getprop("ro.product.device") == "violet" || abort("E3004: This package is for \"violet\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: xiaomi/violet/violet:10/QKQ1.190915.002/V11.0.1.0.QFHCNXM:user/release-keys");
ui_print("Target: xiaomi/violet/violet:10/QKQ1.190915.002/V12.0.2.0.QFHCNXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "xiaomi/violet/violet:10/QKQ1.190915.002/V11.0.1.0.QFHCNXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "xiaomi/violet/violet:10/QKQ1.190915.002/V12.0.2.0.QFHCNXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of xiaomi/violet/violet:10/QKQ1.190915.002/V11.0.1.0.QFHCNXM:user/release-keys or xiaomi/violet/violet:10/QKQ1.190915.002/V12.0.2.0.QFHCNXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:67108864:709be37c57c7352a05ad8e04f7750e7b19da38cb",
                      "EMMC:/dev/block/bootdevice/by-name/boot:67108864:da2b63fd7eca81b226b7fce1fa9f6ed113f98a73") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:67108864:709be37c57c7352a05ad8e04f7750e7b19da38cb\" or \"EMMC:/dev/block/bootdevice/by-name/boot:67108864:da2b63fd7eca81b226b7fce1fa9f6ed113f98a73\" has unexpected contents.");
apply_patch_space(176017408) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "210,1,645,728,742,749,752,770,777,830,831,1091,1096,1098,1099,1205,1206,1691,1692,2380,2381,2383,2385,2386,2387,2402,2403,2584,2585,3078,32770,32990,32991,33496,65537,66042,98306,98526,98527,99032,131073,131578,152952,153225,153227,153241,153242,153292,153294,153303,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,282657,282658,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,409248,409252,410450,410454,425985,426490,458753,459258,479408,479769,482993,482996,483018,483084,487227,487231,491078,491081,491148,491150,491521,492026,493919,493927,514556,514589,524289,524794,545183,549542,549799,549800,550017,550059,550101,550142,550731,550771,550813,550853,556191,557056,557057,557591,557592,558053,589825,590330,615184,615197,615202,615214,618443,618463,618491,618507,618508,618511,618522,618523,618525,618527,618539,618544,618581,618583,618589,618592,618605,618606,618621,618623,618624,618625,618641,618642,618702,618704,618709,618710,618713,618724,618727,618871,618897,618912,618914,618916,618928,618929,618930,618933,618937,618938,618945,618950,618960,618961,618989,618991,618997,619000,619002,619003,619012,619014,619030,619032,619138,619139,619209,619210,619456,619457,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,784017,784028,784034,819200,819202,884736,884738,884958,884959,903007,917316,917503,917504") == "54856bedfdb422763873137d8b91cc3ba444a574" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "210,1,645,728,742,749,752,770,777,830,831,1091,1096,1098,1099,1205,1206,1691,1692,2380,2381,2383,2385,2386,2387,2402,2403,2584,2585,3078,32770,32990,32991,33496,65537,66042,98306,98526,98527,99032,131073,131578,152952,153225,153227,153241,153242,153292,153294,153303,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,282657,282658,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,409248,409252,410450,410454,425985,426490,458753,459258,479408,479769,482993,482996,483018,483084,487227,487231,491078,491081,491148,491150,491521,492026,493919,493927,514556,514589,524289,524794,545183,549542,549799,549800,550017,550059,550101,550142,550731,550771,550813,550853,556191,557056,557057,557591,557592,558053,589825,590330,615184,615197,615202,615214,618443,618463,618491,618507,618508,618511,618522,618523,618525,618527,618539,618544,618581,618583,618589,618592,618605,618606,618621,618623,618624,618625,618641,618642,618702,618704,618709,618710,618713,618724,618727,618871,618897,618912,618914,618916,618928,618929,618930,618933,618937,618938,618945,618950,618960,618961,618989,618991,618997,619000,619002,619003,619012,619014,619030,619032,619138,619139,619209,619210,619456,619457,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,784017,784028,784034,819200,819202,884736,884738,884958,884959,903007,917316,917503,917504") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "76,1,302,633,641,651,655,660,661,742,746,751,752,757,758,1019,1023,1028,12306,12412,12413,12641,12694,13344,13345,13977,13978,14961,14966,17219,17221,32768,32770,32895,32896,34448,34449,40984,40985,43482,60672,60728,65537,66042,98306,98431,98432,98937,131073,131578,142635,142665,153791,153842,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327579,491520,491521,515995,524173,524287,524288") == "d452dbeee9389887b37554aecdf14668406a6650" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "76,1,302,633,641,651,655,660,661,742,746,751,752,757,758,1019,1023,1028,12306,12412,12413,12641,12694,13344,13345,13977,13978,14961,14966,17219,17221,32768,32770,32895,32896,34448,34449,40984,40985,43482,60672,60728,65537,66042,98306,98431,98432,98937,131073,131578,142635,142665,153791,153842,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327579,491520,491521,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:67108864:709be37c57c7352a05ad8e04f7750e7b19da38cb",
                "EMMC:/dev/block/bootdevice/by-name/boot:67108864:da2b63fd7eca81b226b7fce1fa9f6ed113f98a73",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:67108864:da2b63fd7eca81b226b7fce1fa9f6ed113f98a73");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/splash.img", "/dev/block/bootdevice/by-name/splash");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
