This commit is contained in:
DavidXanatos 2023-02-03 08:07:30 +01:00
parent aaa54c07da
commit 0c9d7b4238
6 changed files with 9 additions and 9 deletions

View File

@ -1115,7 +1115,7 @@ void* SbieDll_Hook_arm(
#endif
//
// write branche to jump entry
// write branch to jump entry
//
diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index];

View File

@ -628,7 +628,7 @@ _FX BOOLEAN File_InitDelete_v2()
_FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path)
{
// 1. remove deleted branche
// 1. remove deleted branch
LIST* Parent = NULL;
PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE);
@ -722,7 +722,7 @@ _FX BOOLEAN File_HasDeleted_v2(const WCHAR* TruePath)
_FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath)
{
// 1. separate branche from OldTruePath
// 1. separate branch from OldTruePath
LIST* Parent = NULL;
PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE);
@ -762,7 +762,7 @@ _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const
wcscpy(NewNode->relocation, OldTruePath);
// 5. reatach branche to NewTruePath
// 5. reatach branch to NewTruePath
if (Node) {
PATH_NODE* child = List_Head(&Node->items);

View File

@ -2277,7 +2277,7 @@ _FX NTSTATUS File_Api_RefreshPathList(PROCESS *proc, ULONG64 *parms)
} else {
//
// on failure purge the partialy cerated new set of path lists
// on failure purge the partially created new set of path lists
//
#ifdef USE_MATCH_PATH_EX

View File

@ -264,7 +264,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
//
// the service synamically allocates a per box SID to be used,
// if no SID is provided thsi feature is eider disabled or failed
// if no SID is provided this feature is eider disabled or failed
// then we fall back to using the default anonymous SID
//
@ -287,7 +287,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms)
//
// the service tells us if we should drop admin rights for this process,
// howeever if security mode is enabled we always drop admin rights
// however if security mode is enabled we always drop admin rights
//
proc->drop_rights = proc->use_security_mode || parms[3] != FALSE;

View File

@ -190,7 +190,7 @@ _FX NTSTATUS SbieApi_DebugError(SBIELOW_DATA* data, ULONG error)
wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0};
// covert ulong to hex string and copy it into the message array
// convert ulong to hex string and copy it into the message array
wchar_t* ptr = &text[18]; // point after L"...0x"
wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' };
for(int i=28; i >= 0; i-=4)

View File

@ -515,7 +515,7 @@ finish:
bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName)
{
// Allow setting of DropAdminRights to supress UAC prompts / elevation from the sandboxed realm
// Allow setting of DropAdminRights to suppress UAC prompts / elevation from the sandboxed realm
//if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE))
// return false; // if we are not swapping the token we can not drop admin rights so keep this consistent
if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE))