+// SPDX-License-Identifier: BSD-2-Clause
/*
Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
All rights reserved.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions are met:
-
- 1. Redistributions of source code must retain the above copyright notice,
- this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-
- THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
- DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
- SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
- CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/** A flash partition table entry */
struct flash_partition_entry {
- char *name;
+ const char *name;
uint32_t base;
uint32_t size;
};
+/** Flash partition names table entry */
+struct factory_partition_names {
+ const char *partition_table;
+ const char *soft_ver;
+ const char *os_image;
+ const char *support_list;
+ const char *file_system;
+ const char *extra_para;
+};
+
/** Partition trailing padding definitions
* Values 0x00 to 0xff are reserved to indicate the padding value
* Values from 0x100 are reserved to indicate other behaviour */
PART_TRAIL_NONE = 0x100
};
+/** soft-version value overwrite types
+ * The default (for an uninitialised soft_ver field) is to use the numerical
+ * version number "0.0.0"
+ */
+enum soft_ver_type {
+ SOFT_VER_TYPE_NUMERIC = 0,
+ SOFT_VER_TYPE_TEXT = 1,
+};
+
/** Firmware layout description */
struct device_info {
const char *id;
const char *vendor;
const char *support_list;
enum partition_trail_value part_trail;
- const char *soft_ver;
+ struct {
+ enum soft_ver_type type;
+ union {
+ const char *text;
+ uint8_t num[3];
+ };
+ } soft_ver;
uint32_t soft_ver_compat_level;
struct flash_partition_entry partitions[MAX_PARTITIONS+1];
const char *first_sysupgrade_partition;
const char *last_sysupgrade_partition;
+ struct factory_partition_names partition_names;
};
+#define SOFT_VER_TEXT(_t) {.type = SOFT_VER_TYPE_TEXT, .text = _t}
+#define SOFT_VER_NUMERIC(_maj, _min, _patch) { \
+ .type = SOFT_VER_TYPE_NUMERIC, \
+ .num = {_maj, _min, _patch}}
+#define SOFT_VER_DEFAULT SOFT_VER_NUMERIC(0, 0, 0)
+
struct __attribute__((__packed__)) meta_header {
uint32_t length;
uint32_t zero;
uint32_t compat_level;
};
+/*
+ * Safeloader image type
+ * Safeloader images contain a 0x14 byte preamble with image size (big endian
+ * UINT32) and md5 checksum (16 bytes).
+ *
+ * SAFEFLOADER_TYPE_DEFAULT
+ * Standard preamble with size including preamble length, and checksum.
+ * Header of 0x1000 bytes, contents of which are not specified.
+ * Payload starts at offset 0x1014.
+ *
+ * SAFELOADER_TYPE_VENDOR
+ * Standard preamble with size including preamble length, and checksum.
+ * Header contains up to 0x1000 bytes of vendor data, starting with a big endian
+ * UINT32 size, followed by that number of bytes containing (text) data.
+ * Padded with 0xFF. Payload starts at offset 0x1014.
+ *
+ * SAFELOADER_TYPE_CLOUD
+ * Standard preamble with size including preamble length, and checksum.
+ * Followed by the 'fw-type:Cloud' string and some (unknown) data.
+ * Payload starts at offset 0x1014.
+ *
+ * SAFELOADER_TYPE_QNEW
+ * Reversed order preamble, with (apparent) md5 checksum before the image
+ * size. The size does not include the preamble length.
+ * Header starts with 0x3C bytes, starting with the string '?NEW' (format not
+ * understood). Then another 0x1000 bytes follow, with the data payload
+ * starting at 0x1050.
