ath79: add support for TP-Link CPE610 v2
[openwrt/staging/hauke.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Firmware layout description */
74 struct device_info {
75 const char *id;
76 const char *vendor;
77 const char *support_list;
78 char support_trail;
79 const char *soft_ver;
80 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
81 const char *first_sysupgrade_partition;
82 const char *last_sysupgrade_partition;
83 };
84
85 /** The content of the soft-version structure */
86 struct __attribute__((__packed__)) soft_version {
87 uint32_t magic;
88 uint32_t zero;
89 uint8_t pad1;
90 uint8_t version_major;
91 uint8_t version_minor;
92 uint8_t version_patch;
93 uint8_t year_hi;
94 uint8_t year_lo;
95 uint8_t month;
96 uint8_t day;
97 uint32_t rev;
98 uint8_t pad2;
99 };
100
101
102 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
103
104
105 /**
106 Salt for the MD5 hash
107
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
110 */
111 static const uint8_t md5_salt[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
116 };
117
118
119 /** Firmware layout table */
120 static struct device_info boards[] = {
121 /** Firmware layout for the CPE210/220 V1 */
122 {
123 .id = "CPE210",
124 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
125 .support_list =
126 "SupportList:\r\n"
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail = '\xff',
135 .soft_ver = NULL,
136
137 .partitions = {
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x200000},
144 {"file-system", 0x240000, 0x570000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
151 {NULL, 0, 0}
152 },
153
154 .first_sysupgrade_partition = "os-image",
155 .last_sysupgrade_partition = "support-list",
156 },
157
158 /** Firmware layout for the CPE210 V2 */
159 {
160 .id = "CPE210V2",
161 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
162 .support_list =
163 "SupportList:\r\n"
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail = '\xff',
175 .soft_ver = NULL,
176
177 .partitions = {
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"firmware", 0x40000, 0x770000},
186 {"soft-version", 0x7b0000, 0x00100},
187 {"support-list", 0x7b1000, 0x01000},
188 {"user-config", 0x7c0000, 0x10000},
189 {"default-config", 0x7d0000, 0x10000},
190 {"log", 0x7e0000, 0x10000},
191 {"radio", 0x7f0000, 0x10000},
192 {NULL, 0, 0}
193 },
194
195 .first_sysupgrade_partition = "os-image",
196 .last_sysupgrade_partition = "support-list",
197 },
198
199 /** Firmware layout for the CPE210 V3 */
200 {
201 .id = "CPE210V3",
202 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
203 .support_list =
204 "SupportList:\r\n"
205 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
206 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
207 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
208 "CPE210(TP-LINK|EU|N300-2):3.0\r\n",
209 .support_trail = '\xff',
210 .soft_ver = NULL,
211
212 .partitions = {
213 {"fs-uboot", 0x00000, 0x20000},
214 {"partition-table", 0x20000, 0x01000},
215 {"default-mac", 0x30000, 0x00020},
216 {"product-info", 0x31100, 0x00100},
217 {"device-info", 0x31400, 0x00400},
218 {"signature", 0x32000, 0x00400},
219 {"device-id", 0x33000, 0x00100},
220 {"firmware", 0x40000, 0x770000},
221 {"soft-version", 0x7b0000, 0x00100},
222 {"support-list", 0x7b1000, 0x01000},
223 {"user-config", 0x7c0000, 0x10000},
224 {"default-config", 0x7d0000, 0x10000},
225 {"log", 0x7e0000, 0x10000},
226 {"radio", 0x7f0000, 0x10000},
227 {NULL, 0, 0}
228 },
229
230 .first_sysupgrade_partition = "os-image",
231 .last_sysupgrade_partition = "support-list",
232 },
233
234 /** Firmware layout for the CPE220 V2 */
235 {
236 .id = "CPE220V2",
237 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
238 .support_list =
239 "SupportList:\r\n"
240 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
241 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
242 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
243 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
244 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
245 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
246 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
247 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
248 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
249 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
250 .support_trail = '\xff',
251 .soft_ver = NULL,
252
253 .partitions = {
254 {"fs-uboot", 0x00000, 0x20000},
255 {"partition-table", 0x20000, 0x02000},
256 {"default-mac", 0x30000, 0x00020},
257 {"product-info", 0x31100, 0x00100},
258 {"signature", 0x32000, 0x00400},
259 {"os-image", 0x40000, 0x200000},
260 {"file-system", 0x240000, 0x570000},
261 {"soft-version", 0x7b0000, 0x00100},
262 {"support-list", 0x7b1000, 0x00400},
263 {"user-config", 0x7c0000, 0x10000},
264 {"default-config", 0x7d0000, 0x10000},
265 {"log", 0x7e0000, 0x10000},
266 {"radio", 0x7f0000, 0x10000},
267 {NULL, 0, 0}
268 },
269
270 .first_sysupgrade_partition = "os-image",
271 .last_sysupgrade_partition = "support-list",
272 },
273
274 /** Firmware layout for the CPE220 V3 */
275 {
276 .id = "CPE220V3",
277 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
278 .support_list =
279 "SupportList:\r\n"
280 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
281 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
282 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
283 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
284 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
285 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
286 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
287 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
288 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
289 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
290 .support_trail = '\xff',
291 .soft_ver = NULL,
292
293 .partitions = {
294 {"fs-uboot", 0x00000, 0x20000},
295 {"partition-table", 0x20000, 0x02000},
296 {"default-mac", 0x30000, 0x00020},
297 {"product-info", 0x31100, 0x00100},
298 {"device-info", 0x31400, 0x00400},
299 {"signature", 0x32000, 0x00400},
300 {"device-id", 0x33000, 0x00100},
301 {"firmware", 0x40000, 0x770000},
302 {"soft-version", 0x7b0000, 0x00100},
303 {"support-list", 0x7b1000, 0x01000},
304 {"user-config", 0x7c0000, 0x10000},
305 {"default-config", 0x7d0000, 0x10000},
306 {"log", 0x7e0000, 0x10000},
307 {"radio", 0x7f0000, 0x10000},
308 {NULL, 0, 0}
309 },
310
311 .first_sysupgrade_partition = "os-image",
312 .last_sysupgrade_partition = "support-list",
313 },
314
315 /** Firmware layout for the CPE510/520 V1 */
316 {
317 .id = "CPE510",
318 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
319 .support_list =
320 "SupportList:\r\n"
321 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
322 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
323 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
324 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
325 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
326 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
327 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
328 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
329 .support_trail = '\xff',
330 .soft_ver = NULL,
331
332 .partitions = {
333 {"fs-uboot", 0x00000, 0x20000},
334 {"partition-table", 0x20000, 0x02000},
335 {"default-mac", 0x30000, 0x00020},
336 {"product-info", 0x31100, 0x00100},
337 {"signature", 0x32000, 0x00400},
338 {"os-image", 0x40000, 0x200000},
339 {"file-system", 0x240000, 0x570000},
340 {"soft-version", 0x7b0000, 0x00100},
341 {"support-list", 0x7b1000, 0x00400},
342 {"user-config", 0x7c0000, 0x10000},
343 {"default-config", 0x7d0000, 0x10000},
344 {"log", 0x7e0000, 0x10000},
345 {"radio", 0x7f0000, 0x10000},
346 {NULL, 0, 0}
347 },
348
349 .first_sysupgrade_partition = "os-image",
350 .last_sysupgrade_partition = "support-list",
351 },
352
353 /** Firmware layout for the CPE510 V2 */
354 {
355 .id = "CPE510V2",
356 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
357 .support_list =
358 "SupportList:\r\n"
359 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
360 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
361 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
362 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
363 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
364 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
365 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
366 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
367 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
368 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
369 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
370 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
371 .support_trail = '\xff',
372 .soft_ver = NULL,
373
374 .partitions = {
375 {"fs-uboot", 0x00000, 0x20000},
376 {"partition-table", 0x20000, 0x02000},
377 {"default-mac", 0x30000, 0x00020},
378 {"product-info", 0x31100, 0x00100},
379 {"signature", 0x32000, 0x00400},
380 {"os-image", 0x40000, 0x200000},
381 {"file-system", 0x240000, 0x570000},
382 {"soft-version", 0x7b0000, 0x00100},
383 {"support-list", 0x7b1000, 0x00400},
384 {"user-config", 0x7c0000, 0x10000},
385 {"default-config", 0x7d0000, 0x10000},
386 {"log", 0x7e0000, 0x10000},
387 {"radio", 0x7f0000, 0x10000},
388 {NULL, 0, 0}
389 },
390
391 .first_sysupgrade_partition = "os-image",
392 .last_sysupgrade_partition = "support-list",
393 },
394
395 /** Firmware layout for the CPE510 V3 */
396 {
397 .id = "CPE510V3",
398 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
399 .support_list =
400 "SupportList:\r\n"
401 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
402 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
403 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
404 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
405 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
406 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
407 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
408 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
409 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
410 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
411 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
412 "CPE510(TP-LINK|US|N300-5):3.0\r\n",
413 .support_trail = '\xff',
414 .soft_ver = NULL,
415
416 .partitions = {
417 {"fs-uboot", 0x00000, 0x20000},
418 {"partition-table", 0x20000, 0x02000},
419 {"default-mac", 0x30000, 0x00020},
420 {"product-info", 0x31100, 0x00100},
421 {"signature", 0x32000, 0x00400},
422 {"os-image", 0x40000, 0x200000},
423 {"file-system", 0x240000, 0x570000},
424 {"soft-version", 0x7b0000, 0x00100},
425 {"support-list", 0x7b1000, 0x00400},
426 {"user-config", 0x7c0000, 0x10000},
427 {"default-config", 0x7d0000, 0x10000},
428 {"log", 0x7e0000, 0x10000},
429 {"radio", 0x7f0000, 0x10000},
430 {NULL, 0, 0}
431 },
432
433 .first_sysupgrade_partition = "os-image",
434 .last_sysupgrade_partition = "support-list",
435 },
436
437 /** Firmware layout for the CPE610V1 */
438 {
439 .id = "CPE610V1",
440 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
441 .support_list =
442 "SupportList:\r\n"
443 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
444 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
445 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
446 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
447 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
448 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
449 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
450 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
451 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
452 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
453 .support_trail = '\xff',
454 .soft_ver = NULL,
455
456 .partitions = {
457 {"fs-uboot", 0x00000, 0x20000},
458 {"partition-table", 0x20000, 0x02000},
459 {"default-mac", 0x30000, 0x00020},
460 {"product-info", 0x31100, 0x00100},
461 {"signature", 0x32000, 0x00400},
462 {"os-image", 0x40000, 0x200000},
463 {"file-system", 0x240000, 0x570000},
464 {"soft-version", 0x7b0000, 0x00100},
465 {"support-list", 0x7b1000, 0x00400},
466 {"user-config", 0x7c0000, 0x10000},
467 {"default-config", 0x7d0000, 0x10000},
468 {"log", 0x7e0000, 0x10000},
469 {"radio", 0x7f0000, 0x10000},
470 {NULL, 0, 0}
471 },
472
473 .first_sysupgrade_partition = "os-image",
474 .last_sysupgrade_partition = "support-list",
475 },
476
477 /** Firmware layout for the CPE610V2 */
478 {
479 .id = "CPE610V2",
480 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
481 .support_list =
482 "SupportList:\r\n"
483 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
484 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
485 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
486 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
487 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
488 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
489 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
490 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
491 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
492 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
493 .support_trail = '\xff',
494 .soft_ver = NULL,
495
496 .partitions = {
497 {"fs-uboot", 0x00000, 0x20000},
498 {"partition-table", 0x20000, 0x02000},
499 {"default-mac", 0x30000, 0x00020},
500 {"product-info", 0x31100, 0x00100},
501 {"signature", 0x32000, 0x00400},
502 {"os-image", 0x40000, 0x200000},
503 {"file-system", 0x240000, 0x570000},
504 {"soft-version", 0x7b0000, 0x00100},
505 {"support-list", 0x7b1000, 0x00400},
506 {"user-config", 0x7c0000, 0x10000},
507 {"default-config", 0x7d0000, 0x10000},
508 {"log", 0x7e0000, 0x10000},
509 {"radio", 0x7f0000, 0x10000},
510 {NULL, 0, 0}
511 },
512
513 .first_sysupgrade_partition = "os-image",
514 .last_sysupgrade_partition = "support-list",
515 },
516
517 {
518 .id = "WBS210",
519 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
520 .support_list =
521 "SupportList:\r\n"
522 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
523 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
524 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
525 .support_trail = '\xff',
526 .soft_ver = NULL,
527
528 .partitions = {
529 {"fs-uboot", 0x00000, 0x20000},
530 {"partition-table", 0x20000, 0x02000},
531 {"default-mac", 0x30000, 0x00020},
532 {"product-info", 0x31100, 0x00100},
533 {"signature", 0x32000, 0x00400},
534 {"os-image", 0x40000, 0x200000},
535 {"file-system", 0x240000, 0x570000},
536 {"soft-version", 0x7b0000, 0x00100},
537 {"support-list", 0x7b1000, 0x00400},
538 {"user-config", 0x7c0000, 0x10000},
539 {"default-config", 0x7d0000, 0x10000},
540 {"log", 0x7e0000, 0x10000},
541 {"radio", 0x7f0000, 0x10000},
542 {NULL, 0, 0}
543 },
544
545 .first_sysupgrade_partition = "os-image",
546 .last_sysupgrade_partition = "support-list",
547 },
548
549 {
550 .id = "WBS210V2",
551 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
552 .support_list =
553 "SupportList:\r\n"
554 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
555 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
556 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
557 .support_trail = '\xff',
558 .soft_ver = NULL,
559
560 .partitions = {
561 {"fs-uboot", 0x00000, 0x20000},
562 {"partition-table", 0x20000, 0x02000},
563 {"default-mac", 0x30000, 0x00020},
564 {"product-info", 0x31100, 0x00100},
565 {"signature", 0x32000, 0x00400},
566 {"os-image", 0x40000, 0x200000},
567 {"file-system", 0x240000, 0x570000},
568 {"soft-version", 0x7b0000, 0x00100},
569 {"support-list", 0x7b1000, 0x00400},
570 {"user-config", 0x7c0000, 0x10000},
571 {"default-config", 0x7d0000, 0x10000},
572 {"log", 0x7e0000, 0x10000},
573 {"radio", 0x7f0000, 0x10000},
574 {NULL, 0, 0}
575 },
576
577 .first_sysupgrade_partition = "os-image",
578 .last_sysupgrade_partition = "support-list",
579 },
580
581 {
582 .id = "WBS510",
583 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
584 .support_list =
585 "SupportList:\r\n"
586 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
587 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
588 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
589 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
590 .support_trail = '\xff',
591 .soft_ver = NULL,
592
593 .partitions = {
594 {"fs-uboot", 0x00000, 0x20000},
595 {"partition-table", 0x20000, 0x02000},
596 {"default-mac", 0x30000, 0x00020},
597 {"product-info", 0x31100, 0x00100},
598 {"signature", 0x32000, 0x00400},
599 {"os-image", 0x40000, 0x200000},
600 {"file-system", 0x240000, 0x570000},
601 {"soft-version", 0x7b0000, 0x00100},
602 {"support-list", 0x7b1000, 0x00400},
603 {"user-config", 0x7c0000, 0x10000},
604 {"default-config", 0x7d0000, 0x10000},
605 {"log", 0x7e0000, 0x10000},
606 {"radio", 0x7f0000, 0x10000},
607 {NULL, 0, 0}
608 },
609
610 .first_sysupgrade_partition = "os-image",
611 .last_sysupgrade_partition = "support-list",
612 },
613
614 {
615 .id = "WBS510V2",
616 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
617 .support_list =
618 "SupportList:\r\n"
619 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
620 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
621 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
622 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
623 .support_trail = '\xff',
624 .soft_ver = NULL,
625
626 .partitions = {
627 {"fs-uboot", 0x00000, 0x20000},
628 {"partition-table", 0x20000, 0x02000},
629 {"default-mac", 0x30000, 0x00020},
630 {"product-info", 0x31100, 0x00100},
631 {"signature", 0x32000, 0x00400},
632 {"os-image", 0x40000, 0x200000},
633 {"file-system", 0x240000, 0x570000},
634 {"soft-version", 0x7b0000, 0x00100},
635 {"support-list", 0x7b1000, 0x00400},
636 {"user-config", 0x7c0000, 0x10000},
637 {"default-config", 0x7d0000, 0x10000},
638 {"log", 0x7e0000, 0x10000},
639 {"radio", 0x7f0000, 0x10000},
640 {NULL, 0, 0}
641 },
642
643 .first_sysupgrade_partition = "os-image",
644 .last_sysupgrade_partition = "support-list",
645 },
646
647 /** Firmware layout for the C2600 */
648 {
649 .id = "C2600",
650 .vendor = "",
651 .support_list =
652 "SupportList:\r\n"
653 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
654 .support_trail = '\x00',
655 .soft_ver = NULL,
656
657 /**
658 We use a bigger os-image partition than the stock images (and thus
659 smaller file-system), as our kernel doesn't fit in the stock firmware's
660 2 MB os-image since kernel 4.14.
661 */
662 .partitions = {
663 {"SBL1", 0x00000, 0x20000},
664 {"MIBIB", 0x20000, 0x20000},
665 {"SBL2", 0x40000, 0x20000},
666 {"SBL3", 0x60000, 0x30000},
667 {"DDRCONFIG", 0x90000, 0x10000},
668 {"SSD", 0xa0000, 0x10000},
669 {"TZ", 0xb0000, 0x30000},
670 {"RPM", 0xe0000, 0x20000},
671 {"fs-uboot", 0x100000, 0x70000},
672 {"uboot-env", 0x170000, 0x40000},
673 {"radio", 0x1b0000, 0x40000},
674 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
675 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
676 {"default-mac", 0x1ef0000, 0x00200},
677 {"pin", 0x1ef0200, 0x00200},
678 {"product-info", 0x1ef0400, 0x0fc00},
679 {"partition-table", 0x1f00000, 0x10000},
680 {"soft-version", 0x1f10000, 0x10000},
681 {"support-list", 0x1f20000, 0x10000},
682 {"profile", 0x1f30000, 0x10000},
683 {"default-config", 0x1f40000, 0x10000},
684 {"user-config", 0x1f50000, 0x40000},
685 {"qos-db", 0x1f90000, 0x40000},
686 {"usb-config", 0x1fd0000, 0x10000},
687 {"log", 0x1fe0000, 0x20000},
688 {NULL, 0, 0}
689 },
690
691 .first_sysupgrade_partition = "os-image",
692 .last_sysupgrade_partition = "file-system"
693 },
694
695 /** Firmware layout for the A7-V5 */
696 {
697 .id = "ARCHER-A7-V5",
698 .support_list =
699 "SupportList:\n"
700 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
701 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
702 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
703 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
704 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
705 .support_trail = '\x00',
706 .soft_ver = "soft_ver:1.0.0\n",
707
708 /* We're using a dynamic kernel/rootfs split here */
709 .partitions = {
710 {"factory-boot", 0x00000, 0x20000},
711 {"fs-uboot", 0x20000, 0x20000},
712 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
713 /* Stock: name file-system base 0x160000 size 0xda0000 */
714 {"default-mac", 0xf40000, 0x00200},
715 {"pin", 0xf40200, 0x00200},
716 {"device-id", 0xf40400, 0x00100},
717 {"product-info", 0xf40500, 0x0fb00},
718 {"soft-version", 0xf50000, 0x00100},
719 {"extra-para", 0xf51000, 0x01000},
720 {"support-list", 0xf52000, 0x0a000},
721 {"profile", 0xf5c000, 0x04000},
722 {"default-config", 0xf60000, 0x10000},
723 {"user-config", 0xf70000, 0x40000},
724 {"certificate", 0xfb0000, 0x10000},
725 {"partition-table", 0xfc0000, 0x10000},
726 {"log", 0xfd0000, 0x20000},
727 {"radio", 0xff0000, 0x10000},
728 {NULL, 0, 0}
729 },
730
731 .first_sysupgrade_partition = "os-image",
732 .last_sysupgrade_partition = "file-system",
733 },
734
735 /** Firmware layout for the C2v3 */
736 {
737 .id = "ARCHER-C2-V3",
738 .support_list =
739 "SupportList:\n"
740 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
741 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
742 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
743 .support_trail = '\x00',
744 .soft_ver = "soft_ver:3.0.1\n",
745
746 /** We're using a dynamic kernel/rootfs split here */
747
748 .partitions = {
749 {"factory-boot", 0x00000, 0x20000},
750 {"fs-uboot", 0x20000, 0x10000},
751 {"firmware", 0x30000, 0x7a0000},
752 {"user-config", 0x7d0000, 0x04000},
753 {"default-mac", 0x7e0000, 0x00100},
754 {"device-id", 0x7e0100, 0x00100},
755 {"extra-para", 0x7e0200, 0x00100},
756 {"pin", 0x7e0300, 0x00100},
757 {"support-list", 0x7e0400, 0x00400},
758 {"soft-version", 0x7e0800, 0x00400},
759 {"product-info", 0x7e0c00, 0x01400},
760 {"partition-table", 0x7e2000, 0x01000},
761 {"profile", 0x7e3000, 0x01000},
762 {"default-config", 0x7e4000, 0x04000},
763 {"merge-config", 0x7ec000, 0x02000},
764 {"qos-db", 0x7ee000, 0x02000},
765 {"radio", 0x7f0000, 0x10000},
766 {NULL, 0, 0}
767 },
768
769 .first_sysupgrade_partition = "os-image",
770 .last_sysupgrade_partition = "file-system",
771 },
772
773 /** Firmware layout for the C25v1 */
774 {
775 .id = "ARCHER-C25-V1",
776 .support_list =
777 "SupportList:\n"
778 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
779 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
780 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
781 .support_trail = '\x00',
782 .soft_ver = "soft_ver:1.0.0\n",
783
784 /* We're using a dynamic kernel/rootfs split here */
785 .partitions = {
786 {"factory-boot", 0x00000, 0x20000},
787 {"fs-uboot", 0x20000, 0x10000},
788 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
789 /* Stock: name file-system base 0x130000 size 0x6a0000 */
790 {"user-config", 0x7d0000, 0x04000},
791 {"default-mac", 0x7e0000, 0x00100},
792 {"device-id", 0x7e0100, 0x00100},
793 {"extra-para", 0x7e0200, 0x00100},
794 {"pin", 0x7e0300, 0x00100},
795 {"support-list", 0x7e0400, 0x00400},
796 {"soft-version", 0x7e0800, 0x00400},
797 {"product-info", 0x7e0c00, 0x01400},
798 {"partition-table", 0x7e2000, 0x01000},
799 {"profile", 0x7e3000, 0x01000},
800 {"default-config", 0x7e4000, 0x04000},
801 {"merge-config", 0x7ec000, 0x02000},
802 {"qos-db", 0x7ee000, 0x02000},
803 {"radio", 0x7f0000, 0x10000},
804 {NULL, 0, 0}
805 },
806
807 .first_sysupgrade_partition = "os-image",
808 .last_sysupgrade_partition = "file-system",
809 },
810
811 /** Firmware layout for the C58v1 */
812 {
813 .id = "ARCHER-C58-V1",
814 .vendor = "",
815 .support_list =
816 "SupportList:\r\n"
817 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
818 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
819 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
820 .support_trail = '\x00',
821 .soft_ver = "soft_ver:1.0.0\n",
822
823 .partitions = {
824 {"fs-uboot", 0x00000, 0x10000},
825 {"default-mac", 0x10000, 0x00200},
826 {"pin", 0x10200, 0x00200},
827 {"product-info", 0x10400, 0x00100},
828 {"partition-table", 0x10500, 0x00800},
829 {"soft-version", 0x11300, 0x00200},
830 {"support-list", 0x11500, 0x00100},
831 {"device-id", 0x11600, 0x00100},
832 {"profile", 0x11700, 0x03900},
833 {"default-config", 0x15000, 0x04000},
834 {"user-config", 0x19000, 0x04000},
835 {"firmware", 0x20000, 0x7c8000},
836 {"certyficate", 0x7e8000, 0x08000},
837 {"radio", 0x7f0000, 0x10000},
838 {NULL, 0, 0}
839 },
840
841 .first_sysupgrade_partition = "os-image",
842 .last_sysupgrade_partition = "file-system",
843 },
844
845 /** Firmware layout for the C59v1 */
846 {
847 .id = "ARCHER-C59-V1",
848 .vendor = "",
849 .support_list =
850 "SupportList:\r\n"
851 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
852 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
853 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
854 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
855 .support_trail = '\x00',
856 .soft_ver = "soft_ver:1.0.0\n",
857
858 /* We're using a dynamic kernel/rootfs split here */
859 .partitions = {
860 {"fs-uboot", 0x00000, 0x10000},
861 {"default-mac", 0x10000, 0x00200},
862 {"pin", 0x10200, 0x00200},
863 {"device-id", 0x10400, 0x00100},
864 {"product-info", 0x10500, 0x0fb00},
865 {"firmware", 0x20000, 0xe30000},
866 {"partition-table", 0xe50000, 0x10000},
867 {"soft-version", 0xe60000, 0x10000},
868 {"support-list", 0xe70000, 0x10000},
869 {"profile", 0xe80000, 0x10000},
870 {"default-config", 0xe90000, 0x10000},
871 {"user-config", 0xea0000, 0x40000},
872 {"usb-config", 0xee0000, 0x10000},
873 {"certificate", 0xef0000, 0x10000},
874 {"qos-db", 0xf00000, 0x40000},
875 {"log", 0xfe0000, 0x10000},
876 {"radio", 0xff0000, 0x10000},
877 {NULL, 0, 0}
878 },
879
880 .first_sysupgrade_partition = "os-image",
881 .last_sysupgrade_partition = "file-system",
882 },
883
884 /** Firmware layout for the C59v2 */
885 {
886 .id = "ARCHER-C59-V2",
887 .vendor = "",
888 .support_list =
889 "SupportList:\r\n"
890 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
891 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
892 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
893 .support_trail = '\x00',
894 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
895
896 /** We're using a dynamic kernel/rootfs split here */
897 .partitions = {
898 {"factory-boot", 0x00000, 0x20000},
899 {"fs-uboot", 0x20000, 0x10000},
900 {"default-mac", 0x30000, 0x00200},
901 {"pin", 0x30200, 0x00200},
902 {"device-id", 0x30400, 0x00100},
903 {"product-info", 0x30500, 0x0fb00},
904 {"firmware", 0x40000, 0xe10000},
905 {"partition-table", 0xe50000, 0x10000},
906 {"soft-version", 0xe60000, 0x10000},
907 {"support-list", 0xe70000, 0x10000},
908 {"profile", 0xe80000, 0x10000},
909 {"default-config", 0xe90000, 0x10000},
910 {"user-config", 0xea0000, 0x40000},
911 {"usb-config", 0xee0000, 0x10000},
912 {"certificate", 0xef0000, 0x10000},
913 {"extra-para", 0xf00000, 0x10000},
914 {"qos-db", 0xf10000, 0x30000},
915 {"log", 0xfe0000, 0x10000},
916 {"radio", 0xff0000, 0x10000},
917 {NULL, 0, 0}
918 },
919
920 .first_sysupgrade_partition = "os-image",
921 .last_sysupgrade_partition = "file-system",
922 },
923
924 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
925 {
926 .id = "ARCHER-C6-V2",
927 .vendor = "",
928 .support_list =
929 "SupportList:\r\n"
930 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
931 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
932 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
933 .support_trail = '\x00',
934 .soft_ver = "soft_ver:1.2.1\n",
935
936 .partitions = {
937 {"fs-uboot", 0x00000, 0x20000},
938 {"default-mac", 0x20000, 0x00200},
939 {"pin", 0x20200, 0x00100},
940 {"product-info", 0x20300, 0x00200},
941 {"device-id", 0x20500, 0x0fb00},
942 {"firmware", 0x30000, 0x7a9400},
943 {"soft-version", 0x7d9400, 0x00100},
944 {"extra-para", 0x7d9500, 0x00100},
945 {"support-list", 0x7d9600, 0x00200},
946 {"profile", 0x7d9800, 0x03000},
947 {"default-config", 0x7dc800, 0x03000},
948 {"partition-table", 0x7df800, 0x00800},
949 {"user-config", 0x7e0000, 0x0c000},
950 {"certificate", 0x7ec000, 0x04000},
951 {"radio", 0x7f0000, 0x10000},
952 {NULL, 0, 0}
953 },
954
955 .first_sysupgrade_partition = "os-image",
956 .last_sysupgrade_partition = "file-system",
957 },
958
959 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
960 {
961 .id = "ARCHER-C6-V2-US",
962 .vendor = "",
963 .support_list =
964 "SupportList:\n"
965 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
966 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
967 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
968 .support_trail = '\x00',
969 .soft_ver = "soft_ver:1.1.1\n",
970
971 .partitions = {
972 {"factory-boot", 0x00000, 0x20000},
973 {"default-mac", 0x20000, 0x00200},
974 {"pin", 0x20200, 0x00100},
975 {"product-info", 0x20300, 0x00200},
976 {"device-id", 0x20500, 0x0fb00},
977 {"fs-uboot", 0x30000, 0x20000},
978 {"firmware", 0x50000, 0xf89400},
979 {"soft-version", 0xfd9400, 0x00100},
980 {"extra-para", 0xfd9500, 0x00100},
981 {"support-list", 0xfd9600, 0x00200},
982 {"profile", 0xfd9800, 0x03000},
983 {"default-config", 0xfdc800, 0x03000},
984 {"partition-table", 0xfdf800, 0x00800},
985 {"user-config", 0xfe0000, 0x0c000},
986 {"certificate", 0xfec000, 0x04000},
987 {"radio", 0xff0000, 0x10000},
988 {NULL, 0, 0}
989 },
990 .first_sysupgrade_partition = "os-image",
991 .last_sysupgrade_partition = "file-system",
992 },
993
994 /** Firmware layout for the C60v1 */
995 {
996 .id = "ARCHER-C60-V1",
997 .vendor = "",
998 .support_list =
999 "SupportList:\r\n"
1000 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1001 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1002 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1003 .support_trail = '\x00',
1004 .soft_ver = "soft_ver:1.0.0\n",
1005
1006 .partitions = {
1007 {"fs-uboot", 0x00000, 0x10000},
1008 {"default-mac", 0x10000, 0x00200},
1009 {"pin", 0x10200, 0x00200},
1010 {"product-info", 0x10400, 0x00100},
1011 {"partition-table", 0x10500, 0x00800},
1012 {"soft-version", 0x11300, 0x00200},
1013 {"support-list", 0x11500, 0x00100},
1014 {"device-id", 0x11600, 0x00100},
1015 {"profile", 0x11700, 0x03900},
1016 {"default-config", 0x15000, 0x04000},
1017 {"user-config", 0x19000, 0x04000},
1018 {"firmware", 0x20000, 0x7c8000},
1019 {"certyficate", 0x7e8000, 0x08000},
1020 {"radio", 0x7f0000, 0x10000},
1021 {NULL, 0, 0}
1022 },
1023
1024 .first_sysupgrade_partition = "os-image",
1025 .last_sysupgrade_partition = "file-system",
1026 },
1027
1028 /** Firmware layout for the C60v2 */
1029 {
1030 .id = "ARCHER-C60-V2",
1031 .vendor = "",
1032 .support_list =
1033 "SupportList:\r\n"
1034 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1035 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1036 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1037 .support_trail = '\x00',
1038 .soft_ver = "soft_ver:2.0.0\n",
1039
1040 .partitions = {
1041 {"factory-boot", 0x00000, 0x1fb00},
1042 {"default-mac", 0x1fb00, 0x00200},
1043 {"pin", 0x1fd00, 0x00100},
1044 {"product-info", 0x1fe00, 0x00100},
1045 {"device-id", 0x1ff00, 0x00100},
1046 {"fs-uboot", 0x20000, 0x10000},
1047 {"firmware", 0x30000, 0x7a0000},
1048 {"soft-version", 0x7d9500, 0x00100},
1049 {"support-list", 0x7d9600, 0x00100},
1050 {"extra-para", 0x7d9700, 0x00100},
1051 {"profile", 0x7d9800, 0x03000},
1052 {"default-config", 0x7dc800, 0x03000},
1053 {"partition-table", 0x7df800, 0x00800},
1054 {"user-config", 0x7e0000, 0x0c000},
1055 {"certificate", 0x7ec000, 0x04000},
1056 {"radio", 0x7f0000, 0x10000},
1057 {NULL, 0, 0}
1058 },
1059
1060 .first_sysupgrade_partition = "os-image",
1061 .last_sysupgrade_partition = "file-system",
1062 },
1063
1064 /** Firmware layout for the C60v3 */
1065 {
1066 .id = "ARCHER-C60-V3",
1067 .vendor = "",
1068 .support_list =
1069 "SupportList:\r\n"
1070 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1071 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1072 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1073 .support_trail = '\x00',
1074 .soft_ver = "soft_ver:3.0.0\n",
1075
1076 .partitions = {
1077 {"factory-boot", 0x00000, 0x1fb00},
1078 {"default-mac", 0x1fb00, 0x00200},
1079 {"pin", 0x1fd00, 0x00100},
1080 {"product-info", 0x1fe00, 0x00100},
1081 {"device-id", 0x1ff00, 0x00100},
1082 {"fs-uboot", 0x20000, 0x10000},
1083 {"firmware", 0x30000, 0x7a0000},
1084 {"soft-version", 0x7d9500, 0x00100},
1085 {"support-list", 0x7d9600, 0x00100},
1086 {"extra-para", 0x7d9700, 0x00100},
1087 {"profile", 0x7d9800, 0x03000},
1088 {"default-config", 0x7dc800, 0x03000},
1089 {"partition-table", 0x7df800, 0x00800},
1090 {"user-config", 0x7e0000, 0x0c000},
1091 {"certificate", 0x7ec000, 0x04000},
1092 {"radio", 0x7f0000, 0x10000},
1093 {NULL, 0, 0}
1094 },
1095
1096 .first_sysupgrade_partition = "os-image",
1097 .last_sysupgrade_partition = "file-system",
1098 },
1099
1100 /** Firmware layout for the C5 */
1101 {
1102 .id = "ARCHER-C5-V2",
1103 .vendor = "",
1104 .support_list =
1105 "SupportList:\r\n"
1106 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1107 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1108 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1109 .support_trail = '\x00',
1110 .soft_ver = NULL,
1111
1112 .partitions = {
1113 {"fs-uboot", 0x00000, 0x40000},
1114 {"os-image", 0x40000, 0x200000},
1115 {"file-system", 0x240000, 0xc00000},
1116 {"default-mac", 0xe40000, 0x00200},
1117 {"pin", 0xe40200, 0x00200},
1118 {"product-info", 0xe40400, 0x00200},
1119 {"partition-table", 0xe50000, 0x10000},
1120 {"soft-version", 0xe60000, 0x00200},
1121 {"support-list", 0xe61000, 0x0f000},
1122 {"profile", 0xe70000, 0x10000},
1123 {"default-config", 0xe80000, 0x10000},
1124 {"user-config", 0xe90000, 0x50000},
1125 {"log", 0xee0000, 0x100000},
1126 {"radio_bk", 0xfe0000, 0x10000},
1127 {"radio", 0xff0000, 0x10000},
1128 {NULL, 0, 0}
1129 },
1130
1131 .first_sysupgrade_partition = "os-image",
1132 .last_sysupgrade_partition = "file-system"
1133 },
1134
1135 /** Firmware layout for the C7 */
1136 {
1137 .id = "ARCHER-C7-V4",
1138 .support_list =
1139 "SupportList:\n"
1140 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1141 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1142 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1143 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1144 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1145 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1146 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1147 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1148 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1149 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1150 .support_trail = '\x00',
1151 .soft_ver = "soft_ver:1.0.0\n",
1152
1153 /* We're using a dynamic kernel/rootfs split here */
1154 .partitions = {
1155 {"factory-boot", 0x00000, 0x20000},
1156 {"fs-uboot", 0x20000, 0x20000},
1157 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1158 /* Stock: name file-system base 0x160000 size 0xda0000 */
1159 {"default-mac", 0xf00000, 0x00200},
1160 {"pin", 0xf00200, 0x00200},
1161 {"device-id", 0xf00400, 0x00100},
1162 {"product-info", 0xf00500, 0x0fb00},
1163 {"soft-version", 0xf10000, 0x00100},
1164 {"extra-para", 0xf11000, 0x01000},
1165 {"support-list", 0xf12000, 0x0a000},
1166 {"profile", 0xf1c000, 0x04000},
1167 {"default-config", 0xf20000, 0x10000},
1168 {"user-config", 0xf30000, 0x40000},
1169 {"qos-db", 0xf70000, 0x40000},
1170 {"certificate", 0xfb0000, 0x10000},
1171 {"partition-table", 0xfc0000, 0x10000},
1172 {"log", 0xfd0000, 0x20000},
1173 {"radio", 0xff0000, 0x10000},
1174 {NULL, 0, 0}
1175 },
1176
1177 .first_sysupgrade_partition = "os-image",
1178 .last_sysupgrade_partition = "file-system",
1179 },
1180
1181 /** Firmware layout for the C7 v5*/
1182 {
1183 .id = "ARCHER-C7-V5",
1184 .support_list =
1185 "SupportList:\n"
1186 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1187 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1188 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1189 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1190 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1191 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1192 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1193 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1194
1195 .support_trail = '\x00',
1196 .soft_ver = "soft_ver:1.0.0\n",
1197
1198 /* We're using a dynamic kernel/rootfs split here */
1199 .partitions = {
1200 {"factory-boot", 0x00000, 0x20000},
1201 {"fs-uboot", 0x20000, 0x20000},
1202 {"partition-table", 0x40000, 0x10000},
1203 {"radio", 0x50000, 0x10000},
1204 {"default-mac", 0x60000, 0x00200},
1205 {"pin", 0x60200, 0x00200},
1206 {"device-id", 0x60400, 0x00100},
1207 {"product-info", 0x60500, 0x0fb00},
1208 {"soft-version", 0x70000, 0x01000},
1209 {"extra-para", 0x71000, 0x01000},
1210 {"support-list", 0x72000, 0x0a000},
1211 {"profile", 0x7c000, 0x04000},
1212 {"user-config", 0x80000, 0x40000},
1213
1214
1215 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1216 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1217
1218 {"log", 0xfc0000, 0x20000},
1219 {"certificate", 0xfe0000, 0x10000},
1220 {"default-config", 0xff0000, 0x10000},
1221 {NULL, 0, 0}
1222
1223 },
1224
1225 .first_sysupgrade_partition = "os-image",
1226 .last_sysupgrade_partition = "file-system",
1227 },
1228
1229 /** Firmware layout for the C9 */
1230 {
1231 .id = "ARCHERC9",
1232 .vendor = "",
1233 .support_list =
1234 "SupportList:\n"
1235 "{product_name:ArcherC9,"
1236 "product_ver:1.0.0,"
1237 "special_id:00000000}\n",
1238 .support_trail = '\x00',
1239 .soft_ver = NULL,
1240
1241 .partitions = {
1242 {"fs-uboot", 0x00000, 0x40000},
1243 {"os-image", 0x40000, 0x200000},
1244 {"file-system", 0x240000, 0xc00000},
1245 {"default-mac", 0xe40000, 0x00200},
1246 {"pin", 0xe40200, 0x00200},
1247 {"product-info", 0xe40400, 0x00200},
1248 {"partition-table", 0xe50000, 0x10000},
1249 {"soft-version", 0xe60000, 0x00200},
1250 {"support-list", 0xe61000, 0x0f000},
1251 {"profile", 0xe70000, 0x10000},
1252 {"default-config", 0xe80000, 0x10000},
1253 {"user-config", 0xe90000, 0x50000},
1254 {"log", 0xee0000, 0x100000},
1255 {"radio_bk", 0xfe0000, 0x10000},
1256 {"radio", 0xff0000, 0x10000},
1257 {NULL, 0, 0}
1258 },
1259
1260 .first_sysupgrade_partition = "os-image",
1261 .last_sysupgrade_partition = "file-system"
1262 },
1263
1264 /** Firmware layout for the EAP120 */
1265 {
1266 .id = "EAP120",
1267 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1268 .support_list =
1269 "SupportList:\r\n"
1270 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1271 .support_trail = '\xff',
1272 .soft_ver = NULL,
1273
1274 .partitions = {
1275 {"fs-uboot", 0x00000, 0x20000},
1276 {"partition-table", 0x20000, 0x02000},
1277 {"default-mac", 0x30000, 0x00020},
1278 {"support-list", 0x31000, 0x00100},
1279 {"product-info", 0x31100, 0x00100},
1280 {"soft-version", 0x32000, 0x00100},
1281 {"os-image", 0x40000, 0x180000},
1282 {"file-system", 0x1c0000, 0x600000},
1283 {"user-config", 0x7c0000, 0x10000},
1284 {"backup-config", 0x7d0000, 0x10000},
1285 {"log", 0x7e0000, 0x10000},
1286 {"radio", 0x7f0000, 0x10000},
1287 {NULL, 0, 0}
1288 },
1289
1290 .first_sysupgrade_partition = "os-image",
1291 .last_sysupgrade_partition = "file-system"
1292 },
1293
1294 /** Firmware layout for the TL-WA850RE v2 */
1295 {
1296 .id = "TLWA850REV2",
1297 .vendor = "",
1298 .support_list =
1299 "SupportList:\n"
1300 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1301 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1302 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1303 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1304 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1305 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1306 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1307 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1308 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1309 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1310 .support_trail = '\x00',
1311 .soft_ver = NULL,
1312
1313 /**
1314 576KB were moved from file-system to os-image
1315 in comparison to the stock image
1316 */
1317 .partitions = {
1318 {"fs-uboot", 0x00000, 0x20000},
1319 {"firmware", 0x20000, 0x390000},
1320 {"partition-table", 0x3b0000, 0x02000},
1321 {"default-mac", 0x3c0000, 0x00020},
1322 {"pin", 0x3c0100, 0x00020},
1323 {"product-info", 0x3c1000, 0x01000},
1324 {"soft-version", 0x3c2000, 0x00100},
1325 {"support-list", 0x3c3000, 0x01000},
1326 {"profile", 0x3c4000, 0x08000},
1327 {"user-config", 0x3d0000, 0x10000},
1328 {"default-config", 0x3e0000, 0x10000},
1329 {"radio", 0x3f0000, 0x10000},
1330 {NULL, 0, 0}
1331 },
1332
1333 .first_sysupgrade_partition = "os-image",
1334 .last_sysupgrade_partition = "file-system"
1335 },
1336
1337 /** Firmware layout for the TL-WA855RE v1 */
1338 {
1339 .id = "TLWA855REV1",
1340 .vendor = "",
1341 .support_list =
1342 "SupportList:\n"
1343 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1344 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1345 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1346 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1347 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1348 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1349 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1350 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1351 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1352 .support_trail = '\x00',
1353 .soft_ver = NULL,
1354
1355 .partitions = {
1356 {"fs-uboot", 0x00000, 0x20000},
1357 {"os-image", 0x20000, 0x150000},
1358 {"file-system", 0x170000, 0x240000},
1359 {"partition-table", 0x3b0000, 0x02000},
1360 {"default-mac", 0x3c0000, 0x00020},
1361 {"pin", 0x3c0100, 0x00020},
1362 {"product-info", 0x3c1000, 0x01000},
1363 {"soft-version", 0x3c2000, 0x00100},
1364 {"support-list", 0x3c3000, 0x01000},
1365 {"profile", 0x3c4000, 0x08000},
1366 {"user-config", 0x3d0000, 0x10000},
1367 {"default-config", 0x3e0000, 0x10000},
1368 {"radio", 0x3f0000, 0x10000},
1369 {NULL, 0, 0}
1370 },
1371
1372 .first_sysupgrade_partition = "os-image",
1373 .last_sysupgrade_partition = "file-system"
1374 },
1375
1376 /** Firmware layout for the TL-WR1043 v5 */
1377 {
1378 .id = "TLWR1043NV5",
1379 .vendor = "",
1380 .support_list =
1381 "SupportList:\n"
1382 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1383 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1384 .support_trail = '\x00',
1385 .soft_ver = "soft_ver:1.0.0\n",
1386 .partitions = {
1387 {"factory-boot", 0x00000, 0x20000},
1388 {"fs-uboot", 0x20000, 0x20000},
1389 {"firmware", 0x40000, 0xec0000},
1390 {"default-mac", 0xf00000, 0x00200},
1391 {"pin", 0xf00200, 0x00200},
1392 {"device-id", 0xf00400, 0x00100},
1393 {"product-info", 0xf00500, 0x0fb00},
1394 {"soft-version", 0xf10000, 0x01000},
1395 {"extra-para", 0xf11000, 0x01000},
1396 {"support-list", 0xf12000, 0x0a000},
1397 {"profile", 0xf1c000, 0x04000},
