getprop("ro.product.device") == "begonia" || abort("E3004: This package is for \"begonia\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.1.0.PGGRUXM:user/release-keys");
ui_print("Target: Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.3.0.PGGRUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.1.0.PGGRUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.3.0.PGGRUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.1.0.PGGRUXM:user/release-keys or Redmi/begonia_ru/begonia:9/PPR1.180610.011/V11.0.3.0.PGGRUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 5);
apply_patch_check("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:dc058ce4b789351dda2ab3c4ad136c91350d1e01:67108864:0de78669bdb1b7fab078259fd9a457e7fbc9fff4", "dc058ce4b789351dda2ab3c4ad136c91350d1e01", "0de78669bdb1b7fab078259fd9a457e7fbc9fff4") || abort("E3005: \"EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:dc058ce4b789351dda2ab3c4ad136c91350d1e01:67108864:0de78669bdb1b7fab078259fd9a457e7fbc9fff4\" has unexpected contents.");
apply_patch_space(102875136) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/platform/bootdevice/by-name/system", "108,1,561,728,734,735,1459,1461,1462,1465,1466,1470,1974,1975,1978,1983,1985,1993,1995,1996,1997,2002,3991,3995,3997,4003,32770,32990,32991,33496,65537,66042,98306,98526,98527,99032,131073,131578,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,424557,424566,424568,424576,425985,426490,458753,459258,491521,492026,524289,524794,541614,541616,557057,557562,589825,590330,622593,623098,655361,655866,680155,680158,680186,680189,688129,688634,720897,721402,753665,754170,786433,786938,819202,819422,819423,819928,851969,852474,854094,884736,884738,884958,884959,903007,917316,917503,917504") == "a7e33703a4df2fb8fc57c567d1c9c7635f3fdd39" || block_image_verify("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/platform/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/platform/bootdevice/by-name/system", "108,1,561,728,734,735,1459,1461,1462,1465,1466,1470,1974,1975,1978,1983,1985,1993,1995,1996,1997,2002,3991,3995,3997,4003,32770,32990,32991,33496,65537,66042,98306,98526,98527,99032,131073,131578,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,424557,424566,424568,424576,425985,426490,458753,459258,491521,492026,524289,524794,541614,541616,557057,557562,589825,590330,622593,623098,655361,655866,680155,680158,680186,680189,688129,688634,720897,721402,753665,754170,786433,786938,819202,819422,819423,819928,851969,852474,854094,884736,884738,884958,884959,903007,917316,917503,917504") && block_image_verify("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/platform/bootdevice/by-name/vendor", "136,1,257,602,615,2868,2870,5884,5885,13250,13251,17225,17226,29456,29457,32768,32770,32864,32865,34176,34177,36579,36580,41381,41382,48323,48324,48941,48944,48948,48949,48963,48965,48968,48969,49113,49114,49148,49149,49207,49209,49454,49455,49480,49665,49829,50037,50184,50185,50194,50196,50197,50199,50273,50274,50280,50281,50291,50292,53783,53798,53852,53853,54087,54088,54104,54108,55188,55189,58137,58138,58398,58399,63033,63034,63136,63137,65536,65537,68119,68120,68124,68125,68181,68182,68275,68276,68286,68288,74219,74220,74333,74334,77210,77211,80051,80052,80099,80100,80116,80117,84063,84093,84096,84106,84402,84760,85146,85317,85742,85921,86008,98306,98400,98401,98906,131073,131578,163842,163936,163937,164442,196609,197114,229378,229472,229473,229978,232768,294912,294914,360448,360449,386991,393125,393215,393216") == "7bc6693c86ec3ec40919e855382a612ecfbf8f0f" || block_image_verify("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/platform/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/platform/bootdevice/by-name/vendor", "136,1,257,602,615,2868,2870,5884,5885,13250,13251,17225,17226,29456,29457,32768,32770,32864,32865,34176,34177,36579,36580,41381,41382,48323,48324,48941,48944,48948,48949,48963,48965,48968,48969,49113,49114,49148,49149,49207,49209,49454,49455,49480,49665,49829,50037,50184,50185,50194,50196,50197,50199,50273,50274,50280,50281,50291,50292,53783,53798,53852,53853,54087,54088,54104,54108,55188,55189,58137,58138,58398,58399,63033,63034,63136,63137,65536,65537,68119,68120,68124,68125,68181,68182,68275,68276,68286,68288,74219,74220,74333,74334,77210,77211,80051,80052,80099,80100,80116,80117,84063,84093,84096,84106,84402,84760,85146,85317,85742,85921,86008,98306,98400,98401,98906,131073,131578,163842,163936,163937,164442,196609,197114,229378,229472,229473,229978,232768,294912,294914,360448,360449,386991,393125,393215,393216") && block_image_verify("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:dc058ce4b789351dda2ab3c4ad136c91350d1e01:67108864:0de78669bdb1b7fab078259fd9a457e7fbc9fff4",
            "-", 0de78669bdb1b7fab078259fd9a457e7fbc9fff4, 67108864,
            dc058ce4b789351dda2ab3c4ad136c91350d1e01, package_extract_file("patch/boot.img.p")) || abort("Failed to apply patch \"patch/boot.img.p \".");
show_progress(0.600000, 400);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_mtupdate_stage("/cache/recovery/last_mtupdate_stage");
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "1") ,
(
ui_print("start to update general image");
package_extract_file("audio_dsp.img", "/dev/block/platform/bootdevice/by-name/audio_dsp");
package_extract_file("cam_vpu3.img", "/dev/block/platform/bootdevice/by-name/cam_vpu3");
package_extract_file("dtbo.img", "/dev/block/platform/bootdevice/by-name/dtbo");
package_extract_file("cam_vpu2.img", "/dev/block/platform/bootdevice/by-name/cam_vpu2");
package_extract_file("md1img.img", "/dev/block/platform/bootdevice/by-name/md1img");
package_extract_file("spmfw.img", "/dev/block/platform/bootdevice/by-name/spmfw");
package_extract_file("cam_vpu1.img", "/dev/block/platform/bootdevice/by-name/cam_vpu1");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "1");
),
ui_print("general images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "3") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "2") then

ui_print("start to update alt loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_2");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee2");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk2");
package_extract_file("gz.img", "/dev/block/platform/bootdevice/by-name/gz2");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp2");
assert(set_emmc_writable("/sys/block/mmcblk0boot1/force_ro"),
       package_extract_file("preloader.img", "/dev/block/mmcblk0boot1"));

set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "2");
endif;

switch_active("sspm_1", "sspm_2");
switch_active("tee1", "tee2");
switch_active("lk", "lk2");
switch_active("gz1", "gz2");
switch_active("scp1", "scp2");
switch_active("preloader", "preloader2");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "3");
),
ui_print("alt loder images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "5") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "4") then

ui_print("start to update main loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_1");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee1");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk");
package_extract_file("gz.img", "/dev/block/platform/bootdevice/by-name/gz1");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp1");
assert(set_emmc_writable("/sys/block/mmcblk0boot0/force_ro"),
       package_extract_file("preloader.img", "/dev/block/mmcblk0boot0"));

set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "4");
endif;

switch_active("sspm_2", "sspm_1");
switch_active("tee2", "tee1");
switch_active("lk2", "lk");
switch_active("gz2", "gz1");
switch_active("scp2", "scp1");
switch_active("preloader2", "preloader");
),
ui_print("main loader images are already updated");
);
delete("/cache/recovery/last_mtupdate_stage");
package_extract_file("vbmeta.img", "/dev/block/platform/bootdevice/by-name/vbmeta");
set_ota_result_for_dm_verity();
show_progress(0.100000, 2);
