blob: a187486be292bbddc2286c5efb389b082c6c618b [file] [log] [blame]
Dees_Troya449a6f2013-04-07 17:50:11 -05001/*
bigbiff bigbiff34684ff2013-12-01 21:03:45 -05002 TWRP is free software: you can redistribute it and/or modify
3 it under the terms of the GNU General Public License as published by
4 the Free Software Foundation, either version 3 of the License, or
5 (at your option) any later version.
Dees_Troya449a6f2013-04-07 17:50:11 -05006
bigbiff bigbiff34684ff2013-12-01 21:03:45 -05007 TWRP is distributed in the hope that it will be useful,
8 but WITHOUT ANY WARRANTY; without even the implied warranty of
9 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 GNU General Public License for more details.
Dees_Troya449a6f2013-04-07 17:50:11 -050011
bigbiff bigbiff34684ff2013-12-01 21:03:45 -050012 You should have received a copy of the GNU General Public License
13 along with TWRP. If not, see <http://www.gnu.org/licenses/>.
Dees_Troya449a6f2013-04-07 17:50:11 -050014*/
15
16#include <stdio.h>
17#include <stdlib.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050018#include <string>
Dees_Troya449a6f2013-04-07 17:50:11 -050019#include <sys/stat.h>
20#include <sys/types.h>
21#include <time.h>
22#include <unistd.h>
Ethan Yonkerf9f99bc2014-12-29 09:10:34 -060023#include <signal.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050024#include "gui/twmsg.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050025
26#include "cutils/properties.h"
Ethan Yonker8373cfe2017-09-08 06:50:54 -050027#include "bootloader_message_twrp/include/bootloader_message_twrp/bootloader_message.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050028
29#ifdef ANDROID_RB_RESTART
30#include "cutils/android_reboot.h"
31#else
32#include <sys/reboot.h>
33#endif
34
35extern "C" {
36#include "gui/gui.h"
37}
Ethan Yonkerf1179622016-08-25 15:32:21 -050038#include "set_metadata.h"
Ethan Yonker74db1572015-10-28 12:44:49 -050039#include "gui/gui.hpp"
40#include "gui/pages.hpp"
41#include "gui/objects.hpp"
Dees_Troya449a6f2013-04-07 17:50:11 -050042#include "twcommon.h"
43#include "twrp-functions.hpp"
44#include "data.hpp"
45#include "partitions.hpp"
Mohd Faraz0d9a62e2020-02-20 00:10:26 +053046#ifdef __ANDROID_API_N__
47#include <android-base/strings.h>
48#else
49#include <base/strings.h>
50#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050051#include "openrecoveryscript.hpp"
52#include "variables.h"
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -040053#include "twrpAdbBuFifo.hpp"
bigbiff32cbabe2020-04-12 19:16:19 -040054#include "twrpApex.hpp"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050055#ifdef TW_USE_NEW_MINADBD
bigbiffd58ba182020-03-23 10:02:29 -040056// #include "minadbd/minadbd.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050057#else
58extern "C" {
Ethan Yonker84d61ce2017-05-10 16:11:35 -050059#include "minadbd21/adb.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050060}
61#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050062
Ethan Yonker8373cfe2017-09-08 06:50:54 -050063//extern int adb_server_main(int is_daemon, int server_port, int /* reply_fd */);
Ethan Yonker534d4e02016-08-26 10:05:03 -050064
Dees_Troya449a6f2013-04-07 17:50:11 -050065TWPartitionManager PartitionManager;
66int Log_Offset;
Ethan Yonker6277c792014-09-15 14:54:30 -050067bool datamedia;
Dees_Troya449a6f2013-04-07 17:50:11 -050068
69static void Print_Prop(const char *key, const char *name, void *cookie) {
70 printf("%s=%s\n", key, name);
71}
72
bigbiff7ba75002020-04-11 20:47:09 -040073static void Decrypt_Page(bool SkipDecryption, bool datamedia) {
74 // Offer to decrypt if the device is encrypted
75 if (DataManager::GetIntValue(TW_IS_ENCRYPTED) != 0) {
76 if (SkipDecryption) {
77 LOGINFO("Skipping decryption\n");
78 } else {
79 LOGINFO("Is encrypted, do decrypt page first\n");
80 if (gui_startPage("decrypt", 1, 1) != 0) {
81 LOGERR("Failed to start decrypt GUI page.\n");
82 } else {
83 // Check for and load custom theme if present
84 TWFunc::check_selinux_support();
85 gui_loadCustomResources();
86 }
87 }
88 } else if (datamedia) {
89 TWFunc::check_selinux_support();
90 if (tw_get_default_metadata(DataManager::GetSettingsStoragePath().c_str()) != 0) {
91 LOGINFO("Failed to get default contexts and file mode for storage files.\n");
92 } else {
93 LOGINFO("Got default contexts and file mode for storage files.\n");
94 }
95 }
96}
97
Dees_Troya449a6f2013-04-07 17:50:11 -050098int main(int argc, char **argv) {
99 // Recovery needs to install world-readable files, so clear umask
100 // set by init
101 umask(0);
102
103 Log_Offset = 0;
104
105 // Set up temporary log file (/tmp/recovery.log)
106 freopen(TMP_LOG_FILE, "a", stdout);
107 setbuf(stdout, NULL);
108 freopen(TMP_LOG_FILE, "a", stderr);
109 setbuf(stderr, NULL);
110
Ethan Yonkerf9f99bc2014-12-29 09:10:34 -0600111 signal(SIGPIPE, SIG_IGN);
112
Dees_Troya449a6f2013-04-07 17:50:11 -0500113 // Handle ADB sideload
114 if (argc == 3 && strcmp(argv[1], "--adbd") == 0) {
thatcc8ddca2015-01-03 01:59:36 +0100115 property_set("ctl.stop", "adbd");
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500116#ifdef TW_USE_NEW_MINADBD
Ethan Yonker8373cfe2017-09-08 06:50:54 -0500117 //adb_server_main(0, DEFAULT_ADB_PORT, -1); TODO fix this for android8
bigbiffd58ba182020-03-23 10:02:29 -0400118 // minadbd_main();
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500119#else
Dees_Troya449a6f2013-04-07 17:50:11 -0500120 adb_main(argv[2]);
Ethan Yonkerc798c9c2015-10-09 11:15:26 -0500121#endif
Dees_Troya449a6f2013-04-07 17:50:11 -0500122 return 0;
123 }
124
Ethan Yonker6277c792014-09-15 14:54:30 -0500125#ifdef RECOVERY_SDCARD_ON_DATA
126 datamedia = true;
127#endif
128
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200129 char crash_prop_val[PROPERTY_VALUE_MAX];
130 int crash_counter;
131 property_get("twrp.crash_counter", crash_prop_val, "-1");
132 crash_counter = atoi(crash_prop_val) + 1;
133 snprintf(crash_prop_val, sizeof(crash_prop_val), "%d", crash_counter);
134 property_set("twrp.crash_counter", crash_prop_val);
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400135 property_set("ro.twrp.boot", "1");
136 property_set("ro.twrp.version", TW_VERSION_STR);
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200137
Dees_Troya449a6f2013-04-07 17:50:11 -0500138 time_t StartupTime = time(NULL);
that0e2140e2016-08-10 21:04:26 +0200139 printf("Starting TWRP %s-%s on %s (pid %d)\n", TW_VERSION_STR, TW_GIT_REVISION, ctime(&StartupTime), getpid());
Dees_Troya449a6f2013-04-07 17:50:11 -0500140
141 // Load default values to set DataManager constants and handle ifdefs
142 DataManager::SetDefaultValues();
that0e2140e2016-08-10 21:04:26 +0200143 printf("Starting the UI...\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500144 gui_init();
145 printf("=> Linking mtab\n");
146 symlink("/proc/mounts", "/etc/mtab");
Ethan Yonker53273ec2018-03-09 11:22:54 -0600147 std::string fstab_filename = "/etc/twrp.fstab";
148 if (!TWFunc::Path_Exists(fstab_filename)) {
149 fstab_filename = "/etc/recovery.fstab";
Dees_Troy329383e2013-08-29 14:16:06 +0000150 }
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100151
152 // Begin SAR detection
153 {
154 TWPartitionManager SarPartitionManager;
155 printf("=> Processing %s for SAR-detection\n", fstab_filename.c_str());
156 if (!SarPartitionManager.Process_Fstab(fstab_filename, 1, 1)) {
157 LOGERR("Failing out of recovery due to problem with fstab.\n");
158 return -1;
159 }
160
161 mkdir("/s", 0755);
162
163#if defined(AB_OTA_UPDATER) || defined(__ANDROID_API_Q__)
164 bool fallback_sar = true;
165#else
166 bool fallback_sar = property_get_bool("ro.build.system_root_image", false);
167#endif
168
169 if(SarPartitionManager.Mount_By_Path("/s", false)) {
170 if (TWFunc::Path_Exists("/s/build.prop")) {
171 LOGINFO("SAR-DETECT: Non-SAR System detected\n");
172 property_set("ro.twrp.sar", "0");
173 rmdir("/system_root");
174 } else if (TWFunc::Path_Exists("/s/system/build.prop")) {
175 LOGINFO("SAR-DETECT: SAR System detected\n");
176 property_set("ro.twrp.sar", "1");
177 } else {
178 LOGINFO("SAR-DETECT: No build.prop found, falling back to %s\n", fallback_sar ? "SAR" : "Non-SAR");
179 property_set("ro.twrp.sar", fallback_sar ? "1" : "0");
180 }
Chaosmaster01a17992020-02-08 00:10:05 +0100181
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100182 SarPartitionManager.UnMount_By_Path("/s", false);
183 } else {
184 LOGINFO("SAR-DETECT: Could not mount system partition, falling back to %s\n", fallback_sar ? "SAR":"Non-SAR");
185 property_set("ro.twrp.sar", fallback_sar ? "1" : "0");
186 }
187
188 rmdir("/s");
189
bigbiffad58e1b2020-07-06 20:24:34 -0400190 TWFunc::check_and_run_script("/system/bin/sarsetup.sh", "boot");
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100191 }
192 // End SAR detection
193
Ethan Yonker53273ec2018-03-09 11:22:54 -0600194 printf("=> Processing %s\n", fstab_filename.c_str());
Chaosmasterf6e42ce2020-01-27 00:17:04 +0100195 if (!PartitionManager.Process_Fstab(fstab_filename, 1, 0)) {
Ethan Yonker53273ec2018-03-09 11:22:54 -0600196 LOGERR("Failing out of recovery due to problem with fstab.\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500197 return -1;
198 }
199 PartitionManager.Output_Partition_Logging();
bigbiff7ba75002020-04-11 20:47:09 -0400200#ifdef TW_INCLUDE_CRYPTO
201 DataManager::SetValue(TW_IS_ENCRYPTED, 1);
202#endif
bigbiffee7b7ff2020-03-23 15:08:27 -0400203
bigbiff7ba75002020-04-11 20:47:09 -0400204 if (PartitionManager.Get_Super_Status()) {
bigbiffee7b7ff2020-03-23 15:08:27 -0400205 PartitionManager.Setup_Super_Devices();
bigbiff7ba75002020-04-11 20:47:09 -0400206 PartitionManager.Setup_Super_Partition();
207 } else {
208#ifdef TW_INCLUDE_CRYPTO
209 if (!PartitionManager.Get_Super_Status())
210 PartitionManager.Decrypt_Data();
211#endif
212 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400213
Dees_Troya449a6f2013-04-07 17:50:11 -0500214 // Load up all the resources
215 gui_loadResources();
216
Matt Mower23d8aae2017-01-06 14:30:33 -0600217 bool Shutdown = false;
bigbiffd58ba182020-03-23 10:02:29 -0400218 bool SkipDecryption = false;
Ethan Yonkerb5236502016-11-19 22:24:59 -0600219 string Send_Intent = "";
Dees_Troya449a6f2013-04-07 17:50:11 -0500220 {
Dees_Troy1669f892013-09-04 18:35:08 +0000221 TWPartition* misc = PartitionManager.Find_Partition_By_Path("/misc");
222 if (misc != NULL) {
223 if (misc->Current_File_System == "emmc") {
Ethan Yonker8373cfe2017-09-08 06:50:54 -0500224 set_misc_device(misc->Actual_Block_Device.c_str());
Dees_Troy1669f892013-09-04 18:35:08 +0000225 } else {
Matt Mower3626bdc2017-01-06 13:45:54 -0600226 LOGERR("Only emmc /misc is supported\n");
Dees_Troy1669f892013-09-04 18:35:08 +0000227 }
228 }
Dees_Troya449a6f2013-04-07 17:50:11 -0500229 get_args(&argc, &argv);
230
231 int index, index2, len;
232 char* argptr;
233 char* ptr;
234 printf("Startup Commands: ");
235 for (index = 1; index < argc; index++) {
236 argptr = argv[index];
237 printf(" '%s'", argv[index]);
238 len = strlen(argv[index]);
239 if (*argptr == '-') {argptr++; len--;}
240 if (*argptr == '-') {argptr++; len--;}
241 if (*argptr == 'u') {
242 ptr = argptr;
243 index2 = 0;
244 while (*ptr != '=' && *ptr != '\n')
245 ptr++;
Kevin Steck7b69e9d2013-10-17 18:24:31 -0400246 // skip the = before grabbing Zip_File
247 while (*ptr == '=')
248 ptr++;
Dees_Troya449a6f2013-04-07 17:50:11 -0500249 if (*ptr) {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600250 string ORSCommand = "install ";
251 ORSCommand.append(ptr);
252
bigbiffd58ba182020-03-23 10:02:29 -0400253 // If we have a map of blocks we don't need to mount data.
254 SkipDecryption = *ptr == '@';
255
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600256 if (!OpenRecoveryScript::Insert_ORS_Command(ORSCommand))
257 break;
Dees_Troya449a6f2013-04-07 17:50:11 -0500258 } else
259 LOGERR("argument error specifying zip file\n");
260 } else if (*argptr == 'w') {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600261 if (len == 9) {
262 if (!OpenRecoveryScript::Insert_ORS_Command("wipe data\n"))
263 break;
264 } else if (len == 10) {
265 if (!OpenRecoveryScript::Insert_ORS_Command("wipe cache\n"))
266 break;
267 }
Ethan Yonkerb5236502016-11-19 22:24:59 -0600268 // Other 'w' items are wipe_ab and wipe_package_size which are related to bricking the device remotely. We will not bother to suppor these as having TWRP probably makes "bricking" the device in this manner useless
Dees_Troya449a6f2013-04-07 17:50:11 -0500269 } else if (*argptr == 'n') {
Ethan Yonker3aa66be2015-12-22 12:30:18 -0600270 DataManager::SetValue(TW_BACKUP_NAME, gui_parse_text("{@auto_generate}"));
271 if (!OpenRecoveryScript::Insert_ORS_Command("backup BSDCAE\n"))
272 break;
Ethan Yonkera1674162014-11-06 08:35:10 -0600273 } else if (*argptr == 'p') {
274 Shutdown = true;
Dees_Troya449a6f2013-04-07 17:50:11 -0500275 } else if (*argptr == 's') {
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600276 if (strncmp(argptr, "send_intent", strlen("send_intent")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600277 ptr = argptr + strlen("send_intent") + 1;
278 Send_Intent = *ptr;
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600279 } else if (strncmp(argptr, "security", strlen("security")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600280 LOGINFO("Security update\n");
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600281 } else if (strncmp(argptr, "sideload", strlen("sideload")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600282 if (!OpenRecoveryScript::Insert_ORS_Command("sideload\n"))
283 break;
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600284 } else if (strncmp(argptr, "stages", strlen("stages")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600285 LOGINFO("ignoring stages command\n");
286 }
287 } else if (*argptr == 'r') {
Ethan Yonker3fdcda42016-11-30 12:29:37 -0600288 if (strncmp(argptr, "reason", strlen("reason")) == 0) {
Ethan Yonkerb5236502016-11-19 22:24:59 -0600289 ptr = argptr + strlen("reason") + 1;
290 gui_print("%s\n", ptr);
Dees_Troya449a6f2013-04-07 17:50:11 -0500291 }
292 }
293 }
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200294 printf("\n");
Dees_Troya449a6f2013-04-07 17:50:11 -0500295 }
296
Matt Mowera8a89d12016-12-30 18:10:37 -0600297 if (crash_counter == 0) {
Dees_Troya449a6f2013-04-07 17:50:11 -0500298 property_list(Print_Prop, NULL);
299 printf("\n");
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200300 } else {
301 printf("twrp.crash_counter=%d\n", crash_counter);
Dees_Troya449a6f2013-04-07 17:50:11 -0500302 }
303
304 // Check for and run startup script if script exists
bigbiffad58e1b2020-07-06 20:24:34 -0400305 TWFunc::check_and_run_script("/system/bin/runatboot.sh", "boot");
306 TWFunc::check_and_run_script("/system/bin/postrecoveryboot.sh", "boot");
Dees_Troya449a6f2013-04-07 17:50:11 -0500307
308#ifdef TW_INCLUDE_INJECTTWRP
309 // Back up TWRP Ramdisk if needed:
310 TWPartition* Boot = PartitionManager.Find_Partition_By_Path("/boot");
Dees_Troya449a6f2013-04-07 17:50:11 -0500311 LOGINFO("Backing up TWRP ramdisk...\n");
312 if (Boot == NULL || Boot->Current_File_System != "emmc")
Vojtech Bocek05534202013-09-11 08:11:56 +0200313 TWFunc::Exec_Cmd("injecttwrp --backup /tmp/backup_recovery_ramdisk.img");
Dees_Troya449a6f2013-04-07 17:50:11 -0500314 else {
315 string injectcmd = "injecttwrp --backup /tmp/backup_recovery_ramdisk.img bd=" + Boot->Actual_Block_Device;
Vojtech Bocek05534202013-09-11 08:11:56 +0200316 TWFunc::Exec_Cmd(injectcmd);
Dees_Troya449a6f2013-04-07 17:50:11 -0500317 }
318 LOGINFO("Backup of TWRP ramdisk done.\n");
319#endif
320
bigbiff7ba75002020-04-11 20:47:09 -0400321 if (!PartitionManager.Get_Super_Status())
322 Decrypt_Page(SkipDecryption, datamedia);
Dees_Troya449a6f2013-04-07 17:50:11 -0500323
Vojtech Bocek2005a842014-03-11 19:40:34 +0100324 // Fixup the RTC clock on devices which require it
bigbiffadc599e2020-05-28 19:36:30 +0000325 if (crash_counter == 0)
326 TWFunc::Fixup_Time_On_Boot();
Vojtech Bocek2005a842014-03-11 19:40:34 +0100327
bigbiff7ba75002020-04-11 20:47:09 -0400328 if (!PartitionManager.Get_Super_Status())
329 DataManager::ReadSettingsFile();
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500330 PageManager::LoadLanguage(DataManager::GetStrValue("tw_language"));
331 GUIConsole::Translate_Now();
332
Dees_Troya449a6f2013-04-07 17:50:11 -0500333 // Run any outstanding OpenRecoveryScript
bigbiff25d25b92020-06-19 16:07:38 -0400334 std::string cacheDir = TWFunc::get_log_dir();
335 if (cacheDir == DATA_LOGS_DIR)
336 cacheDir = "/data/cache";
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500337 std::string orsFile = cacheDir + "/recovery/openrecoveryscript";
bigbiffadc599e2020-05-28 19:36:30 +0000338 if ((DataManager::GetIntValue(TW_IS_ENCRYPTED) == 0 || SkipDecryption) && (TWFunc::Path_Exists(SCRIPT_FILE_TMP) || TWFunc::Path_Exists(orsFile))) {
Dees_Troya449a6f2013-04-07 17:50:11 -0500339 OpenRecoveryScript::Run_OpenRecoveryScript();
340 }
Vojtech Bocekd0e38bc2014-02-03 23:36:57 +0100341
Ethan Yonker6f49e112014-09-03 21:42:49 -0500342#ifdef TW_HAS_MTP
Ethan Yonker6f49e112014-09-03 21:42:49 -0500343 char mtp_crash_check[PROPERTY_VALUE_MAX];
344 property_get("mtp.crash_check", mtp_crash_check, "0");
Matt Mower653a1702017-02-16 10:38:52 -0600345 if (DataManager::GetIntValue("tw_mtp_enabled")
346 && !strcmp(mtp_crash_check, "0") && !crash_counter
347 && (!DataManager::GetIntValue(TW_IS_ENCRYPTED) || DataManager::GetIntValue(TW_IS_DECRYPTED))) {
Ethan Yonker6f49e112014-09-03 21:42:49 -0500348 property_set("mtp.crash_check", "1");
Matt Mower653a1702017-02-16 10:38:52 -0600349 LOGINFO("Starting MTP\n");
350 if (!PartitionManager.Enable_MTP())
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600351 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600352 else
353 gui_msg("mtp_enabled=MTP Enabled");
Ethan Yonker6f49e112014-09-03 21:42:49 -0500354 property_set("mtp.crash_check", "0");
Matt Mower653a1702017-02-16 10:38:52 -0600355 } else if (strcmp(mtp_crash_check, "0")) {
Ethan Yonker74db1572015-10-28 12:44:49 -0500356 gui_warn("mtp_crash=MTP Crashed, not starting MTP on boot.");
Ethan Yonker12055fa2014-09-04 08:06:53 -0500357 DataManager::SetValue("tw_mtp_enabled", 0);
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600358 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600359 } else if (crash_counter == 1) {
360 LOGINFO("TWRP crashed; disabling MTP as a precaution.\n");
361 PartitionManager.Disable_MTP();
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400362 }
Ethan Yonker6f49e112014-09-03 21:42:49 -0500363#endif
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400364
Ethan Yonker89583ef2015-08-26 09:01:59 -0500365#ifndef TW_OEM_BUILD
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500366 // Check if system has never been changed
Captain Throwback9d6feb52018-07-27 10:05:24 -0400367 TWPartition* sys = PartitionManager.Find_Partition_By_Path(PartitionManager.Get_Android_Root_Path());
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500368 TWPartition* ven = PartitionManager.Find_Partition_By_Path("/vendor");
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500369 if (sys) {
bigbiffee7b7ff2020-03-23 15:08:27 -0400370 if (sys->Get_Super_Status()) {
371 if (!PartitionManager.Prepare_All_Super_Volumes()) {
372 LOGERR("Unable to prepare super volumes.\n");
373 }
bigbiff32cbabe2020-04-12 19:16:19 -0400374 sys->Mount(true);
bigbiff86fabbe2020-06-22 17:07:27 -0400375 if (ven) {
376 ven->Mount(true);
377 }
bigbiff32cbabe2020-04-12 19:16:19 -0400378 twrpApex apex;
379 if (!apex.loadApexImages()) {
380 LOGERR("Unable to load apex images from %s\n", APEX_DIR);
381 }
382 property_set("twrp.apex.loaded", "true");
bigbiff7ba75002020-04-11 20:47:09 -0400383#ifdef TW_INCLUDE_CRYPTO
384 PartitionManager.Decrypt_Data();
385 Decrypt_Page(SkipDecryption, datamedia);
bigbiff25d25b92020-06-19 16:07:38 -0400386 std::string recoveryLogDir(DATA_LOGS_DIR);
387 recoveryLogDir += "/recovery";
388 if (!TWFunc::Path_Exists(recoveryLogDir)) {
389 bool created = PartitionManager.Recreate_Logs_Dir();
390 if (!created)
391 LOGERR("Unable to create log directory for TWRP\n");
392 }
bigbiff7ba75002020-04-11 20:47:09 -0400393 DataManager::ReadSettingsFile();
394#endif
bigbiffee7b7ff2020-03-23 15:08:27 -0400395 } else {
396 if ((DataManager::GetIntValue("tw_mount_system_ro") == 0 && sys->Check_Lifetime_Writes() == 0) || DataManager::GetIntValue("tw_mount_system_ro") == 2) {
397 if (DataManager::GetIntValue("tw_never_show_system_ro_page") == 0) {
398 DataManager::SetValue("tw_back", "main");
399 if (gui_startPage("system_readonly", 1, 1) != 0) {
400 LOGERR("Failed to start system_readonly GUI page.\n");
401 }
402 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 0) {
403 sys->Change_Mount_Read_Only(false);
404 if (ven)
405 ven->Change_Mount_Read_Only(false);
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500406 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400407 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 1) {
408 // Do nothing, user selected to leave system read only
409 } else {
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500410 sys->Change_Mount_Read_Only(false);
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500411 if (ven)
412 ven->Change_Mount_Read_Only(false);
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500413 }
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500414 }
415 }
Ethan Yonker89583ef2015-08-26 09:01:59 -0500416#endif
Captain Throwbackb7cefd12020-09-05 15:59:01 -0400417// We are doing this here to allow super partition to be set up prior to overriding properties
418#if defined(TW_INCLUDE_LIBRESETPROP) && defined(TW_OVERRIDE_SYSTEM_PROPS)
419 if (!PartitionManager.Mount_By_Path(PartitionManager.Get_Android_Root_Path(), true)) {
420 LOGERR("Unable to mount %s\n", PartitionManager.Get_Android_Root_Path().c_str());
421 } else {
422 stringstream override_props(EXPAND(TW_OVERRIDE_SYSTEM_PROPS));
423 string current_prop;
424 while (getline(override_props, current_prop, ';')) {
425 string other_prop;
426 if (current_prop.find("=") != string::npos) {
427 other_prop = current_prop.substr(current_prop.find("=") + 1);
428 current_prop = current_prop.substr(0, current_prop.find("="));
429 } else {
430 other_prop = current_prop;
431 }
432 other_prop = android::base::Trim(other_prop);
433 current_prop = android::base::Trim(current_prop);
434 string sys_val = TWFunc::System_Property_Get(other_prop, PartitionManager, PartitionManager.Get_Android_Root_Path().c_str());
435 if (!sys_val.empty()) {
436 LOGINFO("Overriding %s with value: \"%s\" from system property %s\n", current_prop.c_str(), sys_val.c_str(), other_prop.c_str());
437 int error = TWFunc::Property_Override(current_prop, sys_val);
438 if (error) {
439 LOGERR("Failed overriding property %s, error_code: %d\n", current_prop.c_str(), error);
440 }
441 } else {
442 LOGINFO("Not overriding %s with empty value from system property %s\n", current_prop.c_str(), other_prop.c_str());
443 }
444 }
445 PartitionManager.UnMount_By_Path(PartitionManager.Get_Android_Root_Path(), false);
446 }
447#endif
bigbiff7ba75002020-04-11 20:47:09 -0400448
bigbiffaac58612020-08-30 11:18:39 -0400449 TWFunc::Update_Log_File();
450
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -0400451 twrpAdbBuFifo *adb_bu_fifo = new twrpAdbBuFifo();
452 adb_bu_fifo->threadAdbBuFifo();
453
Dees_Troya449a6f2013-04-07 17:50:11 -0500454 // Launch the main GUI
455 gui_start();
456
Ethan Yonker89583ef2015-08-26 09:01:59 -0500457#ifndef TW_OEM_BUILD
Ethan Yonker9132d912015-02-02 10:32:49 -0600458 // Disable flashing of stock recovery
459 TWFunc::Disable_Stock_Recovery_Replace();
Ethan Yonker89583ef2015-08-26 09:01:59 -0500460#endif
Dees_Troya449a6f2013-04-07 17:50:11 -0500461
Vojtech Bocekfafb0c52013-07-25 22:53:02 +0200462 // Reboot
Ethan Yonkerb5236502016-11-19 22:24:59 -0600463 TWFunc::Update_Intent_File(Send_Intent);
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -0400464 delete adb_bu_fifo;
bigbiff25d25b92020-06-19 16:07:38 -0400465 TWFunc::Update_Log_File();
Ethan Yonker74db1572015-10-28 12:44:49 -0500466 gui_msg(Msg("rebooting=Rebooting..."));
Dees_Troya449a6f2013-04-07 17:50:11 -0500467 string Reboot_Arg;
468 DataManager::GetValue("tw_reboot_arg", Reboot_Arg);
469 if (Reboot_Arg == "recovery")
470 TWFunc::tw_reboot(rb_recovery);
471 else if (Reboot_Arg == "poweroff")
472 TWFunc::tw_reboot(rb_poweroff);
473 else if (Reboot_Arg == "bootloader")
474 TWFunc::tw_reboot(rb_bootloader);
475 else if (Reboot_Arg == "download")
476 TWFunc::tw_reboot(rb_download);
mauronofrioe9a49ef2018-10-03 13:38:16 +0200477 else if (Reboot_Arg == "edl")
478 TWFunc::tw_reboot(rb_edl);
Dees_Troya449a6f2013-04-07 17:50:11 -0500479 else
480 TWFunc::tw_reboot(rb_system);
481
Vojtech Bocekfafb0c52013-07-25 22:53:02 +0200482 return 0;
Dees_Troya449a6f2013-04-07 17:50:11 -0500483}
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500484