HAL plugin problem with sandboxed apps
HAL plugin problem with sandboxed apps
- Subject: HAL plugin problem with sandboxed apps
- From: Kieran Tyrrell <email@hidden>
- Date: Thu, 09 Aug 2012 15:49:17 +0200
Hi,
When I try to open our HAL plugin from a sandboxed app in Mountain Lion (QuicktimePlayer for example), I get sandboxd denials because our HAL plugin tries to access the bootstrap port for inter-process semaphore sharing. The error in the console log looks like:
09/08/2012 15:26:04.745 sandboxd[1492]: ([1485]) QuickTime Player(1485) deny mach-lookup com.sienda.domesem
I've tried adding a com.apple.security.temporary-exception.mach-lookup.global-name to the HAL plugin's plist, but this didn't change anything.
My questions:
- Is there any way I can add security exceptions to the HAL plug so that clients which load the HAL plug 'inherit' those exceptions? (can a plugin even be 'sandboxed' and have exceptions?)
- Is there any new method of sharing mach semaphores since 10.7 which would get around this problem?
I'll continue to investigate and report back if I find a solution, but I thought I'd ask here as I know there are other drivers out there that use the bootstrap port for this purpose.
Thanks!
Kieran.
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Coreaudio-api mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden