From: "Ni, Ruiyu" <ruiyu.ni@intel.com>
To: Gary Lin <glin@suse.com>,
"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Subject: Re: [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables
Date: Wed, 19 Oct 2016 07:50:56 +0000 [thread overview]
Message-ID: <734D49CCEBEEF84792F5B80ED585239D58E38839@SHSMSX104.ccr.corp.intel.com> (raw)
In-Reply-To: <20161019070138.16424-25-glin@suse.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
> -----Original Message-----
> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of
> Gary Lin
> Sent: Wednesday, October 19, 2016 3:01 PM
> To: edk2-devel@lists.01.org
> Cc: Ni, Ruiyu <ruiyu.ni@intel.com>
> Subject: [edk2] [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables
>
> - discontiguous -> discontinuous
> - reloaced -> relocated
> - supresses -> suppresses
> - debuging -> debugging
> - suported -> supported
> - availble -> available
> - environmemt -> environment
> - Seperator -> Separator
> - remmeber -> remember
> - interperted -> interpreted
> - the a new -> the new
> - initailized -> initialized
> - attribue -> attribute
> - boundry -> boundary
> - nto -> not
> - permenent -> permanent
> - immediatly -> immediately
> - excuted -> executed
>
> Cc: Ruiyu Ni <ruiyu.ni@intel.com>
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Gary Lin <glin@suse.com>
> ---
> Nt32Pkg/Include/Ppi/NtAutoscan.h | 2 +-
>
> Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActionLi
> b.c | 8 ++--
> Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLib.
> c | 6 +--
> Nt32Pkg/Sec/SecMain.c | 50 ++++++++++----------
> Nt32Pkg/Sec/SecMain.h | 6 +--
> Nt32Pkg/Sec/WinNtThunk.c | 2 +-
> Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c | 2 +-
> 7 files changed, 38 insertions(+), 38 deletions(-)
>
> diff --git a/Nt32Pkg/Include/Ppi/NtAutoscan.h
> b/Nt32Pkg/Include/Ppi/NtAutoscan.h
> index 49c0294..1891bb4 100644
> --- a/Nt32Pkg/Include/Ppi/NtAutoscan.h
> +++ b/Nt32Pkg/Include/Ppi/NtAutoscan.h
> @@ -41,7 +41,7 @@ EFI_STATUS
>
> Routine Description:
> This service is called from Index == 0 until it returns EFI_UNSUPPORTED.
> - It allows discontiguous memory regions to be supported by the emulator.
> + It allows discontinuous memory regions to be supported by the emulator.
> It uses gSystemMemory[] and gSystemMemoryCount that were created by
> parsing the Windows environment variable EFI_MEMORY_SIZE.
> The size comes from the varaible and the address comes from the call to
> diff --git
> a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraAction
> Lib.c
> b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActio
> nLib.c
> index 524d6c0..2f62d65 100644
> ---
> a/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraAction
> Lib.c
> +++
> b/Nt32Pkg/Library/DxeNt32PeCoffExtraActionLib/DxeNt32PeCoffExtraActi
> +++ onLib.c
> @@ -290,7 +290,7 @@ PeCoffLoaderRelocateImageExtraAction (
> // If we load our own PE COFF images the Windows debugger can not
> source
> // level debug our code. If a valid PDB pointer exists usw it to load
> // the *.dll file as a library using Windows* APIs. This allows
> - // source level debug. The image is still loaded and reloaced
> + // source level debug. The image is still loaded and relocated
> // in the Framework memory space like on a real system (by the code
> above),
> // but the entry point points into the DLL loaded by the code bellow.
> //
> @@ -335,11 +335,11 @@ PeCoffLoaderRelocateImageExtraAction (
> if (Library != NULL) {
> //
> // InitializeDriver is the entry point we put in all our EFI DLL's. The
> - // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> + // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
> // normal DLL entry point of DllMain, and prevents other modules that
> are
> // referenced in side the DllFileName from being loaded. There is no error
> // checking as the we can point to the PE32 image loaded by Tiano. This
> - // step is only needed for source level debuging
> + // step is only needed for source level debugging
> //
> DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library,
> "InitializeDriver");
>
> @@ -355,7 +355,7 @@ PeCoffLoaderRelocateImageExtraAction (
> DEBUG ((EFI_D_ERROR, "WARNING: DLL already loaded. No source level
> debug %s. \n", DllFileName));
> } else {
> //
> - // This DLL is not already loaded, so source level debugging is suported.
> + // This DLL is not already loaded, so source level debugging is supported.
> //
> ImageContext->EntryPoint = (EFI_PHYSICAL_ADDRESS) (UINTN)
> DllEntryPoint;
> DEBUG ((EFI_D_INFO, "LoadLibraryEx (%s,\n NULL,
> DONT_RESOLVE_DLL_REFERENCES)\n", DllFileName));
> diff --git
> a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> index b05834e..682446a 100644
> ---
> a/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActionLi
> b.c
> +++
> b/Nt32Pkg/Library/PeiNt32PeCoffExtraActionLib/PeiNt32PeCoffExtraActi
> +++ onLib.c
> @@ -155,7 +155,7 @@ PeCoffLoaderRelocateImageExtraAction (
> // If we load our own PE COFF images the Windows debugger can not
> source
> // level debug our code. If a valid PDB pointer exists usw it to load
> // the *.dll file as a library using Windows* APIs. This allows
> - // source level debug. The image is still loaded and reloaced
> + // source level debug. The image is still loaded and relocated
> // in the Framework memory space like on a real system (by the code
> above),
> // but the entry point points into the DLL loaded by the code bellow.
> //
> @@ -200,11 +200,11 @@ PeCoffLoaderRelocateImageExtraAction (
> if (Library != NULL) {
> //
> // InitializeDriver is the entry point we put in all our EFI DLL's. The
> - // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> + // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
> // normal DLL entry point of DllMain, and prevents other modules that
> are
> // referenced in side the DllFileName from being loaded. There is no error
> // checking as the we can point to the PE32 image loaded by Tiano. This
> - // step is only needed for source level debuging
> + // step is only needed for source level debugging
> //
> DllEntryPoint = (VOID *) (UINTN) mWinNt->GetProcAddress (Library,
> "InitializeDriver");
>
> diff --git a/Nt32Pkg/Sec/SecMain.c b/Nt32Pkg/Sec/SecMain.c index
> e9f72df..80539fa 100644
> --- a/Nt32Pkg/Sec/SecMain.c
> +++ b/Nt32Pkg/Sec/SecMain.c
> @@ -22,7 +22,7 @@ Abstract:
> will be, how may FD's will be loaded and also what the boot mode is.
>
> The SEC registers a set of services with the SEC core. gPrivateDispatchTable
> - is a list of PPI's produced by the SEC that are availble for usage in PEI.
> + is a list of PPI's produced by the SEC that are available for usage in PEI.
>
> This code produces 128 K of temporary memory for the PEI stack by directly
> allocate memory space with ReadWrite and Execute attribute.
