spel fix
This commit is contained in:
parent
aaa54c07da
commit
0c9d7b4238
|
@ -1115,7 +1115,7 @@ void* SbieDll_Hook_arm(
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
//
|
//
|
||||||
// write branche to jump entry
|
// write branch to jump entry
|
||||||
//
|
//
|
||||||
|
|
||||||
diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index];
|
diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index];
|
||||||
|
|
|
@ -628,7 +628,7 @@ _FX BOOLEAN File_InitDelete_v2()
|
||||||
|
|
||||||
_FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path)
|
_FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path)
|
||||||
{
|
{
|
||||||
// 1. remove deleted branche
|
// 1. remove deleted branch
|
||||||
|
|
||||||
LIST* Parent = NULL;
|
LIST* Parent = NULL;
|
||||||
PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE);
|
PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE);
|
||||||
|
@ -722,7 +722,7 @@ _FX BOOLEAN File_HasDeleted_v2(const WCHAR* TruePath)
|
||||||
|
|
||||||
_FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath)
|
_FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath)
|
||||||
{
|
{
|
||||||
// 1. separate branche from OldTruePath
|
// 1. separate branch from OldTruePath
|
||||||
|
|
||||||
LIST* Parent = NULL;
|
LIST* Parent = NULL;
|
||||||
PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE);
|
PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE);
|
||||||
|
@ -762,7 +762,7 @@ _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const
|
||||||
wcscpy(NewNode->relocation, OldTruePath);
|
wcscpy(NewNode->relocation, OldTruePath);
|
||||||
|
|
||||||
|
|
||||||
// 5. reatach branche to NewTruePath
|
// 5. reatach branch to NewTruePath
|
||||||
|
|
||||||
if (Node) {
|
if (Node) {
|
||||||
PATH_NODE* child = List_Head(&Node->items);
|
PATH_NODE* child = List_Head(&Node->items);
|
||||||
|
|
|
@ -2277,7 +2277,7 @@ _FX NTSTATUS File_Api_RefreshPathList(PROCESS *proc, ULONG64 *parms)
|
||||||
} else {
|
} else {
|
||||||
|
|
||||||
//
|
//
|
||||||
// on failure purge the partialy cerated new set of path lists
|
// on failure purge the partially created new set of path lists
|
||||||
//
|
//
|
||||||
|
|
||||||
#ifdef USE_MATCH_PATH_EX
|
#ifdef USE_MATCH_PATH_EX
|
||||||
|
|
|
@ -264,7 +264,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
|
||||||
|
|
||||||
//
|
//
|
||||||
// the service synamically allocates a per box SID to be used,
|
// the service synamically allocates a per box SID to be used,
|
||||||
// if no SID is provided thsi feature is eider disabled or failed
|
// if no SID is provided this feature is eider disabled or failed
|
||||||
// then we fall back to using the default anonymous SID
|
// then we fall back to using the default anonymous SID
|
||||||
//
|
//
|
||||||
|
|
||||||
|
@ -287,7 +287,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
|
||||||
|
|
||||||
//
|
//
|
||||||
// the service tells us if we should drop admin rights for this process,
|
// the service tells us if we should drop admin rights for this process,
|
||||||
// howeever if security mode is enabled we always drop admin rights
|
// however if security mode is enabled we always drop admin rights
|
||||||
//
|
//
|
||||||
|
|
||||||
proc->drop_rights = proc->use_security_mode || parms[3] != FALSE;
|
proc->drop_rights = proc->use_security_mode || parms[3] != FALSE;
|
||||||
|
|
|
@ -190,7 +190,7 @@ _FX NTSTATUS SbieApi_DebugError(SBIELOW_DATA* data, ULONG error)
|
||||||
|
|
||||||
wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0};
|
wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0};
|
||||||
|
|
||||||
// covert ulong to hex string and copy it into the message array
|
// convert ulong to hex string and copy it into the message array
|
||||||
wchar_t* ptr = &text[18]; // point after L"...0x"
|
wchar_t* ptr = &text[18]; // point after L"...0x"
|
||||||
wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' };
|
wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' };
|
||||||
for(int i=28; i >= 0; i-=4)
|
for(int i=28; i >= 0; i-=4)
|
||||||
|
|
|
@ -515,7 +515,7 @@ finish:
|
||||||
|
|
||||||
bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName)
|
bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName)
|
||||||
{
|
{
|
||||||
// Allow setting of DropAdminRights to supress UAC prompts / elevation from the sandboxed realm
|
// Allow setting of DropAdminRights to suppress UAC prompts / elevation from the sandboxed realm
|
||||||
//if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE))
|
//if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE))
|
||||||
// return false; // if we are not swapping the token we can not drop admin rights so keep this consistent
|
// return false; // if we are not swapping the token we can not drop admin rights so keep this consistent
|
||||||
if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE))
|
if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE))
|
||||||
|
|
Loading…
Reference in New Issue