-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
e3b7ca8
commit 33599a0
Showing
4 changed files
with
66 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
15 changes: 15 additions & 0 deletions
15
SandboxiePlus/SandMan/Troubleshooting/Sandboxing/SBIEMSG/SBIE2204.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
/* | ||
* group: other | ||
* class: sandboxing | ||
* name: SBIE2204: Cannot start a specific sandboxed service | ||
* description: Sandboxie failed to start a service in the sandbox | ||
* | ||
*/ | ||
|
||
if(msgData[0] == "DcomLaunch (346)") | ||
{ | ||
invoke("SBIEFIXPC"); | ||
try_fix_PC_SRP(); | ||
} | ||
else | ||
wizard.showStatus(tr('The message indicates that Sandboxie was unable to start one of the helper programs SandboxieRpcSs or SandboxieDcomLaunch. The name noted in the message can be rpcss or dcomlaunch.\n\nYou can submit an issue report on the next page to help us to analyze the issue.'), true); |
15 changes: 15 additions & 0 deletions
15
SandboxiePlus/SandMan/Troubleshooting/Sandboxing/SBIEMSG/SBIE2313.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
/* | ||
* group: other | ||
* class: sandboxing | ||
* name: SBIE2313 Could not execute specific process | ||
* description: Sandboxie failed to start a process in the sandbox | ||
* | ||
*/ | ||
|
||
if(msgData[0] == "SandboxieDcomLaunch.exe (346)") | ||
{ | ||
invoke("SBIEFIXPC"); | ||
try_fix_PC_SRP(); | ||
} | ||
else | ||
wizard.showStatus(tr('Sandboxie was not able to execute one of its own programs. Check access permissions to the Sandboxie installation folder and/or reinstall Sandboxie.\n\nPossible Causes:\n1. Sandboxie was configured to block access to the folder containing its program files.\n2. A third-party (HIPS) security software was configured to block the execution of the program mentioned in the message.\n\nYou can submit an issue report on the next page to help us to analyze the issue.'), true); |
35 changes: 35 additions & 0 deletions
35
SandboxiePlus/SandMan/Troubleshooting/Sandboxing/SBIEMSG/SBIEFIXPC.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
/* | ||
* group: library | ||
* class: sandboxing | ||
* name: fix parental controls breaking sandboxie | ||
* description: stops AppId driver and AppIdSvc service and disables the offending policy file | ||
* | ||
*/ | ||
|
||
function try_fix_PC_SRP() | ||
{ | ||
let form = [ | ||
{id: 'stop', name: 'Stop AppIdSvc service and AppId driver (temporary fix)', type: 'radio'}, | ||
{id: 'disable', name: 'Disable Parental Control Policy', type: 'radio'}, | ||
{id: 'failed', name: 'The above mitigations did not work', type: 'radio'}, | ||
]; | ||
let obj = wizard.showForm(form, tr('It seams you are using a non administrative user account on a system with enabled parental controls, this is a known to be incomatible with sandboxie.\nYou have the following options to resolve the issue.')); | ||
|
||
//_debugger(); | ||
|
||
if(obj.failed){ | ||
wizard.setResult(false, 'Available mitigations failed'); | ||
return; | ||
} | ||
|
||
let command = '/c net stop AppIdSvc & net stop AppId'; | ||
if(obj.disable) | ||
command += ' & move %systemroot%\\system32\\AppLocker\\Plugin.133422605925491691.Policy %systemroot%\\system32\\AppLocker\\Disabled__Plugin.133422605925491691.Policy__' | ||
|
||
let ret = system.execute('cmd.exe', command, {elevate: true}); | ||
|
||
if(ret.error) | ||
wizard.setResult(false, 'Failed to execute recured command: ' + ret.error); | ||
else | ||
wizard.setResult(true); | ||
} |