> @@ -161,7 +161,7 @@ Routine Description:
> Arguments:
> Argc - Number of command line arguments
> Argv - Array of command line argument strings
> - Envp - Array of environmemt variable strings
> + Envp - Array of environment variable strings
>
> Returns:
> 0 - Normal exit
> @@ -228,7 +228,7 @@ Returns:
> //
> // Allocate space for gSystemMemory Array
> //
> - gSystemMemoryCount = CountSeperatorsInString (MemorySizeStr, '!') + 1;
> + gSystemMemoryCount = CountSeparatorsInString (MemorySizeStr, '!') +
> + 1;
> gSystemMemory = calloc (gSystemMemoryCount, sizeof
> (NT_SYSTEM_MEMORY));
> if (gSystemMemory == NULL) {
> SecPrint ("ERROR : Can not allocate memory for %S. Exiting.\n",
> MemorySizeStr); @@ -237,7 +237,7 @@ Returns:
> //
> // Allocate space for gSystemMemory Array
> //
> - gFdInfoCount = CountSeperatorsInString (FirmwareVolumesStr, '!') + 1;
> + gFdInfoCount = CountSeparatorsInString (FirmwareVolumesStr, '!') +
> + 1;
> gFdInfo = calloc (gFdInfoCount, sizeof (NT_FD_INFO));
> if (gFdInfo == NULL) {
> SecPrint ("ERROR : Can not allocate memory for %S. Exiting.\n",
> FirmwareVolumesStr); @@ -291,7 +291,7 @@ Returns:
> }
>
> //
> - // Open the FD and remmeber where it got mapped into our processes
> address space
> + // Open the FD and remember where it got mapped into our processes
> + address space
> //
> Status = WinNtOpenFile (
> FileName,
> @@ -307,7 +307,7 @@ Returns:
>
> SecPrint (" FD loaded from");
> //
> - // printf can't print filenames directly as the \ gets interperted as an
> + // printf can't print filenames directly as the \ gets interpreted
> + as an
> // escape character.
> //
> for (Index2 = 0; FileName[Index2] != '\0'; Index2++) { @@ -385,7 +385,7
> @@ Arguments:
> CreationDisposition - The flags to pass to CreateFile(). Use to create new
> files for
> memory emulation, and exiting files for firmware volume
> emulation
> BaseAddress - The base address of the mapped file in the user address
> space.
> - If passed in as NULL the a new memory region is used.
> + If passed in as NULL the new memory region is used.
> If passed in as non NULL the request memory region is used for
> the mapping of the file into the process space.
> Length - The size of the mapped region in bytes
> @@ -701,7 +701,7 @@ SecWinNtPeiAutoScan (
>
> Routine Description:
> This service is called from Index == 0 until it returns EFI_UNSUPPORTED.
> - It allows discontiguous memory regions to be supported by the emulator.
> + It allows discontinuous memory regions to be supported by the emulator.
> It uses gSystemMemory[] and gSystemMemoryCount that were created by
> parsing PcdWinNtMemorySizeForSecMain value.
> The size comes from the Pcd value and the address comes from the
> memory space @@ -746,7 +746,7 @@ SecWinNtWinNtThunkAddress
> ( Routine Description:
> Since the SEC is the only Windows program in stack it must export
> an interface to do Win API calls. That's what the WinNtThunk address
> - is for. gWinNt is initailized in WinNtThunk.c.
> + is for. gWinNt is initialized in WinNtThunk.c.
>
> Arguments:
> InterfaceSize - sizeof (EFI_WIN_NT_THUNK_PROTOCOL); @@ -799,7 +799,7
> @@ Returns:
> return Status;
> }
> //
> - // Allocate space in NT (not emulator) memory with ReadWrite and
> Execute attribue.
> + // Allocate space in NT (not emulator) memory with ReadWrite and
> Execute attribute.
