This commit is contained in:
DavidXanatos 2022-08-20 18:14:31 +02:00
parent 6592d9fdae
commit 2417b544cb
6 changed files with 34 additions and 3 deletions

View File

@ -10,6 +10,13 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- added icons to sub tabs in the box option dialog
- no recovery and no message popup menu options are now persisted across ui restarts
### Changed
- sandboxie no longer issues message 1301 when forced processes has been temporary disabled
-- the message can be re enabled with "NotifyForceProcessDisabled=y"
### Fixed
- fixed compatybility issue with Proxyfier [#2163](https://github.com/sandboxie-plus/Sandboxie/issues/2163)

View File

@ -287,6 +287,9 @@ _FX LONG my_RegQueryValueExW(
_FX BOOL Start_WinSock(void)
{
if (SbieDll_IsDllSkipHook(L"ws2_32.dll"))
return TRUE;
WORD wVersionRequested;
WSADATA wsaData;
BOOL hook_success = TRUE;

View File

@ -1290,7 +1290,7 @@ _FX NTSTATUS Ldr_NtLoadDriver(UNICODE_STRING *RegistryPath)
//---------------------------------------------------------------------------
void Ldr_LoadSkipList()
_FX void Ldr_LoadSkipList()
{
WCHAR buf[128];
ULONG index = 0;
@ -1310,4 +1310,22 @@ void Ldr_LoadSkipList()
else if (status != STATUS_BUFFER_TOO_SMALL)
break;
}
}
}
//---------------------------------------------------------------------------
// SbieDll_IsDllSkipHook
//---------------------------------------------------------------------------
_FX BOOLEAN SbieDll_IsDllSkipHook(const WCHAR* ImageName)
{
DLL *dll = Ldr_Dlls;
while (dll->nameW) {
if (_wcsicmp(ImageName, dll->nameW) == 0)
return (dll->state & 2) != 0;
++dll;
}
return FALSE;
}

View File

@ -202,6 +202,8 @@ SBIEDLL_EXPORT void SbieDll_DisableElevationHook(void);
SBIEDLL_EXPORT BOOLEAN SbieDll_RegisterDllCallback(void *Callback);
SBIEDLL_EXPORT BOOLEAN SbieDll_IsDllSkipHook(const WCHAR* ImageName);
SBIEDLL_EXPORT BOOLEAN SbieDll_ExpandAndRunProgram(const WCHAR *Command);

View File

@ -315,7 +315,7 @@ _FX BOX *Process_GetForcedStartBox(
box = (BOX *)-1;
}
else
else if ((force_alert == 1) && Conf_Get_Boolean(NULL, L"NotifyForceProcessDisabled", 0, FALSE))
{
Log_Msg_Process(MSG_1301, ImageName, NULL, SessionId, ProcessId);
}

View File

@ -2276,6 +2276,7 @@ OpenWinClass=Proxifier32Cls
OpenWinClass=$:proxifier.exe/IgnoreUIPI
OpenIpcPath=*\BaseNamedObjects*\Proxifier*
OpenPipePath=\Device\NamedPipe\proxifier
DllSkipHook=ws2_32.dll
[Template_ProxyCap]
Tmpl.Title=ProxyCap