This commit is contained in:
DavidXanatos 2023-02-03 08:07:30 +01:00
parent aaa54c07da
commit 0c9d7b4238
6 changed files with 9 additions and 9 deletions

View File

@ -1115,7 +1115,7 @@ void* SbieDll_Hook_arm(
#endif #endif
// //
// write branche to jump entry // write branch to jump entry
// //
diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index]; diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index];

View File

@ -628,7 +628,7 @@ _FX BOOLEAN File_InitDelete_v2()
_FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path) _FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path)
{ {
// 1. remove deleted branche // 1. remove deleted branch
LIST* Parent = NULL; LIST* Parent = NULL;
PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE); PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE);
@ -722,7 +722,7 @@ _FX BOOLEAN File_HasDeleted_v2(const WCHAR* TruePath)
_FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath) _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath)
{ {
// 1. separate branche from OldTruePath // 1. separate branch from OldTruePath
LIST* Parent = NULL; LIST* Parent = NULL;
PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE); PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE);
@ -762,7 +762,7 @@ _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const
wcscpy(NewNode->relocation, OldTruePath); wcscpy(NewNode->relocation, OldTruePath);
// 5. reatach branche to NewTruePath // 5. reatach branch to NewTruePath
if (Node) { if (Node) {
PATH_NODE* child = List_Head(&Node->items); PATH_NODE* child = List_Head(&Node->items);

View File

@ -2277,7 +2277,7 @@ _FX NTSTATUS File_Api_RefreshPathList(PROCESS *proc, ULONG64 *parms)
} else { } else {
// //
// on failure purge the partialy cerated new set of path lists // on failure purge the partially created new set of path lists
// //
#ifdef USE_MATCH_PATH_EX #ifdef USE_MATCH_PATH_EX

View File

@ -264,7 +264,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
// //
// the service synamically allocates a per box SID to be used, // the service synamically allocates a per box SID to be used,
// if no SID is provided thsi feature is eider disabled or failed // if no SID is provided this feature is eider disabled or failed
// then we fall back to using the default anonymous SID // then we fall back to using the default anonymous SID
// //
@ -287,7 +287,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
// //
// the service tells us if we should drop admin rights for this process, // the service tells us if we should drop admin rights for this process,
// howeever if security mode is enabled we always drop admin rights // however if security mode is enabled we always drop admin rights
// //
proc->drop_rights = proc->use_security_mode || parms[3] != FALSE; proc->drop_rights = proc->use_security_mode || parms[3] != FALSE;

View File

@ -190,7 +190,7 @@ _FX NTSTATUS SbieApi_DebugError(SBIELOW_DATA* data, ULONG error)
wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0}; wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0};
// covert ulong to hex string and copy it into the message array // convert ulong to hex string and copy it into the message array
wchar_t* ptr = &text[18]; // point after L"...0x" wchar_t* ptr = &text[18]; // point after L"...0x"
wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' }; wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' };
for(int i=28; i >= 0; i-=4) for(int i=28; i >= 0; i-=4)

View File

@ -515,7 +515,7 @@ finish:
bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName) bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName)
{ {
// Allow setting of DropAdminRights to supress UAC prompts / elevation from the sandboxed realm // Allow setting of DropAdminRights to suppress UAC prompts / elevation from the sandboxed realm
//if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE)) //if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE))
// return false; // if we are not swapping the token we can not drop admin rights so keep this consistent // return false; // if we are not swapping the token we can not drop admin rights so keep this consistent
if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE)) if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE))