-
Notifications
You must be signed in to change notification settings - Fork 95
/
Copy pathIntel-FB-Patcher-tutorial-and-insertion-pose.html
317 lines (284 loc) · 90.5 KB
/
Intel-FB-Patcher-tutorial-and-insertion-pose.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
<!DOCTYPE html><html class="theme-next muse use-motion" lang="zh-CN"><head><meta name="generator" content="Hexo 3.8.0"><meta charset="UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=2"><meta name="theme-color" content="#222"><script src="//fastly.jsdelivr.net/npm/[email protected]/pace.min.js"></script><link href="/lib/pace/pace-theme-corner-indicator.min.css?v=1.0.2" rel="stylesheet"><meta name="google-site-verification" content="sDeZZSmv4NPbU3sXi1IL5l8PiZt1wVqR5EKUsxOjruY"><link href="https://fastly.jsdelivr.net/npm/@fancyapps/[email protected]/dist/jquery.fancybox.min.css" rel="stylesheet" type="text/css"><link href="//fonts.googleapis.com/css?family=Noto Serif SC:300,300italic,400,400italic,700,700italic|Noto Serif SC:300,300italic,400,400italic,700,700italic|Roboto Mono:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext" rel="stylesheet" type="text/css"><link href="//fastly.jsdelivr.net/npm/[email protected]/css/font-awesome.min.css" rel="stylesheet" type="text/css"><link href="/css/main.css?v=6.6.0" rel="stylesheet" type="text/css"><link rel="apple-touch-icon" sizes="180x180" href="/images/apple-touch-icon-next.png?v=6.6.0"><link rel="icon" type="image/png" sizes="32x32" href="/images/favicon.png?v=6.6.0"><link rel="icon" type="image/png" sizes="16x16" href="/images/favicon.png?v=6.6.0"><link rel="mask-icon" href="/images/logo.svg?v=6.6.0" color="#222"><script id="hexo.configurations">var NexT=window.NexT||{},CONFIG={root:"/",scheme:"Muse",version:"6.6.0",sidebar:{position:"left",display:"hide",offset:12,b2t:!1,scrollpercent:!0,onmobile:!0},fancybox:!0,fastclick:!1,lazyload:!1,tabs:!0,motion:{enable:!0,async:!1,transition:{post_block:"fadeIn",post_header:"slideDownIn",post_body:"slideDownIn",coll_header:"slideLeftIn",sidebar:"slideUpIn"}},algolia:{applicationID:"",apiKey:"",indexName:"",hits:{per_page:10},labels:{input_placeholder:"Search for Posts",hits_empty:"We didn't find any results for the search: ${query}",hits_stats:"${hits} results found in ${time} ms"}}}</script><meta name="description" content="警告Hackintool 不是一个让你无脑使用的自动化补丁工具。在使用它之前,你需要一定的知识储备. 请您务必在使用这个工具之前阅读 Intel Framebuffer patching using WhateverGreen(英文)! 和 Whatevergreen的中文官方文档。 功能支持 Sandy Bridge, Ivy Bridge, Haswell, Broadwell, Skyla"><meta name="keywords" content="教程,FB,patcher,framebuffer,帧缓冲,USB,audio,VRAM"><meta property="og:type" content="article"><meta property="og:title" content="Hackintool(原Intel FB-Patcher)使用教程及插入姿势"><meta property="og:url" content="https://blog.daliansky.net/Intel-FB-Patcher-tutorial-and-insertion-pose.html"><meta property="og:site_name" content="黑果小兵的部落阁"><meta property="og:description" content="警告Hackintool 不是一个让你无脑使用的自动化补丁工具。在使用它之前,你需要一定的知识储备. 请您务必在使用这个工具之前阅读 Intel Framebuffer patching using WhateverGreen(英文)! 和 Whatevergreen的中文官方文档。 功能支持 Sandy Bridge, Ivy Bridge, Haswell, Broadwell, Skyla"><meta property="og:locale" content="zh-CN"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/AudioPatch.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/AudioPatch2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Display1.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Display2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Tools.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBPatch.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBPatch2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOrigin.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBDEL.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBTest.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBFinal.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOutput.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOutput2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-Select.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-1.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-3.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-4.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-A.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-B.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-C.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Connectors-screen-shot/FB-Select.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Connectors-screen-shot/FB-Patch.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connectors-Before-Patch.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connector-Patches.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connectors-After-Patch.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-1.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-2.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-3.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-5.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-4.png"><meta property="og:image" content="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-6.png"><meta property="og:updated_time" content="2023-09-20T01:55:32.456Z"><meta name="twitter:card" content="summary"><meta name="twitter:title" content="Hackintool(原Intel FB-Patcher)使用教程及插入姿势"><meta name="twitter:description" content="警告Hackintool 不是一个让你无脑使用的自动化补丁工具。在使用它之前,你需要一定的知识储备. 请您务必在使用这个工具之前阅读 Intel Framebuffer patching using WhateverGreen(英文)! 和 Whatevergreen的中文官方文档。 功能支持 Sandy Bridge, Ivy Bridge, Haswell, Broadwell, Skyla"><meta name="twitter:image" content="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/AudioPatch.png"><link rel="alternate" href="/atom.xml" title="黑果小兵的部落阁" type="application/atom+xml"><link rel="canonical" href="https://blog.daliansky.net/Intel-FB-Patcher-tutorial-and-insertion-pose.html"><script id="page.configurations">CONFIG.page={sidebar:""}</script><title>Hackintool(原Intel FB-Patcher)使用教程及插入姿势 | 黑果小兵的部落阁</title><noscript><style>.sidebar-inner,.use-motion .brand,.use-motion .collection-title,.use-motion .comments,.use-motion .menu-item,.use-motion .motion-element,.use-motion .pagination,.use-motion .post-block,.use-motion .post-body,.use-motion .post-header{opacity:initial}.use-motion .logo,.use-motion .site-subtitle,.use-motion .site-title{opacity:initial;top:initial}.use-motion .logo-line-before i{left:initial}.use-motion .logo-line-after i{right:initial}</style></noscript></head><body itemscope itemtype="http://schema.org/WebPage" lang="zh-CN"><div class="container sidebar-position-left page-post-detail"><div class="headband"></div><header id="header" class="header" itemscope itemtype="http://schema.org/WPHeader"><div class="header-inner"><div class="site-brand-wrapper"><div class="site-meta"><div class="custom-logo-site-title"><a href="/" class="brand" rel="start"><span class="logo-line-before"><i></i></span> <span class="site-title">黑果小兵的部落阁</span> <span class="logo-line-after"><i></i></span></a></div><p class="site-subtitle">Hackintosh安装镜像、教程及经验分享</p></div><div class="site-nav-toggle"><button aria-label="切换导航栏"><span class="btn-bar"></span> <span class="btn-bar"></span> <span class="btn-bar"></span></button></div></div><nav class="site-nav"><ul id="menu" class="menu"><li class="menu-item menu-item-home"><a href="/" rel="section"><i class="menu-item-icon fa fa-fw fa-home"></i><br>首页</a></li><li class="menu-item menu-item-archives"><a href="/archives/" rel="section"><i class="menu-item-icon fa fa-fw fa-archive"></i><br>归档</a></li><li class="menu-item menu-item-categories"><a href="/categories/" rel="section"><i class="menu-item-icon fa fa-fw fa-th"></i><br>分类</a></li><li class="menu-item menu-item-tags"><a href="/tags/" rel="section"><i class="menu-item-icon fa fa-fw fa-tags"></i><br>标签</a></li><li class="menu-item menu-item-about"><a href="/about/" rel="section"><i class="menu-item-icon fa fa-fw fa-user"></i><br>关于</a></li><li class="menu-item menu-item-search"><a href="javascript:;" class="popup-trigger"><i class="menu-item-icon fa fa-search fa-fw"></i><br>搜索</a></li></ul><div class="site-search"><div class="popup search-popup local-search-popup"><div class="local-search-header clearfix"><span class="search-icon"><i class="fa fa-search"></i> </span><span class="popup-btn-close"><i class="fa fa-times-circle"></i></span><div class="local-search-input-wrapper"><input autocomplete="off" placeholder="搜索..." spellcheck="false" type="text" id="local-search-input"></div></div><div id="local-search-result"></div></div></div></nav></div></header><a href="https://github.com/daliansky" class="github-corner" title="Follow me on GitHub" aria-label="Follow me on GitHub" rel="noopener" target="_blank"><svg width="80" height="80" viewbox="0 0 250 250" style="fill:#222;color:#fff;position:absolute;top:0;border:0;right:0" aria-hidden="true"><path d="M0,0 L115,115 L130,115 L142,142 L250,250 L250,0 Z"/><path d="M128.3,109.0 C113.8,99.7 119.0,89.6 119.0,89.6 C122.0,82.7 120.5,78.6 120.5,78.6 C119.2,72.0 123.4,76.3 123.4,76.3 C127.3,80.9 125.5,87.3 125.5,87.3 C122.9,97.6 130.6,101.9 134.4,103.2" fill="currentColor" style="transform-origin:130px 106px" class="octo-arm"/><path d="M115.0,115.0 C114.9,115.1 118.7,116.5 119.8,115.4 L133.7,101.6 C136.9,99.2 139.9,98.4 142.2,98.6 C133.8,88.0 127.5,74.4 143.8,58.0 C148.5,53.4 154.0,51.2 159.7,51.0 C160.3,49.4 163.2,43.6 171.4,40.1 C171.4,40.1 176.1,42.5 178.8,56.2 C183.1,58.6 187.2,61.8 190.9,65.4 C194.5,69.0 197.7,73.2 200.1,77.6 C213.8,80.2 216.3,84.9 216.3,84.9 C212.7,93.1 206.9,96.0 205.4,96.6 C205.1,102.4 203.0,107.8 198.3,112.5 C181.9,128.9 168.3,122.5 157.7,114.1 C157.9,116.9 156.7,120.9 152.7,124.9 L141.0,136.5 C139.8,137.7 141.6,141.9 141.8,141.8 Z" fill="currentColor" class="octo-body"/></svg></a><main id="main" class="main"><div class="main-inner"><div class="content-wrap"><div id="content" class="content"><div id="posts" class="posts-expand"><div class="reading-progress-bar"></div><article class="post post-type-normal" itemscope itemtype="http://schema.org/Article"><div class="post-block"><link itemprop="mainEntityOfPage" href="https://blog.daliansky.net/Intel-FB-Patcher-tutorial-and-insertion-pose.html"><span hidden itemprop="author" itemscope itemtype="http://schema.org/Person"><meta itemprop="name" content="黑果小兵"><meta itemprop="description" content="黑果小兵,daliansky,blog.daliansky.net,macOS,Hackintosh,黑苹果,linux"><meta itemprop="image" content="/images/avatar.png"></span><span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization"><meta itemprop="name" content="黑果小兵的部落阁"></span><header class="post-header"><h1 class="post-title" itemprop="name headline">Hackintool(原Intel FB-Patcher)使用教程及插入姿势</h1><div class="post-meta"><span class="post-time"><span class="post-meta-item-icon"><i class="fa fa-calendar-o"></i> </span><time title="创建时间:2018-09-23 10:14:05" itemprop="dateCreated datePublished" datetime="2018-09-23T10:14:05+08:00">2018-09-23</time> <span class="post-meta-divider">|</span> <span class="post-meta-item-icon"><i class="fa fa-calendar-check-o"></i> </span><time title="修改时间:2023-09-20 09:55:32" itemprop="dateModified" datetime="2023-09-20T09:55:32+08:00">2023-09-20</time> </span><span class="post-category"><span class="post-meta-divider">|</span> <span class="post-meta-item-icon"><i class="fa fa-folder-o"></i> </span><span itemprop="about" itemscope itemtype="http://schema.org/Thing"><a href="/categories/教程/" itemprop="url" rel="index"><span itemprop="name">教程</span></a></span> </span><span class="post-meta-divider">|</span> <span class="post-meta-item-icon" title="阅读次数"><i class="fa fa-eye"></i> <span class="busuanzi-value" id="busuanzi_value_page_pv"></span></span><div class="post-symbolscount"><span class="post-meta-item-icon"><i class="fa fa-file-word-o"></i> </span><span title="本文字数">14k</span> <span class="post-meta-divider">|</span> <span class="post-meta-item-icon"><i class="fa fa-clock-o"></i> </span><span title="阅读时长">26 分钟</span></div></div></header><div class="post-body" itemprop="articleBody"><div><div><div class="post-gallery"></div></div></div><h2 id="警告"><a class="markdownIt-Anchor" href="#警告"></a> 警告</h2><p>Hackintool 不是一个让你无脑使用的自动化补丁工具。在使用它之前,你需要一定的知识储备. 请您务必在使用这个工具之前阅读 <a href="https://www.insanelymac.com/forum/topic/334899-intel-framebuffer-patching-using-whatevergreen" target="_blank" rel="noopener">Intel Framebuffer patching using WhateverGreen</a>(英文)! 和 <a href="https://github.com/acidanthera/WhateverGreen/blob/master/Manual/FAQ.IntelHD.cn.md" target="_blank" rel="noopener">Whatevergreen</a>的<strong>中文</strong>官方文档。</p><h2 id="功能"><a class="markdownIt-Anchor" href="#功能"></a> 功能</h2><ul><li><p>支持 Sandy Bridge, Ivy Bridge, Haswell, Broadwell, Skylake, KabyLake, Coffee Lake, Cannon Lake, Ice Lake 几乎所有的平台</p></li><li><p><a href="https://blog.daliansky.net/Tutorial-Using-Hackintool-to-open-the-correct-pose-of-the-8th-generation-core-display-HDMI-or-DVI-output.html">修补核显输出接口</a></p></li><li><p>创建显存大小修改补丁</p></li><li><p>EDID 注入</p></li><li><p>检测自动修补程序创建的变化</p></li><li><p>创建 Clover 补丁,支持 hex,base64 或 Devices/Properties 等三种格式</p></li><li><p>显示原生GPU和型号标识</p></li><li><p>显示和编辑内存信息,如缓冲帧,显存,Cursor 等</p></li><li><p>弹出一些项目的提示信息(Tool tips)</p></li><li><p>直接读取已加载生效的xxxFramebuffer kext的数据</p></li><li><p>文件 ▸ 打开通过 Debug 版本的 <code>WhatEverGreen.kext</code> 的 <code>-igfxdump</code> 引导标志生成的缓冲帧文件</p></li><li><p>文件 ▸ 导出 ▸ Clover Config.plist 并对现有 Config.plist 进行无损打补丁</p></li><li><p>文件 ▸ 导出 ▸ Framebuffer.txt (缓冲帧文本形式)</p></li><li><p>修补音频 Layout ID</p></li><li><p>字符串转换与进制转换</p></li><li><p>读取 Clover 开机日志,Lilu(Debug)日志,Lilu(Debug)内核日志,Whatevergreen (Debug) 内核日志,AppleALC (Debug) 内核日志</p></li><li><p>显示硬盘分区图的详细信息</p></li><li><p>读取 Lilu,Whatevergreen,AppleALC,USBInjectAll 的安装信息</p></li><li><p>添加 NVRAM 的内核引导标识符</p></li><li><p>装载/卸载 EFI 分区</p></li><li><p>添加 USB 端口限制补丁</p></li><li><p>添加 DSDT 重命名</p></li><li><p>定制 USB</p></li><li><p>高级修补选项(DVMT-prealloc 32 MB ,显存 2048 MB,禁用 eGPU,启用HDMI20(4K),仿冒声卡 ID,将 DP 映射到 HDMI,USB端口限制,FB端口限制,修复热插拔重启,注入设备 ID 等)</p></li><li><p>显示系统信息,包括:系统信息、序列号信息、IGPU信息、iMessage键值等</p><ul><li>杂项:显示WIFI/蓝牙/显卡/声卡/硬盘/SSD等信息</li></ul></li><li><p>序列号生成器,可随机生成新的序列号,提供<a href="EveryMac.com">EveryMac.com</a>及Apple.com验证功能</p></li><li><p>显示PCI信息,可导出PCI信息并注入到CLOVER/OC,以显示更详细的PCI设备信息</p></li><li><p>显示电源信息</p></li><li><p>工具箱,包括:</p><ul><li>通过<code>AppleIntelInfo</code>读取CPU变频信息,包括查看``MSR<code>状态/是否启用</code>HWP(Intel Speed Shift)`</li><li>安装<code>Atheros</code> AR92xx/AR93xx无线网卡驱动</li><li>为<code>Mojave</code>启用<code>SATA热插拔</code>驱动支持</li><li>为<code>Windows</code>生成<code>蓝牙</code>注册表文件</li><li>为<code>Windows</code>生成<code>UTC</code>时间同步注册表文件</li><li>导出当时机器的<code>DSDT</code></li><li>禁用<code>Gatekeeper</code>并将磁盘挂载为<code>读/写</code>状态</li><li>安装<code>Kext</code>驱动</li><li>重建缓存,等同于<code>kextcache -i /</code></li></ul></li></ul><div class="note success"><p><strong>两个开味小菜:</strong></p><ul><li>声卡修补</li><li>显示器 EDID 修补</li></ul></div><h2 id="声卡修补"><a class="markdownIt-Anchor" href="#声卡修补"></a> 声卡修补</h2><ol><li><p>安装最新的 <a href="https://github.com/acidanthera/Lilu/releases" target="_blank" rel="noopener">Lilu</a> + <a href="https://github.com/acidanthera/AppleALC/releases" target="_blank" rel="noopener">AppleALC</a></p></li><li><p><a href="https://mackie100projects.altervista.org/download-clover-configurator/" target="_blank" rel="noopener">Clover Configurator</a> 设置 config.plist ▸ Devices ▸ Audio ▸ Inject ▸ <code>No</code></p></li><li><p>四叶草 (Clover) ▸ DSDT 重命名(如果需要)</p><ul><li>☑️ AZAL ▸ HDEF</li><li>☑️ HDAS ▸ HDEF</li></ul></li><li><p>选中 补丁 ▸ 通用 ▸ 声音</p></li><li><p>设置 Layout ID下拉列表,选择或输入合适你的 Layout ID</p></li><li><p>文件 ▸ 导出 ▸ Clover Config.plist(覆盖现有的config.plist文件)</p></li><li><p>重新启动</p></li><li><p>如果没有音频依然存在问题,请返回步骤4并尝试不同的 Layout ID 注意:如果您尝试所有 Layout ID 但仍有问题,请尝试设置 补丁 ▸ 高级 ▸ 仿冒声卡 ID 选项。 如果这依然不起作用,那么尝试安装<a href="https://bitbucket.org/RehabMan/os-x-fake-pci-id/downloads/" target="_blank" rel="noopener">FakePCIID.kext</a> + <a href="https://bitbucket.org/RehabMan/os-x-fake-pci-id/downloads/" target="_blank" rel="noopener">FakePCIID_Intel_HDMI_Audio.kext</a></p></li></ol><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/AudioPatch.png" alt="AudioPatch"></p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/AudioPatch2.png" alt="AudioPatch2"></p><h2 id="显示器-edid-修补"><a class="markdownIt-Anchor" href="#显示器-edid-修补"></a> 显示器 EDID 修补</h2><p><strong>通过对EDID的修补,您可以修改显示器样式并添加缩放分辨率。</strong></p><ol><li>从显示器列表中,选择您要编辑的显示器。</li><li>(可选)添加/修复监视器范围(如果您的EDID没有它们或它们是坏的)。</li><li>(可选)通过单击“添加”,然后通过单击这些值并进行编辑,可以选择添加缩放分辨率。选择后,可以通过“删除”按钮删除输入的分辨率。</li><li>单击“导出”按钮会在桌面上生成用于修补的替代文件</li></ol><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Display1.png" alt="Display"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Display2.png" alt="Display2"></p><h3 id="安装"><a class="markdownIt-Anchor" href="#安装"></a> 安装</h3><p>安装EDID补丁有两种方法:1.显示覆盖 2.扩展库(L/E) <strong>请二选一</strong></p><p><strong>1.显示覆盖 (Display Overrides):</strong></p><ul><li>将 <code>DisplayVendorID-x</code> 文件夹复制到 <code>/System/Library/Displays/Contents/Resources/Overrides</code> (或者 <code>/System/Library/Displays/Overrides</code> El Capitan 及以前版本)</li><li>将 <code>Icons.plist</code> 复制到 <code>/System/Library/Displays/Contents/Resources/Overrides</code> (或者 <code>/System/Library/Displays/Overrides</code> El Capitan 及以前版本)</li></ul><p><strong>2.扩展库 (Library Extensions):</strong></p><ul><li>将 <code>DisplayEDID-x-x.kext</code> 复制到 <code>/Library/Extensions</code> 或者 <code>EFI/Clover/kexts/Other</code> (取决于您的配置,建议使用 <code>Clover</code> 的方法)</li></ul><p><strong>系统完整性保护 (SIP)</strong></p><p>您需要禁用SIP <code>(sudo spctl --master-disable)</code> 才能将文件复制到方法1所述位置。</p><h3 id="额外信息"><a class="markdownIt-Anchor" href="#额外信息"></a> 额外信息</h3><p>如果您有16:10的显示器并想使用缩放分辨率,您可以使用:</p><ul><li>iMac 显示器</li><li>MacBook Pro 显示器</li><li>Cinema HD 显示器</li><li>LED Cinema 显示器</li></ul><p>对于16:9显示器和缩放分辨率,您可以使用:</p><ul><li>Apple Thunderbolt 显示器 (不要用于内建显示器!!!)