> // Extra space is for alignment
> //
> ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS) (UINTN)
> VirtualAlloc (NULL, (SIZE_T) (ImageContext.ImageSize +
> (ImageContext.SectionAlignment * 2)), MEM_COMMIT,
> PAGE_EXECUTE_READWRITE); @@ -807,7 +807,7 @@ Returns:
> return EFI_OUT_OF_RESOURCES;
> }
> //
> - // Align buffer on section boundry
> + // Align buffer on section boundary
> //
> ImageContext.ImageAddress += ImageContext.SectionAlignment - 1;
> ImageContext.ImageAddress &=
> ~((EFI_PHYSICAL_ADDRESS)ImageContext.SectionAlignment - 1); @@ -853,7
> +853,7 @@ Arguments:
>
> Returns:
> EFI_SUCCESS - Return the Base address and size of the FV
> - EFI_UNSUPPORTED - Index does nto map to an FD in the system
> + EFI_UNSUPPORTED - Index does not map to an FD in the system
>
> --*/
> {
> @@ -956,28 +956,28 @@ Returns:
> }
>
> UINTN
> -CountSeperatorsInString (
> +CountSeparatorsInString (
> IN CONST CHAR16 *String,
> - IN CHAR16 Seperator
> + IN CHAR16 Separator
> )
> /*++
>
> Routine Description:
> - Count the number of seperators in String
> + Count the number of separators in String
>
> Arguments:
> String - String to process
> - Seperator - Item to count
> + Separator - Item to count
>
> Returns:
> - Number of Seperator in String
> + Number of Separator in String
>
> --*/
> {
> UINTN Count;
>
> for (Count = 0; *String != '\0'; String++) {
> - if (*String == Seperator) {
> + if (*String == Separator) {
> Count++;
> }
> }
> @@ -1010,7 +1010,7 @@ SecNt32PeCoffRelocateImage (
> // If we load our own PE COFF images the Windows debugger can not
> source
> // level debug our code. If a valid PDB pointer exists usw it to load
> // the *.dll file as a library using Windows* APIs. This allows
> - // source level debug. The image is still loaded and reloaced
> + // source level debug. The image is still loaded and relocated
> // in the Framework memory space like on a real system (by the code
> above),
> // but the entry point points into the DLL loaded by the code bellow.
> //
> @@ -1055,11 +1055,11 @@ SecNt32PeCoffRelocateImage (
> if (Library != NULL) {
> //
> // InitializeDriver is the entry point we put in all our EFI DLL's. The
> - // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> supresses the
> + // DONT_RESOLVE_DLL_REFERENCES argument to LoadLIbraryEx()
> + suppresses the
> // normal DLL entry point of DllMain, and prevents other modules that
> are
> // referenced in side the DllFileName from being loaded. There is no error
> // checking as the we can point to the PE32 image loaded by Tiano. This
> - // step is only needed for source level debuging
> + // step is only needed for source level debugging
> //
> DllEntryPoint = (VOID *) (UINTN) GetProcAddress (Library,
> "InitializeDriver");
>
> @@ -1103,7 +1103,7 @@ SecTemporaryRamSupport (
> )
> {
> //
> - // Migrate the whole temporary memory to permenent memory.
> + // Migrate the whole temporary memory to permanent memory.
> //
> CopyMem (
> (VOID*)(UINTN)PermanentMemoryBase,
> @@ -1113,8 +1113,8 @@ SecTemporaryRamSupport (
>
> //
> // SecSwitchStack function must be invoked after the memory migration
> - // immediatly, also we need fixup the stack change caused by new call into
> - // permenent memory.
> + // immediately, also we need fixup the stack change caused by new
> + call into // permanent memory.
> //
> SecSwitchStack (
> (UINT32) TemporaryMemoryBase,
> @@ -1123,7 +1123,7 @@ SecTemporaryRamSupport (
>
> //
> // We need *not* fix the return address because currently,
> - // The PeiCore is excuted in flash.
> + // The PeiCore is executed in flash.
