2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
45 #include <arpa/inet.h>
47 #include <sys/types.h>
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
57 #define MAX_PARTITIONS 32
59 /** An image partition table entry */
60 struct image_partition_entry
{
66 /** A flash partition table entry */
67 struct flash_partition_entry
{
73 /** Firmware layout description */
77 const char *support_list
;
80 struct flash_partition_entry partitions
[MAX_PARTITIONS
+1];
81 const char *first_sysupgrade_partition
;
82 const char *last_sysupgrade_partition
;
85 /** The content of the soft-version structure */
86 struct __attribute__((__packed__
)) soft_version
{
90 uint8_t version_major
;
91 uint8_t version_minor
;
92 uint8_t version_patch
;
102 static const uint8_t jffs2_eof_mark
[4] = {0xde, 0xad, 0xc0, 0xde};
106 Salt for the MD5 hash
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
111 static const uint8_t md5_salt
[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
119 /** Firmware layout table */
120 static struct device_info boards
[] = {
121 /** Firmware layout for the CPE210/220 */
124 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail
= '\xff',
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x1c0000},
144 {"file-system", 0x200000, 0x5b0000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
154 .first_sysupgrade_partition
= "os-image",
155 .last_sysupgrade_partition
= "support-list",
158 /** Firmware layout for the CPE210 V2 */
161 .vendor
= "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail
= '\xff',
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"os-image", 0x40000, 0x1c0000},
186 {"file-system", 0x200000, 0x5b0000},
187 {"soft-version", 0x7b0000, 0x00100},
188 {"support-list", 0x7b1000, 0x01000},
189 {"user-config", 0x7c0000, 0x10000},
190 {"default-config", 0x7d0000, 0x10000},
191 {"log", 0x7e0000, 0x10000},
192 {"radio", 0x7f0000, 0x10000},
196 .first_sysupgrade_partition
= "os-image",
197 .last_sysupgrade_partition
= "support-list",
200 /** Firmware layout for the CPE510/520 */
203 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
206 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
207 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
208 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
209 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
210 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
211 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
212 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
213 "CPE520(TP-LINK|EU|N300-5):1.1\r\n"
214 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
215 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
216 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
217 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
218 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
219 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
220 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
221 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
222 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
223 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
224 .support_trail
= '\xff',
228 {"fs-uboot", 0x00000, 0x20000},
229 {"partition-table", 0x20000, 0x02000},
230 {"default-mac", 0x30000, 0x00020},
231 {"product-info", 0x31100, 0x00100},
232 {"signature", 0x32000, 0x00400},
233 {"os-image", 0x40000, 0x1c0000},
234 {"file-system", 0x200000, 0x5b0000},
235 {"soft-version", 0x7b0000, 0x00100},
236 {"support-list", 0x7b1000, 0x00400},
237 {"user-config", 0x7c0000, 0x10000},
238 {"default-config", 0x7d0000, 0x10000},
239 {"log", 0x7e0000, 0x10000},
240 {"radio", 0x7f0000, 0x10000},
244 .first_sysupgrade_partition
= "os-image",
245 .last_sysupgrade_partition
= "support-list",
250 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
253 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
254 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
255 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
256 .support_trail
= '\xff',
260 {"fs-uboot", 0x00000, 0x20000},
261 {"partition-table", 0x20000, 0x02000},
262 {"default-mac", 0x30000, 0x00020},
263 {"product-info", 0x31100, 0x00100},
264 {"signature", 0x32000, 0x00400},
265 {"os-image", 0x40000, 0x1c0000},
266 {"file-system", 0x200000, 0x5b0000},
267 {"soft-version", 0x7b0000, 0x00100},
268 {"support-list", 0x7b1000, 0x00400},
269 {"user-config", 0x7c0000, 0x10000},
270 {"default-config", 0x7d0000, 0x10000},
271 {"log", 0x7e0000, 0x10000},
272 {"radio", 0x7f0000, 0x10000},
276 .first_sysupgrade_partition
= "os-image",
277 .last_sysupgrade_partition
= "support-list",
282 .vendor
= "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
285 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
286 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
287 "WBS510(TP-LINK|EU|N300-5):1.20\r\n",
288 .support_trail
= '\xff',
292 {"fs-uboot", 0x00000, 0x20000},
293 {"partition-table", 0x20000, 0x02000},
294 {"default-mac", 0x30000, 0x00020},
295 {"product-info", 0x31100, 0x00100},
296 {"signature", 0x32000, 0x00400},
297 {"os-image", 0x40000, 0x1c0000},
298 {"file-system", 0x200000, 0x5b0000},
299 {"soft-version", 0x7b0000, 0x00100},
300 {"support-list", 0x7b1000, 0x00400},
301 {"user-config", 0x7c0000, 0x10000},
302 {"default-config", 0x7d0000, 0x10000},
303 {"log", 0x7e0000, 0x10000},
304 {"radio", 0x7f0000, 0x10000},
308 .first_sysupgrade_partition
= "os-image",
309 .last_sysupgrade_partition
= "support-list",
312 /** Firmware layout for the C2600 */
318 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
319 .support_trail
= '\x00',
323 We use a bigger os-image partition than the stock images (and thus
324 smaller file-system), as our kernel doesn't fit in the stock firmware's
325 2 MB os-image since kernel 4.14.
328 {"SBL1", 0x00000, 0x20000},
329 {"MIBIB", 0x20000, 0x20000},
330 {"SBL2", 0x40000, 0x20000},
331 {"SBL3", 0x60000, 0x30000},
332 {"DDRCONFIG", 0x90000, 0x10000},
333 {"SSD", 0xa0000, 0x10000},
334 {"TZ", 0xb0000, 0x30000},
335 {"RPM", 0xe0000, 0x20000},
336 {"fs-uboot", 0x100000, 0x70000},
337 {"uboot-env", 0x170000, 0x40000},
338 {"radio", 0x1b0000, 0x40000},
339 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
340 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
341 {"default-mac", 0x1ef0000, 0x00200},
342 {"pin", 0x1ef0200, 0x00200},
343 {"product-info", 0x1ef0400, 0x0fc00},
344 {"partition-table", 0x1f00000, 0x10000},
345 {"soft-version", 0x1f10000, 0x10000},
346 {"support-list", 0x1f20000, 0x10000},
347 {"profile", 0x1f30000, 0x10000},
348 {"default-config", 0x1f40000, 0x10000},
349 {"user-config", 0x1f50000, 0x40000},
350 {"qos-db", 0x1f90000, 0x40000},
351 {"usb-config", 0x1fd0000, 0x10000},
352 {"log", 0x1fe0000, 0x20000},
356 .first_sysupgrade_partition
= "os-image",
357 .last_sysupgrade_partition
= "file-system"
360 /** Firmware layout for the A7-V5 */
362 .id
= "ARCHER-A7-V5",
365 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
366 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
367 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
368 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
369 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
370 .support_trail
= '\x00',
371 .soft_ver
= "soft_ver:1.0.0\n",
373 /* We're using a dynamic kernel/rootfs split here */
375 {"factory-boot", 0x00000, 0x20000},
376 {"fs-uboot", 0x20000, 0x20000},
377 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
378 /* Stock: name file-system base 0x160000 size 0xda0000 */
379 {"default-mac", 0xf40000, 0x00200},
380 {"pin", 0xf40200, 0x00200},
381 {"device-id", 0xf40400, 0x00100},
382 {"product-info", 0xf40500, 0x0fb00},
383 {"soft-version", 0xf50000, 0x00100},
384 {"extra-para", 0xf51000, 0x01000},
385 {"support-list", 0xf52000, 0x0a000},
386 {"profile", 0xf5c000, 0x04000},
387 {"default-config", 0xf60000, 0x10000},
388 {"user-config", 0xf70000, 0x40000},
389 {"certificate", 0xfb0000, 0x10000},
390 {"partition-table", 0xfc0000, 0x10000},
391 {"log", 0xfd0000, 0x20000},
392 {"radio", 0xff0000, 0x10000},
396 .first_sysupgrade_partition
= "os-image",
397 .last_sysupgrade_partition
= "file-system",
400 /** Firmware layout for the C25v1 */
402 .id
= "ARCHER-C25-V1",
405 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
406 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
407 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
408 .support_trail
= '\x00',
409 .soft_ver
= "soft_ver:1.0.0\n",
411 /* We're using a dynamic kernel/rootfs split here */
413 {"factory-boot", 0x00000, 0x20000},
414 {"fs-uboot", 0x20000, 0x10000},
415 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
416 /* Stock: name file-system base 0x130000 size 0x6a0000 */
417 {"user-config", 0x7d0000, 0x04000},
418 {"default-mac", 0x7e0000, 0x00100},
419 {"device-id", 0x7e0100, 0x00100},
420 {"extra-para", 0x7e0200, 0x00100},
421 {"pin", 0x7e0300, 0x00100},
422 {"support-list", 0x7e0400, 0x00400},
423 {"soft-version", 0x7e0800, 0x00400},
424 {"product-info", 0x7e0c00, 0x01400},
425 {"partition-table", 0x7e2000, 0x01000},
426 {"profile", 0x7e3000, 0x01000},
427 {"default-config", 0x7e4000, 0x04000},
428 {"merge-config", 0x7ec000, 0x02000},
429 {"qos-db", 0x7ee000, 0x02000},
430 {"radio", 0x7f0000, 0x10000},
434 .first_sysupgrade_partition
= "os-image",
435 .last_sysupgrade_partition
= "file-system",
438 /** Firmware layout for the C58v1 */
440 .id
= "ARCHER-C58-V1",
444 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
445 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
446 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
447 .support_trail
= '\x00',
448 .soft_ver
= "soft_ver:1.0.0\n",
451 {"fs-uboot", 0x00000, 0x10000},
452 {"default-mac", 0x10000, 0x00200},
453 {"pin", 0x10200, 0x00200},
454 {"product-info", 0x10400, 0x00100},
455 {"partition-table", 0x10500, 0x00800},
456 {"soft-version", 0x11300, 0x00200},
457 {"support-list", 0x11500, 0x00100},
458 {"device-id", 0x11600, 0x00100},
459 {"profile", 0x11700, 0x03900},
460 {"default-config", 0x15000, 0x04000},
461 {"user-config", 0x19000, 0x04000},
462 {"firmware", 0x20000, 0x7c8000},
463 {"certyficate", 0x7e8000, 0x08000},
464 {"radio", 0x7f0000, 0x10000},
468 .first_sysupgrade_partition
= "os-image",
469 .last_sysupgrade_partition
= "file-system",
472 /** Firmware layout for the C59v1 */
474 .id
= "ARCHER-C59-V1",
478 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
479 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
480 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
481 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
482 .support_trail
= '\x00',
483 .soft_ver
= "soft_ver:1.0.0\n",
485 /* We're using a dynamic kernel/rootfs split here */
487 {"fs-uboot", 0x00000, 0x10000},
488 {"default-mac", 0x10000, 0x00200},
489 {"pin", 0x10200, 0x00200},
490 {"device-id", 0x10400, 0x00100},
491 {"product-info", 0x10500, 0x0fb00},
492 {"firmware", 0x20000, 0xe30000},
493 {"partition-table", 0xe50000, 0x10000},
494 {"soft-version", 0xe60000, 0x10000},
495 {"support-list", 0xe70000, 0x10000},
496 {"profile", 0xe80000, 0x10000},
497 {"default-config", 0xe90000, 0x10000},
498 {"user-config", 0xea0000, 0x40000},
499 {"usb-config", 0xee0000, 0x10000},
500 {"certificate", 0xef0000, 0x10000},
501 {"qos-db", 0xf00000, 0x40000},
502 {"log", 0xfe0000, 0x10000},
503 {"radio", 0xff0000, 0x10000},
507 .first_sysupgrade_partition
= "os-image",
508 .last_sysupgrade_partition
= "file-system",
511 /** Firmware layout for the C59v2 */
513 .id
= "ARCHER-C59-V2",
517 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
518 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
519 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
520 .support_trail
= '\x00',
521 .soft_ver
= "soft_ver:2.0.0 Build 20161206 rel.7303\n",
523 /** We're using a dynamic kernel/rootfs split here */
525 {"factory-boot", 0x00000, 0x20000},
526 {"fs-uboot", 0x20000, 0x10000},
527 {"default-mac", 0x30000, 0x00200},
528 {"pin", 0x30200, 0x00200},
529 {"device-id", 0x30400, 0x00100},
530 {"product-info", 0x30500, 0x0fb00},
531 {"firmware", 0x40000, 0xe10000},
532 {"partition-table", 0xe50000, 0x10000},
533 {"soft-version", 0xe60000, 0x10000},
534 {"support-list", 0xe70000, 0x10000},
535 {"profile", 0xe80000, 0x10000},
536 {"default-config", 0xe90000, 0x10000},
537 {"user-config", 0xea0000, 0x40000},
538 {"usb-config", 0xee0000, 0x10000},
539 {"certificate", 0xef0000, 0x10000},
540 {"extra-para", 0xf00000, 0x10000},
541 {"qos-db", 0xf10000, 0x30000},
542 {"log", 0xfe0000, 0x10000},
543 {"radio", 0xff0000, 0x10000},
547 .first_sysupgrade_partition
= "os-image",
548 .last_sysupgrade_partition
= "file-system",
551 /** Firmware layout for the C60v1 */
553 .id
= "ARCHER-C60-V1",
557 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
558 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
559 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
560 .support_trail
= '\x00',
561 .soft_ver
= "soft_ver:1.0.0\n",
564 {"fs-uboot", 0x00000, 0x10000},
565 {"default-mac", 0x10000, 0x00200},
566 {"pin", 0x10200, 0x00200},
567 {"product-info", 0x10400, 0x00100},
568 {"partition-table", 0x10500, 0x00800},
569 {"soft-version", 0x11300, 0x00200},
570 {"support-list", 0x11500, 0x00100},
571 {"device-id", 0x11600, 0x00100},
572 {"profile", 0x11700, 0x03900},
573 {"default-config", 0x15000, 0x04000},
574 {"user-config", 0x19000, 0x04000},
575 {"firmware", 0x20000, 0x7c8000},
576 {"certyficate", 0x7e8000, 0x08000},
577 {"radio", 0x7f0000, 0x10000},
581 .first_sysupgrade_partition
= "os-image",
582 .last_sysupgrade_partition
= "file-system",
585 /** Firmware layout for the C60v2 */
587 .id
= "ARCHER-C60-V2",
591 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
592 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
593 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
594 .support_trail
= '\x00',
595 .soft_ver
= "soft_ver:2.0.0\n",
598 {"factory-boot", 0x00000, 0x1fb00},
599 {"default-mac", 0x1fb00, 0x00200},
600 {"pin", 0x1fd00, 0x00100},
601 {"product-info", 0x1fe00, 0x00100},
602 {"device-id", 0x1ff00, 0x00100},
603 {"fs-uboot", 0x20000, 0x10000},
604 {"firmware", 0x30000, 0x7a0000},
605 {"soft-version", 0x7d9500, 0x00100},
606 {"support-list", 0x7d9600, 0x00100},
607 {"extra-para", 0x7d9700, 0x00100},
608 {"profile", 0x7d9800, 0x03000},
609 {"default-config", 0x7dc800, 0x03000},
610 {"partition-table", 0x7df800, 0x00800},
611 {"user-config", 0x7e0000, 0x0c000},
612 {"certificate", 0x7ec000, 0x04000},
613 {"radio", 0x7f0000, 0x10000},
617 .first_sysupgrade_partition
= "os-image",
618 .last_sysupgrade_partition
= "file-system",
621 /** Firmware layout for the C5 */
623 .id
= "ARCHER-C5-V2",
627 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
628 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
629 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
630 .support_trail
= '\x00',
634 {"fs-uboot", 0x00000, 0x40000},
635 {"os-image", 0x40000, 0x200000},
636 {"file-system", 0x240000, 0xc00000},
637 {"default-mac", 0xe40000, 0x00200},
638 {"pin", 0xe40200, 0x00200},
639 {"product-info", 0xe40400, 0x00200},
640 {"partition-table", 0xe50000, 0x10000},
641 {"soft-version", 0xe60000, 0x00200},
642 {"support-list", 0xe61000, 0x0f000},
643 {"profile", 0xe70000, 0x10000},
644 {"default-config", 0xe80000, 0x10000},
645 {"user-config", 0xe90000, 0x50000},
646 {"log", 0xee0000, 0x100000},
647 {"radio_bk", 0xfe0000, 0x10000},
648 {"radio", 0xff0000, 0x10000},
652 .first_sysupgrade_partition
= "os-image",
653 .last_sysupgrade_partition
= "file-system"
656 /** Firmware layout for the C7 */
658 .id
= "ARCHER-C7-V4",
661 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
662 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
663 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
664 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
665 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
666 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
667 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
668 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
669 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
670 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
671 .support_trail
= '\x00',
672 .soft_ver
= "soft_ver:1.0.0\n",
674 /* We're using a dynamic kernel/rootfs split here */
676 {"factory-boot", 0x00000, 0x20000},
677 {"fs-uboot", 0x20000, 0x20000},
678 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
679 /* Stock: name file-system base 0x160000 size 0xda0000 */
680 {"default-mac", 0xf00000, 0x00200},
681 {"pin", 0xf00200, 0x00200},
682 {"device-id", 0xf00400, 0x00100},
683 {"product-info", 0xf00500, 0x0fb00},
684 {"soft-version", 0xf10000, 0x00100},
685 {"extra-para", 0xf11000, 0x01000},
686 {"support-list", 0xf12000, 0x0a000},
687 {"profile", 0xf1c000, 0x04000},
688 {"default-config", 0xf20000, 0x10000},
689 {"user-config", 0xf30000, 0x40000},
690 {"qos-db", 0xf70000, 0x40000},
691 {"certificate", 0xfb0000, 0x10000},
692 {"partition-table", 0xfc0000, 0x10000},
693 {"log", 0xfd0000, 0x20000},
694 {"radio", 0xff0000, 0x10000},
698 .first_sysupgrade_partition
= "os-image",
699 .last_sysupgrade_partition
= "file-system",
702 /** Firmware layout for the C7 v5*/
704 .id
= "ARCHER-C7-V5",
707 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
708 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
709 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
710 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
711 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
712 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n",
714 .support_trail
= '\x00',
715 .soft_ver
= "soft_ver:1.0.0\n",
717 /* We're using a dynamic kernel/rootfs split here */
719 {"factory-boot", 0x00000, 0x20000},
720 {"fs-uboot", 0x20000, 0x20000},
721 {"partition-table", 0x40000, 0x10000},
722 {"radio", 0x50000, 0x10000},
723 {"default-mac", 0x60000, 0x00200},
724 {"pin", 0x60200, 0x00200},
725 {"device-id", 0x60400, 0x00100},
726 {"product-info", 0x60500, 0x0fb00},
727 {"soft-version", 0x70000, 0x01000},
728 {"extra-para", 0x71000, 0x01000},
729 {"support-list", 0x72000, 0x0a000},
730 {"profile", 0x7c000, 0x04000},
731 {"user-config", 0x80000, 0x40000},
734 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
735 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
737 {"log", 0xfc0000, 0x20000},
738 {"certificate", 0xfe0000, 0x10000},
739 {"default-config", 0xff0000, 0x10000},
744 .first_sysupgrade_partition
= "os-image",
745 .last_sysupgrade_partition
= "file-system",
748 /** Firmware layout for the C9 */
754 "{product_name:ArcherC9,"
756 "special_id:00000000}\n",
757 .support_trail
= '\x00',
761 {"fs-uboot", 0x00000, 0x40000},
762 {"os-image", 0x40000, 0x200000},
763 {"file-system", 0x240000, 0xc00000},
764 {"default-mac", 0xe40000, 0x00200},
765 {"pin", 0xe40200, 0x00200},
766 {"product-info", 0xe40400, 0x00200},
767 {"partition-table", 0xe50000, 0x10000},
768 {"soft-version", 0xe60000, 0x00200},
769 {"support-list", 0xe61000, 0x0f000},
770 {"profile", 0xe70000, 0x10000},
771 {"default-config", 0xe80000, 0x10000},
772 {"user-config", 0xe90000, 0x50000},
773 {"log", 0xee0000, 0x100000},
774 {"radio_bk", 0xfe0000, 0x10000},
775 {"radio", 0xff0000, 0x10000},
779 .first_sysupgrade_partition
= "os-image",
780 .last_sysupgrade_partition
= "file-system"
783 /** Firmware layout for the EAP120 */
786 .vendor
= "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
789 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
790 .support_trail
= '\xff',
794 {"fs-uboot", 0x00000, 0x20000},
795 {"partition-table", 0x20000, 0x02000},
796 {"default-mac", 0x30000, 0x00020},
797 {"support-list", 0x31000, 0x00100},
798 {"product-info", 0x31100, 0x00100},
799 {"soft-version", 0x32000, 0x00100},
800 {"os-image", 0x40000, 0x180000},
801 {"file-system", 0x1c0000, 0x600000},
802 {"user-config", 0x7c0000, 0x10000},
803 {"backup-config", 0x7d0000, 0x10000},
804 {"log", 0x7e0000, 0x10000},
805 {"radio", 0x7f0000, 0x10000},
809 .first_sysupgrade_partition
= "os-image",
810 .last_sysupgrade_partition
= "file-system"
813 /** Firmware layout for the TL-WA850RE v2 */
819 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
820 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
821 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
822 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
823 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
824 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
825 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
826 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
827 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
828 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
829 .support_trail
= '\x00',
833 576KB were moved from file-system to os-image
834 in comparison to the stock image
837 {"fs-uboot", 0x00000, 0x20000},
838 {"os-image", 0x20000, 0x150000},
839 {"file-system", 0x170000, 0x240000},
840 {"partition-table", 0x3b0000, 0x02000},
841 {"default-mac", 0x3c0000, 0x00020},
842 {"pin", 0x3c0100, 0x00020},
843 {"product-info", 0x3c1000, 0x01000},
844 {"soft-version", 0x3c2000, 0x00100},
845 {"support-list", 0x3c3000, 0x01000},
846 {"profile", 0x3c4000, 0x08000},
847 {"user-config", 0x3d0000, 0x10000},
848 {"default-config", 0x3e0000, 0x10000},
849 {"radio", 0x3f0000, 0x10000},
853 .first_sysupgrade_partition
= "os-image",
854 .last_sysupgrade_partition
= "file-system"
857 /** Firmware layout for the TL-WA855RE v1 */
863 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
864 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
865 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
866 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
867 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
868 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
869 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
870 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
871 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
872 .support_trail
= '\x00',
876 {"fs-uboot", 0x00000, 0x20000},
877 {"os-image", 0x20000, 0x150000},
878 {"file-system", 0x170000, 0x240000},
879 {"partition-table", 0x3b0000, 0x02000},
880 {"default-mac", 0x3c0000, 0x00020},
881 {"pin", 0x3c0100, 0x00020},
882 {"product-info", 0x3c1000, 0x01000},
883 {"soft-version", 0x3c2000, 0x00100},
884 {"support-list", 0x3c3000, 0x01000},
885 {"profile", 0x3c4000, 0x08000},
886 {"user-config", 0x3d0000, 0x10000},
887 {"default-config", 0x3e0000, 0x10000},
888 {"radio", 0x3f0000, 0x10000},
892 .first_sysupgrade_partition
= "os-image",
893 .last_sysupgrade_partition
= "file-system"
896 /** Firmware layout for the TL-WR1043 v5 */
902 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
903 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
904 .support_trail
= '\x00',
905 .soft_ver
= "soft_ver:1.0.0\n",
907 {"factory-boot", 0x00000, 0x20000},
908 {"fs-uboot", 0x20000, 0x20000},
909 {"firmware", 0x40000, 0xec0000},
910 {"default-mac", 0xf00000, 0x00200},
911 {"pin", 0xf00200, 0x00200},
912 {"device-id", 0xf00400, 0x00100},
913 {"product-info", 0xf00500, 0x0fb00},
914 {"soft-version", 0xf10000, 0x01000},
915 {"extra-para", 0xf11000, 0x01000},
916 {"support-list", 0xf12000, 0x0a000},
917 {"profile", 0xf1c000, 0x04000},
918 {"default-config", 0xf20000, 0x10000},
919 {"user-config", 0xf30000, 0x40000},
920 {"qos-db", 0xf70000, 0x40000},
921 {"certificate", 0xfb0000, 0x10000},
922 {"partition-table", 0xfc0000, 0x10000},
923 {"log", 0xfd0000, 0x20000},
924 {"radio", 0xff0000, 0x10000},
927 .first_sysupgrade_partition
= "os-image",
928 .last_sysupgrade_partition
= "file-system"
931 /** Firmware layout for the TL-WR1043 v4 */
933 .id
= "TLWR1043NDV4",
937 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
938 .support_trail
= '\x00',
941 /* We're using a dynamic kernel/rootfs split here */
943 {"fs-uboot", 0x00000, 0x20000},
944 {"firmware", 0x20000, 0xf30000},
945 {"default-mac", 0xf50000, 0x00200},
946 {"pin", 0xf50200, 0x00200},
947 {"product-info", 0xf50400, 0x0fc00},
948 {"soft-version", 0xf60000, 0x0b000},
949 {"support-list", 0xf6b000, 0x04000},
950 {"profile", 0xf70000, 0x04000},
951 {"default-config", 0xf74000, 0x0b000},
952 {"user-config", 0xf80000, 0x40000},
953 {"partition-table", 0xfc0000, 0x10000},
954 {"log", 0xfd0000, 0x20000},
955 {"radio", 0xff0000, 0x10000},
959 .first_sysupgrade_partition
= "os-image",
960 .last_sysupgrade_partition
= "file-system"
963 /** Firmware layout for the TL-WR902AC v1 */
965 .id
= "TL-WR902AC-V1",
969 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
970 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
971 .support_trail
= '\x00',
975 384KB were moved from file-system to os-image
976 in comparison to the stock image
979 {"fs-uboot", 0x00000, 0x20000},
980 {"firmware", 0x20000, 0x730000},
981 {"default-mac", 0x750000, 0x00200},
982 {"pin", 0x750200, 0x00200},
983 {"product-info", 0x750400, 0x0fc00},
984 {"soft-version", 0x760000, 0x0b000},
985 {"support-list", 0x76b000, 0x04000},
986 {"profile", 0x770000, 0x04000},
987 {"default-config", 0x774000, 0x0b000},
988 {"user-config", 0x780000, 0x40000},
989 {"partition-table", 0x7c0000, 0x10000},
990 {"log", 0x7d0000, 0x20000},
991 {"radio", 0x7f0000, 0x10000},
995 .first_sysupgrade_partition
= "os-image",
996 .last_sysupgrade_partition
= "file-system",
999 /** Firmware layout for the TL-WR942N V1 */
1005 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1006 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1007 .support_trail
= '\x00',
1011 {"fs-uboot", 0x00000, 0x20000},
1012 {"firmware", 0x20000, 0xe20000},
1013 {"default-mac", 0xe40000, 0x00200},
1014 {"pin", 0xe40200, 0x00200},
1015 {"product-info", 0xe40400, 0x0fc00},
1016 {"partition-table", 0xe50000, 0x10000},
1017 {"soft-version", 0xe60000, 0x10000},
1018 {"support-list", 0xe70000, 0x10000},
1019 {"profile", 0xe80000, 0x10000},
1020 {"default-config", 0xe90000, 0x10000},
1021 {"user-config", 0xea0000, 0x40000},
1022 {"qos-db", 0xee0000, 0x40000},
1023 {"certificate", 0xf20000, 0x10000},
1024 {"usb-config", 0xfb0000, 0x10000},
1025 {"log", 0xfc0000, 0x20000},
1026 {"radio-bk", 0xfe0000, 0x10000},
1027 {"radio", 0xff0000, 0x10000},
1031 .first_sysupgrade_partition
= "os-image",
1032 .last_sysupgrade_partition
= "file-system",
1035 /** Firmware layout for the RE350 v1 */
1041 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1042 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1043 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1044 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1045 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1046 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1047 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1048 .support_trail
= '\x00',
1051 /** We're using a dynamic kernel/rootfs split here */
1053 {"fs-uboot", 0x00000, 0x20000},
1054 {"firmware", 0x20000, 0x5e0000},
1055 {"partition-table", 0x600000, 0x02000},
1056 {"default-mac", 0x610000, 0x00020},
1057 {"pin", 0x610100, 0x00020},
1058 {"product-info", 0x611100, 0x01000},
1059 {"soft-version", 0x620000, 0x01000},
1060 {"support-list", 0x621000, 0x01000},
1061 {"profile", 0x622000, 0x08000},
1062 {"user-config", 0x630000, 0x10000},
1063 {"default-config", 0x640000, 0x10000},
1064 {"radio", 0x7f0000, 0x10000},
1068 .first_sysupgrade_partition
= "os-image",
1069 .last_sysupgrade_partition
= "file-system"
1072 /** Firmware layout for the RE355 */
1078 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
1079 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
1080 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
1081 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
1082 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
1083 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
1084 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
1085 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
1086 .support_trail
= '\x00',
1089 /* We're using a dynamic kernel/rootfs split here */
1091 {"fs-uboot", 0x00000, 0x20000},
1092 {"firmware", 0x20000, 0x5e0000},
1093 {"partition-table", 0x600000, 0x02000},
1094 {"default-mac", 0x610000, 0x00020},
1095 {"pin", 0x610100, 0x00020},
1096 {"product-info", 0x611100, 0x01000},
1097 {"soft-version", 0x620000, 0x01000},
1098 {"support-list", 0x621000, 0x01000},
1099 {"profile", 0x622000, 0x08000},
1100 {"user-config", 0x630000, 0x10000},
1101 {"default-config", 0x640000, 0x10000},
1102 {"radio", 0x7f0000, 0x10000},
1106 .first_sysupgrade_partition
= "os-image",
1107 .last_sysupgrade_partition
= "file-system"
1110 /** Firmware layout for the RE450 */
1116 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
1117 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
1118 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
1119 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
1120 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
1121 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
1122 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
1123 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
