apple-data 1.0.419 → 1.0.423

Sign up to get free protection for your applications and to get access to all the features.
data/share/sip.yaml CHANGED
@@ -3,59 +3,62 @@ metadata:
3
3
  description:
4
4
  credits:
5
5
  csr_process_capabilities:
6
- CSR_CAPABILITY_UNLIMITED:
7
- value: 1
8
- description: process is not restricted by SIP and may bypass
9
- CSR_CAPABILITY_CONFIG:
10
- value: 2
11
- descrption:
12
6
  CSR_CAPABILITY_APPLE_INTERNAL:
13
7
  value: 4
14
8
  description:
15
- csr_flags:
16
- CSR_ALLOW_UNTRUSTED_KEXTS:
9
+ CSR_CAPABILITY_CONFIG:
10
+ value: 2
11
+ descrption:
12
+ CSR_CAPABILITY_UNLIMITED:
17
13
  value: 1
18
- description: allow loading kernel extensions that are not signed
14
+ description: process is not restricted by SIP and may bypass
15
+ csr_flags:
16
+ CSR_ALLOW_ANY_RECOVERY_OS:
17
+ value: 256
18
+ description: disable validation of BaseSystem.dmg by ignoring BaseSystem.chunklist
19
+ always_enforced: true
20
+ CSR_ALLOW_APPLE_INTERNAL:
21
+ value: 16
22
+ description:
19
23
  disable_default: true
20
- CSR_ALLOW_UNRESTRICTED_FS:
21
- value: 2
22
- description: disable SIP protections of various paths (such as write protection of /System)
24
+ CSR_ALLOW_DEVICE_CONFIGURATION:
25
+ value: 128
26
+ description:
27
+ always_enforced: true
28
+ CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE:
29
+ value: 1024
30
+ description: override spctl or executable policy
31
+ CSR_ALLOW_KERNEL_DEBUGGER:
32
+ value: 8
33
+ description: allow using the kernel debugger (KDP) - requires configuring the
34
+ kernel debugger via boot-args
23
35
  disable_default: true
24
36
  CSR_ALLOW_TASK_FOR_PID:
25
37
  value: 4
26
38
  description: allow getting the pid task, required for debugging
27
39
  disable_default: true
28
- CSR_ALLOW_KERNEL_DEBUGGER:
29
- value: 8
30
- description: allow using the kernel debugger (KDP) - requires configuring the kernel debugger via boot-args
31
- disable_default: true
32
- CSR_ALLOW_APPLE_INTERNAL:
33
- value: 16
40
+ CSR_ALLOW_UNAPPROVED_KEXTS:
41
+ value: 512
42
+ description: do not require kext approval (managed in the T2 when it exists)
43
+ CSR_ALLOW_UNAUTHENTICATED_ROOT:
44
+ value: 2048
34
45
  description:
35
- disable_default: true
36
46
  CSR_ALLOW_UNRESTRICTED_DTRACE:
37
- aliases: [ CSR_ALLOW_DESTRUCTIVE_DTRACE ]
47
+ aliases:
48
+ - CSR_ALLOW_DESTRUCTIVE_DTRACE
38
49
  value: 32
39
50
  description:
40
51
  disable_default: true
52
+ CSR_ALLOW_UNRESTRICTED_FS:
53
+ value: 2
54
+ description: disable SIP protections of various paths (such as write protection
55
+ of /System)
56
+ disable_default: true
41
57
  CSR_ALLOW_UNRESTRICTED_NVRAM:
42
58
  value: 64
43
59
  description: disable restrictions to writing to restricted NVRAM variables
44
60
  disable_default: true
45
- CSR_ALLOW_DEVICE_CONFIGURATION:
46
- value: 128
47
- description:
48
- always_enforced: true
49
- CSR_ALLOW_ANY_RECOVERY_OS:
50
- value: 256
51
- description: disable validation of BaseSystem.dmg by ignoring BaseSystem.chunklist
52
- always_enforced: true
53
- CSR_ALLOW_UNAPPROVED_KEXTS:
54
- value: 512
55
- description: do not require kext approval (managed in the T2 when it exists)
56
- CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE:
57
- value: 1024
58
- description: override spctl or executable policy
59
- CSR_ALLOW_UNAUTHENTICATED_ROOT:
60
- value: 2048
61
- description:
61
+ CSR_ALLOW_UNTRUSTED_KEXTS:
62
+ value: 1
63
+ description: allow loading kernel extensions that are not signed
64
+ disable_default: true