From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmx.net header.s=badeba3b8450 header.b=bEyZf8ro; spf=pass (domain: gmx.fr, ip: 212.227.17.22, mailfrom: coeur@gmx.fr) Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by groups.io with SMTP; Fri, 05 Jul 2019 06:35:21 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1562333713; bh=DHsgku2nv9Dynz0qVvJTK376h9YRf60kMA1lUmCq5Cw=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date; b=bEyZf8ror2RndGTOet+TR6ZZuCgpmSWny3jOqEtUWM/Tnjg0iaW2n+7TVVlq+0C30 4WHkShaRlKi/E9XSRuPcIRzllBAH9zXJUmBYeuoUbsyNb+SZWrqv/pAva9I6zrEWE6 AIMrkuOR8XoDVwYj6T92W7dh26aM0UKEwrtkVdEM= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from localhost.localdomain ([45.32.43.45]) by mail.gmx.com (mrgmx101 [212.227.17.168]) with ESMTPSA (Nemesis) id 0Ldttv-1iQjfw24F1-00j1ue; Fri, 05 Jul 2019 15:35:13 +0200 From: =?UTF-8?B?Q8WTdXI=?= To: devel@edk2.groups.io, jiewen.yao@intel.com, chao.b.zhang@intel.com Cc: =?UTF-8?q?Antoine=20C=C5=93ur?= Subject: [PATCH] SignedCapsulePkg: Fix various typos Date: Fri, 5 Jul 2019 21:34:50 +0800 Message-Id: <20190705133450.66238-1-coeur@gmx.fr> X-Mailer: git-send-email 2.20.1 (Apple Git-117) MIME-Version: 1.0 X-Provags-ID: V03:K1:upGMLxF4x3evow7s7U19lk2mtMowx10CXEOoP0qUBIC1/E1jNu8 VUb2mfJwrvlJwgrCh+OvZOcsfPWiizakDdV8UYAFZj4rjs0uljezjbgBZF36unMpuWrQEM4 PQAn7k577oXBOPDKTkZT/mvrIpiov1p+WdOipwcNnxS0FCgyMizVPDaUMxWdm29D4BQan22 kqUDbRMWvrNFpRpC5vcGA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:H7DgCvrwPLM=:/mn8Ynr/g/NhclNse4W4pQ leeJ9NVXZ52t1Hu1sV8mnIbbwi8faIVSDRwhb9Z8k4TppVY9lpfiK+jdKAEh7ZyqmdEw30309 1ddt3bW0FsBJTziDQQUCQkZ7cZzpCr4NXqVE/842yRX3KFpVYzXmwaT78yeVFCNtMILvS9C6G k1VIYVYvEgob0TWEuL0NQwbxoVMnoNNXXarr5ZthbQVoMtNnkCfqfzCvHFOKDflL9PQASiQlg VGzHuyxbQjDiYAElnANjW+wkGoLG18YUWzTIFYD05hgLuHosY8nJVwVBkqE9l5OdkKtDZLe6L lKef0HtCRnIXKLsT1Ky9cUJDSjXfBdLOBcs8SEzBI7n9Aqo3WvJ7wXvbQfTfNuTZzfjOYWYKU pbJws4i9SbLJw1ugesOG8fv+k29fciQOR4slt7tlj6vXZK3OpM46f77yagK718iLJmZCxZfUV hYWCZZ8ilkf4PuPmL53iASoI4uTh+G6qehzd5tL+XsxqBE8DpHlF8Ya1NpALQf+NlXHPgOnbV FhodYyiz4grIQls6GQwRMGcBsXM7K9y3guwTBL5hwkGj8zM/lEKMQBM4UBIvLhp7FcC45E1BH sA+Usr0sniVHcQVjKe/lA2aFd9tEFoZFWxH33W/+L5AXCsutdNSjei29J/DcATMl/OLxn383s hPM483yq8N2PU4iScWg2isUCqaIV0c0GDLJ7oiD5riXeJD5AoKJR6pKgbX2qIoXfPNg+52L1B LxOiKX83czfK1e3tIdp1fYF7wINOGYVKjElzMuRxLDsJvGJBH+YOjJNoRiF2Nr54+SSUH89Lj YGm8qcKuEpbRJW3x1Z5RgdcW47RmWo90Tv6XYbxkiPMtItdXgAlWNiW67njKOPGikq1mRVon6 ZpqDc1e9D3AkArv1rK+OOI3SeFiJ7BeJhRAWRBK74W9IMFW0YSMusE0eZsSFM//4eIyi9CSv4 ITYHFeHhWy1TTQ87tWUbXAPvb7fBm9tHFUkYAVgPUVgOJ+jxeNnnEHA+0ZtuL9YdhQ68dk1FC nemNwl3muPrHsw4u4QVAqu12ICI9Gi0/TbJI8qRj5K/yTcMwQ85L1I12ifutmz5/ww== Content-Transfer-Encoding: quoted-printable Fix various typos in SignedCapsulePkg. =2D-- .../Include/Guid/EdkiiSystemFmpCapsule.h | 4 +-- .../Include/Library/IniParsingLib.h | 14 +++++----- .../Library/IniParsingLib/IniParsingLib.c | 26 +++++++++---------- SignedCapsulePkg/SignedCapsulePkg.dec | 4 +-- .../ParseConfigProfile.c | 2 +- .../RecoveryModuleLoadPei.c | 14 +++++----- .../SystemFirmwareUpdate/ParseConfigProfile.c | 2 +- .../SystemFirmwareCommonDxe.c | 4 +-- .../SystemFirmwareUpdate/SystemFirmwareDxe.h | 2 +- .../SystemFirmwareReportDxe.c | 8 +++--- .../SystemFirmwareUpdateDxe.c | 4 +-- 11 files changed, 42 insertions(+), 42 deletions(-) diff --git a/SignedCapsulePkg/Include/Guid/EdkiiSystemFmpCapsule.h b/Signe= dCapsulePkg/Include/Guid/EdkiiSystemFmpCapsule.h index 1129d715ae..8295f92a73 100644 =2D-- a/SignedCapsulePkg/Include/Guid/EdkiiSystemFmpCapsule.h +++ b/SignedCapsulePkg/Include/Guid/EdkiiSystemFmpCapsule.h @@ -60,7 +60,7 @@ ImageOffset =3D # Fv offset of this SystemFirmware ima= ge (HEX) FileGuid =3D XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX # PcdEdkiiSystemF= irmwareFileGuid - NOTE: The [Name?] entry may have differnt FileGuid. + NOTE: The [Name?] entry may have different FileGuid. Only the one, whose FileGuid matches PcdEdkiiSystemFirmwareFileGuid, ta= kes effect. The other entry is ignored. @@ -80,7 +80,7 @@ ImageOffset =3D # Image offset of this SystemFirmware = image (HEX) FileGuid =3D XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX # PcdEdkiiSystemF= irmwareFileGuid - NOTE: The [Name?] entry may have differnt FileGuid. + NOTE: The [Name?] entry may have different FileGuid. Only the one, whose FileGuid matches PcdEdkiiSystemFirmwareFileGuid, ta= kes effect. The other entry is ignored. diff --git a/SignedCapsulePkg/Include/Library/IniParsingLib.h b/SignedCaps= ulePkg/Include/Library/IniParsingLib.h index 26d100ffde..edfdde7e8d 100644 =2D-- a/SignedCapsulePkg/Include/Library/IniParsingLib.h +++ b/SignedCapsulePkg/Include/Library/IniParsingLib.h @@ -14,7 +14,7 @@ 3.1) an ASCII String. The valid format is [A-Za-z0-9_]+ 3.2) a GUID. The valid format is xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx= xxxxx, where x is [A-Fa-f0-9] 3.3) a decimal value. The valid format is [0-9]+ - 3.4) a heximal value. The valid format is 0x[A-Fa-f0-9]+ + 3.4) a hexadecimal value. The valid format is 0x[A-Fa-f0-9]+ 4) '#' or ';' can be used as comment at anywhere. 5) TAB(0x20) or SPACE(0x9) can be used as separator. 6) LF(\n, 0xA) or CR(\r, 0xD) can be used as line break. @@ -106,14 +106,14 @@ GetDecimalUintnFromDataFile ( ); /** - Get section entry heximal UINTN value. + Get section entry hexadecimal UINTN value. @param[in] Context INI Config file context. @param[in] SectionName Section name. @param[in] EntryName Section entry name. - @param[out] Data Point to the got heximal UINTN value. + @param[out] Data Point to the got hexadecimal UINTN value. - @retval EFI_SUCCESS Section entry heximal UINTN value is got. + @retval EFI_SUCCESS Section entry hexadecimal UINTN value is got. @retval EFI_NOT_FOUND Section is not found. **/ EFI_STATUS @@ -126,14 +126,14 @@ GetHexUintnFromDataFile ( ); /** - Get section entry heximal UINT64 value. + Get section entry hexadecimal UINT64 value. @param[in] Context INI Config file context. @param[in] SectionName Section name. @param[in] EntryName Section entry name. - @param[out] Data Point to the got heximal UINT64 value. + @param[out] Data Point to the got hexadecimal UINT64 value. - @retval EFI_SUCCESS Section entry heximal UINT64 value is got. + @retval EFI_SUCCESS Section entry hexadecimal UINT64 value is got. @retval EFI_NOT_FOUND Section is not found. **/ EFI_STATUS diff --git a/SignedCapsulePkg/Library/IniParsingLib/IniParsingLib.c b/Sign= edCapsulePkg/Library/IniParsingLib/IniParsingLib.c index 757d65a206..bea45e0d3b 100644 =2D-- a/SignedCapsulePkg/Library/IniParsingLib/IniParsingLib.c +++ b/SignedCapsulePkg/Library/IniParsingLib/IniParsingLib.c @@ -14,7 +14,7 @@ 3.1) an ASCII String. The valid format is [A-Za-z0-9_]+ 3.2) a GUID. The valid format is xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx= xxxxx, where x is [A-Fa-f0-9] 3.3) a decimal value. The valid format is [0-9]+ - 3.4) a heximal value. The valid format is 0x[A-Fa-f0-9]+ + 3.4) a hexadecimal value. The valid format is 0x[A-Fa-f0-9]+ 4) '#' or ';' can be used as comment at anywhere. 5) TAB(0x20) or SPACE(0x9) can be used as separator. 6) LF(\n, 0xA) or CR(\r, 0xD) can be used as line break. @@ -165,13 +165,13 @@ IsValidDecimalString ( } /** - Return if the heximal string is valid. + Return if the hexadecimal string is valid. - @param[in] Hex The heximal string to be checked. - @param[in] Length The length of heximal string in bytes. + @param[in] Hex The hexadecimal string to be checked. + @param[in] Length The length of hexadecimal string in bytes. - @retval TRUE The heximal string is valid. - @retval FALSE The heximal string is invalid. + @retval TRUE The hexadecimal string is valid. + @retval FALSE The hexadecimal string is invalid. **/ BOOLEAN IsValidHexString ( @@ -388,7 +388,7 @@ ProfileGetLine ( /** Trim Buffer by removing all CR, LF, TAB, and SPACE chars in its head an= d tail. - @param[in, out] Buffer On input, buffer data to be trimed. + @param[in, out] Buffer On input, buffer data to be trimmed. On output, the trimmed buffer. @param[in, out] BufferSize On input, size of original buffer data= . On output, size of the trimmed buffer. @@ -1166,14 +1166,14 @@ GetDecimalUintnFromDataFile ( } /** - Get section entry heximal UINTN value. + Get section entry hexadecimal UINTN value. @param[in] Context INI Config file context. @param[in] SectionName Section name. @param[in] EntryName Section entry name. - @param[out] Data Point to the got heximal UINTN value. + @param[out] Data Point to the got hexadecimal UINTN value. - @retval EFI_SUCCESS Section entry heximal UINTN value is got. + @retval EFI_SUCCESS Section entry hexadecimal UINTN value is got. @retval EFI_NOT_FOUND Section is not found. **/ EFI_STATUS @@ -1210,14 +1210,14 @@ GetHexUintnFromDataFile ( } /** - Get section entry heximal UINT64 value. + Get section entry hexadecimal UINT64 value. @param[in] Context INI Config file context. @param[in] SectionName Section name. @param[in] EntryName Section entry name. - @param[out] Data Point to the got heximal UINT64 value. + @param[out] Data Point to the got hexadecimal UINT64 value. - @retval EFI_SUCCESS Section entry heximal UINT64 value is got. + @retval EFI_SUCCESS Section entry hexadecimal UINT64 value is got. @retval EFI_NOT_FOUND Section is not found. **/ EFI_STATUS diff --git a/SignedCapsulePkg/SignedCapsulePkg.dec b/SignedCapsulePkg/Sign= edCapsulePkg.dec index 3492de6c8b..04dbf62af4 100644 =2D-- a/SignedCapsulePkg/SignedCapsulePkg.dec +++ b/SignedCapsulePkg/SignedCapsulePkg.dec @@ -53,7 +53,7 @@ [PcdsDynamicEx] ## This dynamic PCD holds the EDKII system firmware image descriptor. # This information can be used for version check in EDKII system FMP c= apsule. - # Only if the new EdkiiSystemFrimwareImageDescriptor.Version is not le= ss than + # Only if the new EdkiiSystemFirmwareImageDescriptor.Version is not le= ss than # the current PcdEdkiiSystemFirmwareImageDescriptor.LowestSupportedVer= sion, # the EDKII system FmpCapsule will be processed. # The data structure of this PCD is EDKII_SYSTEM_FIRMWARE_IMAGE_DESCRI= PTOR, @@ -65,7 +65,7 @@ ## This dynamic PCD hold the GUID of a firmware FFS which includes EDKI= I # system firmware image. - # An EDKII system firmware udpate module need consume this PCD to extr= act + # An EDKII system firmware update module need consume this PCD to extr= act # the EDKII system firmware from the capsule image. # It must be in [PcdsDynamicEx], because the EDKII system firmware upd= ate module may # consume the PCD produced in current system firmware image. diff --git a/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/ParseConfigP= rofile.c b/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/ParseConfigPro= file.c index ee9787a2bf..5cd690ddeb 100644 =2D-- a/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/ParseConfigProfil= e.c +++ b/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/ParseConfigProfile.= c @@ -103,7 +103,7 @@ ParseRecoveryDataFile ( // // - // FileBuid + // FileGuid // Status =3D GetGuidFromDataFile( Context, diff --git a/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryModu= leLoadPei.c b/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryMod= uleLoadPei.c index eda3cc5420..53b821c2bb 100644 =2D-- a/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryModuleLoa= dPei.c +++ b/SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryModuleLoadP= ei.c @@ -20,7 +20,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include #include // -// The protocols, PPI and GUID defintions for this module +// The protocols, PPI and GUID definitions for this module // #include #include @@ -144,7 +144,7 @@ IsFmpCapsuleGuid ( } /** - This function assumes the input Capusule image already passes basic che= ck in + This function assumes the input Capsule image already passes basic chec= k in ValidateFmpCapsule(). Criteria of system FMP capsule is: @@ -235,7 +235,7 @@ IsValidCapsuleHeader ( @param[out] IsSystemFmp If it is a system FMP. @param[out] EmbeddedDriverCount The EmbeddedDriverCount in the FMP ca= psule. - @retval EFI_SUCESS Input capsule is a correct FMP capsule. + @retval EFI_SUCCESS Input capsule is a correct FMP capsule. @retval EFI_INVALID_PARAMETER Input capsule is not a correct FMP capsu= le. **/ EFI_STATUS @@ -398,7 +398,7 @@ InitializeRecoveryModule ( @param[in] FvImage Points to the DXE FV image. @param[in] FvImageSize The length of the DXE FV image in bytes. - @retval EFI_SUCESS Create hob and install FvInfo PPI success= fully. + @retval EFI_SUCCESS Create hob and install FvInfo PPI success= fully. @retval EFI_VOLUME_CORRUPTED The input data is not an FV. @retval EFI_OUT_OF_RESOURCES No enough resource to process the input d= ata. **/ @@ -479,7 +479,7 @@ CreateHobForRecoveryCapsule ( @param[in] ConfigImage Points to the config file image. @param[in] ConfigImageSize The length of the config