</li><li>iMac Retina 显示器</li><li>MacBook Air 显示器</li></ul><h2 id="工具栏"><a class="markdownIt-Anchor" href="#工具栏"></a> 工具栏</h2><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/Tools.png" alt="Tools"></p><ol><li>从 AppleIntelInfo.kext 中获取 CPU 的详细信息<ul><li>注意!使用完这个功能后需要重启来还原 CPU 的状态!</li></ul></li><li>从 macOS 10.14 开始,苹果删除了 高通 AR92XX/93XX 的驱动,点击这里可以一键安装</li><li>安装驱动以在 macOS 10.14 上启用 SATA 热插拔</li><li>生成 Windows 蓝牙注册表文件</li><li>生成 Windows UTC 时间同步注册表文件<ul><li>不推荐,建议更改 macOS 内时区来同步时间</li></ul></li><li>导出 DSDT<ul><li>用于导出现在系统使用的 ACPI 表,用于查看 Clover 重命名效果,TgBridge 错误,提取白苹果 ACPI 表等等</li><li><strong>强烈不推荐用于提取原始 ACPI 表,请绕路 Clover F4</strong></li></ul></li><li>安装驱动<ul><li>安装下载好的 Kext 到 <code>Library/Extensions</code> (俗称 L/E)</li></ul></li><li>重建缓存并修复权限<ul><li>安装完驱动必须点击执行</li></ul></li></ol><h2 id="定制usb"><a class="markdownIt-Anchor" href="#定制usb"></a> 定制USB</h2><p>macOS 10.14.1+ 的USB端口限制补丁已经失效了,因此无法一次配置所有端口。 <a href="https://github.com/RehabMan" target="_blank" rel="noopener">RehabMan</a> 已更新 <code>USBInjectAll.kext</code> 并已包含用于排除端口组的引导标志。</p><ol><li><p>将 <code>USBInjectAll.kext</code> (用于端口发现) 放入 <code>EFI/CLOVER/kexts/Other</code></p></li><li><p>Clover ▸ DSDT 重命名 (如果需要)</p><ul><li>☑️ XHC1 ▸ XHC</li><li>☑️ EHC1 ▸ EH01</li><li>☑️ EHC2 ▸ EH02</li></ul><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBPatch.png" alt="USBPatch"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBPatch2.png" alt="USBPatch2"></p></li><li><p>重新启动</p></li><li><p>运行 Hackintool 然后转到 工具栏 ▸ <code>已安装</code> 检查 <code>USBInjectAll</code> 是否安装正确</p><ul><li>如果你看到:<code>USBInjectAll: Yes (Release-0.7.1)</code> 就说明没问题了</li></ul></li><li><p>转到 工具栏 ▸ <code>USB</code> 来查看 USB 控制器列表。因为这里需要基于 USB控制器 您可能需要安装额外的 kexts:</p><ul><li>8086:8CB1 和 macOS (10.11.1) ▸ 请使用 <code>XHCI-9-series.kext</code></li><li>8086:8D31, 8086:A2AF, 8086:A36D, 8086:9DED ▸ <code>请使用 XHCI-unsupported.kext</code></li><li>8086:1E31, 8086:8C31, 8086:8CB1, 8086:8D31, 8086:9C31, 8086:9CB1 ▸ <code>请使用 FakePCIID.kext + FakePCIID_XHCIMux.kext</code></li></ul></li><li><p>如果您缺少了其中一个附加的 kexts,<strong>请完成安装并立即重新启动</strong>,然后再次运行 Hackintool</p></li><li><p>转到 工具栏 ▸ <code>USB</code> 选项</p></li><li><p><strong>依次选择 USB 端口列表中的各个项目,然后单击“删除”删掉全部项目,完成后再单击“刷新”按钮</strong></p></li><li><p>使用 <code>-uia_exclude_ss uia_include=HS01,HS02</code></p><ul><li>这里的 <code>HS01</code> 和 <code>HS02</code> 是鼠标和键盘,请根据<strong>自己的设备位置</strong>对其进行更改</li></ul></li><li><p>运行 Hackintool 并转到 工具栏 ▸ <code>USB</code> 选项</p><ul><li>用一个 USB 2.0 的设备将所有的2.0端口(通常为黑色)全部插拔一遍</li><li>活动的端口将以<code>绿色</code>突出显示<br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOrigin.png" alt="USBOrigin"></li></ul></li><li><p>删除所有<strong>未</strong>突出显示为绿色的端口,请您也用小本将活动端口的数据记下来,以防万一</p></li><li><p>删除 <code>-uia_exclude_ss</code> 引导标志,并使用 <code>-uia_exclude_hs</code> 引导标志重新启动</p></li><li><p>运行 Hackintool 并转到工具栏 ▸ <code>USB</code> 选项</p><ul><li>用 USB 3.0 的设备将所有的3.0端口(蓝色/红色/黄色)全部插拔一遍</li><li>USB Type-C 接口的设备需要用<strong>正反两面</strong>对所有的端口进行插拔</li><li>活动的端口将以绿色突出显示</li></ul></li><li><p>删除所有未突出显示为绿色的端口,请您也用小本将活动端口的数据记下来,以防万一<br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBDEL.png" alt="USBDEL"></p></li><li><p>使用下拉列表将每个端口设置为适当的接口类型</p><ul><li>永久连接设备的USB端口(例如M.2蓝牙卡)应设置为 <code>Internal</code> (内建)</li><li>与 USB3 端口相连的 HSxx 端口 (USB2) 应设置为 <code>USB3</code></li><li>内部集线器通常连接到端口PR11和PR21,因此应设置为 <code>Internal</code> (内建)</li><li>USB Type-C 接口可以是9或10,这取决于硬件如何处理 USB Type-C 型设备/电缆的<strong>正反两种可能方向</strong></li><li>如果 USB Type-C 在两个方向上使用相同的 SSxx,则它具有内建切换器,因此应设置为 <code>TypeC+Sw</code></li><li>如果 USB Type-C 在两个方向使用不同的 SSxx,则它没有内建切换器,因此应设置为 <code>TypeC</code></li></ul><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBTest.png" alt="USBTest"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBFinal.png" alt="USBFinal"></p></li><li><p>使用 <code>导出</code> 按钮在桌面上生成 USB 修复文件</p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOutput.png" alt="USBOutput"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/USBOutput2.png" alt="USBOutput2"></p><ul><li>复制 <code>SSDT-EC.aml</code> (如果有) 到 EFI ▸ CLOVER ▸ ACPI ▸ patched</li><li>接下来的方案请 <strong>2 选 1</strong>:<ul><li>A) 复制 USBPorts.kext 到 EFI ▸ CLOVER ▸ kexts ▸ Other;或者</li><li>B) 复制 SSDT-UIAC.aml 和 SSDT-USBX.aml (如果有) 到 EFI ▸ CLOVER ▸ ACPI ▸ patched</li></ul></li></ul></li><li><p>好了,是时候清除不需要的补丁和文件了:</p><ul><li>删除 (<code>-uia_exclude_ss</code>,<code>-uia_exclude_hs</code> 和 <code>uia_include=x</code>)</li><li>删除 <code>USBInjectAll.kext</code> (<strong>如果您使用的是 USB-Ports</strong>)</li></ul></li><li><p>重启</p></li><li><p>运行 Hackintool 然后转到 工具栏 ▸ <code>USB</code></p></li><li><p>依次选择 USB 端口列表中的各个项目,然后单击“删除”删掉全部项目,完成后再单击“刷新”按钮</p><ul><li>您现在可以检查你的 USB 是否全部正常工作</li><li>如果您要更改USB端口类型,请在更改后重新生成修复文件并替换之前的文件</li><li>如果您一不小心删了修补文件,请重新从头来过,或者您可以用您的小本 ⊙﹏⊙∥∣°</li></ul></li></ol><div class="note primary"><p><strong>FAQ</strong><br>Q. 什么是 <code>USBPorts.kext</code> ?<br>A. 它是一个 无代码的核心驱动 用于注入 USB 端口,让所有的USB端口都能正常工作</p><p>Q. 我还需要在使用USBPorts.kext 的同时使用 <code>SSDT-UIAC.aml</code> 吗?<br>A. 不,这个方法生成的是一个空壳的无代码的kext驱动,无需同时使用 <code>SSDT-UIAC.aml</code></p></div><h3 id="usb定制视频教程"><a class="markdownIt-Anchor" href="#usb定制视频教程"></a> USB定制视频教程</h3><iframe src="//player.bilibili.com/player.html?aid=38860673&cid=68301620&page=1" width="100%" height="680" scrolling="no" border="0" frameborder="no" framespacing="0" allowfullscreen></iframe><h2 id="核心功能给缓冲帧打补丁"><a class="markdownIt-Anchor" href="#核心功能给缓冲帧打补丁"></a> 核心功能:给缓冲帧打补丁</h2><p>随着<code>macOS Mojave</code>的发行,之前的通过<code>Clover</code> ▸ <code>KextsToPatch</code> 通过修补帧缓冲的方法已经失效了,尤其是 <code>SkyLake</code> 及以后架构。您现在必须使用 <code>Lilu</code> + <code>WhateverGreen</code>+<code>FB Patcher</code> 的方式来驱动您的显卡。</p><h3 id="初步动作"><a class="markdownIt-Anchor" href="#初步动作"></a> 初步动作</h3><ul><li><p>删除 <code>FakePCIID</code>,<code>IntelGraphicsFixup</code>,<code>NvidiaGraphicsFixup</code>,<code>Shiki</code> 和 <code>CoreDisplayFixup</code></p></li><li><p>关闭 <code>Clover</code> 里面关于 <code>Graphics</code> 注入的参数,这些参数包括:</p><ul><li>config.plist ▸ Graphics ▸ 🔲 Inject ATI</li><li>config.plist ▸ Graphics ▸ 🔲 Inject Intel</li><li>config.plist ▸ Graphics ▸ 🔲 Inject NVidia</li><li>config.plist ▸ Graphics ▸ ig-platform-id= <code>清空</code></li><li>config.plist ▸ Devices ▸ FakeID ▸ IntelGFX= <code>清空</code></li></ul></li><li><p>关闭 <code>Clover</code> 里面关于<code>Acpi</code> ▸ <code>DSDT</code> 的修复:</p><ul><li>🔲 <code>AddHDMI</code></li><li>🔲 <code>FixDisplay</code></li><li>🔲 <code>FixIntelGfx</code></li><li>🔲 <code>AddIMEI</code></li></ul></li><li><p><code>Devices</code> 禁用 <code>UseIntelHDMI</code></p></li><li><p>移除 <code>boot argument</code> 参数:<code>-disablegfxfirmware</code></p></li><li><p>移除 <code>IGPU</code> 和 <code>HDMI</code> 部分的全部内容,包括:</p><ul><li>config.plist ▸ Devices ▸ Arbitrary</li><li>config.plist ▸ Devices ▸ Properties</li><li>config.plist ▸ Devices ▸ AddProperties</li></ul></li><li><p>从以下位置删除任何与 <code>IGPU</code> 和 <code>HDMI</code> 相关的 <code>SSDT</code> 和 <code>DSDT</code> :</p><ul><li>Clover ▸ ACPI ▸ patched</li></ul></li></ul><h3 id="使用方法"><a class="markdownIt-Anchor" href="#使用方法"></a> 使用方法</h3><ol><li><p>打开应用:<code>Hackintool.app</code></p></li><li><p>通过菜单项:<code>缓冲帧</code>选择 <code>macOS 10.13.6</code> / <code>macOS 10.14</code> <img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-Select.png" alt="FB-Select"></p></li><li><p>选择显卡对应的处理器架构,比如</p><ul><li><code>Intel UHD Graphics 630</code>就需要选择<code>Coffee Lake</code></li><li><code>Intel HD Graphics 620</code>就需要选择<code>Kaby Lake</code></li><li><code>Intel HD Graphics 520</code>就需要选择<code>Skylake</code>,等等,</li></ul><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-1.png" alt="FB-1"></p><p>之后选择<code>平台 ID</code>,这个就是能正确驱动你的显卡的 ID,至于这个 ID 如何确定,请参考<a href="https://blog.daliansky.net/Intel-core-display-platformID-finishing.html">黑苹果必备:Intel核显platform ID整理及smbios速查表</a> 并针对白苹果所使用的 ID 选取适合您的 <code>平台 ID</code>。</p><p>如果您想了解更多信息,请阅读<a href="https://www.tonymacx86.com/threads/guide-intel-framebuffer-patching-using-whatevergreen.256490/" target="_blank" rel="noopener">针对 Whatevergreen 的缓冲帧修补教程(英文)</a>。中文版:<a href="https://blog.daliansky.net/Coffee-Lake-frame-buffer-patch-and-UHD630-Coffee-Lake-ig-platform-id-data-finishing.html">Coffee Lake帧缓冲区补丁及UHD630 Coffee Lake ig-platform-id数据整理</a> 和 <a href="https://blog.daliansky.net/Tutorial-Using-Hackintool-to-open-the-correct-pose-of-the-8th-generation-core-display-HDMI-or-DVI-output.html">教程:利用Hackintool打开第8代核显HDMI输出的正确姿势</a></p></li><li><p>点击<code>应用补丁</code>按钮,在<code>通用</code>选项中勾选<code>设备/属性</code>,<code>自动侦测变化</code>,<code>全部</code>,<code>接口</code>,<code>显存</code>这几个选项;</p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-2.png" alt="FB-2"></p></li><li><p>在<code>高级</code>选项中勾选<code>DVMT pre-alloc 32 MB</code>,<code>显存 2048MB</code>,<code>禁用 eGPU</code>,<code>启用 HDMI20(4K)</code>,<code>将 DP 映射到 HDMI</code>,<code>FB 端口数限制</code></p></li><li><p>勾选<code>设备</code>,选择<code>平台 ID</code> <strong>相对应的</strong> <code>设备 ID</code>,这通常跟你的显卡名称相吻合</p></li><li><p>点击<code>生成补丁</code>生成显卡驱动补丁</p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-3.png" alt="FB-3"></p></li><li><p>通过菜单项:<code>文件</code> ▸ <code>导出</code> ▸ <code>Config.plist</code>,将该补丁无损注入到 Clover 的配置文件 Config.plist 中</p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/FB-4.png" alt="FB-4"></p></li></ol><h3 id="几个例子请您举一反三"><a class="markdownIt-Anchor" href="#几个例子请您举一反三"></a> 几个例子:<a href="https://github.com/acidanthera/WhateverGreen/blob/master/Manual/FAQ.IntelHD.cn.md#%E4%BD%BF%E7%94%A8-weg-%E8%87%AA%E5%AE%9A%E4%B9%89-fb-%E5%92%8C-%E7%AB%AF%E5%8F%A3-%E8%A1%A5%E4%B8%81" target="_blank" rel="noopener">(请您举一反三)</a></h3><ul><li><p>Coffee Lake(八代)平台:Intel UHD Graphics 630 (移动端)</p><p><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-A.png" alt="3E9B-A"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-B.png" alt="3E9B-B"><br><img src="https://pan.daliansky.net/d/blog/Hackintool-Screen-Shot-for-blog/3E9B-C.png" alt="3E9B-C"></p></li><li><p>Kabe Lake(七代)平台:Intel HD Graphics 620 / Intel UHD Graphics 620 (移动端)</p><ul><li>CPU 架构:Kaby Lake</li><li>平台 ID:<code>0x59160000</code></li><li><strong>通用</strong>和<strong>高级</strong>界面同上勾选</li><li>仿冒图形卡 ID 选择:<code>0x5916: Intel Graphics 620</code></li></ul></li><li><p>Sky Lake(六代)平台:Intel HD Graphics 530 (移动端)</p><ul><li>CPU 架构:Skylake</li><li>平台 ID:<code>0x191B0000</code></li><li><strong>通用</strong>和<strong>高级</strong>界面同上勾选</li><li>仿冒图形卡 ID 选择:<code>0x191B: Intel Graphics 530</code></li></ul></li><li><p>Haswell(四代)平台:Intel HD Graphics 4600 (移动端)</p><ul><li>CPU 架构:Haswell</li><li>平台 ID:<code>0x0A260006</code></li><li><strong>通用</strong>和<strong>高级</strong>界面同上勾选</li><li>仿冒图形卡 ID 选择:<code>0x0A26: Intel Graphics 4600</code></li></ul></li><li><p><strong>注意⚠️:以上设置仅为较为通用的设置,对于某些设备,可能存在疏漏或者冗余</strong></p><ul><li><a href="https://github.com/acidanthera/WhateverGreen/blob/master/Manual/FAQ.IntelHD.cn.md#%E4%BD%BF%E7%94%A8-weg-%E8%87%AA%E5%AE%9A%E4%B9%89-fb-%E5%92%8C-%E7%AB%AF%E5%8F%A3-%E8%A1%A5%E4%B8%81" target="_blank" rel="noopener">查看此处</a>来利用 Hackintool 深度定制 Whatevergreen 补丁</li></ul></li></ul><p><strong>最后通过菜单项:<code>文件</code> ▸ <code>导出</code> ▸ <code>Config.plist</code>,将该补丁导出到 Clover 的配置文件</strong></p><h3 id="各种主板补丁示例集合"><a class="markdownIt-Anchor" href="#各种主板补丁示例集合"></a> 各种主板补丁示例集合</h3><p>从<code>Hackintool</code> v2.0.6开始,内部集成了国外论坛的成员提交的缓冲帧补丁示例的集合,现在只需要轻松几步就能生成写好的补丁,源文件请<a href="https://blog.daliansky.net/Tutorial-Using-Hackintool-to-open-the-correct-pose-of-the-8th-generation-core-display-HDMI-or-DVI-output.html">参考</a></p><ol><li><p>运行<strong>Hackintool</strong>。从顶部菜单栏中选择<strong>缓冲帧</strong>并选择<strong>macOS 10.14</strong>。</p><p><img src="https://pan.daliansky.net/d/blog/Connectors-screen-shot/FB-Select.png" alt="Hackintool - 选择Framebuffer.png"></p></li><li><p>从<strong>应用补丁</strong>菜单中,选择<strong>应用当前补丁</strong>,可看到其前面打钩的是正确的状态。</p><p><img src="https://pan.daliansky.net/d/blog/Connectors-screen-shot/FB-Patch.png" alt="Hackintool - Patch Menu.png"><br><img src="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connectors-Before-Patch.png" alt="Hackintool - Connectors-Before-Patch.png"></p></li><li><p>在菜单栏 -> 应用补丁 -> 主板接口 中选择你的主板(如果没有,请按照上文的方法手动创建补丁)</p><p><img src="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connector-Patches.png" alt="Hackintool - Connector-Patches.png"><br><img src="https://pan.daliansky.net/d/blog/Connectors-screen-shot/Connectors-After-Patch.png" alt="Hackintool - Connectors-After-Patch.png"></p></li></ol><h3 id="fb视频教程"><a class="markdownIt-Anchor" href="#fb视频教程"></a> FB视频教程</h3><iframe src="//player.bilibili.com/player.html?aid=38859452&cid=68285108&page=1" width="100%" height="680" scrolling="no" border="0" frameborder="no" framespacing="0" allowfullscreen></iframe><h2 id="使用hackintool工具的序列号生成器生成全新的序列号及注入三码教程"><a class="markdownIt-Anchor" href="#使用hackintool工具的序列号生成器生成全新的序列号及注入三码教程"></a> 使用<code>Hackintool</code>工具的<code>序列号生成器</code>生成全新的序列号及注入三码教程</h2><div class="note warning"><p>退出<code>Apple ID</code>登录,然后再更换序列号</p></div><p>操作步骤:</p><p>打开<code>Hackintool</code>工具,点击<code>序列号生成器</code></p><p><img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-1.png" alt="SerialNo-1"></p><ol><li><p>点击<code>刷新</code>按钮,生成新的序列号<img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-2.png" alt="SerialNo-2"></p></li><li><p>检查机型(SMBIOS),是否与自己的配置相似或者相近,如果机型不符合请通过下面的机型选择</p></li><li><p>点击左侧<code>Apple.com</code>图标,前往验证序列号是否存在<img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-3.png" alt="SerialNo-3"></p></li><li><p>如果显示结果为<code>很抱歉,该序列号无效。请检查您的信息,然后重试。</code>,那么恭喜你,这是一个新的、未被使用过的序列号,赶紧拿出小本子将图中显示的前3行信息记录下来留着备用。</p><table><thead><tr><th>名称</th><th>值</th></tr></thead><tbody><tr><td>序列号<br>Serial Number</td><td><code>FVFDWNZUL40Y</code></td></tr><tr><td>主板序列号<br>Board Serial Number</td><td><code>FVF0523104N00008C</code></td></tr><tr><td>SmUUID</td><td><code>2B6EC1F8-046F-4172-B02C-A974561C7A45</code></td></tr></tbody></table><p>如果显示结果为“<code>您的服务和支持范围</code>”消息以及出现一台计算机的图片显示,则说明您已经生成了已记录在苹果官方数据库计算机的序列号。<strong>千万别用这组序列号了,请重新点击<code>刷新</code>按钮生成新的序列号。</strong><img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-5.png" alt="SerialNo-5"></p></li><li><p>点击<code>EveryMac.com</code>图标,将通过Apple订单号,型号,EMC编号,型号标识符和序列号以及英特尔处理器号查找Mac,iPod,iPhone,iPad,Apple Watch,Apple TV和其他Apple设备,以检查其规格和其他详细信息。本例中,该序列号适用于"13-Inch, 2019, Two Thunderbolt 3 Ports" MacBook Pro</p></li></ol><p><img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-4.png" alt="SerialNo-4"></p><ol start="6"><li>打开<code>config.plist</code>配置文件,在<code>SMBIOS</code>里面将上面表格中的三组数据抄进去,保存后重启测试。<img src="https://pan.daliansky.net/d/blog/Hackintool/SerialNo-6.png" alt="SerialNo-6"></li><li>重新登录<code>Apple ID</code>,重新登录<code>iMessage</code> <code>FaceTime</code>,检查各功能是否使用正常</li></ol><h2 id="更新日志"><a class="markdownIt-Anchor" href="#更新日志"></a> 更新日志</h2><p>2.4.6 - ”重建缓存并修复权限“ 被移到了工具栏并增加了进度条</p><p>2.4.5 - 为 ”重建缓存并修复权限“ 增加了输出信息</p><p>2.4.4 - 更新中文语言包,改进编译器</p><p>2.4.3 - 更新中文语言包,修复 USB 配置</p><p>2.4.2 - 更改缓冲帧信息显示方式(选中 / 当前)</p><p>2.4.1 - 更新中文语言包</p><p>2.4.0 - 现在包含了 iMessageDebug 信息 (ElNono / mdmwii / flux84 / sugarface / pokenguyen)。导出系统信息。查看型号信息 (<a href="http://everymac.com" target="_blank" rel="noopener">everymac.com</a>)。 检查序列号。初步的 OpenCore 支持 (感谢 vit9696)</p><p>2.3.9 - ComboBox 修复 (感谢 telepati)</p><p>2.3.8 - 修复错误 (感谢 ReddestDream)</p><p>2.3.7 - 改进了 Clover EFI 装载。Clover PCI导 出现在使用 SubClass 作为 device_type</p><p>2.3.6 - 修复错误。 添加了 “使用 Intel HDMI” 选项(hda-gfx = onboard-x)。添加了 “不缩放” 的分辨率类型</p><p>2.3.5 - 修复了设备路径生成器(gfxutil)中的错误。 添加了 “生成 Windows UTC 注册表文件” 工具</p><p>2.3.4 - 更新了 Codec,以 Clover 和 dsl 格式导出 PCI 列表,现在转储所有 ACPI 表并反编译为 dsl</p><p>2.3.3 - 提取 DSDT(phpdev32),自动更新 PCIID(MuntashirAkon),以 JSON 格式导出 PCI 列表</p><p>2.3.2 - 监控 PCI 热插拔</p><p>2.3.1 - UI 更新</p><p>2.3.1 - 右键单击 PCI 设备,然后选择 “复制 IOReg 路径”。 启动 IORegistryExplorer 并选择 Go-> Go to Path… 菜单,粘贴路径并单击 “Go to Path” 按钮。</p><p>2.2.8 - 添加了 HWP 状态日志记录警告(以前的状态只能在重启后恢复)</p><p>2.2.7 - 添加了 VDA 解码器状态。 为 PCI 设备添加了 DevicePath。 将 PCI 设备列表导出到桌面</p><p>2.2.6 - 改进了引导 EFI 检测。 手动设置引导 EFI。 AppleIntelInfo 显示 30 秒计时器以记录 CStates。 记录后恢复 HWP 状态。添加了英特尔注册警告。计算器现在显示反向字节</p><p>2.2.4 - 添加了 AppleIntelInfo 的选项(启用 HWP,日志:CStates 低压模式,英特尔核显,IPG 类型,英特尔注册表, MSRs),添加了 20 秒的等待时间来让 AppleIntelInfo 获取 CState 低压模式信息。</p><p>2.2.2 - 添加了信息栏(网络接口,图形卡,声卡设备和储存设备)。 现在会以绿色或红色高亮电源设置来表明问题所在</p><p>2.2.1 - 修复错误</p><p>2.2.0 - 新的 <code>PCI 设备</code>,<code>网络</code>,<code>电源</code> 和 <code>工具</code> 栏</p><p>2.1.9 - 添加了来自 Github 的驱动下载源。下载得到的版本可能会比源代码版本老。而且由于 Github 的 API 限制, 它只会储存最新的下载链接。添加了安装 kext(s) 的功能。添加了重建驱动缓存和修复权限的功能。</p><p>2.1.8 - 使用 <code>kextstat</code> 来获取版本</p><p>2.1.7 - 现在可以侦测更多 kexts</p><p>2.1.6 - 现在可以下载当前版本的 Lilu 和其 插件</p><p>2.0.8 - 在 应用补丁 -> 8代核显HDMI/DVI 菜单中添加了几个配置文件,你可以尝试如果你的 8 代系统有问题 (CaseySJ)</p><p>2.0.4 - 应用 Clover 补丁(KernelToPatch,KextToPatch,DSDT 重命名)。 查看,创建和编辑 NVRAM 变量(小心!)。 查看已安装的 Lilu 及其插件,下载并自动编译最新版本</p><p>2.0.0 - 支持简体中文</p><p>1.9.6 - 增加磁盘功能(图标 / 装载 / 卸载按钮)</p><p>1.9.2 - 修复错误</p><p>1.9.1 - 添加了 SSDT-UIAC.aml / SSDT-USBX.aml 的导出支持</p><p>1.9.0 - 修复启动错误(感谢 @Pavo)</p><p>1.8.7 - 添加了 USB 电源方面的 DSDT 重命名</p><p>1.8.6 - 添加了 DSDT 重命名</p><p>1.8.5 - 修复错误</p><p>1.8.4 - 使用 Sparkle 框架进行自动更新</p><p>1.8.3 - 改进了音频设备侦测 / 选择,窗体现在可以调整大小</p><p>1.8.2 - 添加语言支持 法语 (Matgen84),德语 (al6042),韩语 (zisqo),俄语 / 乌克兰语 (ctich)</p><p>1.8.1 - 添加了 Clover 下载器 (Kozlek / JrCs / slice),NVRAM 引导标识符编辑,改进授权,更新界面</p><p>1.8.0 - 改进了 USB 电源导出 (corpnewt),其他修复,新图标</p><p>1.7.9 - 添加了 USB 电源导出, EFI 分区装载, 计算器和日志查看器</p><p>1.7.8 - 添加了分辨率注入(来自底噪的一键 Hidpi)</p><p>1.7.7 - 添加了 AMD 和 nVidia 的 EDID 补丁支持</p><p>1.7.6 - EDID 覆盖现可支持自定义图标</p><p>1.7.5 - 改进了 USB 教程, 添加了打印按钮</p><p>1.7.4 - 修复了默认选中项</p><p>1.7.3 - 更新</p><p>1.7.2 - 将软件更名为 Hackintool,添加了 EDID 注入支持 (Andy Vandijck)</p><p>1.7.1 - 修复暗黑模式</p><p>1.7.0 - 添加了 USB 和 声卡信息,现在会显示可用的仿冒 ID 和需要的 kext</p><p>1.6.9 - 更新</p><p>1.6.8 - 添加了 framebuffer-camellia 和 framebuffer-flags 的补丁支持</p><p>1.6.7 - 添加了 Macmini8,1 和 MacBookAir8,1 的信息</p><p>1.6.6 - 更新了信息文件</p><p>1.6.5 - 修复了 USBInjectAll 的侦测</p><p>1.6.4 - 改进了声卡 layout id 的侦测</p><p>1.6.3 - 现在会显示声卡控制器</p><p>1.6.2 - 修复 USB</p><p>1.6.1 - 改进了仿冒声卡设备 Id 的选项</p><p>1.6.0 - 修复错误</p><p>1.5.9 - 现在会显示 USB 控制器</p><p>1.5.8 - 将在应用程序会话之间存储和恢复 USB 端口,以便与新的 USBInjectAll.kext(0.7.0)一起使用,以便包括用于排除端口组的引导标识符</p><p>1.5.7 - 现在可以检测 EHC 和集线器端口(感谢 RehabMan 和 SavageAUS)。 