2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
45 #include <arpa/inet.h>
47 #include <sys/types.h>
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
57 #define MAX_PARTITIONS 32
59 /** An image partition table entry */
60 struct image_partition_entry
{
66 /** A flash partition table entry */
67 struct flash_partition_entry
{
73 /** Partition trailing padding definitions
74 * Values 0x00 to 0xff are reserved to indicate the padding value
75 * Values from 0x100 are reserved to indicate other behaviour */
76 enum partition_trail_value
{
79 PART_TRAIL_MAX
= 0xff,
80 PART_TRAIL_NONE
= 0x100
83 /** Firmware layout description */
87 const char *support_list
;
88 enum partition_trail_value part_trail
;
90 uint32_t soft_ver_compat_level
;
91 struct flash_partition_entry partitions
[MAX_PARTITIONS
+1];
92 const char *first_sysupgrade_partition
;
93 const char *last_sysupgrade_partition
;
96 struct __attribute__((__packed__
)) meta_header
{
101 /** The content of the soft-version structure */
102 struct __attribute__((__packed__
)) soft_version
{
104 uint8_t version_major
;
105 uint8_t version_minor
;
106 uint8_t version_patch
;
112 uint32_t compat_level
;
116 static const uint8_t jffs2_eof_mark
[4] = {0xde, 0xad, 0xc0, 0xde};
120 Salt for the MD5 hash
122 Fortunately, TP-LINK seems to use the same salt for most devices which use
123 the new image format.
125 static const uint8_t md5_salt
[16] = {
126 0x7a, 0x2b, 0x15, 0xed,
127 0x9b, 0x98, 0x59, 0x6d,
128 0xe5, 0x04, 0xab, 0x44,
129 0xac, 0x2a, 0x9f, 0x4e,
133 /** Firmware layout table */
134 static struct device_info boards
[] = {
135 /** Firmware layout for the CPE210/220 V1 */
138 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
141 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
142 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
143 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
144 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
145 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
146 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
147 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
152 {"fs-uboot", 0x00000, 0x20000},
153 {"partition-table", 0x20000, 0x02000},
154 {"default-mac", 0x30000, 0x00020},
155 {"product-info", 0x31100, 0x00100},
156 {"signature", 0x32000, 0x00400},
157 {"os-image", 0x40000, 0x300000},
158 {"file-system", 0x340000, 0x470000},
159 {"soft-version", 0x7b0000, 0x00100},
160 {"support-list", 0x7b1000, 0x00400},
161 {"user-config", 0x7c0000, 0x10000},
162 {"default-config", 0x7d0000, 0x10000},
163 {"log", 0x7e0000, 0x10000},
164 {"radio", 0x7f0000, 0x10000},
168 .first_sysupgrade_partition
= "os-image",
169 .last_sysupgrade_partition
= "support-list",
172 /** Firmware layout for the CPE210 V2 */
175 .vendor
= "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
178 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
179 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
180 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
181 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
182 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
183 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
184 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
185 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
186 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
187 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
192 {"fs-uboot", 0x00000, 0x20000},
193 {"partition-table", 0x20000, 0x02000},
194 {"default-mac", 0x30000, 0x00020},
195 {"product-info", 0x31100, 0x00100},
196 {"device-info", 0x31400, 0x00400},
197 {"signature", 0x32000, 0x00400},
198 {"device-id", 0x33000, 0x00100},
199 {"firmware", 0x40000, 0x770000},
200 {"soft-version", 0x7b0000, 0x00100},
201 {"support-list", 0x7b1000, 0x01000},
202 {"user-config", 0x7c0000, 0x10000},
203 {"default-config", 0x7d0000, 0x10000},
204 {"log", 0x7e0000, 0x10000},
205 {"radio", 0x7f0000, 0x10000},
209 .first_sysupgrade_partition
= "os-image",
210 .last_sysupgrade_partition
= "support-list",
213 /** Firmware layout for the CPE210 V3 */
216 .vendor
= "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
219 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
220 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
221 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
222 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
223 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
224 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
225 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
226 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
227 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
228 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
229 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
234 {"fs-uboot", 0x00000, 0x20000},
235 {"partition-table", 0x20000, 0x01000},
236 {"default-mac", 0x30000, 0x00020},
237 {"product-info", 0x31100, 0x00100},
238 {"device-info", 0x31400, 0x00400},
239 {"signature", 0x32000, 0x00400},
240 {"device-id", 0x33000, 0x00100},
241 {"firmware", 0x40000, 0x770000},
242 {"soft-version", 0x7b0000, 0x00100},
243 {"support-list", 0x7b1000, 0x01000},
244 {"user-config", 0x7c0000, 0x10000},
245 {"default-config", 0x7d0000, 0x10000},
246 {"log", 0x7e0000, 0x10000},
247 {"radio", 0x7f0000, 0x10000},
251 .first_sysupgrade_partition
= "os-image",
252 .last_sysupgrade_partition
= "support-list",
255 /** Firmware layout for the CPE220 V2 */
258 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
261 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
262 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
263 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
264 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
265 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
266 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
267 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
268 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
269 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
270 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
275 {"fs-uboot", 0x00000, 0x20000},
276 {"partition-table", 0x20000, 0x02000},
277 {"default-mac", 0x30000, 0x00020},
278 {"product-info", 0x31100, 0x00100},
279 {"signature", 0x32000, 0x00400},
280 {"os-image", 0x40000, 0x300000},
281 {"file-system", 0x340000, 0x470000},
282 {"soft-version", 0x7b0000, 0x00100},
283 {"support-list", 0x7b1000, 0x00400},
284 {"user-config", 0x7c0000, 0x10000},
285 {"default-config", 0x7d0000, 0x10000},
286 {"log", 0x7e0000, 0x10000},
287 {"radio", 0x7f0000, 0x10000},
291 .first_sysupgrade_partition
= "os-image",
292 .last_sysupgrade_partition
= "support-list",
295 /** Firmware layout for the CPE220 V3 */
298 .vendor
= "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
301 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
302 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
303 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
304 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
305 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
306 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
307 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
308 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
309 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
310 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
315 {"fs-uboot", 0x00000, 0x20000},
316 {"partition-table", 0x20000, 0x02000},
317 {"default-mac", 0x30000, 0x00020},
318 {"product-info", 0x31100, 0x00100},
319 {"device-info", 0x31400, 0x00400},
320 {"signature", 0x32000, 0x00400},
321 {"device-id", 0x33000, 0x00100},
322 {"firmware", 0x40000, 0x770000},
323 {"soft-version", 0x7b0000, 0x00100},
324 {"support-list", 0x7b1000, 0x01000},
325 {"user-config", 0x7c0000, 0x10000},
326 {"default-config", 0x7d0000, 0x10000},
327 {"log", 0x7e0000, 0x10000},
328 {"radio", 0x7f0000, 0x10000},
332 .first_sysupgrade_partition
= "os-image",
333 .last_sysupgrade_partition
= "support-list",
336 /** Firmware layout for the CPE510/520 V1 */
339 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
342 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
343 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
344 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
345 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
346 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
347 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
348 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
349 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
354 {"fs-uboot", 0x00000, 0x20000},
355 {"partition-table", 0x20000, 0x02000},
356 {"default-mac", 0x30000, 0x00020},
357 {"product-info", 0x31100, 0x00100},
358 {"signature", 0x32000, 0x00400},
359 {"os-image", 0x40000, 0x300000},
360 {"file-system", 0x340000, 0x470000},
361 {"soft-version", 0x7b0000, 0x00100},
362 {"support-list", 0x7b1000, 0x00400},
363 {"user-config", 0x7c0000, 0x10000},
364 {"default-config", 0x7d0000, 0x10000},
365 {"log", 0x7e0000, 0x10000},
366 {"radio", 0x7f0000, 0x10000},
370 .first_sysupgrade_partition
= "os-image",
371 .last_sysupgrade_partition
= "support-list",
374 /** Firmware layout for the CPE510 V2 */
377 .vendor
= "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
380 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
381 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
382 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
383 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
384 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
385 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
386 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
387 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
388 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
389 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
390 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
391 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
396 {"fs-uboot", 0x00000, 0x20000},
397 {"partition-table", 0x20000, 0x02000},
398 {"default-mac", 0x30000, 0x00020},
399 {"product-info", 0x31100, 0x00100},
400 {"signature", 0x32000, 0x00400},
401 {"os-image", 0x40000, 0x300000},
402 {"file-system", 0x340000, 0x470000},
403 {"soft-version", 0x7b0000, 0x00100},
404 {"support-list", 0x7b1000, 0x00400},
405 {"user-config", 0x7c0000, 0x10000},
406 {"default-config", 0x7d0000, 0x10000},
407 {"log", 0x7e0000, 0x10000},
408 {"radio", 0x7f0000, 0x10000},
412 .first_sysupgrade_partition
= "os-image",
413 .last_sysupgrade_partition
= "support-list",
416 /** Firmware layout for the CPE510 V3 */
419 .vendor
= "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
422 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
423 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
424 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
425 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
426 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
427 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
428 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
429 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
430 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
431 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
432 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
433 "CPE510(TP-LINK|US|N300-5):3.0\r\n"
434 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n"
435 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
436 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
441 {"fs-uboot", 0x00000, 0x20000},
442 {"partition-table", 0x20000, 0x02000},
443 {"default-mac", 0x30000, 0x00020},
444 {"product-info", 0x31100, 0x00100},
445 {"signature", 0x32000, 0x00400},
446 {"os-image", 0x40000, 0x300000},
447 {"file-system", 0x340000, 0x470000},
448 {"soft-version", 0x7b0000, 0x00100},
449 {"support-list", 0x7b1000, 0x00400},
450 {"user-config", 0x7c0000, 0x10000},
451 {"default-config", 0x7d0000, 0x10000},
452 {"log", 0x7e0000, 0x10000},
453 {"radio", 0x7f0000, 0x10000},
457 .first_sysupgrade_partition
= "os-image",
458 .last_sysupgrade_partition
= "support-list",
461 /** Firmware layout for the CPE610V1 */
464 .vendor
= "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
467 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
468 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
469 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
470 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
471 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
472 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
473 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
474 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
475 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
476 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
481 {"fs-uboot", 0x00000, 0x20000},
482 {"partition-table", 0x20000, 0x02000},
483 {"default-mac", 0x30000, 0x00020},
484 {"product-info", 0x31100, 0x00100},
485 {"signature", 0x32000, 0x00400},
486 {"os-image", 0x40000, 0x300000},
487 {"file-system", 0x340000, 0x470000},
488 {"soft-version", 0x7b0000, 0x00100},
489 {"support-list", 0x7b1000, 0x00400},
490 {"user-config", 0x7c0000, 0x10000},
491 {"default-config", 0x7d0000, 0x10000},
492 {"log", 0x7e0000, 0x10000},
493 {"radio", 0x7f0000, 0x10000},
497 .first_sysupgrade_partition
= "os-image",
498 .last_sysupgrade_partition
= "support-list",
501 /** Firmware layout for the CPE610V2 */
504 .vendor
= "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
507 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
508 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
509 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
510 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
511 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
512 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
513 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
514 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
515 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
516 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
521 {"fs-uboot", 0x00000, 0x20000},
522 {"partition-table", 0x20000, 0x02000},
523 {"default-mac", 0x30000, 0x00020},
524 {"product-info", 0x31100, 0x00100},
525 {"signature", 0x32000, 0x00400},
526 {"os-image", 0x40000, 0x300000},
527 {"file-system", 0x340000, 0x470000},
528 {"soft-version", 0x7b0000, 0x00100},
529 {"support-list", 0x7b1000, 0x00400},
530 {"user-config", 0x7c0000, 0x10000},
531 {"default-config", 0x7d0000, 0x10000},
532 {"log", 0x7e0000, 0x10000},
533 {"radio", 0x7f0000, 0x10000},
537 .first_sysupgrade_partition
= "os-image",
538 .last_sysupgrade_partition
= "support-list",
543 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
546 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
547 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
548 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
553 {"fs-uboot", 0x00000, 0x20000},
554 {"partition-table", 0x20000, 0x02000},
555 {"default-mac", 0x30000, 0x00020},
556 {"product-info", 0x31100, 0x00100},
557 {"signature", 0x32000, 0x00400},
558 {"os-image", 0x40000, 0x300000},
559 {"file-system", 0x340000, 0x470000},
560 {"soft-version", 0x7b0000, 0x00100},
561 {"support-list", 0x7b1000, 0x00400},
562 {"user-config", 0x7c0000, 0x10000},
563 {"default-config", 0x7d0000, 0x10000},
564 {"log", 0x7e0000, 0x10000},
565 {"radio", 0x7f0000, 0x10000},
569 .first_sysupgrade_partition
= "os-image",
570 .last_sysupgrade_partition
= "support-list",
575 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
578 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
579 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
580 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
585 {"fs-uboot", 0x00000, 0x20000},
586 {"partition-table", 0x20000, 0x02000},
587 {"default-mac", 0x30000, 0x00020},
588 {"product-info", 0x31100, 0x00100},
589 {"signature", 0x32000, 0x00400},
590 {"os-image", 0x40000, 0x300000},
591 {"file-system", 0x340000, 0x470000},
592 {"soft-version", 0x7b0000, 0x00100},
593 {"support-list", 0x7b1000, 0x00400},
594 {"user-config", 0x7c0000, 0x10000},
595 {"default-config", 0x7d0000, 0x10000},
596 {"log", 0x7e0000, 0x10000},
597 {"radio", 0x7f0000, 0x10000},
601 .first_sysupgrade_partition
= "os-image",
602 .last_sysupgrade_partition
= "support-list",
607 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
610 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
611 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
612 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
613 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
618 {"fs-uboot", 0x00000, 0x20000},
619 {"partition-table", 0x20000, 0x02000},
620 {"default-mac", 0x30000, 0x00020},
621 {"product-info", 0x31100, 0x00100},
622 {"signature", 0x32000, 0x00400},
623 {"os-image", 0x40000, 0x300000},
624 {"file-system", 0x340000, 0x470000},
625 {"soft-version", 0x7b0000, 0x00100},
626 {"support-list", 0x7b1000, 0x00400},
627 {"user-config", 0x7c0000, 0x10000},
628 {"default-config", 0x7d0000, 0x10000},
629 {"log", 0x7e0000, 0x10000},
630 {"radio", 0x7f0000, 0x10000},
634 .first_sysupgrade_partition
= "os-image",
635 .last_sysupgrade_partition
= "support-list",
640 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
643 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
644 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
645 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
646 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
651 {"fs-uboot", 0x00000, 0x20000},
652 {"partition-table", 0x20000, 0x02000},
653 {"default-mac", 0x30000, 0x00020},
654 {"product-info", 0x31100, 0x00100},
655 {"signature", 0x32000, 0x00400},
656 {"os-image", 0x40000, 0x300000},
657 {"file-system", 0x340000, 0x470000},
658 {"soft-version", 0x7b0000, 0x00100},
659 {"support-list", 0x7b1000, 0x00400},
660 {"user-config", 0x7c0000, 0x10000},
661 {"default-config", 0x7d0000, 0x10000},
662 {"log", 0x7e0000, 0x10000},
663 {"radio", 0x7f0000, 0x10000},
667 .first_sysupgrade_partition
= "os-image",
668 .last_sysupgrade_partition
= "support-list",
671 /** Firmware layout for the AD7200 */
677 "{product_name:Talon AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
682 {"SBL1", 0x00000, 0x20000},
683 {"MIBIB", 0x20000, 0x20000},
684 {"SBL2", 0x40000, 0x20000},
685 {"SBL3", 0x60000, 0x30000},
686 {"DDRCONFIG", 0x90000, 0x10000},
687 {"SSD", 0xa0000, 0x10000},
688 {"TZ", 0xb0000, 0x30000},
689 {"RPM", 0xe0000, 0x20000},
690 {"fs-uboot", 0x100000, 0x70000},
691 {"uboot-env", 0x170000, 0x40000},
692 {"radio", 0x1b0000, 0x40000},
693 {"os-image", 0x1f0000, 0x400000},
694 {"file-system", 0x5f0000, 0x1900000},
695 {"default-mac", 0x1ef0000, 0x00200},
696 {"pin", 0x1ef0200, 0x00200},
697 {"device-id", 0x1ef0400, 0x00200},
698 {"product-info", 0x1ef0600, 0x0fa00},
699 {"partition-table", 0x1f00000, 0x10000},
700 {"soft-version", 0x1f10000, 0x10000},
701 {"support-list", 0x1f20000, 0x10000},
702 {"profile", 0x1f30000, 0x10000},
703 {"default-config", 0x1f40000, 0x10000},
704 {"user-config", 0x1f50000, 0x40000},
705 {"qos-db", 0x1f90000, 0x40000},
706 {"usb-config", 0x1fd0000, 0x10000},
707 {"log", 0x1fe0000, 0x20000},
711 .first_sysupgrade_partition
= "os-image",
712 .last_sysupgrade_partition
= "file-system"
715 /** Firmware layout for the C2600 */
721 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
726 We use a bigger os-image partition than the stock images (and thus
727 smaller file-system), as our kernel doesn't fit in the stock firmware's
728 2 MB os-image since kernel 4.14.
731 {"SBL1", 0x00000, 0x20000},
732 {"MIBIB", 0x20000, 0x20000},
733 {"SBL2", 0x40000, 0x20000},
734 {"SBL3", 0x60000, 0x30000},
735 {"DDRCONFIG", 0x90000, 0x10000},
736 {"SSD", 0xa0000, 0x10000},
737 {"TZ", 0xb0000, 0x30000},
738 {"RPM", 0xe0000, 0x20000},
739 {"fs-uboot", 0x100000, 0x70000},
740 {"uboot-env", 0x170000, 0x40000},
741 {"radio", 0x1b0000, 0x40000},
742 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
743 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
744 {"default-mac", 0x1ef0000, 0x00200},
745 {"pin", 0x1ef0200, 0x00200},
746 {"product-info", 0x1ef0400, 0x0fc00},
747 {"partition-table", 0x1f00000, 0x10000},
748 {"soft-version", 0x1f10000, 0x10000},
749 {"support-list", 0x1f20000, 0x10000},
750 {"profile", 0x1f30000, 0x10000},
751 {"default-config", 0x1f40000, 0x10000},
752 {"user-config", 0x1f50000, 0x40000},
753 {"qos-db", 0x1f90000, 0x40000},
754 {"usb-config", 0x1fd0000, 0x10000},
755 {"log", 0x1fe0000, 0x20000},
759 .first_sysupgrade_partition
= "os-image",
760 .last_sysupgrade_partition
= "file-system"
763 /** Firmware layout for the A7-V5 */
765 .id
= "ARCHER-A7-V5",
768 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
769 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
770 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
771 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
772 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
773 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
775 .soft_ver
= "soft_ver:1.0.0\n",
777 /* We're using a dynamic kernel/rootfs split here */
779 {"factory-boot", 0x00000, 0x20000},
780 {"fs-uboot", 0x20000, 0x20000},
781 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
782 /* Stock: name file-system base 0x160000 size 0xda0000 */
783 {"default-mac", 0xf40000, 0x00200},
784 {"pin", 0xf40200, 0x00200},
785 {"device-id", 0xf40400, 0x00100},
786 {"product-info", 0xf40500, 0x0fb00},
787 {"soft-version", 0xf50000, 0x00100},
788 {"extra-para", 0xf51000, 0x01000},
789 {"support-list", 0xf52000, 0x0a000},
790 {"profile", 0xf5c000, 0x04000},
791 {"default-config", 0xf60000, 0x10000},
792 {"user-config", 0xf70000, 0x40000},
793 {"certificate", 0xfb0000, 0x10000},
794 {"partition-table", 0xfc0000, 0x10000},
795 {"log", 0xfd0000, 0x20000},
796 {"radio", 0xff0000, 0x10000},
800 .first_sysupgrade_partition
= "os-image",
801 .last_sysupgrade_partition
= "file-system",
804 /** Firmware layout for the C2v3 */
806 .id
= "ARCHER-C2-V3",
809 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
810 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
811 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
813 .soft_ver
= "soft_ver:3.0.1\n",
815 /** We're using a dynamic kernel/rootfs split here */
818 {"factory-boot", 0x00000, 0x20000},
819 {"fs-uboot", 0x20000, 0x10000},
820 {"firmware", 0x30000, 0x7a0000},
821 {"user-config", 0x7d0000, 0x04000},
822 {"default-mac", 0x7e0000, 0x00100},
823 {"device-id", 0x7e0100, 0x00100},
824 {"extra-para", 0x7e0200, 0x00100},
825 {"pin", 0x7e0300, 0x00100},
826 {"support-list", 0x7e0400, 0x00400},
827 {"soft-version", 0x7e0800, 0x00400},
828 {"product-info", 0x7e0c00, 0x01400},
829 {"partition-table", 0x7e2000, 0x01000},
830 {"profile", 0x7e3000, 0x01000},
831 {"default-config", 0x7e4000, 0x04000},
832 {"merge-config", 0x7ec000, 0x02000},
833 {"qos-db", 0x7ee000, 0x02000},
834 {"radio", 0x7f0000, 0x10000},
838 .first_sysupgrade_partition
= "os-image",
839 .last_sysupgrade_partition
= "file-system",
842 /** Firmware layout for the C25v1 */
844 .id
= "ARCHER-C25-V1",
847 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
848 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
849 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
851 .soft_ver
= "soft_ver:1.0.0\n",
853 /* We're using a dynamic kernel/rootfs split here */
855 {"factory-boot", 0x00000, 0x20000},
856 {"fs-uboot", 0x20000, 0x10000},
857 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
858 /* Stock: name file-system base 0x130000 size 0x6a0000 */
859 {"user-config", 0x7d0000, 0x04000},
860 {"default-mac", 0x7e0000, 0x00100},
861 {"device-id", 0x7e0100, 0x00100},
862 {"extra-para", 0x7e0200, 0x00100},
863 {"pin", 0x7e0300, 0x00100},
864 {"support-list", 0x7e0400, 0x00400},
865 {"soft-version", 0x7e0800, 0x00400},
866 {"product-info", 0x7e0c00, 0x01400},
867 {"partition-table", 0x7e2000, 0x01000},
868 {"profile", 0x7e3000, 0x01000},
869 {"default-config", 0x7e4000, 0x04000},
870 {"merge-config", 0x7ec000, 0x02000},
871 {"qos-db", 0x7ee000, 0x02000},
872 {"radio", 0x7f0000, 0x10000},
876 .first_sysupgrade_partition
= "os-image",
877 .last_sysupgrade_partition
= "file-system",
880 /** Firmware layout for the C58v1 */
882 .id
= "ARCHER-C58-V1",
886 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
887 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
888 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
890 .soft_ver
= "soft_ver:1.0.0\n",
893 {"fs-uboot", 0x00000, 0x10000},
894 {"default-mac", 0x10000, 0x00200},
895 {"pin", 0x10200, 0x00200},
896 {"product-info", 0x10400, 0x00100},
897 {"partition-table", 0x10500, 0x00800},
898 {"soft-version", 0x11300, 0x00200},
899 {"support-list", 0x11500, 0x00100},
900 {"device-id", 0x11600, 0x00100},
901 {"profile", 0x11700, 0x03900},
902 {"default-config", 0x15000, 0x04000},
903 {"user-config", 0x19000, 0x04000},
904 {"firmware", 0x20000, 0x7c8000},
905 {"certyficate", 0x7e8000, 0x08000},
906 {"radio", 0x7f0000, 0x10000},
910 .first_sysupgrade_partition
= "os-image",
911 .last_sysupgrade_partition
= "file-system",
914 /** Firmware layout for the C59v1 */
916 .id
= "ARCHER-C59-V1",
920 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
921 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
922 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
923 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
925 .soft_ver
= "soft_ver:1.0.0\n",
927 /* We're using a dynamic kernel/rootfs split here */
929 {"fs-uboot", 0x00000, 0x10000},
930 {"default-mac", 0x10000, 0x00200},
931 {"pin", 0x10200, 0x00200},
932 {"device-id", 0x10400, 0x00100},
933 {"product-info", 0x10500, 0x0fb00},
934 {"firmware", 0x20000, 0xe30000},
935 {"partition-table", 0xe50000, 0x10000},
936 {"soft-version", 0xe60000, 0x10000},
937 {"support-list", 0xe70000, 0x10000},
938 {"profile", 0xe80000, 0x10000},
939 {"default-config", 0xe90000, 0x10000},
940 {"user-config", 0xea0000, 0x40000},
941 {"usb-config", 0xee0000, 0x10000},
942 {"certificate", 0xef0000, 0x10000},
943 {"qos-db", 0xf00000, 0x40000},
944 {"log", 0xfe0000, 0x10000},
945 {"radio", 0xff0000, 0x10000},
949 .first_sysupgrade_partition
= "os-image",
950 .last_sysupgrade_partition
= "file-system",
953 /** Firmware layout for the C59v2 */
955 .id
= "ARCHER-C59-V2",
959 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
960 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
961 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
963 .soft_ver
= "soft_ver:2.0.0 Build 20161206 rel.7303\n",
965 /** We're using a dynamic kernel/rootfs split here */
967 {"factory-boot", 0x00000, 0x20000},
968 {"fs-uboot", 0x20000, 0x10000},
969 {"default-mac", 0x30000, 0x00200},
970 {"pin", 0x30200, 0x00200},
971 {"device-id", 0x30400, 0x00100},
972 {"product-info", 0x30500, 0x0fb00},
973 {"firmware", 0x40000, 0xe10000},
974 {"partition-table", 0xe50000, 0x10000},
975 {"soft-version", 0xe60000, 0x10000},
976 {"support-list", 0xe70000, 0x10000},
977 {"profile", 0xe80000, 0x10000},
978 {"default-config", 0xe90000, 0x10000},
979 {"user-config", 0xea0000, 0x40000},
980 {"usb-config", 0xee0000, 0x10000},
981 {"certificate", 0xef0000, 0x10000},
982 {"extra-para", 0xf00000, 0x10000},
983 {"qos-db", 0xf10000, 0x30000},
984 {"log", 0xfe0000, 0x10000},
985 {"radio", 0xff0000, 0x10000},
989 .first_sysupgrade_partition
= "os-image",
990 .last_sysupgrade_partition
= "file-system",
993 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
995 .id
= "ARCHER-C6-V2",
999 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
1000 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
1001 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
1003 .soft_ver
= "soft_ver:1.9.1\n",
1006 {"fs-uboot", 0x00000, 0x20000},
1007 {"default-mac", 0x20000, 0x00200},
1008 {"pin", 0x20200, 0x00100},
1009 {"product-info", 0x20300, 0x00200},
1010 {"device-id", 0x20500, 0x0fb00},
1011 {"firmware", 0x30000, 0x7a9400},
1012 {"soft-version", 0x7d9400, 0x00100},
1013 {"extra-para", 0x7d9500, 0x00100},
1014 {"support-list", 0x7d9600, 0x00200},
1015 {"profile", 0x7d9800, 0x03000},
1016 {"default-config", 0x7dc800, 0x03000},
1017 {"partition-table", 0x7df800, 0x00800},
1018 {"user-config", 0x7e0000, 0x0c000},
1019 {"certificate", 0x7ec000, 0x04000},
1020 {"radio", 0x7f0000, 0x10000},
1024 .first_sysupgrade_partition
= "os-image",
1025 .last_sysupgrade_partition
= "file-system",
1028 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
1030 .id
= "ARCHER-C6-V2-US",
1034 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
1035 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
1036 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
1038 .soft_ver
= "soft_ver:1.9.1\n",
1041 {"factory-boot", 0x00000, 0x20000},
1042 {"default-mac", 0x20000, 0x00200},
1043 {"pin", 0x20200, 0x00100},
1044 {"product-info", 0x20300, 0x00200},
1045 {"device-id", 0x20500, 0x0fb00},
1046 {"fs-uboot", 0x30000, 0x20000},
1047 {"firmware", 0x50000, 0xf89400},
1048 {"soft-version", 0xfd9400, 0x00100},
1049 {"extra-para", 0xfd9500, 0x00100},
1050 {"support-list", 0xfd9600, 0x00200},
1051 {"profile", 0xfd9800, 0x03000},
1052 {"default-config", 0xfdc800, 0x03000},
1053 {"partition-table", 0xfdf800, 0x00800},
1054 {"user-config", 0xfe0000, 0x0c000},
1055 {"certificate", 0xfec000, 0x04000},
1056 {"radio", 0xff0000, 0x10000},
1059 .first_sysupgrade_partition
= "os-image",
1060 .last_sysupgrade_partition
= "file-system",
1063 /** Firmware layout for the C60v1 */
1065 .id
= "ARCHER-C60-V1",
1069 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1070 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1071 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1073 .soft_ver
= "soft_ver:1.0.0\n",
1076 {"fs-uboot", 0x00000, 0x10000},
1077 {"default-mac", 0x10000, 0x00200},
1078 {"pin", 0x10200, 0x00200},
1079 {"product-info", 0x10400, 0x00100},
1080 {"partition-table", 0x10500, 0x00800},
1081 {"soft-version", 0x11300, 0x00200},
1082 {"support-list", 0x11500, 0x00100},
1083 {"device-id", 0x11600, 0x00100},
1084 {"profile", 0x11700, 0x03900},
1085 {"default-config", 0x15000, 0x04000},
1086 {"user-config", 0x19000, 0x04000},
1087 {"firmware", 0x20000, 0x7c8000},
1088 {"certyficate", 0x7e8000, 0x08000},
1089 {"radio", 0x7f0000, 0x10000},
1093 .first_sysupgrade_partition
= "os-image",
1094 .last_sysupgrade_partition
= "file-system",
1097 /** Firmware layout for the C60v2 */
1099 .id
= "ARCHER-C60-V2",
1103 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1104 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1105 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1107 .soft_ver
= "soft_ver:2.0.0\n",
1110 {"factory-boot", 0x00000, 0x1fb00},
1111 {"default-mac", 0x1fb00, 0x00200},
1112 {"pin", 0x1fd00, 0x00100},
1113 {"product-info", 0x1fe00, 0x00100},
1114 {"device-id", 0x1ff00, 0x00100},
1115 {"fs-uboot", 0x20000, 0x10000},
1116 {"firmware", 0x30000, 0x7a0000},
1117 {"soft-version", 0x7d9500, 0x00100},
1118 {"support-list", 0x7d9600, 0x00100},
1119 {"extra-para", 0x7d9700, 0x00100},
1120 {"profile", 0x7d9800, 0x03000},
1121 {"default-config", 0x7dc800, 0x03000},
1122 {"partition-table", 0x7df800, 0x00800},
1123 {"user-config", 0x7e0000, 0x0c000},
1124 {"certificate", 0x7ec000, 0x04000},
1125 {"radio", 0x7f0000, 0x10000},
1129 .first_sysupgrade_partition
= "os-image",
1130 .last_sysupgrade_partition
= "file-system",
1133 /** Firmware layout for the C60v3 */
1135 .id
= "ARCHER-C60-V3",
1139 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1140 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1141 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1143 .soft_ver
= "soft_ver:3.0.0\n",
1146 {"factory-boot", 0x00000, 0x1fb00},
1147 {"default-mac", 0x1fb00, 0x00200},
1148 {"pin", 0x1fd00, 0x00100},
1149 {"product-info", 0x1fe00, 0x00100},
1150 {"device-id", 0x1ff00, 0x00100},
1151 {"fs-uboot", 0x20000, 0x10000},
1152 {"firmware", 0x30000, 0x7a0000},
1153 {"soft-version", 0x7d9500, 0x00100},
1154 {"support-list", 0x7d9600, 0x00100},
1155 {"extra-para", 0x7d9700, 0x00100},
1156 {"profile", 0x7d9800, 0x03000},
1157 {"default-config", 0x7dc800, 0x03000},
1158 {"partition-table", 0x7df800, 0x00800},
1159 {"user-config", 0x7e0000, 0x0c000},
1160 {"certificate", 0x7ec000, 0x04000},
1161 {"radio", 0x7f0000, 0x10000},
1165 .first_sysupgrade_partition
= "os-image",
1166 .last_sysupgrade_partition
= "file-system",
1169 /** Firmware layout for the C5 */
1171 .id
= "ARCHER-C5-V2",
1175 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1176 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1177 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1182 {"fs-uboot", 0x00000, 0x40000},
1183 {"os-image", 0x40000, 0x200000},
1184 {"file-system", 0x240000, 0xc00000},
1185 {"default-mac", 0xe40000, 0x00200},
1186 {"pin", 0xe40200, 0x00200},
1187 {"product-info", 0xe40400, 0x00200},
1188 {"partition-table", 0xe50000, 0x10000},
1189 {"soft-version", 0xe60000, 0x00200},
1190 {"support-list", 0xe61000, 0x0f000},
1191 {"profile", 0xe70000, 0x10000},
1192 {"default-config", 0xe80000, 0x10000},
1193 {"user-config", 0xe90000, 0x50000},
1194 {"log", 0xee0000, 0x100000},
1195 {"radio_bk", 0xfe0000, 0x10000},
1196 {"radio", 0xff0000, 0x10000},
1200 .first_sysupgrade_partition
= "os-image",
1201 .last_sysupgrade_partition
= "file-system"
1204 /** Firmware layout for the C7 */
1206 .id
= "ARCHER-C7-V4",
1209 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1210 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1211 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1212 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1213 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1214 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1215 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1216 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1217 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1218 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1220 .soft_ver
= "soft_ver:1.0.0\n",
1222 /* We're using a dynamic kernel/rootfs split here */
1224 {"factory-boot", 0x00000, 0x20000},
1225 {"fs-uboot", 0x20000, 0x20000},
1226 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1227 /* Stock: name file-system base 0x160000 size 0xda0000 */
1228 {"default-mac", 0xf00000, 0x00200},
1229 {"pin", 0xf00200, 0x00200},
1230 {"device-id", 0xf00400, 0x00100},
1231 {"product-info", 0xf00500, 0x0fb00},
1232 {"soft-version", 0xf10000, 0x00100},
1233 {"extra-para", 0xf11000, 0x01000},
1234 {"support-list", 0xf12000, 0x0a000},
1235 {"profile", 0xf1c000, 0x04000},
1236 {"default-config", 0xf20000, 0x10000},
1237 {"user-config", 0xf30000, 0x40000},
1238 {"qos-db", 0xf70000, 0x40000},
1239 {"certificate", 0xfb0000, 0x10000},
1240 {"partition-table", 0xfc0000, 0x10000},
1241 {"log", 0xfd0000, 0x20000},
1242 {"radio", 0xff0000, 0x10000},
1246 .first_sysupgrade_partition
= "os-image",
1247 .last_sysupgrade_partition
= "file-system",
1250 /** Firmware layout for the C7 v5*/
1252 .id
= "ARCHER-C7-V5",
1255 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1256 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1257 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1258 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1259 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1260 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1261 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1262 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1265 .soft_ver
= "soft_ver:7.0.0\n",
1267 /* We're using a dynamic kernel/rootfs split here */
1269 {"factory-boot", 0x00000, 0x20000},
1270 {"fs-uboot", 0x20000, 0x20000},
1271 {"partition-table", 0x40000, 0x10000},
1272 {"radio", 0x50000, 0x10000},
1273 {"default-mac", 0x60000, 0x00200},
1274 {"pin", 0x60200, 0x00200},
1275 {"device-id", 0x60400, 0x00100},
1276 {"product-info", 0x60500, 0x0fb00},
1277 {"soft-version", 0x70000, 0x01000},
1278 {"extra-para", 0x71000, 0x01000},
1279 {"support-list", 0x72000, 0x0a000},
1280 {"profile", 0x7c000, 0x04000},
1281 {"user-config", 0x80000, 0x40000},
1284 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1285 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1287 {"log", 0xfc0000, 0x20000},
1288 {"certificate", 0xfe0000, 0x10000},
1289 {"default-config", 0xff0000, 0x10000},
1294 .first_sysupgrade_partition
= "os-image",
1295 .last_sysupgrade_partition
= "file-system",
1298 /** Firmware layout for the C9 */
1304 "{product_name:ArcherC9,"
1305 "product_ver:1.0.0,"
1306 "special_id:00000000}\n",
1311 {"fs-uboot", 0x00000, 0x40000},
1312 {"os-image", 0x40000, 0x200000},
1313 {"file-system", 0x240000, 0xc00000},
1314 {"default-mac", 0xe40000, 0x00200},
1315 {"pin", 0xe40200, 0x00200},
1316 {"product-info", 0xe40400, 0x00200},
1317 {"partition-table", 0xe50000, 0x10000},
1318 {"soft-version", 0xe60000, 0x00200},
1319 {"support-list", 0xe61000, 0x0f000},
1320 {"profile", 0xe70000, 0x10000},
1321 {"default-config", 0xe80000, 0x10000},
1322 {"user-config", 0xe90000, 0x50000},
1323 {"log", 0xee0000, 0x100000},
1324 {"radio_bk", 0xfe0000, 0x10000},
1325 {"radio", 0xff0000, 0x10000},
1329 .first_sysupgrade_partition
= "os-image",
1330 .last_sysupgrade_partition
= "file-system"
1333 /** Firmware layout for the EAP120 */
1336 .vendor
= "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1339 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1344 {"fs-uboot", 0x00000, 0x20000},
1345 {"partition-table", 0x20000, 0x02000},
1346 {"default-mac", 0x30000, 0x00020},
1347 {"support-list", 0x31000, 0x00100},
1348 {"product-info", 0x31100, 0x00100},
1349 {"soft-version", 0x32000, 0x00100},
1350 {"os-image", 0x40000, 0x180000},
1351 {"file-system", 0x1c0000, 0x600000},
1352 {"user-config", 0x7c0000, 0x10000},
1353 {"backup-config", 0x7d0000, 0x10000},
1354 {"log", 0x7e0000, 0x10000},
1355 {"radio", 0x7f0000, 0x10000},
1359 .first_sysupgrade_partition
= "os-image",
1360 .last_sysupgrade_partition
= "file-system"
1363 /** Firmware layout for the EAP225-Outdoor v1 */
1365 .id
= "EAP225-OUTDOOR-V1",
1368 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1369 .part_trail
= PART_TRAIL_NONE
,
1371 .soft_ver_compat_level
= 1,
1374 {"fs-uboot", 0x00000, 0x20000},
1375 {"partition-table", 0x20000, 0x02000},
1376 {"default-mac", 0x30000, 0x01000},
1377 {"support-list", 0x31000, 0x00100},
1378 {"product-info", 0x31100, 0x00400},
1379 {"soft-version", 0x32000, 0x00100},
1380 {"firmware", 0x40000, 0xd80000},
1381 {"user-config", 0xdc0000, 0x30000},
1382 {"mutil-log", 0xf30000, 0x80000},
1383 {"oops", 0xfb0000, 0x40000},
1384 {"radio", 0xff0000, 0x10000},
1388 .first_sysupgrade_partition
= "os-image",
1389 .last_sysupgrade_partition
= "file-system"
1392 /** Firmware layout for the EAP225 v3 */
1397 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n",
1398 .part_trail
= PART_TRAIL_NONE
,
1400 .soft_ver_compat_level
= 1,
1403 {"fs-uboot", 0x00000, 0x20000},
1404 {"partition-table", 0x20000, 0x02000},
1405 {"default-mac", 0x30000, 0x01000},
1406 {"support-list", 0x31000, 0x00100},
1407 {"product-info", 0x31100, 0x00400},
1408 {"soft-version", 0x32000, 0x00100},
1409 {"firmware", 0x40000, 0xd80000},
1410 {"user-config", 0xdc0000, 0x30000},
1411 {"mutil-log", 0xf30000, 0x80000},
1412 {"oops", 0xfb0000, 0x40000},
1413 {"radio", 0xff0000, 0x10000},
1417 .first_sysupgrade_partition
= "os-image",
1418 .last_sysupgrade_partition
= "file-system"
1421 /** Firmware layout for the EAP225-Wall v2 */
1423 .id
= "EAP225-WALL-V2",
1426 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1427 .part_trail
= PART_TRAIL_NONE
,
1429 .soft_ver_compat_level
= 1,
1432 {"fs-uboot", 0x00000, 0x20000},
1433 {"partition-table", 0x20000, 0x02000},
1434 {"default-mac", 0x30000, 0x01000},
1435 {"support-list", 0x31000, 0x00100},
1436 {"product-info", 0x31100, 0x00400},
1437 {"soft-version", 0x32000, 0x00100},
1438 {"firmware", 0x40000, 0xd80000},
1439 {"user-config", 0xdc0000, 0x30000},
1440 {"mutil-log", 0xf30000, 0x80000},
1441 {"oops", 0xfb0000, 0x40000},
1442 {"radio", 0xff0000, 0x10000},
1446 .first_sysupgrade_partition
= "os-image",
1447 .last_sysupgrade_partition
= "file-system"
1450 /** Firmware layout for the EAP235-Wall v1 */
1452 .id
= "EAP235-WALL-V1",
1455 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
1456 .part_trail
= PART_TRAIL_NONE
,
1458 .soft_ver_compat_level
= 1,
1461 {"fs-uboot", 0x00000, 0x80000},
1462 {"partition-table", 0x80000, 0x02000},
1463 {"default-mac", 0x90000, 0x01000},
1464 {"support-list", 0x91000, 0x00100},
1465 {"product-info", 0x91100, 0x00400},
1466 {"soft-version", 0x92000, 0x00100},
1467 {"firmware", 0xa0000, 0xd20000},
1468 {"user-config", 0xdc0000, 0x30000},
1469 {"mutil-log", 0xf30000, 0x80000},
1470 {"oops", 0xfb0000, 0x40000},
1471 {"radio", 0xff0000, 0x10000},
1475 .first_sysupgrade_partition
= "os-image",
1476 .last_sysupgrade_partition
= "file-system"
1479 /** Firmware layout for the EAP245 v1 */
1484 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1485 .part_trail
= PART_TRAIL_NONE
,
1489 {"fs-uboot", 0x00000, 0x20000},
1490 {"partition-table", 0x20000, 0x02000},
1491 {"default-mac", 0x30000, 0x01000},
1492 {"support-list", 0x31000, 0x00100},
1493 {"product-info", 0x31100, 0x00400},
1494 {"soft-version", 0x32000, 0x00100},
1495 {"firmware", 0x40000, 0xd80000},
1496 {"user-config", 0xdc0000, 0x30000},
1497 {"radio", 0xff0000, 0x10000},
1501 .first_sysupgrade_partition
= "os-image",
1502 .last_sysupgrade_partition
= "file-system"
1505 /** Firmware layout for the EAP245 v3 */
1510 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n",
1511 .part_trail
= PART_TRAIL_NONE
,
1513 .soft_ver_compat_level
= 1,
1515 /** Firmware partition with dynamic kernel/rootfs split */
1517 {"factroy-boot", 0x00000, 0x40000},
1518 {"fs-uboot", 0x40000, 0x40000},
1519 {"partition-table", 0x80000, 0x10000},
1520 {"default-mac", 0x90000, 0x01000},
1521 {"support-list", 0x91000, 0x00100},
1522 {"product-info", 0x91100, 0x00400},
1523 {"soft-version", 0x92000, 0x00100},
1524 {"radio", 0xa0000, 0x10000},
1525 {"extra-para", 0xb0000, 0x10000},
1526 {"firmware", 0xc0000, 0xe40000},
1527 {"config", 0xf00000, 0x30000},
1528 {"mutil-log", 0xf30000, 0x80000},
1529 {"oops", 0xfb0000, 0x40000},
1533 .first_sysupgrade_partition
= "os-image",
1534 .last_sysupgrade_partition
= "file-system"
1537 /** Firmware layout for the TL-WA850RE v2 */
1539 .id
= "TLWA850REV2",
1543 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1544 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1545 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1546 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1547 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1548 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1549 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1550 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1551 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1552 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1557 576KB were moved from file-system to os-image
1558 in comparison to the stock image
1561 {"fs-uboot", 0x00000, 0x20000},
1562 {"firmware", 0x20000, 0x390000},
1563 {"partition-table", 0x3b0000, 0x02000},
1564 {"default-mac", 0x3c0000, 0x00020},
1565 {"pin", 0x3c0100, 0x00020},
1566 {"product-info", 0x3c1000, 0x01000},
1567 {"soft-version", 0x3c2000, 0x00100},
1568 {"support-list", 0x3c3000, 0x01000},
1569 {"profile", 0x3c4000, 0x08000},
1570 {"user-config", 0x3d0000, 0x10000},
1571 {"default-config", 0x3e0000, 0x10000},
1572 {"radio", 0x3f0000, 0x10000},
1576 .first_sysupgrade_partition
= "os-image",
1577 .last_sysupgrade_partition
= "file-system"
1580 /** Firmware layout for the TL-WA855RE v1 */
1582 .id
= "TLWA855REV1",
1586 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1587 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1588 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1589 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1590 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1591 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1592 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1593 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1594 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1599 {"fs-uboot", 0x00000, 0x20000},
1600 {"os-image", 0x20000, 0x150000},
1601 {"file-system", 0x170000, 0x240000},
1602 {"partition-table", 0x3b0000, 0x02000},
1603 {"default-mac", 0x3c0000, 0x00020},
1604 {"pin", 0x3c0100, 0x00020},
1605 {"product-info", 0x3c1000, 0x01000},
1606 {"soft-version", 0x3c2000, 0x00100},
1607 {"support-list", 0x3c3000, 0x01000},
1608 {"profile", 0x3c4000, 0x08000},
1609 {"user-config", 0x3d0000, 0x10000},
1610 {"default-config", 0x3e0000, 0x10000},
1611 {"radio", 0x3f0000, 0x10000},
1615 .first_sysupgrade_partition
= "os-image",
1616 .last_sysupgrade_partition
= "file-system"
1619 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
1621 .id
= "TL-WPA8630P-V2.0-EU",
1625 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
1630 {"factory-uboot", 0x00000, 0x20000},
1631 {"fs-uboot", 0x20000, 0x20000},
1632 {"firmware", 0x40000, 0x5e0000},
1633 {"partition-table", 0x620000, 0x02000},
1634 {"default-mac", 0x630000, 0x00020},
1635 {"pin", 0x630100, 0x00020},
1636 {"device-id", 0x630200, 0x00030},
1637 {"product-info", 0x631100, 0x01000},
1638 {"extra-para", 0x632100, 0x01000},
1639 {"soft-version", 0x640000, 0x01000},
1640 {"support-list", 0x641000, 0x01000},
1641 {"profile", 0x642000, 0x08000},
1642 {"user-config", 0x650000, 0x10000},
1643 {"default-config", 0x660000, 0x10000},
1644 {"default-nvm", 0x670000, 0xc0000},
1645 {"default-pib", 0x730000, 0x40000},
1646 {"radio", 0x7f0000, 0x10000},
1650 .first_sysupgrade_partition
= "os-image",
1651 .last_sysupgrade_partition
= "file-system"
1654 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
1656 .id
= "TL-WPA8630P-V2-INT",
1660 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
1661 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
1662 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
1667 {"factory-uboot", 0x00000, 0x20000},
1668 {"fs-uboot", 0x20000, 0x20000},
1669 {"firmware", 0x40000, 0x5e0000},
1670 {"partition-table", 0x620000, 0x02000},
1671 {"extra-para", 0x632100, 0x01000},
1672 {"soft-version", 0x640000, 0x01000},
1673 {"support-list", 0x641000, 0x01000},
1674 {"profile", 0x642000, 0x08000},
1675 {"user-config", 0x650000, 0x10000},
1676 {"default-config", 0x660000, 0x10000},
1677 {"default-nvm", 0x670000, 0xc0000},
1678 {"default-pib", 0x730000, 0x40000},
1679 {"default-mac", 0x7e0000, 0x00020},
1680 {"pin", 0x7e0100, 0x00020},
1681 {"device-id", 0x7e0200, 0x00030},
1682 {"product-info", 0x7e1100, 0x01000},
1683 {"radio", 0x7f0000, 0x10000},
1687 .first_sysupgrade_partition
= "os-image",
1688 .last_sysupgrade_partition
= "file-system"
1691 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
1693 .id
= "TL-WPA8630P-V2.1-EU",
1697 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
1702 {"factory-uboot", 0x00000, 0x20000},
1703 {"fs-uboot", 0x20000, 0x20000},
1704 {"firmware", 0x40000, 0x5e0000},
1705 {"extra-para", 0x680000, 0x01000},
1706 {"product-info", 0x690000, 0x01000},
1707 {"partition-table", 0x6a0000, 0x02000},
1708 {"soft-version", 0x6b0000, 0x01000},
1709 {"support-list", 0x6b1000, 0x01000},
1710 {"profile", 0x6b2000, 0x08000},
1711 {"user-config", 0x6c0000, 0x10000},
1712 {"default-config", 0x6d0000, 0x10000},
1713 {"default-nvm", 0x6e0000, 0xc0000},
1714 {"default-pib", 0x7a0000, 0x40000},
1715 {"default-mac", 0x7e0000, 0x00020},
1716 {"pin", 0x7e0100, 0x00020},
1717 {"device-id", 0x7e0200, 0x00030},
1718 {"radio", 0x7f0000, 0x10000},
1722 .first_sysupgrade_partition
= "os-image",
1723 .last_sysupgrade_partition
= "file-system"
1726 /** Firmware layout for the TL-WR1043 v5 */
1728 .id
= "TLWR1043NV5",
1732 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1733 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1735 .soft_ver
= "soft_ver:1.0.0\n",
1737 {"factory-boot", 0x00000, 0x20000},
1738 {"fs-uboot", 0x20000, 0x20000},
1739 {"firmware", 0x40000, 0xec0000},
1740 {"default-mac", 0xf00000, 0x00200},
1741 {"pin", 0xf00200, 0x00200},
1742 {"device-id", 0xf00400, 0x00100},
1743 {"product-info", 0xf00500, 0x0fb00},
1744 {"soft-version", 0xf10000, 0x01000},
1745 {"extra-para", 0xf11000, 0x01000},
1746 {"support-list", 0xf12000, 0x0a000},
1747 {"profile", 0xf1c000, 0x04000},
1748 {"default-config", 0xf20000, 0x10000},
1749 {"user-config", 0xf30000, 0x40000},
1750 {"qos-db", 0xf70000, 0x40000},
1751 {"certificate", 0xfb0000, 0x10000},
1752 {"partition-table", 0xfc0000, 0x10000},
1753 {"log", 0xfd0000, 0x20000},