file image= in bytes. - @retval EFI_SUCESS Process Recovery Image successfully. + @retval EFI_SUCCESS Process Recovery Image successfully. **/ EFI_STATUS RecoverImage ( @@ -554,7 +554,7 @@ RecoverImage ( @param[in] Image Points to the recovery image. @param[in] Length The length of the recovery image in bytes. - @retval EFI_SUCESS Process Recovery Image successfully. + @retval EFI_SUCCESS Process Recovery Image successfully. @retval EFI_SECURITY_VIOLATION Recovery image is not processed due to s= ecurity violation. **/ EFI_STATUS @@ -607,7 +607,7 @@ ProcessRecoveryImage ( @param[in] CapsuleHeader Points to a capsule header. @param[in] IsSystemFmp If this capsule is a system FMP capsu= le. - @retval EFI_SUCESS Process Capsule Image successfully. + @retval EFI_SUCCESS Process Capsule Image successfully. @retval EFI_UNSUPPORTED Capsule image is not supported by the fir= mware. @retval EFI_VOLUME_CORRUPTED FV volume in the capsule is corrupted. @retval EFI_OUT_OF_RESOURCES Not enough memory. diff --git a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/ParseConfigPr= ofile.c b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/ParseConfigProfi= le.c index 7d414b07fb..878c6680a3 100644 =2D-- a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/ParseConfigProfile= .c +++ b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/ParseConfigProfile.c @@ -153,7 +153,7 @@ ParseUpdateDataFile ( (*UpdateArray)[Index].BaseAddress =3D (EFI_PHYSICAL_ADDRESS) Num64; // - // FileBuid + // FileGuid // Status =3D GetGuidFromDataFile( Context, diff --git a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwar= eCommonDxe.c b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmw= areCommonDxe.c index d377a8d056..1b6d7e78ea 100644 =2D-- a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareComm= onDxe.c +++ b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareCommon= Dxe.c @@ -331,8 +331,8 @@ InitializePrivateData ( &VarSize, &SystemFmpPrivate->LastAttempt ); - DEBUG((DEBUG_INFO, "GetLastAttemp - %r\n", VarStatus)); - DEBUG((DEBUG_INFO, "GetLastAttemp Version - 0x%x, State - 0x%x\n", Syst= emFmpPrivate->LastAttempt.LastAttemptVersion, SystemFmpPrivate->LastAttemp= t.LastAttemptStatus)); + DEBUG((DEBUG_INFO, "GetLastAttempt - %r\n", VarStatus)); + DEBUG((DEBUG_INFO, "GetLastAttempt Version - 0x%x, State - 0x%x\n", Sys= temFmpPrivate->LastAttempt.LastAttemptVersion, SystemFmpPrivate->LastAttem= pt.LastAttemptStatus)); return EFI_SUCCESS; } diff --git a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwar= eDxe.h b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareDxe= .h index f7166e337a..d3cc89e5f1 100644 =2D-- a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareDxe.= h +++ b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareDxe.h @@ -113,7 +113,7 @@ typedef struct { #define ABORT_REASON_MAX_SIZE 0x40 // UnicodeStringSize in= cluding final L'\0' -#define CAPSULE_IMAGE_ADDITIONAL_MAX_SIZE (0x20020 + 0xA0000) // Addtio= nal size for Capsule Header, FV block alignment + DispatchImage. +#define CAPSULE_IMAGE_ADDITIONAL_MAX_SIZE (0x20020 + 0xA0000) // Additi= onal size for Capsule Header, FV block alignment + DispatchImage. typedef struct { UINT8 