in String
> 
>  Arguments:
>    String    - String to process
> -  Seperator - Item to count
> +  Separator - Item to count
> 
>  Returns:
> -  Number of Seperator in String
> +  Number of Separator in String
> 
>  --*/
>  {
>    UINTN Count;
> 
>    for (Count = 0; *String != '\0'; String++) {
> -    if (*String == Seperator) {
> +    if (*String == Separator) {
>        Count++;
>      }
>    }
> @@ -1010,7 +1010,7 @@ SecNt32PeCoffRelocateImage (
>    // If we load our own PE COFF images the Windows debugger can not
> source
>    //  level debug our code. If a valid PDB pointer exists usw it to load
>    //  the *.dll file as a library using Windows* APIs. This allows
> -  //  source level debug. The image is still loaded and reloaced
> +  //  source level debug. The image is still loaded and relocated
>    //  in the Framework memory space like on a real system (by the code
> above),
>    //  but the entry point points into the DLL loaded by the code bellow.
>    //
> @@ -1055,11 +1055,11 @@ SecNt32PeCoffRelocateImage (
>      if (Library != NULL) {
>        //
>        // InitializeDriver is the entry point we put in all our EFI DLL's. The
> -      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> +      // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
>        // normal DLL entry point of DllMain, and prevents other modules that
> are
>        // referenced in side the DllFileName from being loaded. There is no 
> error
>        // checking as the we can point to the PE32 image loaded by Tiano. This
> -      // step is only needed for source level debuging
> +      // step is only needed for source level debugging
>        //
>        DllEntryPoint = (VOID *) (UINTN) GetProcAddress (Library,
> "InitializeDriver");
> 
> @@ -1103,7 +1103,7 @@ SecTemporaryRamSupport (
>    )
>  {
>    //
> -  // Migrate the whole temporary memory to permenent memory.
> +  // Migrate the whole temporary memory to permanent memory.
>    //
>    CopyMem (
>      (VOID*)(UINTN)PermanentMemoryBase,
> @@ -1113,8 +1113,8 @@ SecTemporaryRamSupport (
> 
>    //
>    // SecSwitchStack function must be invoked after the memory migration
> -  // immediatly, also we need fixup the stack change caused by new call into
> -  // permenent memory.
> +  // immediately, also we need fixup the stack change caused by new
> + call into  // permanent memory.
>    //
>    SecSwitchStack (
>      (UINT32) TemporaryMemoryBase,
> @@ -1123,7 +1123,7 @@ SecTemporaryRamSupport (
> 
>    //
>    // We need *not* fix the return address because currently,
> -  // The PeiCore is excuted in flash.
> +  // The PeiCore is executed in flash.
>    //
> 
>    //
> diff --git a/Nt32Pkg/Sec/SecMain.h b/Nt32Pkg/Sec/SecMain.h index
> 76522e3..8b19878 100644
> --- a/Nt32Pkg/Sec/SecMain.h
> +++ b/Nt32Pkg/Sec/SecMain.h
> @@ -524,9 +524,9 @@ Returns:
>  ;
> 
>  UINTN
> -CountSeperatorsInString (
> +CountSeparatorsInString (
>    IN  CONST CHAR16   *String,
> -  IN  CHAR16   Seperator
> +  IN  CHAR16   Separator
>    )
>  /*++
> 
> @@ -537,7 +537,7 @@ Routine Description:
>  Arguments:
> 
>    String    - TODO: add argument description
> -  Seperator - TODO: add argument description
> +  Separator - TODO: add argument description
> 
>  Returns:
> 
> diff --git a/Nt32Pkg/Sec/WinNtThunk.c b/Nt32Pkg/Sec/WinNtThunk.c index
> 9ab380c..3159ef4 100644
> --- a/Nt32Pkg/Sec/WinNtThunk.c
> +++ b/Nt32Pkg/Sec/WinNtThunk.c
> @@ -42,7 +42,7 @@ Abstract:
>  //  point could be modified dynamically. The SEC does not do that, so we
> must  //  disable the warning so we can compile the SEC. The previous
> method was to  //  asign each element in code. The disadvantage to that
> approach is it's harder -//  to tell if all the elements have been initailized
> properly.
> +//  to tell if all the elements have been initialized properly.
>  //
>  #pragma warning(disable : 4232)
>  #pragma warning(disable : 4996)
> diff --git a/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> b/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> index 20774ee..8cd9188 100644
> --- a/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> +++ b/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> @@ -48,7 +48,7 @@ Routine Description:
>    Perform a call-back into the SEC simulator to get address of the Firmware
> Hub
> 
>  Arguments:
> -  FfsHeader   - Ffs Header availible to every PEIM
> +  FfsHeader   - Ffs Header available to every PEIM
>    PeiServices - General purpose services available to every PEIM.
> 
>  Returns:
> --
> 2.10.1
> 
> _______________________________________________
> edk2-devel mailing list
> [email protected]
> https://lists.01.org/mailman/listinfo/edk2-devel
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to