Merge pull request #875 from isaak654/patch-9

Fix a lot of typos and improve readability
This commit is contained in:
DavidXanatos 2021-06-07 11:31:06 +02:00 committed by GitHub
commit a02a475b59
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
19 changed files with 58 additions and 59 deletions

View File

@ -150,7 +150,8 @@ ALIGNED HANDLE my_CreateFileW(
HANDLE hTemplateFile);
//
// prevent SBIE1313, dont even try to access the block devcie for raw reading
// prevent SandboxieCrypto.exe from causing SBIE1313,
// don't even try to access to the device block for raw reading
//
if (wcsnicmp(lpFileName, L"\\\\.\\PhysicalDrive", 17) == 0 && wcschr(lpFileName + 17, L'\\') == NULL) {

View File

@ -3455,9 +3455,9 @@ _FX void Com_LoadRTList(const WCHAR* setting, WCHAR** pNames)
_FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
{
//
// Chrome uses the FindAppUriHandlersAsync which when we dont have com open and more rights than we should have
// fails returning a NULl value, chrome does no check for thsi faulure mode and dereferences it resulting in a fatal crash.
// Since we don't support modern app features anyways the simplest workaround is to block this interface.
// Chrome uses the FindAppUriHandlersAsync, which fails returning a NULL value when we don't have com open and more rights
// than we should have. Chrome does not check for this failure mode and dereferences it, resulting in a fatal crash.
// Since we don't support modern app features anyways, the simplest workaround is to block this interface.
//
if (Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME) {
@ -3466,7 +3466,7 @@ _FX BOOLEAN Com_IsClosedRT(const wchar_t* strClassId)
}
//
// this seams to be broken as well
// this seems to be broken as well
//if (wcscmp(strClassId, L"Windows.UI.Notifications.ToastNotificationManager") == 0)
// return TRUE;

View File

@ -466,7 +466,7 @@ _FX void Dll_InitExeEntry(void)
//
// check if running as a forced COM server process
// note: does not return if this is the case
// note: it does not return if this is the case
//
Custom_ComServer();
@ -475,11 +475,11 @@ _FX void Dll_InitExeEntry(void)
// force load of UxTheme in a Google Chrome sandbox process
//
// Note: this does not seam to longer be needed for modern chrome builds, also it breaks the vivaldi browser
// Note: this does not seem to be needed anymore for modern Chrome builds, also it breaks Vivaldi browser
//Custom_Load_UxTheme();
UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since win 7
UserEnv_InitVer(Dll_OsBuild >= 7600 ? Dll_KernelBase : Dll_Kernel32); // in KernelBase since Win 7
//
// Windows 8.1: hook UserEnv-related entrypoint in KernelBase

View File

@ -1232,14 +1232,14 @@ _FX HWND Gui_CreateWindowExW(
//
// under Sandboxie 4 the Chrome sandbox child process gets confused
// (reason not known) and creates some top level windows, for which it
// does not process messages. this causes DDE message broadcast to
// hang for several seconds. to workaround this, we cause the windows
// does not process messages. This causes DDE message broadcast to
// hang for several seconds. To workaround this, we cause the windows
// to be created as message-only windows
//
// note: the desktop window was made accessible in early v4 builds
// but this code is still here to handle any other parent windows
//
// note: this code breaks chrome hw acceleration, so its no longer used
// note: this code breaks Chrome hw acceleration, so it's no longer used
//
/*if (Dll_ChromeSandbox) {

View File

@ -187,7 +187,7 @@ _FX BOOLEAN Gui_InitMisc(void)
// Chinese instant messenger QQ.exe (aka TM.exe) uses OpenInputDesktop,
// GetThreadDesktop and GetUserObjectInformation to determine if the
// desktop is locked, and if OpenInputDesktop fails, it assumes lock.
// fortunately it is enough to hook just OpenInputDesktop to fix this
// Fortunately it is enough to hook just OpenInputDesktop to fix this
//
// Google Chrome also uses OpenInputDesktop and GetUserObjectInformation
// to check if the desktop is locked, and other programs might as well
@ -1202,7 +1202,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl(
GUI_GET_RAW_INPUT_DEVICE_INFO_REQ* req;
GUI_GET_RAW_INPUT_DEVICE_INFO_RPL* rpl;
// Note: pcbSize seams to be in tchars not in bytes!
// Note: pcbSize seems to be in tchars not in bytes!
ULONG lenData = 0;
if (pData && pcbSize)
lenData = (*pcbSize) * (bUnicode ? sizeof(WCHAR) : 1);

View File

@ -997,9 +997,9 @@ _FX BOOL Proc_UpdateProcThreadAttribute(
_Out_writes_bytes_opt_(cbSize) PVOID lpPreviousValue,
_In_opt_ PSIZE_T lpReturnSize)
{
// fix for chreom 86+
// when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
// fals with an access denided error, so we need to block this attribute form being set
// fix for Chrome 86+
// when the PROC_THREAD_ATTRIBUTE_JOB_LIST is set, the call CreateProcessAsUserW -> CreateProcessInternalW -> NtCreateProcess
// fails with an access denied error, so we need to block this attribute from being set
// if(Dll_ImageType == DLL_IMAGE_GOOGLE_CHROME)
if (Attribute == 0x0002000d) //PROC_THREAD_ATTRIBUTE_JOB_LIST
{
@ -1128,8 +1128,8 @@ _FX BOOL Proc_CreateProcessInternalW_RS5(
}
//
// Electron based applications which work like chrome seam to fail with HW acceleration even when
// thay get the same treatment as chrome and chromium derivatives.
// Electron based applications which work like Chrome seem to fail with HW acceleration even when
// they get the same treatment as Chrome and Chromium derivatives.
// hack: by adding a parameter to the gpu renderer process we can fix the issue.
//
@ -1686,7 +1686,7 @@ _FX void Proc_QuoteCommandLine_XP(
//
// the system CreateProcessInternal may quote the first argument on
// the command line. on Vista and later, we get the quoted string
// the command line. On Vista and later, we get the quoted string
// through Proc_RtlCreateProcessParametersEx, but on Windows XP we
// abort CreateProcessInternal during NtCreateSection, before it can
// show us the quoted command line, so add the quotes here
@ -1774,9 +1774,9 @@ _FX void Proc_FixBatchCommandLine(
// lpApplication, the system CreateProcessInternalW will try to create
// a process using the batch file path, and will fail with "not found"
// instead of "not exe file" if the batch file exists only in the
// sandbox. to prepare for this case, we adjust the command line if
// sandbox. To prepare for this case, we adjust the command line if
// the batch file is inside the sandbox.
// see Proc_CreateProcessInternalW above.
// See Proc_CreateProcessInternalW above.
//
if (! CommandLine)
@ -1923,7 +1923,7 @@ _FX NTSTATUS Proc_RtlCreateProcessParametersEx(
{
//
// on Windows Vista and later we can extract the image path from
// the invocation of RtlCreateProcessParametersEx. it is invoked
// the invocation of RtlCreateProcessParametersEx. It is invoked
// before a new process object is created
//
@ -2241,8 +2241,6 @@ _FX BOOLEAN Proc_CheckMailer(const WCHAR *ImagePath, BOOLEAN IsBoxedPath)
// ignore rundll32.exe, because Windows Live Mail sets
// it as the default mail program.
//
// ignore opera.exe, because Opera may only be used for
// browsing and not email
//
// ignore other common browsers
//
@ -2485,7 +2483,7 @@ _FX BOOLEAN Proc_Init_AdvPack(HMODULE module)
// the Protected Mode ActiveX Installation Broker
// but this means that an ActiveX installation which involves running
// an EXE file may not elevate correctly.
// so we hook RunSetupCommand to force elevation.
// So we hook RunSetupCommand to force elevation.
//
extern BOOLEAN Secure_IsInternetExplorerTabProcess;

View File

@ -484,7 +484,7 @@ _FX void *Token_FilterPrimary(PROCESS *proc, void *ProcessObject)
DropRights = (proc->drop_rights ? -1 : 0);
//
// special allowance for MSIServer - does not seam to be needed with the CreateWaitableTimerW hook
// special allowance for MSIServer - it does not seem to be needed with the CreateWaitableTimerW hook
//
//if (DropRights && !proc->image_from_box && _wcsicmp(proc->image_name, L"msiexec.exe") == 0
// && Conf_Get_Boolean(proc->box->name, L"MsiInstallerExemptions", 0, FALSE))

