Hey:
I've grepped through Apple Documentations and found no hint about how to boot my macOS VM into 1TR to disable SIP and whatnot in a Virtualized macOS with Apple Silicon's Virtualization.framework.
Any hint on how to implement this feature?
Hey:
I've grepped through Apple Documentations and found no hint about how to boot my macOS VM into 1TR to disable SIP and whatnot in a Virtualized macOS with Apple Silicon's Virtualization.framework.
Any hint on how to implement this feature?
What is “1TR” in this context?
Share and Enjoy
—
Quinn “The Eskimo!” @ Developer Technical Support @ Apple
let myEmail = "eskimo" + "1" + "@" + "apple.com"
Basically, I'm hoping to disable EVERY SINGLE security feature in my Apple Silicon macOS VM, the most important ones are as following:
.....
I've tried to boot into recovery using private APIs in Apple Silicon's Virtualization.framework and executed the following:
csrutil disable
bputil -p -k -c -a -s
spctl --master-disable
spctl kext-consent disable
However when I switched back to macOS in the VM:
Customized (sip0): 7f
csrutil status
says disabled but I still can't write to /
Must reboot to use new extension
in User-Approved Kernel-Extension Loading