1124 .support_trail
= '\x00',
1127 /** We're using a dynamic kernel/rootfs split here */
1129 {"fs-uboot", 0x00000, 0x20000},
1130 {"firmware", 0x20000, 0x5e0000},
1131 {"partition-table", 0x600000, 0x02000},
1132 {"default-mac", 0x610000, 0x00020},
1133 {"pin", 0x610100, 0x00020},
1134 {"product-info", 0x611100, 0x01000},
1135 {"soft-version", 0x620000, 0x01000},
1136 {"support-list", 0x621000, 0x01000},
1137 {"profile", 0x622000, 0x08000},
1138 {"user-config", 0x630000, 0x10000},
1139 {"default-config", 0x640000, 0x10000},
1140 {"radio", 0x7f0000, 0x10000},
1144 .first_sysupgrade_partition
= "os-image",
1145 .last_sysupgrade_partition
= "file-system"
1148 /** Firmware layout for the RE450 v2 */
1154 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
1155 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
1156 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
1157 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
1158 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
1159 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
1160 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
1161 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
1162 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
1163 .support_trail
= '\x00',
1166 /* We're using a dynamic kernel/rootfs split here */
1168 {"fs-uboot", 0x00000, 0x20000},
1169 {"firmware", 0x20000, 0x5e0000},
1170 {"partition-table", 0x600000, 0x02000},
1171 {"default-mac", 0x610000, 0x00020},
1172 {"pin", 0x610100, 0x00020},
1173 {"product-info", 0x611100, 0x01000},
1174 {"soft-version", 0x620000, 0x01000},
1175 {"support-list", 0x621000, 0x01000},
1176 {"profile", 0x622000, 0x08000},
1177 {"user-config", 0x630000, 0x10000},
1178 {"default-config", 0x640000, 0x10000},
1179 {"radio", 0x7f0000, 0x10000},
1184 .first_sysupgrade_partition
= "os-image",
1185 .last_sysupgrade_partition
= "file-system"
1191 #define error(_ret, _errno, _str, ...) \
1193 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
1194 strerror(_errno)); \
1200 /** Stores a uint32 as big endian */
1201 static inline void put32(uint8_t *buf
, uint32_t val
) {
1208 /** Allocates a new image partition */
1209 static struct image_partition_entry
alloc_image_partition(const char *name
, size_t len
) {
1210 struct image_partition_entry entry
= {name
, len
, malloc(len
)};
1212 error(1, errno
, "malloc");
1217 /** Frees an image partition */
1218 static void free_image_partition(struct image_partition_entry entry
) {
1222 static time_t source_date_epoch
= -1;
1223 static void set_source_date_epoch() {
1224 char *env
= getenv("SOURCE_DATE_EPOCH");
1228 source_date_epoch
= strtoull(env
, &endptr
, 10);
1229 if (errno
|| (endptr
&& *endptr
!= '\0')) {
1230 fprintf(stderr
, "Invalid SOURCE_DATE_EPOCH");
1236 /** Generates the partition-table partition */
1237 static struct image_partition_entry
make_partition_table(const struct flash_partition_entry
*p
) {
1238 struct image_partition_entry entry
= alloc_image_partition("partition-table", 0x800);
1240 char *s
= (char *)entry
.data
, *end
= (char *)(s
+entry
.size
);
1248 for (i
= 0; p
[i
].name
; i
++) {
1250 size_t w
= snprintf(s
, len
, "partition %s base 0x%05x size 0x%05x\n", p
[i
].name
, p
[i
].base
, p
[i
].size
);
1253 error(1, 0, "flash partition table overflow?");
1260 memset(s
, 0xff, end
-s
);
1266 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
1267 static inline uint8_t bcd(uint8_t v
) {
1268 return 0x10 * (v
/10) + v
%10;
1272 /** Generates the soft-version partition */
1273 static struct image_partition_entry
make_soft_version(uint32_t rev
) {
1274 struct image_partition_entry entry
= alloc_image_partition("soft-version", sizeof(struct soft_version
));
1275 struct soft_version
*s
= (struct soft_version
*)entry
.data
;
1279 if (source_date_epoch
!= -1)
1280 t
= source_date_epoch
;
1281 else if (time(&t
) == (time_t)(-1))
1282 error(1, errno
, "time");
1284 struct tm
*tm
= localtime(&t
);
1286 s
->magic
= htonl(0x0000000c);
1290 s
->version_major
= 0;
1291 s
->version_minor
= 0;
1292 s
->version_patch
= 0;
1294 s
->year_hi
= bcd((1900+tm
->tm_year
)/100);
1295 s
->year_lo
= bcd(tm
->tm_year
%100);
1296 s
->month
= bcd(tm
->tm_mon
+1);
1297 s
->day
= bcd(tm
->tm_mday
);
1298 s
->rev
= htonl(rev
);
1305 static struct image_partition_entry
make_soft_version_from_string(const char *soft_ver
) {
1306 /** String length _including_ the terminating zero byte */
1307 uint32_t ver_len
= strlen(soft_ver
) + 1;
1308 /** Partition contains 64 bit header, the version string, and one additional null byte */
1309 size_t partition_len
= 2*sizeof(uint32_t) + ver_len
+ 1;
1310 struct image_partition_entry entry
= alloc_image_partition("soft-version", partition_len
);
1312 uint32_t *len
= (uint32_t *)entry
.data
;
1313 len
[0] = htonl(ver_len
);
1315 memcpy(&len
[2], soft_ver
, ver_len
);
1317 entry
.data
[partition_len
- 1] = 0;
1322 /** Generates the support-list partition */
1323 static struct image_partition_entry
make_support_list(struct device_info
*info
) {
1324 size_t len
= strlen(info
->support_list
);
1325 struct image_partition_entry entry
= alloc_image_partition("support-list", len
+ 9);
1327 put32(entry
.data
, len
);
1328 memset(entry
.data
+4, 0, 4);
1329 memcpy(entry
.data
+8, info
->support_list
, len
);
1330 entry
.data
[len
+8] = info
->support_trail
;
1335 /** Creates a new image partition with an arbitrary name from a file */
1336 static struct image_partition_entry
read_file(const char *part_name
, const char *filename
, bool add_jffs2_eof
, struct flash_partition_entry
*file_system_partition
) {
1337 struct stat statbuf
;
1339 if (stat(filename
, &statbuf
) < 0)
1340 error(1, errno
, "unable to stat file `%s'", filename
);
1342 size_t len
= statbuf
.st_size
;
1345 if (file_system_partition
)
1346 len
= ALIGN(len
+ file_system_partition
->base
, 0x10000) + sizeof(jffs2_eof_mark
) - file_system_partition
->base
;
1348 len
= ALIGN(len
, 0x10000) + sizeof(jffs2_eof_mark
);
1350 struct image_partition_entry entry
= alloc_image_partition(part_name
, len
);
1352 FILE *file
= fopen(filename
, "rb");
1354 error(1, errno
, "unable to open file `%s'", filename
);
1356 if (fread(entry
.data
, statbuf
.st_size
, 1, file
) != 1)
1357 error(1, errno
, "unable to read file `%s'", filename
);
1359 if (add_jffs2_eof
) {
1360 uint8_t *eof
= entry
.data
+ statbuf
.st_size
, *end
= entry
.data
+entry
.size
;
1362 memset(eof
, 0xff, end
- eof
- sizeof(jffs2_eof_mark
));
1363 memcpy(end
- sizeof(jffs2_eof_mark
), jffs2_eof_mark
, sizeof(jffs2_eof_mark
));
1371 /** Creates a new image partition from arbitrary data */
1372 static struct image_partition_entry
put_data(const char *part_name
, const char *datain
, size_t len
) {
1374 struct image_partition_entry entry
= alloc_image_partition(part_name
, len
);
1376 memcpy(entry
.data
, datain
, len
);
1382 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
1384 Example image partition table:
1386 fwup-ptn partition-table base 0x00800 size 0x00800
1387 fwup-ptn os-image base 0x01000 size 0x113b45
1388 fwup-ptn file-system base 0x114b45 size 0x1d0004
1389 fwup-ptn support-list base 0x2e4b49 size 0x000d1
1391 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
1392 the end of the partition table is marked with a zero byte.