View File

@ -219,8 +219,8 @@ MSG_HEADER *EpMapperServer::EpmapperGetPortNameHandler(MSG_HEADER *msg)
if (rpl->h.status == STATUS_SUCCESS)
{
//
// Note: it seams that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from an other
// so since here we only open non critical ports we will use PID 0 to open them globally
// Note: it seems that chrome.exe resolves GAME_CONFIG_STORE_PORT in one process and accesses from another.
// So, since here we only open non critical ports, we will use PID 0 to open them globally
// instead of only for the one process. Todo: make it per sandbox instead
//

View File

@ -3451,7 +3451,7 @@ ULONG GuiServer::GetRawInputDeviceInfoSlave(SlaveArgs *args)
rpl->cbSize = req->cbSize;
if (pcbSize && req->hasData)
{
// Note: pcbSize seams to be in tchars not in bytes!
// Note: pcbSize seems to be in tchars not in bytes!
ULONG lenData = (*pcbSize) * (req->unicode ? sizeof(WCHAR) : 1);
rpl->hasData = TRUE;

View File

@ -211,7 +211,7 @@
<item row="6" column="2" colspan="6">
<widget class="QCheckBox" name="chkFakeElevation">
<property name="text">
<string>Make applications think thay are running elevated (allows to run installers safely)</string>
<string>Make applications think they are running elevated (allows to run installers safely)</string>
</property>
</widget>
</item>
@ -896,7 +896,7 @@
<item row="1" column="0" colspan="2">
<widget class="QLabel" name="label">
<property name="text">
<string>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</string>
<string>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</string>
</property>
<property name="wordWrap">
<bool>true</bool>
@ -1409,7 +1409,7 @@ For files access you can use 'Direct All' instead to make it apply to all progra
<item row="2" column="0" colspan="2">
<widget class="QCheckBox" name="chkAutoRecovery">
<property name="text">
<string>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</string>
<string>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</string>
</property>
</widget>
</item>

View File

@ -2044,7 +2044,7 @@ Vollständiger Pfad: %4</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation>Lässt Programme denken, sie würden mit erhöhten Rechten laufen (Erlaubt das sichere Ausführen von Installern)</translation>
</message>
<message>
@ -2136,7 +2136,7 @@ Vollständiger Pfad: %4</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="899"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>Programme die hier gelistet sind oder von den angegeben Ordnern gestartet werden, werden automatisch in dieser Sandbox ausgeführt, solange sie nicht explizit in einer anderen Sandbox gestartet werden.</translation>
</message>
<message>
@ -2367,7 +2367,7 @@ Zum Dateizugriff können Sie &apos;Direkt Alle&apos; verwenden um für alle Prog
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1412"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<oldsource>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</oldsource>
<translation>Aktivere Sofortwiederherstellungsabfrage, um alle Dateien sofort wiederherzustellen, sobald sie erzeugt werden.</translation>
</message>

View File

@ -1929,7 +1929,7 @@ Full path: %4</oldsource>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation type="unfinished"></translation>
</message>
<message>
@ -2177,7 +2177,7 @@ Full path: %4</oldsource>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="899"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation type="unfinished"></translation>
</message>
<message>
@ -2344,7 +2344,7 @@ For files access you can use &apos;Direct All&apos; instead to make it apply to
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1412"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -1944,7 +1944,7 @@ Percorso completo: %4</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation>Fai credere alle applicazioni di avviarsi con privilegi elevati (esegue gli installer in modo sicuro)</translation>
</message>
<message>
@ -2192,7 +2192,7 @@ Percorso completo: %4</translation>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="899"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>I seguenti programmi, o i programmi avviati dai seguenti percorsi, verranno avviati automaticamente in quest&apos;area virtuale.</translation>
</message>
<message>
@ -2364,7 +2364,7 @@ Per accedere ai file, è possibile utilizzare l&apos;accesso &apos;Completo&apos
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1412"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>Attiva notifica di Recupero immediato dei file, non appena questi vengono creati.</translation>
</message>
<message>

View File

@ -2077,7 +2077,7 @@ Full path: %4</oldsource>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation type="unfinished"></translation>
</message>
<message>
@ -2202,7 +2202,7 @@ Full path: %4</oldsource>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="899"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>To podane programy lob programy wystartowane z to podanych ścieżek będą automatycznie umieszczone w tej piaskownicy, chyba że specjalnie umieszczone w innej.</translation>
</message>
<message>
@ -2373,7 +2373,7 @@ Bezpośredni dostęp do plików i kluczy działa tylko z programami umieszczonyc
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1412"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>Aktywuj bezzwłoczne odtwarzanie plików jak tylko zostaną zapisane.</translation>
</message>
<message>

