From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id B73DE1A1E02 for ; Fri, 9 Sep 2016 16:28:56 -0700 (PDT) Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 53242C05091E; Fri, 9 Sep 2016 23:28:56 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-116-33.phx2.redhat.com [10.3.116.33]) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id u89NSiDl010983; Fri, 9 Sep 2016 19:28:55 -0400 From: Laszlo Ersek To: edk2-devel-01 Cc: Jordan Justen , Thomas Huth Date: Sat, 10 Sep 2016 01:28:40 +0200 Message-Id: <20160909232840.2353-4-lersek@redhat.com> In-Reply-To: <20160909232840.2353-1-lersek@redhat.com> References: <20160909232840.2353-1-lersek@redhat.com> X-Scanned-By: MIMEDefang 2.68 on 10.5.11.26 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Fri, 09 Sep 2016 23:28:56 +0000 (UTC) Subject: [PATCH 3/3] OvmfPkg: Fix typing errors X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Sep 2016 23:28:56 -0000 From: Thomas Huth Correct some typos (discovered with the codespell utility) Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Thomas Huth Reviewed-by: Laszlo Ersek Cc: Jordan Justen Cc: Thomas Huth --- OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpi.c | 2 +- OvmfPkg/Csm/CsmSupportLib/LegacyPlatform.c | 4 ++-- OvmfPkg/Library/NvVarsFileLib/FsAccess.c | 4 ++-- OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c | 8 ++++---- OvmfPkg/PlatformPei/MemDetect.c | 2 +- OvmfPkg/QemuVideoDxe/VbeShim.c | 2 +- OvmfPkg/XenBusDxe/EventChannel.c | 2 +- OvmfPkg/XenBusDxe/XenStore.c | 2 +- OvmfPkg/XenPvBlkDxe/BlockIo.c | 2 +- 9 files changed, 14 insertions(+), 14 deletions(-) diff --git a/OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpi.c b/OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpi.c index faaff3757cdb..deaf14c6b0dc 100644 --- a/OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpi.c +++ b/OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpi.c @@ -363,7 +363,7 @@ ProcessCmdAddChecksum ( array is an ACPI table, and if so, install it. This function assumes that the entire QEMU linker/loader command file has - been processed successfuly in a prior first pass. + been processed successfully in a prior first pass. @param[in] AddPointer The QEMU_LOADER_ADD_POINTER command to process. diff --git a/OvmfPkg/Csm/CsmSupportLib/LegacyPlatform.c b/OvmfPkg/Csm/CsmSupportLib/LegacyPlatform.c index 0ccfa9758518..dd75be00f676 100644 --- a/OvmfPkg/Csm/CsmSupportLib/LegacyPlatform.c +++ b/OvmfPkg/Csm/CsmSupportLib/LegacyPlatform.c @@ -256,8 +256,8 @@ GetSelectedVgaDeviceInfo ( *VgaHandle = NULL; // - // Initialize variable states. Ths is important for selecting the VGA device - // if multiple devices exist behind a single bridge. + // Initialize variable states. This is important for selecting the VGA + // device if multiple devices exist behind a single bridge. // HandleCount = 0; HandleBuffer = NULL; diff --git a/OvmfPkg/Library/NvVarsFileLib/FsAccess.c b/OvmfPkg/Library/NvVarsFileLib/FsAccess.c index 7cc7e68e385f..826901fc6b75 100644 --- a/OvmfPkg/Library/NvVarsFileLib/FsAccess.c +++ b/OvmfPkg/Library/NvVarsFileLib/FsAccess.c @@ -184,7 +184,7 @@ FileHandleEmpty ( @param[in] ReadSize - The size of data to read from the file @return Pointer to buffer allocated to hold the file - contents. NULL if an error occured. + contents. NULL if an error occurred. **/ VOID* @@ -332,7 +332,7 @@ LoadNvVarsFromFs ( // We write a variable to indicate we've already loaded the // variable data. If it is found, we skip the loading. // - // This is relevent if the non-volatile variable have been + // This is relevant if the non-volatile variable have been // able to survive a reboot operation. In that case, we don't // want to re-load the file as it would overwrite newer changes // made to the