Complete root patching support for macOS Tahoe 26.0 (25A5316i) through macOS 26.4 (25E5233c) and beyond. This fork ensures that legacy hardware remains compatible with the latest Darwin 25 kernel.
Restores full functionality for Broadcom-based wireless chipsets (BCM4360 and similar):
- Wi-Fi: Stable connectivity on 2.4GHz and 5GHz bands.
- AirDrop & Handoff: Fully synchronized frameworks to ensure seamless file sharing and continuity features between devices.
- AirPlay: Restored support for streaming to and from your Mac.
Starting with macOS Tahoe Beta 2, Apple removed the legacy AppleHDA.kext. This patch set brings it back, ensuring built-in audio works on supported legacy systems.
- Manual Toggle: A new "Modern Audio" toggle in the Root Patches menu allows you to enable or disable this restoration manually.
- KDK Integration: Automatically handles the necessary Kernel Debug Kit (KDK) requirements for audio driver linking.
- APFS-Only Environment: Adapted the patching logic to handle the removal of HFS+ in macOS 26.4. The patcher now utilizes APFS for all internal resource mounting and operations.
Elevated hdiutil Permissions: Fixed a critical issue where macOS 26.4 disallowed mounting disk images without root privileges.
The patcher now correctly escalates via the Privileged Helper Tool.
- AMFI Alert: To successfully bypass Apple Mobile file integrity checks, you must use either AMFIPass.kext with the
-amfipassbetaboot argument oramfi=0x80. You can also use both together. - Note: If third-party browsers (e.g., Firefox) or camera/mic permissions fail while using
amfi=0x80, try adding theipc_control_port_options=0parameter to your boot arguments. - SIP Requirements: System Integrity Protection must be set properly.
- Typical Value: (CSR_ALLOW_UNTRUSTED_KEXTS | CSR_ALLOW_UNRESTRICTED_FS).
- OpenCore config.plist: NVRAM > Add > 7C436110-AB2A-4BBB-A880-FE41995C9F82 > csr-active-config (data) <03080000>.
- Clover config.plist: Set RtVariables > CsrActiveConfig (string) 0x803.
- Secure Boot Model: To allow root patching for Wi-Fi and other drivers, Apple Secure Boot must be disabled.
- OpenCore: Set Misc > Security > SecureBootModel to Disabled.
Clover: Ensure RtVariables > HWTarget is NOT set (must be empty) or commented out (e.g., HWTarget?) to keep Apple Secure Boot inactive.
To ensure these new security settings (SIP, AMFI, and Secure Boot) take effect, you MUST perform a Reset NVRAM after saving your config.plist. OpenCore: Select "Reset NVRAM" from the boot picker menu (or press Space if it's hidden). Clover: Press F11 at the boot screen to clear NVRAM and restart.
💡 Before Running Post-Install Patches:
- KDK is mandatory: For macOS 13 through Tahoe (26.x), the Kernel Debug Kit must be installed for drivers like AppleHDA to link correctly. Use the Help > Download KDK button.
- Patcher Resources: This version relies on the YBronst PatcherSupportPkg for native Tahoe binaries.
Important: Please be aware that if this resource becomes unavailable for any reason (e.g., server downtime or repository removal), the OCLP-3.1.7 Tahoe Patch Set will lose its ability to fetch the necessary binaries, and root patching will fail.
- Acidanthera (OpenCorePkg, Lilu, etc.)
- Dortania Team (Original OCLP authors)
- lzhoang2801 (Original Tahoe patchset)
- CloverHackyColor (Hackintosh essentials and beyond)
- YBronst (Developer and optimizer of tools for macOS Tahoe26.x)
- Full list of OCLP contributors can be found in the original repository.
This is an experimental Project intended for advanced users and complex Hackintosh/Legacy Mac configurations. Use at your own risk.
Community Discussion: InsanelyMac Thread
