Damn, you guys are getting annoying with the questions about MIUI 14, this question is fucking stupid, since there is an answer in the discussion thread on XDA in the FAQ section, this problem has been solved for a long time, even when nobody knew about it, and if you are too stupid to understand, just go fuck yourself!
🤦♂🤦♂🤦♂😡😡😡‼️‼️🤬🤬🤬🤬
Or ask this dumb question to lebigmac, this dumb question is worthy of such a developer, since she still doesn't know what's going on, don't know with her together
https://forum.xda-developers.com/t/noscript-ro2rw-pec2rw-erofs2rw-universal-partition-expander-and-converting-to-rw.4521131/
🤦♂🤦♂🤦♂😡😡😡‼️‼️🤬🤬🤬🤬
Or ask this dumb question to lebigmac, this dumb question is worthy of such a developer, since she still doesn't know what's going on, don't know with her together
https://forum.xda-developers.com/t/noscript-ro2rw-pec2rw-erofs2rw-universal-partition-expander-and-converting-to-rw.4521131/
XDA Forums
[MAGISK][TWRP][ARM32/64][A8+]Universal Read Only to Read Write for...
Read Only to Read Write for android (RO2RW)
Update 03.01.2023 : Stable Beta v 3.7.2.1
The first truly working noscript, original and unique in its logic for all devices with a SUPER partition...
Update 03.01.2023 : Stable Beta v 3.7.2.1
The first truly working noscript, original and unique in its logic for all devices with a SUPER partition...
👍9😁2👏1🤬1🕊1
soon new dfe method:
- Not needed RW
- Not needed Magisk
- Not needed Reflash after flashing new recovery
- It is not necessary to have TWRP
- Only need reflash after flashing new ROM or Update ROM
- Not needed RW
- Not needed Magisk
- Not needed Reflash after flashing new recovery
- It is not necessary to have TWRP
- Only need reflash after flashing new ROM or Update ROM
🔥30❤4👍3⚡1👏1
Preparing for the new RO2RW and DFE, manual instructions, use a translator to translate the text
https://telegra.ph/Podgotovka-RO2RW-i-DFE-03-04
https://telegra.ph/Podgotovka-RO2RW-i-DFE-03-04
Telegraph
Подготовка RO2RW и DFE
Для чего нужна подготовка? Для новой методики DFE я использую часть памяти вариант 3 из этой статьи https://telegra.ph/Example-resize-SUPER-01-16, а так же это понадобится для новой версии ro2rw, мы сможем использовать пространство для раздела, который не вмещается в…
❤4👎2
Only for ARM64 at the moment
Preliminary preparation for the new RO2RW, and the new DFE method! you can do it now, thus preparing your device for further automatic noscripts from me. This preparation will be needed if:
Your ROM is too big and won't fit in the super partition after converting to RW
You will want to use the new DFE method which will not need magisk and will also work on ROMs that have RO status
If you want to take part in tests and community development in this direction
If you want to read about what the noscript does and how to do it manually, you can go to this link
https://telegra.ph/Podgotovka-RO2RW-i-DFE-03-04
ZIP - https://news.1rj.ru/str/mfpupdate/130
Steps to work with this zip file via booted android:
1. Backup you data and internal storage, and transfer it on you PC or external storage
2. Flash .zip via magisk like module, waiting complite
3. Reboot device into recovery
4. if you have custom recovery (TWRP/OFOX) go to terminal and write command "format_data"
5. if you have stock recovery , reboot to recovery and do factory reset
Steps to work with this zip file via TWRP:
1. Backup you data and internal storage, and transfer it on you PC or external storage
2. Flash zip
3. reboot TWRP
4. Go to terminal and write command "format_data"
Preliminary preparation for the new RO2RW, and the new DFE method! you can do it now, thus preparing your device for further automatic noscripts from me. This preparation will be needed if:
Your ROM is too big and won't fit in the super partition after converting to RW
You will want to use the new DFE method which will not need magisk and will also work on ROMs that have RO status
If you want to take part in tests and community development in this direction
If you want to read about what the noscript does and how to do it manually, you can go to this link
https://telegra.ph/Podgotovka-RO2RW-i-DFE-03-04
ZIP - https://news.1rj.ru/str/mfpupdate/130
Steps to work with this zip file via booted android:
1. Backup you data and internal storage, and transfer it on you PC or external storage
2. Flash .zip via magisk like module, waiting complite
3. Reboot device into recovery
4. if you have custom recovery (TWRP/OFOX) go to terminal and write command "format_data"
5. if you have stock recovery , reboot to recovery and do factory reset
Steps to work with this zip file via TWRP:
1. Backup you data and internal storage, and transfer it on you PC or external storage
2. Flash zip
3. reboot TWRP
4. Go to terminal and write command "format_data"
Telegraph
Подготовка RO2RW и DFE
Для чего нужна подготовка? Для новой методики DFE я использую часть памяти вариант 3 из этой статьи https://telegra.ph/Example-resize-SUPER-01-16, а так же это понадобится для новой версии ro2rw, мы сможем использовать пространство для раздела, который не вмещается в…
👍8❤3🥰1
Release Announcement for dfe-neo 2.2.0 Beta
I am thrilled to present the latest version of dfe-neo, version 2.2.0 beta. In this release, significant improvements have been made compared to version 2.1.0, especially in the neo_inject image handler. Additionally, the fstab patching function has been reworked, now without any bugs.
Key Changes Compared to Version 1.5.x:
* NEO.config File Enhancements:
* New options added: remove_pin, wipe_data, where_to_inject, path_to_inject, magisk.
* Removed options such as hide_not_encrypted, fix_120hz_for_miui, safatynetfix due to the implementation of a new fstab injection method.
Revolutionary Injection Method:
* The new injection method completely eliminates dependency on magiskinit, making dfe-neo a fully standalone product.
* dfe-neo is now compatible with read-only systems, supports both A-only and AB devices, and seamlessly integrates with both KSU and MAGISK without requiring root access from either.
How the New Method Works:
1. The noscript locates the vendor partition and moves all files from /vendor/etc/init/hw/* to a new directory.
2. Modifying a Line in init.target.rc in initrd.img to Redirect the Path for the New fstab during Late Mount:.
3. Injects the modified fstab into the same new directory.
4. Writes this directory to super or the inactive vendor_boot or boot slot, depending on user choice.
5. Modifies fstab in vendor_boot and boot to indicate a new mount point during the fist_stage_mount stage, enabling the mounting of replaced files from the new partition into the original /vendor/etc/init/hw.
Installation and Update Instructions:
*First Installation (Device Encrypted):*
1. Enter TWRP.
2. Install DFE-NEO.ZIP.
3. Perform a data format (format data) with confirmation.
4. Reboot into the system.
*First Installation with New Firmware (Device Encrypted):*
1. Install the new firmware.
2. Reinstall TWRP.
3. Reboot into TWRP.
4. Flash DFE-NEO.
5. Perform a data format (format data) with confirmation.
6. Reboot into the system.
*Firmware Update (Device Already Decrypted):*
1. Install the new firmware.
2. Reinstall TWRP.
3. Reboot into TWRP.
4. Flash DFE-NEO.
5. Reboot into the system.
Please note that due to the new injection method, some features tied to magisk, such as hide_not_encrypted, are no longer available. Additionally, it is now necessary to reboot TWRP immediately after installing a new system image for AB devices.
Download Available on SourceForge: dfe-neo 2.2.0 Beta
I am thrilled to present the latest version of dfe-neo, version 2.2.0 beta. In this release, significant improvements have been made compared to version 2.1.0, especially in the neo_inject image handler. Additionally, the fstab patching function has been reworked, now without any bugs.
Key Changes Compared to Version 1.5.x:
* NEO.config File Enhancements:
* New options added: remove_pin, wipe_data, where_to_inject, path_to_inject, magisk.
* Removed options such as hide_not_encrypted, fix_120hz_for_miui, safatynetfix due to the implementation of a new fstab injection method.
Revolutionary Injection Method:
* The new injection method completely eliminates dependency on magiskinit, making dfe-neo a fully standalone product.
* dfe-neo is now compatible with read-only systems, supports both A-only and AB devices, and seamlessly integrates with both KSU and MAGISK without requiring root access from either.
How the New Method Works:
1. The noscript locates the vendor partition and moves all files from /vendor/etc/init/hw/* to a new directory.
2. Modifying a Line in init.target.rc in initrd.img to Redirect the Path for the New fstab during Late Mount:.
3. Injects the modified fstab into the same new directory.
4. Writes this directory to super or the inactive vendor_boot or boot slot, depending on user choice.
5. Modifies fstab in vendor_boot and boot to indicate a new mount point during the fist_stage_mount stage, enabling the mounting of replaced files from the new partition into the original /vendor/etc/init/hw.
Installation and Update Instructions:
*First Installation (Device Encrypted):*
1. Enter TWRP.
2. Install DFE-NEO.ZIP.
3. Perform a data format (format data) with confirmation.
4. Reboot into the system.
*First Installation with New Firmware (Device Encrypted):*
1. Install the new firmware.
2. Reinstall TWRP.
3. Reboot into TWRP.
4. Flash DFE-NEO.
5. Perform a data format (format data) with confirmation.
6. Reboot into the system.
*Firmware Update (Device Already Decrypted):*
1. Install the new firmware.
2. Reinstall TWRP.
3. Reboot into TWRP.
4. Flash DFE-NEO.
5. Reboot into the system.
Please note that due to the new injection method, some features tied to magisk, such as hide_not_encrypted, are no longer available. Additionally, it is now necessary to reboot TWRP immediately after installing a new system image for AB devices.
Download Available on SourceForge: dfe-neo 2.2.0 Beta
sourceforge.net
Multi Functions Program - Browse /DFE-NEO at SourceForge.net
Read Only to Read Write for android…
❤6👍6🥰3🤔2
Download Available on SourceForge: dfe-neo 2.2.1 Beta
Cleaned up the code.
Added language files. Available in 4 languages.
Cleaned up the code.
Added language files. Available in 4 languages.
👍5🔥2❤1🥰1
I’ll now think about how to implement support for external noscripts in order to return functionality to dfe-neo. there are difficulties in selinux, but I understood something, I will test it this weekend
❤7❤🔥1🥰1
RO2RW/DFE-NEO Update/News
I’ll now think about how to implement support for external noscripts in order to return functionality to dfe-neo. there are difficulties in selinux, but I understood something, I will test it this weekend
Okay, I can return functionality like hiding without encryption, or the miui hz fix, or the partial safety-net fix, but all this will only work if magisk or ksu is installed. disabling encryption will still work without ksu/magisk. It'll do?
Anonymous Poll
87%
Yes
13%
Bruh
👍1
RO2RW/DFE-NEO Update/News
Photo
DFE-NEO 2.3.0 Update Announcement / Объявление об обновлении DFE-NEO 2.3.0 / Pengumuman Pembaruan DFE-NEO 2.3.0 / DFE-NEO 2.3.0 更新公告
Release Highlights / Основные моменты релиза / Sorotan Rilis / 发布亮点:
Self-Patching Fstab Configuration / Настройка самостоятельного патчинга fstab / Konfigurasi Fstab Pembenahan Diri / 自我修复 fstab 配置:
Numerous code changes have been made to support independent configuration of fstab patching.
Внесено много изменений в коде для поддержки самостоятельной настройки патчинга fstab.
Banyak perubahan kode telah dilakukan untuk mendukung konfigurasi fstab yang independen.
通过大量代码更改支持独立配置 fstab 补丁。
New Options: dfe_patterns and modify_early_mount / Новые опции: dfe_patterns и modify_early_mount / Opsi Baru: dfe_patterns dan modify_early_mount / 新选项:dfe_patterns 和 modify_early_mount:
Two new options, dfe_patterns and modify_early_mount, have been introduced.
Были добавлены две новые опции: dfe_patterns и modify_early_mount.
Dua opsi baru, dfe_patterns dan modify_early_mount, telah ditambahkan.
引入了两个新选项:dfe_patterns 和 modify_early_mount。
Overlay Removal Support in Fstab / Поддержка удаления overlay в fstab / Dukungan Penghapusan Overlay dalam Fstab / fstab 中的叠加删除支持:
Support for overlay removal in fstab has been restored, thanks to the new modify_early_mount option.
Была возвращена поддержка удаления overlay в fstab благодаря новой опции modify_early_mount.
Dukungan untuk penghapusan overlay dalam fstab telah dipulihkan berkat opsi modify_early_mount yang baru.
由于新的 modify_early_mount 选项,已恢复了 fstab 中对叠加的删除支持。
Customize Fstab Patching Keys / Настройка ключей для патчинга fstab / Sesuaikan Kunci Pembenahan Fstab / 自定义 fstab 补丁键:
Users can now independently select keys for removal/replacement in fstab patching. (Only do this if you understand what you are doing.)
Теперь вы можете самостоятельно подбирать ключи для удаления/замены в патчинге fstab. (Делайте это только если понимаете что делать.)
Pengguna sekarang dapat secara independen memilih kunci untuk penghapusan/penggantian dalam pembenahan fstab. (Lakukan ini hanya jika Anda mengerti apa yang Anda lakukan.)
用户现在可以在 fstab 补丁中独立选择用于删除/替换的键。(只有在理解自己在做什么的情况下才这样做。)
New Commands in NEO.config / Новые команды в файле NEO.config / Perintah Baru dalam NEO.config / NEO.config 中的新命令:
Instructions for the new commands have been provided within the NEO.config file.
Инструкция к новым командам внутри файла NEO.config.
Instruksi untuk perintah baru telah disediakan dalam file NEO.config.
新命令的说明已在 NEO.config 文件中提供。
Please Note / Пожалуйста, обратите внимание / Harap Diperhatikan / 请注意:
Exercise caution when customizing fstab patching keys.
Действуйте осторожно при настройке ключей для патчинга fstab.
Berhati-hatilah saat menyesuaikan kunci pembenahan fstab.
在自定义 fstab 补丁键时要小心。
Download Available on SourceForge: dfe-neo 2.3.0
Release Highlights / Основные моменты релиза / Sorotan Rilis / 发布亮点:
Self-Patching Fstab Configuration / Настройка самостоятельного патчинга fstab / Konfigurasi Fstab Pembenahan Diri / 自我修复 fstab 配置:
Numerous code changes have been made to support independent configuration of fstab patching.
Внесено много изменений в коде для поддержки самостоятельной настройки патчинга fstab.
Banyak perubahan kode telah dilakukan untuk mendukung konfigurasi fstab yang independen.
通过大量代码更改支持独立配置 fstab 补丁。
New Options: dfe_patterns and modify_early_mount / Новые опции: dfe_patterns и modify_early_mount / Opsi Baru: dfe_patterns dan modify_early_mount / 新选项:dfe_patterns 和 modify_early_mount:
Two new options, dfe_patterns and modify_early_mount, have been introduced.
Были добавлены две новые опции: dfe_patterns и modify_early_mount.
Dua opsi baru, dfe_patterns dan modify_early_mount, telah ditambahkan.
引入了两个新选项:dfe_patterns 和 modify_early_mount。
Overlay Removal Support in Fstab / Поддержка удаления overlay в fstab / Dukungan Penghapusan Overlay dalam Fstab / fstab 中的叠加删除支持:
Support for overlay removal in fstab has been restored, thanks to the new modify_early_mount option.
Была возвращена поддержка удаления overlay в fstab благодаря новой опции modify_early_mount.
Dukungan untuk penghapusan overlay dalam fstab telah dipulihkan berkat opsi modify_early_mount yang baru.
由于新的 modify_early_mount 选项,已恢复了 fstab 中对叠加的删除支持。
Customize Fstab Patching Keys / Настройка ключей для патчинга fstab / Sesuaikan Kunci Pembenahan Fstab / 自定义 fstab 补丁键:
Users can now independently select keys for removal/replacement in fstab patching. (Only do this if you understand what you are doing.)
Теперь вы можете самостоятельно подбирать ключи для удаления/замены в патчинге fstab. (Делайте это только если понимаете что делать.)
Pengguna sekarang dapat secara independen memilih kunci untuk penghapusan/penggantian dalam pembenahan fstab. (Lakukan ini hanya jika Anda mengerti apa yang Anda lakukan.)
用户现在可以在 fstab 补丁中独立选择用于删除/替换的键。(只有在理解自己在做什么的情况下才这样做。)
New Commands in NEO.config / Новые команды в файле NEO.config / Perintah Baru dalam NEO.config / NEO.config 中的新命令:
Instructions for the new commands have been provided within the NEO.config file.
Инструкция к новым командам внутри файла NEO.config.
Instruksi untuk perintah baru telah disediakan dalam file NEO.config.
新命令的说明已在 NEO.config 文件中提供。
Please Note / Пожалуйста, обратите внимание / Harap Diperhatikan / 请注意:
Exercise caution when customizing fstab patching keys.
Действуйте осторожно при настройке ключей для патчинга fstab.
Berhati-hatilah saat menyesuaikan kunci pembenahan fstab.
在自定义 fstab 补丁键时要小心。
Download Available on SourceForge: dfe-neo 2.3.0
🔥2❤1🥰1🫡1
I'm trying to compile the lptools binary... I'll make a few changes to it, and then I can return the flash dfe function without having to restart twrp after installing the ROM
🥰3⚡2👍1
YESSS, DAMN IT!!! IT WORKS, REWORKED LPTOOLS WITH SLOT SELECTION! NOW I CAN IMPLEMENT FLASHING A NEW METHOD WITHOUT REBOOTING TWRP
🔥11🫡5👏3❤1🥰1🤩1
🚀 Exciting Update Incoming for dfe-neo! 🌟
Get ready for the upcoming dfe-neo update! Here's what's in store:
- New feature: Option to remove dfe
- Flash dfe without TWRP reboot after installing the new firmware
- Integration of user-selectable patches like safety-net-fix
- Future update: Ability to reflash recovery
- Coming soon: Enhanced manual config settings for greater user control, offering both automatic and customizable configurations. Stay tuned for a more detailed and user-friendly experience! 🛠️ @mfpupdate @pocof3dfe
Get ready for the upcoming dfe-neo update! Here's what's in store:
- New feature: Option to remove dfe
- Flash dfe without TWRP reboot after installing the new firmware
- Integration of user-selectable patches like safety-net-fix
- Future update: Ability to reflash recovery
- Coming soon: Enhanced manual config settings for greater user control, offering both automatic and customizable configurations. Stay tuned for a more detailed and user-friendly experience! 🛠️ @mfpupdate @pocof3dfe
🔥12🥰1😍1
RO2RW/DFE-NEO Update/News
YESSS, DAMN IT!!! IT WORKS, REWORKED LPTOOLS WITH SLOT SELECTION! NOW I CAN IMPLEMENT FLASHING A NEW METHOD WITHOUT REBOOTING TWRP
It's a fucking case, it's just some kind of fucked up thing. I had to FUCKING study this crap in order to rewrite the binary to suit my needs! I had to dig through a bunch of shit to understand what depends on what. I sat for TWO fucking days and thought about what is stored IN the FUCKING variable, where these functions come from simply because they are connected as third-party libraries from the android source. As soon as I finish it, I'll publish this damn code on github. because my binary will be able to subtly work with super sections and DM blocks. including with external super, with slots in super, THAT'S WHY THIS DEVELOPER COULD NOT DO THIS IMMEDIATELY?????? FUCKING FUCK
🙏5🫡5👍4👏1🎉1