1754 {"radio", 0xff0000, 0x10000},
1757 .first_sysupgrade_partition
= "os-image",
1758 .last_sysupgrade_partition
= "file-system"
1761 /** Firmware layout for the TL-WR1043 v4 */
1763 .id
= "TLWR1043NDV4",
1767 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1771 /* We're using a dynamic kernel/rootfs split here */
1773 {"fs-uboot", 0x00000, 0x20000},
1774 {"firmware", 0x20000, 0xf30000},
1775 {"default-mac", 0xf50000, 0x00200},
1776 {"pin", 0xf50200, 0x00200},
1777 {"product-info", 0xf50400, 0x0fc00},
1778 {"soft-version", 0xf60000, 0x0b000},
1779 {"support-list", 0xf6b000, 0x04000},
1780 {"profile", 0xf70000, 0x04000},
1781 {"default-config", 0xf74000, 0x0b000},
1782 {"user-config", 0xf80000, 0x40000},
1783 {"partition-table", 0xfc0000, 0x10000},
1784 {"log", 0xfd0000, 0x20000},
1785 {"radio", 0xff0000, 0x10000},
1789 .first_sysupgrade_partition
= "os-image",
1790 .last_sysupgrade_partition
= "file-system"
1793 /** Firmware layout for the TL-WR902AC v1 */
1795 .id
= "TL-WR902AC-V1",
1799 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1800 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1805 384KB were moved from file-system to os-image
1806 in comparison to the stock image
1809 {"fs-uboot", 0x00000, 0x20000},
1810 {"firmware", 0x20000, 0x730000},
1811 {"default-mac", 0x750000, 0x00200},
1812 {"pin", 0x750200, 0x00200},
1813 {"product-info", 0x750400, 0x0fc00},
1814 {"soft-version", 0x760000, 0x0b000},
1815 {"support-list", 0x76b000, 0x04000},
1816 {"profile", 0x770000, 0x04000},
1817 {"default-config", 0x774000, 0x0b000},
1818 {"user-config", 0x780000, 0x40000},
1819 {"partition-table", 0x7c0000, 0x10000},
1820 {"log", 0x7d0000, 0x20000},
1821 {"radio", 0x7f0000, 0x10000},
1825 .first_sysupgrade_partition
= "os-image",
1826 .last_sysupgrade_partition
= "file-system",
1829 /** Firmware layout for the TL-WR942N V1 */
1835 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1836 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1841 {"fs-uboot", 0x00000, 0x20000},
1842 {"firmware", 0x20000, 0xe20000},
1843 {"default-mac", 0xe40000, 0x00200},
1844 {"pin", 0xe40200, 0x00200},
1845 {"product-info", 0xe40400, 0x0fc00},
1846 {"partition-table", 0xe50000, 0x10000},
1847 {"soft-version", 0xe60000, 0x10000},
1848 {"support-list", 0xe70000, 0x10000},
1849 {"profile", 0xe80000, 0x10000},
1850 {"default-config", 0xe90000, 0x10000},
1851 {"user-config", 0xea0000, 0x40000},
1852 {"qos-db", 0xee0000, 0x40000},
1853 {"certificate", 0xf20000, 0x10000},
1854 {"usb-config", 0xfb0000, 0x10000},
1855 {"log", 0xfc0000, 0x20000},
1856 {"radio-bk", 0xfe0000, 0x10000},
1857 {"radio", 0xff0000, 0x10000},
1861 .first_sysupgrade_partition
= "os-image",
1862 .last_sysupgrade_partition
= "file-system",
1865 /** Firmware layout for the RE200 v2 */
1871 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1872 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1873 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1874 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1875 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1876 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1877 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1878 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1879 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1880 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1881 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1882 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1883 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1888 {"fs-uboot", 0x00000, 0x20000},
1889 {"firmware", 0x20000, 0x7a0000},
1890 {"partition-table", 0x7c0000, 0x02000},
1891 {"default-mac", 0x7c2000, 0x00020},
1892 {"pin", 0x7c2100, 0x00020},
1893 {"product-info", 0x7c3100, 0x01000},
1894 {"soft-version", 0x7c4200, 0x01000},
1895 {"support-list", 0x7c5200, 0x01000},
1896 {"profile", 0x7c6200, 0x08000},
1897 {"config-info", 0x7ce200, 0x00400},
1898 {"user-config", 0x7d0000, 0x10000},
1899 {"default-config", 0x7e0000, 0x10000},
1900 {"radio", 0x7f0000, 0x10000},
1904 .first_sysupgrade_partition
= "os-image",
1905 .last_sysupgrade_partition
= "file-system"
1908 /** Firmware layout for the RE200 v3 */
1914 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
1915 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
1916 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
1917 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
1918 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
1919 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
1920 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
1921 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
1922 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
1923 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
1924 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
1925 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
1926 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
1927 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
1932 {"fs-uboot", 0x00000, 0x20000},
1933 {"firmware", 0x20000, 0x7a0000},
1934 {"partition-table", 0x7c0000, 0x02000},
1935 {"default-mac", 0x7c2000, 0x00020},
1936 {"pin", 0x7c2100, 0x00020},
1937 {"product-info", 0x7c3100, 0x01000},
1938 {"soft-version", 0x7c4200, 0x01000},
1939 {"support-list", 0x7c5200, 0x01000},
1940 {"profile", 0x7c6200, 0x08000},
1941 {"config-info", 0x7ce200, 0x00400},
1942 {"user-config", 0x7d0000, 0x10000},
1943 {"default-config", 0x7e0000, 0x10000},
1944 {"radio", 0x7f0000, 0x10000},
1948 .first_sysupgrade_partition
= "os-image",
1949 .last_sysupgrade_partition
= "file-system"
1952 /** Firmware layout for the RE200 v4 */
1958 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
1959 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
1960 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
1961 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
1962 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
1963 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
1964 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
1965 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
1966 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
1967 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
1968 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
1969 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
1970 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
1971 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
1973 .soft_ver
= "soft_ver:1.1.0\n",
1976 {"fs-uboot", 0x00000, 0x20000},
1977 {"firmware", 0x20000, 0x7a0000},
1978 {"partition-table", 0x7c0000, 0x02000},
1979 {"default-mac", 0x7c2000, 0x00020},
1980 {"pin", 0x7c2100, 0x00020},
1981 {"product-info", 0x7c3100, 0x01000},
1982 {"soft-version", 0x7c4200, 0x01000},
1983 {"support-list", 0x7c5200, 0x01000},
1984 {"profile", 0x7c6200, 0x08000},
1985 {"config-info", 0x7ce200, 0x00400},
1986 {"user-config", 0x7d0000, 0x10000},
1987 {"default-config", 0x7e0000, 0x10000},
1988 {"radio", 0x7f0000, 0x10000},
1992 .first_sysupgrade_partition
= "os-image",
1993 .last_sysupgrade_partition
= "file-system"
1996 /** Firmware layout for the RE220 v2 */
2002 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
2003 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
2004 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
2005 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
2006 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
2007 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
2008 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
2009 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
2010 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
2011 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
2012 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
2013 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
2014 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
2019 {"fs-uboot", 0x00000, 0x20000},
2020 {"firmware", 0x20000, 0x7a0000},
2021 {"partition-table", 0x7c0000, 0x02000},
2022 {"default-mac", 0x7c2000, 0x00020},
2023 {"pin", 0x7c2100, 0x00020},
2024 {"product-info", 0x7c3100, 0x01000},
2025 {"soft-version", 0x7c4200, 0x01000},
2026 {"support-list", 0x7c5200, 0x01000},
2027 {"profile", 0x7c6200, 0x08000},
2028 {"config-info", 0x7ce200, 0x00400},
2029 {"user-config", 0x7d0000, 0x10000},
2030 {"default-config", 0x7e0000, 0x10000},
2031 {"radio", 0x7f0000, 0x10000},
2035 .first_sysupgrade_partition
= "os-image",
2036 .last_sysupgrade_partition
= "file-system"
2039 /** Firmware layout for the RE305 v1 */
2045 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
2046 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
2047 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
2048 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
2049 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
2050 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
2051 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
2056 {"fs-uboot", 0x00000, 0x20000},
2057 {"firmware", 0x20000, 0x5e0000},
2058 {"partition-table", 0x600000, 0x02000},
2059 {"default-mac", 0x610000, 0x00020},
2060 {"pin", 0x610100, 0x00020},
2061 {"product-info", 0x611100, 0x01000},
2062 {"soft-version", 0x620000, 0x01000},
2063 {"support-list", 0x621000, 0x01000},
2064 {"profile", 0x622000, 0x08000},
2065 {"user-config", 0x630000, 0x10000},
2066 {"default-config", 0x640000, 0x10000},
2067 {"radio", 0x7f0000, 0x10000},
2071 .first_sysupgrade_partition
= "os-image",
2072 .last_sysupgrade_partition
= "file-system"
2075 /** Firmware layout for the RE350 v1 */
2081 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
2082 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
2083 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
2084 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
2085 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
2086 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
2087 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
2091 /** We're using a dynamic kernel/rootfs split here */
2093 {"fs-uboot", 0x00000, 0x20000},
2094 {"firmware", 0x20000, 0x5e0000},
2095 {"partition-table", 0x600000, 0x02000},
2096 {"default-mac", 0x610000, 0x00020},
2097 {"pin", 0x610100, 0x00020},
2098 {"product-info", 0x611100, 0x01000},
2099 {"soft-version", 0x620000, 0x01000},
2100 {"support-list", 0x621000, 0x01000},
2101 {"profile", 0x622000, 0x08000},
2102 {"user-config", 0x630000, 0x10000},
2103 {"default-config", 0x640000, 0x10000},
2104 {"radio", 0x7f0000, 0x10000},
2108 .first_sysupgrade_partition
= "os-image",
2109 .last_sysupgrade_partition
= "file-system"
2112 /** Firmware layout for the RE350K v1 */
2118 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2122 /** We're using a dynamic kernel/rootfs split here */
2124 {"fs-uboot", 0x00000, 0x20000},
2125 {"firmware", 0x20000, 0xd70000},
2126 {"partition-table", 0xd90000, 0x02000},
2127 {"default-mac", 0xda0000, 0x00020},
2128 {"pin", 0xda0100, 0x00020},
2129 {"product-info", 0xda1100, 0x01000},
2130 {"soft-version", 0xdb0000, 0x01000},
2131 {"support-list", 0xdb1000, 0x01000},
2132 {"profile", 0xdb2000, 0x08000},
2133 {"user-config", 0xdc0000, 0x10000},
2134 {"default-config", 0xdd0000, 0x10000},
2135 {"device-id", 0xde0000, 0x00108},
2136 {"radio", 0xff0000, 0x10000},
2140 .first_sysupgrade_partition
= "os-image",
2141 .last_sysupgrade_partition
= "file-system"
2144 /** Firmware layout for the RE355 */
2150 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2151 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2152 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2153 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2154 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2155 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2156 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2157 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2161 /* We're using a dynamic kernel/rootfs split here */
2163 {"fs-uboot", 0x00000, 0x20000},
2164 {"firmware", 0x20000, 0x5e0000},
2165 {"partition-table", 0x600000, 0x02000},
2166 {"default-mac", 0x610000, 0x00020},
2167 {"pin", 0x610100, 0x00020},
2168 {"product-info", 0x611100, 0x01000},
2169 {"soft-version", 0x620000, 0x01000},
2170 {"support-list", 0x621000, 0x01000},
2171 {"profile", 0x622000, 0x08000},
2172 {"user-config", 0x630000, 0x10000},
2173 {"default-config", 0x640000, 0x10000},
2174 {"radio", 0x7f0000, 0x10000},
2178 .first_sysupgrade_partition
= "os-image",
2179 .last_sysupgrade_partition
= "file-system"
2182 /** Firmware layout for the RE450 */
2188 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2189 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2190 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2191 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2192 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2193 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2194 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2195 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2199 /** We're using a dynamic kernel/rootfs split here */
2201 {"fs-uboot", 0x00000, 0x20000},
2202 {"firmware", 0x20000, 0x5e0000},
2203 {"partition-table", 0x600000, 0x02000},
2204 {"default-mac", 0x610000, 0x00020},
2205 {"pin", 0x610100, 0x00020},
2206 {"product-info", 0x611100, 0x01000},
2207 {"soft-version", 0x620000, 0x01000},
2208 {"support-list", 0x621000, 0x01000},
2209 {"profile", 0x622000, 0x08000},
2210 {"user-config", 0x630000, 0x10000},
2211 {"default-config", 0x640000, 0x10000},
2212 {"radio", 0x7f0000, 0x10000},
2216 .first_sysupgrade_partition
= "os-image",
2217 .last_sysupgrade_partition
= "file-system"
2220 /** Firmware layout for the RE450 v2 */
2226 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2227 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2228 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2229 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2230 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2231 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2232 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2233 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2234 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2238 /* We're using a dynamic kernel/rootfs split here */
2240 {"fs-uboot", 0x00000, 0x20000},
2241 {"firmware", 0x20000, 0x5e0000},
2242 {"partition-table", 0x600000, 0x02000},
2243 {"default-mac", 0x610000, 0x00020},
2244 {"pin", 0x610100, 0x00020},
2245 {"product-info", 0x611100, 0x01000},
2246 {"soft-version", 0x620000, 0x01000},
2247 {"support-list", 0x621000, 0x01000},
2248 {"profile", 0x622000, 0x08000},
2249 {"user-config", 0x630000, 0x10000},
2250 {"default-config", 0x640000, 0x10000},
2251 {"radio", 0x7f0000, 0x10000},
2255 .first_sysupgrade_partition
= "os-image",
2256 .last_sysupgrade_partition
= "file-system"
2259 /** Firmware layout for the RE450 v3 */
2265 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2266 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2267 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2268 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2269 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2270 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2271 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2272 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2273 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2277 /* We're using a dynamic kernel/rootfs split here */
2279 {"fs-uboot", 0x00000, 0x20000},
2280 {"default-mac", 0x20000, 0x00020},
2281 {"pin", 0x20020, 0x00020},
2282 {"product-info", 0x21000, 0x01000},
2283 {"partition-table", 0x22000, 0x02000},
2284 {"soft-version", 0x24000, 0x01000},
2285 {"support-list", 0x25000, 0x01000},
2286 {"profile", 0x26000, 0x08000},
2287 {"user-config", 0x2e000, 0x10000},
2288 {"default-config", 0x3e000, 0x10000},
2289 {"config-info", 0x4e000, 0x00400},
2290 {"firmware", 0x50000, 0x7a0000},
2291 {"radio", 0x7f0000, 0x10000},
2295 .first_sysupgrade_partition
= "os-image",
2296 .last_sysupgrade_partition
= "file-system"
2299 /** Firmware layout for the RE500 */
2305 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
2306 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
2307 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
2308 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
2309 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
2310 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
2311 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
2315 /* We're using a dynamic kernel/rootfs split here */
2317 {"fs-uboot", 0x00000, 0x20000},
2318 {"firmware", 0x20000, 0xde0000},
2319 {"partition-table", 0xe00000, 0x02000},
2320 {"default-mac", 0xe10000, 0x00020},
2321 {"pin", 0xe10100, 0x00020},
2322 {"product-info", 0xe11100, 0x01000},
2323 {"soft-version", 0xe20000, 0x01000},
2324 {"support-list", 0xe21000, 0x01000},
2325 {"profile", 0xe22000, 0x08000},
2326 {"user-config", 0xe30000, 0x10000},
2327 {"default-config", 0xe40000, 0x10000},
2328 {"radio", 0xff0000, 0x10000},
2332 .first_sysupgrade_partition
= "os-image",
2333 .last_sysupgrade_partition
= "file-system"
2336 /** Firmware layout for the RE650 */
2342 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
2343 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
2344 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
2345 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
2346 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
2347 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
2348 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
2352 /* We're using a dynamic kernel/rootfs split here */
2354 {"fs-uboot", 0x00000, 0x20000},
2355 {"firmware", 0x20000, 0xde0000},
2356 {"partition-table", 0xe00000, 0x02000},
2357 {"default-mac", 0xe10000, 0x00020},
2358 {"pin", 0xe10100, 0x00020},
2359 {"product-info", 0xe11100, 0x01000},
2360 {"soft-version", 0xe20000, 0x01000},
2361 {"support-list", 0xe21000, 0x01000},
2362 {"profile", 0xe22000, 0x08000},
2363 {"user-config", 0xe30000, 0x10000},
2364 {"default-config", 0xe40000, 0x10000},
2365 {"radio", 0xff0000, 0x10000},
2369 .first_sysupgrade_partition
= "os-image",
2370 .last_sysupgrade_partition
= "file-system"
2376 #define error(_ret, _errno, _str, ...) \
2378 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
2379 strerror(_errno)); \
2385 /** Stores a uint32 as big endian */
2386 static inline void put32(uint8_t *buf
, uint32_t val
) {
2393 static inline bool meta_partition_should_pad(enum partition_trail_value pv
)
2395 return (pv
>= 0) && (pv
<= PART_TRAIL_MAX
);
2398 /** Allocate a padded meta partition with a correctly initialised header
2399 * If the `data` pointer is NULL, then the required space is only allocated,
2400 * otherwise `data_len` bytes will be copied from `data` into the partition
2402 static struct image_partition_entry
init_meta_partition_entry(
2403 const char *name
, const void *data
, uint32_t data_len
,
2404 enum partition_trail_value pad_value
)
2406 uint32_t total_len
= sizeof(struct meta_header
) + data_len
;
2407 if (meta_partition_should_pad(pad_value
))
2410 struct image_partition_entry entry
= {
2413 .data
= malloc(total_len
)
2416 error(1, errno
, "failed to allocate meta partition entry");
2418 struct meta_header
*header
= (struct meta_header
*)entry
.data
;
2419 header
->length
= htonl(data_len
);
2423 memcpy(entry
.data
+sizeof(*header
), data
, data_len
);
2425 if (meta_partition_should_pad(pad_value
))
2426 entry
.data
[total_len
- 1] = (uint8_t) pad_value
;
2431 /** Allocates a new image partition */
2432 static struct image_partition_entry
alloc_image_partition(const char *name
, size_t len
) {
2433 struct image_partition_entry entry
= {name
, len
, malloc(len
)};
2435 error(1, errno
, "malloc");
2440 /** Frees an image partition */
2441 static void free_image_partition(struct image_partition_entry entry
) {
2445 static time_t source_date_epoch
= -1;
2446 static void set_source_date_epoch() {
2447 char *env
= getenv("SOURCE_DATE_EPOCH");
2451 source_date_epoch
= strtoull(env
, &endptr
, 10);
2452 if (errno
|| (endptr
&& *endptr
!= '\0')) {
2453 fprintf(stderr
, "Invalid SOURCE_DATE_EPOCH");
2459 /** Generates the partition-table partition */
2460 static struct image_partition_entry
make_partition_table(const struct flash_partition_entry
*p
) {
2461 struct image_partition_entry entry
= alloc_image_partition("partition-table", 0x800);
2463 char *s
= (char *)entry
.data
, *end
= (char *)(s
+entry
.size
);
2471 for (i
= 0; p
[i
].name
; i
++) {
2473 size_t w
= snprintf(s
, len
, "partition %s base 0x%05x size 0x%05x\n", p
[i
].name
, p
[i
].base
, p
[i
].size
);
2476 error(1, 0, "flash partition table overflow?");
2483 memset(s
, 0xff, end
-s
);
2489 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
2490 static inline uint8_t bcd(uint8_t v
) {
2491 return 0x10 * (v
/10) + v
%10;
2495 /** Generates the soft-version partition */
2496 static struct image_partition_entry
make_soft_version(
2497 const struct device_info
*info
, uint32_t rev
)
2499 /** If an info string is provided, use this instead of
2500 * the structured data, and include the null-termination */
2501 if (info
->soft_ver
) {
2502 uint32_t len
= strlen(info
->soft_ver
) + 1;
2503 return init_meta_partition_entry("soft-version",
2504 info
->soft_ver
, len
, info
->part_trail
);
2509 if (source_date_epoch
!= -1)
2510 t
= source_date_epoch
;
2511 else if (time(&t
) == (time_t)(-1))
2512 error(1, errno
, "time");
2514 struct tm
*tm
= gmtime(&t
);
2516 struct soft_version s
= {
2523 .year_hi
= bcd((1900+tm
->tm_year
)/100),
2524 .year_lo
= bcd(tm
->tm_year
%100),
2525 .month
= bcd(tm
->tm_mon
+1),
2526 .day
= bcd(tm
->tm_mday
),
2528 .compat_level
= htonl(info
->soft_ver_compat_level
)
2531 if (info
->soft_ver_compat_level
== 0)
2532 return init_meta_partition_entry("soft-version", &s
,
2533 (uint8_t *)(&s
.compat_level
) - (uint8_t *)(&s
),
2536 return init_meta_partition_entry("soft-version", &s
,
2537 sizeof(s
), info
->part_trail
);
2540 /** Generates the support-list partition */
2541 static struct image_partition_entry
make_support_list(
2542 const struct device_info
*info
)
2544 uint32_t len
= strlen(info
->support_list
);
2545 return init_meta_partition_entry("support-list", info
->support_list
,
2546 len
, info
->part_trail
);
2549 /** Partition with extra-para data */
2550 static struct image_partition_entry
make_extra_para(
2551 const struct device_info
*info
, const uint8_t *extra_para
, size_t len
)
2553 return init_meta_partition_entry("extra-para", extra_para
, len
,
2557 /** Creates a new image partition with an arbitrary name from a file */
2558 static struct image_partition_entry
read_file(const char *part_name
, const char *filename
, bool add_jffs2_eof
, struct flash_partition_entry
*file_system_partition
) {
2559 struct stat statbuf
;
2561 if (stat(filename
, &statbuf
) < 0)
2562 error(1, errno
, "unable to stat file `%s'", filename
);
2564 size_t len
= statbuf
.st_size
;
2566 if (add_jffs2_eof
) {
2567 if (file_system_partition
)
2568 len
= ALIGN(len
+ file_system_partition
->base
, 0x10000) + sizeof(jffs2_eof_mark
) - file_system_partition
->base
;
2570 len
= ALIGN(len
, 0x10000) + sizeof(jffs2_eof_mark
);
2573 struct image_partition_entry entry
= alloc_image_partition(part_name
, len
);
2575 FILE *file
= fopen(filename
, "rb");
2577 error(1, errno
, "unable to open file `%s'", filename
);
2579 if (fread(entry
.data
, statbuf
.st_size
, 1, file
) != 1)
2580 error(1, errno
, "unable to read file `%s'", filename
);
2582 if (add_jffs2_eof
) {
2583 uint8_t *eof
= entry
.data
+ statbuf
.st_size
, *end
= entry
.data
+entry
.size
;
2585 memset(eof
, 0xff, end
- eof
- sizeof(jffs2_eof_mark
));
2586 memcpy(end
- sizeof(jffs2_eof_mark
), jffs2_eof_mark
, sizeof(jffs2_eof_mark
));
2595 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2597 Example image partition table:
2599 fwup-ptn partition-table base 0x00800 size 0x00800
2600 fwup-ptn os-image base 0x01000 size 0x113b45
2601 fwup-ptn file-system base 0x114b45 size 0x1d0004
2602 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2604 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2605 the end of the partition table is marked with a zero byte.
2607 The firmware image must contain at least the partition-table and support-list partitions
2608 to be accepted. There aren't any alignment constraints for the image partitions.
2610 The partition-table partition contains the actual flash layout; partitions
2611 from the image partition table are mapped to the corresponding flash partitions during
2612 the firmware upgrade. The support-list partition contains a list of devices supported by
2615 The base offsets in the firmware partition table are relative to the end
2616 of the vendor information block, so the partition-table partition will
2617 actually start at offset 0x1814 of the image.
2619 I think partition-table must be the first partition in the firmware image.
2621 static void put_partitions(uint8_t *buffer
, const struct flash_partition_entry
*flash_parts
, const struct image_partition_entry
*parts
) {
2623 char *image_pt
= (char *)buffer
, *end
= image_pt
+ 0x800;
2625 size_t base
= 0x800;
2626 for (i
= 0; parts
[i
].name
; i
++) {
2627 for (j
= 0; flash_parts
[j
].name
; j
++) {
2628 if (!strcmp(flash_parts
[j
].name
, parts
[i
].name
)) {
2629 if (parts
[i
].size
> flash_parts
[j
].size
)
2630 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts
[j
].name
, (unsigned)flash_parts
[j
].size
);
2635 assert(flash_parts
[j
].name
);
2637 memcpy(buffer
+ base
, parts
[i
].data
, parts
[i
].size
);
2639 size_t len
= end
-image_pt
;
2640 size_t w
= snprintf(image_pt
, len
, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts
[i
].name
, (unsigned)base
, (unsigned)parts
[i
].size
);
2643 error(1, 0, "image partition table overflow?");
2647 base
+= parts
[i
].size
;
2651 /** Generates and writes the image MD5 checksum */
2652 static void put_md5(uint8_t *md5
, uint8_t *buffer
, unsigned int len
) {
2656 MD5_Update(&ctx
, md5_salt
, (unsigned int)sizeof(md5_salt
));
2657 MD5_Update(&ctx
, buffer
, len
);
2658 MD5_Final(md5
, &ctx
);
2663 Generates the firmware image in factory format
2669 0000-0003 Image size (4 bytes, big endian)
2670 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2671 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2672 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2673 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2674 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2675 1814-xxxx Firmware partitions
2677 static void * generate_factory_image(struct device_info
*info
, const struct image_partition_entry
*parts
, size_t *len
) {
2681 for (i
= 0; parts
[i
].name
; i
++)
2682 *len
+= parts
[i
].size
;
2684 uint8_t *image
= malloc(*len
);
2686 error(1, errno
, "malloc");
2688 memset(image
, 0xff, *len
);
2692 size_t vendor_len
= strlen(info
->vendor
);
2693 put32(image
+0x14, vendor_len
);
2694 memcpy(image
+0x18, info
->vendor
, vendor_len
);
2697 put_partitions(image
+ 0x1014, info
->partitions
, parts
);
2698 put_md5(image
+0x04, image
+0x14, *len
-0x14);
2704 Generates the firmware image in sysupgrade format
2706 This makes some assumptions about the provided flash and image partition tables and
2707 should be generalized when TP-LINK starts building its safeloader into hardware with
2708 different flash layouts.
2710 static void * generate_sysupgrade_image(struct device_info
*info
, const struct image_partition_entry
*image_parts
, size_t *len
) {
2712 size_t flash_first_partition_index
= 0;
2713 size_t flash_last_partition_index
= 0;
2714 const struct flash_partition_entry
*flash_first_partition
= NULL
;
2715 const struct flash_partition_entry
*flash_last_partition
= NULL
;
2716 const struct image_partition_entry
*image_last_partition
= NULL
;
2718 /** Find first and last partitions */
2719 for (i
= 0; info
->partitions
[i
].name
; i
++) {
2720 if (!strcmp(info
->partitions
[i
].name
, info
->first_sysupgrade_partition
)) {
2721 flash_first_partition
= &info
->partitions
[i
];
2722 flash_first_partition_index
= i
;
2723 } else if (!strcmp(info
->partitions
[i
].name
, info
->last_sysupgrade_partition
)) {
2724 flash_last_partition
= &info
->partitions
[i
];
2725 flash_last_partition_index
= i
;
2729 assert(flash_first_partition
&& flash_last_partition
);
2730 assert(flash_first_partition_index
< flash_last_partition_index
);
2732 /** Find last partition from image to calculate needed size */
2733 for (i
= 0; image_parts
[i
].name
; i
++) {
2734 if (!strcmp(image_parts
[i
].name
, info
->last_sysupgrade_partition
)) {
2735 image_last_partition
= &image_parts
[i
];
2740 assert(image_last_partition
);
2742 *len
= flash_last_partition
->base
- flash_first_partition
->base
+ image_last_partition
->size
;
2744 uint8_t *image
= malloc(*len
);
2746 error(1, errno
, "malloc");
2748 memset(image
, 0xff, *len
);
2750 for (i
= flash_first_partition_index
; i
<= flash_last_partition_index
; i
++) {
2751 for (j
= 0; image_parts
[j
].name
; j
++) {
2752 if (!strcmp(info
->partitions
[i
].name
, image_parts
[j
].name
)) {
2753 if (image_parts
[j
].size
> info
->partitions
[i
].size
)
2754 error(1, 0, "%s partition too big (more than %u bytes)", info
->partitions
[i
].name
, (unsigned)info
->partitions
[i
].size
);
2755 memcpy(image
+ info
->partitions
[i
].base
- flash_first_partition
->base
, image_parts
[j
].data
, image_parts
[j
].size
);
2759 assert(image_parts
[j
].name
);
2766 /** Generates an image according to a given layout and writes it to a file */
2767 static void build_image(const char *output
,
2768 const char *kernel_image
,
2769 const char *rootfs_image
,
2773 struct device_info
*info
) {
2777 struct image_partition_entry parts
[7] = {};
2779 struct flash_partition_entry
*firmware_partition
= NULL
;
2780 struct flash_partition_entry
*os_image_partition
= NULL
;
2781 struct flash_partition_entry
*file_system_partition
= NULL
;
2782 size_t firmware_partition_index
= 0;
2784 for (i
= 0; info
->partitions
[i
].name
; i
++) {
2785 if (!strcmp(info
->partitions
[i
].name
, "firmware"))
2787 firmware_partition
= &info
->partitions
[i
];
2788 firmware_partition_index
= i
;
2792 if (firmware_partition
)
2794 os_image_partition
= &info
->partitions
[firmware_partition_index
];
2795 file_system_partition
= &info
->partitions
[firmware_partition_index
+ 1];
2798 if (stat(kernel_image
, &kernel
) < 0)
2799 error(1, errno
, "unable to stat file `%s'", kernel_image
);
2801 if (kernel
.st_size
> firmware_partition
->size
)
2802 error(1, 0, "kernel overflowed firmware partition\n");
2804 for (i
= MAX_PARTITIONS
-1; i
>= firmware_partition_index
+ 1; i
--)
2805 info
->partitions
[i
+1] = info
->partitions
[i
];
2807 file_system_partition
->name
= "file-system";
2808 file_system_partition
->base
= firmware_partition
->base
+ kernel
.st_size
;
2810 /* Align partition start to erase blocks for factory images only */
2812 file_system_partition
->base
= ALIGN(firmware_partition
->base
+ kernel
.st_size
, 0x10000);
2814 file_system_partition
->size
= firmware_partition
->size
- file_system_partition
->base
;
2816 os_image_partition
->name
= "os-image";
2817 os_image_partition
->size
= kernel
.st_size
;
2820 parts
[0] = make_partition_table(info
->partitions
);
2821 parts
[1] = make_soft_version(info
, rev
);
2822 parts
[2] = make_support_list(info
);
2823 parts
[3] = read_file("os-image", kernel_image
, false, NULL
);
2824 parts
[4] = read_file("file-system", rootfs_image
, add_jffs2_eof
, file_system_partition
);
2826 /* Some devices need the extra-para partition to accept the firmware */
2827 if (strcasecmp(info
->id
, "ARCHER-A7-V5") == 0 ||
2828 strcasecmp(info
->id
, "ARCHER-C2-V3") == 0 ||
2829 strcasecmp(info
->id
, "ARCHER-C7-V4") == 0 ||
2830 strcasecmp(info
->id
, "ARCHER-C7-V5") == 0 ||
2831 strcasecmp(info
->id
, "ARCHER-C25-V1") == 0 ||
2832 strcasecmp(info
->id
, "ARCHER-C59-V2") == 0 ||
2833 strcasecmp(info
->id
, "ARCHER-C60-V2") == 0 ||
2834 strcasecmp(info
->id
, "ARCHER-C60-V3") == 0 ||
2835 strcasecmp(info
->id
, "TLWR1043NV5") == 0) {
2836 const uint8_t extra_para
[2] = {0x01, 0x00};
2837 parts
[5] = make_extra_para(info
, extra_para
,
2838 sizeof(extra_para
));
2839 } else if (strcasecmp(info
->id
, "ARCHER-C6-V2") == 0) {
2840 const uint8_t extra_para
[2] = {0x00, 0x01};
2841 parts
[5] = make_extra_para(info
, extra_para
,
2842 sizeof(extra_para
));
2843 } else if (strcasecmp(info
->id
, "ARCHER-C6-V2-US") == 0 ||
2844 strcasecmp(info
->id
, "EAP245-V3") == 0) {
2845 const uint8_t extra_para
[2] = {0x01, 0x01};
2846 parts
[5] = make_extra_para(info
, extra_para
,
2847 sizeof(extra_para
));
2853 image
= generate_sysupgrade_image(info
, parts
, &len
);
2855 image
= generate_factory_image(info
, parts
, &len
);
2857 FILE *file
= fopen(output
, "wb");
2859 error(1, errno
, "unable to open output file");
2861 if (fwrite(image
, len
, 1, file
) != 1)
2862 error(1, 0, "unable to write output file");
2868 for (i
= 0; parts
[i
].name
; i
++)
2869 free_image_partition(parts
[i
]);
2873 static void usage(const char *argv0
) {
2875 "Usage: %s [OPTIONS...]\n"
2878 " -h show this help\n"
2880 "Create a new image:\n"
2881 " -B <board> create image for the board specified with <board>\n"
2882 " -k <file> read kernel image from the file <file>\n"
2883 " -r <file> read rootfs image from the file <file>\n"
2884 " -o <file> write output to the file <file>\n"
2885 " -V <rev> sets the revision number to <rev>\n"
2886 " -j add jffs2 end-of-filesystem markers\n"
2887 " -S create sysupgrade instead of factory image\n"
2888 "Extract an old image:\n"
2889 " -x <file> extract all oem firmware partition\n"
2890 " -d <dir> destination to extract the firmware partition\n"
2891 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2897 static struct device_info
*find_board(const char *id
)
2899 struct device_info
*board
= NULL
;
2901 for (board
= boards
; board
->id
!= NULL
; board
++)
2902 if (strcasecmp(id
, board
->id
) == 0)
2908 static int add_flash_partition(
2909 struct flash_partition_entry
*part_list
,
2916 /* check if the list has a free entry */
2917 for (ptr
= 0; ptr
< max_entries
; ptr
++, part_list
++) {
2918 if (part_list
->name
== NULL
&&
2919 part_list
->base
== 0 &&
2920 part_list
->size
== 0)
2924 if (ptr
== max_entries
) {
2925 error(1, 0, "No free flash part entry available.");
2928 part_list
->name
= calloc(1, strlen(name
) + 1);
2929 if (!part_list
->name
) {
2930 error(1, 0, "Unable to allocate memory");
2933 memcpy((char *)part_list
->name
, name
, strlen(name
));
2934 part_list
->base
= base
;
2935 part_list
->size
= size
;
2940 /** read the partition table into struct flash_partition_entry */
2941 static int read_partition_table(
2942 FILE *file
, long offset
,
2943 struct flash_partition_entry
*entries
, size_t max_entries
,
2948 const char *parthdr
= NULL
;
2949 const char *fwuphdr
= "fwup-ptn";
2950 const char *flashhdr
= "partition";
2952 /* TODO: search for the partition table */
2962 error(1, 0, "Invalid partition table");
2965 if (fseek(file
, offset
, SEEK_SET
) < 0)
2966 error(1, errno
, "Can not seek in the firmware");
2968 if (fread(buf
, 2048, 1, file
) != 1)
2969 error(1, errno
, "Can not read fwup-ptn from the firmware");
2973 /* look for the partition header */
2974 if (memcmp(buf
, parthdr
, strlen(parthdr
)) != 0) {
2975 fprintf(stderr
, "DEBUG: can not find fwuphdr\n");
2980 end
= buf
+ sizeof(buf
);
2981 while ((ptr
+ strlen(parthdr
)) < end
&&
2982 memcmp(ptr
, parthdr
, strlen(parthdr
)) == 0) {
2986 char name
[32] = { 0 };
2988 unsigned long base
= 0;
2989 unsigned long size
= 0;
2991 end_part
= memchr(ptr
, '\n', (end
- ptr
));
2992 if (end_part
== NULL
) {
2993 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2997 for (int i
= 0; i
<= 4; i
++) {
2998 if (end_part
<= ptr
)
3001 end_element
= memchr(ptr
, 0x20, (end_part
- ptr
));
3002 if (end_element
== NULL
) {
3003 error(1, errno
, "Ignoring the rest of the partition entries.");
3008 /* partition header */
3010 ptr
= end_element
+ 1;
3014 name_len
= (end_element
- ptr
) > 31 ? 31 : (end_element
- ptr
);
3015 strncpy(name
, ptr
, name_len
);
3016 name
[name_len
] = '\0';
3017 ptr
= end_element
+ 1;
3022 ptr
= end_element
+ 1;
3027 base
= strtoul(ptr
, NULL
, 16);
3028 ptr
= end_element
+ 1;
3033 ptr
= end_element
+ 1;
3034 /* actual size. The last element doesn't have a sepeartor */
3035 size
= strtoul(ptr
, NULL
, 16);
3036 /* the part ends with 0x09, 0x0d, 0x0a */
3038 add_flash_partition(entries
, max_entries
, name
, base
, size
);
3047 static void write_partition(
3049 size_t firmware_offset
,
3050 struct flash_partition_entry
*entry
,
3056 fseek(input_file
, entry
->base
+ firmware_offset
, SEEK_SET
);
3058 for (offset
= 0; sizeof(buf
) + offset
<= entry
->size
; offset
+= sizeof(buf
)) {
3059 if (fread(buf
, sizeof(buf
), 1, input_file
) != 1)
3060 error(1, errno
, "Can not read partition from input_file");
3062 if (fwrite(buf
, sizeof(buf
), 1, output_file
) != 1)
3063 error(1, errno
, "Can not write partition to output_file");
3065 /* write last chunk smaller than buffer */
3066 if (offset
< entry
->size
) {
3067 offset
= entry
->size
- offset
;
3068 if (fread(buf
, offset
, 1, input_file
) != 1)
3069 error(1, errno
, "Can not read partition from input_file");
3070 if (fwrite(buf
, offset
, 1, output_file
) != 1)
3071 error(1, errno
, "Can not write partition to output_file");
3075 static int extract_firmware_partition(FILE *input_file
, size_t firmware_offset
, struct flash_partition_entry
*entry
, const char *output_directory
)
3078 char output
[PATH_MAX
];
3080 snprintf(output
, PATH_MAX
, "%s/%s", output_directory
, entry
->name
);
3081 output_file
= fopen(output
, "wb+");
3082 if (output_file
== NULL
) {
3083 error(1, errno
, "Can not open output file %s", output
);
3086 write_partition(input_file
, firmware_offset
, entry
, output_file
);
3088 fclose(output_file
);
3093 /** extract all partitions from the firmware file */
3094 static int extract_firmware(const char *input
, const char *output_directory
)
3096 struct flash_partition_entry entries
[16] = { 0 };
3097 size_t max_entries
= 16;
3098 size_t firmware_offset
= 0x1014;
3101 struct stat statbuf
;
3103 /* check input file */
3104 if (stat(input
, &statbuf
)) {
3105 error(1, errno
, "Can not read input firmware %s", input
);
3108 /* check if output directory exists */
3109 if (stat(output_directory
, &statbuf
)) {
3110 error(1, errno
, "Failed to stat output directory %s", output_directory
);
3113 if ((statbuf
.st_mode
& S_IFMT
) != S_IFDIR
) {
3114 error(1, errno
, "Given output directory is not a directory %s", output_directory
);
3117 input_file
= fopen(input
, "rb");
3119 if (read_partition_table(input_file
, firmware_offset
, entries
, 16, 0) != 0) {
3120 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3123 for (size_t i
= 0; i
< max_entries
; i
++) {
3124 if (entries
[i
].name
== NULL
&&
3125 entries
[i
].base
== 0 &&
3126 entries
[i
].size
== 0)
3129 extract_firmware_partition(input_file
, firmware_offset
, &entries
[i
], output_directory
);
3135 static struct flash_partition_entry
*find_partition(
3136 struct flash_partition_entry
*entries
, size_t max_entries
,
3137 const char *name
, const char *error_msg
)
3139 for (size_t i
= 0; i
< max_entries
; i
++, entries
++) {
3140 if (strcmp(entries
->name
, name
) == 0)
3144 error(1, 0, "%s", error_msg
);
3148 static void write_ff(FILE *output_file
, size_t size
)
3153 memset(buf
, 0xff, sizeof(buf
));
3155 for (offset
= 0; offset
+ sizeof(buf
) < size
; offset
+= sizeof(buf
)) {
3156 if (fwrite(buf
, sizeof(buf
), 1, output_file
) != 1)
3157 error(1, errno
, "Can not write 0xff to output_file");
3160 /* write last chunk smaller than buffer */
3161 if (offset
< size
) {
3162 offset
= size
- offset
;
3163 if (fwrite(buf
, offset
, 1, output_file
) != 1)
3164 error(1, errno
, "Can not write partition to output_file");
3168 static void convert_firmware(const char *input
, const char *output
)
3170 struct flash_partition_entry fwup
[MAX_PARTITIONS
] = { 0 };
3171 struct flash_partition_entry flash
[MAX_PARTITIONS
] = { 0 };
3172 struct flash_partition_entry
*fwup_os_image
= NULL
, *fwup_file_system
= NULL
;
3173 struct flash_partition_entry
*flash_os_image
= NULL
, *flash_file_system
= NULL
;
3174 struct flash_partition_entry
*fwup_partition_table
= NULL
;
3175 size_t firmware_offset
= 0x1014;
3176 FILE *input_file
, *output_file
;
3178 struct stat statbuf
;
3180 /* check input file */
3181 if (stat(input
, &statbuf
)) {
3182 error(1, errno
, "Can not read input firmware %s", input
);
3185 input_file
= fopen(input
, "rb");
3187 error(1, 0, "Can not open input firmware %s", input
);
3189 output_file
= fopen(output
, "wb");
3191 error(1, 0, "Can not open output firmware %s", output
);
3193 if (read_partition_table(input_file
, firmware_offset
, fwup
, MAX_PARTITIONS
, 0) != 0) {
3194 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3197 fwup_os_image
= find_partition(fwup
, MAX_PARTITIONS
,
3198 "os-image", "Error can not find os-image partition (fwup)");
3199 fwup_file_system
= find_partition(fwup
, MAX_PARTITIONS
,
3200 "file-system", "Error can not find file-system partition (fwup)");
3201 fwup_partition_table
= find_partition(fwup
, MAX_PARTITIONS
,
3202 "partition-table", "Error can not find partition-table partition");
3204 /* the flash partition table has a 0x00000004 magic haeder */
3205 if (read_partition_table(input_file
, firmware_offset
+ fwup_partition_table
->base
+ 4, flash
, MAX_PARTITIONS
, 1) != 0)
3206 error(1, 0, "Error can not read the partition table (flash)");
3208 flash_os_image
= find_partition(flash
, MAX_PARTITIONS
,
3209 "os-image", "Error can not find os-image partition (flash)");
3210 flash_file_system
= find_partition(flash
, MAX_PARTITIONS
,
3211 "file-system", "Error can not find file-system partition (flash)");
3213 /* write os_image to 0x0 */
3214 write_partition(input_file
, firmware_offset
, fwup_os_image
, output_file
);
3215 write_ff(output_file
, flash_os_image
->size
- fwup_os_image
->size
);
3217 /* write file-system behind os_image */
3218 fseek(output_file
, flash_file_system
->base
- flash_os_image
->base
, SEEK_SET
);
3219 write_partition(input_file
, firmware_offset
, fwup_file_system
, output_file
);
3220 write_ff(output_file
, flash_file_system
->size
- fwup_file_system
->size
);
3222 fclose(output_file
);
3226 int main(int argc
, char *argv
[]) {
3227 const char *board
= NULL
, *kernel_image
= NULL
, *rootfs_image
= NULL
, *output
= NULL
;
3228 const char *extract_image
= NULL
, *output_directory
= NULL
, *convert_image
= NULL
;
3229 bool add_jffs2_eof
= false, sysupgrade
= false;
3231 struct device_info
*info
;
3232 set_source_date_epoch();
3237 c
= getopt(argc
, argv
, "B:k:r:o:V:jSh:x:d:z:");
3247 kernel_image
= optarg
;
3251 rootfs_image
= optarg
;
3259 sscanf(optarg
, "r%u", &rev
);
3263 add_jffs2_eof
= true;
3275 output_directory
= optarg
;
3279 extract_image
= optarg
;
3283 convert_image
= optarg
;
3292 if (extract_image
|| output_directory
) {
3294 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
3295 if (!output_directory
)
3296 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
3297 extract_firmware(extract_image
, output_directory
);
3298 } else if (convert_image
) {
3300 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
3301 convert_firmware(convert_image
, output
);
3304 error(1, 0, "no board has been specified");
3306 error(1, 0, "no kernel image has been specified");
3308 error(1, 0, "no rootfs image has been specified");
3310 error(1, 0, "no output filename has been specified");
3312 info
= find_board(board
);
3315 error(1, 0, "unsupported board %s", board
);
3317 build_image(output
, kernel_image
, rootfs_image
, rev
, add_jffs2_eof
, sysupgrade
, info
);