getprop("ro.product.device") == "joyeuse" || abort("E3004: This package is for \"joyeuse\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V11.0.7.0.QJZMIXM:user/release-keys");
ui_print("Target: Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V12.0.1.0.QJZMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V11.0.7.0.QJZMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V12.0.1.0.QJZMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V11.0.7.0.QJZMIXM:user/release-keys or Redmi/joyeuse_global/joyeuse:10/QKQ1.191215.002/V12.0.1.0.QJZMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:fe066540a9e6f8da5ecfe574e01f051a8e05e552",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:df48a292c0b7c9d67aa5309e0382acc8f6810c29") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:fe066540a9e6f8da5ecfe574e01f051a8e05e552\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:df48a292c0b7c9d67aa5309e0382acc8f6810c29\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1(map_partition("system"), "76,1,32770,32912,70729,71798,75265,75272,98306,98448,163842,163984,178722,179285,179287,179304,183083,183084,229378,229520,294914,295056,306302,306305,307425,307428,343870,343961,344587,344769,367870,367920,387400,387403,387424,387490,387730,387872,391692,391696,392788,392791,392856,392858,417311,417344,436881,441151,441646,441777,441927,442060,442825,442947,443097,443228,447834,447835,447860,447864,447875,447880,447921,447926,447968,448862,476689,479309,479310,480473,557065,557079,580232,582017,591241,591369,591370") == "48e2e1d7a45056ac429fd8d3eab76211a8692515" || block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block(map_partition("system"));
ifelse (block_image_recover(map_partition("system"), "76,1,32770,32912,70729,71798,75265,75272,98306,98448,163842,163984,178722,179285,179287,179304,183083,183084,229378,229520,294914,295056,306302,306305,307425,307428,343870,343961,344587,344769,367870,367920,387400,387403,387424,387490,387730,387872,391692,391696,392788,392791,392856,392858,417311,417344,436881,441151,441646,441777,441927,442060,442825,442947,443097,443228,447834,447835,447860,447864,447875,447880,447921,447926,447968,448862,476689,479309,479310,480473,557065,557079,580232,582017,591241,591369,591370") && block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1(map_partition("vendor"), "38,1,106,116,120,125,126,207,211,216,217,1922,1926,1939,2405,2410,2411,2674,2678,2682,19424,22276,32770,32844,98306,98380,163842,163916,229378,229452,294914,294988,295000,295010,304367,305346,310187,310261,310262") == "6a99993bc918573481ac0b3398e823a2c8f32d06" || block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block(map_partition("vendor"));
ifelse (block_image_recover(map_partition("vendor"), "38,1,106,116,120,125,126,207,211,216,217,1922,1926,1939,2405,2410,2411,2674,2678,2682,19424,22276,32770,32844,98306,98380,163842,163916,229378,229452,294914,294988,295000,295010,304367,305346,310187,310261,310262") && block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;
if (range_sha1(map_partition("product"), "18,1,32770,32842,98306,98378,163842,163914,229378,229450,294415,294912,294914,294986,294989,295390,300073,300146,300147") == "e6cfde6685dc1646af86862589a50d5e32d88552" || block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat")) then
ui_print("Verified product image...");
else
check_first_block(map_partition("product"));
ifelse (block_image_recover(map_partition("product"), "18,1,32770,32842,98306,98378,163842,163914,229378,229450,294415,294912,294914,294986,294989,295390,300073,300146,300147") && block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat"), ui_print("product recovered successfully."), abort("E2004: product partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:fe066540a9e6f8da5ecfe574e01f051a8e05e552",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:df48a292c0b7c9d67aa5309e0382acc8f6810c29",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:df48a292c0b7c9d67aa5309e0382acc8f6810c29");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
show_progress(0.600000, 600);

# --- Start patching dynamic partitions ---


# Update dynamic partition metadata

assert(update_dynamic_partitions(package_extract_file("dynamic_partitions_op_list")));

# Patch partition product

ui_print("Patching product image after verification.");
block_image_update(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat") ||
  abort("E2001: Failed to update product image.");

# Patch partition vendor

ui_print("Patching vendor image after verification.");
block_image_update(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# Patch partition system

ui_print("Patching system image after verification.");
block_image_update(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");

# --- End patching dynamic partitions ---

show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta_system.img", "/dev/block/bootdevice/by-name/vbmeta_system");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
