apple-data 1.0.419 → 1.0.423
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/apple_data/version.rb +1 -1
- data/share/4cc.yaml +2 -2
- data/share/backup.yaml +33 -33
- data/share/boot_args.yaml +1 -0
- data/share/bridgeos.yaml +108 -108
- data/share/bundles.yaml +1 -1
- data/share/dnssd.yaml +127 -126
- data/share/environment_variables.yaml +115 -65
- data/share/fdr.yaml +29 -30
- data/share/firmware.yaml +1308 -0
- data/share/img4.yaml +3 -5
- data/share/ioreg.yaml +3 -1
- data/share/kext.yaml +173 -173
- data/share/keybags/8001.yaml +9824 -22159
- data/share/keybags/8010.yaml +7 -2
- data/share/keybags/8011.yaml +7 -2
- data/share/keybags/8015.yaml +7 -2
- data/share/keybags/8020.yaml +9 -4
- data/share/keybags/8027.yaml +8 -4
- data/share/keybags/8030.yaml +9 -5
- data/share/keybags/8101.yaml +8 -4
- data/share/lightning.yaml +24 -22
- data/share/lockdownd.yaml +13 -13
- data/share/mach_o.yaml +201 -172
- data/share/nvram.yaml +2 -2
- data/share/pmu.yaml +20 -23
- data/share/services.yaml +9 -9
- data/share/sip.yaml +40 -37
- data/share/tipw_sync.yaml +79103 -0
- metadata +3 -5
- data/share/keybags/6000.yaml +0 -2
- data/share/keybags/8103.yaml +0 -16
- data/share/keybags/8110.yaml +0 -10
- data/share/tipw_mappings.yaml +0 -49
data/share/sip.yaml
CHANGED
@@ -3,59 +3,62 @@ metadata:
|
|
3
3
|
description:
|
4
4
|
credits:
|
5
5
|
csr_process_capabilities:
|
6
|
-
CSR_CAPABILITY_UNLIMITED:
|
7
|
-
value: 1
|
8
|
-
description: process is not restricted by SIP and may bypass
|
9
|
-
CSR_CAPABILITY_CONFIG:
|
10
|
-
value: 2
|
11
|
-
descrption:
|
12
6
|
CSR_CAPABILITY_APPLE_INTERNAL:
|
13
7
|
value: 4
|
14
8
|
description:
|
15
|
-
|
16
|
-
|
9
|
+
CSR_CAPABILITY_CONFIG:
|
10
|
+
value: 2
|
11
|
+
descrption:
|
12
|
+
CSR_CAPABILITY_UNLIMITED:
|
17
13
|
value: 1
|
18
|
-
description:
|
14
|
+
description: process is not restricted by SIP and may bypass
|
15
|
+
csr_flags:
|
16
|
+
CSR_ALLOW_ANY_RECOVERY_OS:
|
17
|
+
value: 256
|
18
|
+
description: disable validation of BaseSystem.dmg by ignoring BaseSystem.chunklist
|
19
|
+
always_enforced: true
|
20
|
+
CSR_ALLOW_APPLE_INTERNAL:
|
21
|
+
value: 16
|
22
|
+
description:
|
19
23
|
disable_default: true
|
20
|
-
|
21
|
-
value:
|
22
|
-
description:
|
24
|
+
CSR_ALLOW_DEVICE_CONFIGURATION:
|
25
|
+
value: 128
|
26
|
+
description:
|
27
|
+
always_enforced: true
|
28
|
+
CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE:
|
29
|
+
value: 1024
|
30
|
+
description: override spctl or executable policy
|
31
|
+
CSR_ALLOW_KERNEL_DEBUGGER:
|
32
|
+
value: 8
|
33
|
+
description: allow using the kernel debugger (KDP) - requires configuring the
|
34
|
+
kernel debugger via boot-args
|
23
35
|
disable_default: true
|
24
36
|
CSR_ALLOW_TASK_FOR_PID:
|
25
37
|
value: 4
|
26
38
|
description: allow getting the pid task, required for debugging
|
27
39
|
disable_default: true
|
28
|
-
|
29
|
-
value:
|
30
|
-
description:
|
31
|
-
|
32
|
-
|
33
|
-
value: 16
|
40
|
+
CSR_ALLOW_UNAPPROVED_KEXTS:
|
41
|
+
value: 512
|
42
|
+
description: do not require kext approval (managed in the T2 when it exists)
|
43
|
+
CSR_ALLOW_UNAUTHENTICATED_ROOT:
|
44
|
+
value: 2048
|
34
45
|
description:
|
35
|
-
disable_default: true
|
36
46
|
CSR_ALLOW_UNRESTRICTED_DTRACE:
|
37
|
-
aliases:
|
47
|
+
aliases:
|
48
|
+
- CSR_ALLOW_DESTRUCTIVE_DTRACE
|
38
49
|
value: 32
|
39
50
|
description:
|
40
51
|
disable_default: true
|
52
|
+
CSR_ALLOW_UNRESTRICTED_FS:
|
53
|
+
value: 2
|
54
|
+
description: disable SIP protections of various paths (such as write protection
|
55
|
+
of /System)
|
56
|
+
disable_default: true
|
41
57
|
CSR_ALLOW_UNRESTRICTED_NVRAM:
|
42
58
|
value: 64
|
43
59
|
description: disable restrictions to writing to restricted NVRAM variables
|
44
60
|
disable_default: true
|
45
|
-
|
46
|
-
value:
|
47
|
-
description:
|
48
|
-
|
49
|
-
CSR_ALLOW_ANY_RECOVERY_OS:
|
50
|
-
value: 256
|
51
|
-
description: disable validation of BaseSystem.dmg by ignoring BaseSystem.chunklist
|
52
|
-
always_enforced: true
|
53
|
-
CSR_ALLOW_UNAPPROVED_KEXTS:
|
54
|
-
value: 512
|
55
|
-
description: do not require kext approval (managed in the T2 when it exists)
|
56
|
-
CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE:
|
57
|
-
value: 1024
|
58
|
-
description: override spctl or executable policy
|
59
|
-
CSR_ALLOW_UNAUTHENTICATED_ROOT:
|
60
|
-
value: 2048
|
61
|
-
description:
|
61
|
+
CSR_ALLOW_UNTRUSTED_KEXTS:
|
62
|
+
value: 1
|
63
|
+
description: allow loading kernel extensions that are not signed
|
64
|
+
disable_default: true
|