// If we load our own PE COFF images the Windows debugger can not source\r
// level debug our code. If a valid PDB pointer exists usw it to load\r
// the *.dll file as a library using Windows* APIs. This allows \r
- // source level debug. The image is still loaded and reloaced\r
+ // source level debug. The image is still loaded and relocated\r
// in the Framework memory space like on a real system (by the code above),\r
// but the entry point points into the DLL loaded by the code bellow. \r
//\r
if (Library != NULL) {\r
//\r
// InitializeDriver is the entry point we put in all our EFI DLL's. The\r
- // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() supresses the \r
+ // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() suppresses the \r
// normal DLL entry point of DllMain, and prevents other modules that are\r
// referenced in side the DllFileName from being loaded. There is no error \r
// checking as the we can point to the PE32 image loaded by Tiano. This \r
- // step is only needed for source level debuging\r
+ // step is only needed for source level debugging\r
//\r
DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library, "InitializeDriver");\r
\r
DEBUG ((EFI_D_ERROR, "WARNING: DLL already loaded. No source level debug %s. \n", DllFileName));\r
} else {\r
//\r
- // This DLL is not already loaded, so source level debugging is suported.\r
+ // This DLL is not already loaded, so source level debugging is supported.\r
//\r
ImageContext->EntryPoint = (EFI_PHYSICAL_ADDRESS) (UINTN) DllEntryPoint;\r
DEBUG ((EFI_D_INFO, "LoadLibraryEx (%s,\n NULL, DONT_RESOLVE_DLL_REFERENCES)\n", DllFileName));\r