An extension of 3985b7c5. Opening the device for the Touch Bar on
older MacBooks also triggers a permission prompt, so for now it makes
sense to restrict the devices open.
--
v2: winebus.sys: Only attempt to open joysticks and gamepads in the IOHID backend.
https://gitlab.winehq.org/wine/wine/-/merge_requests/5208
Split from https://gitlab.winehq.org/wine/wine/-/merge_requests/5137
--
v2: win32u: Introduce and use new reg_(open|create)_ascii_key helpers.
win32u: Use set_reg_ascii_value whenever possible.
win32u: Remove unnecessary class_guidW double check.
win32u: Use REG_SZ instead of REG_BINARY for some adapter keys.
win32u: Remove unused wine_devpropkey_monitor_adapternameW property.
win32u: Simplify adapter key path creation from gpu_guid.
win32u: Use char array for the device manager context gpuid.
https://gitlab.winehq.org/wine/wine/-/merge_requests/5174
Wine currently runs all processes with an elevated administrator token. As
described in bug 40613, some applications refuse to be run with such a token.
This patch set addresses the situation by creating all processes with an
unelevated adminstrator token by default. When a process attempts to elevate
itself through one of several mechanisms—which would show a UAC prompt on
Windows—we instead silently elevate the process, as if the user had granted
access through the UAC prompt.
This works for almost all applications. I have found only one application which
didn't get the memo, and actually asks the user to right click and run as
administrator, namely PaintTool SAI. Fortunately, 063a377df4f, combined with the
shell32 patch in this series, allows a Wine user to elevate that process by
opening explorer.exe, right-clicking, and selecting Run as Administrator, just
like on Windows.
This patch series has been in Wine-Staging for about three years. This was
partly to try to find and fix all the different creative ways that applications
tried to elevate themselves, but mostly because I needed to find a solution for
PaintTool SAI, and never quite got the time to implement run-as-administrator in
shell32.
EDIT: Now only includes the patches elevating processes through specific methods (runas, msi).
--
v3:
https://gitlab.winehq.org/wine/wine/-/merge_requests/5118