getprop("ro.product.device") == "cereus" || abort("E3004: This package is for \"cereus\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.3.0.PCGRUXM:user/release-keys");
ui_print("Target: xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.4.0.PCGRUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.3.0.PCGRUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.4.0.PCGRUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.3.0.PCGRUXM:user/release-keys or xiaomi/cereus_ru/cereus:9/PPR1.180610.011/V11.0.4.0.PCGRUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
apply_patch_space(214736896) || abort("E3006: Not enough free space on /cache to apply patches.");
apply_patch_check("EMMC:/dev/block/platform/bootdevice/by-name/md1img:56802896:375031a56a6c27bc098c63650d676d96d36a61b4:56802896:cb3854e6157b89fcc8dff7d23a32ad4cce3f4bac", "375031a56a6c27bc098c63650d676d96d36a61b4", "cb3854e6157b89fcc8dff7d23a32ad4cce3f4bac") || abort("E3005: \"EMMC:/dev/block/platform/bootdevice/by-name/md1img:56802896:375031a56a6c27bc098c63650d676d96d36a61b4:56802896:cb3854e6157b89fcc8dff7d23a32ad4cce3f4bac\" has unexpected contents.");
apply_patch_space(56802896) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/platform/bootdevice/by-name/system", "124,1,373,665,32770,32927,32928,33433,65537,66042,71018,71115,71255,71656,98306,98463,98464,98969,129514,131072,131073,138212,163842,163999,164000,164505,196609,197114,201214,201227,201231,201251,201275,201293,201322,201323,201336,201351,201573,201575,201672,201677,201692,201712,201742,201760,201794,201796,201809,201824,201865,201866,202198,202201,202309,202310,203277,204654,229378,229535,229536,230041,262145,262650,294914,295071,295072,295577,327681,328186,342765,342775,344689,344950,345126,345195,345455,345663,345675,345714,345871,345904,345928,345968,346041,346075,346316,346433,360449,360954,393217,393722,425985,426490,432580,440772,454572,456734,458753,459258,491521,492026,512439,512884,512885,514475,514476,515384,524289,524794,529378,529696,539669,541381,557057,557562,589825,590330,607227,622592,622593,644999,655221,655359,655360") == "3cf6283cb5acae64f8c9b7adc33e06fb80df38ef" || block_image_verify("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/platform/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/platform/bootdevice/by-name/system", "124,1,373,665,32770,32927,32928,33433,65537,66042,71018,71115,71255,71656,98306,98463,98464,98969,129514,131072,131073,138212,163842,163999,164000,164505,196609,197114,201214,201227,201231,201251,201275,201293,201322,201323,201336,201351,201573,201575,201672,201677,201692,201712,201742,201760,201794,201796,201809,201824,201865,201866,202198,202201,202309,202310,203277,204654,229378,229535,229536,230041,262145,262650,294914,295071,295072,295577,327681,328186,342765,342775,344689,344950,345126,345195,345455,345663,345675,345714,345871,345904,345928,345968,346041,346075,346316,346433,360449,360954,393217,393722,425985,426490,432580,440772,454572,456734,458753,459258,491521,492026,512439,512884,512885,514475,514476,515384,524289,524794,529378,529696,539669,541381,557057,557562,589825,590330,607227,622592,622593,644999,655221,655359,655360") && block_image_verify("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/platform/bootdevice/by-name/vendor", "20,1,140,555,32770,32817,32818,33323,65537,66042,80119,98304,98306,163840,163842,163889,163890,193485,196553,196607,196608") == "da649818592776beb7c360696db00cf17d544d4b" || block_image_verify("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/platform/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/platform/bootdevice/by-name/vendor", "20,1,140,555,32770,32817,32818,33323,65537,66042,80119,98304,98306,163840,163842,163889,163890,193485,196553,196607,196608") && block_image_verify("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Installing boot image...");
package_extract_file("boot.img", "/dev/block/platform/bootdevice/by-name/boot");
show_progress(0.600000, 400);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/platform/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/platform/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_mtupdate_stage("/cache/recovery/last_mtupdate_stage");
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "1") ,
(
ui_print("start to update general image");
package_extract_file("logo.bin", "/dev/block/platform/bootdevice/by-name/logo");
package_extract_file("odmdtbo.img", "/dev/block/platform/bootdevice/by-name/odmdtbo");
ui_print("Patching md1img image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/platform/bootdevice/by-name/md1img:56802896:375031a56a6c27bc098c63650d676d96d36a61b4:56802896:cb3854e6157b89fcc8dff7d23a32ad4cce3f4bac",
            "-", cb3854e6157b89fcc8dff7d23a32ad4cce3f4bac, 56802896,
            375031a56a6c27bc098c63650d676d96d36a61b4, package_extract_file("patch/md1img.img.p")) || abort("Failed to apply patch \"patch/md1img.img.p \".");
package_extract_file("spmfw.img", "/dev/block/platform/bootdevice/by-name/spmfw");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "1");
),
ui_print("general images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "3") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "2") then

ui_print("start to update alt loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_2");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee2");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk2");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp2");
assert(set_emmc_writable("/sys/block/mmcblk0boot1/force_ro"),
       package_extract_file("preloader.img", "/dev/block/mmcblk0boot1"));

set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "2");
endif;

switch_active("sspm_1", "sspm_2");
switch_active("tee1", "tee2");
switch_active("lk", "lk2");
switch_active("scp1", "scp2");
switch_active("preloader", "preloader2");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "3");
),
ui_print("alt loder images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "5") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "4") then

ui_print("start to update main loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_1");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee1");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp1");
assert(set_emmc_writable("/sys/block/mmcblk0boot0/force_ro"),
       package_extract_file("preloader.img", "/dev/block/mmcblk0boot0"));

set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "4");
endif;

switch_active("sspm_2", "sspm_1");
switch_active("tee2", "tee1");
switch_active("lk2", "lk");
switch_active("scp2", "scp1");
switch_active("preloader2", "preloader");
),
ui_print("main loader images are already updated");
);
delete("/cache/recovery/last_mtupdate_stage");
package_extract_file("vbmeta.img", "/dev/block/platform/bootdevice/by-name/vbmeta");
set_ota_result_for_dm_verity();
show_progress(0.100000, 2);
