getprop("ro.product.device") == "ginkgo" || abort("E3004: This package is for \"ginkgo\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.6.0.PCOIDXM:user/release-keys");
ui_print("Target: xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.6.0.PCOIDXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.6.0.PCOIDXM:user/release-keys or xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.7.0.PCOIDXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 5);
apply_patch_check("EMMC:/dev/block/bootdevice/by-name/boot:67108864:1753ea864ca891faf5d51232bfa7133d10576f23:67108864:4b7bd1802a63801f9fe81301b13f25d41b62a640") || abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:67108864:1753ea864ca891faf5d51232bfa7133d10576f23:67108864:4b7bd1802a63801f9fe81301b13f25d41b62a640\" has unexpected contents.");
apply_patch_space(67108864) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "154,1,302,317,680,8381,8390,8443,8444,9075,9077,9080,9081,9082,9083,9087,9088,9089,9090,9098,9100,9109,9112,9117,9119,9128,9129,9261,9263,19045,19046,24925,24926,25302,25303,25322,25323,25366,25367,25371,25372,32768,32770,34673,34674,38655,38829,40690,40691,41310,41473,46016,46017,52053,52054,58821,59766,71129,71130,72362,72363,74095,74096,74762,75534,82934,82935,90966,90967,91468,91469,91492,91493,91623,91730,92194,92749,96323,96349,98304,98306,113588,113589,116645,117044,118805,118806,119481,119483,122858,124758,127445,127446,132266,132267,132830,134310,134501,134599,134744,134745,134933,134934,135572,135574,135590,135591,135608,135610,135620,135623,135778,135779,135784,135785,135893,135895,136887,136888,137174,137175,137731,137732,145986,146007,146242,150093,150098,150289,150293,150294,150647,150650,150721,163842,164125,229378,229661,294914,295197,524301,532384,819202,819485,884738,885021,924202,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") == "5a59833d3b3bb31c768e7b3a3c31840f19f8215e" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "154,1,302,317,680,8381,8390,8443,8444,9075,9077,9080,9081,9082,9083,9087,9088,9089,9090,9098,9100,9109,9112,9117,9119,9128,9129,9261,9263,19045,19046,24925,24926,25302,25303,25322,25323,25366,25367,25371,25372,32768,32770,34673,34674,38655,38829,40690,40691,41310,41473,46016,46017,52053,52054,58821,59766,71129,71130,72362,72363,74095,74096,74762,75534,82934,82935,90966,90967,91468,91469,91492,91493,91623,91730,92194,92749,96323,96349,98304,98306,113588,113589,116645,117044,118805,118806,119481,119483,122858,124758,127445,127446,132266,132267,132830,134310,134501,134599,134744,134745,134933,134934,135572,135574,135590,135591,135608,135610,135620,135623,135778,135779,135784,135785,135893,135895,136887,136888,137174,137175,137731,137732,145986,146007,146242,150093,150098,150289,150293,150294,150647,150650,150721,163842,164125,229378,229661,294914,295197,524301,532384,819202,819485,884738,885021,924202,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "72,1,102,107,109,120,324,6168,6176,6180,6181,6196,6197,6201,6202,8294,8295,8297,8298,8302,8303,8305,8306,8312,8313,8315,8334,8360,8361,8671,8672,23280,23281,23890,23891,24858,25021,27260,27261,32768,32770,33441,33442,35641,35642,41575,44761,45444,45445,50513,50545,51303,51304,52212,52213,54153,54154,54162,54173,54344,98306,98400,163842,163936,174434,229376,229378,294912,294914,386991,393125,393215,393216") == "9bd250b5bc62296d380cff473395d8bd01d03b9b" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "72,1,102,107,109,120,324,6168,6176,6180,6181,6196,6197,6201,6202,8294,8295,8297,8298,8302,8303,8305,8306,8312,8313,8315,8334,8360,8361,8671,8672,23280,23281,23890,23891,24858,25021,27260,27261,32768,32770,33441,33442,35641,35642,41575,44761,45444,45445,50513,50545,51303,51304,52212,52213,54153,54154,54162,54173,54344,98306,98400,163842,163936,174434,229376,229378,294912,294914,386991,393125,393215,393216") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/bootdevice/by-name/boot:67108864:1753ea864ca891faf5d51232bfa7133d10576f23:67108864:4b7bd1802a63801f9fe81301b13f25d41b62a640",
            "-", 4b7bd1802a63801f9fe81301b13f25d41b62a640, 67108864,
            1753ea864ca891faf5d51232bfa7133d10576f23, package_extract_file("patch/boot.img.p")) || abort("Failed to apply patch \"patch/boot.img.p \".");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpm");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpmbak");
show_progress(0.600000, 400);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
show_progress(0.100000, 2);
