getprop("ro.product.device") == "tiare" || abort("E3004: This package is for \"tiare\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.18.0.OCLRUXM:user/release-keys");
ui_print("Target: Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.21.0.OCLRUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.18.0.OCLRUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.21.0.OCLRUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.18.0.OCLRUXM:user/release-keys or Xiaomi/tiare_ru/tiare:8.1.0/OPM1.171019.026/V10.2.21.0.OCLRUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
apply_patch_space(77099008) || abort("E3006: Not enough free space on /cache to apply patches.");
if (range_sha1("/dev/block/bootdevice/by-name/system", "28,1,177,187,337,5412,32770,32933,98306,98469,131073,139264,163842,164005,214485,215039,215740,216799,229378,229541,267692,268741,294914,295077,306985,334150,336784,336791,339456") == "90fad1653ff0cc53d0e0011a022dcce4bced59f5" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "28,1,177,187,337,5412,32770,32933,98306,98469,131073,139264,163842,164005,214485,215039,215740,216799,229378,229541,267692,268741,294914,295077,306985,334150,336784,336791,339456") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "20,1,45,47,109,2552,32770,32809,32810,36905,72196,72272,72441,72448,72449,72451,74796,80127,80760,80767,81408") == "eee8b6940bb2c94174599f6b3720115c2fe79393" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "20,1,45,47,109,2552,32770,32809,32810,36905,72196,72272,72441,72448,72449,72451,74796,80127,80760,80767,81408") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

write_value("0", "/sys/class/power_supply/battery/batfet_reset_enable");
write_value("0", "/sys/devices/soc/qpnp-power-on-5/kpdpwr_reset");
ui_print("Patching system image after verification.");
show_progress(0.800000, 0);
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
show_progress(0.100000, 0);
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
ui_print("Installing boot image...");
package_extract_file("boot.img", "/dev/block/bootdevice/by-name/boot");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
ifelse(msm.boot_update("main"), (
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpm");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/aboot");
package_extract_file("firmware-update/lksecapp.mbn", "/dev/block/bootdevice/by-name/lksecapp");
package_extract_file("firmware-update/keymaster64.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1");
package_extract_file("firmware-update/cmnlib64_30.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/cmnlib_30.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
), "");
ifelse(msm.boot_update("backup"), (
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpmbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/abootbak");
package_extract_file("firmware-update/lksecapp.mbn", "/dev/block/bootdevice/by-name/lksecappbak");
package_extract_file("firmware-update/keymaster64.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1bak");
package_extract_file("firmware-update/cmnlib64_30.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib_30.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
), "");
msm.boot_update("finalize");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
set_progress(1.000000);
write_value("1", "/sys/class/power_supply/battery/batfet_reset_enable");
write_value("1", "/sys/devices/soc/qpnp-power-on-5/kpdpwr_reset");