> //
>
> //
> diff --git a/Nt32Pkg/Sec/SecMain.h b/Nt32Pkg/Sec/SecMain.h index
> 76522e3..8b19878 100644
> --- a/Nt32Pkg/Sec/SecMain.h
> +++ b/Nt32Pkg/Sec/SecMain.h
> @@ -524,9 +524,9 @@ Returns:
> ;
>
> UINTN
> -CountSeperatorsInString (
> +CountSeparatorsInString (
> IN CONST CHAR16 *String,
> - IN CHAR16 Seperator
> + IN CHAR16 Separator
> )
> /*++
>
> @@ -537,7 +537,7 @@ Routine Description:
> Arguments:
>
> String - TODO: add argument description
> - Seperator - TODO: add argument description
> + Separator - TODO: add argument description
>
> Returns:
>
> diff --git a/Nt32Pkg/Sec/WinNtThunk.c b/Nt32Pkg/Sec/WinNtThunk.c index
> 9ab380c..3159ef4 100644
> --- a/Nt32Pkg/Sec/WinNtThunk.c
> +++ b/Nt32Pkg/Sec/WinNtThunk.c
> @@ -42,7 +42,7 @@ Abstract:
> // point could be modified dynamically. The SEC does not do that, so we
> must // disable the warning so we can compile the SEC. The previous
> method was to // asign each element in code. The disadvantage to that
> approach is it's harder -// to tell if all the elements have been initailized
> properly.
> +// to tell if all the elements have been initialized properly.
> //
> #pragma warning(disable : 4232)
> #pragma warning(disable : 4996)
> diff --git a/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> b/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> index 20774ee..8cd9188 100644
> --- a/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> +++ b/Nt32Pkg/WinNtFirmwareVolumePei/WinntFwh.c
> @@ -48,7 +48,7 @@ Routine Description:
> Perform a call-back into the SEC simulator to get address of the Firmware
> Hub
>
> Arguments:
> - FfsHeader - Ffs Header availible to every PEIM
> + FfsHeader - Ffs Header available to every PEIM
> PeiServices - General purpose services available to every PEIM.
>
> Returns:
> --
> 2.10.1
>
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel
next prev parent reply other threads:[~2016-10-19 7:51 UTC|newest]
Thread overview: 79+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-10-19 7:01 [PATCH 00/33] Fix typos in comments and variables Gary Lin
2016-10-19 7:01 ` [PATCH 01/33] ArmPkg: Fix typos in comments Gary Lin
2016-10-19 15:09 ` Ard Biesheuvel
2016-10-19 15:15 ` Laszlo Ersek
2016-10-19 15:33 ` Leif Lindholm
2016-10-19 7:01 ` [PATCH 02/33] BaseTools: Fix typos in comments and variables Gary Lin
2016-10-19 7:30 ` Gao, Liming
2016-10-19 7:36 ` Zhu, Yonghong
2016-10-19 7:01 ` [PATCH 03/33] CorebootPayloadPkg: Fix typos in comments Gary Lin
2016-10-26 18:50 ` Ma, Maurice
2016-10-19 7:01 ` [PATCH 04/33] CorebootModulePkg: " Gary Lin
2016-10-26 18:41 ` Ma, Maurice
2016-10-19 7:01 ` [PATCH 05/33] CryptoPkg: " Gary Lin
2016-10-26 3:00 ` Long, Qin
2016-10-19 7:01 ` [PATCH 06/33] DuetPkg: " Gary Lin
2016-10-19 7:46 ` Ni, Ruiyu
2016-10-19 7:01 ` [PATCH 07/33] EdkCompatibilityPkg: " Gary Lin
2016-10-19 8:19 ` Gao, Liming
2016-10-19 7:01 ` [PATCH 08/33] EmulatorPkg: Fix typos in comments and variables Gary Lin
2016-10-19 20:37 ` Jordan Justen
2016-10-20 8:16 ` Laszlo Ersek
2016-10-19 7:01 ` [PATCH 09/33] EmbeddedPkg: Fix typos in comments Gary Lin
2016-10-19 15:09 ` Ard Biesheuvel
2016-10-19 7:01 ` [PATCH 10/33] IntelFrameworkModulePkg: " Gary Lin
2016-10-20 1:08 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 11/33] IntelFrameworkPkg: " Gary Lin
2016-10-20 1:08 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 12/33] IntelFspPkg: " Gary Lin
2016-10-19 7:06 ` Yao, Jiewen
2016-10-19 7:01 ` [PATCH 13/33] IntelFspWrapperPkg: " Gary Lin
2016-10-19 7:08 ` Yao, Jiewen
2016-10-19 7:01 ` [PATCH 14/33] IntelFsp2Pkg: " Gary Lin
2016-10-19 7:06 ` Yao, Jiewen
2016-10-19 7:12 ` Mudusuru, Giri P
2016-10-19 7:01 ` [PATCH 15/33] IntelFsp2WrapperPkg: Fix a typo in the comment Gary Lin
2016-10-19 7:07 ` Yao, Jiewen
2016-10-19 7:11 ` Mudusuru, Giri P
2016-10-19 7:01 ` [PATCH 16/33] MdeModulePkg: BootManagerMenuApp: Fix typos in comments Gary Lin
2016-10-19 8:20 ` Tian, Feng
2016-10-19 7:01 ` [PATCH 17/33] MdeModulePkg/Bus: " Gary Lin
2016-10-19 7:01 ` [PATCH 18/33] MdeModulePkg/Core: " Gary Lin
2016-10-19 8:20 ` Tian, Feng
2016-10-19 7:01 ` [PATCH 19/33] MdeModulePkg/Include: " Gary Lin
2016-10-19 7:01 ` [PATCH 20/33] MdeModulePkg/Library: Fix typos in comments and variables Gary Lin
2016-10-19 7:01 ` [PATCH 21/33] MdeModulePkg/Universal: Fix typos in comments Gary Lin
2016-10-19 7:01 ` [PATCH 22/33] MdePkg: " Gary Lin
2016-10-19 8:21 ` Gao, Liming
2016-10-19 7:01 ` [PATCH 23/33] NetworkPkg: " Gary Lin
2016-10-19 7:21 ` Fu, Siyuan
2016-10-26 0:53 ` Fu, Siyuan
2016-10-19 7:01 ` [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables Gary Lin
2016-10-19 7:50 ` Ni, Ruiyu [this message]
2016-10-19 7:01 ` [PATCH 25/33] OptionRomPkg: Fix typos in comments Gary Lin
2016-10-19 7:51 ` Ni, Ruiyu
2016-10-19 7:01 ` [PATCH 26/33] OvmfPkg: " Gary Lin
2016-10-19 7:01 ` [PATCH 27/33] QuarkPlatformPkg: " Gary Lin
2016-10-25 20:53 ` Kinney, Michael D
2016-10-19 7:01 ` [PATCH 28/33] QuarkSocPkg: " Gary Lin
2016-10-25 21:00 ` Kinney, Michael D
2016-10-19 7:01 ` [PATCH 29/33] SecurityPkg: " Gary Lin
2016-10-27 1:29 ` Zhang, Chao B
2016-11-14 3:12 ` Zhang, Chao B
2016-11-14 4:03 ` Gary Lin
2016-11-14 6:24 ` Gao, Liming
2016-11-14 8:30 ` Gary Lin
2016-10-19 7:01 ` [PATCH 30/33] ShellPkg: Fix typos in comments and variables Gary Lin
2016-10-19 7:51 ` Ni, Ruiyu
2016-10-19 20:29 ` Carsey, Jaben
2016-10-20 1:55 ` Gary Lin
2016-10-19 7:01 ` [PATCH 31/33] SourceLevelDebugPkg: Fix typos in comments Gary Lin
2016-10-19 7:46 ` Wu, Hao A
2016-10-19 7:01 ` [PATCH 32/33] UefiCpuPkg: " Gary Lin
2016-10-20 1:58 ` Fan, Jeff
2016-10-20 2:08 ` Gary Lin
2016-10-20 2:45 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 33/33] Vlv2TbltDevicePkg: " Gary Lin
2016-10-24 1:33 ` Wei, David
2016-10-19 7:28 ` [PATCH 00/33] Fix typos in comments and variables Zeng, Star
2016-10-19 14:50 ` Leif Lindholm
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=734D49CCEBEEF84792F5B80ED585239D58E38839@SHSMSX104.ccr.corp.intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox