4389cf03462284a029dd0dc4c616bf5615af2c49
[openwrt/openwrt.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Firmware layout description */
74 struct device_info {
75 const char *id;
76 const char *vendor;
77 const char *support_list;
78 char support_trail;
79 const char *soft_ver;
80 uint32_t soft_ver_compat_level;
81 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
82 const char *first_sysupgrade_partition;
83 const char *last_sysupgrade_partition;
84 };
85
86 /** The content of the soft-version structure */
87 struct __attribute__((__packed__)) soft_version {
88 uint32_t data_len;
89 uint32_t zero;
90 uint8_t pad1;
91 uint8_t version_major;
92 uint8_t version_minor;
93 uint8_t version_patch;
94 uint8_t year_hi;
95 uint8_t year_lo;
96 uint8_t month;
97 uint8_t day;
98 uint32_t rev;
99 };
100
101
102 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
103
104
105 /**
106 Salt for the MD5 hash
107
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
110 */
111 static const uint8_t md5_salt[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
116 };
117
118
119 /** Firmware layout table */
120 static struct device_info boards[] = {
121 /** Firmware layout for the CPE210/220 V1 */
122 {
123 .id = "CPE210",
124 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
125 .support_list =
126 "SupportList:\r\n"
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail = '\xff',
135 .soft_ver = NULL,
136
137 .partitions = {
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x300000},
144 {"file-system", 0x340000, 0x470000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
151 {NULL, 0, 0}
152 },
153
154 .first_sysupgrade_partition = "os-image",
155 .last_sysupgrade_partition = "support-list",
156 },
157
158 /** Firmware layout for the CPE210 V2 */
159 {
160 .id = "CPE210V2",
161 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
162 .support_list =
163 "SupportList:\r\n"
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail = '\xff',
175 .soft_ver = NULL,
176
177 .partitions = {
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"firmware", 0x40000, 0x770000},
186 {"soft-version", 0x7b0000, 0x00100},
187 {"support-list", 0x7b1000, 0x01000},
188 {"user-config", 0x7c0000, 0x10000},
189 {"default-config", 0x7d0000, 0x10000},
190 {"log", 0x7e0000, 0x10000},
191 {"radio", 0x7f0000, 0x10000},
192 {NULL, 0, 0}
193 },
194
195 .first_sysupgrade_partition = "os-image",
196 .last_sysupgrade_partition = "support-list",
197 },
198
199 /** Firmware layout for the CPE210 V3 */
200 {
201 .id = "CPE210V3",
202 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
203 .support_list =
204 "SupportList:\r\n"
205 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
206 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
207 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
209 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
210 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
211 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
212 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
213 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
214 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
215 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
216 .support_trail = '\xff',
217 .soft_ver = NULL,
218
219 .partitions = {
220 {"fs-uboot", 0x00000, 0x20000},
221 {"partition-table", 0x20000, 0x01000},
222 {"default-mac", 0x30000, 0x00020},
223 {"product-info", 0x31100, 0x00100},
224 {"device-info", 0x31400, 0x00400},
225 {"signature", 0x32000, 0x00400},
226 {"device-id", 0x33000, 0x00100},
227 {"firmware", 0x40000, 0x770000},
228 {"soft-version", 0x7b0000, 0x00100},
229 {"support-list", 0x7b1000, 0x01000},
230 {"user-config", 0x7c0000, 0x10000},
231 {"default-config", 0x7d0000, 0x10000},
232 {"log", 0x7e0000, 0x10000},
233 {"radio", 0x7f0000, 0x10000},
234 {NULL, 0, 0}
235 },
236
237 .first_sysupgrade_partition = "os-image",
238 .last_sysupgrade_partition = "support-list",
239 },
240
241 /** Firmware layout for the CPE220 V2 */
242 {
243 .id = "CPE220V2",
244 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
245 .support_list =
246 "SupportList:\r\n"
247 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
248 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
249 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
250 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
251 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
252 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
253 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
254 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
255 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
256 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
257 .support_trail = '\xff',
258 .soft_ver = NULL,
259
260 .partitions = {
261 {"fs-uboot", 0x00000, 0x20000},
262 {"partition-table", 0x20000, 0x02000},
263 {"default-mac", 0x30000, 0x00020},
264 {"product-info", 0x31100, 0x00100},
265 {"signature", 0x32000, 0x00400},
266 {"os-image", 0x40000, 0x300000},
267 {"file-system", 0x340000, 0x470000},
268 {"soft-version", 0x7b0000, 0x00100},
269 {"support-list", 0x7b1000, 0x00400},
270 {"user-config", 0x7c0000, 0x10000},
271 {"default-config", 0x7d0000, 0x10000},
272 {"log", 0x7e0000, 0x10000},
273 {"radio", 0x7f0000, 0x10000},
274 {NULL, 0, 0}
275 },
276
277 .first_sysupgrade_partition = "os-image",
278 .last_sysupgrade_partition = "support-list",
279 },
280
281 /** Firmware layout for the CPE220 V3 */
282 {
283 .id = "CPE220V3",
284 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
285 .support_list =
286 "SupportList:\r\n"
287 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
288 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
289 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
290 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
291 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
292 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
293 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
294 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
295 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
296 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
297 .support_trail = '\xff',
298 .soft_ver = NULL,
299
300 .partitions = {
301 {"fs-uboot", 0x00000, 0x20000},
302 {"partition-table", 0x20000, 0x02000},
303 {"default-mac", 0x30000, 0x00020},
304 {"product-info", 0x31100, 0x00100},
305 {"device-info", 0x31400, 0x00400},
306 {"signature", 0x32000, 0x00400},
307 {"device-id", 0x33000, 0x00100},
308 {"firmware", 0x40000, 0x770000},
309 {"soft-version", 0x7b0000, 0x00100},
310 {"support-list", 0x7b1000, 0x01000},
311 {"user-config", 0x7c0000, 0x10000},
312 {"default-config", 0x7d0000, 0x10000},
313 {"log", 0x7e0000, 0x10000},
314 {"radio", 0x7f0000, 0x10000},
315 {NULL, 0, 0}
316 },
317
318 .first_sysupgrade_partition = "os-image",
319 .last_sysupgrade_partition = "support-list",
320 },
321
322 /** Firmware layout for the CPE510/520 V1 */
323 {
324 .id = "CPE510",
325 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
326 .support_list =
327 "SupportList:\r\n"
328 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
329 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
330 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
331 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
332 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
333 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
334 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
335 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
336 .support_trail = '\xff',
337 .soft_ver = NULL,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"os-image", 0x40000, 0x300000},
346 {"file-system", 0x340000, 0x470000},
347 {"soft-version", 0x7b0000, 0x00100},
348 {"support-list", 0x7b1000, 0x00400},
349 {"user-config", 0x7c0000, 0x10000},
350 {"default-config", 0x7d0000, 0x10000},
351 {"log", 0x7e0000, 0x10000},
352 {"radio", 0x7f0000, 0x10000},
353 {NULL, 0, 0}
354 },
355
356 .first_sysupgrade_partition = "os-image",
357 .last_sysupgrade_partition = "support-list",
358 },
359
360 /** Firmware layout for the CPE510 V2 */
361 {
362 .id = "CPE510V2",
363 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
364 .support_list =
365 "SupportList:\r\n"
366 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
367 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
368 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
369 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
370 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
371 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
372 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
373 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
374 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
375 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
376 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
377 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
378 .support_trail = '\xff',
379 .soft_ver = NULL,
380
381 .partitions = {
382 {"fs-uboot", 0x00000, 0x20000},
383 {"partition-table", 0x20000, 0x02000},
384 {"default-mac", 0x30000, 0x00020},
385 {"product-info", 0x31100, 0x00100},
386 {"signature", 0x32000, 0x00400},
387 {"os-image", 0x40000, 0x300000},
388 {"file-system", 0x340000, 0x470000},
389 {"soft-version", 0x7b0000, 0x00100},
390 {"support-list", 0x7b1000, 0x00400},
391 {"user-config", 0x7c0000, 0x10000},
392 {"default-config", 0x7d0000, 0x10000},
393 {"log", 0x7e0000, 0x10000},
394 {"radio", 0x7f0000, 0x10000},
395 {NULL, 0, 0}
396 },
397
398 .first_sysupgrade_partition = "os-image",
399 .last_sysupgrade_partition = "support-list",
400 },
401
402 /** Firmware layout for the CPE510 V3 */
403 {
404 .id = "CPE510V3",
405 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
406 .support_list =
407 "SupportList:\r\n"
408 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
409 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
410 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
411 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
412 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
413 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
414 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
415 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
416 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
417 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
418 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
419 "CPE510(TP-LINK|US|N300-5):3.0\r\n",
420 .support_trail = '\xff',
421 .soft_ver = NULL,
422
423 .partitions = {
424 {"fs-uboot", 0x00000, 0x20000},
425 {"partition-table", 0x20000, 0x02000},
426 {"default-mac", 0x30000, 0x00020},
427 {"product-info", 0x31100, 0x00100},
428 {"signature", 0x32000, 0x00400},
429 {"os-image", 0x40000, 0x300000},
430 {"file-system", 0x340000, 0x470000},
431 {"soft-version", 0x7b0000, 0x00100},
432 {"support-list", 0x7b1000, 0x00400},
433 {"user-config", 0x7c0000, 0x10000},
434 {"default-config", 0x7d0000, 0x10000},
435 {"log", 0x7e0000, 0x10000},
436 {"radio", 0x7f0000, 0x10000},
437 {NULL, 0, 0}
438 },
439
440 .first_sysupgrade_partition = "os-image",
441 .last_sysupgrade_partition = "support-list",
442 },
443
444 /** Firmware layout for the CPE610V1 */
445 {
446 .id = "CPE610V1",
447 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
448 .support_list =
449 "SupportList:\r\n"
450 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
451 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
452 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
453 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
454 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
455 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
456 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
457 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
458 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
459 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
460 .support_trail = '\xff',
461 .soft_ver = NULL,
462
463 .partitions = {
464 {"fs-uboot", 0x00000, 0x20000},
465 {"partition-table", 0x20000, 0x02000},
466 {"default-mac", 0x30000, 0x00020},
467 {"product-info", 0x31100, 0x00100},
468 {"signature", 0x32000, 0x00400},
469 {"os-image", 0x40000, 0x300000},
470 {"file-system", 0x340000, 0x470000},
471 {"soft-version", 0x7b0000, 0x00100},
472 {"support-list", 0x7b1000, 0x00400},
473 {"user-config", 0x7c0000, 0x10000},
474 {"default-config", 0x7d0000, 0x10000},
475 {"log", 0x7e0000, 0x10000},
476 {"radio", 0x7f0000, 0x10000},
