-
Notifications
You must be signed in to change notification settings - Fork 83
Description
Hi @Lanchon ,
I recently got reports for haruka not being able to apply signature spoofing patch.
My module uses dex2oat on the device with specific flags to avoid compiling oat files that might make the device bootloop.
Unfortunately, it seems like on some roms (mainly A15), dex2oat fails with hard verification errors.
I checked everything I could to conclude it to being dexpatcher's fault
Here are the logs
shomykohai/haruka#3 (comment)
The injection itself works flawlessly, but the written dex files contain issues that make them invalid and prone to bootloops.
That said, I was wondering if you have any idea what the specific issue could be, and if you will continue development on dexpatcher, because the tool itself is really handy and powerful and enjoyable for stuff like this, and it would be sad if I had to switch tool 😅
Hope that a solution can be found, and thanks again for your amazing tool!