🎉 新的 APatch 版本 10763 已发布 🎉
变更日志
将 KernelPatch 升级到 0.10.7
升级 java 和 rust 依赖项
修复兼容系统调用,现在支持 32 位 su 命令
缩小 apd 大小
删除有问题和多余的隐藏管理器功能
重新设计关于和模块屏幕 UI,感谢 SanmerDev MRepo 的设计
修复操作系统安装模块时出现错误2
切换到新的enableEdgeToEdge,删除accompanist/systemuicontroller
优化APatch安全模式
修复模块在线升级不起作用
重新设计排除修改功能
翻译已导入,感谢所有译者
更多优化和小改动
说明
新设计的排除模块修改了逻辑,从现在开始,已经被授予ROOT权限的应用程序不再支持排除,因为不符合正常使用场景的逻辑;默认情况下,模块将不再被排除,因为并非所有软件都会检查当前环境,这无疑给手机带来不必要的功耗和热量。您可以手动配置需要排除的应用程序。需要注意的是,如果是从0.10.7以下的KernelPatch版本升级而不是全新安装,则需要手动删除/data/adb/ap/package_config文件并在SuperUser屏幕上重新配置,否则会出现可能会出现BUG。
我们注意到,一些较旧的设备(主要是 Linux 内核版本低于 5 的设备)可能会遇到 SuperUser Screen 无限加载的情况,甚至某些应用程序可能无法使用 ROOT 权限。这是一个已知问题,目前正在调查中。
🎉 New APatch release 10763 is available 🎉
Changelog
Upgrade KernelPatch to 0.10.7
Upgrade java and rust dependences
Fix compat syscall, 32-bits su command is supported now
Shrink apd size
Remove buggy and redundant hide manager feature
Re-designed About and Module Screen UI, thanks to SanmerDev MRepo’s design
Fix os error 2 during installing modules
Switch to new enableEdgeToEdge, drop accompanist/systemuicontroller
Optimize APatch Safe Mode
Fix module online upgrade not working
Re-design exclude modifications feature
Translation imported, thanks to all translators
More optimizations and minor changes
Notes
The newly designed exclusion module modifies the logic, and from now on, applications that have already been granted ROOT permissions no longer support exclusion because it does not conform to the logic of normal usage scenarios; By default, modules will no longer be excluded because not all software will check the current environment, which undoubtedly brings unnecessary power consumption and heat to the phone. You can manually configure the applications that need to be excluded. It should be noted that if you are upgrading from a version of KernelPatch below 0.10.7 instead of a completely new installation, you need to manually delete the/data/adb/ap/package_config file and reconfigure it on the SuperUser screen, otherwise a BUG may be occurred.
We have noticed that some older devices (mainly those with Linux kernel versions less than 5) may experience unlimited loading of SuperUser Screen, and even some applications may not be able to use ROOT permissions. This is a known issue and is currently under investigation.