getprop("ro.product.device") == "cmi" || abort("E3004: This package is for \"cmi\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.1.0.QJAEUXM:user/release-keys");
ui_print("Target: Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.7.0.QJAEUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.1.0.QJAEUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.7.0.QJAEUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.1.0.QJAEUXM:user/release-keys or Xiaomi/cmi_eea/cmi:10/QKQ1.191117.002/V11.0.7.0.QJAEUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:086db74ebc2e6853a9d082930c281467e1b5034a",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:ad7379136d51ca8db2e6bc4c227781ee2ef5b152") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:086db74ebc2e6853a9d082930c281467e1b5034a\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:ad7379136d51ca8db2e6bc4c227781ee2ef5b152\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1(map_partition("system"), "38,1,188,215,224,226,227,487,491,507,508,32768,32770,32920,32942,34281,34283,34406,34410,34417,34418,34426,34430,34435,98306,98456,163842,163992,229378,229528,294914,295064,589829,589846,615391,617244,627025,627159,627160") == "298a1670716f33b43632215b9314303e4e511c34" || block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block(map_partition("system"));
ifelse (block_image_recover(map_partition("system"), "38,1,188,215,224,226,227,487,491,507,508,32768,32770,32920,32942,34281,34283,34406,34410,34417,34418,34426,34430,34435,98306,98456,163842,163992,229378,229528,294914,295064,589829,589846,615391,617244,627025,627159,627160") && block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1(map_partition("vendor"), "202,1,124,134,138,143,144,225,229,234,235,241,245,249,250,513,517,522,523,525,536,1064,1068,1073,1074,1086,1090,1094,1095,1098,1102,1106,1107,1290,1706,1892,2231,2378,2428,2434,2756,2833,2834,14447,14448,14739,14791,15470,15471,16103,16104,17255,17261,21163,21164,22435,22436,32768,32770,32865,32889,43767,43769,46621,46622,50748,50749,53142,53143,60083,60084,61089,61091,61128,61129,65536,65555,65766,65767,66402,66404,67037,67038,67120,67121,87913,87916,87934,87935,87980,87981,87999,88000,88143,88146,88805,88806,89567,89568,89576,89577,91914,91915,91940,91941,91978,91979,92095,92096,92187,92188,92677,92678,98304,98306,98401,98422,104554,104555,104557,104558,104941,104943,105002,105003,105014,105015,105171,105172,108233,108234,108235,108236,108260,108261,108687,108688,108713,108714,108882,108883,109255,109256,109317,109318,109457,109458,109579,109580,109648,109649,109787,109788,109903,109904,109949,109950,110166,110167,110208,110209,110246,110247,110424,110425,110558,110559,110947,110948,111078,111079,111129,111130,111228,111229,111290,111292,111293,111299,111397,111399,111406,111418,111419,111421,111428,111440,111570,111571,112668,163842,163937,229378,229473,294914,295009,360458,360467,388837,390028,396210,396302,396303") == "b2eae744a789f1159850beb824c35fe01e70001d" || block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block(map_partition("vendor"));
ifelse (block_image_recover(map_partition("vendor"), "202,1,124,134,138,143,144,225,229,234,235,241,245,249,250,513,517,522,523,525,536,1064,1068,1073,1074,1086,1090,1094,1095,1098,1102,1106,1107,1290,1706,1892,2231,2378,2428,2434,2756,2833,2834,14447,14448,14739,14791,15470,15471,16103,16104,17255,17261,21163,21164,22435,22436,32768,32770,32865,32889,43767,43769,46621,46622,50748,50749,53142,53143,60083,60084,61089,61091,61128,61129,65536,65555,65766,65767,66402,66404,67037,67038,67120,67121,87913,87916,87934,87935,87980,87981,87999,88000,88143,88146,88805,88806,89567,89568,89576,89577,91914,91915,91940,91941,91978,91979,92095,92096,92187,92188,92677,92678,98304,98306,98401,98422,104554,104555,104557,104558,104941,104943,105002,105003,105014,105015,105171,105172,108233,108234,108235,108236,108260,108261,108687,108688,108713,108714,108882,108883,109255,109256,109317,109318,109457,109458,109579,109580,109648,109649,109787,109788,109903,109904,109949,109950,110166,110167,110208,110209,110246,110247,110424,110425,110558,110559,110947,110948,111078,111079,111129,111130,111228,111229,111290,111292,111293,111299,111397,111399,111406,111418,111419,111421,111428,111440,111570,111571,112668,163842,163937,229378,229473,294914,295009,360458,360467,388837,390028,396210,396302,396303") && block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;
if (range_sha1(map_partition("product"), "14,1,32770,32839,98306,98375,163842,163911,229378,229447,284133,285000,289519,289589,289590") == "3b5659b079bca3baa9e069656d964c293604a073" || block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat")) then
ui_print("Verified product image...");
else
check_first_block(map_partition("product"));
ifelse (block_image_recover(map_partition("product"), "14,1,32770,32839,98306,98375,163842,163911,229378,229447,284133,285000,289519,289589,289590") && block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat"), ui_print("product recovered successfully."), abort("E2004: product partition fails to recover"));
endif;
if (range_sha1(map_partition("odm"), "10,1,2,9,13,2026,2035,32231,32745,32767,32768") == "39fa9dc72b06cdcf1caddac4757acb3500730e88" || block_image_verify(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat")) then
ui_print("Verified odm image...");
else
check_first_block(map_partition("odm"));
ifelse (block_image_recover(map_partition("odm"), "10,1,2,9,13,2026,2035,32231,32745,32767,32768") && block_image_verify(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat"), ui_print("odm recovered successfully."), abort("E2004: odm partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:086db74ebc2e6853a9d082930c281467e1b5034a",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:ad7379136d51ca8db2e6bc4c227781ee2ef5b152",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:ad7379136d51ca8db2e6bc4c227781ee2ef5b152");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/xbl_config_5.elf", "/dev/block/bootdevice/by-name/xbl_config_5");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/xbl_5.elf", "/dev/block/bootdevice/by-name/xbl_5");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config_4.elf", "/dev/block/bootdevice/by-name/xbl_config_4");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/xbl_4.elf", "/dev/block/bootdevice/by-name/xbl_4");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsecbak");
show_progress(0.600000, 600);

# --- Start patching dynamic partitions ---


# Patch partition vendor

ui_print("Patching vendor image after verification.");
block_image_update(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# Update dynamic partition metadata

assert(update_dynamic_partitions(package_extract_file("dynamic_partitions_op_list")));

# Patch partition product

ui_print("Patching product image after verification.");
block_image_update(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat") ||
  abort("E2001: Failed to update product image.");

# Patch partition system

ui_print("Patching system image after verification.");
block_image_update(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");

# Patch partition odm

ui_print("Patching odm image after verification.");
block_image_update(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat") ||
  abort("E2001: Failed to update odm image.");

# --- End patching dynamic partitions ---

show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta_system.img", "/dev/block/bootdevice/by-name/vbmeta_system");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");

# ---- update tasks: exaid part 2----


package_extract_file("exaid.img", "/dev/block/bootdevice/by-name/exaid");
    