可多选 USB 端口。 现在可以检测是否安装了 USBInjectAll</p><p>1.5.4 - 修复当用户有多个音频设备时的 Codec 检测。 在高级补丁栏中添加了 “修复重启” 补丁(将连接器通道值设置为18)</p><p>1.5.3 - 改进了 导出 -> Clover config.plist 的功能,现在会自动备份生成 (config-backup.plist)</p><p>1.5.2 - 添加了 应用补丁 -> AzulPatcher4600</p><p>1.5.1 - 修复了 USBPorts 的接口数统计</p><p>1.5.0 - 修复错误</p><p>1.4.9 - 添加了一个工具栏来显示 Lilu,WhateverGreen 和 AppleALC 安装状态和版本信息</p><p>1.4.8 - 修复了为 iasl 的 DSL 源补丁输出 framebuffer-cursormem</p><p>1.4.7 - 支持了新版 WEG 的 -igfxfbdump 引导标识符,使用 文件 -> 导入 -> IOReg 输出 菜单</p><p>1.4.6 - 修复错误。 添加了 缓冲帧 -> macOS 10.14 菜单项。添加了 QE/CI 和 Metal 支持的侦测</p><p>1.4.5 - 支持了 framebuffer-cursormem (Haswell)</p><p>1.4.4 - 修复了注入适当 device-id 的功能</p><p>1.4.3 - 修复错误</p><p>1.4.2 - 添加了 应用补丁 -> 导入 KextsToPatch / 应用当前补 菜单,将 USBPower.kext 重命名为 USBPorts.kext</p><p>1.4.1 - 添加了 TypeC USB 端口</p><p>1.4.0 - 改进了 Intel 架构检测</p><p>1.3.9 - 现在使用 AppleIntelFramebuffer @X 索引来进行接口关联</p><p>1.3.8 - 修复了 AppleIntelFramebuffer 接口数字在内建时应该为索引号 + 4 或者 0 的 Bug (RehabMan)</p><p>1.3.7 - 显示连接器端口上已连接显示器的显示信息(支持显示器热插拔),修复 iASL DSL 源十六进制输出,接口可以拖放以更改顺序</p><p>1.3.6 - 修复错误</p><p>1.3.5 - 现在会尝试 HDAS 如果没有找到 HDEF</p><p>1.3.4 - Added AllData connector patch method (RehabMan). 现在会尝试 GFX0 如果没有找到 IGPU</p><p>1.3.3 - 修复错误。添加了更多的 Layout ID (vandroiy2013)</p><p>1.3.2 - 修复错误</p><p>1.3.1 - 修复错误。添加了新的菜单 缓冲帧 -> 当前版本 / macOS 10.13.6</p><p>1.3.0 - 添加了声卡补丁,Clover config.plist 导出,USB 补丁,高级自动补丁</p><p>1.2.8 - 添加了iASL DSL 的源补丁输出,显示检测到的 Intel 架构和 平台 id</p><p>1.2.7 - 文件 -> 导出 缓冲帧文本形式</p><p>1.2.6 - 修复了预分配显存的计算公式 (vit9696)</p><p>1.2.5 - 依然会在 “自动侦测变化” 勾选时导出一个 config.plist/Devices/Properties 补丁</p><p>1.2.4 - 修复错误</p><p>1.2.3 - config.plist/Devices/Properties 补丁现在会输出数据形式</p><p>1.2.2 - 修复错误</p><p>1.2.1 - 更新和错误修复</p><p>1.2.0 - 为 Cannon Lake 和 Ice Lake 添加支持</p><p>1.1.0 - 添加了机型 MacBookPro15,1 和 MacBookPro15,2</p><p>1.0.9 - 支持 Mojave,Coffee Lake,WhateverGreen 的 -igfxdump 引导标识符和 Clover 的 config.plist/Devices/Properties 补丁输出</p><p>1.0.8 - 更新</p><p>1.0.7 - 修复暗黑模式支持</p><p>1.0.6 - 更好地兼容之前的版本</p><p>1.0.5 - 在启动时检测芯片组和地址, 可以更加容易地修显存值</p><p>1.0.4 - 添加了 GPU / 型号信息</p><p>1.0.3 - 添加了工具提示</p><p>1.0.2 - 添加了显存栏</p><p>1.0.1 - 小修补</p><p>1.0.0 - 最初发布</p><h2 id="下载链接"><a class="markdownIt-Anchor" href="#下载链接"></a> 下载链接</h2><p><a href="http://headsoft.com.au/download/mac/Hackintool.zip" target="_blank" rel="noopener">下载 Hackintool</a></p><p><a href="http://headsoft.com.au/download/mac/FBPatcher.zip" target="_blank" rel="noopener"><s>下载 FBPatcher V1.7.1</s></a> 历史版本</p><h2 id="扩展阅读"><a class="markdownIt-Anchor" href="#扩展阅读"></a> 扩展阅读</h2><p><a href="https://blog.daliansky.net/Intel-core-display-platformID-finishing.html">黑苹果必备:Intel核显platform ID整理及smbios速查表</a></p><p><a href="https://blog.daliansky.net/Coffee-Lake-frame-buffer-patch-and-UHD630-Coffee-Lake-ig-platform-id-data-finishing.html">macOS High Sierra 10.13.6(17G2112)/Mojave ig-platform-id数据整理</a></p><p><a href="https://blog.daliansky.net/Tutorial-Using-Hackintool-to-open-the-correct-pose-of-the-8th-generation-core-display-HDMI-or-DVI-output.html">教程:利用Hackintool打开第8代核显HDMI/DVI输出的正确姿势</a></p><h2 id="感谢名单"><a class="markdownIt-Anchor" href="#感谢名单"></a> 感谢名单</h2><ul><li><a href="https://www.apple.com/" target="_blank" rel="noopener">Apple</a> 的 macOS</li><li><a href="https://github.com/rehabman" target="_blank" rel="noopener">RehabMan</a>维护的项目:<a href="https://github.com/RehabMan/OS-X-Clover-Laptop-Config" target="_blank" rel="noopener">OS-X-Clover-Laptop-Config</a> <a href="https://github.com/RehabMan/Laptop-DSDT-Patch" target="_blank" rel="noopener">Laptop-DSDT-Patch</a> <a href="https://github.com/RehabMan/OS-X-USB-Inject-All" target="_blank" rel="noopener">OS-X-USB-Inject-All</a>等</li><li><a href="https://github.com/acidanthera" target="_blank" rel="noopener">Acidanthera</a> 维护的项目:<a href="https://github.com/acidanthera/OpenCorePkg" target="_blank" rel="noopener">OpenCorePkg</a> <a href="https://github.com/acidanthera/Lilu" target="_blank" rel="noopener">lilu</a> <a href="https://github.com/acidanthera/AirportBrcmFixup" target="_blank" rel="noopener">AirportBrcmFixup</a> <a href="https://github.com/acidanthera/WhateverGreen" target="_blank" rel="noopener">WhateverGreen</a> <a href="https://github.com/acidanthera/VirtualSMC" target="_blank" rel="noopener">VirtualSMC</a> <a href="https://github.com/acidanthera/AppleALC" target="_blank" rel="noopener">AppleALC</a> <a href="https://github.com/acidanthera/BrcmPatchRAM" target="_blank" rel="noopener">BrcmPatchRAM</a> <a href="https://github.com/acidanthera/MaciASL" target="_blank" rel="noopener">MaciASL</a> 等</li><li><a href="https://www.insanelymac.com/forum/profile/1364628-headkaze/" target="_blank" rel="noopener">headkaze</a> 提供的工具:<a href="https://github.com/headkaze/Hackintool" target="_blank" rel="noopener">hackintool</a> <a href="https://github.com/headkaze/PinConfigurator" target="_blank" rel="noopener">PinConfigurator</a> <a href="https://www.insanelymac.com/forum/topic/339175-brcmpatchram2-for-1015-catalina-broadcom-bluetooth-firmware-upload/" target="_blank" rel="noopener">BrcmPatchRAM</a></li><li><a href="https://github.com/CloverHackyColor" target="_blank" rel="noopener">CloverHackyColor</a>维护的项目:<a href="https://github.com/CloverHackyColor/CloverBootloader" target="_blank" rel="noopener">CloverBootloader</a> <a href="https://github.com/CloverHackyColor/CloverThemes" target="_blank" rel="noopener">CloverThemes</a></li><li>宪武整理的:<a href="https://github.com/daliansky/P-little" target="_blank" rel="noopener">P-little</a> <a href="https://github.com/daliansky/OC-little" target="_blank" rel="noopener">OC-little</a></li><li><a href="https://github.com/chris1111" target="_blank" rel="noopener">chris1111</a>维护的项目:<a href="https://github.com/chris1111/VoodooHDA-2.9.2-Clover-V15" target="_blank" rel="noopener">VoodooHDA</a> <a href="https://github.com/chris1111/Wireless-USB-Adapter-Clover" target="_blank" rel="noopener">Wireless USB Adapter Clover</a></li><li><a href="https://github.com/zxystd" target="_blank" rel="noopener">zxystd</a>开发的<a href="https://github.com/zxystd/itlwm" target="_blank" rel="noopener">itlwm</a> <a href="https://github.com/zxystd/IntelBluetoothFirmware" target="_blank" rel="noopener">IntelBluetoothFirmware</a></li><li><a href="https://github.com/lihaoyun6" target="_blank" rel="noopener">lihaoyun6</a>提供的工具:<a href="https://github.com/lihaoyun6/CPU-S" target="_blank" rel="noopener">CPU-S</a> <a href="https://github.com/lihaoyun6/macOS-Displays-icon" target="_blank" rel="noopener">macOS-Displays-icon</a> <a href="https://github.com/lihaoyun6/SidecarPatcher" target="_blank" rel="noopener">SidecarPatcher</a></li><li><a href="https://github.com/SukkaW" target="_blank" rel="noopener">sukka</a>更新维护的<a href="https://blog.skk.moe/post/from-clover-to-opencore/" target="_blank" rel="noopener">从 Clover 到 OpenCore —— Clover 迁移 OpenCore 指南</a></li><li><a href="https://github.com/xzhih" target="_blank" rel="noopener">xzhih</a>提供的工具:<a href="https://github.com/xzhih/one-key-hidpi" target="_blank" rel="noopener">one-key-hidpi</a></li><li><a href="https://github.com/williambj1" target="_blank" rel="noopener">Bat.bat</a>更新维护的<a href="https://blog.daliansky.net/OpenCore-BootLoader.html">精解OpenCore</a></li><li><a href="https://github.com/shuiyunxc" target="_blank" rel="noopener">shuiyunxc</a> 更新维护的<a href="https://shuiyunxc.gitee.io/2020/04/06/Faults/index/" target="_blank" rel="noopener">OpenCore配置错误、故障与解决办法</a></li><li><a href="https://github.com/athlonreg" target="_blank" rel="noopener">athlonreg</a>更新维护的<a href="https://blog.cloudops.ml/ocbook/" target="_blank" rel="noopener">OpenCore 0.5+ 部件补丁</a> <a href="https://github.com/athlonreg/Common-patches-for-hackintosh" target="_blank" rel="noopener">Common-patches-for-hackintosh</a></li><li><a href="github.com">github.com</a></li><li><a href="gitee.io">码云 gitee.io</a></li><li><a href="coding.net">扣钉 coding.net</a></li></ul><h2 id="参考及引用"><a class="markdownIt-Anchor" href="#参考及引用"></a> 参考及引用:</h2><ul><li><a href="https://deviwiki.com/wiki/Dell" target="_blank" rel="noopener">https://deviwiki.com/wiki/Dell</a></li><li><a href="https://deviwiki.com/wiki/Dell_Wireless_1820A_(DW1820A)" target="_blank" rel="noopener">https://deviwiki.com/wiki/Dell_Wireless_1820A_(DW1820A)</a></li><li><a href="%5Bhttps://osxlatitude.com/profile/4953-herv%C3%A9/%5D(https://osxlatitude.com/profile/4953-herv%C3%A9/)">Hervé</a> 更新的Broadcom 4350:<a href="https://osxlatitude.com/forums/topic/12169-bcm4350-cards-registry-of-cardslaptops-interop/" target="_blank" rel="noopener">https://osxlatitude.com/forums/topic/12169-bcm4350-cards-registry-of-cardslaptops-interop/</a></li><li><a href="%5Bhttps://osxlatitude.com/profile/4953-herv%C3%A9/%5D(https://osxlatitude.com/profile/4953-herv%C3%A9/)">Hervé</a> 更新的DW1820A支持机型列表:<a href="https://osxlatitude.com/forums/topic/11322-broadcom-bcm4350-cards-under-high-sierramojave/" target="_blank" rel="noopener">https://osxlatitude.com/forums/topic/11322-broadcom-bcm4350-cards-under-high-sierramojave/</a></li><li><a href="https://osxlatitude.com/profile/129953-nickhx/" target="_blank" rel="noopener">nickhx</a> 