blob: f861fec46a754f96446bb8f15199ebe30505ef69 [file] [log] [blame]
Dees_Troya449a6f2013-04-07 17:50:11 -05001/*
bigbiff bigbiff34684ff2013-12-01 21:03:45 -05002 TWRP is free software: you can redistribute it and/or modify
3 it under the terms of the GNU General Public License as published by
4 the Free Software Foundation, either version 3 of the License, or
5 (at your option) any later version.
Dees_Troya449a6f2013-04-07 17:50:11 -05006
bigbiff bigbiff34684ff2013-12-01 21:03:45 -05007 TWRP is distributed in the hope that it will be useful,
8 but WITHOUT ANY WARRANTY; without even the implied warranty of
9 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 GNU General Public License for more details.
Dees_Troya449a6f2013-04-07 17:50:11 -050011
bigbiff bigbiff34684ff2013-12-01 21:03:45 -050012 You should have received a copy of the GNU General Public License
13 along with TWRP. If not, see <http://www.gnu.org/licenses/>.
Dees_Troya449a6f2013-04-07 17:50:11 -050014*/
15
16#include <stdio.h>
17#include <stdlib.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050018#include <string>
Dees_Troya449a6f2013-04-07 17:50:11 -050019#include <sys/stat.h>
20#include <sys/types.h>
21#include <time.h>
22#include <unistd.h>
Ethan Yonkerf9f99bc2014-12-29 09:10:34 -060023#include <signal.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050024#include "gui/twmsg.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050025
26#include "cutils/properties.h"
Ethan Yonker8373cfe2017-09-08 06:50:54 -050027#include "bootloader_message_twrp/include/bootloader_message_twrp/bootloader_message.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050028
29#ifdef ANDROID_RB_RESTART
30#include "cutils/android_reboot.h"
31#else
32#include <sys/reboot.h>
33#endif
34
35extern "C" {
36#include "gui/gui.h"
37}
Ethan Yonkerf1179622016-08-25 15:32:21 -050038#include "set_metadata.h"
Ethan Yonker74db1572015-10-28 12:44:49 -050039#include "gui/gui.hpp"
40#include "gui/pages.hpp"
41#include "gui/objects.hpp"
Dees_Troya449a6f2013-04-07 17:50:11 -050042#include "twcommon.h"
43#include "twrp-functions.hpp"
44#include "data.hpp"
45#include "partitions.hpp"
Mohd Faraz0d9a62e2020-02-20 00:10:26 +053046#ifdef __ANDROID_API_N__
47#include <android-base/strings.h>
48#else
49#include <base/strings.h>
50#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050051#include "openrecoveryscript.hpp"
52#include "variables.h"
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -040053#include "twrpAdbBuFifo.hpp"
bigbiff32cbabe2020-04-12 19:16:19 -040054#include "twrpApex.hpp"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050055#ifdef TW_USE_NEW_MINADBD
bigbiffd58ba182020-03-23 10:02:29 -040056// #include "minadbd/minadbd.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050057#else
58extern "C" {
Ethan Yonker84d61ce2017-05-10 16:11:35 -050059#include "minadbd21/adb.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050060}
61#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050062
Ethan Yonker8373cfe2017-09-08 06:50:54 -050063//extern int adb_server_main(int is_daemon, int server_port, int /* reply_fd */);
Ethan Yonker534d4e02016-08-26 10:05:03 -050064
Dees_Troya449a6f2013-04-07 17:50:11 -050065TWPartitionManager PartitionManager;
66int Log_Offset;
Ethan Yonker6277c792014-09-15 14:54:30 -050067bool datamedia;
Dees_Troya449a6f2013-04-07 17:50:11 -050068
69static void Print_Prop(const char *key, const char *name, void *cookie) {
70 printf("%s=%s\n", key, name);
71}
72
bigbiff7ba75002020-04-11 20:47:09 -040073static void Decrypt_Page(bool SkipDecryption, bool datamedia) {
74 // Offer to decrypt if the device is encrypted
75 if (DataManager::GetIntValue(TW_IS_ENCRYPTED) != 0) {
76 if (SkipDecryption) {
77 LOGINFO("Skipping decryption\n");
78 } else {
79 LOGINFO("Is encrypted, do decrypt page first\n");
80 if (gui_startPage("decrypt", 1, 1) != 0) {
81 LOGERR("Failed to start decrypt GUI page.\n");
82 } else {
83 // Check for and load custom theme if present
84 TWFunc::check_selinux_support();
85 gui_loadCustomResources();
86 }
87 }
88 } else if (datamedia) {
89 TWFunc::check_selinux_support();
90 if (tw_get_default_metadata(DataManager::GetSettingsStoragePath().c_str()) != 0) {
91 LOGINFO("Failed to get default contexts and file mode for storage files.\n");
92 } else {
93 LOGINFO("Got default contexts and file mode for storage files.\n");
94 }
95 }
96}
97
Dees_Troya449a6f2013-04-07 17:50:11 -050098int main(int argc, char **argv) {
99 // Recovery needs to install world-readable files, so clear umask
100 // set by init
101 umask(0);
102
103 Log_Offset = 0;
104
105 // Set up temporary log file (/tmp/recovery.log)
106 freopen(TMP_LOG_FILE, "a", stdout);
107 setbuf(stdout, NULL);
108 freopen(TMP_LOG_FILE, "a", stderr);
109 setbuf(stderr, NULL);
110
Ethan Yonkerf9f99bc2014-12-29 09:10:34 -0600111 signal(SIGPIPE, SIG_IGN);
112
Dees_Troya449a6f2013-04-07 17:50:11 -0500113 // Handle ADB sideload
114 if (argc == 3 && strcmp(argv[1], "--adbd") == 0) {
thatcc8ddca2015-01-03 01:59:36 +0100115 property_set("ctl.stop", "adbd");
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500116#ifdef TW_USE_NEW_MINADBD
Ethan Yonker8373cfe2017-09-08 06:50:54 -0500117 //adb_server_main(0, DEFAULT_ADB_PORT, -1); TODO fix this for android8
bigbiffd58ba182020-03-23 10:02:29 -0400118 // minadbd_main();
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500119#else
Dees_Troya449a6f2013-04-07 17:50:11 -0500120 adb_main(argv[2]);
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500121#endif
Dees_Troya449a6f2013-04-07 17:50:11 -0500122 return 0;
123 }
124
Ethan Yonker6277c792014-09-15 14:54:30 -0500125#ifdef RECOVERY_SDCARD_ON_DATA
126 datamedia = true;
127#endif
128
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200129 char crash_prop_val[PROPERTY_VALUE_MAX];
130 int crash_counter;
131 property_get("twrp.crash_counter", crash_prop_val, "-1");
132 crash_counter = atoi(crash_prop_val) + 1;
133 snprintf(crash_prop_val, sizeof(crash_prop_val), "%d", crash_counter);
134 property_set("twrp.crash_counter", crash_prop_val);
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400135 property_set("ro.twrp.boot", "1");
136 property_set("ro.twrp.version", TW_VERSION_STR);
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200137
Dees_Troya449a6f2013-04-07 17:50:11 -0500138 time_t StartupTime = time(NULL);
that0e2140e2016-08-10 21:04:26 +0200139 printf("Starting TWRP %s-%s on %s (pid %d)\n", TW_VERSION_STR, TW_GIT_REVISION, ctime(&StartupTime), getpid());
Dees_Troya449a6f2013-04-07 17:50:11 -0500140
141 // Load default values to set DataManager constants and handle ifdefs
142 DataManager::SetDefaultValues();
that0e2140e2016-08-10 21:04:26 +0200143 printf("Starting the UI...\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500144 gui_init();
145 printf("=> Linking mtab\n");
146 symlink("/proc/mounts", "/etc/mtab");
Ethan Yonker53273ec2018-03-09 11:22:54 -0600147 std::string fstab_filename = "/etc/twrp.fstab";
148 if (!TWFunc::Path_Exists(fstab_filename)) {
149 fstab_filename = "/etc/recovery.fstab";
Dees_Troy329383e2013-08-29 14:16:06 +0000150 }
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100151
152 // Begin SAR detection
153 {
154 TWPartitionManager SarPartitionManager;
155 printf("=> Processing %s for SAR-detection\n", fstab_filename.c_str());
156 if (!SarPartitionManager.Process_Fstab(fstab_filename, 1, 1)) {
157 LOGERR("Failing out of recovery due to problem with fstab.\n");
158 return -1;
159 }
160
161 mkdir("/s", 0755);
162
163#if defined(AB_OTA_UPDATER) || defined(__ANDROID_API_Q__)
164 bool fallback_sar = true;
165#else
166 bool fallback_sar = property_get_bool("ro.build.system_root_image", false);
167#endif
168
169 if(SarPartitionManager.Mount_By_Path("/s", false)) {
170 if (TWFunc::Path_Exists("/s/build.prop")) {
171 LOGINFO("SAR-DETECT: Non-SAR System detected\n");
172 property_set("ro.twrp.sar", "0");
173 rmdir("/system_root");
174 } else if (TWFunc::Path_Exists("/s/system/build.prop")) {
175 LOGINFO("SAR-DETECT: SAR System detected\n");
176 property_set("ro.twrp.sar", "1");
177 } else {
178 LOGINFO("SAR-DETECT: No build.prop found, falling back to %s\n", fallback_sar ? "SAR" : "Non-SAR");
179 property_set("ro.twrp.sar", fallback_sar ? "1" : "0");
180 }
Chaosmaster01a17992020-02-08 00:10:05 +0100181
182// We are doing this here during SAR-detection, since we are mounting the system-partition anyway
183// This way we don't need to remount it later, just for overriding properties
184#if defined(TW_INCLUDE_LIBRESETPROP) && defined(TW_OVERRIDE_SYSTEM_PROPS)
185 stringstream override_props(EXPAND(TW_OVERRIDE_SYSTEM_PROPS));
186 string current_prop;
187 while (getline(override_props, current_prop, ';')) {
188 string other_prop;
189 if (current_prop.find("=") != string::npos) {
190 other_prop = current_prop.substr(current_prop.find("=") + 1);
191 current_prop = current_prop.substr(0, current_prop.find("="));
192 } else {
193 other_prop = current_prop;
194 }
Mohd Faraz0d9a62e2020-02-20 00:10:26 +0530195 other_prop = android::base::Trim(other_prop);
196 current_prop = android::base::Trim(current_prop);
Chaosmaster01a17992020-02-08 00:10:05 +0100197 string sys_val = TWFunc::System_Property_Get(other_prop, SarPartitionManager, "/s");
198 if (!sys_val.empty()) {
199 LOGINFO("Overriding %s with value: \"%s\" from system property %s\n", current_prop.c_str(), sys_val.c_str(), other_prop.c_str());
200 int error = TWFunc::Property_Override(current_prop, sys_val);
201 if (error) {
202 LOGERR("Failed overriding property %s, error_code: %d\n", current_prop.c_str(), error);
203 }
204 } else {
205 LOGINFO("Not overriding %s with empty value from system property %s\n", current_prop.c_str(), other_prop.c_str());
206 }
207 }
208#endif
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100209 SarPartitionManager.UnMount_By_Path("/s", false);
210 } else {
211 LOGINFO("SAR-DETECT: Could not mount system partition, falling back to %s\n", fallback_sar ? "SAR":"Non-SAR");
212 property_set("ro.twrp.sar", fallback_sar ? "1" : "0");
213 }
214
215 rmdir("/s");
216
217 TWFunc::check_and_run_script("/sbin/sarsetup.sh", "boot");
218 }
219 // End SAR detection
220
Ethan Yonker53273ec2018-03-09 11:22:54 -0600221 printf("=> Processing %s\n", fstab_filename.c_str());
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100222 if (!PartitionManager.Process_Fstab(fstab_filename, 1, 0)) {
Ethan Yonker53273ec2018-03-09 11:22:54 -0600223 LOGERR("Failing out of recovery due to problem with fstab.\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500224 return -1;
225 }
226 PartitionManager.Output_Partition_Logging();
bigbiff7ba75002020-04-11 20:47:09 -0400227#ifdef TW_INCLUDE_CRYPTO
228 DataManager::SetValue(TW_IS_ENCRYPTED, 1);
229#endif
bigbiffee7b7ff2020-03-23 15:08:27 -0400230
bigbiff7ba75002020-04-11 20:47:09 -0400231 if (PartitionManager.Get_Super_Status()) {
bigbiffee7b7ff2020-03-23 15:08:27 -0400232 PartitionManager.Setup_Super_Devices();
bigbiff7ba75002020-04-11 20:47:09 -0400233 PartitionManager.Setup_Super_Partition();
234 } else {
235#ifdef TW_INCLUDE_CRYPTO
236 if (!PartitionManager.Get_Super_Status())
237 PartitionManager.Decrypt_Data();
238#endif
239 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400240
Dees_Troya449a6f2013-04-07 17:50:11 -0500241 // Load up all the resources
242 gui_loadResources();
243
Matt Mower23d8aae2017-01-06 14:30:33 -0600244 bool Shutdown = false;
bigbiffd58ba182020-03-23 10:02:29 -0400245 bool SkipDecryption = false;
Ethan Yonkerb5236502016-11-19 22:24:59 -0600246 string Send_Intent = "";
Dees_Troya449a6f2013-04-07 17:50:11 -0500247 {
Dees_Troy1669f892013-09-04 18:35:08 +0000248 TWPartition* misc = PartitionManager.Find_Partition_By_Path("/misc");
249 if (misc != NULL) {
250 if (misc->Current_File_System == "emmc") {
Ethan Yonker8373cfe2017-09-08 06:50:54 -0500251 set_misc_device(misc->Actual_Block_Device.c_str());
Dees_Troy1669f892013-09-04 18:35:08 +0000252 } else {
Matt Mower3626bdc2017-01-06 13:45:54 -0600253 LOGERR("Only emmc /misc is supported\n");
Dees_Troy1669f892013-09-04 18:35:08 +0000254 }
255 }
Dees_Troya449a6f2013-04-07 17:50:11 -0500256 get_args(&argc, &argv);
257
258 int index, index2, len;
259 char* argptr;
260 char* ptr;
261 printf("Startup Commands: ");
262 for (index = 1; index < argc; index++) {
263 argptr = argv[index];
264 printf(" '%s'", argv[index]);
265 len = strlen(argv[index]);
266 if (*argptr == '-') {argptr++; len--;}
267 if (*argptr == '-') {argptr++; len--;}
268 if (*argptr == 'u') {
269 ptr = argptr;
270 index2 = 0;
271 while (*ptr != '=' && *ptr != '\n')
272 ptr++;
Kevin Steck7b69e9d2013-10-17 18:24:31 -0400273 // skip the = before grabbing Zip_File
274 while (*ptr == '=')
275 ptr++;
Dees_Troya449a6f2013-04-07 17:50:11 -0500276 if (*ptr) {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600277 string ORSCommand = "install ";
278 ORSCommand.append(ptr);
279
bigbiffd58ba182020-03-23 10:02:29 -0400280 // If we have a map of blocks we don't need to mount data.
281 SkipDecryption = *ptr == '@';
282
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600283 if (!OpenRecoveryScript::Insert_ORS_Command(ORSCommand))
284 break;
Dees_Troya449a6f2013-04-07 17:50:11 -0500285 } else
286 LOGERR("argument error specifying zip file\n");
287 } else if (*argptr == 'w') {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600288 if (len == 9) {
289 if (!OpenRecoveryScript::Insert_ORS_Command("wipe data\n"))
290 break;
291 } else if (len == 10) {
292 if (!OpenRecoveryScript::Insert_ORS_Command("wipe cache\n"))
293 break;
294 }
Ethan Yonkerb5236502016-11-19 22:24:59 -0600295 // Other 'w' items are wipe_ab and wipe_package_size which are related to bricking the device remotely. We will not bother to suppor these as having TWRP probably makes "bricking" the device in this manner useless
Dees_Troya449a6f2013-04-07 17:50:11 -0500296 } else if (*argptr == 'n') {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600297 DataManager::SetValue(TW_BACKUP_NAME, gui_parse_text("{@auto_generate}"));
298 if (!OpenRecoveryScript::Insert_ORS_Command("backup BSDCAE\n"))
299 break;
Ethan Yonkera1674162014-11-06 08:35:10 -0600300 } else if (*argptr == 'p') {
301 Shutdown = true;
Dees_Troya449a6f2013-04-07 17:50:11 -0500302 } else if (*argptr == 's') {
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600303 if (strncmp(argptr, "send_intent", strlen("send_intent")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600304 ptr = argptr + strlen("send_intent") + 1;
305 Send_Intent = *ptr;
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600306 } else if (strncmp(argptr, "security", strlen("security")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600307 LOGINFO("Security update\n");
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600308 } else if (strncmp(argptr, "sideload", strlen("sideload")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600309 if (!OpenRecoveryScript::Insert_ORS_Command("sideload\n"))
310 break;
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600311 } else if (strncmp(argptr, "stages", strlen("stages")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600312 LOGINFO("ignoring stages command\n");
313 }
314 } else if (*argptr == 'r') {
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600315 if (strncmp(argptr, "reason", strlen("reason")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600316 ptr = argptr + strlen("reason") + 1;
317 gui_print("%s\n", ptr);
Dees_Troya449a6f2013-04-07 17:50:11 -0500318 }
319 }
320 }
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200321 printf("\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500322 }
323
Matt Mowera8a89d12016-12-30 18:10:37 -0600324 if (crash_counter == 0) {
Dees_Troya449a6f2013-04-07 17:50:11 -0500325 property_list(Print_Prop, NULL);
326 printf("\n");
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200327 } else {
328 printf("twrp.crash_counter=%d\n", crash_counter);
Dees_Troya449a6f2013-04-07 17:50:11 -0500329 }
330
331 // Check for and run startup script if script exists
332 TWFunc::check_and_run_script("/sbin/runatboot.sh", "boot");
333 TWFunc::check_and_run_script("/sbin/postrecoveryboot.sh", "boot");
334
335#ifdef TW_INCLUDE_INJECTTWRP
336 // Back up TWRP Ramdisk if needed:
337 TWPartition* Boot = PartitionManager.Find_Partition_By_Path("/boot");
Dees_Troya449a6f2013-04-07 17:50:11 -0500338 LOGINFO("Backing up TWRP ramdisk...\n");
339 if (Boot == NULL || Boot->Current_File_System != "emmc")
Vojtech Bocek05534202013-09-11 08:11:56 +0200340 TWFunc::Exec_Cmd("injecttwrp --backup /tmp/backup_recovery_ramdisk.img");
Dees_Troya449a6f2013-04-07 17:50:11 -0500341 else {
342 string injectcmd = "injecttwrp --backup /tmp/backup_recovery_ramdisk.img bd=" + Boot->Actual_Block_Device;
Vojtech Bocek05534202013-09-11 08:11:56 +0200343 TWFunc::Exec_Cmd(injectcmd);
Dees_Troya449a6f2013-04-07 17:50:11 -0500344 }
345 LOGINFO("Backup of TWRP ramdisk done.\n");
346#endif
347
bigbiff7ba75002020-04-11 20:47:09 -0400348 if (!PartitionManager.Get_Super_Status())
349 Decrypt_Page(SkipDecryption, datamedia);
Dees_Troya449a6f2013-04-07 17:50:11 -0500350
Vojtech Bocek2005a842014-03-11 19:40:34 +0100351 // Fixup the RTC clock on devices which require it
bigbiffadc599e2020-05-28 19:36:30 +0000352 if (crash_counter == 0)
353 TWFunc::Fixup_Time_On_Boot();
Vojtech Bocek2005a842014-03-11 19:40:34 +0100354
bigbiff7ba75002020-04-11 20:47:09 -0400355 if (!PartitionManager.Get_Super_Status())
356 DataManager::ReadSettingsFile();
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500357 PageManager::LoadLanguage(DataManager::GetStrValue("tw_language"));
358 GUIConsole::Translate_Now();
359
Dees_Troya449a6f2013-04-07 17:50:11 -0500360 // Run any outstanding OpenRecoveryScript
bigbiff25d25b92020-06-19 16:07:38 -0400361 std::string cacheDir = TWFunc::get_log_dir();
362 if (cacheDir == DATA_LOGS_DIR)
363 cacheDir = "/data/cache";
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500364 std::string orsFile = cacheDir + "/recovery/openrecoveryscript";
bigbiffadc599e2020-05-28 19:36:30 +0000365 if ((DataManager::GetIntValue(TW_IS_ENCRYPTED) == 0 || SkipDecryption) && (TWFunc::Path_Exists(SCRIPT_FILE_TMP) || TWFunc::Path_Exists(orsFile))) {
Dees_Troya449a6f2013-04-07 17:50:11 -0500366 OpenRecoveryScript::Run_OpenRecoveryScript();
367 }
Vojtech Bocekd0e38bc2014-02-03 23:36:57 +0100368
Ethan Yonker6f49e112014-09-03 21:42:49 -0500369#ifdef TW_HAS_MTP
Ethan Yonker6f49e112014-09-03 21:42:49 -0500370 char mtp_crash_check[PROPERTY_VALUE_MAX];
371 property_get("mtp.crash_check", mtp_crash_check, "0");
Matt Mower653a1702017-02-16 10:38:52 -0600372 if (DataManager::GetIntValue("tw_mtp_enabled")
373 && !strcmp(mtp_crash_check, "0") && !crash_counter
374 && (!DataManager::GetIntValue(TW_IS_ENCRYPTED) || DataManager::GetIntValue(TW_IS_DECRYPTED))) {
Ethan Yonker6f49e112014-09-03 21:42:49 -0500375 property_set("mtp.crash_check", "1");
Matt Mower653a1702017-02-16 10:38:52 -0600376 LOGINFO("Starting MTP\n");
377 if (!PartitionManager.Enable_MTP())
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600378 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600379 else
380 gui_msg("mtp_enabled=MTP Enabled");
Ethan Yonker6f49e112014-09-03 21:42:49 -0500381 property_set("mtp.crash_check", "0");
Matt Mower653a1702017-02-16 10:38:52 -0600382 } else if (strcmp(mtp_crash_check, "0")) {
Ethan Yonker74db1572015-10-28 12:44:49 -0500383 gui_warn("mtp_crash=MTP Crashed, not starting MTP on boot.");
Ethan Yonker12055fa2014-09-04 08:06:53 -0500384 DataManager::SetValue("tw_mtp_enabled", 0);
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600385 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600386 } else if (crash_counter == 1) {
387 LOGINFO("TWRP crashed; disabling MTP as a precaution.\n");
388 PartitionManager.Disable_MTP();
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400389 }
Ethan Yonker6f49e112014-09-03 21:42:49 -0500390#endif
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400391
Ethan Yonker89583ef2015-08-26 09:01:59 -0500392#ifndef TW_OEM_BUILD
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500393 // Check if system has never been changed
Captain Throwback9d6feb52018-07-27 10:05:24 -0400394 TWPartition* sys = PartitionManager.Find_Partition_By_Path(PartitionManager.Get_Android_Root_Path());
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500395 TWPartition* ven = PartitionManager.Find_Partition_By_Path("/vendor");
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500396 if (sys) {
bigbiffee7b7ff2020-03-23 15:08:27 -0400397 if (sys->Get_Super_Status()) {
398 if (!PartitionManager.Prepare_All_Super_Volumes()) {
399 LOGERR("Unable to prepare super volumes.\n");
400 }
bigbiff32cbabe2020-04-12 19:16:19 -0400401 sys->Mount(true);
bigbiff86fabbe2020-06-22 17:07:27 -0400402 if (ven) {
403 ven->Mount(true);
404 }
bigbiff32cbabe2020-04-12 19:16:19 -0400405 twrpApex apex;
406 if (!apex.loadApexImages()) {
407 LOGERR("Unable to load apex images from %s\n", APEX_DIR);
408 }
409 property_set("twrp.apex.loaded", "true");
bigbiff7ba75002020-04-11 20:47:09 -0400410#ifdef TW_INCLUDE_CRYPTO
411 PartitionManager.Decrypt_Data();
412 Decrypt_Page(SkipDecryption, datamedia);
bigbiff25d25b92020-06-19 16:07:38 -0400413 std::string recoveryLogDir(DATA_LOGS_DIR);
414 recoveryLogDir += "/recovery";
415 if (!TWFunc::Path_Exists(recoveryLogDir)) {
416 bool created = PartitionManager.Recreate_Logs_Dir();
417 if (!created)
418 LOGERR("Unable to create log directory for TWRP\n");
419 }
bigbiff7ba75002020-04-11 20:47:09 -0400420 DataManager::ReadSettingsFile();
421#endif
bigbiffee7b7ff2020-03-23 15:08:27 -0400422 } else {
423 if ((DataManager::GetIntValue("tw_mount_system_ro") == 0 && sys->Check_Lifetime_Writes() == 0) || DataManager::GetIntValue("tw_mount_system_ro") == 2) {
424 if (DataManager::GetIntValue("tw_never_show_system_ro_page") == 0) {
425 DataManager::SetValue("tw_back", "main");
426 if (gui_startPage("system_readonly", 1, 1) != 0) {
427 LOGERR("Failed to start system_readonly GUI page.\n");
428 }
429 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 0) {
430 sys->Change_Mount_Read_Only(false);
431 if (ven)
432 ven->Change_Mount_Read_Only(false);
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500433 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400434 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 1) {
435 // Do nothing, user selected to leave system read only
436 } else {
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500437 sys->Change_Mount_Read_Only(false);
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500438 if (ven)
439 ven->Change_Mount_Read_Only(false);
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500440 }
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500441 }
442 }
Ethan Yonker89583ef2015-08-26 09:01:59 -0500443#endif
bigbiff7ba75002020-04-11 20:47:09 -0400444
bigbiffaac58612020-08-30 11:18:39 -0400445 TWFunc::Update_Log_File();
446
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -0400447 twrpAdbBuFifo *adb_bu_fifo = new twrpAdbBuFifo();
448 adb_bu_fifo->threadAdbBuFifo();
449
Dees_Troya449a6f2013-04-07 17:50:11 -0500450 // Launch the main GUI
451 gui_start();
452
Ethan Yonker89583ef2015-08-26 09:01:59 -0500453#ifndef TW_OEM_BUILD
Ethan Yonker9132d912015-02-02 10:32:49 -0600454 // Disable flashing of stock recovery
455 TWFunc::Disable_Stock_Recovery_Replace();
Ethan Yonker89583ef2015-08-26 09:01:59 -0500456#endif
Dees_Troya449a6f2013-04-07 17:50:11 -0500457
Vojtech Bocekfafb0c52013-07-25 22:53:02 +0200458 // Reboot
Ethan Yonkerb5236502016-11-19 22:24:59 -0600459 TWFunc::Update_Intent_File(Send_Intent);
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -0400460 delete adb_bu_fifo;
bigbiff25d25b92020-06-19 16:07:38 -0400461 TWFunc::Update_Log_File();
Ethan Yonker74db1572015-10-28 12:44:49 -0500462 gui_msg(Msg("rebooting=Rebooting..."));
Dees_Troya449a6f2013-04-07 17:50:11 -0500463 string Reboot_Arg;
464 DataManager::GetValue("tw_reboot_arg", Reboot_Arg);
465 if (Reboot_Arg == "recovery")
466 TWFunc::tw_reboot(rb_recovery);
467 else if (Reboot_Arg == "poweroff")
468 TWFunc::tw_reboot(rb_poweroff);
469 else if (Reboot_Arg == "bootloader")
470 TWFunc::tw_reboot(rb_bootloader);
471 else if (Reboot_Arg == "download")
472 TWFunc::tw_reboot(rb_download);
mauronofrioe9a49ef2018-10-03 13:38:16 +0200473 else if (Reboot_Arg == "edl")
474 TWFunc::tw_reboot(rb_edl);
Dees_Troya449a6f2013-04-07 17:50:11 -0500475 else
476 TWFunc::tw_reboot(rb_system);
477
Vojtech Bocekfafb0c52013-07-25 22:53:02 +0200478 return 0;
Dees_Troya449a6f2013-04-07 17:50:11 -0500479}
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500480