1394 The firmware image must contain at least the partition-table and support-list partitions
1395 to be accepted. There aren't any alignment constraints for the image partitions.
1397 The partition-table partition contains the actual flash layout; partitions
1398 from the image partition table are mapped to the corresponding flash partitions during
1399 the firmware upgrade. The support-list partition contains a list of devices supported by
1402 The base offsets in the firmware partition table are relative to the end
1403 of the vendor information block, so the partition-table partition will
1404 actually start at offset 0x1814 of the image.
1406 I think partition-table must be the first partition in the firmware image.
1408 static void put_partitions(uint8_t *buffer
, const struct flash_partition_entry
*flash_parts
, const struct image_partition_entry
*parts
) {
1410 char *image_pt
= (char *)buffer
, *end
= image_pt
+ 0x800;
1412 size_t base
= 0x800;
1413 for (i
= 0; parts
[i
].name
; i
++) {
1414 for (j
= 0; flash_parts
[j
].name
; j
++) {
1415 if (!strcmp(flash_parts
[j
].name
, parts
[i
].name
)) {
1416 if (parts
[i
].size
> flash_parts
[j
].size
)
1417 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts
[j
].name
, (unsigned)flash_parts
[j
].size
);
1422 assert(flash_parts
[j
].name
);
1424 memcpy(buffer
+ base
, parts
[i
].data
, parts
[i
].size
);
1426 size_t len
= end
-image_pt
;
1427 size_t w
= snprintf(image_pt
, len
, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts
[i
].name
, (unsigned)base
, (unsigned)parts
[i
].size
);
1430 error(1, 0, "image partition table overflow?");
1434 base
+= parts
[i
].size
;
1438 /** Generates and writes the image MD5 checksum */
1439 static void put_md5(uint8_t *md5
, uint8_t *buffer
, unsigned int len
) {
1443 MD5_Update(&ctx
, md5_salt
, (unsigned int)sizeof(md5_salt
));
1444 MD5_Update(&ctx
, buffer
, len
);
1445 MD5_Final(md5
, &ctx
);
1450 Generates the firmware image in factory format
1456 0000-0003 Image size (4 bytes, big endian)
1457 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
1458 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
1459 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
1460 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
1461 1014-1813 Image partition table (2048 bytes, padded with 0xff)
1462 1814-xxxx Firmware partitions
1464 static void * generate_factory_image(struct device_info
*info
, const struct image_partition_entry
*parts
, size_t *len
) {
1468 for (i
= 0; parts
[i
].name
; i
++)
1469 *len
+= parts
[i
].size
;
1471 uint8_t *image
= malloc(*len
);
1473 error(1, errno
, "malloc");
1475 memset(image
, 0xff, *len
);
1479 size_t vendor_len
= strlen(info
->vendor
);
1480 put32(image
+0x14, vendor_len
);
1481 memcpy(image
+0x18, info
->vendor
, vendor_len
);
1484 put_partitions(image
+ 0x1014, info
->partitions
, parts
);
1485 put_md5(image
+0x04, image
+0x14, *len
-0x14);
1491 Generates the firmware image in sysupgrade format
1493 This makes some assumptions about the provided flash and image partition tables and
1494 should be generalized when TP-LINK starts building its safeloader into hardware with
1495 different flash layouts.
1497 static void * generate_sysupgrade_image(struct device_info
*info
, const struct image_partition_entry
*image_parts
, size_t *len
) {
1499 size_t flash_first_partition_index
= 0;
1500 size_t flash_last_partition_index
= 0;
1501 const struct flash_partition_entry
*flash_first_partition
= NULL
;
1502 const struct flash_partition_entry
*flash_last_partition
= NULL
;
1503 const struct image_partition_entry
*image_last_partition
= NULL
;
1505 /** Find first and last partitions */
1506 for (i
= 0; info
->partitions
[i
].name
; i
++) {
1507 if (!strcmp(info
->partitions
[i
].name
, info
->first_sysupgrade_partition
)) {
1508 flash_first_partition
= &info
->partitions
[i
];
1509 flash_first_partition_index
= i
;
1510 } else if (!strcmp(info
->partitions
[i
].name
, info
->last_sysupgrade_partition
)) {
1511 flash_last_partition
= &info
->partitions
[i
];
1512 flash_last_partition_index
= i
;
1516 assert(flash_first_partition
&& flash_last_partition
);
1517 assert(flash_first_partition_index
< flash_last_partition_index
);
1519 /** Find last partition from image to calculate needed size */
1520 for (i
= 0; image_parts
[i
].name
; i
++) {
1521 if (!strcmp(image_parts
[i
].name
, info
->last_sysupgrade_partition
)) {
1522 image_last_partition
= &image_parts
[i
];
1527 assert(image_last_partition
);
1529 *len
= flash_last_partition
->base
- flash_first_partition
->base
+ image_last_partition
->size
;
1531 uint8_t *image
= malloc(*len
);
1533 error(1, errno
, "malloc");
1535 memset(image
, 0xff, *len
);
1537 for (i
= flash_first_partition_index
; i
<= flash_last_partition_index
; i
++) {
1538 for (j
= 0; image_parts
[j
].name
; j
++) {
1539 if (!strcmp(info
->partitions
[i
].name
, image_parts
[j
].name
)) {
1540 if (image_parts
[j
].size
> info
->partitions
[i
].size
)
1541 error(1, 0, "%s partition too big (more than %u bytes)", info
->partitions
[i
].name
, (unsigned)info
->partitions
[i
].size
);
1542 memcpy(image
+ info
->partitions
[i
].base
- flash_first_partition
->base
, image_parts
[j
].data
, image_parts
[j
].size
);
1546 assert(image_parts
[j
].name
);
1553 /** Generates an image according to a given layout and writes it to a file */
1554 static void build_image(const char *output
,
1555 const char *kernel_image
,
1556 const char *rootfs_image
,
1560 struct device_info
*info
) {
1564 struct image_partition_entry parts
[7] = {};
1566 struct flash_partition_entry
*firmware_partition
= NULL
;
1567 struct flash_partition_entry
*os_image_partition
= NULL
;
1568 struct flash_partition_entry
*file_system_partition
= NULL
;
1569 size_t firmware_partition_index
= 0;
1571 for (i
= 0; info
->partitions
[i
].name
; i
++) {
1572 if (!strcmp(info
->partitions
[i
].name
, "firmware"))
1574 firmware_partition
= &info
->partitions
[i
];
1575 firmware_partition_index
= i
;
1579 if (firmware_partition
)
1581 os_image_partition
= &info
->partitions
[firmware_partition_index
];
1582 file_system_partition
= &info
->partitions
[firmware_partition_index
+ 1];
1585 if (stat(kernel_image
, &kernel
) < 0)
1586 error(1, errno
, "unable to stat file `%s'", kernel_image
);
1588 if (kernel
.st_size
> firmware_partition
->size
)
1589 error(1, 0, "kernel overflowed firmware partition\n");
1591 for (i