View File

@ -2243,7 +2243,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation type="unfinished"></translation>
</message>
<message>
@ -2335,7 +2335,7 @@ Faça o download da versão mais recente e configure-a em sandboxie.ini conforme
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="899"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>Programas inseridos aqui, ou iniciados a partir de locais inseridos, serão colocados nessa caixa automaticamente, a menos que seja explicitamente iniciado em outra caixa de areia.</translation>
</message>
<message>
@ -2566,7 +2566,7 @@ Para acesso a arquivos, você pode usar o &apos;Direct All&apos; em vez de fazê
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1412"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>Ativar mensagem de recuperação imediata para poder recuperar arquivos assim que for criado.</translation>
</message>
<message>

View File

@ -1600,7 +1600,7 @@ If leader processes are defined, all others are treated as lingering processes.<
<translation>Разрешить запуск всех программ в этой песочнице.</translation>
</message>
<message>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>Включить запрос немедленного восстановления, чтобы иметь возможность восстанавливать файлы сразу после их создания.</translation>
</message>
<message>
@ -1818,7 +1818,7 @@ instead of &quot;*&quot;.</source>
<translation>Добавить пользователя</translation>
</message>
<message>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>Введенные здесь программы, или программы запущенные из указанных мест, будут автоматически помещены в эту песочницу, если они явно не запущены в другой песочнице.</translation>
</message>
<message>
@ -2031,7 +2031,7 @@ Note: Forced Programs and Force Folders settings for a sandbox do not apply to
<translation>Ограничения повышение уровня</translation>
</message>
<message>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation>Заставить приложения думать, что они работают с повышенными правами (позволяет безопасно запускать установщики)</translation>
</message>
<message>

View File

@ -1624,7 +1624,7 @@ If leader processes are defined, all others are treated as lingering processes.<
<translation>Tüm programların bu kutuda başlamasına izin ver.</translation>
</message>
<message>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>Dosyaları oluşturulur oluşturulmaz kurtarabilmek için Anında Kurtarma istemini etkinleştir.</translation>
</message>
<message>
@ -1846,7 +1846,7 @@ Bu seçenekler olay maskesini &quot;*&quot; olarak ayarlar - Tüm erişim olayla
<translation>Kullanıcı Ekle</translation>
</message>
<message>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>Buraya girilen programlar veya girilen konumlardan başlatılan programlar, başka bir korumalı kutuda ıkça belirtilmedikçe otomatik olarak bu kutuya yerleştirilecektir.</translation>
</message>
<message>
@ -2071,7 +2071,7 @@ Not: Bir korumalı kutuya ilişkin Zorlanmış Programlar ve Zorlanmış Dizinle
<translation type="unfinished"></translation>
</message>
<message>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation type="unfinished"></translation>
</message>
<message>

View File

@ -2020,7 +2020,7 @@ Full path: %4</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="214"/>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation>使 ()</translation>
</message>
<message>
@ -2264,7 +2264,7 @@ Full path: %4</source>
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="892"/>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation>,,,</translation>
</message>
<message>
@ -2436,7 +2436,7 @@ For files access you can use &apos;Direct All&apos; instead to make it apply to
</message>
<message>
<location filename="Forms/OptionsWindow.ui" line="1405"/>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>便</translation>
</message>
<message>

View File

@ -1691,7 +1691,7 @@ If leader processes are defined, all others are treated as lingering processes.<
<translation></translation>
</message>
<message>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as thay are created.</source>
<source>Enable Immediate Recovery prompt to be able to recover files as soon as they are created.</source>
<translation>便</translation>
</message>
<message>
@ -1899,7 +1899,7 @@ If leader processes are defined, all others are treated as lingering processes.<
<translation>使</translation>
</message>
<message>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless thay are explicitly started in another sandbox.</source>
<source>Programs entered here, or programs started from entered locations, will be put in this sandbox automatically, unless they are explicitly started in another sandbox.</source>
<translation></translation>
</message>
<message>
@ -2125,7 +2125,7 @@ instead of &quot;*&quot;.</source>
<translation></translation>
</message>
<message>
<source>Make applications think thay are running elevated (allows to run installers safely)</source>
<source>Make applications think they are running elevated (allows to run installers safely)</source>
<translation>使</translation>
</message>
<message>