+ */
+enum safeloader_image_type {
+ SAFELOADER_TYPE_DEFAULT,
+ SAFELOADER_TYPE_VENDOR,
+ SAFELOADER_TYPE_CLOUD,
+ SAFELOADER_TYPE_QNEW,
+};
+
+/* Internal representation of safeloader image data */
+struct safeloader_image_info {
+ enum safeloader_image_type type;
+ size_t payload_offset;
+ struct flash_partition_entry entries[MAX_PARTITIONS];
+};
+
+#define SAFELOADER_PREAMBLE_SIZE 0x14
+#define SAFELOADER_HEADER_SIZE 0x1000
+#define SAFELOADER_PAYLOAD_OFFSET (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_HEADER_SIZE)
+
+#define SAFELOADER_QNEW_HEADER_SIZE 0x3C
+#define SAFELOADER_QNEW_PAYLOAD_OFFSET \
+ (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_QNEW_HEADER_SIZE + SAFELOADER_HEADER_SIZE)
+
+#define SAFELOADER_PAYLOAD_TABLE_SIZE 0x800
static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
"CPE220(TP-LINK|US|N300-2):1.1\r\n"
"CPE220(TP-LINK|EU|N300-2):1.1\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"CPE210(TP-LINK|EU|N300-2):2.0\r\n"
"CPE210(TP-LINK|US|N300-2):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
"CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"CPE220(TP-LINK|EU|N300-2):2.0\r\n"
"CPE220(TP-LINK|US|N300-2):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"CPE220(TP-LINK|EU|N300-2):3.0\r\n"
"CPE220(TP-LINK|US|N300-2):3.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"CPE510(TP-LINK|UN|N300-5):1.1\r\n"
"CPE510(TP-LINK|UN|N300-5):1.1\r\n"
"CPE510(TP-LINK|US|N300-5):1.1\r\n"
+ "CPE510(TP-LINK|CA|N300-5):1.1\r\n"
"CPE510(TP-LINK|EU|N300-5):1.1\r\n"
"CPE520(TP-LINK|UN|N300-5):1.1\r\n"
"CPE520(TP-LINK|US|N300-5):1.1\r\n"
"CPE520(TP-LINK|EU|N300-5):1.1\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"CPE510(TP-LINK|EU|N300-5):2.0\r\n"
"CPE510(TP-LINK|US|N300-5):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
"CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
.last_sysupgrade_partition = "support-list",
},
+ /** Firmware layout for the CPE605V1 */
+ {
+ .id = "CPE605V1",
+ .vendor = "CPE605(TP-LINK|UN|N150-5):1.0\r\n",
+ .support_list =
+ "SupportList:\r\n"
+ "CPE605(TP-LINK|UN|N150-5|00000000):1.0\r\n"
+ "CPE605(TP-LINK|EU|N150-5|45550000):1.0\r\n"
+ "CPE605(TP-LINK|US|N150-5|55530000):1.0\r\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"partition-table", 0x20000, 0x02000},
+ {"default-mac", 0x30000, 0x00020},
+ {"serial-number", 0x30100, 0x00020},
+ {"product-info", 0x31100, 0x00100},
+ {"device-info", 0x31400, 0x00400},
+ {"signature", 0x32000, 0x00400},
+ {"device-id", 0x33000, 0x00100},
+ {"firmware", 0x40000, 0x770000},
+ {"soft-version", 0x7b0000, 0x00100},
+ {"support-list", 0x7b1000, 0x01000},
+ {"user-config", 0x7c0000, 0x10000},
+ {"default-config", 0x7d0000, 0x10000},
+ {"log", 0x7e0000, 0x10000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "support-list",
+ },
+
/** Firmware layout for the CPE610V1 */
{
.id = "CPE610V1",
"CPE610(TP-LINK|EU|N300-5):1.0\r\n"
"CPE610(TP-LINK|US|N300-5):1.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"CPE610(TP-LINK|EU|N300-5):2.0\r\n"
"CPE610(TP-LINK|US|N300-5):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
.first_sysupgrade_partition = "os-image",
.last_sysupgrade_partition = "support-list",
},
+ /** Firmware layout for the CPE710 V1 */
+ {
+ .id = "CPE710V1",
+ .vendor = "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n",
+ .support_list =
+ "SupportList:\r\n"
+ "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n"
+ "CPE710(TP-LINK|EU|AC866-5|45550000):1.0\r\n"
+ "CPE710(TP-LINK|US|AC866-5|55530000):1.0\r\n"
+ "CPE710(TP-LINK|UN|AC866-5):1.0\r\n"
+ "CPE710(TP-LINK|EU|AC866-5):1.0\r\n"
+ "CPE710(TP-LINK|US|AC866-5):1.0\r\n",
+ .part_trail = 0xff,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x50000},
+ {"partition-table", 0x50000, 0x02000},
+ {"default-mac", 0x60000, 0x00020},
+ {"serial-number", 0x60100, 0x00020},
+ {"product-info", 0x61100, 0x00100},
+ {"device-info", 0x61400, 0x00400},