ImageIndex; diff --git a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwar= eReportDxe.c b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmw= areReportDxe.c index ffd9d1f25b..ebd1d0d53d 100644 =2D-- a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareRepo= rtDxe.c +++ b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareReport= Dxe.c @@ -30,7 +30,7 @@ SYSTEM_FMP_PRIVATE_DATA *mSystemFmpPrivate =3D NULL; @param[out] LastAttemptVersion The last attempt version, which will be = recorded in ESRT and FMP EFI_FIRMWARE_IMAGE_DESCRIPTOR. @param[out] LastAttemptStatus The last attempt status, which will be r= ecorded in ESRT and FMP EFI_FIRMWARE_IMAGE_DESCRIPTOR. - @retval EFI_SUCESS Process Capsule Image successfully. + @retval EFI_SUCCESS Process Capsule Image successfully. @retval EFI_UNSUPPORTED Capsule image is not supported by the fir= mware. @retval EFI_VOLUME_CORRUPTED FV volume in the capsule is corrupted. @retval EFI_OUT_OF_RESOURCES Not enough memory. @@ -174,7 +174,7 @@ FmpSetImage ( // Process FV // Status =3D DispatchSystemFmpImages((VOID *)Image, ImageSize, &SystemFmp= Private->LastAttempt.LastAttemptVersion, &SystemFmpPrivate->LastAttempt.La= stAttemptStatus); - DEBUG((DEBUG_INFO, "(Agent)SetImage - LastAttemp Version - 0x%x, State = - 0x%x\n", SystemFmpPrivate->LastAttempt.LastAttemptVersion, SystemFmpPriv= ate->LastAttempt.LastAttemptStatus)); + DEBUG((DEBUG_INFO, "(Agent)SetImage - LastAttempt Version - 0x%x, State= - 0x%x\n", SystemFmpPrivate->LastAttempt.LastAttemptVersion, SystemFmpPri= vate->LastAttempt.LastAttemptStatus)); if (EFI_ERROR(Status)) { VarStatus =3D gRT->SetVariable( SYSTEM_FMP_LAST_ATTEMPT_VARIABLE_NAME, @@ -183,7 +183,7 @@ FmpSetImage ( sizeof(SystemFmpPrivate->LastAttempt), &SystemFmpPrivate->LastAttempt ); - DEBUG((DEBUG_INFO, "(Agent)SetLastAttemp - %r\n", VarStatus)); + DEBUG((DEBUG_INFO, "(Agent)SetLastAttempt - %r\n", VarStatus)); return Status; } @@ -211,7 +211,7 @@ FmpSetImage ( sizeof(SystemFmpPrivate->LastAttempt), &SystemFmpPrivate->LastAttempt ); - DEBUG((DEBUG_INFO, "(Agent)SetLastAttemp - %r\n", VarStatus)); + DEBUG((DEBUG_INFO, "(Agent)SetLastAttempt - %r\n", VarStatus)); return Status; } } diff --git a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwar= eUpdateDxe.c b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmw= areUpdateDxe.c index c302f750e2..bdb70bdb32 100644 =2D-- a/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareUpda= teDxe.c +++ b/SignedCapsulePkg/Universal/SystemFirmwareUpdate/SystemFirmwareUpdate= Dxe.c @@ -493,7 +493,7 @@ FmpSetImage ( // the current variable driver may not manage the new NVRAM region. // if (mNvRamUpdated) { - DEBUG ((DEBUG_INFO, "NvRamUpdated, Update Variable Serivces\n")); + DEBUG ((DEBUG_INFO, "NvRamUpdated, Update Variable Services\n")); gRT->GetVariable =3D GetVariableHook; gRT->GetNextVariableName =3D GetNextVariableNameHook; gRT->SetVariable =3D SetVariableHook; @@ -514,7 +514,7 @@ FmpSetImage ( sizeof(SystemFmpPrivate->LastAttempt), &SystemFmpPrivate->LastAttempt ); - DEBUG((DEBUG_INFO, "SetLastAttemp - %r\n", VarStatus)); + DEBUG((DEBUG_INFO, "SetLastAttempt - %r\n", VarStatus)); return Status; } =2D- 2.20.1 (Apple Git-117)