提供的蓝牙驱动:<a href="https://osxlatitude.com/forums/topic/11540-dw1820a-for-7490-help/?do=findComment&comment=92833" target="_blank" rel="noopener">https://osxlatitude.com/forums/topic/11540-dw1820a-for-7490-help/?do=findComment&comment=92833</a></li><li><a href="https://blog.xjn819.com/" target="_blank" rel="noopener">xjn819</a>: <a href="https://blog.xjn819.com/?p=543" target="_blank" rel="noopener">使用OpenCore引导黑苹果</a> <a href="https://blog.xjn819.com/?p=317" target="_blank" rel="noopener">300系列主板正确使用AptioMemoryFix.efi的姿势(重写版)</a></li><li><a href="https://www.insanelymac.com/" target="_blank" rel="noopener">insanelymac.com</a></li><li><a href="https://www.tonymacx86.com/" target="_blank" rel="noopener">tonymacx86.com</a></li><li><a href="http://bbs.pcbeta.com" target="_blank" rel="noopener">远景论坛</a></li><li><a href="https://applelife.ru/" target="_blank" rel="noopener">applelife.ru</a></li><li><a href="https://www.olarila.com/" target="_blank" rel="noopener">olarila.com</a></li></ul></div><div><div id="wechat_subscriber" style="display:block;padding:10px 0;margin:20px auto;width:100%;text-align:center"><a href="https://hackintosher.taobao.com"><img id="wechat_subscriber_qcode" src="/uploads/WeChatandShop.png" alt="黑果小兵 wechat" style="max-width:90%"></a><div>微信扫一扫,订阅/直达【黑果小兵的部落阁】</div></div></div><div class="updated"><svg xmlns="http://www.w3.org/2000/svg" width="130" height="20"><lineargradient id="b" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></lineargradient><clippath id="a"><rect width="130" height="20" rx="3" fill="#fff"/></clippath><g clip-path="url(#a)"><path fill="#555" d="M0 0h55v20H0z"/><path fill="#97CA00" d="M55 0h75v20H55z"/><path fill="url(#b)" d="M0 0h130v20H0z"/></g><g fill="#fff" text-anchor="middle" font-family="Menlo,monospace" font-size="110"><text x="285" y="150" fill="#010101" fill-opacity=".3" textlength="450" transform="scale(.1)">更新日期</text><text x="285" y="140" textlength="450" transform="scale(.1)">更新日期</text><text x="915" y="150" fill="#010101" fill-opacity=".3" textlength="650" transform="scale(.1)">2023-09-20</text><text x="915" y="140" textlength="650" transform="scale(.1)">2023-09-20</text></g></svg></div><div><div><div style="text-align:center;color:#ccc;font-size:14px">-------------本文结束<i class="fa fa-apple"></i>感谢您的阅读-------------</div></div></div><div><div style="padding:10px 0;margin:20px auto;width:90%;text-align:center"><button id="rewardButton" disable="enable" onclick='var qr=document.getElementById("QR");"none"===qr.style.display?qr.style.display="block":qr.style.display="none"'><span>打赏</span></button><div>如果文章对您有帮助,就请站长喝杯咖啡吧 ´◡`</div><div id="QR" style="display:none"><div id="wechat" style="display:inline-block"><img id="wechat_qr" src="/images/wechatpay.jpg" alt="黑果小兵 微信支付"><p>微信支付</p></div><div id="alipay" style="display:inline-block"><img id="alipay_qr" src="/images/alipay.jpg" alt="黑果小兵 支付宝"><p>支付宝</p></div></div></div></div><div><div><ul class="qq-qun"><div><p></p><h2>QQ群列表:</h2><p></p><p>630724380 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=JyGkfKK7U3Xq3TDtpqKOTq_gW7SBg4Uh&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群7</a> 2000人 新开群<br>713810838 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=e8E-1Ge2lCoBSTlj8Y4zMxX7l7-V63Iv&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群8</a> 2000人 新开群<br>688324116 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=Fp4HZ5e8A61oCu0GMS5YUqP6COc43-AO&jump_from=webapi" target="_blank" rel="noopener">一起黑苹果</a> 2000人<br>331686786 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=No8zvDfvDicT-GfSApw1RMBI-3MQ7zM3&jump_from=webapi" target="_blank" rel="noopener">一起吃苹果</a> 2000人<br>257995340 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=acztqL9efoqAOoptc_3moZ9b3Sgczu9_&jump_from=webapi" target="_blank" rel="noopener">一起啃苹果</a> 2000人群 远景报备群<br>875482673 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=aZNyoRum_er2mruqmnbX_93ncHNgsyak&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群</a> 2000人<br>1058822256 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=1sIT0BDaejgr9t1Hlw16cMnw_Z96zleV&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群2</a> 2000人<br>819662911 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=aJx9xO7vAmyslCuOdK0bRMmDLpvOCeRw&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群3</a> 2000人<br>954098809 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=iu042k0X5snr--dzAxOzcsvD9Zft9yx7&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群4</a> 2000人<br>1161377948 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=kBV9vCnz-NqtXXJiwnUhaLyJN1D7G0n6&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群5</a> 2000人<br>553283949 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=kr_hZc5pKK4TCDRaFPwRlfAiB4528InP&jump_from=webapi" target="_blank" rel="noopener">黑果小兵黑苹果技术群6</a> 2000人<br>701278330 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=x57TlUmxz88oXGDWjMOOsWokYi8klE11&jump_from=webapi" target="_blank" rel="noopener">黑苹果无线网卡交流群</a> 1000人群 DW1820A技术支持群<br>891434070 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=TUAxSUUtw_T1N62V0kF1sWvMcDr_eoxc&jump_from=webapi" target="_blank" rel="noopener">Catalina黑苹果交流群</a> 2000人群 远景报备群<br>939122730 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=g_rpf7m0LJllE6WHY9c0gVvCTBm1MtuN&jump_from=webapi" target="_blank" rel="noopener">Catalina黑苹果交流II群</a> 2000人群<br>891677227 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=xsuIOzF7RXYaRTTbJ5o_UjzohRDUx5UY&jump_from=webapi" target="_blank" rel="noopener">黑果小兵高级群</a> 2000人群<br>943307869 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=aoSvqrbysdjPo0Wa_XvvPuMG9NMEtOie&jump_from=webapi" target="_blank" rel="noopener">黑果小兵高级群II</a> 2000人群<br>419298796 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=4gWtT2-pOWZYIGwIpVaTNft2aOJP-5qs&jump_from=webapi" target="_blank" rel="noopener">零刻黑苹果技术交流群</a> 500人群 非专用机型请勿加入<br>275356796 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=H7hFwiVkZq71L7se6rz3hE9QcacqL-dV&jump_from=webapi" target="_blank" rel="noopener">morefine黑苹果技术交流群</a> 500人群 非专用机型请勿加入<br>869792897 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=MTDHb2QgLH3gkaymtdFCpk77J5ufWJpH&jump_from=webapi" target="_blank" rel="noopener">minisforum U820黑苹果技术群</a> 500人群 非专用机型请勿加入<br>942112153 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=N5cjw5ksrnmk-RMQ4fPCOo5D_Dxiu47B&jump_from=webapi" target="_blank" rel="noopener">天逸510s Mini黑苹果交流群</a> 1000人群 非专用机型请勿加入<br>673294583 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=GgcMJM5-98yB-fc6zyGcTI3OuesrSBRk&jump_from=webapi" target="_blank" rel="noopener">小新Pro黑苹果技术群</a> 2000人群 非专用机型请勿加入<br>946132482 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=r-m99xC-BPIRdVkEjU6duvqXMJ-1FOwA&jump_from=webapi" target="_blank" rel="noopener">小新Pro黑苹果</a> 500人群 非专用机型请勿加入<br>158976808 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=c9DeeyUg9x4dZlOpIVmj4R4g38p-YCZ1&jump_from=webapi" target="_blank" rel="noopener">DELL黑苹果交流群</a> 1000人群 非专用机型请勿加入<br>247451054 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=h7fvRnWmdaMK2D0qVQLzJsjCC9PwB5h3&jump_from=webapi" target="_blank" rel="noopener">小米Pro黑苹果高级群</a> 2000人群 非专用机型请勿加入<br>943181023 <a href="https://qm.qq.com/cgi-bin/qm/qr?k=OGO_GSX9ZhtbQ_HNns57Vdxm5pR1wH6V&jump_from=webapi" target="_blank" rel="noopener">联想小新Air黑苹果交流群</a> 500人群 非专用机型请勿加入<br></p><p></p><h2>Telegram群:</h2><p></p><p>黑果小兵的部落阁 <a href="http://t.me/daliansky" target="_blank">http://t.me/daliansky</a><br>黑果小兵的部落阁 #安装问题讨论 <a href="https://t.me/Hackintosh_Installer" target="_blank">https://t.me/Hackintosh_Installer</a></p><p></p><h2>淘宝店铺:</h2><p></p><p>黑果小兵的部落阁 <a href="https://hackintosher.taobao.com" target="_blank">https://hackintosher.taobao.com</a></p></div></ul></div></div><div><ul class="post-copyright"><li class="post-copyright-author"><strong>本文作者: </strong>黑果小兵</li><li class="post-copyright-link"><strong>本文链接:</strong> <a href="https://blog.daliansky.net/Intel-FB-Patcher-tutorial-and-insertion-pose.html" title="Hackintool(原Intel FB-Patcher)使用教程及插入姿势">https://blog.daliansky.net/Intel-FB-Patcher-tutorial-and-insertion-pose.html</a></li><li class="post-copyright-license"><strong>版权声明: </strong>本博客所有文章除特别声明外,均采用 <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/" rel="noopener" target="_blank"><i class="fa fa-fw fa-creative-commons"></i>BY-NC-SA</a> 许可协议。转载请注明出处!