+ {"signature", 0x62000, 0x00400},
+ {"device-id", 0x63000, 0x00100},
+ {"firmware", 0x70000, 0xf40000},
+ {"soft-version", 0xfb0000, 0x00100},
+ {"support-list", 0xfb1000, 0x01000},
+ {"user-config", 0xfc0000, 0x10000},
+ {"default-config", 0xfd0000, 0x10000},
+ {"log", 0xfe0000, 0x10000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "support-list",
+ },
{
.id = "WBS210",
"WBS210(TP-LINK|US|N300-2):1.20\r\n"
"WBS210(TP-LINK|EU|N300-2):1.20\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
"WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"WBS510(TP-LINK|EU|N300-5):1.20\r\n"
"WBS510(TP-LINK|CA|N300-5):1.20\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
"WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
"WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
{"default-mac", 0x30000, 0x00020},
{"product-info", 0x31100, 0x00100},
{"signature", 0x32000, 0x00400},
- {"os-image", 0x40000, 0x300000},
- {"file-system", 0x340000, 0x470000},
+ {"firmware", 0x40000, 0x770000},
{"soft-version", 0x7b0000, 0x00100},
{"support-list", 0x7b1000, 0x00400},
{"user-config", 0x7c0000, 0x10000},
.vendor = "",
.support_list =
"SupportList:\r\n"
- "{product_name:Talon AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
+ "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"SBL1", 0x00000, 0x20000},
"SupportList:\r\n"
"{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/**
We use a bigger os-image partition than the stock images (and thus
"{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
"{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
.last_sysupgrade_partition = "file-system",
},
+ /** Firmware layout for the Archer A9 v6 */
+ {
+ .id = "ARCHER-A9-V6",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:Archer A9,product_ver:6.0,special_id:55530000}\n"
+ "{product_name:Archer A9,product_ver:6.0,special_id:45550000}\n"
+ "{product_name:Archer A9,product_ver:6.0,special_id:52550000}\n"
+ "{product_name:Archer A9,product_ver:6.0,special_id:4A500000}\n"
+ "{product_name:Archer C90,product_ver:6.0,special_id:55530000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
+
+ /* We're using a dynamic kernel/rootfs split here */
+ .partitions = {
+ {"factory-boot", 0x00000, 0x20000},
+ {"fs-uboot", 0x20000, 0x20000},
+ {"partition-table", 0x40000, 0x10000},
+ {"radio", 0x50000, 0x10000},
+ {"default-mac", 0x60000, 0x00200},
+ {"pin", 0x60200, 0x00200},
+ {"device-id", 0x60400, 0x00100},
+ {"product-info", 0x60500, 0x0fb00},
+ {"soft-version", 0x70000, 0x01000},
+ {"extra-para", 0x71000, 0x01000},
+ {"support-list", 0x72000, 0x0a000},
+ {"profile", 0x7c000, 0x04000},
+ {"user-config", 0x80000, 0x10000},
+ {"ap-config", 0x90000, 0x10000},
+ {"apdef-config", 0xa0000, 0x10000},
+ {"router-config", 0xb0000, 0x10000},
+ {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
+ /* Stock: name file-system base 0x1e0000 size 0xde0000 */
+ {"log", 0xfc0000, 0x20000},
+ {"certificate", 0xfe0000, 0x10000},
+ {"default-config", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
+ /** Firmware layout for the Archer AX23 v1 */
+ {
+ .id = "ARCHER-AX23-V1",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:Archer AX23,product_ver:1.0,special_id:45550000}\n"
+ "{product_name:Archer AX23,product_ver:1.0,special_id:4A500000}\n"
+ "{product_name:Archer AX23,product_ver:1.0,special_id:4B520000}\n"
+ "{product_name:Archer AX23,product_ver:1.0,special_id:52550000}\n"
+ "{product_name:Archer AX23,product_ver:1.0.0,special_id:43410000}\n"
+ "{product_name:Archer AX23,product_ver:1.0.0,special_id:54570000}\n"
+ "{product_name:Archer AX23,product_ver:1.0.0,special_id:55530000}\n"
+ "{product_name:Archer AX23,product_ver:1.20,special_id:45550000}\n"
+ "{product_name:Archer AX23,product_ver:1.20,special_id:4A500000}\n"
+ "{product_name:Archer AX23,product_ver:1.20,special_id:52550000}\n"
+ "{product_name:Archer AX23,product_ver:1.20,special_id:55530000}\n"