variables. diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c index 87412598f51b..7cd547e70741 100644 --- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c +++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c @@ -1255,8 +1255,8 @@ ConnectRecursivelyIfPciMassStorage ( This notification function is invoked when the EMU Variable FVB has been changed. - @param Event The event that occured - @param Context For EFI compatiblity. Not used. + @param Event The event that occurred + @param Context For EFI compatibility. Not used. **/ VOID @@ -1480,8 +1480,8 @@ Routine Description: This notification function is invoked when an instance of the EFI_DEVICE_PATH_PROTOCOL is produced. - @param Event The event that occured - @param Context For EFI compatiblity. Not used. + @param Event The event that occurred + @param Context For EFI compatibility. Not used. **/ VOID diff --git a/OvmfPkg/PlatformPei/MemDetect.c b/OvmfPkg/PlatformPei/MemDetect.c index 8f66412763ad..4863eb101067 100644 --- a/OvmfPkg/PlatformPei/MemDetect.c +++ b/OvmfPkg/PlatformPei/MemDetect.c @@ -433,7 +433,7 @@ QemuInitializeRam ( // PEI RAM, in a backup buffer allocated with the normal PEI services. // CpuMpPei restores the original contents ("returns" the borrowed area) at // End-of-PEI. End-of-PEI in turn is emitted by S3Resume2Pei before - // transfering control to the OS's wakeup vector in the FACS. + // transferring control to the OS's wakeup vector in the FACS. // // We expect any other PEIMs that "borrow" memory similarly to CpuMpPei to // restore the original contents. Furthermore, we expect all such PEIMs diff --git a/OvmfPkg/QemuVideoDxe/VbeShim.c b/OvmfPkg/QemuVideoDxe/VbeShim.c index 6bb175bfd444..6a569f627449 100644 --- a/OvmfPkg/QemuVideoDxe/VbeShim.c +++ b/OvmfPkg/QemuVideoDxe/VbeShim.c @@ -134,7 +134,7 @@ InstallVbeShim ( PciWrite8 (Pam1Address, Pam1 | (BIT1 | BIT0)); // - // We never added memory space durig PEI or DXE for the C segment, so we + // We never added memory space during PEI or DXE for the C segment, so we // don't need to (and can't) allocate from there. Also, guest operating // systems will see a hole in the UEFI memory map there. // diff --git a/OvmfPkg/XenBusDxe/EventChannel.c b/OvmfPkg/XenBusDxe/EventChannel.c index 6a36dca29911..490ca58cb4c6 100644 --- a/OvmfPkg/XenBusDxe/EventChannel.c +++ b/OvmfPkg/XenBusDxe/EventChannel.c @@ -1,7 +1,7 @@ /** @file Event Channel function implementation. - Event channel are use to notify of an event that happend in a shared + Event channel are use to notify of an event that happened in a shared structure for example. Copyright (C) 2014, Citrix Ltd. diff --git a/OvmfPkg/XenBusDxe/XenStore.c b/OvmfPkg/XenBusDxe/XenStore.c index 5757e78b1801..fb00e7393bb1 100644 --- a/OvmfPkg/XenBusDxe/XenStore.c +++ b/OvmfPkg/XenBusDxe/XenStore.c @@ -10,7 +10,7 @@ The XenStore is ASCII string based, and has a structure and semantics similar to a filesystem. There are files and directories, the directories - able to contain files or other directories. The depth of the hierachy + able to contain files or other directories. The depth of the hierarchy is only limited by the XenStore's maximum path length. The communication channel between the XenStore service and other diff --git a/OvmfPkg/XenPvBlkDxe/BlockIo.c b/OvmfPkg/XenPvBlkDxe/BlockIo.c index ae6aa62ac0d3..70bf32cab016 100644 --- a/OvmfPkg/XenPvBlkDxe/BlockIo.c +++ b/OvmfPkg/XenPvBlkDxe/BlockIo.c @@ -156,7 +156,7 @@ XenPvBlkDxeBlockIoReadWriteBlocks ( Sector += IoData.Size / 512; Status = XenPvBlockIo (&IoData, IsWrite); if (EFI_ERROR (Status)) { - DEBUG ((EFI_D_ERROR, "XenPvBlkDxe: Error durring %a operation.\n", + DEBUG ((EFI_D_ERROR, "XenPvBlkDxe: Error during %a operation.\n", IsWrite ? "write" : "read")); return Status; } -- 2.9.2