blob: 1b0e337b90181fa61e384788eefa2918f230143e [file] [log] [blame]
Dees_Troya449a6f2013-04-07 17:50:11 -05001/*
bigbiffdf8436b2020-08-30 16:22:34 -04002 Copyright 2012-2020 TeamWin
3 This file is part of TWRP/TeamWin Recovery Project.
Dees_Troya449a6f2013-04-07 17:50:11 -05004
bigbiffdf8436b2020-08-30 16:22:34 -04005 TWRP is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
Dees_Troya449a6f2013-04-07 17:50:11 -05009
bigbiffdf8436b2020-08-30 16:22:34 -040010 TWRP is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with TWRP. If not, see <http://www.gnu.org/licenses/>.
Dees_Troya449a6f2013-04-07 17:50:11 -050017*/
18
19#include <stdio.h>
20#include <stdlib.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050021#include <string>
Dees_Troya449a6f2013-04-07 17:50:11 -050022#include <sys/stat.h>
23#include <sys/types.h>
24#include <time.h>
25#include <unistd.h>
Ethan Yonkerf9f99bc2014-12-29 09:10:34 -060026#include <signal.h>
Ethan Yonker74db1572015-10-28 12:44:49 -050027#include "gui/twmsg.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050028
29#include "cutils/properties.h"
Dees_Troya449a6f2013-04-07 17:50:11 -050030
31#ifdef ANDROID_RB_RESTART
32#include "cutils/android_reboot.h"
33#else
34#include <sys/reboot.h>
35#endif
36
37extern "C" {
38#include "gui/gui.h"
39}
Ethan Yonkerf1179622016-08-25 15:32:21 -050040#include "set_metadata.h"
Ethan Yonker74db1572015-10-28 12:44:49 -050041#include "gui/gui.hpp"
42#include "gui/pages.hpp"
43#include "gui/objects.hpp"
Dees_Troya449a6f2013-04-07 17:50:11 -050044#include "twcommon.h"
45#include "twrp-functions.hpp"
46#include "data.hpp"
bigbiff22851b92021-09-01 16:46:57 -040047#include "kernel_module_loader.hpp"
Dees_Troya449a6f2013-04-07 17:50:11 -050048#include "partitions.hpp"
Mohd Faraz0d9a62e2020-02-20 00:10:26 +053049#ifdef __ANDROID_API_N__
50#include <android-base/strings.h>
51#else
52#include <base/strings.h>
53#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050054#include "openrecoveryscript.hpp"
55#include "variables.h"
bigbiffdf8436b2020-08-30 16:22:34 -040056#include "startupArgs.hpp"
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -040057#include "twrpAdbBuFifo.hpp"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050058#ifdef TW_USE_NEW_MINADBD
bigbiffd58ba182020-03-23 10:02:29 -040059// #include "minadbd/minadbd.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050060#else
61extern "C" {
Ethan Yonker84d61ce2017-05-10 16:11:35 -050062#include "minadbd21/adb.h"
Ethan Yonkerc798c9c2015-10-09 11:15:26 -050063}
64#endif
Dees_Troya449a6f2013-04-07 17:50:11 -050065
Ethan Yonker8373cfe2017-09-08 06:50:54 -050066//extern int adb_server_main(int is_daemon, int server_port, int /* reply_fd */);
Ethan Yonker534d4e02016-08-26 10:05:03 -050067
Dees_Troya449a6f2013-04-07 17:50:11 -050068TWPartitionManager PartitionManager;
69int Log_Offset;
Ethan Yonker6277c792014-09-15 14:54:30 -050070bool datamedia;
Dees_Troya449a6f2013-04-07 17:50:11 -050071
72static void Print_Prop(const char *key, const char *name, void *cookie) {
73 printf("%s=%s\n", key, name);
74}
75
bigbiff7ba75002020-04-11 20:47:09 -040076static void Decrypt_Page(bool SkipDecryption, bool datamedia) {
77 // Offer to decrypt if the device is encrypted
78 if (DataManager::GetIntValue(TW_IS_ENCRYPTED) != 0) {
79 if (SkipDecryption) {
80 LOGINFO("Skipping decryption\n");
Captain Throwback89b56a12021-02-10 18:25:07 -050081 PartitionManager.Update_System_Details();
Mohd Faraz815e2402020-09-19 19:31:52 +053082 } else if (DataManager::GetIntValue(TW_CRYPTO_PWTYPE) != 0) {
bigbiff7ba75002020-04-11 20:47:09 -040083 LOGINFO("Is encrypted, do decrypt page first\n");
Mohd Faraze3948ec2020-08-14 01:40:59 +000084 if (DataManager::GetIntValue(TW_IS_FBE))
85 DataManager::SetValue("tw_crypto_user_id", "0");
bigbiff7ba75002020-04-11 20:47:09 -040086 if (gui_startPage("decrypt", 1, 1) != 0) {
87 LOGERR("Failed to start decrypt GUI page.\n");
88 } else {
89 // Check for and load custom theme if present
90 TWFunc::check_selinux_support();
91 gui_loadCustomResources();
92 }
93 }
94 } else if (datamedia) {
Captain Throwback89b56a12021-02-10 18:25:07 -050095 PartitionManager.Update_System_Details();
bigbiff7ba75002020-04-11 20:47:09 -040096 TWFunc::check_selinux_support();
97 if (tw_get_default_metadata(DataManager::GetSettingsStoragePath().c_str()) != 0) {
98 LOGINFO("Failed to get default contexts and file mode for storage files.\n");
99 } else {
100 LOGINFO("Got default contexts and file mode for storage files.\n");
101 }
102 }
103}
104
bigbiff22851b92021-09-01 16:46:57 -0400105static void process_fastbootd_mode() {
106 LOGINFO("starting fastboot\n");
107 printf("=> Linking mtab\n");
108 symlink("/proc/mounts", "/etc/mtab");
109 std::string fstab_filename = "/etc/twrp.fstab";
110 if (!TWFunc::Path_Exists(fstab_filename)) {
111 fstab_filename = "/etc/recovery.fstab";
112 }
113 printf("=> Processing %s\n", fstab_filename.c_str());
114 if (!PartitionManager.Process_Fstab(fstab_filename, 1, false)) {
115 LOGERR("Failing out of recovery due to problem with fstab.\n");
116 return;
117 }
118 TWPartition* ven = PartitionManager.Find_Partition_By_Path("/vendor");
119 PartitionManager.Setup_Super_Devices();
120 PartitionManager.Prepare_Super_Volume(ven);
121#ifdef TW_LOAD_VENDOR_MODULES
122 KernelModuleLoader::Load_Vendor_Modules(FASTBOOTD_MODE);
123#endif
124 gui_msg(Msg("fastboot_console_msg=Entered Fastboot mode..."));
125 if (gui_startPage("fastboot", 1, 1) != 0) {
126 LOGERR("Failed to start fastbootd page.\n");
127 }
128}
129
bigbiffdf8436b2020-08-30 16:22:34 -0400130static void process_recovery_mode(twrpAdbBuFifo* adb_bu_fifo, bool skip_decryption) {
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200131 char crash_prop_val[PROPERTY_VALUE_MAX];
132 int crash_counter;
bigbiff22851b92021-09-01 16:46:57 -0400133 std::string cmdline;
134 if (TWFunc::read_file("/proc/cmdline", cmdline) != 0) {
135 LOGINFO("Unable to read cmdline for fastboot mode\n");
136 }
137
Vojtech Bocek0fc15732014-07-04 01:09:50 +0200138 property_get("twrp.crash_counter", crash_prop_val, "-1");
139 crash_counter = atoi(crash_prop_val) + 1;
140 snprintf(crash_prop_val, sizeof(crash_prop_val), "%d", crash_counter);
141 property_set("twrp.crash_counter", crash_prop_val);
142
bigbiffdf8436b2020-08-30 16:22:34 -0400143 if (crash_counter == 0) {
144 property_list(Print_Prop, NULL);
145 printf("\n");
146 } else {
147 printf("twrp.crash_counter=%d\n", crash_counter);
148 }
Dees_Troya449a6f2013-04-07 17:50:11 -0500149
Dees_Troya449a6f2013-04-07 17:50:11 -0500150 printf("=> Linking mtab\n");
151 symlink("/proc/mounts", "/etc/mtab");
Ethan Yonker53273ec2018-03-09 11:22:54 -0600152 std::string fstab_filename = "/etc/twrp.fstab";
153 if (!TWFunc::Path_Exists(fstab_filename)) {
154 fstab_filename = "/etc/recovery.fstab";
Dees_Troy329383e2013-08-29 14:16:06 +0000155 }
Ethan Yonker53273ec2018-03-09 11:22:54 -0600156 printf("=> Processing %s\n", fstab_filename.c_str());
bigbiff22851b92021-09-01 16:46:57 -0400157 if (!PartitionManager.Process_Fstab(fstab_filename, 1, true)) {
Ethan Yonker53273ec2018-03-09 11:22:54 -0600158 LOGERR("Failing out of recovery due to problem with fstab.\n");
bigbiffdf8436b2020-08-30 16:22:34 -0400159 return;
Dees_Troya449a6f2013-04-07 17:50:11 -0500160 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400161
bigbiff22851b92021-09-01 16:46:57 -0400162#ifdef TW_LOAD_VENDOR_MODULES
163 bool fastboot_mode = cmdline.find("twrpfastboot=1") != std::string::npos;
164 if (fastboot_mode)
165 KernelModuleLoader::Load_Vendor_Modules(RECOVERY_FASTBOOT_MODE);
166 else
167 KernelModuleLoader::Load_Vendor_Modules(RECOVERY_IN_BOOT_MODE);
168#endif
169
Captain Throwbackdc0823c2020-09-06 13:07:23 -0400170// We are doing this here to allow super partition to be set up prior to overriding properties
171#if defined(TW_INCLUDE_LIBRESETPROP) && defined(TW_OVERRIDE_SYSTEM_PROPS)
172 if (!PartitionManager.Mount_By_Path(PartitionManager.Get_Android_Root_Path(), true)) {
173 LOGERR("Unable to mount %s\n", PartitionManager.Get_Android_Root_Path().c_str());
174 } else {
175 stringstream override_props(EXPAND(TW_OVERRIDE_SYSTEM_PROPS));
176 string current_prop;
177 while (getline(override_props, current_prop, ';')) {
178 string other_prop;
179 if (current_prop.find("=") != string::npos) {
180 other_prop = current_prop.substr(current_prop.find("=") + 1);
181 current_prop = current_prop.substr(0, current_prop.find("="));
182 } else {
183 other_prop = current_prop;
184 }
185 other_prop = android::base::Trim(other_prop);
186 current_prop = android::base::Trim(current_prop);
187 string sys_val = TWFunc::System_Property_Get(other_prop, PartitionManager, PartitionManager.Get_Android_Root_Path().c_str());
188 if (!sys_val.empty()) {
189 LOGINFO("Overriding %s with value: \"%s\" from system property %s\n", current_prop.c_str(), sys_val.c_str(), other_prop.c_str());
190 int error = TWFunc::Property_Override(current_prop, sys_val);
191 if (error) {
192 LOGERR("Failed overriding property %s, error_code: %d\n", current_prop.c_str(), error);
193 }
194 } else {
195 LOGINFO("Not overriding %s with empty value from system property %s\n", current_prop.c_str(), other_prop.c_str());
196 }
197 }
198 PartitionManager.UnMount_By_Path(PartitionManager.Get_Android_Root_Path(), false);
199 }
200#endif
201
Dees_Troya449a6f2013-04-07 17:50:11 -0500202 // Check for and run startup script if script exists
bigbiffad58e1b2020-07-06 20:24:34 -0400203 TWFunc::check_and_run_script("/system/bin/runatboot.sh", "boot");
204 TWFunc::check_and_run_script("/system/bin/postrecoveryboot.sh", "boot");
Dees_Troya449a6f2013-04-07 17:50:11 -0500205
206#ifdef TW_INCLUDE_INJECTTWRP
207 // Back up TWRP Ramdisk if needed:
208 TWPartition* Boot = PartitionManager.Find_Partition_By_Path("/boot");
Dees_Troya449a6f2013-04-07 17:50:11 -0500209 LOGINFO("Backing up TWRP ramdisk...\n");
210 if (Boot == NULL || Boot->Current_File_System != "emmc")
Vojtech Bocek05534202013-09-11 08:11:56 +0200211 TWFunc::Exec_Cmd("injecttwrp --backup /tmp/backup_recovery_ramdisk.img");
Dees_Troya449a6f2013-04-07 17:50:11 -0500212 else {
213 string injectcmd = "injecttwrp --backup /tmp/backup_recovery_ramdisk.img bd=" + Boot->Actual_Block_Device;
Vojtech Bocek05534202013-09-11 08:11:56 +0200214 TWFunc::Exec_Cmd(injectcmd);
Dees_Troya449a6f2013-04-07 17:50:11 -0500215 }
216 LOGINFO("Backup of TWRP ramdisk done.\n");
217#endif
218
bigbiffdf8436b2020-08-30 16:22:34 -0400219 Decrypt_Page(skip_decryption, datamedia);
Captain Throwback89b56a12021-02-10 18:25:07 -0500220 PartitionManager.Output_Partition_Logging();
Dees_Troya449a6f2013-04-07 17:50:11 -0500221
Vojtech Bocek2005a842014-03-11 19:40:34 +0100222 // Fixup the RTC clock on devices which require it
bigbiffadc599e2020-05-28 19:36:30 +0000223 if (crash_counter == 0)
224 TWFunc::Fixup_Time_On_Boot();
Vojtech Bocek2005a842014-03-11 19:40:34 +0100225
epicXa721f952021-01-04 13:01:31 +0530226 DataManager::LoadTWRPFolderInfo();
Ian Macdonald1e0474a2020-09-09 02:43:13 +0200227 DataManager::ReadSettingsFile();
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500228
Dees_Troya449a6f2013-04-07 17:50:11 -0500229 // Run any outstanding OpenRecoveryScript
bigbiff25d25b92020-06-19 16:07:38 -0400230 std::string cacheDir = TWFunc::get_log_dir();
231 if (cacheDir == DATA_LOGS_DIR)
232 cacheDir = "/data/cache";
bigbiff bigbiff19874f12019-01-08 20:06:57 -0500233 std::string orsFile = cacheDir + "/recovery/openrecoveryscript";
bigbiffdf8436b2020-08-30 16:22:34 -0400234 if ((DataManager::GetIntValue(TW_IS_ENCRYPTED) == 0 || skip_decryption) && (TWFunc::Path_Exists(SCRIPT_FILE_TMP) || TWFunc::Path_Exists(orsFile))) {
Dees_Troya449a6f2013-04-07 17:50:11 -0500235 OpenRecoveryScript::Run_OpenRecoveryScript();
236 }
Vojtech Bocekd0e38bc2014-02-03 23:36:57 +0100237
Ethan Yonker6f49e112014-09-03 21:42:49 -0500238#ifdef TW_HAS_MTP
Ethan Yonker6f49e112014-09-03 21:42:49 -0500239 char mtp_crash_check[PROPERTY_VALUE_MAX];
240 property_get("mtp.crash_check", mtp_crash_check, "0");
Matt Mower653a1702017-02-16 10:38:52 -0600241 if (DataManager::GetIntValue("tw_mtp_enabled")
242 && !strcmp(mtp_crash_check, "0") && !crash_counter
243 && (!DataManager::GetIntValue(TW_IS_ENCRYPTED) || DataManager::GetIntValue(TW_IS_DECRYPTED))) {
Ethan Yonker6f49e112014-09-03 21:42:49 -0500244 property_set("mtp.crash_check", "1");
Matt Mower653a1702017-02-16 10:38:52 -0600245 LOGINFO("Starting MTP\n");
246 if (!PartitionManager.Enable_MTP())
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600247 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600248 else
249 gui_msg("mtp_enabled=MTP Enabled");
Ethan Yonker6f49e112014-09-03 21:42:49 -0500250 property_set("mtp.crash_check", "0");
Matt Mower653a1702017-02-16 10:38:52 -0600251 } else if (strcmp(mtp_crash_check, "0")) {
Ethan Yonker74db1572015-10-28 12:44:49 -0500252 gui_warn("mtp_crash=MTP Crashed, not starting MTP on boot.");
Ethan Yonker12055fa2014-09-04 08:06:53 -0500253 DataManager::SetValue("tw_mtp_enabled", 0);
Ethan Yonkerdf7abac2014-12-29 10:48:17 -0600254 PartitionManager.Disable_MTP();
Matt Mower653a1702017-02-16 10:38:52 -0600255 } else if (crash_counter == 1) {
256 LOGINFO("TWRP crashed; disabling MTP as a precaution.\n");
257 PartitionManager.Disable_MTP();
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400258 }
Ethan Yonker6f49e112014-09-03 21:42:49 -0500259#endif
bigbiff bigbiffc7eee6f2014-09-02 18:59:01 -0400260
Ethan Yonker89583ef2015-08-26 09:01:59 -0500261#ifndef TW_OEM_BUILD
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500262 // Check if system has never been changed
Captain Throwback9d6feb52018-07-27 10:05:24 -0400263 TWPartition* sys = PartitionManager.Find_Partition_By_Path(PartitionManager.Get_Android_Root_Path());
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500264 TWPartition* ven = PartitionManager.Find_Partition_By_Path("/vendor");
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500265 if (sys) {
bigbiffee7b7ff2020-03-23 15:08:27 -0400266 if (sys->Get_Super_Status()) {
bigbiff7ba75002020-04-11 20:47:09 -0400267#ifdef TW_INCLUDE_CRYPTO
bigbiff25d25b92020-06-19 16:07:38 -0400268 std::string recoveryLogDir(DATA_LOGS_DIR);
269 recoveryLogDir += "/recovery";
270 if (!TWFunc::Path_Exists(recoveryLogDir)) {
271 bool created = PartitionManager.Recreate_Logs_Dir();
272 if (!created)
273 LOGERR("Unable to create log directory for TWRP\n");
274 }
bigbiff7ba75002020-04-11 20:47:09 -0400275 DataManager::ReadSettingsFile();
276#endif
bigbiffee7b7ff2020-03-23 15:08:27 -0400277 } else {
278 if ((DataManager::GetIntValue("tw_mount_system_ro") == 0 && sys->Check_Lifetime_Writes() == 0) || DataManager::GetIntValue("tw_mount_system_ro") == 2) {
279 if (DataManager::GetIntValue("tw_never_show_system_ro_page") == 0) {
280 DataManager::SetValue("tw_back", "main");
281 if (gui_startPage("system_readonly", 1, 1) != 0) {
282 LOGERR("Failed to start system_readonly GUI page.\n");
283 }
284 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 0) {
285 sys->Change_Mount_Read_Only(false);
286 if (ven)
287 ven->Change_Mount_Read_Only(false);
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500288 }
bigbiffee7b7ff2020-03-23 15:08:27 -0400289 } else if (DataManager::GetIntValue("tw_mount_system_ro") == 1) {
290 // Do nothing, user selected to leave system read only
291 } else {
Ethan Yonker0e2c6572015-06-04 11:30:02 -0500292 sys->Change_Mount_Read_Only(false);
Ethan Yonker1673e3d2015-10-26 21:51:58 -0500293 if (ven)
294 ven->Change_Mount_Read_Only(false);
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500295 }
Ethan Yonkereb32b1f2015-05-18 10:23:03 -0500296 }
297 }
Ethan Yonker89583ef2015-08-26 09:01:59 -0500298#endif
bigbiff7ba75002020-04-11 20:47:09 -0400299
bigbiffaac58612020-08-30 11:18:39 -0400300 TWFunc::Update_Log_File();
301
bigbiff bigbiff19fb79c2016-09-05 21:04:51 -0400302 adb_bu_fifo->threadAdbBuFifo();
303
Ethan Yonker89583ef2015-08-26 09:01:59 -0500304#ifndef TW_OEM_BUILD
Ethan Yonker9132d912015-02-02 10:32:49 -0600305 // Disable flashing of stock recovery
306 TWFunc::Disable_Stock_Recovery_Replace();
Ethan Yonker89583ef2015-08-26 09:01:59 -0500307#endif
bigbiffdf8436b2020-08-30 16:22:34 -0400308}
Dees_Troya449a6f2013-04-07 17:50:11 -0500309
bigbiffdf8436b2020-08-30 16:22:34 -0400310static void reboot() {
Ethan Yonker74db1572015-10-28 12:44:49 -0500311 gui_msg(Msg("rebooting=Rebooting..."));
bigbiffdf8436b2020-08-30 16:22:34 -0400312 TWFunc::Update_Log_File();
Dees_Troya449a6f2013-04-07 17:50:11 -0500313 string Reboot_Arg;
bigbiffdf8436b2020-08-30 16:22:34 -0400314
Dees_Troya449a6f2013-04-07 17:50:11 -0500315 DataManager::GetValue("tw_reboot_arg", Reboot_Arg);
316 if (Reboot_Arg == "recovery")
317 TWFunc::tw_reboot(rb_recovery);
318 else if (Reboot_Arg == "poweroff")
319 TWFunc::tw_reboot(rb_poweroff);
320 else if (Reboot_Arg == "bootloader")
321 TWFunc::tw_reboot(rb_bootloader);
322 else if (Reboot_Arg == "download")
323 TWFunc::tw_reboot(rb_download);
mauronofrioe9a49ef2018-10-03 13:38:16 +0200324 else if (Reboot_Arg == "edl")
325 TWFunc::tw_reboot(rb_edl);
bigbiffdf8436b2020-08-30 16:22:34 -0400326 else if (Reboot_Arg == "fastboot")
327 TWFunc::tw_reboot(rb_fastboot);
Dees_Troya449a6f2013-04-07 17:50:11 -0500328 else
329 TWFunc::tw_reboot(rb_system);
bigbiffdf8436b2020-08-30 16:22:34 -0400330}
331
332int main(int argc, char **argv) {
333 // Recovery needs to install world-readable files, so clear umask
334 // set by init
335 umask(0);
bigbiffdf8436b2020-08-30 16:22:34 -0400336 Log_Offset = 0;
337
338 // Set up temporary log file (/tmp/recovery.log)
339 freopen(TMP_LOG_FILE, "a", stdout);
340 setbuf(stdout, NULL);
341 freopen(TMP_LOG_FILE, "a", stderr);
342 setbuf(stderr, NULL);
343
344 signal(SIGPIPE, SIG_IGN);
345
346 // Handle ADB sideload
347 if (argc == 3 && strcmp(argv[1], "--adbd") == 0) {
348 property_set("ctl.stop", "adbd");
349#ifdef TW_USE_NEW_MINADBD
350 //adb_server_main(0, DEFAULT_ADB_PORT, -1); TODO fix this for android8
351 // minadbd_main();
352#else
353 adb_main(argv[2]);
354#endif
355 return 0;
356 }
357
358#ifdef RECOVERY_SDCARD_ON_DATA
359 datamedia = true;
360#endif
361
362 property_set("ro.twrp.boot", "1");
363 property_set("ro.twrp.version", TW_VERSION_STR);
364
365 time_t StartupTime = time(NULL);
366 printf("Starting TWRP %s-%s on %s (pid %d)\n", TW_VERSION_STR, TW_GIT_REVISION, ctime(&StartupTime), getpid());
367
368 // Load default values to set DataManager constants and handle ifdefs
369 DataManager::SetDefaultValues();
370 printf("Starting the UI...\n");
371 gui_init();
372
373 // Load up all the resources
374 gui_loadResources();
375
bigbiffdf8436b2020-08-30 16:22:34 -0400376 startupArgs startup;
377 startup.parse(&argc, &argv);
378 twrpAdbBuFifo *adb_bu_fifo = new twrpAdbBuFifo();
379 TWFunc::Clear_Bootloader_Message();
380
381 if (startup.Get_Fastboot_Mode()) {
bigbiff22851b92021-09-01 16:46:57 -0400382 process_fastbootd_mode();
bigbiffdf8436b2020-08-30 16:22:34 -0400383 delete adb_bu_fifo;
384 TWFunc::Update_Intent_File(startup.Get_Intent());
bigbiffdf8436b2020-08-30 16:22:34 -0400385 reboot();
386 return 0;
387 } else {
388 process_recovery_mode(adb_bu_fifo, startup.Should_Skip_Decryption());
389 }
390
Ian Macdonalda9910222020-10-27 18:02:21 +0100391 PageManager::LoadLanguage(DataManager::GetStrValue("tw_language"));
392 GUIConsole::Translate_Now();
393
epicX271bb3a2020-12-30 01:03:18 +0530394 TWFunc::checkforapp(); //Checking compatibility for TWRP app
395
bigbiffdf8436b2020-08-30 16:22:34 -0400396 // Launch the main GUI
397 gui_start();
398 delete adb_bu_fifo;
399 TWFunc::Update_Intent_File(startup.Get_Intent());
bigbiffdf8436b2020-08-30 16:22:34 -0400400 reboot();
Dees_Troya449a6f2013-04-07 17:50:11 -0500401
Vojtech Bocekfafb0c52013-07-25 22:53:02 +0200402 return 0;
Dees_Troya449a6f2013-04-07 17:50:11 -0500403}