Post

Replies

Boosts

Views

Activity

Reply to I requested "DirverKit UserClient Access" Entitlement, But I Distribute App failed.
Hi Kevin, We're hitting the exact same malformed encoding on our team (MZR5GHAQX4 / Lumasoft LLC) and would appreciate the same kind of manual fix. The DriverKit UserClient Access capability was granted on case CC3TUTNMR7 on 2026-05-05. The malformed array reproduces today (2026-05-10) on freshly regenerated provisioning profiles — single 77-character string with an embedded \n at offset 38: 'co.lumasoft.lumabooth.dnpprinterdriver\nco.lumasoft.lumashare.dnpprinterdriver' array.count == 1, type == str. Affected App IDs (the host-side ones — the DEXTs use allow-any-userclient-access and don't need this list): co.lumasoft.lumabooth co.lumasoft.dnpdriverhost co.lumasoft.lumashare The intended values (separate array entries): co.lumasoft.lumabooth.dnpprinterdriver co.lumasoft.lumashare.dnpprinterdriver Runtime consequence: IOServiceOpen() from the host returns kIOReturnNotPermitted (-536870174) because no valid bundle ID can match the malformed entry. The DEXT itself matches IOUSBHostInterface, opens it, and copies bulk pipes correctly — failure is strictly at the kernel-side host entitlement check. Confirmed not bypassable by running as root. Tier-1 support case 102887359854 was deflected to the forums, so following that direction here. Would you be able to re-enter the array on the affected App IDs the same way you did for the OP? Happy to provide our decoded profile or security cms -D -i output by DM / radar if helpful. Also filed Feedback Assistant feedback for the portal-side encoding so a permanent fix can land downstream. Thanks
Topic: App & System Services SubTopic: Drivers Tags:
2d
Reply to I requested "DirverKit UserClient Access" Entitlement, But I Distribute App failed.
Hi Kevin, We're hitting the exact same malformed encoding on our team (MZR5GHAQX4 / Lumasoft LLC) and would appreciate the same kind of manual fix. The DriverKit UserClient Access capability was granted on case CC3TUTNMR7 on 2026-05-05. The malformed array reproduces today (2026-05-10) on freshly regenerated provisioning profiles — single 77-character string with an embedded \n at offset 38: 'co.lumasoft.lumabooth.dnpprinterdriver\nco.lumasoft.lumashare.dnpprinterdriver' array.count == 1, type == str. Affected App IDs (the host-side ones — the DEXTs use allow-any-userclient-access and don't need this list): co.lumasoft.lumabooth co.lumasoft.dnpdriverhost co.lumasoft.lumashare The intended values (separate array entries): co.lumasoft.lumabooth.dnpprinterdriver co.lumasoft.lumashare.dnpprinterdriver Runtime consequence: IOServiceOpen() from the host returns kIOReturnNotPermitted (-536870174) because no valid bundle ID can match the malformed entry. The DEXT itself matches IOUSBHostInterface, opens it, and copies bulk pipes correctly — failure is strictly at the kernel-side host entitlement check. Confirmed not bypassable by running as root. Tier-1 support case 102887359854 was deflected to the forums, so following that direction here. Would you be able to re-enter the array on the affected App IDs the same way you did for the OP? Happy to provide our decoded profile or security cms -D -i output by DM / radar if helpful. Also filed Feedback Assistant feedback for the portal-side encoding so a permanent fix can land downstream. Thanks
Topic: App & System Services SubTopic: Drivers Tags:
Replies
Boosts
Views
Activity
2d