Since osx 10.11 dp5 (15A235d) it’s now not possible to disable rootless security by using boot argument rootless=0.
you now have to boot into osx recovery and disable system integrity protection from security settings there.
What’s this mean for hacks? you need rootless for initial boot to load fakesmc as far as I know.
Clover r3250 adds support for a config.plist setting called CsrActiveConfig that will set the same NVRAM variable as the utility in the recovery partition OS.
So has anybody had a look at how the tool on the recovery partition disables rootless mode?
Ah good job on that Asgorath. So it basically fakes being a recovery boot so it can set the flag if it’s not set. Does it require additional config to do so or is it automated. you boot with that clover version or later, it detects it’s not set, it sets it, continues boot as normal?
Check the CsrActiveConfig key in the RtVariables section of the sample plist:
If you set that in your config.plist, Clover will set the NVRAM key if needed.
will not be shown )