</li></ul></div><footer class="post-footer"><div class="post-tags"><a href="/tags/教程/" rel="tag"><i class="fa fa-tag"></i> 教程</a> <a href="/tags/FB/" rel="tag"><i class="fa fa-tag"></i> FB</a> <a href="/tags/patcher/" rel="tag"><i class="fa fa-tag"></i> patcher</a> <a href="/tags/framebuffer/" rel="tag"><i class="fa fa-tag"></i> framebuffer</a> <a href="/tags/帧缓冲/" rel="tag"><i class="fa fa-tag"></i> 帧缓冲</a> <a href="/tags/USB/" rel="tag"><i class="fa fa-tag"></i> USB</a> <a href="/tags/audio/" rel="tag"><i class="fa fa-tag"></i> audio</a> <a href="/tags/VRAM/" rel="tag"><i class="fa fa-tag"></i> VRAM</a></div><div class="post-nav"><div class="post-nav-next post-nav-item"><a href="/Add-CLOVER-boot-to-UEFI-without-any-tools.html" rel="next" title="不借助任何工具将CLOVER引导添加进UEFI的正确姿势"><i class="fa fa-chevron-left"></i> 不借助任何工具将CLOVER引导添加进UEFI的正确姿势</a></div><span class="post-nav-divider"></span><div class="post-nav-prev post-nav-item"><a href="/macOS-Mojave-10.14-18A391-official-version-with-Clover-4674-original-image.html" rel="prev" title="【黑果小兵】macOS Mojave 10.14 18A391 正式版 with Clover 4674原版镜像">【黑果小兵】macOS Mojave 10.14 18A391 正式版 with Clover 4674原版镜像 <i class="fa fa-chevron-right"></i></a></div></div></footer></div></article></div></div><div id="gitalk-container"></div></div><div class="sidebar-toggle"><div class="sidebar-toggle-line-wrap"><span class="sidebar-toggle-line sidebar-toggle-line-first"></span> <span class="sidebar-toggle-line sidebar-toggle-line-middle"></span> <span class="sidebar-toggle-line sidebar-toggle-line-last"></span></div></div><aside id="sidebar" class="sidebar"><div id="sidebar-dimmer"></div><div class="sidebar-inner"><ul class="sidebar-nav motion-element"><li class="sidebar-nav-toc sidebar-nav-active" data-target="post-toc-wrap">文章目录</li><li class="sidebar-nav-overview" data-target="site-overview-wrap">站点概览</li></ul><div class="site-overview-wrap sidebar-panel"><div class="site-overview"><div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person"><a href="/"><img class="site-author-image" itemprop="image" src="/images/avatar.png" alt="黑果小兵"></a><p class="site-author-name" itemprop="name">黑果小兵</p><p class="site-description motion-element" itemprop="description">黑果小兵</p></div><nav class="site-state motion-element"><div class="site-state-item site-state-posts"><a href="/archives/"><span class="site-state-item-count">127</span> <span class="site-state-item-name">日志</span></a></div><div class="site-state-item site-state-categories"><a href="/categories/index.html"><span class="site-state-item-count">26</span> <span class="site-state-item-name">分类</span></a></div><div class="site-state-item site-state-tags"><a href="/tags/index.html"><span class="site-state-item-count">289</span> <span class="site-state-item-name">标签</span></a></div></nav><div class="feed-link motion-element"><a href="/atom.xml" rel="alternate"><i class="fa fa-rss"></i> RSS</a></div><div class="links-of-author motion-element"><span class="links-of-author-item"><a href="https://github.com/daliansky" title="GitHub → https://github.com/daliansky" rel="noopener" target="_blank"><i class="fa fa-fw fa-github"></i></a> </span><span class="links-of-author-item"><a href="http://www.jianshu.com/u/df9143008845" title="简书 → http://www.jianshu.com/u/df9143008845" rel="noopener" target="_blank"><i class="fa fa-fw fa-heartbeat"></i></a> </span><span class="links-of-author-item"><a href="http://shang.qq.com/wpa/qunwpa?idkey=db511a29e856f37cbb871108ffa77a6e79dde47e491b8f2c8d8fe4d3c310de91" title="QQ → http://shang.qq.com/wpa/qunwpa?idkey=db511a29e856f37cbb871108ffa77a6e79dde47e491b8f2c8d8fe4d3c310de91" rel="noopener" target="_blank"><i class="fa fa-fw fa-qq"></i></a></span></div><div class="links-of-blogroll motion-element links-of-blogroll-block"><div class="links-of-blogroll-title"><i class="fa fa-fw fa-link"></i> Links</div><ul class="links-of-blogroll-list"><li class="links-of-blogroll-item"><a href="https://blog.tlhub.cn" title="https://blog.tlhub.cn" rel="noopener" target="_blank">Athlonreg</a></li><li class="links-of-blogroll-item"><a href="http://www.sqlsec.com" title="http://www.sqlsec.com" rel="noopener" target="_blank">国光</a></li></ul></div></div></div><div class="post-toc-wrap motion-element sidebar-panel sidebar-panel-active"><div class="post-toc"><div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-2"><a class="nav-link" href="#警告"><span class="nav-number">1.</span> <span class="nav-text">警告</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#功能"><span class="nav-number">2.</span> <span class="nav-text">功能</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#声卡修补"><span class="nav-number">3.</span> <span class="nav-text">声卡修补</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#显示器-edid-修补"><span class="nav-number">4.</span> <span class="nav-text">显示器 EDID 修补</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#安装"><span class="nav-number">4.1.</span> <span class="nav-text">安装</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#额外信息"><span class="nav-number">4.2.</span> <span class="nav-text">额外信息</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#工具栏"><span class="nav-number">5.</span> <span class="nav-text">工具栏</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#定制usb"><span class="nav-number">6.</span> <span class="nav-text">定制USB</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#usb定制视频教程"><span class="nav-number">6.1.</span> <span class="nav-text">USB定制视频教程</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#核心功能给缓冲帧打补丁"><span class="nav-number">7.</span> <span class="nav-text">核心功能:给缓冲帧打补丁</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#初步动作"><span class="nav-number">7.1.</span> <span class="nav-text">初步动作</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#使用方法"><span class="nav-number">7.2.</span> <span class="nav-text">使用方法</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#几个例子请您举一反三"><span class="nav-number">7.3.</span> <span class="nav-text">几个例子:(请您举一反三)</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#各种主板补丁示例集合"><span class="nav-number">7.4.</span> <span class="nav-text">各种主板补丁示例集合</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#fb视频教程"><span class="nav-number">7.5.</span> <span class="nav-text">FB视频教程</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#使用hackintool工具的序列号生成器生成全新的序列号及注入三码教程"><span class="nav-number">8.</span> <span class="nav-text">使用Hackintool工具的序列号生成器生成全新的序列号及注入三码教程</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#更新日志"><span class="nav-number">9.</span> <span class="nav-text">更新日志</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#下载链接"><span class="nav-number">10.</span> <span class="nav-text">下载链接</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#扩展阅读"><span class="nav-number">11.</span> <span class="nav-text">扩展阅读</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#感谢名单"><span class="nav-number">12.</span> <span class="nav-text">感谢名单</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#参考及引用"><span class="nav-number">13.</span> <span class="nav-text">参考及引用:</span></a></li></ol></div></div></div></div></aside></div></main><footer id="footer" class="footer"><div class="footer-inner"><div class="copyright"><a href="http://www.beian.miit.gov.cn" rel="noopener" target="_blank">辽ICP备15000696号-3 </a>© 2016 – <span itemprop="copyrightYear">2024</span> <span class="with-love" id="animate"><i class="fa fa-apple"></i> </span><span class="author" itemprop="copyrightHolder">黑果小兵</span> <span class="post-meta-divider">|</span> <span class="post-meta-item-icon"><i class="fa fa-area-chart"></i> </span><span title="站点总字数">859k</span> <span class="post-meta-divider">|</span> <span class="post-meta-item-icon"><i class="fa fa-coffee"></i> </span><span title="站点阅读时长">26:03</span></div><div class="busuanzi-count"><script async src="//busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js"></script><span class="site-uv" title="总访客量"><i class="fa fa-user"></i> <span class="busuanzi-value" id="busuanzi_value_site_uv"></span> </span><span class="site-pv" title="总访问量"><i class="fa fa-eye"></i> <span class="busuanzi-value" id="busuanzi_value_site_pv"></span></span></div></div></footer><div class="back-to-top"><i class="fa fa-arrow-up"></i> <span id="scrollpercent"><span>0</span>%</span></div></div><script>"[object Function]"!==Object.prototype.toString.call(window.Promise)&&(window.Promise=null)</script><script src="/lib/jquery/index.js?v=2.1.3"></script><script src="/lib/velocity/velocity.min.js?v=1.2.1"></script><script src="/lib/velocity/velocity.ui.min.js?v=1.2.1"></script><script src="https://fastly.jsdelivr.net/npm/@fancyapps/[email protected]/dist/jquery.fancybox.min.js"></script><script src="//fastly.jsdelivr.net/gh/theme-next/[email protected]/reading_progress.min.js"></script><script src="/js/src/utils.js?v=6.6.0"></script><script src="/js/src/motion.js?v=6.6.0"></script><script src="/js/src/scrollspy.js?v=6.6.0"></script><script src="/js/src/post-details.js?v=6.6.0"></script><script src="/js/src/bootstrap.js?v=6.6.0"></script><script src="//fastly.jsdelivr.net/npm/[email protected]/dist/gitalk.min.js"></script><link rel="stylesheet" href="//fastly.jsdelivr.net/npm/[email protected]/dist/gitalk.css"><script src="//fastly.jsdelivr.net/npm/[email protected]/src/md5.min.js"></script><script>var gitalk=new Gitalk({clientID:"0da3e792a21a77938da6",clientSecret:"4d2869563000629ee6dbed48fbbf878aea151cb6",repo:"daliansky.github.io",owner:"daliansky",admin:["daliansky"],id:md5(location.pathname),distractionFreeMode:"true",proxy:"https://gitalk.daliansky.workers.dev/?https://github.com/login/oauth/access_token"});gitalk.render("gitalk-container")</script><script>// Popup Window;