= MAX_PARTITIONS
-1; i
>= firmware_partition_index
+ 1; i
--)
1592 info
->partitions
[i
+1] = info
->partitions
[i
];
1594 file_system_partition
->name
= "file-system";
1595 file_system_partition
->base
= firmware_partition
->base
+ kernel
.st_size
;
1597 /* Align partition start to erase blocks for factory images only */
1599 file_system_partition
->base
= ALIGN(firmware_partition
->base
+ kernel
.st_size
, 0x10000);
1601 file_system_partition
->size
= firmware_partition
->size
- file_system_partition
->base
;
1603 os_image_partition
->name
= "os-image";
1604 os_image_partition
->size
= kernel
.st_size
;
1607 parts
[0] = make_partition_table(info
->partitions
);
1609 parts
[1] = make_soft_version_from_string(info
->soft_ver
);
1611 parts
[1] = make_soft_version(rev
);
1613 parts
[2] = make_support_list(info
);
1614 parts
[3] = read_file("os-image", kernel_image
, false, NULL
);
1615 parts
[4] = read_file("file-system", rootfs_image
, add_jffs2_eof
, file_system_partition
);
1617 /* Some devices need the extra-para partition to accept the firmware */
1618 if (strcasecmp(info
->id
, "ARCHER-C25-V1") == 0 ||
1619 strcasecmp(info
->id
, "ARCHER-C59-V2") == 0 ||
1620 strcasecmp(info
->id
, "ARCHER-C60-V2") == 0 ||
1621 strcasecmp(info
->id
, "TLWR1043NV5") == 0) {
1622 const char mdat
[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
1623 parts
[5] = put_data("extra-para", mdat
, 11);
1624 } else if (strcasecmp(info
->id
, "ARCHER-A7-V5") == 0 || strcasecmp(info
->id
, "ARCHER-C7-V4") == 0 || strcasecmp(info
->id
, "ARCHER-C7-V5") == 0) {
1625 const char mdat
[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
1626 parts
[5] = put_data("extra-para", mdat
, 11);
1632 image
= generate_sysupgrade_image(info
, parts
, &len
);
1634 image
= generate_factory_image(info
, parts
, &len
);
1636 FILE *file
= fopen(output
, "wb");
1638 error(1, errno
, "unable to open output file");
1640 if (fwrite(image
, len
, 1, file
) != 1)
1641 error(1, 0, "unable to write output file");
1647 for (i
= 0; parts
[i
].name
; i
++)
1648 free_image_partition(parts
[i
]);
1652 static void usage(const char *argv0
) {
1654 "Usage: %s [OPTIONS...]\n"
1657 " -h show this help\n"
1659 "Create a new image:\n"
1660 " -B <board> create image for the board specified with <board>\n"
1661 " -k <file> read kernel image from the file <file>\n"
1662 " -r <file> read rootfs image from the file <file>\n"
1663 " -o <file> write output to the file <file>\n"
1664 " -V <rev> sets the revision number to <rev>\n"
1665 " -j add jffs2 end-of-filesystem markers\n"
1666 " -S create sysupgrade instead of factory image\n"
1667 "Extract an old image:\n"
1668 " -x <file> extract all oem firmware partition\n"
1669 " -d <dir> destination to extract the firmware partition\n"
1670 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
1676 static struct device_info
*find_board(const char *id
)
1678 struct device_info
*board
= NULL
;
1680 for (board
= boards
; board
->id
!= NULL
; board
++)
1681 if (strcasecmp(id
, board
->id
) == 0)
1687 static int add_flash_partition(
1688 struct flash_partition_entry
*part_list
,
1695 /* check if the list has a free entry */
1696 for (ptr
= 0; ptr
< max_entries
; ptr
++, part_list
++) {
1697 if (part_list
->name
== NULL
&&
1698 part_list
->base
== 0 &&
1699 part_list
->size
== 0)
1703 if (ptr
== max_entries
) {
1704 error(1, 0, "No free flash part entry available.");
1707 part_list
->name
= calloc(1, strlen(name
) + 1);
1708 if (!part_list
->name
) {
1709 error(1, 0, "Unable to allocate memory");
1712 memcpy((char *)part_list
->name
, name
, strlen(name
));
1713 part_list
->base
= base
;
1714 part_list
->size
= size
;
1719 /** read the partition table into struct flash_partition_entry */
1720 static int read_partition_table(
1721 FILE *file
, long offset
,
1722 struct flash_partition_entry
*entries
, size_t max_entries
,
1727 const char *parthdr
= NULL
;
1728 const char *fwuphdr
= "fwup-ptn";
1729 const char *flashhdr
= "partition";
1731 /* TODO: search for the partition table */
1741 error(1, 0, "Invalid partition table");
1744 if (fseek(file
, offset
, SEEK_SET
) < 0)
1745 error(1, errno
, "Can not seek in the firmware");
1747 if (fread(buf
, 1, 2048, file
) < 0)
1748 error(1, errno
, "Can not read fwup-ptn from the firmware");
1752 /* look for the partition header */
1753 if (memcmp(buf
, parthdr
, strlen(parthdr
)) != 0) {
1754 fprintf(stderr
, "DEBUG: can not find fwuphdr\n");
1759 end
= buf
+ sizeof(buf
);
1760 while ((ptr
+ strlen(parthdr
)) < end
&&
1761 memcmp(ptr
, parthdr
, strlen(parthdr
)) == 0) {
1765 char name
[32] = { 0 };
1767 unsigned long base
= 0;
1768 unsigned long size
= 0;
1770 end_part
= memchr(ptr
, '\n', (end
- ptr
));
1771 if (end_part
== NULL
) {
1772 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
1776 for (int i
= 0; i
<= 4; i
++) {
1777 if (end_part
<= ptr
)
1780 end_element
= memchr(ptr
, 0x20, (end_part
- ptr
));
1781 if (end_element
== NULL
) {
1782 error(1, errno
, "Ignoring the rest of the partition entries.");
1787 /* partition header */
1789 ptr
= end_element
+ 1;
1793 name_len
= (end_element
- ptr
) > 31 ? 31 : (end_element
- ptr
);
1794 strncpy(name
, ptr
, name_len
);
1795 name
[name_len
] = '\0';
1796 ptr
= end_element
+ 1;
1801 ptr
= end_element
+ 1;
1806 base
= strtoul(ptr
, NULL
, 16);
1807 ptr
= end_element
+ 1;
1812 ptr
= end_element
+ 1;
1813 /* actual size. The last element doesn't have a sepeartor */
1814 size
= strtoul(ptr
, NULL
, 16);
1815 /* the part ends with 0x09, 0x0d, 0x0a */
1817 add_flash_partition(entries
, max_entries
, name
, base
, size
);
1826 static void write_partition(
1828 size_t firmware_offset
,
1829 struct flash_partition_entry
*entry
,
1835 fseek(input_file
, entry
->base
+ firmware_offset
, SEEK_SET
);
1837 for (offset
= 0; sizeof(buf
) + offset
<= entry
->size
; offset
+= sizeof(buf
)) {
1838 if (fread(buf
, sizeof(buf
), 1, input_file
) < 0)
1839 error(1, errno
, "Can not read partition from input_file");
1841 if (fwrite(buf
, sizeof(buf
), 1, output_file
) < 0)
1842 error(1, errno
, "Can not write partition to output_file");
1844 /* write last chunk smaller than buffer */
1845 if (offset
< entry
->size
) {
1846 offset
= entry
->size
- offset
;
1847 if (fread(buf
, offset
, 1, input_file
) < 0)
1848 error(1, errno
, "Can not read partition from input_file");
1849 if (fwrite(buf
, offset
, 1, output_file
) < 0)
1850 error(1, errno
, "Can not write partition to output_file");