477 {NULL, 0, 0}
478 },
479
480 .first_sysupgrade_partition = "os-image",
481 .last_sysupgrade_partition = "support-list",
482 },
483
484 /** Firmware layout for the CPE610V2 */
485 {
486 .id = "CPE610V2",
487 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
488 .support_list =
489 "SupportList:\r\n"
490 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
491 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
492 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
493 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
494 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
495 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
496 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
497 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
498 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
499 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
500 .support_trail = '\xff',
501 .soft_ver = NULL,
502
503 .partitions = {
504 {"fs-uboot", 0x00000, 0x20000},
505 {"partition-table", 0x20000, 0x02000},
506 {"default-mac", 0x30000, 0x00020},
507 {"product-info", 0x31100, 0x00100},
508 {"signature", 0x32000, 0x00400},
509 {"os-image", 0x40000, 0x300000},
510 {"file-system", 0x340000, 0x470000},
511 {"soft-version", 0x7b0000, 0x00100},
512 {"support-list", 0x7b1000, 0x00400},
513 {"user-config", 0x7c0000, 0x10000},
514 {"default-config", 0x7d0000, 0x10000},
515 {"log", 0x7e0000, 0x10000},
516 {"radio", 0x7f0000, 0x10000},
517 {NULL, 0, 0}
518 },
519
520 .first_sysupgrade_partition = "os-image",
521 .last_sysupgrade_partition = "support-list",
522 },
523
524 {
525 .id = "WBS210",
526 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
527 .support_list =
528 "SupportList:\r\n"
529 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
530 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
531 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
532 .support_trail = '\xff',
533 .soft_ver = NULL,
534
535 .partitions = {
536 {"fs-uboot", 0x00000, 0x20000},
537 {"partition-table", 0x20000, 0x02000},
538 {"default-mac", 0x30000, 0x00020},
539 {"product-info", 0x31100, 0x00100},
540 {"signature", 0x32000, 0x00400},
541 {"os-image", 0x40000, 0x300000},
542 {"file-system", 0x340000, 0x470000},
543 {"soft-version", 0x7b0000, 0x00100},
544 {"support-list", 0x7b1000, 0x00400},
545 {"user-config", 0x7c0000, 0x10000},
546 {"default-config", 0x7d0000, 0x10000},
547 {"log", 0x7e0000, 0x10000},
548 {"radio", 0x7f0000, 0x10000},
549 {NULL, 0, 0}
550 },
551
552 .first_sysupgrade_partition = "os-image",
553 .last_sysupgrade_partition = "support-list",
554 },
555
556 {
557 .id = "WBS210V2",
558 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
559 .support_list =
560 "SupportList:\r\n"
561 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
562 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
563 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
564 .support_trail = '\xff',
565 .soft_ver = NULL,
566
567 .partitions = {
568 {"fs-uboot", 0x00000, 0x20000},
569 {"partition-table", 0x20000, 0x02000},
570 {"default-mac", 0x30000, 0x00020},
571 {"product-info", 0x31100, 0x00100},
572 {"signature", 0x32000, 0x00400},
573 {"os-image", 0x40000, 0x300000},
574 {"file-system", 0x340000, 0x470000},
575 {"soft-version", 0x7b0000, 0x00100},
576 {"support-list", 0x7b1000, 0x00400},
577 {"user-config", 0x7c0000, 0x10000},
578 {"default-config", 0x7d0000, 0x10000},
579 {"log", 0x7e0000, 0x10000},
580 {"radio", 0x7f0000, 0x10000},
581 {NULL, 0, 0}
582 },
583
584 .first_sysupgrade_partition = "os-image",
585 .last_sysupgrade_partition = "support-list",
586 },
587
588 {
589 .id = "WBS510",
590 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
591 .support_list =
592 "SupportList:\r\n"
593 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
594 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
595 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
596 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
597 .support_trail = '\xff',
598 .soft_ver = NULL,
599
600 .partitions = {
601 {"fs-uboot", 0x00000, 0x20000},
602 {"partition-table", 0x20000, 0x02000},
603 {"default-mac", 0x30000, 0x00020},
604 {"product-info", 0x31100, 0x00100},
605 {"signature", 0x32000, 0x00400},
606 {"os-image", 0x40000, 0x300000},
607 {"file-system", 0x340000, 0x470000},
608 {"soft-version", 0x7b0000, 0x00100},
609 {"support-list", 0x7b1000, 0x00400},
610 {"user-config", 0x7c0000, 0x10000},
611 {"default-config", 0x7d0000, 0x10000},
612 {"log", 0x7e0000, 0x10000},
613 {"radio", 0x7f0000, 0x10000},
614 {NULL, 0, 0}
615 },
616
617 .first_sysupgrade_partition = "os-image",
618 .last_sysupgrade_partition = "support-list",
619 },
620
621 {
622 .id = "WBS510V2",
623 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
624 .support_list =
625 "SupportList:\r\n"
626 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
627 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
628 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
629 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
630 .support_trail = '\xff',
631 .soft_ver = NULL,
632
633 .partitions = {
634 {"fs-uboot", 0x00000, 0x20000},
635 {"partition-table", 0x20000, 0x02000},
636 {"default-mac", 0x30000, 0x00020},
637 {"product-info", 0x31100, 0x00100},
638 {"signature", 0x32000, 0x00400},
639 {"os-image", 0x40000, 0x300000},
640 {"file-system", 0x340000, 0x470000},
641 {"soft-version", 0x7b0000, 0x00100},
642 {"support-list", 0x7b1000, 0x00400},
643 {"user-config", 0x7c0000, 0x10000},
644 {"default-config", 0x7d0000, 0x10000},
645 {"log", 0x7e0000, 0x10000},
646 {"radio", 0x7f0000, 0x10000},
647 {NULL, 0, 0}
648 },
649
650 .first_sysupgrade_partition = "os-image",
651 .last_sysupgrade_partition = "support-list",
652 },
653
654 /** Firmware layout for the C2600 */
655 {
656 .id = "C2600",
657 .vendor = "",
658 .support_list =
659 "SupportList:\r\n"
660 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
661 .support_trail = '\x00',
662 .soft_ver = NULL,
663
664 /**
665 We use a bigger os-image partition than the stock images (and thus
666 smaller file-system), as our kernel doesn't fit in the stock firmware's
667 2 MB os-image since kernel 4.14.
668 */
669 .partitions = {
670 {"SBL1", 0x00000, 0x20000},
671 {"MIBIB", 0x20000, 0x20000},
672 {"SBL2", 0x40000, 0x20000},
673 {"SBL3", 0x60000, 0x30000},
674 {"DDRCONFIG", 0x90000, 0x10000},
675 {"SSD", 0xa0000, 0x10000},
676 {"TZ", 0xb0000, 0x30000},
677 {"RPM", 0xe0000, 0x20000},
678 {"fs-uboot", 0x100000, 0x70000},
679 {"uboot-env", 0x170000, 0x40000},
680 {"radio", 0x1b0000, 0x40000},
681 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
682 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
683 {"default-mac", 0x1ef0000, 0x00200},
684 {"pin", 0x1ef0200, 0x00200},
685 {"product-info", 0x1ef0400, 0x0fc00},
686 {"partition-table", 0x1f00000, 0x10000},
687 {"soft-version", 0x1f10000, 0x10000},
688 {"support-list", 0x1f20000, 0x10000},
689 {"profile", 0x1f30000, 0x10000},
690 {"default-config", 0x1f40000, 0x10000},
691 {"user-config", 0x1f50000, 0x40000},
692 {"qos-db", 0x1f90000, 0x40000},
693 {"usb-config", 0x1fd0000, 0x10000},
694 {"log", 0x1fe0000, 0x20000},
695 {NULL, 0, 0}
696 },
697
698 .first_sysupgrade_partition = "os-image",
699 .last_sysupgrade_partition = "file-system"
700 },
701
702 /** Firmware layout for the A7-V5 */
703 {
704 .id = "ARCHER-A7-V5",
705 .support_list =
706 "SupportList:\n"
707 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
708 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
709 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
710 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
711 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
712 .support_trail = '\x00',
713 .soft_ver = "soft_ver:1.0.0\n",
714
715 /* We're using a dynamic kernel/rootfs split here */
716 .partitions = {
717 {"factory-boot", 0x00000, 0x20000},
718 {"fs-uboot", 0x20000, 0x20000},
719 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
720 /* Stock: name file-system base 0x160000 size 0xda0000 */
721 {"default-mac", 0xf40000, 0x00200},
722 {"pin", 0xf40200, 0x00200},
723 {"device-id", 0xf40400, 0x00100},
724 {"product-info", 0xf40500, 0x0fb00},
725 {"soft-version", 0xf50000, 0x00100},
726 {"extra-para", 0xf51000, 0x01000},
727 {"support-list", 0xf52000, 0x0a000},
728 {"profile", 0xf5c000, 0x04000},
729 {"default-config", 0xf60000, 0x10000},
730 {"user-config", 0xf70000, 0x40000},
731 {"certificate", 0xfb0000, 0x10000},
732 {"partition-table", 0xfc0000, 0x10000},
733 {"log", 0xfd0000, 0x20000},
734 {"radio", 0xff0000, 0x10000},
735 {NULL, 0, 0}
736 },
737
738 .first_sysupgrade_partition = "os-image",
739 .last_sysupgrade_partition = "file-system",
740 },
741
742 /** Firmware layout for the C2v3 */
743 {
744 .id = "ARCHER-C2-V3",
745 .support_list =
746 "SupportList:\n"
747 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
748 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
749 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
750 .support_trail = '\x00',
751 .soft_ver = "soft_ver:3.0.1\n",
752
753 /** We're using a dynamic kernel/rootfs split here */
754
755 .partitions = {
756 {"factory-boot", 0x00000, 0x20000},
757 {"fs-uboot", 0x20000, 0x10000},
758 {"firmware", 0x30000, 0x7a0000},
759 {"user-config", 0x7d0000, 0x04000},
760 {"default-mac", 0x7e0000, 0x00100},
761 {"device-id", 0x7e0100, 0x00100},
762 {"extra-para", 0x7e0200, 0x00100},
763 {"pin", 0x7e0300, 0x00100},
764 {"support-list", 0x7e0400, 0x00400},
765 {"soft-version", 0x7e0800, 0x00400},
766 {"product-info", 0x7e0c00, 0x01400},
767 {"partition-table", 0x7e2000, 0x01000},
768 {"profile", 0x7e3000, 0x01000},
769 {"default-config", 0x7e4000, 0x04000},
770 {"merge-config", 0x7ec000, 0x02000},
771 {"qos-db", 0x7ee000, 0x02000},
772 {"radio", 0x7f0000, 0x10000},
773 {NULL, 0, 0}
774 },
775
776 .first_sysupgrade_partition = "os-image",
777 .last_sysupgrade_partition = "file-system",
778 },
779
780 /** Firmware layout for the C25v1 */
781 {
782 .id = "ARCHER-C25-V1",
783 .support_list =
784 "SupportList:\n"
785 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
786 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
787 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
788 .support_trail = '\x00',
789 .soft_ver = "soft_ver:1.0.0\n",
790
791 /* We're using a dynamic kernel/rootfs split here */
792 .partitions = {
793 {"factory-boot", 0x00000, 0x20000},
794 {"fs-uboot", 0x20000, 0x10000},
795 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
796 /* Stock: name file-system base 0x130000 size 0x6a0000 */
797 {"user-config", 0x7d0000, 0x04000},
798 {"default-mac", 0x7e0000, 0x00100},
799 {"device-id", 0x7e0100, 0x00100},
800 {"extra-para", 0x7e0200, 0x00100},
801 {"pin", 0x7e0300, 0x00100},
802 {"support-list", 0x7e0400, 0x00400},
803 {"soft-version", 0x7e0800, 0x00400},
804 {"product-info", 0x7e0c00, 0x01400},
805 {"partition-table", 0x7e2000, 0x01000},
806 {"profile", 0x7e3000, 0x01000},
807 {"default-config", 0x7e4000, 0x04000},
808 {"merge-config", 0x7ec000, 0x02000},
809 {"qos-db", 0x7ee000, 0x02000},
810 {"radio", 0x7f0000, 0x10000},
811 {NULL, 0, 0}
812 },
813
814 .first_sysupgrade_partition = "os-image",
815 .last_sysupgrade_partition = "file-system",
816 },
817
818 /** Firmware layout for the C58v1 */
819 {
820 .id = "ARCHER-C58-V1",
821 .vendor = "",
822 .support_list =
823 "SupportList:\r\n"
824 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
825 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
826 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
827 .support_trail = '\x00',
828 .soft_ver = "soft_ver:1.0.0\n",
829
830 .partitions = {
831 {"fs-uboot", 0x00000, 0x10000},
832 {"default-mac", 0x10000, 0x00200},
833 {"pin", 0x10200, 0x00200},
834 {"product-info", 0x10400, 0x00100},
835 {"partition-table", 0x10500, 0x00800},
836 {"soft-version", 0x11300, 0x00200},
837 {"support-list", 0x11500, 0x00100},
838 {"device-id", 0x11600, 0x00100},
839 {"profile", 0x11700, 0x03900},
840 {"default-config", 0x15000, 0x04000},
841 {"user-config", 0x19000, 0x04000},
842 {"firmware", 0x20000, 0x7c8000},
843 {"certyficate", 0x7e8000, 0x08000},
844 {"radio", 0x7f0000, 0x10000},
845 {NULL, 0, 0}
846 },
847
848 .first_sysupgrade_partition = "os-image",
849 .last_sysupgrade_partition = "file-system",
850 },
851
852 /** Firmware layout for the C59v1 */
853 {
854 .id = "ARCHER-C59-V1",
855 .vendor = "",
856 .support_list =
857 "SupportList:\r\n"
858 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
859 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
860 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
861 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
862 .support_trail = '\x00',
863 .soft_ver = "soft_ver:1.0.0\n",
864
865 /* We're using a dynamic kernel/rootfs split here */
866 .partitions = {
867 {"fs-uboot", 0x00000, 0x10000},
868 {"default-mac", 0x10000, 0x00200},
869 {"pin", 0x10200, 0x00200},
870 {"device-id", 0x10400, 0x00100},
871 {"product-info", 0x10500, 0x0fb00},
872 {"firmware", 0x20000, 0xe30000},
873 {"partition-table", 0xe50000, 0x10000},
874 {"soft-version", 0xe60000, 0x10000},
875 {"support-list", 0xe70000, 0x10000},
876 {"profile", 0xe80000, 0x10000},
877 {"default-config", 0xe90000, 0x10000},
878 {"user-config", 0xea0000, 0x40000},
879 {"usb-config", 0xee0000, 0x10000},
880 {"certificate", 0xef0000, 0x10000},
881 {"qos-db", 0xf00000, 0x40000},
882 {"log", 0xfe0000, 0x10000},
883 {"radio", 0xff0000, 0x10000},
884 {NULL, 0, 0}
885 },
886
887 .first_sysupgrade_partition = "os-image",
888 .last_sysupgrade_partition = "file-system",
889 },
890
891 /** Firmware layout for the C59v2 */
892 {
893 .id = "ARCHER-C59-V2",
894 .vendor = "",
895 .support_list =
896 "SupportList:\r\n"
897 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
898 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
899 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
900 .support_trail = '\x00',
901 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
902
903 /** We're using a dynamic kernel/rootfs split here */
904 .partitions = {
905 {"factory-boot", 0x00000, 0x20000},
906 {"fs-uboot", 0x20000, 0x10000},
907 {"default-mac", 0x30000, 0x00200},
908 {"pin", 0x30200, 0x00200},
909 {"device-id", 0x30400, 0x00100},
910 {"product-info", 0x30500, 0x0fb00},
911 {"firmware", 0x40000, 0xe10000},
912 {"partition-table", 0xe50000, 0x10000},
913 {"soft-version", 0xe60000, 0x10000},
914 {"support-list", 0xe70000, 0x10000},
915 {"profile", 0xe80000, 0x10000},
916 {"default-config", 0xe90000, 0x10000},
917 {"user-config", 0xea0000, 0x40000},
918 {"usb-config", 0xee0000, 0x10000},
919 {"certificate", 0xef0000, 0x10000},
920 {"extra-para", 0xf00000, 0x10000},
921 {"qos-db", 0xf10000, 0x30000},
922 {"log", 0xfe0000, 0x10000},
923 {"radio", 0xff0000, 0x10000},
924 {NULL, 0, 0}
925 },
926
927 .first_sysupgrade_partition = "os-image",
928 .last_sysupgrade_partition = "file-system",
929 },
930
931 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
932 {
933 .id = "ARCHER-C6-V2",
934 .vendor = "",
935 .support_list =
936 "SupportList:\r\n"
937 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
938 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
939 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
940 .support_trail = '\x00',
941 .soft_ver = "soft_ver:1.9.1\n",
942
943 .partitions = {
944 {"fs-uboot", 0x00000, 0x20000},
945 {"default-mac", 0x20000, 0x00200},
946 {"pin", 0x20200, 0x00100},
947 {"product-info", 0x20300, 0x00200},
948 {"device-id", 0x20500, 0x0fb00},
949 {"firmware", 0x30000, 0x7a9400},
950 {"soft-version", 0x7d9400, 0x00100},
951 {"extra-para", 0x7d9500, 0x00100},
952 {"support-list", 0x7d9600, 0x00200},
953 {"profile", 0x7d9800, 0x03000},
954 {"default-config", 0x7dc800, 0x03000},
955 {"partition-table", 0x7df800, 0x00800},
956 {"user-config", 0x7e0000, 0x0c000},
957 {"certificate", 0x7ec000, 0x04000},
958 {"radio", 0x7f0000, 0x10000},
959 {NULL, 0, 0}
960 },
961
962 .first_sysupgrade_partition = "os-image",
963 .last_sysupgrade_partition = "file-system",
964 },
965
966 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
967 {
968 .id = "ARCHER-C6-V2-US",
969 .vendor = "",
970 .support_list =
971 "SupportList:\n"
972 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
973 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
974 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
975 .support_trail = '\x00',
976 .soft_ver = "soft_ver:1.9.1\n",
977
978 .partitions = {
979 {"factory-boot", 0x00000, 0x20000},
980 {"default-mac", 0x20000, 0x00200},
981 {"pin", 0x20200, 0x00100},
982 {"product-info", 0x20300, 0x00200},
983 {"device-id", 0x20500, 0x0fb00},
984 {"fs-uboot", 0x30000, 0x20000},
985 {"firmware", 0x50000, 0xf89400},
986 {"soft-version", 0xfd9400, 0x00100},
987 {"extra-para", 0xfd9500, 0x00100},
988 {"support-list", 0xfd9600, 0x00200},
989 {"profile", 0xfd9800, 0x03000},
990 {"default-config", 0xfdc800, 0x03000},
991 {"partition-table", 0xfdf800, 0x00800},
992 {"user-config", 0xfe0000, 0x0c000},
993 {"certificate", 0xfec000, 0x04000},
994 {"radio", 0xff0000, 0x10000},
995 {NULL, 0, 0}
996 },
997 .first_sysupgrade_partition = "os-image",
998 .last_sysupgrade_partition = "file-system",
999 },
1000
1001 /** Firmware layout for the C60v1 */
1002 {
1003 .id = "ARCHER-C60-V1",
1004 .vendor = "",
1005 .support_list =
1006 "SupportList:\r\n"
1007 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1008 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1009 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1010 .support_trail = '\x00',
1011 .soft_ver = "soft_ver:1.0.0\n",
1012
1013 .partitions = {
1014 {"fs-uboot", 0x00000, 0x10000},
1015 {"default-mac", 0x10000, 0x00200},
1016 {"pin", 0x10200, 0x00200},
1017 {"product-info", 0x10400, 0x00100},
1018 {"partition-table", 0x10500, 0x00800},
1019 {"soft-version", 0x11300, 0x00200},
1020 {"support-list", 0x11500, 0x00100},
1021 {"device-id", 0x11600, 0x00100},
1022 {"profile", 0x11700, 0x03900},
1023 {"default-config", 0x15000, 0x04000},
1024 {"user-config", 0x19000, 0x04000},
1025 {"firmware", 0x20000, 0x7c8000},
1026 {"certyficate", 0x7e8000, 0x08000},
1027 {"radio", 0x7f0000, 0x10000},
1028 {NULL, 0, 0}
1029 },
1030
1031 .first_sysupgrade_partition = "os-image",
1032 .last_sysupgrade_partition = "file-system",
1033 },
1034
1035 /** Firmware layout for the C60v2 */
1036 {
1037 .id = "ARCHER-C60-V2",
1038 .vendor = "",
1039 .support_list =
1040 "SupportList:\r\n"
1041 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1042 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1043 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1044 .support_trail = '\x00',
1045 .soft_ver = "soft_ver:2.0.0\n",
1046
1047 .partitions = {
1048 {"factory-boot", 0x00000, 0x1fb00},
1049 {"default-mac", 0x1fb00, 0x00200},
1050 {"pin", 0x1fd00, 0x00100},
1051 {"product-info", 0x1fe00, 0x00100},
1052 {"device-id", 0x1ff00, 0x00100},
1053 {"fs-uboot", 0x20000, 0x10000},
1054 {"firmware", 0x30000, 0x7a0000},
1055 {"soft-version", 0x7d9500, 0x00100},
1056 {"support-list", 0x7d9600, 0x00100},
1057 {"extra-para", 0x7d9700, 0x00100},
1058 {"profile", 0x7d9800, 0x03000},
1059 {"default-config", 0x7dc800, 0x03000},
1060 {"partition-table", 0x7df800, 0x00800},
1061 {"user-config", 0x7e0000, 0x0c000},
1062 {"certificate", 0x7ec000, 0x04000},
1063 {"radio", 0x7f0000, 0x10000},
1064 {NULL, 0, 0}
1065 },
1066
1067 .first_sysupgrade_partition = "os-image",
1068 .last_sysupgrade_partition = "file-system",
1069 },
1070
1071 /** Firmware layout for the C60v3 */
1072 {
1073 .id = "ARCHER-C60-V3",
1074 .vendor = "",
1075 .support_list =
1076 "SupportList:\r\n"
1077 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1078 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1079 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1080 .support_trail = '\x00',
1081 .soft_ver = "soft_ver:3.0.0\n",
1082
1083 .partitions = {
1084 {"factory-boot", 0x00000, 0x1fb00},
1085 {"default-mac", 0x1fb00, 0x00200},
1086 {"pin", 0x1fd00, 0x00100},
1087 {"product-info", 0x1fe00, 0x00100},
1088 {"device-id", 0x1ff00, 0x00100},
1089 {"fs-uboot", 0x20000, 0x10000},
1090 {"firmware", 0x30000, 0x7a0000},
1091 {"soft-version", 0x7d9500, 0x00100},
1092 {"support-list", 0x7d9600, 0x00100},
1093 {"extra-para", 0x7d9700, 0x00100},
1094 {"profile", 0x7d9800, 0x03000},
1095 {"default-config", 0x7dc800, 0x03000},
1096 {"partition-table", 0x7df800, 0x00800},
1097 {"user-config", 0x7e0000, 0x0c000},
1098 {"certificate", 0x7ec000, 0x04000},
1099 {"radio", 0x7f0000, 0x10000},
1100 {NULL, 0, 0}
1101 },
1102
1103 .first_sysupgrade_partition = "os-image",
1104 .last_sysupgrade_partition = "file-system",
1105 },
1106
1107 /** Firmware layout for the C5 */
1108 {
1109 .id = "ARCHER-C5-V2",
1110 .vendor = "",
1111 .support_list =
1112 "SupportList:\r\n"
1113 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1114 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1115 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1116 .support_trail = '\x00',
1117 .soft_ver = NULL,
1118
1119 .partitions = {
1120 {"fs-uboot", 0x00000, 0x40000},
1121 {"os-image", 0x40000, 0x200000},
1122 {"file-system", 0x240000, 0xc00000},
1123 {"default-mac", 0xe40000, 0x00200},
1124 {"pin", 0xe40200, 0x00200},
1125 {"product-info", 0xe40400, 0x00200},
1126 {"partition-table", 0xe50000, 0x10000},
1127 {"soft-version", 0xe60000, 0x00200},
1128 {"support-list", 0xe61000, 0x0f000},
1129 {"profile", 0xe70000, 0x10000},
1130 {"default-config", 0xe80000, 0x10000},
1131 {"user-config", 0xe90000, 0x50000},
1132 {"log", 0xee0000, 0x100000},
1133 {"radio_bk", 0xfe0000, 0x10000},
1134 {"radio", 0xff0000, 0x10000},
1135 {NULL, 0, 0}
1136 },
1137
1138 .first_sysupgrade_partition = "os-image",
1139 .last_sysupgrade_partition = "file-system"
1140 },
1141
1142 /** Firmware layout for the C7 */
1143 {
1144 .id = "ARCHER-C7-V4",
1145 .support_list =
1146 "SupportList:\n"
1147 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1148 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1149 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1150 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1151 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1152 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1153 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1154 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1155 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1156 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1157 .support_trail = '\x00',
1158 .soft_ver = "soft_ver:1.0.0\n",
1159
1160 /* We're using a dynamic kernel/rootfs split here */
1161 .partitions = {
1162 {"factory-boot", 0x00000, 0x20000},
1163 {"fs-uboot", 0x20000, 0x20000},
1164 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1165 /* Stock: name file-system base 0x160000 size 0xda0000 */
1166 {"default-mac", 0xf00000, 0x00200},
1167 {"pin", 0xf00200, 0x00200},
1168 {"device-id", 0xf00400, 0x00100},
1169 {"product-info", 0xf00500, 0x0fb00},
1170 {"soft-version", 0xf10000, 0x00100},
1171 {"extra-para", 0xf11000, 0x01000},
1172 {"support-list", 0xf12000, 0x0a000},
1173 {"profile", 0xf1c000, 0x04000},
1174 {"default-config", 0xf20000, 0x10000},
1175 {"user-config", 0xf30000, 0x40000},
1176 {"qos-db", 0xf70000, 0x40000},
1177 {"certificate", 0xfb0000, 0x10000},
1178 {"partition-table", 0xfc0000, 0x10000},
1179 {"log", 0xfd0000, 0x20000},
1180 {"radio", 0xff0000, 0x10000},
1181 {NULL, 0, 0}
1182 },
1183
1184 .first_sysupgrade_partition = "os-image",
1185 .last_sysupgrade_partition = "file-system",
1186 },
1187
1188 /** Firmware layout for the C7 v5*/
1189 {
1190 .id = "ARCHER-C7-V5",
1191 .support_list =
1192 "SupportList:\n"
1193 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1194 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1195 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1196 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1197 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1198 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1199 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1200 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1201
1202 .support_trail = '\x00',
1203 .soft_ver = "soft_ver:1.0.0\n",
1204
1205 /* We're using a dynamic kernel/rootfs split here */
1206 .partitions = {
1207 {"factory-boot", 0x00000, 0x20000},
1208 {"fs-uboot", 0x20000, 0x20000},
1209 {"partition-table", 0x40000, 0x10000},
1210 {"radio", 0x50000, 0x10000},
1211 {"default-mac", 0x60000, 0x00200},
1212 {"pin", 0x60200, 0x00200},
1213 {"device-id", 0x60400, 0x00100},
1214 {"product-info", 0x60500, 0x0fb00},
1215 {"soft-version", 0x70000, 0x01000},
1216 {"extra-para", 0x71000, 0x01000},
1217 {"support-list", 0x72000, 0x0a000},
1218 {"profile", 0x7c000, 0x04000},
1219 {"user-config", 0x80000, 0x40000},
1220
1221
1222 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1223 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1224
1225 {"log", 0xfc0000, 0x20000},
1226 {"certificate", 0xfe0000, 0x10000},
1227 {"default-config", 0xff0000, 0x10000},
1228 {NULL, 0, 0}
1229
1230 },
1231
1232 .first_sysupgrade_partition = "os-image",
1233 .last_sysupgrade_partition = "file-system",
1234 },
1235
1236 /** Firmware layout for the C9 */
1237 {
1238 .id = "ARCHERC9",
1239 .vendor = "",
1240 .support_list =
1241 "SupportList:\n"
1242 "{product_name:ArcherC9,"
1243 "product_ver:1.0.0,"
1244 "special_id:00000000}\n",
1245 .support_trail = '\x00',
1246 .soft_ver = NULL,
1247
1248 .partitions = {
1249 {"fs-uboot", 0x00000, 0x40000},
1250 {"os-image", 0x40000, 0x200000},
1251 {"file-system", 0x240000, 0xc00000},
1252 {"default-mac", 0xe40000, 0x00200},
1253 {"pin", 0xe40200, 0x00200},
1254 {"product-info", 0xe40400, 0x00200},
1255 {"partition-table", 0xe50000, 0x10000},
1256 {"soft-version", 0xe60000, 0x00200},
1257 {"support-list", 0xe61000, 0x0f000},
1258 {"profile", 0xe70000, 0x10000},
1259 {"default-config", 0xe80000, 0x10000},
1260 {"user-config", 0xe90000, 0x50000},
1261 {"log", 0xee0000, 0x100000},
1262 {"radio_bk", 0xfe0000, 0x10000},
1263 {"radio", 0xff0000, 0x10000},
1264 {NULL, 0, 0}
1265 },
1266
1267 .first_sysupgrade_partition = "os-image",
1268 .last_sysupgrade_partition = "file-system"
1269 },
1270
1271 /** Firmware layout for the EAP120 */
1272 {
1273 .id = "EAP120",
1274 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1275 .support_list =
1276 "SupportList:\r\n"
1277 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1278 .support_trail = '\xff',
1279 .soft_ver = NULL,
1280
1281 .partitions = {
1282 {"fs-uboot", 0x00000, 0x20000},
1283 {"partition-table", 0x20000, 0x02000},
1284 {"default-mac", 0x30000, 0x00020},
1285 {"support-list", 0x31000, 0x00100},
1286 {"product-info", 0x31100, 0x00100},
1287 {"soft-version", 0x32000, 0x00100},
1288 {"os-image", 0x40000, 0x180000},
1289 {"file-system", 0x1c0000, 0x600000},
1290 {"user-config", 0x7c0000, 0x10000},
1291 {"backup-config", 0x7d0000, 0x10000},
1292 {"log", 0x7e0000, 0x10000},
1293 {"radio", 0x7f0000, 0x10000},
1294 {NULL, 0, 0}
1295 },
1296
1297 .first_sysupgrade_partition = "os-image",
1298 .last_sysupgrade_partition = "file-system"
1299 },
1300
1301 /** Firmware layout for the EAP225-Outdoor v1 */
1302 {
1303 .id = "EAP225-OUTDOOR-V1",
1304 .support_list =
1305 "SupportList:\r\n"
1306 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1307 .support_trail = '\xff',
1308 .soft_ver = NULL,
1309 .soft_ver_compat_level = 1,
1310
1311 .partitions = {
1312 {"fs-uboot", 0x00000, 0x20000},
1313 {"partition-table", 0x20000, 0x02000},
1314 {"default-mac", 0x30000, 0x01000},
1315 {"support-list", 0x31000, 0x00100},
1316 {"product-info", 0x31100, 0x00400},
1317 {"soft-version", 0x32000, 0x00100},
1318 {"firmware", 0x40000, 0xd80000},
1319 {"user-config", 0xdc0000, 0x30000},
1320 {"mutil-log", 0xf30000, 0x80000},
1321 {"oops", 0xfb0000, 0x40000},
1322 {"radio", 0xff0000, 0x10000},
1323 {NULL, 0, 0}
1324 },
1325
1326 .first_sysupgrade_partition = "os-image",
1327 .last_sysupgrade_partition = "file-system"
1328 },
1329
1330 /** Firmware layout for the EAP225-Wall v2 */
1331 {
1332 .id = "EAP225-WALL-V2",
1333 .support_list =
1334 "SupportList:\r\n"
1335 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1336 .support_trail = '\xff',
1337 .soft_ver = NULL,
1338 .soft_ver_compat_level = 1,
1339
1340 .partitions = {
1341 {"fs-uboot", 0x00000, 0x20000},
1342 {"partition-table", 0x20000, 0x02000},
1343 {"default-mac", 0x30000, 0x01000},
1344 {"support-list", 0x31000, 0x00100},
1345 {"product-info", 0x31100, 0x00400},
1346 {"soft-version", 0x32000, 0x00100},
1347 {"firmware", 0x40000, 0xd80000},
1348 {"user-config", 0xdc0000, 0x30000},
1349 {"mutil-log", 0xf30000, 0x80000},
1350 {"oops", 0xfb0000, 0x40000},
1351 {"radio", 0xff0000, 0x10000},
1352 {NULL, 0, 0}
1353 },
1354
1355 .first_sysupgrade_partition = "os-image",
1356 .last_sysupgrade_partition = "file-system"
1357 },
1358
1359 /** Firmware layout for the EAP245 v1 */
1360 {
1361 .id = "EAP245-V1",
1362 .support_list =
1363 "SupportList:\r\n"
1364 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1365 .support_trail = '\xff',
1366 .soft_ver = NULL,
1367
1368 .partitions = {
1369 {"fs-uboot", 0x00000, 0x20000},
1370 {"partition-table", 0x20000, 0x02000},
1371 {"default-mac", 0x30000, 0x01000},
1372 {"support-list", 0x31000, 0x00100},
1373 {"product-info", 0x31100, 0x00400},
1374 {"soft-version", 0x32000, 0x00100},
1375 {"firmware", 0x40000, 0xd80000},
1376 {"user-config", 0xdc0000, 0x30000},
1377 {"radio", 0xff0000, 0x10000},
1378 {NULL, 0, 0}
1379 },
1380
1381 .first_sysupgrade_partition = "os-image",
1382 .last_sysupgrade_partition = "file-system"
1383 },
1384
1385 /** Firmware layout for the EAP245 v3 */
1386 {
1387 .id = "EAP245-V3",
1388 .support_list =
1389 "SupportList:\r\n"
1390 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n",
1391 .support_trail = '\xff',
1392 .soft_ver = NULL,
1393 .soft_ver_compat_level = 1,
1394
1395 /** Firmware partition with dynamic kernel/rootfs split */
1396 .partitions = {
1397 {"factroy-boot", 0x00000, 0x40000},
1398 {"fs-uboot", 0x40000, 0x40000},
1399 {"partition-table", 0x80000, 0x10000},
1400 {"default-mac", 0x90000, 0x01000},
1401 {"support-list", 0x91000, 0x00100},
1402 {"product-info", 0x91100, 0x00400},
1403 {"soft-version", 0x92000, 0x00100},
1404 {"radio", 0xa0000, 0x10000},
1405 {"extra-para", 0xb0000, 0x10000},
1406 {"firmware", 0xc0000, 0xe40000},
1407 {"config", 0xf00000, 0x30000},
1408 {"mutil-log", 0xf30000, 0x80000},
1409 {"oops", 0xfb0000, 0x40000},
1410 {NULL, 0, 0}
1411 },
1412
1413 .first_sysupgrade_partition = "os-image",
1414 .last_sysupgrade_partition = "file-system"
1415 },
1416
1417 /** Firmware layout for the TL-WA850RE v2 */
1418 {
1419 .id = "TLWA850REV2",
1420 .vendor = "",
1421 .support_list =
1422 "SupportList:\n"
1423 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1424 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1425 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1426 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1427 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1428 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1429 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1430 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1431 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1432 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1433 .support_trail = '\x00',
1434 .soft_ver = NULL,
1435
1436 /**
1437 576KB were moved from file-system to os-image
1438 in comparison to the stock image
1439 */
1440 .partitions = {
1441 {"fs-uboot", 0x00000, 0x20000},
1442 {"firmware", 0x20000, 0x390000},
1443 {"partition-table", 0x3b0000, 0x02000},
1444 {"default-mac", 0x3c0000, 0x00020},
1445 {"pin", 0x3c0100, 0x00020},
1446 {"product-info", 0x3c1000, 0x01000},
1447 {"soft-version", 0x3c2000, 0x00100},
1448 {"support-list", 0x3c3000, 0x01000},
1449 {"profile", 0x3c4000, 0x08000},
1450 {"user-config", 0x3d0000, 0x10000},
1451 {"default-config", 0x3e0000, 0x10000},
1452 {"radio", 0x3f0000, 0x10000},
1453 {NULL, 0, 0}
1454 },
1455
1456 .first_sysupgrade_partition = "os-image",
1457 .last_sysupgrade_partition = "file-system"
1458 },
1459
1460 /** Firmware layout for the TL-WA855RE v1 */
1461 {
1462 .id = "TLWA855REV1",
1463 .vendor = "",
1464 .support_list =
1465 "SupportList:\n"
1466 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1467 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1468 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1469 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1470 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1471 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1472 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1473 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1474 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1475 .support_trail = '\x00',
1476 .soft_ver = NULL,
1477
1478 .partitions = {
1479 {"fs-uboot", 0x00000, 0x20000},
1480 {"os-image", 0x20000, 0x150000},
1481 {"file-system", 0x170000, 0x240000},
1482 {"partition-table", 0x3b0000, 0x02000},
1483 {"default-mac", 0x3c0000, 0x00020},
1484 {"pin", 0x3c0100, 0x00020},
1485 {"product-info", 0x3c1000, 0x01000},
1486 {"soft-version", 0x3c2000, 0x00100},
1487 {"support-list", 0x3c3000, 0x01000},
1488 {"profile", 0x3c4000, 0x08000},
1489 {"user-config", 0x3d0000, 0x10000},
1490 {"default-config", 0x3e0000, 0x10000},
1491 {"radio", 0x3f0000, 0x10000},
1492 {NULL, 0, 0}
1493 },
1494
1495 .first_sysupgrade_partition = "os-image",
1496 .last_sysupgrade_partition = "file-system"
1497 },
1498
1499 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
1500 {
1501 .id = "TL-WPA8630P-V2.0-EU",
1502 .vendor = "",
1503 .support_list =
1504 "SupportList:\n"
1505 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
1506 .support_trail = '\x00',
1507 .soft_ver = NULL,
1508
1509 .partitions = {
1510 {"factory-uboot", 0x00000, 0x20000},
1511 {"fs-uboot", 0x20000, 0x20000},
1512 {"firmware", 0x40000, 0x5e0000},
1513 {"partition-table", 0x620000, 0x02000},
1514 {"default-mac", 0x630000, 0x00020},
1515 {"pin", 0x630100, 0x00020},
1516 {"device-id", 0x630200, 0x00030},
1517 {"product-info", 0x631100, 0x01000},
1518 {"extra-para", 0x632100, 0x01000},
1519 {"soft-version", 0x640000, 0x01000},
1520 {"support-list", 0x641000, 0x01000},
1521 {"profile", 0x642000, 0x08000},
1522 {"user-config", 0x650000, 0x10000},
1523 {"default-config", 0x660000, 0x10000},
1524 {"default-nvm", 0x670000, 0xc0000},
1525 {"default-pib", 0x730000, 0x40000},
1526 {"radio", 0x7f0000, 0x10000},
1527 {NULL, 0, 0}
1528 },
1529
1530 .first_sysupgrade_partition = "os-image",
1531 .last_sysupgrade_partition = "file-system"
1532 },
1533
1534 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
1535 {
1536 .id = "TL-WPA8630P-V2-INT",
1537 .vendor = "",
1538 .support_list =
1539 "SupportList:\n"
1540 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
1541 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
1542 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
1543 .support_trail = '\x00',
1544 .soft_ver = NULL,
1545
1546 .partitions = {
1547 {"factory-uboot", 0x00000, 0x20000},
1548 {"fs-uboot", 0x20000, 0x20000},
1549 {"firmware", 0x40000, 0x5e0000},
1550 {"partition-table", 0x620000, 0x02000},
1551 {"extra-para", 0x632100, 0x01000},
1552 {"soft-version", 0x640000, 0x01000},
1553 {"support-list", 0x641000, 0x01000},
1554 {"profile", 0x642000, 0x08000},
1555 {"user-config", 0x650000, 0x10000},
1556 {"default-config", 0x660000, 0x10000},
1557 {"default-nvm", 0x670000, 0xc0000},
1558 {"default-pib", 0x730000, 0x40000},
1559 {"default-mac", 0x7e0000, 0x00020},
1560 {"pin", 0x7e0100, 0x00020},
1561 {"device-id", 0x7e0200, 0x00030},
1562 {"product-info", 0x7e1100, 0x01000},
1563 {"radio", 0x7f0000, 0x10000},
1564 {NULL, 0, 0}
1565 },
1566
1567 .first_sysupgrade_partition = "os-image",
1568 .last_sysupgrade_partition = "file-system"
1569 },
1570
1571 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
1572 {
1573 .id = "TL-WPA8630P-V2.1-EU",
1574 .vendor = "",
1575 .support_list =
1576 "SupportList:\n"
1577 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
1578 .support_trail = '\x00',
1579 .soft_ver = NULL,
1580
1581 .partitions = {
1582 {"factory-uboot", 0x00000, 0x20000},
1583 {"fs-uboot", 0x20000, 0x20000},
1584 {"firmware", 0x40000, 0x5e0000},
1585 {"extra-para", 0x680000, 0x01000},
1586 {"product-info", 0x690000, 0x01000},
1587 {"partition-table", 0x6a0000, 0x02000},
1588 {"soft-version", 0x6b0000, 0x01000},
1589 {"support-list", 0x6b1000, 0x01000},
1590 {"profile", 0x6b2000, 0x08000},
1591 {"user-config", 0x6c0000, 0x10000},
1592 {"default-config", 0x6d0000, 0x10000},
1593 {"default-nvm", 0x6e0000, 0xc0000},
1594 {"default-pib", 0x7a0000, 0x40000},
1595 {"default-mac", 0x7e0000, 0x00020},
1596 {"pin", 0x7e0100, 0x00020},
1597 {"device-id", 0x7e0200, 0x00030},
1598 {"radio", 0x7f0000, 0x10000},
1599 {NULL, 0, 0}
1600 },
1601
1602 .first_sysupgrade_partition = "os-image",
1603 .last_sysupgrade_partition = "file-system"
1604 },
1605
1606 /** Firmware layout for the TL-WR1043 v5 */
1607 {
1608 .id = "TLWR1043NV5",
1609 .vendor = "",
1610 .support_list =
1611 "SupportList:\n"
1612 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1613 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1614 .support_trail = '\x00',
1615 .soft_ver = "soft_ver:1.0.0\n",
1616 .partitions = {
1617 {"factory-boot", 0x00000, 0x20000},
1618 {"fs-uboot", 0x20000, 0x20000},
1619 {"firmware", 0x40000, 0xec0000},
1620 {"default-mac", 0xf00000, 0x00200},
1621 {"pin", 0xf00200, 0x00200},
1622 {"device-id", 0xf00400, 0x00100},
1623 {"product-info", 0xf00500, 0x0fb00},
1624 {"soft-version", 0xf10000, 0x01000},