var isfetched = false;
var isXml = true;
// Search DB path;
var search_path = "search.xml";
if (search_path.length === 0) {
search_path = "search.xml";
} else if (/json$/i.test(search_path)) {
isXml = false;
}
var path = "/" + search_path;
// monitor main search box;
var onPopupClose = function (e) {
$('.popup').hide();
$('#local-search-input').val('');
$('.search-result-list').remove();
$('#no-result').remove();
$(".local-search-pop-overlay").remove();
$('body').css('overflow', '');
}
function proceedsearch() {
$("body")
.append('<div class="search-popup-overlay local-search-pop-overlay"></div>')
.css('overflow', 'hidden');
$('.search-popup-overlay').click(onPopupClose);
$('.popup').toggle();
var $localSearchInput = $('#local-search-input');
$localSearchInput.attr("autocapitalize", "none");
$localSearchInput.attr("autocorrect", "off");
$localSearchInput.focus();
}
// search function;
var searchFunc = function(path, search_id, content_id) {
'use strict';
// start loading animation
$("body")
.append('<div class="search-popup-overlay local-search-pop-overlay">' +
'<div id="search-loading-icon">' +
'<i class="fa fa-spinner fa-pulse fa-5x fa-fw"></i>' +
'</div>' +
'</div>')
.css('overflow', 'hidden');
$("#search-loading-icon").css('margin', '20% auto 0 auto').css('text-align', 'center');
$.ajax({
url: path,
dataType: isXml ? "xml" : "json",
async: true,
success: function(res) {
// get the contents from search data
isfetched = true;
$('.popup').detach().appendTo('.header-inner');
var datas = isXml ? $("entry", res).map(function() {
return {
title: $("title", this).text(),
content: $("content",this).text(),
url: $("url" , this).text()
};
}).get() : res;
var input = document.getElementById(search_id);
var resultContent = document.getElementById(content_id);
var inputEventFunction = function() {
var searchText = input.value.trim().toLowerCase();
var keywords = searchText.split(/[\s\-]+/);
if (keywords.length > 1) {
keywords.push(searchText);
}
var resultItems = [];
if (searchText.length > 0) {
// perform local searching
datas.forEach(function(data) {
var isMatch = false;
var hitCount = 0;
var searchTextCount = 0;
var title = data.title.trim();
var titleInLowerCase = title.toLowerCase();
var content = data.content.trim().replace(/<[^>]+>/g,"");
var contentInLowerCase = content.toLowerCase();
var articleUrl = decodeURIComponent(data.url);
var indexOfTitle = [];
var indexOfContent = [];
// only match articles with not empty titles
if(title != '') {
keywords.forEach(function(keyword) {
function getIndexByWord(word, text, caseSensitive) {
var wordLen = word.length;
if (wordLen === 0) {
return [];
}
var startPosition = 0, position = [], index = [];
if (!caseSensitive) {
text = text.toLowerCase();
word = word.toLowerCase();
}
while ((position = text.indexOf(word, startPosition)) > -1) {
index.push({position: position, word: word});
startPosition = position + wordLen;
}
return index;
}
indexOfTitle = indexOfTitle.concat(getIndexByWord(keyword, titleInLowerCase, false));
indexOfContent = indexOfContent.concat(getIndexByWord(keyword, contentInLowerCase, false));
});
if (indexOfTitle.length > 0 || indexOfContent.length > 0) {
isMatch = true;
hitCount = indexOfTitle.length + indexOfContent.length;
}
}
// show search results
if (isMatch) {
// sort index by position of keyword
[indexOfTitle, indexOfContent].forEach(function (index) {
index.sort(function (itemLeft, itemRight) {
if (itemRight.position !== itemLeft.position) {
return itemRight.position - itemLeft.position;
} else {
return itemLeft.word.length - itemRight.word.length;
}
});
});
// merge hits into slices
function mergeIntoSlice(text, start, end, index) {
var item = index[index.length - 1];
var position = item.position;
var word = item.word;
var hits = [];
var searchTextCountInSlice = 0;
while (position + word.length <= end && index.length != 0) {
if (word === searchText) {
searchTextCountInSlice++;
}
hits.push({position: position, length: word.length});
var wordEnd = position + word.length;
// move to next position of hit
index.pop();
while (index.length != 0) {
item = index[index.length - 1];
position = item.position;
word = item.word;
if (wordEnd > position) {
index.pop();
} else {
break;
}
}
}
searchTextCount += searchTextCountInSlice;
return {
hits: hits,
start: start,
end: end,
searchTextCount: searchTextCountInSlice
};
}
var slicesOfTitle = [];
if (indexOfTitle.length != 0) {
slicesOfTitle.push(mergeIntoSlice(title, 0, title.length, indexOfTitle));
}
var slicesOfContent = [];
while (indexOfContent.length != 0) {
var item = indexOfContent[indexOfContent.length - 1];
var position = item.position;
var word = item.word;
// cut out 100 characters
var start = position - 20;
var end = position + 80;
if(start < 0){
start = 0;
}
if (end < position + word.length) {
end = position + word.length;
}
if(end > content.length){
end = content.length;
}
slicesOfContent.push(mergeIntoSlice(content, start, end, indexOfContent));
}
// sort slices in content by search text's count and hits' count
slicesOfContent.sort(function (sliceLeft, sliceRight) {
if (sliceLeft.searchTextCount !== sliceRight.searchTextCount) {
return sliceRight.searchTextCount - sliceLeft.searchTextCount;
} else if (sliceLeft.hits.length !== sliceRight.hits.length) {
return sliceRight.hits.length - sliceLeft.hits.length;
} else {
return sliceLeft.start - sliceRight.start;
}
});
// select top N slices in content
var upperBound = parseInt('1');
if (upperBound >= 0) {
slicesOfContent = slicesOfContent.slice(0, upperBound);
}
// highlight title and content
function highlightKeyword(text, slice) {
var result = '';
var prevEnd = slice.start;
slice.hits.forEach(function (hit) {
result += text.substring(prevEnd, hit.position);
var end = hit.position + hit.length;
result += '<b class="search-keyword">' + text.substring(hit.position, end) + '</b>';
prevEnd = end;
});
result += text.substring(prevEnd, slice.end);
return result;
}
var resultItem = '';
if (slicesOfTitle.length != 0) {
resultItem += "<li><a href='" + articleUrl + "' class='search-result-title'>" + highlightKeyword(title, slicesOfTitle[0]) + "</a>";
} else {
resultItem += "<li><a href='" + articleUrl + "' class='search-result-title'>" + title + "</a>";
}
slicesOfContent.forEach(function (slice) {
resultItem += "<a href='" + articleUrl + "'>" +
"<p class=\"search-result\">" + highlightKeyword(content, slice) +
"...</p>" + "</a>";
});
resultItem += "</li>";
resultItems.push({
item: resultItem,
searchTextCount: searchTextCount,
hitCount: hitCount,
id: resultItems.length
});
}
})
};
if (keywords.length === 1 && keywords[0] === "") {
resultContent.innerHTML = '<div id="no-result"><i class="fa fa-search fa-5x" /></div>'
} else if (resultItems.length === 0) {
resultContent.innerHTML = '<div id="no-result"><i class="fa fa-frown-o fa-5x" /></div>'
} else {
resultItems.sort(function (resultLeft, resultRight) {
if (resultLeft.searchTextCount !== resultRight.searchTextCount) {
return resultRight.searchTextCount - resultLeft.searchTextCount;
} else if (resultLeft.hitCount !== resultRight.hitCount) {
return resultRight.hitCount - resultLeft.hitCount;
} else {
return resultRight.id - resultLeft.id;
}
});
var searchResultList = '<ul class=\"search-result-list\">';
resultItems.forEach(function (result) {
searchResultList += result.item;
})
searchResultList += "</ul>";
resultContent.innerHTML = searchResultList;
}
}
if ('auto' === 'auto') {
input.addEventListener('input', inputEventFunction);
} else {
$('.search-icon').click(inputEventFunction);
input.addEventListener('keypress', function (event) {
if (event.keyCode === 13) {
inputEventFunction();
}
});
}
// remove loading animation
$(".local-search-pop-overlay").remove();
$('body').css('overflow', '');
proceedsearch();
}
});
}
// handle and trigger popup window;
$('.popup-trigger').click(function(e) {
e.stopPropagation();
if (isfetched === false) {
searchFunc(path, 'local-search-input', 'local-search-result');
} else {
proceedsearch();
};
});
$('.popup-btn-close').click(onPopupClose);
$('.popup').click(function(e){
e.stopPropagation();
});
$(document).on('keyup', function (event) {
var shouldDismissSearchPopup = event.which === 27 &&
$('.search-popup').is(':visible');
if (shouldDismissSearchPopup) {
onPopupClose();
}
});</script><script src="/js/src/js.cookie.js?v=6.6.0"></script><script src="/js/src/scroll-cookie.js?v=6.6.0"></script><script src="/live2dw/lib/L2Dwidget.min.js?094cbace49a39548bed64abff5988b05"></script><script>L2Dwidget.init({pluginRootPath:"live2dw/",pluginJsPath:"lib/",pluginModelPath:"assets/",model:{scale:1.2,hHeadPos:.5,vHeadPos:.618,jsonPath:"/live2dw/assets/tororo.model.json"},display:{superSample:2,width:150,height:300,position:"right",hOffset:0,vOffset:-20},mobile:{show:!1,scale:.5},react:{opacityDefault:.7,opacityOnHover:.2},log:!1,tagMode:!1})</script></body></html>