1.3.2
This commit is contained in:
parent
6592d9fdae
commit
2417b544cb
|
@ -10,6 +10,13 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
- added icons to sub tabs in the box option dialog
|
||||
- no recovery and no message popup menu options are now persisted across ui restarts
|
||||
|
||||
### Changed
|
||||
- sandboxie no longer issues message 1301 when forced processes has been temporary disabled
|
||||
-- the message can be re enabled with "NotifyForceProcessDisabled=y"
|
||||
|
||||
### Fixed
|
||||
- fixed compatybility issue with Proxyfier [#2163](https://github.com/sandboxie-plus/Sandboxie/issues/2163)
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -287,6 +287,9 @@ _FX LONG my_RegQueryValueExW(
|
|||
|
||||
_FX BOOL Start_WinSock(void)
|
||||
{
|
||||
if (SbieDll_IsDllSkipHook(L"ws2_32.dll"))
|
||||
return TRUE;
|
||||
|
||||
WORD wVersionRequested;
|
||||
WSADATA wsaData;
|
||||
BOOL hook_success = TRUE;
|
||||
|
|
|
@ -1290,7 +1290,7 @@ _FX NTSTATUS Ldr_NtLoadDriver(UNICODE_STRING *RegistryPath)
|
|||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
void Ldr_LoadSkipList()
|
||||
_FX void Ldr_LoadSkipList()
|
||||
{
|
||||
WCHAR buf[128];
|
||||
ULONG index = 0;
|
||||
|
@ -1310,4 +1310,22 @@ void Ldr_LoadSkipList()
|
|||
else if (status != STATUS_BUFFER_TOO_SMALL)
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
//---------------------------------------------------------------------------
|
||||
// SbieDll_IsDllSkipHook
|
||||
//---------------------------------------------------------------------------
|
||||
|
||||
|
||||
_FX BOOLEAN SbieDll_IsDllSkipHook(const WCHAR* ImageName)
|
||||
{
|
||||
DLL *dll = Ldr_Dlls;
|
||||
while (dll->nameW) {
|
||||
if (_wcsicmp(ImageName, dll->nameW) == 0)
|
||||
return (dll->state & 2) != 0;
|
||||
++dll;
|
||||
}
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
|
|
@ -202,6 +202,8 @@ SBIEDLL_EXPORT void SbieDll_DisableElevationHook(void);
|
|||
|
||||
SBIEDLL_EXPORT BOOLEAN SbieDll_RegisterDllCallback(void *Callback);
|
||||
|
||||
SBIEDLL_EXPORT BOOLEAN SbieDll_IsDllSkipHook(const WCHAR* ImageName);
|
||||
|
||||
SBIEDLL_EXPORT BOOLEAN SbieDll_ExpandAndRunProgram(const WCHAR *Command);
|
||||
|
||||
|
||||
|
|
|
@ -315,7 +315,7 @@ _FX BOX *Process_GetForcedStartBox(
|
|||
|
||||
box = (BOX *)-1;
|
||||
}
|
||||
else
|
||||
else if ((force_alert == 1) && Conf_Get_Boolean(NULL, L"NotifyForceProcessDisabled", 0, FALSE))
|
||||
{
|
||||
Log_Msg_Process(MSG_1301, ImageName, NULL, SessionId, ProcessId);
|
||||
}
|
||||
|
|
|
@ -2276,6 +2276,7 @@ OpenWinClass=Proxifier32Cls
|
|||
OpenWinClass=$:proxifier.exe/IgnoreUIPI
|
||||
OpenIpcPath=*\BaseNamedObjects*\Proxifier*
|
||||
OpenPipePath=\Device\NamedPipe\proxifier
|
||||
DllSkipHook=ws2_32.dll
|
||||
|
||||
[Template_ProxyCap]
|
||||
Tmpl.Title=ProxyCap
|
||||
|
|
Loading…
Reference in New Issue