1625 {"extra-para", 0xf11000, 0x01000},
1626 {"support-list", 0xf12000, 0x0a000},
1627 {"profile", 0xf1c000, 0x04000},
1628 {"default-config", 0xf20000, 0x10000},
1629 {"user-config", 0xf30000, 0x40000},
1630 {"qos-db", 0xf70000, 0x40000},
1631 {"certificate", 0xfb0000, 0x10000},
1632 {"partition-table", 0xfc0000, 0x10000},
1633 {"log", 0xfd0000, 0x20000},
1634 {"radio", 0xff0000, 0x10000},
1635 {NULL, 0, 0}
1636 },
1637 .first_sysupgrade_partition = "os-image",
1638 .last_sysupgrade_partition = "file-system"
1639 },
1640
1641 /** Firmware layout for the TL-WR1043 v4 */
1642 {
1643 .id = "TLWR1043NDV4",
1644 .vendor = "",
1645 .support_list =
1646 "SupportList:\n"
1647 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1648 .support_trail = '\x00',
1649 .soft_ver = NULL,
1650
1651 /* We're using a dynamic kernel/rootfs split here */
1652 .partitions = {
1653 {"fs-uboot", 0x00000, 0x20000},
1654 {"firmware", 0x20000, 0xf30000},
1655 {"default-mac", 0xf50000, 0x00200},
1656 {"pin", 0xf50200, 0x00200},
1657 {"product-info", 0xf50400, 0x0fc00},
1658 {"soft-version", 0xf60000, 0x0b000},
1659 {"support-list", 0xf6b000, 0x04000},
1660 {"profile", 0xf70000, 0x04000},
1661 {"default-config", 0xf74000, 0x0b000},
1662 {"user-config", 0xf80000, 0x40000},
1663 {"partition-table", 0xfc0000, 0x10000},
1664 {"log", 0xfd0000, 0x20000},
1665 {"radio", 0xff0000, 0x10000},
1666 {NULL, 0, 0}
1667 },
1668
1669 .first_sysupgrade_partition = "os-image",
1670 .last_sysupgrade_partition = "file-system"
1671 },
1672
1673 /** Firmware layout for the TL-WR902AC v1 */
1674 {
1675 .id = "TL-WR902AC-V1",
1676 .vendor = "",
1677 .support_list =
1678 "SupportList:\n"
1679 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1680 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1681 .support_trail = '\x00',
1682 .soft_ver = NULL,
1683
1684 /**
1685 384KB were moved from file-system to os-image
1686 in comparison to the stock image
1687 */
1688 .partitions = {
1689 {"fs-uboot", 0x00000, 0x20000},
1690 {"firmware", 0x20000, 0x730000},
1691 {"default-mac", 0x750000, 0x00200},
1692 {"pin", 0x750200, 0x00200},
1693 {"product-info", 0x750400, 0x0fc00},
1694 {"soft-version", 0x760000, 0x0b000},
1695 {"support-list", 0x76b000, 0x04000},
1696 {"profile", 0x770000, 0x04000},
1697 {"default-config", 0x774000, 0x0b000},
1698 {"user-config", 0x780000, 0x40000},
1699 {"partition-table", 0x7c0000, 0x10000},
1700 {"log", 0x7d0000, 0x20000},
1701 {"radio", 0x7f0000, 0x10000},
1702 {NULL, 0, 0}
1703 },
1704
1705 .first_sysupgrade_partition = "os-image",
1706 .last_sysupgrade_partition = "file-system",
1707 },
1708
1709 /** Firmware layout for the TL-WR942N V1 */
1710 {
1711 .id = "TLWR942NV1",
1712 .vendor = "",
1713 .support_list =
1714 "SupportList:\r\n"
1715 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1716 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1717 .support_trail = '\x00',
1718 .soft_ver = NULL,
1719
1720 .partitions = {
1721 {"fs-uboot", 0x00000, 0x20000},
1722 {"firmware", 0x20000, 0xe20000},
1723 {"default-mac", 0xe40000, 0x00200},
1724 {"pin", 0xe40200, 0x00200},
1725 {"product-info", 0xe40400, 0x0fc00},
1726 {"partition-table", 0xe50000, 0x10000},
1727 {"soft-version", 0xe60000, 0x10000},
1728 {"support-list", 0xe70000, 0x10000},
1729 {"profile", 0xe80000, 0x10000},
1730 {"default-config", 0xe90000, 0x10000},
1731 {"user-config", 0xea0000, 0x40000},
1732 {"qos-db", 0xee0000, 0x40000},
1733 {"certificate", 0xf20000, 0x10000},
1734 {"usb-config", 0xfb0000, 0x10000},
1735 {"log", 0xfc0000, 0x20000},
1736 {"radio-bk", 0xfe0000, 0x10000},
1737 {"radio", 0xff0000, 0x10000},
1738 {NULL, 0, 0}
1739 },
1740
1741 .first_sysupgrade_partition = "os-image",
1742 .last_sysupgrade_partition = "file-system",
1743 },
1744
1745 /** Firmware layout for the RE200 v2 */
1746 {
1747 .id = "RE200-V2",
1748 .vendor = "",
1749 .support_list =
1750 "SupportList:\n"
1751 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1752 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1753 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1754 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1755 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1756 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1757 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1758 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1759 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1760 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1761 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1762 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1763 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1764 .support_trail = '\x00',
1765 .soft_ver = NULL,
1766
1767 .partitions = {
1768 {"fs-uboot", 0x00000, 0x20000},
1769 {"firmware", 0x20000, 0x7a0000},
1770 {"partition-table", 0x7c0000, 0x02000},
1771 {"default-mac", 0x7c2000, 0x00020},
1772 {"pin", 0x7c2100, 0x00020},
1773 {"product-info", 0x7c3100, 0x01000},
1774 {"soft-version", 0x7c4200, 0x01000},
1775 {"support-list", 0x7c5200, 0x01000},
1776 {"profile", 0x7c6200, 0x08000},
1777 {"config-info", 0x7ce200, 0x00400},
1778 {"user-config", 0x7d0000, 0x10000},
1779 {"default-config", 0x7e0000, 0x10000},
1780 {"radio", 0x7f0000, 0x10000},
1781 {NULL, 0, 0}
1782 },
1783
1784 .first_sysupgrade_partition = "os-image",
1785 .last_sysupgrade_partition = "file-system"
1786 },
1787
1788 /** Firmware layout for the RE200 v3 */
1789 {
1790 .id = "RE200-V3",
1791 .vendor = "",
1792 .support_list =
1793 "SupportList:\n"
1794 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
1795 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
1796 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
1797 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
1798 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
1799 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
1800 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
1801 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
1802 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
1803 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
1804 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
1805 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
1806 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
1807 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
1808 .support_trail = '\x00',
1809 .soft_ver = NULL,
1810
1811 .partitions = {
1812 {"fs-uboot", 0x00000, 0x20000},
1813 {"firmware", 0x20000, 0x7a0000},
1814 {"partition-table", 0x7c0000, 0x02000},
1815 {"default-mac", 0x7c2000, 0x00020},
1816 {"pin", 0x7c2100, 0x00020},
1817 {"product-info", 0x7c3100, 0x01000},
1818 {"soft-version", 0x7c4200, 0x01000},
1819 {"support-list", 0x7c5200, 0x01000},
1820 {"profile", 0x7c6200, 0x08000},
1821 {"config-info", 0x7ce200, 0x00400},
1822 {"user-config", 0x7d0000, 0x10000},
1823 {"default-config", 0x7e0000, 0x10000},
1824 {"radio", 0x7f0000, 0x10000},
1825 {NULL, 0, 0}
1826 },
1827
1828 .first_sysupgrade_partition = "os-image",
1829 .last_sysupgrade_partition = "file-system"
1830 },
1831
1832 /** Firmware layout for the RE200 v4 */
1833 {
1834 .id = "RE200-V4",
1835 .vendor = "",
1836 .support_list =
1837 "SupportList:\n"
1838 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
1839 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
1840 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
1841 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
1842 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
1843 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
1844 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
1845 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
1846 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
1847 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
1848 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
1849 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
1850 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
1851 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
1852 .support_trail = '\x00',
1853 .soft_ver = "soft_ver:1.1.0\n",
1854
1855 .partitions = {
1856 {"fs-uboot", 0x00000, 0x20000},
1857 {"firmware", 0x20000, 0x7a0000},
1858 {"partition-table", 0x7c0000, 0x02000},
1859 {"default-mac", 0x7c2000, 0x00020},
1860 {"pin", 0x7c2100, 0x00020},
1861 {"product-info", 0x7c3100, 0x01000},
1862 {"soft-version", 0x7c4200, 0x01000},
1863 {"support-list", 0x7c5200, 0x01000},
1864 {"profile", 0x7c6200, 0x08000},
1865 {"config-info", 0x7ce200, 0x00400},
1866 {"user-config", 0x7d0000, 0x10000},
1867 {"default-config", 0x7e0000, 0x10000},
1868 {"radio", 0x7f0000, 0x10000},
1869 {NULL, 0, 0}
1870 },
1871
1872 .first_sysupgrade_partition = "os-image",
1873 .last_sysupgrade_partition = "file-system"
1874 },
1875
1876 /** Firmware layout for the RE220 v2 */
1877 {
1878 .id = "RE220-V2",
1879 .vendor = "",
1880 .support_list =
1881 "SupportList:\n"
1882 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
1883 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
1884 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
1885 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
1886 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
1887 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
1888 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
1889 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
1890 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
1891 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
1892 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
1893 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
1894 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
1895 .support_trail = '\x00',
1896 .soft_ver = NULL,
1897
1898 .partitions = {
1899 {"fs-uboot", 0x00000, 0x20000},
1900 {"firmware", 0x20000, 0x7a0000},
1901 {"partition-table", 0x7c0000, 0x02000},
1902 {"default-mac", 0x7c2000, 0x00020},
1903 {"pin", 0x7c2100, 0x00020},
1904 {"product-info", 0x7c3100, 0x01000},
1905 {"soft-version", 0x7c4200, 0x01000},
1906 {"support-list", 0x7c5200, 0x01000},
1907 {"profile", 0x7c6200, 0x08000},
1908 {"config-info", 0x7ce200, 0x00400},
1909 {"user-config", 0x7d0000, 0x10000},
1910 {"default-config", 0x7e0000, 0x10000},
1911 {"radio", 0x7f0000, 0x10000},
1912 {NULL, 0, 0}
1913 },
1914
1915 .first_sysupgrade_partition = "os-image",
1916 .last_sysupgrade_partition = "file-system"
1917 },
1918
1919 /** Firmware layout for the RE305 v1 */
1920 {
1921 .id = "RE305-V1",
1922 .vendor = "",
1923 .support_list =
1924 "SupportList:\n"
1925 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
1926 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
1927 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
1928 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
1929 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
1930 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
1931 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
1932 .support_trail = '\x00',
1933 .soft_ver = NULL,
1934
1935 .partitions = {
1936 {"fs-uboot", 0x00000, 0x20000},
1937 {"firmware", 0x20000, 0x5e0000},
1938 {"partition-table", 0x600000, 0x02000},
1939 {"default-mac", 0x610000, 0x00020},
1940 {"pin", 0x610100, 0x00020},
1941 {"product-info", 0x611100, 0x01000},
1942 {"soft-version", 0x620000, 0x01000},
1943 {"support-list", 0x621000, 0x01000},
1944 {"profile", 0x622000, 0x08000},
1945 {"user-config", 0x630000, 0x10000},
1946 {"default-config", 0x640000, 0x10000},
1947 {"radio", 0x7f0000, 0x10000},
1948 {NULL, 0, 0}
1949 },
1950
1951 .first_sysupgrade_partition = "os-image",
1952 .last_sysupgrade_partition = "file-system"
1953 },
1954
1955 /** Firmware layout for the RE350 v1 */
1956 {
1957 .id = "RE350-V1",
1958 .vendor = "",
1959 .support_list =
1960 "SupportList:\n"
1961 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1962 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1963 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1964 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1965 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1966 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1967 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1968 .support_trail = '\x00',
1969 .soft_ver = NULL,
1970
1971 /** We're using a dynamic kernel/rootfs split here */
1972 .partitions = {
1973 {"fs-uboot", 0x00000, 0x20000},
1974 {"firmware", 0x20000, 0x5e0000},
1975 {"partition-table", 0x600000, 0x02000},
1976 {"default-mac", 0x610000, 0x00020},
1977 {"pin", 0x610100, 0x00020},
1978 {"product-info", 0x611100, 0x01000},
1979 {"soft-version", 0x620000, 0x01000},
1980 {"support-list", 0x621000, 0x01000},
1981 {"profile", 0x622000, 0x08000},
1982 {"user-config", 0x630000, 0x10000},
1983 {"default-config", 0x640000, 0x10000},
1984 {"radio", 0x7f0000, 0x10000},
1985 {NULL, 0, 0}
1986 },
1987
1988 .first_sysupgrade_partition = "os-image",
1989 .last_sysupgrade_partition = "file-system"
1990 },
1991
1992 /** Firmware layout for the RE350K v1 */
1993 {
1994 .id = "RE350K-V1",
1995 .vendor = "",
1996 .support_list =
1997 "SupportList:\n"
1998 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
1999 .support_trail = '\x00',
2000 .soft_ver = NULL,
2001
2002 /** We're using a dynamic kernel/rootfs split here */
2003 .partitions = {
2004 {"fs-uboot", 0x00000, 0x20000},
2005 {"firmware", 0x20000, 0xd70000},
2006 {"partition-table", 0xd90000, 0x02000},
2007 {"default-mac", 0xda0000, 0x00020},
2008 {"pin", 0xda0100, 0x00020},
2009 {"product-info", 0xda1100, 0x01000},
2010 {"soft-version", 0xdb0000, 0x01000},
2011 {"support-list", 0xdb1000, 0x01000},
2012 {"profile", 0xdb2000, 0x08000},
2013 {"user-config", 0xdc0000, 0x10000},
2014 {"default-config", 0xdd0000, 0x10000},
2015 {"device-id", 0xde0000, 0x00108},
2016 {"radio", 0xff0000, 0x10000},
2017 {NULL, 0, 0}
2018 },
2019
2020 .first_sysupgrade_partition = "os-image",
2021 .last_sysupgrade_partition = "file-system"
2022 },
2023
2024 /** Firmware layout for the RE355 */
2025 {
2026 .id = "RE355",
2027 .vendor = "",
2028 .support_list =
2029 "SupportList:\r\n"
2030 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2031 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2032 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2033 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2034 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2035 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2036 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2037 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2038 .support_trail = '\x00',
2039 .soft_ver = NULL,
2040
2041 /* We're using a dynamic kernel/rootfs split here */
2042 .partitions = {
2043 {"fs-uboot", 0x00000, 0x20000},
2044 {"firmware", 0x20000, 0x5e0000},
2045 {"partition-table", 0x600000, 0x02000},
2046 {"default-mac", 0x610000, 0x00020},
2047 {"pin", 0x610100, 0x00020},
2048 {"product-info", 0x611100, 0x01000},
2049 {"soft-version", 0x620000, 0x01000},
2050 {"support-list", 0x621000, 0x01000},
2051 {"profile", 0x622000, 0x08000},
2052 {"user-config", 0x630000, 0x10000},
2053 {"default-config", 0x640000, 0x10000},
2054 {"radio", 0x7f0000, 0x10000},
2055 {NULL, 0, 0}
2056 },
2057
2058 .first_sysupgrade_partition = "os-image",
2059 .last_sysupgrade_partition = "file-system"
2060 },
2061
2062 /** Firmware layout for the RE450 */
2063 {
2064 .id = "RE450",
2065 .vendor = "",
2066 .support_list =
2067 "SupportList:\r\n"
2068 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2069 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2070 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2071 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2072 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2073 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2074 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2075 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2076 .support_trail = '\x00',
2077 .soft_ver = NULL,
2078
2079 /** We're using a dynamic kernel/rootfs split here */
2080 .partitions = {
2081 {"fs-uboot", 0x00000, 0x20000},
2082 {"firmware", 0x20000, 0x5e0000},
2083 {"partition-table", 0x600000, 0x02000},
2084 {"default-mac", 0x610000, 0x00020},
2085 {"pin", 0x610100, 0x00020},
2086 {"product-info", 0x611100, 0x01000},
2087 {"soft-version", 0x620000, 0x01000},
2088 {"support-list", 0x621000, 0x01000},
2089 {"profile", 0x622000, 0x08000},
2090 {"user-config", 0x630000, 0x10000},
2091 {"default-config", 0x640000, 0x10000},
2092 {"radio", 0x7f0000, 0x10000},
2093 {NULL, 0, 0}
2094 },
2095
2096 .first_sysupgrade_partition = "os-image",
2097 .last_sysupgrade_partition = "file-system"
2098 },
2099
2100 /** Firmware layout for the RE450 v2 */
2101 {
2102 .id = "RE450-V2",
2103 .vendor = "",
2104 .support_list =
2105 "SupportList:\r\n"
2106 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2107 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2108 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2109 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2110 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2111 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2112 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2113 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2114 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2115 .support_trail = '\x00',
2116 .soft_ver = NULL,
2117
2118 /* We're using a dynamic kernel/rootfs split here */
2119 .partitions = {
2120 {"fs-uboot", 0x00000, 0x20000},
2121 {"firmware", 0x20000, 0x5e0000},
2122 {"partition-table", 0x600000, 0x02000},
2123 {"default-mac", 0x610000, 0x00020},
2124 {"pin", 0x610100, 0x00020},
2125 {"product-info", 0x611100, 0x01000},
2126 {"soft-version", 0x620000, 0x01000},
2127 {"support-list", 0x621000, 0x01000},
2128 {"profile", 0x622000, 0x08000},
2129 {"user-config", 0x630000, 0x10000},
2130 {"default-config", 0x640000, 0x10000},
2131 {"radio", 0x7f0000, 0x10000},
2132 {NULL, 0, 0}
2133 },
2134
2135 .first_sysupgrade_partition = "os-image",
2136 .last_sysupgrade_partition = "file-system"
2137 },
2138
2139 /** Firmware layout for the RE450 v3 */
2140 {
2141 .id = "RE450-V3",
2142 .vendor = "",
2143 .support_list =
2144 "SupportList:\r\n"
2145 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2146 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2147 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2148 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2149 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2150 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2151 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2152 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2153 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2154 .support_trail = '\x00',
2155 .soft_ver = NULL,
2156
2157 /* We're using a dynamic kernel/rootfs split here */
2158 .partitions = {
2159 {"fs-uboot", 0x00000, 0x20000},
2160 {"default-mac", 0x20000, 0x00020},
2161 {"pin", 0x20020, 0x00020},
2162 {"product-info", 0x21000, 0x01000},
2163 {"partition-table", 0x22000, 0x02000},
2164 {"soft-version", 0x24000, 0x01000},
2165 {"support-list", 0x25000, 0x01000},
2166 {"profile", 0x26000, 0x08000},
2167 {"user-config", 0x2e000, 0x10000},
2168 {"default-config", 0x3e000, 0x10000},
2169 {"config-info", 0x4e000, 0x00400},
2170 {"firmware", 0x50000, 0x7a0000},
2171 {"radio", 0x7f0000, 0x10000},
2172 {NULL, 0, 0}
2173 },
2174
2175 .first_sysupgrade_partition = "os-image",
2176 .last_sysupgrade_partition = "file-system"
2177 },
2178
2179 /** Firmware layout for the RE500 */
2180 {
2181 .id = "RE500-V1",
2182 .vendor = "",
2183 .support_list =
2184 "SupportList:\r\n"
2185 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
2186 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
2187 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
2188 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
2189 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
2190 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
2191 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
2192 .support_trail = '\x00',
2193 .soft_ver = NULL,
2194
2195 /* We're using a dynamic kernel/rootfs split here */
2196 .partitions = {
2197 {"fs-uboot", 0x00000, 0x20000},
2198 {"firmware", 0x20000, 0xde0000},
2199 {"partition-table", 0xe00000, 0x02000},
2200 {"default-mac", 0xe10000, 0x00020},
2201 {"pin", 0xe10100, 0x00020},
2202 {"product-info", 0xe11100, 0x01000},
2203 {"soft-version", 0xe20000, 0x01000},
2204 {"support-list", 0xe21000, 0x01000},
2205 {"profile", 0xe22000, 0x08000},
2206 {"user-config", 0xe30000, 0x10000},
2207 {"default-config", 0xe40000, 0x10000},
2208 {"radio", 0xff0000, 0x10000},
2209 {NULL, 0, 0}
2210 },
2211
2212 .first_sysupgrade_partition = "os-image",
2213 .last_sysupgrade_partition = "file-system"
2214 },
2215
2216 /** Firmware layout for the RE650 */
2217 {
2218 .id = "RE650-V1",
2219 .vendor = "",
2220 .support_list =
2221 "SupportList:\r\n"
2222 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
2223 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
2224 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
2225 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
2226 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
2227 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
2228 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
2229 .support_trail = '\x00',
2230 .soft_ver = NULL,
2231
2232 /* We're using a dynamic kernel/rootfs split here */
2233 .partitions = {
2234 {"fs-uboot", 0x00000, 0x20000},
2235 {"firmware", 0x20000, 0xde0000},
2236 {"partition-table", 0xe00000, 0x02000},
2237 {"default-mac", 0xe10000, 0x00020},
2238 {"pin", 0xe10100, 0x00020},
2239 {"product-info", 0xe11100, 0x01000},
2240 {"soft-version", 0xe20000, 0x01000},
2241 {"support-list", 0xe21000, 0x01000},
2242 {"profile", 0xe22000, 0x08000},
2243 {"user-config", 0xe30000, 0x10000},
2244 {"default-config", 0xe40000, 0x10000},
2245 {"radio", 0xff0000, 0x10000},
2246 {NULL, 0, 0}
2247 },
2248
2249 .first_sysupgrade_partition = "os-image",
2250 .last_sysupgrade_partition = "file-system"
2251 },
2252
2253 {}
2254 };
2255
2256 #define error(_ret, _errno, _str, ...) \
2257 do { \
2258 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
2259 strerror(_errno)); \
2260 if (_ret) \
2261 exit(_ret); \
2262 } while (0)
2263
2264
2265 /** Stores a uint32 as big endian */
2266 static inline void put32(uint8_t *buf, uint32_t val) {
2267 buf[0] = val >> 24;
2268 buf[1] = val >> 16;
2269 buf[2] = val >> 8;
2270 buf[3] = val;
2271 }
2272
2273 /** Allocates a new image partition */
2274 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
2275 struct image_partition_entry entry = {name, len, malloc(len)};
2276 if (!entry.data)
2277 error(1, errno, "malloc");
2278
2279 return entry;
2280 }
2281
2282 /** Frees an image partition */
2283 static void free_image_partition(struct image_partition_entry entry) {
2284 free(entry.data);
2285 }
2286
2287 static time_t source_date_epoch = -1;
2288 static void set_source_date_epoch() {
2289 char *env = getenv("SOURCE_DATE_EPOCH");
2290 char *endptr = env;
2291 errno = 0;
2292 if (env && *env) {
2293 source_date_epoch = strtoull(env, &endptr, 10);
2294 if (errno || (endptr && *endptr != '\0')) {
2295 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
2296 exit(1);
2297 }
2298 }
2299 }
2300
2301 /** Generates the partition-table partition */
2302 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
2303 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
2304
2305 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
2306
2307 *(s++) = 0x00;
2308 *(s++) = 0x04;
2309 *(s++) = 0x00;
2310 *(s++) = 0x00;
2311
2312 size_t i;
2313 for (i = 0; p[i].name; i++) {
2314 size_t len = end-s;
2315 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
2316
2317 if (w > len-1)
2318 error(1, 0, "flash partition table overflow?");
2319
2320 s += w;
2321 }
2322
2323 s++;
2324
2325 memset(s, 0xff, end-s);
2326
2327 return entry;
2328 }
2329
2330
2331 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
2332 static inline uint8_t bcd(uint8_t v) {
2333 return 0x10 * (v/10) + v%10;
2334 }
2335
2336
2337 /** Generates the soft-version partition */
2338 static struct image_partition_entry make_soft_version(struct device_info *info, uint32_t rev) {
2339 size_t part_len = sizeof(struct soft_version);
2340 if (info->soft_ver_compat_level > 0)
2341 part_len += sizeof(uint32_t);
2342
2343 struct image_partition_entry entry =
2344 alloc_image_partition("soft-version", part_len+1);
2345 struct soft_version *s = (struct soft_version *)entry.data;
2346
2347 time_t t;
2348
2349 if (source_date_epoch != -1)
2350 t = source_date_epoch;
2351 else if (time(&t) == (time_t)(-1))
2352 error(1, errno, "time");
2353
2354 struct tm *tm = gmtime(&t);
2355
2356 /* Partition contents size, minus 8 byte header and trailing byte */
2357 s->data_len = htonl(entry.size-9);
2358 s->zero = 0;
2359 s->pad1 = 0xff;
2360
2361 s->version_major = 0;
2362 s->version_minor = 0;
2363 s->version_patch = 0;
2364
2365 s->year_hi = bcd((1900+tm->tm_year)/100);
2366 s->year_lo = bcd(tm->tm_year%100);
2367 s->month = bcd(tm->tm_mon+1);
2368 s->day = bcd(tm->tm_mday);
2369 s->rev = htonl(rev);
2370
2371 if (info->soft_ver_compat_level > 0)
2372 *(uint32_t *)(entry.data + sizeof(struct soft_version)) =
2373 htonl(info->soft_ver_compat_level);
2374
2375 entry.data[entry.size-1] = 0xff;
2376
2377 return entry;
2378 }
2379
2380 static struct image_partition_entry make_soft_version_from_string(const char *soft_ver) {
2381 /** String length _including_ the terminating zero byte */
2382 uint32_t ver_len = strlen(soft_ver) + 1;
2383 /** Partition contains 64 bit header, the version string, and one additional null byte */
2384 size_t partition_len = 2*sizeof(uint32_t) + ver_len + 1;
2385 struct image_partition_entry entry = alloc_image_partition("soft-version", partition_len);
2386
2387 uint32_t *len = (uint32_t *)entry.data;
2388 len[0] = htonl(ver_len);
2389 len[1] = 0;
2390 memcpy(&len[2], soft_ver, ver_len);
2391
2392 entry.data[partition_len - 1] = 0;
2393
2394 return entry;
2395 }
2396
2397 /** Generates the support-list partition */
2398 static struct image_partition_entry make_support_list(struct device_info *info) {
2399 size_t len = strlen(info->support_list);
2400 struct image_partition_entry entry = alloc_image_partition("support-list", len + 9);
2401
2402 put32(entry.data, len);
2403 memset(entry.data+4, 0, 4);
2404 memcpy(entry.data+8, info->support_list, len);
2405 entry.data[len+8] = info->support_trail;
2406
2407 return entry;
2408 }
2409
2410 /** Creates a new image partition with an arbitrary name from a file */
2411 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
2412 struct stat statbuf;
2413
2414 if (stat(filename, &statbuf) < 0)
2415 error(1, errno, "unable to stat file `%s'", filename);
2416
2417 size_t len = statbuf.st_size;
2418
2419 if (add_jffs2_eof) {
2420 if (file_system_partition)
2421 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
2422 else
2423 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
2424 }
2425
2426 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2427
2428 FILE *file = fopen(filename, "rb");
2429 if (!file)
2430 error(1, errno, "unable to open file `%s'", filename);
2431
2432 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
2433 error(1, errno, "unable to read file `%s'", filename);
2434
2435 if (add_jffs2_eof) {
2436 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
2437
2438 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
2439 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
2440 }
2441
2442 fclose(file);
2443
2444 return entry;
2445 }
2446
2447 /** Creates a new image partition from arbitrary data */
2448 static struct image_partition_entry put_data(const char *part_name, const char *datain, size_t len) {
2449
2450 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2451
2452 memcpy(entry.data, datain, len);
2453
2454 return entry;
2455 }
2456
2457 /**
2458 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2459
2460 Example image partition table:
2461
2462 fwup-ptn partition-table base 0x00800 size 0x00800
2463 fwup-ptn os-image base 0x01000 size 0x113b45
2464 fwup-ptn file-system base 0x114b45 size 0x1d0004
2465 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2466
2467 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2468 the end of the partition table is marked with a zero byte.
2469
2470 The firmware image must contain at least the partition-table and support-list partitions
2471 to be accepted. There aren't any alignment constraints for the image partitions.
2472
2473 The partition-table partition contains the actual flash layout; partitions
2474 from the image partition table are mapped to the corresponding flash partitions during
2475 the firmware upgrade. The support-list partition contains a list of devices supported by
2476 the firmware image.
2477
2478 The base offsets in the firmware partition table are relative to the end
2479 of the vendor information block, so the partition-table partition will
2480 actually start at offset 0x1814 of the image.
2481
2482 I think partition-table must be the first partition in the firmware image.
2483 */
2484 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
2485 size_t i, j;
2486 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
2487
2488 size_t base = 0x800;
2489 for (i = 0; parts[i].name; i++) {
2490 for (j = 0; flash_parts[j].name; j++) {
2491 if (!strcmp(flash_parts[j].name, parts[i].name)) {
2492 if (parts[i].size > flash_parts[j].size)
2493 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
2494 break;
2495 }
2496 }
2497
2498 assert(flash_parts[j].name);
2499
2500 memcpy(buffer + base, parts[i].data, parts[i].size);
2501
2502 size_t len = end-image_pt;
2503 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
2504
2505 if (w > len-1)
2506 error(1, 0, "image partition table overflow?");
2507
2508 image_pt += w;
2509
2510 base += parts[i].size;
2511 }
2512 }
2513
2514 /** Generates and writes the image MD5 checksum */
2515 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
2516 MD5_CTX ctx;
2517
2518 MD5_Init(&ctx);
2519 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
2520 MD5_Update(&ctx, buffer, len);
2521 MD5_Final(md5, &ctx);
2522 }
2523
2524
2525 /**
2526 Generates the firmware image in factory format
2527
2528 Image format:
2529
2530 Bytes (hex) Usage
2531 ----------- -----
2532 0000-0003 Image size (4 bytes, big endian)
2533 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2534 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2535 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2536 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2537 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2538 1814-xxxx Firmware partitions
2539 */
2540 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
2541 *len = 0x1814;
2542
2543 size_t i;
2544 for (i = 0; parts[i].name; i++)
2545 *len += parts[i].size;
2546
2547 uint8_t *image = malloc(*len);
2548 if (!image)
2549 error(1, errno, "malloc");
2550
2551 memset(image, 0xff, *len);
2552 put32(image, *len);
2553
2554 if (info->vendor) {
2555 size_t vendor_len = strlen(info->vendor);
2556 put32(image+0x14, vendor_len);
2557 memcpy(image+0x18, info->vendor, vendor_len);
2558 }
2559
2560 put_partitions(image + 0x1014, info->partitions, parts);
2561 put_md5(image+0x04, image+0x14, *len-0x14);
2562
2563 return image;
2564 }
2565
2566 /**
2567 Generates the firmware image in sysupgrade format
2568
2569 This makes some assumptions about the provided flash and image partition tables and
2570 should be generalized when TP-LINK starts building its safeloader into hardware with
2571 different flash layouts.
2572 */
2573 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
2574 size_t i, j;
2575 size_t flash_first_partition_index = 0;
2576 size_t flash_last_partition_index = 0;
2577 const struct flash_partition_entry *flash_first_partition = NULL;
2578 const struct flash_partition_entry *flash_last_partition = NULL;
2579 const struct image_partition_entry *image_last_partition = NULL;
2580
2581 /** Find first and last partitions */
2582 for (i = 0; info->partitions[i].name; i++) {
2583 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
2584 flash_first_partition = &info->partitions[i];
2585 flash_first_partition_index = i;
2586 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
2587 flash_last_partition = &info->partitions[i];
2588 flash_last_partition_index = i;
2589 }
2590 }
2591
2592 assert(flash_first_partition && flash_last_partition);
2593 assert(flash_first_partition_index < flash_last_partition_index);
2594
2595 /** Find last partition from image to calculate needed size */
2596 for (i = 0; image_parts[i].name; i++) {
2597 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
2598 image_last_partition = &image_parts[i];
2599 break;
2600 }
2601 }
2602
2603 assert(image_last_partition);
2604
2605 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2606
2607 uint8_t *image = malloc(*len);
2608 if (!image)
2609 error(1, errno, "malloc");
2610
2611 memset(image, 0xff, *len);
2612
2613 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2614 for (j = 0; image_parts[j].name; j++) {
2615 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2616 if (image_parts[j].size > info->partitions[i].size)
2617 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2618 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2619 break;
2620 }
2621
2622 assert(image_parts[j].name);
2623 }
2624 }
2625
2626 return image;
2627 }
2628
2629 /** Generates an image according to a given layout and writes it to a file */
2630 static void build_image(const char *output,
2631 const char *kernel_image,
2632 const char *rootfs_image,
2633 uint32_t rev,
2634 bool add_jffs2_eof,
2635 bool sysupgrade,
2636 struct device_info *info) {
2637
2638 size_t i;
2639
2640 struct image_partition_entry parts[7] = {};
2641
2642 struct flash_partition_entry *firmware_partition = NULL;
2643 struct flash_partition_entry *os_image_partition = NULL;
2644 struct flash_partition_entry *file_system_partition = NULL;
2645 size_t firmware_partition_index = 0;
2646
2647 for (i = 0; info->partitions[i].name; i++) {
2648 if (!strcmp(info->partitions[i].name, "firmware"))
2649 {
2650 firmware_partition = &info->partitions[i];
2651 firmware_partition_index = i;
2652 }
2653 }
2654
2655 if (firmware_partition)
2656 {
2657 os_image_partition = &info->partitions[firmware_partition_index];
2658 file_system_partition = &info->partitions[firmware_partition_index + 1];
2659
2660 struct stat kernel;
2661 if (stat(kernel_image, &kernel) < 0)
2662 error(1, errno, "unable to stat file `%s'", kernel_image);
2663
2664 if (kernel.st_size > firmware_partition->size)
2665 error(1, 0, "kernel overflowed firmware partition\n");
2666
2667 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2668 info->partitions[i+1] = info->partitions[i];
2669
2670 file_system_partition->name = "file-system";
2671 file_system_partition->base = firmware_partition->base + kernel.st_size;
2672
2673 /* Align partition start to erase blocks for factory images only */
2674 if (!sysupgrade)
2675 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2676
2677 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2678
2679 os_image_partition->name = "os-image";
2680 os_image_partition->size = kernel.st_size;
2681 }
2682
2683 parts[0] = make_partition_table(info->partitions);
2684 if (info->soft_ver)
2685 parts[1] = make_soft_version_from_string(info->soft_ver);
2686 else
2687 parts[1] = make_soft_version(info, rev);
2688
2689 parts[2] = make_support_list(info);
2690 parts[3] = read_file("os-image", kernel_image, false, NULL);
2691 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2692
2693 /* Some devices need the extra-para partition to accept the firmware */
2694 if (strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2695 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2696 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2697 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2698 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
2699 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2700 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
2701 parts[5] = put_data("extra-para", mdat, 11);
2702 } else if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 || strcasecmp(info->id, "ARCHER-C7-V4") == 0 || strcasecmp(info->id, "ARCHER-C7-V5") == 0) {
2703 const char mdat[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
2704 parts[5] = put_data("extra-para", mdat, 11);
2705 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2706 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00};
2707 parts[5] = put_data("extra-para", mdat, 11);
2708 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0) {
2709 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x00};
2710 parts[5] = put_data("extra-para", mdat, 11);
2711 } else if (strcasecmp(info->id, "EAP245-V3") == 0) {
2712 const char mdat[10] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01};
2713 parts[5] = put_data("extra-para", mdat, 10);
2714 }
2715
2716 size_t len;
2717 void *image;
2718 if (sysupgrade)
2719 image = generate_sysupgrade_image(info, parts, &len);
2720 else
2721 image = generate_factory_image(info, parts, &len);
2722
2723 FILE *file = fopen(output, "wb");
2724 if (!file)
2725 error(1, errno, "unable to open output file");
2726
2727 if (fwrite(image, len, 1, file) != 1)
2728 error(1, 0, "unable to write output file");
2729
2730 fclose(file);
2731
2732 free(image);
2733
2734 for (i = 0; parts[i].name; i++)
2735 free_image_partition(parts[i]);
2736 }
2737
2738 /** Usage output */
2739 static void usage(const char *argv0) {
2740 fprintf(stderr,
2741 "Usage: %s [OPTIONS...]\n"
2742 "\n"
2743 "Options:\n"
2744 " -h show this help\n"
2745 "\n"
2746 "Create a new image:\n"
2747 " -B <board> create image for the board specified with <board>\n"
2748 " -k <file> read kernel image from the file <file>\n"
2749 " -r <file> read rootfs image from the file <file>\n"
2750 " -o <file> write output to the file <file>\n"
2751 " -V <rev> sets the revision number to <rev>\n"
2752 " -j add jffs2 end-of-filesystem markers\n"
2753 " -S create sysupgrade instead of factory image\n"
2754 "Extract an old image:\n"
2755 " -x <file> extract all oem firmware partition\n"
2756 " -d <dir> destination to extract the firmware partition\n"
2757 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2758 argv0
2759 );
2760 };
2761
2762
2763 static struct device_info *find_board(const char *id)
2764 {
2765 struct device_info *board = NULL;
2766
2767 for (board = boards; board->id != NULL; board++)
2768 if (strcasecmp(id, board->id) == 0)
2769 return board;
2770
2771 return NULL;
2772 }
2773
2774 static int add_flash_partition(
2775 struct flash_partition_entry *part_list,
2776 size_t max_entries,
2777 const char *name,
2778 unsigned long base,
2779 unsigned long size)
2780 {
2781 size_t ptr;
2782 /* check if the list has a free entry */
2783 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2784 if (part_list->name == NULL &&
2785 part_list->base == 0 &&
2786 part_list->size == 0)
2787 break;
2788 }
2789
2790 if (ptr == max_entries) {
2791 error(1, 0, "No free flash part entry available.");
2792 }
2793
2794 part_list->name = calloc(1, strlen(name) + 1);
2795 if (!part_list->name) {
2796 error(1, 0, "Unable to allocate memory");
2797 }
2798
2799 memcpy((char *)part_list->name, name, strlen(name));
2800 part_list->base = base;
2801 part_list->size = size;
2802
2803 return 0;
2804 }
2805
2806 /** read the partition table into struct flash_partition_entry */
2807 static int read_partition_table(
2808 FILE *file, long offset,
2809 struct flash_partition_entry *entries, size_t max_entries,
2810 int type)
2811 {
2812 char buf[2048];
2813 char *ptr, *end;
2814 const char *parthdr = NULL;
2815 const char *fwuphdr = "fwup-ptn";
2816 const char *flashhdr = "partition";
2817
2818 /* TODO: search for the partition table */
2819
2820 switch(type) {
2821 case 0:
2822 parthdr = fwuphdr;
2823 break;
2824 case 1:
2825 parthdr = flashhdr;
2826 break;
2827 default:
2828 error(1, 0, "Invalid partition table");
2829 }
2830
2831 if (fseek(file, offset, SEEK_SET) < 0)
2832 error(1, errno, "Can not seek in the firmware");
2833
2834 if (fread(buf, 2048, 1, file) != 1)
2835 error(1, errno, "Can not read fwup-ptn from the firmware");
2836
2837 buf[2047] = '\0';
2838
2839 /* look for the partition header */
2840 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2841 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2842 return 1;
2843 }
2844
2845 ptr = buf;
2846 end = buf + sizeof(buf);
2847 while ((ptr + strlen(parthdr)) < end &&
2848 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2849 char *end_part;
2850 char *end_element;
2851
2852 char name[32] = { 0 };
2853 int name_len = 0;
2854 unsigned long base = 0;
2855 unsigned long size = 0;
2856
2857 end_part = memchr(ptr, '\n', (end - ptr));
2858 if (end_part == NULL) {
2859 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2860 break;
2861 }
2862
2863 for (int i = 0; i <= 4; i++) {
2864 if (end_part <= ptr)
2865 break;
2866
2867 end_element = memchr(ptr, 0x20, (end_part - ptr));
2868 if (end_element == NULL) {
2869 error(1, errno, "Ignoring the rest of the partition entries.");
2870 break;
2871 }
2872
2873 switch (i) {
2874 /* partition header */
2875 case 0:
2876 ptr = end_element + 1;
2877 continue;
2878 /* name */
2879 case 1:
2880 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
2881 strncpy(name, ptr, name_len);
2882 name[name_len] = '\0';
2883 ptr = end_element + 1;
2884 continue;
2885
2886 /* string "base" */
2887 case 2:
2888 ptr = end_element + 1;
2889 continue;
2890
2891 /* actual base */
2892 case 3:
2893 base = strtoul(ptr, NULL, 16);
2894 ptr = end_element + 1;
2895 continue;
2896
2897 /* string "size" */
2898 case 4:
2899 ptr = end_element + 1;
2900 /* actual size. The last element doesn't have a sepeartor */
2901 size = strtoul(ptr, NULL, 16);
2902 /* the part ends with 0x09, 0x0d, 0x0a */
2903 ptr = end_part + 1;
2904 add_flash_partition(entries, max_entries, name, base, size);
2905 continue;
2906 }
2907 }
2908 }
2909
2910 return 0;
2911 }
2912
2913 static void write_partition(
2914 FILE *input_file,
2915 size_t firmware_offset,
2916 struct flash_partition_entry *entry,
2917 FILE *output_file)
2918 {
2919 char buf[4096];
2920 size_t offset;
2921
2922 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
2923
2924 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
2925 if (fread(buf, sizeof(buf), 1, input_file) != 1)
2926 error(1, errno, "Can not read partition from input_file");
2927
2928 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2929 error(1, errno, "Can not write partition to output_file");
2930 }
2931 /* write last chunk smaller than buffer */
2932 if (offset < entry->size) {
2933 offset = entry->size - offset;
2934 if (fread(buf, offset, 1, input_file) != 1)
2935 error(1, errno, "Can not read partition from input_file");
2936 if (fwrite(buf, offset, 1, output_file) != 1)
2937 error(1, errno, "Can not write partition to output_file");
2938 }
2939 }
2940
2941 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
2942 {
2943 FILE *output_file;
2944 char output[PATH_MAX];
2945
2946 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
2947 output_file = fopen(output, "wb+");
2948 if (output_file == NULL) {
2949 error(1, errno, "Can not open output file %s", output);
2950 }
2951
2952 write_partition(input_file, firmware_offset, entry, output_file);
2953
2954 fclose(output_file);
2955
2956 return 0;
2957 }
2958
2959 /** extract all partitions from the firmware file */
2960 static int extract_firmware(const char *input, const char *output_directory)
2961 {
2962 struct flash_partition_entry entries[16] = { 0 };
2963 size_t max_entries = 16;
2964 size_t firmware_offset = 0x1014;
2965 FILE *input_file;
2966
2967 struct stat statbuf;
2968
2969 /* check input file */
2970 if (stat(input, &statbuf)) {
2971 error(1, errno, "Can not read input firmware %s", input);
2972 }
2973
2974 /* check if output directory exists */
2975 if (stat(output_directory, &statbuf)) {
2976 error(1, errno, "Failed to stat output directory %s", output_directory);
2977 }
2978
2979 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
2980 error(1, errno, "Given output directory is not a directory %s", output_directory);
2981 }
2982
2983 input_file = fopen(input, "rb");
2984
2985 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
2986 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2987 }
2988
2989 for (size_t i = 0; i < max_entries; i++) {
2990 if (entries[i].name == NULL &&
2991 entries[i].base == 0 &&
2992 entries[i].size == 0)
2993 continue;
2994
2995 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
2996 }
2997
2998 return 0;
2999 }
3000
3001 static struct flash_partition_entry *find_partition(
3002 struct flash_partition_entry *entries, size_t max_entries,
3003 const char *name, const char *error_msg)
3004 {
3005 for (size_t i = 0; i < max_entries; i++, entries++) {
3006 if (strcmp(entries->name, name) == 0)
3007 return entries;
3008 }
3009
3010 error(1, 0, "%s", error_msg);
3011 return NULL;
3012 }
3013
3014 static void write_ff(FILE *output_file, size_t size)
3015 {
3016 char buf[4096];
3017 size_t offset;
3018
3019 memset(buf, 0xff, sizeof(buf));
3020
3021 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
3022 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3023 error(1, errno, "Can not write 0xff to output_file");
3024 }
3025
3026 /* write last chunk smaller than buffer */
3027 if (offset < size) {
3028 offset = size - offset;
3029 if (fwrite(buf, offset, 1, output_file) != 1)
3030 error(1, errno, "Can not write partition to output_file");
3031 }
3032 }
3033
3034 static void convert_firmware(const char *input, const char *output)
3035 {
3036 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
3037 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
3038 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
3039 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
3040 struct flash_partition_entry *fwup_partition_table = NULL;
3041 size_t firmware_offset = 0x1014;
3042 FILE *input_file, *output_file;
3043
3044 struct stat statbuf;
3045
3046 /* check input file */
3047 if (stat(input, &statbuf)) {
3048 error(1, errno, "Can not read input firmware %s", input);
3049 }
3050
3051 input_file = fopen(input, "rb");
3052 if (!input_file)
3053 error(1, 0, "Can not open input firmware %s", input);
3054
3055 output_file = fopen(output, "wb");
3056 if (!output_file)
3057 error(1, 0, "Can not open output firmware %s", output);
3058
3059 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
3060 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3061 }
3062
3063 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
3064 "os-image", "Error can not find os-image partition (fwup)");
3065 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
3066 "file-system", "Error can not find file-system partition (fwup)");
3067 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
3068 "partition-table", "Error can not find partition-table partition");
3069
3070 /* the flash partition table has a 0x00000004 magic haeder */
3071 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
3072 error(1, 0, "Error can not read the partition table (flash)");
3073
3074 flash_os_image = find_partition(flash, MAX_PARTITIONS,
3075 "os-image", "Error can not find os-image partition (flash)");
3076 flash_file_system = find_partition(flash, MAX_PARTITIONS,
3077 "file-system", "Error can not find file-system partition (flash)");
3078
3079 /* write os_image to 0x0 */
3080 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
3081 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
3082
3083 /* write file-system behind os_image */
3084 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
3085 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
3086 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
3087
3088 fclose(output_file);
3089 fclose(input_file);
3090 }
3091
3092 int main(int argc, char *argv[]) {
3093 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
3094 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
3095 bool add_jffs2_eof = false, sysupgrade = false;
3096 unsigned rev = 0;
3097 struct device_info *info;
3098 set_source_date_epoch();
3099
3100 while (true) {
3101 int c;
3102
3103 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
3104 if (c == -1)
3105 break;
3106
3107 switch (c) {
3108 case 'B':
3109 board = optarg;
3110 break;
3111
3112 case 'k':
3113 kernel_image = optarg;
3114 break;
3115
3116 case 'r':
3117 rootfs_image = optarg;
3118 break;
3119
3120 case 'o':
3121 output = optarg;
3122 break;
3123
3124 case 'V':
3125 sscanf(optarg, "r%u", &rev);
3126 break;
3127
3128 case 'j':
3129 add_jffs2_eof = true;
3130 break;
3131
3132 case 'S':
3133 sysupgrade = true;
3134 break;
3135
3136 case 'h':
3137 usage(argv[0]);
3138 return 0;
3139
3140 case 'd':
3141 output_directory = optarg;
3142 break;
3143
3144 case 'x':
3145 extract_image = optarg;
3146 break;
3147
3148 case 'z':
3149 convert_image = optarg;
3150 break;
3151
3152 default:
3153 usage(argv[0]);
3154 return 1;
3155 }
3156 }
3157
3158 if (extract_image || output_directory) {
3159 if (!extract_image)
3160 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
3161 if (!output_directory)
3162 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
3163 extract_firmware(extract_image, output_directory);
3164 } else if (convert_image) {
3165 if (!output)
3166 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
3167 convert_firmware(convert_image, output);
3168 } else {
3169 if (!board)
3170 error(1, 0, "no board has been specified");
3171 if (!kernel_image)
3172 error(1, 0, "no kernel image has been specified");
3173 if (!rootfs_image)
3174 error(1, 0, "no rootfs image has been specified");
3175 if (!output)
3176 error(1, 0, "no output filename has been specified");
3177
3178 info = find_board(board);
3179
3180 if (info == NULL)
3181 error(1, 0, "unsupported board %s", board);
3182
3183 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
3184 }
3185
3186 return 0;
3187 }