// If we load our own PE COFF images the Windows debugger can not source\r
// level debug our code. If a valid PDB pointer exists usw it to load\r
// the *.dll file as a library using Windows* APIs. This allows \r
- // source level debug. The image is still loaded and reloaced\r
+ // source level debug. The image is still loaded and relocated\r
// in the Framework memory space like on a real system (by the code above),\r
// but the entry point points into the DLL loaded by the code bellow. \r
//\r
if (Library != NULL) {\r
//\r
// InitializeDriver is the entry point we put in all our EFI DLL's. The\r
- // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() supresses the \r
+ // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() suppresses the \r
// normal DLL entry point of DllMain, and prevents other modules that are\r
// referenced in side the DllFileName from being loaded. There is no error \r
// checking as the we can point to the PE32 image loaded by Tiano. This \r
- // step is only needed for source level debuging\r
+ // step is only needed for source level debugging\r
//\r
DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library, "InitializeDriver");\r
\r