EMU_FD_INFO *gFdInfo;\r
\r
//\r
-// Array that supports seperate memory rantes.\r
+// Array that supports separate memory ranges.\r
// The memory ranges are set in system.cmd via the EFI_MEMORY_SIZE variable.\r
// The number of array elements is allocated base on parsing\r
// EFI_MEMORY_SIZE and the memory is never freed.\r
Returns:\r
EFI_SUCCESS - The file was opened and mapped.\r
EFI_NOT_FOUND - FileName was not found in the current directory\r
- EFI_DEVICE_ERROR - An error occured attempting to map the opened file\r
+ EFI_DEVICE_ERROR - An error occurred attempting to map the opened file\r
\r
**/\r
EFI_STATUS\r
PeiCorePe32File - SEC PE32\r
\r
Returns:\r
- Success means control is transfered and thus we should never return\r
+ Success means control is transferred and thus we should never return\r
\r
**/\r
VOID\r
It allows discontinuous memory regions to be supported by the emulator.\r
It uses gSystemMemory[] and gSystemMemoryCount that were created by\r
parsing the host environment variable EFI_MEMORY_SIZE.\r
- The size comes from the varaible and the address comes from the call to\r
+ The size comes from the variable and the address comes from the call to\r
UnixOpenFile.\r
\r
Arguments:\r
\r
This is all of GCD for system memory passed to DXE Core. FV\r
mapping and other device mapped into system memory are not\r
- inlcuded in the check.\r
+ included in the check.\r
\r
Arguments:\r
Index - Which memory region to use\r
\r
Routine Description:\r
Return the FD Size and base address. Since the FD is loaded from a\r
- file into host memory only the SEC will know it's address.\r
+ file into host memory only the SEC will know its address.\r
\r
Arguments:\r
Index - Which FD, starts at zero.\r
The ModHandle is needed to unload the image.\r
\r
Arguments:\r
- ImageContext - Input data returned from PE Laoder Library. Used to find the\r
+ ImageContext - Input data returned from PE Loader Library. Used to find the\r
.PDB file name of the PE Image.\r
ModHandle - Returned from LoadLibraryEx() and stored for call to\r
FreeLibrary().\r
for (Index = 0; Index < mImageContextModHandleArraySize; Index++, Array++) {\r
if (Array->ImageContext == NULL) {\r
//\r
- // Make a copy of the stirng and store the ModHandle\r
+ // Make a copy of the string and store the ModHandle\r
//\r
Array->ImageContext = ImageContext;\r
Array->ModHandle = ModHandle;\r
//\r
// No free space in mImageContextModHandleArray so grow it by\r
// IMAGE_CONTEXT_TO_MOD_HANDLE entires. realloc will\r
- // copy the old values to the new locaiton. But it does\r
+ // copy the old values to the new location. But it does\r
// not zero the new memory area.\r
//\r
PreviousSize = mImageContextModHandleArraySize * sizeof (IMAGE_CONTEXT_TO_MOD_HANDLE);\r
Return the ModHandle and delete the entry in the array.\r
\r
Arguments:\r
- ImageContext - Input data returned from PE Laoder Library. Used to find the\r
+ ImageContext - Input data returned from PE Loader Library. Used to find the\r
.PDB file name of the PE Image.\r
\r
Returns:\r
- ModHandle - ModHandle assoicated with ImageContext is returned\r
+ ModHandle - ModHandle associated with ImageContext is returned\r
NULL - No ModHandle associated with ImageContext\r
\r
**/\r
\r
\r
/**\r
- Adds the image to a gdb script so it's symbols can be loaded.\r
+ Adds the image to a gdb script so its symbols can be loaded.\r
The AddFirmwareSymbolFile helper macro is used.\r
\r
@param ImageContext The PE/COFF image context\r
\r
\r
/**\r
- Adds the image to a gdb script so it's symbols can be unloaded.\r
+ Adds the image to a gdb script so its symbols can be unloaded.\r
The RemoveFirmwareSymbolFile helper macro is used.\r
\r
@param ImageContext The PE/COFF image context\r