1854 static int extract_firmware_partition(FILE *input_file
, size_t firmware_offset
, struct flash_partition_entry
*entry
, const char *output_directory
)
1857 char output
[PATH_MAX
];
1859 snprintf(output
, PATH_MAX
, "%s/%s", output_directory
, entry
->name
);
1860 output_file
= fopen(output
, "wb+");
1861 if (output_file
== NULL
) {
1862 error(1, errno
, "Can not open output file %s", output
);
1865 write_partition(input_file
, firmware_offset
, entry
, output_file
);
1867 fclose(output_file
);
1872 /** extract all partitions from the firmware file */
1873 static int extract_firmware(const char *input
, const char *output_directory
)
1875 struct flash_partition_entry entries
[16] = { 0 };
1876 size_t max_entries
= 16;
1877 size_t firmware_offset
= 0x1014;
1880 struct stat statbuf
;
1882 /* check input file */
1883 if (stat(input
, &statbuf
)) {
1884 error(1, errno
, "Can not read input firmware %s", input
);
1887 /* check if output directory exists */
1888 if (stat(output_directory
, &statbuf
)) {
1889 error(1, errno
, "Failed to stat output directory %s", output_directory
);
1892 if ((statbuf
.st_mode
& S_IFMT
) != S_IFDIR
) {
1893 error(1, errno
, "Given output directory is not a directory %s", output_directory
);
1896 input_file
= fopen(input
, "rb");
1898 if (read_partition_table(input_file
, firmware_offset
, entries
, 16, 0) != 0) {
1899 error(1, 0, "Error can not read the partition table (fwup-ptn)");
1902 for (int i
= 0; i
< max_entries
; i
++) {
1903 if (entries
[i
].name
== NULL
&&
1904 entries
[i
].base
== 0 &&
1905 entries
[i
].size
== 0)
1908 extract_firmware_partition(input_file
, firmware_offset
, &entries
[i
], output_directory
);
1914 static struct flash_partition_entry
*find_partition(
1915 struct flash_partition_entry
*entries
, size_t max_entries
,
1916 const char *name
, const char *error_msg
)
1918 for (int i
= 0; i
< max_entries
; i
++, entries
++) {
1919 if (strcmp(entries
->name
, name
) == 0)
1923 error(1, 0, "%s", error_msg
);
1927 static void write_ff(FILE *output_file
, size_t size
)
1932 memset(buf
, 0xff, sizeof(buf
));
1934 for (offset
= 0; offset
+ sizeof(buf
) < size
; offset
+= sizeof(buf
)) {
1935 if (fwrite(buf
, sizeof(buf
), 1, output_file
) < 0)
1936 error(1, errno
, "Can not write 0xff to output_file");
1939 /* write last chunk smaller than buffer */
1940 if (offset
< size
) {
1941 offset
= size
- offset
;
1942 if (fwrite(buf
, offset
, 1, output_file
) < 0)
1943 error(1, errno
, "Can not write partition to output_file");
1947 static void convert_firmware(const char *input
, const char *output
)
1949 struct flash_partition_entry fwup
[MAX_PARTITIONS
] = { 0 };
1950 struct flash_partition_entry flash
[MAX_PARTITIONS
] = { 0 };
1951 struct flash_partition_entry
*fwup_os_image
= NULL
, *fwup_file_system
= NULL
;
1952 struct flash_partition_entry
*flash_os_image
= NULL
, *flash_file_system
= NULL
;
1953 struct flash_partition_entry
*fwup_partition_table
= NULL
;
1954 size_t firmware_offset
= 0x1014;
1955 FILE *input_file
, *output_file
;
1957 struct stat statbuf
;
1959 /* check input file */
1960 if (stat(input
, &statbuf
)) {
1961 error(1, errno
, "Can not read input firmware %s", input
);
1964 input_file
= fopen(input
, "rb");
1966 error(1, 0, "Can not open input firmware %s", input
);
1968 output_file
= fopen(output
, "wb");
1970 error(1, 0, "Can not open output firmware %s", output
);
1972 if (read_partition_table(input_file
, firmware_offset
, fwup
, MAX_PARTITIONS
, 0) != 0) {
1973 error(1, 0, "Error can not read the partition table (fwup-ptn)");
1976 fwup_os_image
= find_partition(fwup
, MAX_PARTITIONS
,
1977 "os-image", "Error can not find os-image partition (fwup)");
1978 fwup_file_system
= find_partition(fwup
, MAX_PARTITIONS
,
1979 "file-system", "Error can not find file-system partition (fwup)");
1980 fwup_partition_table
= find_partition(fwup
, MAX_PARTITIONS
,
1981 "partition-table", "Error can not find partition-table partition");
1983 /* the flash partition table has a 0x00000004 magic haeder */
1984 if (read_partition_table(input_file
, firmware_offset
+ fwup_partition_table
->base
+ 4, flash
, MAX_PARTITIONS
, 1) != 0)
1985 error(1, 0, "Error can not read the partition table (flash)");
1987 flash_os_image
= find_partition(flash
, MAX_PARTITIONS
,
1988 "os-image", "Error can not find os-image partition (flash)");
1989 flash_file_system
= find_partition(flash
, MAX_PARTITIONS
,
1990 "file-system", "Error can not find file-system partition (flash)");
1992 /* write os_image to 0x0 */
1993 write_partition(input_file
, firmware_offset
, fwup_os_image
, output_file
);
1994 write_ff(output_file
, flash_os_image
->size
- fwup_os_image
->size
);
1996 /* write file-system behind os_image */
1997 fseek(output_file
, flash_file_system
->base
- flash_os_image
->base
, SEEK_SET
);
1998 write_partition(input_file
, firmware_offset
, fwup_file_system
, output_file
);
1999 write_ff(output_file
, flash_file_system
->size
- fwup_file_system
->size
);
2001 fclose(output_file
);
2005 int main(int argc
, char *argv
[]) {
2006 const char *board
= NULL
, *kernel_image
= NULL
, *rootfs_image
= NULL
, *output
= NULL
;
2007 const char *extract_image
= NULL
, *output_directory
= NULL
, *convert_image
= NULL
;
2008 bool add_jffs2_eof
= false, sysupgrade
= false;
2010 struct device_info
*info
;
2011 set_source_date_epoch();
2016 c
= getopt(argc
, argv
, "B:k:r:o:V:jSh:x:d:z:");
2026 kernel_image
= optarg
;
2030 rootfs_image
= optarg
;
2038 sscanf(optarg
, "r%u", &rev
);
2042 add_jffs2_eof
= true;
2054 output_directory
= optarg
;
2058 extract_image
= optarg
;
2062 convert_image
= optarg
;
2071 if (extract_image
|| output_directory
) {
2073 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
2074 if (!output_directory
)
2075 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
2076 extract_firmware(extract_image
, output_directory
);
2077 } else if (convert_image
) {
2079 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
2080 convert_firmware(convert_image
, output
);
2083 error(1, 0, "no board has been specified");
2085 error(1, 0, "no kernel image has been specified");
2087 error(1, 0, "no rootfs image has been specified");
2089 error(1, 0, "no output filename has been specified");
2091 info
= find_board(board
);
2094 error(1, 0, "unsupported board %s", board
);
2096 build_image(output
, kernel_image
, rootfs_image
, rev
, add_jffs2_eof
, sysupgrade
, info
);