1398 {"default-config", 0xf20000, 0x10000},
1399 {"user-config", 0xf30000, 0x40000},
1400 {"qos-db", 0xf70000, 0x40000},
1401 {"certificate", 0xfb0000, 0x10000},
1402 {"partition-table", 0xfc0000, 0x10000},
1403 {"log", 0xfd0000, 0x20000},
1404 {"radio", 0xff0000, 0x10000},
1405 {NULL, 0, 0}
1406 },
1407 .first_sysupgrade_partition = "os-image",
1408 .last_sysupgrade_partition = "file-system"
1409 },
1410
1411 /** Firmware layout for the TL-WR1043 v4 */
1412 {
1413 .id = "TLWR1043NDV4",
1414 .vendor = "",
1415 .support_list =
1416 "SupportList:\n"
1417 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1418 .support_trail = '\x00',
1419 .soft_ver = NULL,
1420
1421 /* We're using a dynamic kernel/rootfs split here */
1422 .partitions = {
1423 {"fs-uboot", 0x00000, 0x20000},
1424 {"firmware", 0x20000, 0xf30000},
1425 {"default-mac", 0xf50000, 0x00200},
1426 {"pin", 0xf50200, 0x00200},
1427 {"product-info", 0xf50400, 0x0fc00},
1428 {"soft-version", 0xf60000, 0x0b000},
1429 {"support-list", 0xf6b000, 0x04000},
1430 {"profile", 0xf70000, 0x04000},
1431 {"default-config", 0xf74000, 0x0b000},
1432 {"user-config", 0xf80000, 0x40000},
1433 {"partition-table", 0xfc0000, 0x10000},
1434 {"log", 0xfd0000, 0x20000},
1435 {"radio", 0xff0000, 0x10000},
1436 {NULL, 0, 0}
1437 },
1438
1439 .first_sysupgrade_partition = "os-image",
1440 .last_sysupgrade_partition = "file-system"
1441 },
1442
1443 /** Firmware layout for the TL-WR902AC v1 */
1444 {
1445 .id = "TL-WR902AC-V1",
1446 .vendor = "",
1447 .support_list =
1448 "SupportList:\n"
1449 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1450 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1451 .support_trail = '\x00',
1452 .soft_ver = NULL,
1453
1454 /**
1455 384KB were moved from file-system to os-image
1456 in comparison to the stock image
1457 */
1458 .partitions = {
1459 {"fs-uboot", 0x00000, 0x20000},
1460 {"firmware", 0x20000, 0x730000},
1461 {"default-mac", 0x750000, 0x00200},
1462 {"pin", 0x750200, 0x00200},
1463 {"product-info", 0x750400, 0x0fc00},
1464 {"soft-version", 0x760000, 0x0b000},
1465 {"support-list", 0x76b000, 0x04000},
1466 {"profile", 0x770000, 0x04000},
1467 {"default-config", 0x774000, 0x0b000},
1468 {"user-config", 0x780000, 0x40000},
1469 {"partition-table", 0x7c0000, 0x10000},
1470 {"log", 0x7d0000, 0x20000},
1471 {"radio", 0x7f0000, 0x10000},
1472 {NULL, 0, 0}
1473 },
1474
1475 .first_sysupgrade_partition = "os-image",
1476 .last_sysupgrade_partition = "file-system",
1477 },
1478
1479 /** Firmware layout for the TL-WR942N V1 */
1480 {
1481 .id = "TLWR942NV1",
1482 .vendor = "",
1483 .support_list =
1484 "SupportList:\r\n"
1485 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1486 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1487 .support_trail = '\x00',
1488 .soft_ver = NULL,
1489
1490 .partitions = {
1491 {"fs-uboot", 0x00000, 0x20000},
1492 {"firmware", 0x20000, 0xe20000},
1493 {"default-mac", 0xe40000, 0x00200},
1494 {"pin", 0xe40200, 0x00200},
1495 {"product-info", 0xe40400, 0x0fc00},
1496 {"partition-table", 0xe50000, 0x10000},
1497 {"soft-version", 0xe60000, 0x10000},
1498 {"support-list", 0xe70000, 0x10000},
1499 {"profile", 0xe80000, 0x10000},
1500 {"default-config", 0xe90000, 0x10000},
1501 {"user-config", 0xea0000, 0x40000},
1502 {"qos-db", 0xee0000, 0x40000},
1503 {"certificate", 0xf20000, 0x10000},
1504 {"usb-config", 0xfb0000, 0x10000},
1505 {"log", 0xfc0000, 0x20000},
1506 {"radio-bk", 0xfe0000, 0x10000},
1507 {"radio", 0xff0000, 0x10000},
1508 {NULL, 0, 0}
1509 },
1510
1511 .first_sysupgrade_partition = "os-image",
1512 .last_sysupgrade_partition = "file-system",
1513 },
1514
1515 /** Firmware layout for the RE200 v2 */
1516 {
1517 .id = "RE200-V2",
1518 .vendor = "",
1519 .support_list =
1520 "SupportList:\n"
1521 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1522 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1523 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1524 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1525 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1526 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1527 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1528 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1529 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1530 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1531 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1532 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1533 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1534 .support_trail = '\x00',
1535 .soft_ver = NULL,
1536
1537 .partitions = {
1538 {"fs-uboot", 0x00000, 0x20000},
1539 {"firmware", 0x20000, 0x7a0000},
1540 {"partition-table", 0x7c0000, 0x02000},
1541 {"default-mac", 0x7c2000, 0x00020},
1542 {"pin", 0x7c2100, 0x00020},
1543 {"product-info", 0x7c3100, 0x01000},
1544 {"soft-version", 0x7c4200, 0x01000},
1545 {"support-list", 0x7c5200, 0x01000},
1546 {"profile", 0x7c6200, 0x08000},
1547 {"config-info", 0x7ce200, 0x00400},
1548 {"user-config", 0x7d0000, 0x10000},
1549 {"default-config", 0x7e0000, 0x10000},
1550 {"radio", 0x7f0000, 0x10000},
1551 {NULL, 0, 0}
1552 },
1553
1554 .first_sysupgrade_partition = "os-image",
1555 .last_sysupgrade_partition = "file-system"
1556 },
1557
1558 /** Firmware layout for the RE305 v1 */
1559 {
1560 .id = "RE305-V1",
1561 .vendor = "",
1562 .support_list =
1563 "SupportList:\n"
1564 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
1565 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
1566 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
1567 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
1568 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
1569 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
1570 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
1571 .support_trail = '\x00',
1572 .soft_ver = NULL,
1573
1574 .partitions = {
1575 {"fs-uboot", 0x00000, 0x20000},
1576 {"firmware", 0x20000, 0x5e0000},
1577 {"partition-table", 0x600000, 0x02000},
1578 {"default-mac", 0x610000, 0x00020},
1579 {"pin", 0x610100, 0x00020},
1580 {"product-info", 0x611100, 0x01000},
1581 {"soft-version", 0x620000, 0x01000},
1582 {"support-list", 0x621000, 0x01000},
1583 {"profile", 0x622000, 0x08000},
1584 {"user-config", 0x630000, 0x10000},
1585 {"default-config", 0x640000, 0x10000},
1586 {"radio", 0x7f0000, 0x10000},
1587 {NULL, 0, 0}
1588 },
1589
1590 .first_sysupgrade_partition = "os-image",
1591 .last_sysupgrade_partition = "file-system"
1592 },
1593
1594 /** Firmware layout for the RE350 v1 */
1595 {
1596 .id = "RE350-V1",
1597 .vendor = "",
1598 .support_list =
1599 "SupportList:\n"
1600 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1601 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1602 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1603 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1604 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1605 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1606 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1607 .support_trail = '\x00',
1608 .soft_ver = NULL,
1609
1610 /** We're using a dynamic kernel/rootfs split here */
1611 .partitions = {
1612 {"fs-uboot", 0x00000, 0x20000},
1613 {"firmware", 0x20000, 0x5e0000},
1614 {"partition-table", 0x600000, 0x02000},
1615 {"default-mac", 0x610000, 0x00020},
1616 {"pin", 0x610100, 0x00020},
1617 {"product-info", 0x611100, 0x01000},
1618 {"soft-version", 0x620000, 0x01000},
1619 {"support-list", 0x621000, 0x01000},
1620 {"profile", 0x622000, 0x08000},
1621 {"user-config", 0x630000, 0x10000},
1622 {"default-config", 0x640000, 0x10000},
1623 {"radio", 0x7f0000, 0x10000},
1624 {NULL, 0, 0}
1625 },
1626
1627 .first_sysupgrade_partition = "os-image",
1628 .last_sysupgrade_partition = "file-system"
1629 },
1630
1631 /** Firmware layout for the RE350K v1 */
1632 {
1633 .id = "RE350K-V1",
1634 .vendor = "",
1635 .support_list =
1636 "SupportList:\n"
1637 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
1638 .support_trail = '\x00',
1639 .soft_ver = NULL,
1640
1641 /** We're using a dynamic kernel/rootfs split here */
1642 .partitions = {
1643 {"fs-uboot", 0x00000, 0x20000},
1644 {"firmware", 0x20000, 0xd70000},
1645 {"partition-table", 0xd90000, 0x02000},
1646 {"default-mac", 0xda0000, 0x00020},
1647 {"pin", 0xda0100, 0x00020},
1648 {"product-info", 0xda1100, 0x01000},
1649 {"soft-version", 0xdb0000, 0x01000},
1650 {"support-list", 0xdb1000, 0x01000},
1651 {"profile", 0xdb2000, 0x08000},
1652 {"user-config", 0xdc0000, 0x10000},
1653 {"default-config", 0xdd0000, 0x10000},
1654 {"device-id", 0xde0000, 0x00108},
1655 {"radio", 0xff0000, 0x10000},
1656 {NULL, 0, 0}
1657 },
1658
1659 .first_sysupgrade_partition = "os-image",
1660 .last_sysupgrade_partition = "file-system"
1661 },
1662
1663 /** Firmware layout for the RE355 */
1664 {
1665 .id = "RE355",
1666 .vendor = "",
1667 .support_list =
1668 "SupportList:\r\n"
1669 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
1670 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
1671 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
1672 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
1673 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
1674 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
1675 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
1676 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
1677 .support_trail = '\x00',
1678 .soft_ver = NULL,
1679
1680 /* We're using a dynamic kernel/rootfs split here */
1681 .partitions = {
1682 {"fs-uboot", 0x00000, 0x20000},
1683 {"firmware", 0x20000, 0x5e0000},
1684 {"partition-table", 0x600000, 0x02000},
1685 {"default-mac", 0x610000, 0x00020},
1686 {"pin", 0x610100, 0x00020},
1687 {"product-info", 0x611100, 0x01000},
1688 {"soft-version", 0x620000, 0x01000},
1689 {"support-list", 0x621000, 0x01000},
1690 {"profile", 0x622000, 0x08000},
1691 {"user-config", 0x630000, 0x10000},
1692 {"default-config", 0x640000, 0x10000},
1693 {"radio", 0x7f0000, 0x10000},
1694 {NULL, 0, 0}
1695 },
1696
1697 .first_sysupgrade_partition = "os-image",
1698 .last_sysupgrade_partition = "file-system"
1699 },
1700
1701 /** Firmware layout for the RE450 */
1702 {
1703 .id = "RE450",
1704 .vendor = "",
1705 .support_list =
1706 "SupportList:\r\n"
1707 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
1708 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
1709 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
1710 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
1711 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
1712 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
1713 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
1714 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
1715 .support_trail = '\x00',
1716 .soft_ver = NULL,
1717
1718 /** We're using a dynamic kernel/rootfs split here */
1719 .partitions = {
1720 {"fs-uboot", 0x00000, 0x20000},
1721 {"firmware", 0x20000, 0x5e0000},
1722 {"partition-table", 0x600000, 0x02000},
1723 {"default-mac", 0x610000, 0x00020},
1724 {"pin", 0x610100, 0x00020},
1725 {"product-info", 0x611100, 0x01000},
1726 {"soft-version", 0x620000, 0x01000},
1727 {"support-list", 0x621000, 0x01000},
1728 {"profile", 0x622000, 0x08000},
1729 {"user-config", 0x630000, 0x10000},
1730 {"default-config", 0x640000, 0x10000},
1731 {"radio", 0x7f0000, 0x10000},
1732 {NULL, 0, 0}
1733 },
1734
1735 .first_sysupgrade_partition = "os-image",
1736 .last_sysupgrade_partition = "file-system"
1737 },
1738
1739 /** Firmware layout for the RE450 v2 */
1740 {
1741 .id = "RE450-V2",
1742 .vendor = "",
1743 .support_list =
1744 "SupportList:\r\n"
1745 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
1746 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
1747 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
1748 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
1749 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
1750 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
1751 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
1752 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
1753 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
1754 .support_trail = '\x00',
1755 .soft_ver = NULL,
1756
1757 /* We're using a dynamic kernel/rootfs split here */
1758 .partitions = {
1759 {"fs-uboot", 0x00000, 0x20000},
1760 {"firmware", 0x20000, 0x5e0000},
1761 {"partition-table", 0x600000, 0x02000},
1762 {"default-mac", 0x610000, 0x00020},
1763 {"pin", 0x610100, 0x00020},
1764 {"product-info", 0x611100, 0x01000},
1765 {"soft-version", 0x620000, 0x01000},
1766 {"support-list", 0x621000, 0x01000},
1767 {"profile", 0x622000, 0x08000},
1768 {"user-config", 0x630000, 0x10000},
1769 {"default-config", 0x640000, 0x10000},
1770 {"radio", 0x7f0000, 0x10000},
1771 {NULL, 0, 0}
1772 },
1773
1774 .first_sysupgrade_partition = "os-image",
1775 .last_sysupgrade_partition = "file-system"
1776 },
1777
1778 /** Firmware layout for the RE450 v3 */
1779 {
1780 .id = "RE450-V3",
1781 .vendor = "",
1782 .support_list =
1783 "SupportList:\r\n"
1784 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
1785 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
1786 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
1787 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
1788 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
1789 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
1790 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
1791 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
1792 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
1793 .support_trail = '\x00',
1794 .soft_ver = NULL,
1795
1796 /* We're using a dynamic kernel/rootfs split here */
1797 .partitions = {
1798 {"fs-uboot", 0x00000, 0x20000},
1799 {"default-mac", 0x20000, 0x00020},
1800 {"pin", 0x20020, 0x00020},
1801 {"product-info", 0x21000, 0x01000},
1802 {"partition-table", 0x22000, 0x02000},
1803 {"soft-version", 0x24000, 0x01000},
1804 {"support-list", 0x25000, 0x01000},
1805 {"profile", 0x26000, 0x08000},
1806 {"user-config", 0x2e000, 0x10000},
1807 {"default-config", 0x3e000, 0x10000},
1808 {"config-info", 0x4e000, 0x00400},
1809 {"firmware", 0x50000, 0x7a0000},
1810 {"radio", 0x7f0000, 0x10000},
1811 {NULL, 0, 0}
1812 },
1813
1814 .first_sysupgrade_partition = "os-image",
1815 .last_sysupgrade_partition = "file-system"
1816 },
1817
1818 /** Firmware layout for the RE650 */
1819 {
1820 .id = "RE650-V1",
1821 .vendor = "",
1822 .support_list =
1823 "SupportList:\r\n"
1824 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
1825 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
1826 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
1827 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
1828 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
1829 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
1830 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
1831 .support_trail = '\x00',
1832 .soft_ver = NULL,
1833
1834 /* We're using a dynamic kernel/rootfs split here */
1835 .partitions = {
1836 {"fs-uboot", 0x00000, 0x20000},
1837 {"firmware", 0x20000, 0xde0000},
1838 {"partition-table", 0xe00000, 0x02000},
1839 {"default-mac", 0xe10000, 0x00020},
1840 {"pin", 0xe10100, 0x00020},
1841 {"product-info", 0xe11100, 0x01000},
1842 {"soft-version", 0xe20000, 0x01000},
1843 {"support-list", 0xe21000, 0x01000},
1844 {"profile", 0xe22000, 0x08000},
1845 {"user-config", 0xe30000, 0x10000},
1846 {"default-config", 0xe40000, 0x10000},
1847 {"radio", 0xff0000, 0x10000},
1848 {NULL, 0, 0}
1849 },
1850
1851 .first_sysupgrade_partition = "os-image",
1852 .last_sysupgrade_partition = "file-system"
1853 },
1854
1855 {}
1856 };
1857
1858 #define error(_ret, _errno, _str, ...) \
1859 do { \
1860 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
1861 strerror(_errno)); \
1862 if (_ret) \
1863 exit(_ret); \
1864 } while (0)
1865
1866
1867 /** Stores a uint32 as big endian */
1868 static inline void put32(uint8_t *buf, uint32_t val) {
1869 buf[0] = val >> 24;
1870 buf[1] = val >> 16;
1871 buf[2] = val >> 8;
1872 buf[3] = val;
1873 }
1874
1875 /** Allocates a new image partition */
1876 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
1877 struct image_partition_entry entry = {name, len, malloc(len)};
1878 if (!entry.data)
1879 error(1, errno, "malloc");
1880
1881 return entry;
1882 }
1883
1884 /** Frees an image partition */
1885 static void free_image_partition(struct image_partition_entry entry) {
1886 free(entry.data);
1887 }
1888
1889 static time_t source_date_epoch = -1;
1890 static void set_source_date_epoch() {
1891 char *env = getenv("SOURCE_DATE_EPOCH");
1892 char *endptr = env;
1893 errno = 0;
1894 if (env && *env) {
1895 source_date_epoch = strtoull(env, &endptr, 10);
1896 if (errno || (endptr && *endptr != '\0')) {
1897 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
1898 exit(1);
1899 }
1900 }
1901 }
1902
1903 /** Generates the partition-table partition */
1904 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
1905 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
1906
1907 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
1908
1909 *(s++) = 0x00;
1910 *(s++) = 0x04;
1911 *(s++) = 0x00;
1912 *(s++) = 0x00;
1913
1914 size_t i;
1915 for (i = 0; p[i].name; i++) {
1916 size_t len = end-s;
1917 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
1918
1919 if (w > len-1)
1920 error(1, 0, "flash partition table overflow?");
1921
1922 s += w;
1923 }
1924
1925 s++;
1926
1927 memset(s, 0xff, end-s);
1928
1929 return entry;
1930 }
1931
1932
1933 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
1934 static inline uint8_t bcd(uint8_t v) {
1935 return 0x10 * (v/10) + v%10;
1936 }
1937
1938
1939 /** Generates the soft-version partition */
1940 static struct image_partition_entry make_soft_version(uint32_t rev) {
1941 struct image_partition_entry entry = alloc_image_partition("soft-version", sizeof(struct soft_version));
1942 struct soft_version *s = (struct soft_version *)entry.data;
1943
1944 time_t t;
1945
1946 if (source_date_epoch != -1)
1947 t = source_date_epoch;
1948 else if (time(&t) == (time_t)(-1))
1949 error(1, errno, "time");
1950
1951 struct tm *tm = localtime(&t);
1952
1953 s->magic = htonl(0x0000000c);
1954 s->zero = 0;
1955 s->pad1 = 0xff;
1956
1957 s->version_major = 0;
1958 s->version_minor = 0;
1959 s->version_patch = 0;
1960
1961 s->year_hi = bcd((1900+tm->tm_year)/100);
1962 s->year_lo = bcd(tm->tm_year%100);
1963 s->month = bcd(tm->tm_mon+1);
1964 s->day = bcd(tm->tm_mday);
1965 s->rev = htonl(rev);
1966
1967 s->pad2 = 0xff;
1968
1969 return entry;
1970 }
1971
1972 static struct image_partition_entry make_soft_version_from_string(const char *soft_ver) {
1973 /** String length _including_ the terminating zero byte */
1974 uint32_t ver_len = strlen(soft_ver) + 1;
1975 /** Partition contains 64 bit header, the version string, and one additional null byte */
1976 size_t partition_len = 2*sizeof(uint32_t) + ver_len + 1;
1977 struct image_partition_entry entry = alloc_image_partition("soft-version", partition_len);
1978
1979 uint32_t *len = (uint32_t *)entry.data;
1980 len[0] = htonl(ver_len);
1981 len[1] = 0;
1982 memcpy(&len[2], soft_ver, ver_len);
1983
1984 entry.data[partition_len - 1] = 0;
1985
1986 return entry;
1987 }
1988
1989 /** Generates the support-list partition */
1990 static struct image_partition_entry make_support_list(struct device_info *info) {
1991 size_t len = strlen(info->support_list);
1992 struct image_partition_entry entry = alloc_image_partition("support-list", len + 9);
1993
1994 put32(entry.data, len);
1995 memset(entry.data+4, 0, 4);
1996 memcpy(entry.data+8, info->support_list, len);
1997 entry.data[len+8] = info->support_trail;
1998
1999 return entry;
2000 }
2001
2002 /** Creates a new image partition with an arbitrary name from a file */
2003 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
2004 struct stat statbuf;
2005
2006 if (stat(filename, &statbuf) < 0)
2007 error(1, errno, "unable to stat file `%s'", filename);
2008
2009 size_t len = statbuf.st_size;
2010
2011 if (add_jffs2_eof) {
2012 if (file_system_partition)
2013 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
2014 else
2015 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
2016 }
2017
2018 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2019
2020 FILE *file = fopen(filename, "rb");
2021 if (!file)
2022 error(1, errno, "unable to open file `%s'", filename);
2023
2024 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
2025 error(1, errno, "unable to read file `%s'", filename);
2026
2027 if (add_jffs2_eof) {
2028 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
2029
2030 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
2031 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
2032 }
2033
2034 fclose(file);
2035
2036 return entry;
2037 }
2038
2039 /** Creates a new image partition from arbitrary data */
2040 static struct image_partition_entry put_data(const char *part_name, const char *datain, size_t len) {
2041
2042 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2043
2044 memcpy(entry.data, datain, len);
2045
2046 return entry;
2047 }
2048
2049 /**
2050 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2051
2052 Example image partition table:
2053
2054 fwup-ptn partition-table base 0x00800 size 0x00800
2055 fwup-ptn os-image base 0x01000 size 0x113b45
2056 fwup-ptn file-system base 0x114b45 size 0x1d0004
2057 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2058
2059 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2060 the end of the partition table is marked with a zero byte.
2061
2062 The firmware image must contain at least the partition-table and support-list partitions
2063 to be accepted. There aren't any alignment constraints for the image partitions.
2064
2065 The partition-table partition contains the actual flash layout; partitions
2066 from the image partition table are mapped to the corresponding flash partitions during
2067 the firmware upgrade. The support-list partition contains a list of devices supported by
2068 the firmware image.
2069
2070 The base offsets in the firmware partition table are relative to the end
2071 of the vendor information block, so the partition-table partition will
2072 actually start at offset 0x1814 of the image.
2073
2074 I think partition-table must be the first partition in the firmware image.
2075 */
2076 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
2077 size_t i, j;
2078 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
2079
2080 size_t base = 0x800;
2081 for (i = 0; parts[i].name; i++) {
2082 for (j = 0; flash_parts[j].name; j++) {
2083 if (!strcmp(flash_parts[j].name, parts[i].name)) {
2084 if (parts[i].size > flash_parts[j].size)
2085 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
2086 break;
2087 }
2088 }
2089
2090 assert(flash_parts[j].name);
2091
2092 memcpy(buffer + base, parts[i].data, parts[i].size);
2093
2094 size_t len = end-image_pt;
2095 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
2096
2097 if (w > len-1)
2098 error(1, 0, "image partition table overflow?");
2099
2100 image_pt += w;
2101
2102 base += parts[i].size;
2103 }
2104 }
2105
2106 /** Generates and writes the image MD5 checksum */
2107 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
2108 MD5_CTX ctx;
2109
2110 MD5_Init(&ctx);
2111 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
2112 MD5_Update(&ctx, buffer, len);
2113 MD5_Final(md5, &ctx);
2114 }
2115
2116
2117 /**
2118 Generates the firmware image in factory format
2119
2120 Image format:
2121
2122 Bytes (hex) Usage
2123 ----------- -----
2124 0000-0003 Image size (4 bytes, big endian)
2125 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2126 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2127 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2128 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2129 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2130 1814-xxxx Firmware partitions
2131 */
2132 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
2133 *len = 0x1814;
2134
2135 size_t i;
2136 for (i = 0; parts[i].name; i++)
2137 *len += parts[i].size;
2138
2139 uint8_t *image = malloc(*len);
2140 if (!image)
2141 error(1, errno, "malloc");
2142
2143 memset(image, 0xff, *len);
2144 put32(image, *len);
2145
2146 if (info->vendor) {
2147 size_t vendor_len = strlen(info->vendor);
2148 put32(image+0x14, vendor_len);
2149 memcpy(image+0x18, info->vendor, vendor_len);
2150 }
2151
2152 put_partitions(image + 0x1014, info->partitions, parts);
2153 put_md5(image+0x04, image+0x14, *len-0x14);
2154
2155 return image;
2156 }
2157
2158 /**
2159 Generates the firmware image in sysupgrade format
2160
2161 This makes some assumptions about the provided flash and image partition tables and
2162 should be generalized when TP-LINK starts building its safeloader into hardware with
2163 different flash layouts.
2164 */
2165 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
2166 size_t i, j;
2167 size_t flash_first_partition_index = 0;
2168 size_t flash_last_partition_index = 0;
2169 const struct flash_partition_entry *flash_first_partition = NULL;
2170 const struct flash_partition_entry *flash_last_partition = NULL;
2171 const struct image_partition_entry *image_last_partition = NULL;
2172
2173 /** Find first and last partitions */
2174 for (i = 0; info->partitions[i].name; i++) {
2175 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
2176 flash_first_partition = &info->partitions[i];
2177 flash_first_partition_index = i;
2178 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
2179 flash_last_partition = &info->partitions[i];
2180 flash_last_partition_index = i;
2181 }
2182 }
2183
2184 assert(flash_first_partition && flash_last_partition);
2185 assert(flash_first_partition_index < flash_last_partition_index);
2186
2187 /** Find last partition from image to calculate needed size */
2188 for (i = 0; image_parts[i].name; i++) {
2189 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
2190 image_last_partition = &image_parts[i];
2191 break;
2192 }
2193 }
2194
2195 assert(image_last_partition);
2196
2197 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2198
2199 uint8_t *image = malloc(*len);
2200 if (!image)
2201 error(1, errno, "malloc");
2202
2203 memset(image, 0xff, *len);
2204
2205 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2206 for (j = 0; image_parts[j].name; j++) {
2207 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2208 if (image_parts[j].size > info->partitions[i].size)
2209 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2210 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2211 break;
2212 }
2213
2214 assert(image_parts[j].name);
2215 }
2216 }
2217
2218 return image;
2219 }
2220
2221 /** Generates an image according to a given layout and writes it to a file */
2222 static void build_image(const char *output,
2223 const char *kernel_image,
2224 const char *rootfs_image,
2225 uint32_t rev,
2226 bool add_jffs2_eof,
2227 bool sysupgrade,
2228 struct device_info *info) {
2229
2230 size_t i;
2231
2232 struct image_partition_entry parts[7] = {};
2233
2234 struct flash_partition_entry *firmware_partition = NULL;
2235 struct flash_partition_entry *os_image_partition = NULL;
2236 struct flash_partition_entry *file_system_partition = NULL;
2237 size_t firmware_partition_index = 0;
2238
2239 for (i = 0; info->partitions[i].name; i++) {
2240 if (!strcmp(info->partitions[i].name, "firmware"))
2241 {
2242 firmware_partition = &info->partitions[i];
2243 firmware_partition_index = i;
2244 }
2245 }
2246
2247 if (firmware_partition)
2248 {
2249 os_image_partition = &info->partitions[firmware_partition_index];
2250 file_system_partition = &info->partitions[firmware_partition_index + 1];
2251
2252 struct stat kernel;
2253 if (stat(kernel_image, &kernel) < 0)
2254 error(1, errno, "unable to stat file `%s'", kernel_image);
2255
2256 if (kernel.st_size > firmware_partition->size)
2257 error(1, 0, "kernel overflowed firmware partition\n");
2258
2259 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2260 info->partitions[i+1] = info->partitions[i];
2261
2262 file_system_partition->name = "file-system";
2263 file_system_partition->base = firmware_partition->base + kernel.st_size;
2264
2265 /* Align partition start to erase blocks for factory images only */
2266 if (!sysupgrade)
2267 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2268
2269 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2270
2271 os_image_partition->name = "os-image";
2272 os_image_partition->size = kernel.st_size;
2273 }
2274
2275 parts[0] = make_partition_table(info->partitions);
2276 if (info->soft_ver)
2277 parts[1] = make_soft_version_from_string(info->soft_ver);
2278 else
2279 parts[1] = make_soft_version(rev);
2280
2281 parts[2] = make_support_list(info);
2282 parts[3] = read_file("os-image", kernel_image, false, NULL);
2283 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2284
2285 /* Some devices need the extra-para partition to accept the firmware */
2286 if (strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2287 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2288 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2289 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2290 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
2291 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2292 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
2293 parts[5] = put_data("extra-para", mdat, 11);
2294 } else if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 || strcasecmp(info->id, "ARCHER-C7-V4") == 0 || strcasecmp(info->id, "ARCHER-C7-V5") == 0) {
2295 const char mdat[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
2296 parts[5] = put_data("extra-para", mdat, 11);
2297 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2298 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00};
2299 parts[5] = put_data("extra-para", mdat, 11);
2300 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0) {
2301 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x00};
2302 parts[5] = put_data("extra-para", mdat, 11);
2303 }
2304
2305 size_t len;
2306 void *image;
2307 if (sysupgrade)
2308 image = generate_sysupgrade_image(info, parts, &len);
2309 else
2310 image = generate_factory_image(info, parts, &len);
2311
2312 FILE *file = fopen(output, "wb");
2313 if (!file)
2314 error(1, errno, "unable to open output file");
2315
2316 if (fwrite(image, len, 1, file) != 1)
2317 error(1, 0, "unable to write output file");
2318
2319 fclose(file);
2320
2321 free(image);
2322
2323 for (i = 0; parts[i].name; i++)
2324 free_image_partition(parts[i]);
2325 }
2326
2327 /** Usage output */
2328 static void usage(const char *argv0) {
2329 fprintf(stderr,
2330 "Usage: %s [OPTIONS...]\n"
2331 "\n"
2332 "Options:\n"
2333 " -h show this help\n"
2334 "\n"
2335 "Create a new image:\n"
2336 " -B <board> create image for the board specified with <board>\n"
2337 " -k <file> read kernel image from the file <file>\n"
2338 " -r <file> read rootfs image from the file <file>\n"
2339 " -o <file> write output to the file <file>\n"
2340 " -V <rev> sets the revision number to <rev>\n"
2341 " -j add jffs2 end-of-filesystem markers\n"
2342 " -S create sysupgrade instead of factory image\n"
2343 "Extract an old image:\n"
2344 " -x <file> extract all oem firmware partition\n"
2345 " -d <dir> destination to extract the firmware partition\n"
2346 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2347 argv0
2348 );
2349 };
2350
2351
2352 static struct device_info *find_board(const char *id)
2353 {
2354 struct device_info *board = NULL;
2355
2356 for (board = boards; board->id != NULL; board++)
2357 if (strcasecmp(id, board->id) == 0)
2358 return board;
2359
2360 return NULL;
2361 }
2362
2363 static int add_flash_partition(
2364 struct flash_partition_entry *part_list,
2365 size_t max_entries,
2366 const char *name,
2367 unsigned long base,
2368 unsigned long size)
2369 {
2370 size_t ptr;
2371 /* check if the list has a free entry */
2372 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2373 if (part_list->name == NULL &&
2374 part_list->base == 0 &&
2375 part_list->size == 0)
2376 break;
2377 }
2378
2379 if (ptr == max_entries) {
2380 error(1, 0, "No free flash part entry available.");
2381 }
2382
2383 part_list->name = calloc(1, strlen(name) + 1);
2384 if (!part_list->name) {
2385 error(1, 0, "Unable to allocate memory");
2386 }
2387
2388 memcpy((char *)part_list->name, name, strlen(name));
2389 part_list->base = base;
2390 part_list->size = size;
2391
2392 return 0;
2393 }
2394
2395 /** read the partition table into struct flash_partition_entry */
2396 static int read_partition_table(
2397 FILE *file, long offset,
2398 struct flash_partition_entry *entries, size_t max_entries,
2399 int type)
2400 {
2401 char buf[2048];
2402 char *ptr, *end;
2403 const char *parthdr = NULL;
2404 const char *fwuphdr = "fwup-ptn";
2405 const char *flashhdr = "partition";
2406
2407 /* TODO: search for the partition table */
2408
2409 switch(type) {
2410 case 0:
2411 parthdr = fwuphdr;
2412 break;
2413 case 1:
2414 parthdr = flashhdr;
2415 break;
2416 default:
2417 error(1, 0, "Invalid partition table");
2418 }
2419
2420 if (fseek(file, offset, SEEK_SET) < 0)
2421 error(1, errno, "Can not seek in the firmware");
2422
2423 if (fread(buf, 2048, 1, file) != 1)
2424 error(1, errno, "Can not read fwup-ptn from the firmware");
2425
2426 buf[2047] = '\0';
2427
2428 /* look for the partition header */
2429 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2430 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2431 return 1;
2432 }
2433
2434 ptr = buf;
2435 end = buf + sizeof(buf);
2436 while ((ptr + strlen(parthdr)) < end &&
2437 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2438 char *end_part;
2439 char *end_element;
2440
2441 char name[32] = { 0 };
2442 int name_len = 0;
2443 unsigned long base = 0;
2444 unsigned long size = 0;
2445
2446 end_part = memchr(ptr, '\n', (end - ptr));
2447 if (end_part == NULL) {
2448 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2449 break;
2450 }
2451
2452 for (int i = 0; i <= 4; i++) {
2453 if (end_part <= ptr)
2454 break;
2455
2456 end_element = memchr(ptr, 0x20, (end_part - ptr));
2457 if (end_element == NULL) {
2458 error(1, errno, "Ignoring the rest of the partition entries.");
2459 break;
2460 }
2461
2462 switch (i) {
2463 /* partition header */
2464 case 0:
2465 ptr = end_element + 1;
2466 continue;
2467 /* name */
2468 case 1:
2469 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
2470 strncpy(name, ptr, name_len);
2471 name[name_len] = '\0';
2472 ptr = end_element + 1;
2473 continue;
2474
2475 /* string "base" */
2476 case 2:
2477 ptr = end_element + 1;
2478 continue;
2479
2480 /* actual base */
2481 case 3:
2482 base = strtoul(ptr, NULL, 16);
2483 ptr = end_element + 1;
2484 continue;
2485
2486 /* string "size" */
2487 case 4:
2488 ptr = end_element + 1;
2489 /* actual size. The last element doesn't have a sepeartor */
2490 size = strtoul(ptr, NULL, 16);
2491 /* the part ends with 0x09, 0x0d, 0x0a */
2492 ptr = end_part + 1;
2493 add_flash_partition(entries, max_entries, name, base, size);
2494 continue;
2495 }
2496 }
2497 }
2498
2499 return 0;
2500 }
2501
2502 static void write_partition(
2503 FILE *input_file,
2504 size_t firmware_offset,
2505 struct flash_partition_entry *entry,
2506 FILE *output_file)
2507 {
2508 char buf[4096];
2509 size_t offset;
2510
2511 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
2512
2513 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
2514 if (fread(buf, sizeof(buf), 1, input_file) != 1)
2515 error(1, errno, "Can not read partition from input_file");
2516
2517 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2518 error(1, errno, "Can not write partition to output_file");
2519 }
2520 /* write last chunk smaller than buffer */
2521 if (offset < entry->size) {
2522 offset = entry->size - offset;
2523 if (fread(buf, offset, 1, input_file) != 1)
2524 error(1, errno, "Can not read partition from input_file");
2525 if (fwrite(buf, offset, 1, output_file) != 1)
2526 error(1, errno, "Can not write partition to output_file");
2527 }
2528 }
2529
2530 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
2531 {
2532 FILE *output_file;
2533 char output[PATH_MAX];
2534
2535 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
2536 output_file = fopen(output, "wb+");
2537 if (output_file == NULL) {
2538 error(1, errno, "Can not open output file %s", output);
2539 }
2540
2541 write_partition(input_file, firmware_offset, entry, output_file);
2542
2543 fclose(output_file);
2544
2545 return 0;
2546 }
2547
2548 /** extract all partitions from the firmware file */
2549 static int extract_firmware(const char *input, const char *output_directory)
2550 {
2551 struct flash_partition_entry entries[16] = { 0 };
2552 size_t max_entries = 16;
2553 size_t firmware_offset = 0x1014;
2554 FILE *input_file;
2555
2556 struct stat statbuf;
2557
2558 /* check input file */
2559 if (stat(input, &statbuf)) {
2560 error(1, errno, "Can not read input firmware %s", input);
2561 }
2562
2563 /* check if output directory exists */
2564 if (stat(output_directory, &statbuf)) {
2565 error(1, errno, "Failed to stat output directory %s", output_directory);
2566 }
2567
2568 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
2569 error(1, errno, "Given output directory is not a directory %s", output_directory);
2570 }
2571
2572 input_file = fopen(input, "rb");
2573
2574 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
2575 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2576 }
2577
2578 for (size_t i = 0; i < max_entries; i++) {
2579 if (entries[i].name == NULL &&
2580 entries[i].base == 0 &&
2581 entries[i].size == 0)
2582 continue;
2583
2584 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
2585 }
2586
2587 return 0;
2588 }
2589
2590 static struct flash_partition_entry *find_partition(
2591 struct flash_partition_entry *entries, size_t max_entries,
2592 const char *name, const char *error_msg)
2593 {
2594 for (size_t i = 0; i < max_entries; i++, entries++) {
2595 if (strcmp(entries->name, name) == 0)
2596 return entries;
2597 }
2598
2599 error(1, 0, "%s", error_msg);
2600 return NULL;
2601 }
2602
2603 static void write_ff(FILE *output_file, size_t size)
2604 {
2605 char buf[4096];
2606 size_t offset;
2607
2608 memset(buf, 0xff, sizeof(buf));
2609
2610 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
2611 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2612 error(1, errno, "Can not write 0xff to output_file");
2613 }
2614
2615 /* write last chunk smaller than buffer */
2616 if (offset < size) {
2617 offset = size - offset;
2618 if (fwrite(buf, offset, 1, output_file) != 1)
2619 error(1, errno, "Can not write partition to output_file");
2620 }
2621 }
2622
2623 static void convert_firmware(const char *input, const char *output)
2624 {
2625 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
2626 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
2627 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
2628 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
2629 struct flash_partition_entry *fwup_partition_table = NULL;
2630 size_t firmware_offset = 0x1014;
2631 FILE *input_file, *output_file;
2632
2633 struct stat statbuf;
2634
2635 /* check input file */
2636 if (stat(input, &statbuf)) {
2637 error(1, errno, "Can not read input firmware %s", input);
2638 }
2639
2640 input_file = fopen(input, "rb");
2641 if (!input_file)
2642 error(1, 0, "Can not open input firmware %s", input);
2643
2644 output_file = fopen(output, "wb");
2645 if (!output_file)
2646 error(1, 0, "Can not open output firmware %s", output);
2647
2648 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
2649 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2650 }
2651
2652 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
2653 "os-image", "Error can not find os-image partition (fwup)");
2654 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
2655 "file-system", "Error can not find file-system partition (fwup)");
2656 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
2657 "partition-table", "Error can not find partition-table partition");
2658
2659 /* the flash partition table has a 0x00000004 magic haeder */
2660 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
2661 error(1, 0, "Error can not read the partition table (flash)");
2662
2663 flash_os_image = find_partition(flash, MAX_PARTITIONS,
2664 "os-image", "Error can not find os-image partition (flash)");
2665 flash_file_system = find_partition(flash, MAX_PARTITIONS,
2666 "file-system", "Error can not find file-system partition (flash)");
2667
2668 /* write os_image to 0x0 */
2669 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
2670 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
2671
2672 /* write file-system behind os_image */
2673 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
2674 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
2675 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
2676
2677 fclose(output_file);
2678 fclose(input_file);
2679 }
2680
2681 int main(int argc, char *argv[]) {
2682 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
2683 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
2684 bool add_jffs2_eof = false, sysupgrade = false;
2685 unsigned rev = 0;
2686 struct device_info *info;
2687 set_source_date_epoch();
2688
2689 while (true) {
2690 int c;
2691
2692 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
2693 if (c == -1)
2694 break;
2695
2696 switch (c) {
2697 case 'B':
2698 board = optarg;
2699 break;
2700
2701 case 'k':
2702 kernel_image = optarg;
2703 break;
2704
2705 case 'r':
2706 rootfs_image = optarg;
2707 break;
2708
2709 case 'o':
2710 output = optarg;
2711 break;
2712
2713 case 'V':
2714 sscanf(optarg, "r%u", &rev);
2715 break;
2716
2717 case 'j':
2718 add_jffs2_eof = true;
2719 break;
2720
2721 case 'S':
2722 sysupgrade = true;
2723 break;
2724
2725 case 'h':
2726 usage(argv[0]);
2727 return 0;
2728
2729 case 'd':
2730 output_directory = optarg;
2731 break;
2732
2733 case 'x':
2734 extract_image = optarg;
2735 break;
2736
2737 case 'z':
2738 convert_image = optarg;
2739 break;
2740
2741 default:
2742 usage(argv[0]);
2743 return 1;
2744 }
2745 }
2746
2747 if (extract_image || output_directory) {
2748 if (!extract_image)
2749 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
2750 if (!output_directory)
2751 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
2752 extract_firmware(extract_image, output_directory);
2753 } else if (convert_image) {
2754 if (!output)
2755 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
2756 convert_firmware(convert_image, output);
2757 } else {
2758 if (!board)
2759 error(1, 0, "no board has been specified");
2760 if (!kernel_image)
2761 error(1, 0, "no kernel image has been specified");
2762 if (!rootfs_image)
2763 error(1, 0, "no rootfs image has been specified");
2764 if (!output)
2765 error(1, 0, "no output filename has been specified");
2766
2767 info = find_board(board);
2768
2769 if (info == NULL)
2770 error(1, 0, "unsupported board %s", board);
2771
2772 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
2773 }
2774
2775 return 0;
2776 }