Kernel patched, meens you edited the binary code to disable the cap erase function ? Is your kernel reported as safe when tested by the different brick bug check tools?
Using Tapatalk2 on my amazing GT-I9100
It was patched using binary code, no recompile from source. I think that Tungstwenty contributed to the xiaolu script. Since I am using it to path the kernel, as mentioned in the credits, it should be safe. Now, of course, this is not 100% bullet shield proof as when you edit and compile from source code, since we patch a given binary check. However, it is the way Tungstwenty made it, and is working for all actual kernels. Also, using CWM6 adds to the security as it is not affected by the brick bug as far as I know.
Phil first of all thank you very much for your work.
I would like to ask you is it possible to decrease font size in CWM6 recovery. Because msgs are going out of screen and navigation is a bit difficult.
Koush is the only one I know that can do it. He created CWM
when I try to root via odin it writes this: MD5 hash value is invalid
PhilZ-XWLPX-(NEE)-cwm6-1.0.tar.md5 is invalid . any solution ?
Strange, I tested it in odin before uploading. If others confirm the md5 check is bad, I will upload again