remove bogus check for logonui.exe. it was causing false-positives for the need to elevate
This commit is contained in:
parent
a600801319
commit
3389a980ea
|
@ -142,10 +142,7 @@ MSWindowsWatchdog::getUserToken(LPSECURITY_ATTRIBUTES security)
|
||||||
// elevate for the uac dialog (consent.exe) but this would be pointless,
|
// elevate for the uac dialog (consent.exe) but this would be pointless,
|
||||||
// since barrier would re-launch as non-elevated after the desk switch,
|
// since barrier would re-launch as non-elevated after the desk switch,
|
||||||
// and so would be unusable with the new elevated process taking focus.
|
// and so would be unusable with the new elevated process taking focus.
|
||||||
if (m_elevateProcess
|
if (m_elevateProcess || m_autoElevated) {
|
||||||
|| m_autoElevated
|
|
||||||
|| m_session.isProcessInSession("logonui.exe", NULL)) {
|
|
||||||
|
|
||||||
LOG((CLOG_DEBUG "getting elevated token, %s",
|
LOG((CLOG_DEBUG "getting elevated token, %s",
|
||||||
(m_elevateProcess ? "elevation required" : "at login screen")));
|
(m_elevateProcess ? "elevation required" : "at login screen")));
|
||||||
|
|
||||||
|
@ -155,8 +152,7 @@ MSWindowsWatchdog::getUserToken(LPSECURITY_ATTRIBUTES security)
|
||||||
}
|
}
|
||||||
|
|
||||||
return duplicateProcessToken(process, security);
|
return duplicateProcessToken(process, security);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
LOG((CLOG_DEBUG "getting non-elevated token"));
|
LOG((CLOG_DEBUG "getting non-elevated token"));
|
||||||
return m_session.getUserToken(security);
|
return m_session.getUserToken(security);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue