X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=blobdiff_plain;f=Nt32Pkg%2FLibrary%2FPeiNt32PeCoffExtraActionLib%2FPeiNt32PeCoffExtraActionLib.c;fp=Nt32Pkg%2FLibrary%2FPeiNt32PeCoffExtraActionLib%2FPeiNt32PeCoffExtraActionLib.c;h=682446ad86301c4b63fd56a014709ad8e61b4c90;hp=b05834e974d2cd651a08930a60ffdd871726cf25;hb=8aa9d680329cb9fa5c8e517727dd14eb4bebc408;hpb=34f5c23452b3bbc43ebfe8aaa8f2fdcd35669dc3 diff --git a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c index b05834e974..682446ad86 100644 --- a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c +++ b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.c @@ -155,7 +155,7 @@ PeCoffLoaderRelocateImageExtraAction ( // If we load our own PE COFF images the Windows debugger can not source // level debug our code. If a valid PDB pointer exists usw it to load // the *.dll file as a library using Windows* APIs. This allows - // source level debug. The image is still loaded and reloaced + // source level debug. The image is still loaded and relocated // in the Framework memory space like on a real system (by the code above), // but the entry point points into the DLL loaded by the code bellow. // @@ -200,11 +200,11 @@ PeCoffLoaderRelocateImageExtraAction ( if (Library != NULL) { // // InitializeDriver is the entry point we put in all our EFI DLL's. The - // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() supresses the + // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx() suppresses the // normal DLL entry point of DllMain, and prevents other modules that are // referenced in side the DllFileName from being loaded. There is no error // checking as the we can point to the PE32 image loaded by Tiano. This - // step is only needed for source level debuging + // step is only needed for source level debugging // DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library, "InitializeDriver");