+ "{product_name:Archer AX1800,product_ver:1.20,special_id:45550000}\n"
+ "{product_name:Archer AX1800,product_ver:1.20,special_id:52550000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.3\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00200},
+ {"pin", 0xfa0200, 0x00100},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"default-config", 0xfb0000, 0x08000},
+ {"ap-def-config", 0xfb8000, 0x08000},
+ {"user-config", 0xfc0000, 0x0a000},
+ {"ag-config", 0xfca000, 0x04000},
+ {"certificate", 0xfce000, 0x02000},
+ {"ap-config", 0xfd0000, 0x06000},
+ {"router-config", 0xfd6000, 0x06000},
+ {"favicon", 0xfdc000, 0x02000},
+ {"logo", 0xfde000, 0x02000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00400},
+ {"profile", 0xfe0d00, 0x03000},
+ {"extra-para", 0xfe3d00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
/** Firmware layout for the C2v3 */
{
.id = "ARCHER-C2-V3",
"{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
"{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:3.0.1\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.1\n"),
/** We're using a dynamic kernel/rootfs split here */
"{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
"{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
"{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
.partitions = {
{"fs-uboot", 0x00000, 0x10000},
.support_list =
"SupportList:\r\n"
"{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
+ "{product_name:Archer C59,product_ver:1.0.0,special_id:43410000}\r\n"
"{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
"{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
"{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
.support_list =
"SupportList:\r\n"
"{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
+ "{product_name:Archer C59,product_ver:2.0.0,special_id:43410000}\r\n"
"{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
"{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0 Build 20161206 rel.7303\n"),
/** We're using a dynamic kernel/rootfs split here */
.partitions = {
.vendor = "",
.support_list =
"SupportList:\r\n"
+ "{product_name:Archer A6,product_ver:2.0.0,special_id:45550000}\r\n"
+ "{product_name:Archer A6,product_ver:2.0.0,special_id:52550000}\r\n"
"{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
"{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
"{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.9.1\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
"{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.9.1\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
.partitions = {
{"factory-boot", 0x00000, 0x20000},
.first_sysupgrade_partition = "os-image",
.last_sysupgrade_partition = "file-system",
},
+ /** Firmware layout for the Archer C6 v3 */
+ {
+ .id = "ARCHER-C6-V3",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:Archer C6,product_ver:3.20,special_id:55530000}"
+ "{product_name:Archer C6,product_ver:3.20,special_id:45550000}"
+ "{product_name:Archer C6,product_ver:3.20,special_id:52550000}"
+ "{product_name:Archer C6,product_ver:3.20,special_id:4A500000}"
+ "{product_name:Archer C6,product_ver:3.20,special_id:4B520000}"
+ "{product_name:Archer C6,product_ver:3.0.0,special_id:42520000}",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.9\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00200},
+ {"pin", 0xfa0200, 0x00100},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"default-config", 0xfb0000, 0x08000},
+ {"ap-def-config", 0xfb8000, 0x08000},
+ {"user-config", 0xfc0000, 0x0a000},
+ {"ag-config", 0xfca000, 0x04000},
+ {"certificate", 0xfce000, 0x02000},
+ {"ap-config", 0xfd0000, 0x06000},
+ {"router-config", 0xfd6000, 0x06000},
+ {"favicon", 0xfdc000, 0x02000},
+ {"logo", 0xfde000, 0x02000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00200},
+ {"profile", 0xfe0b00, 0x03000},
+ {"extra-para", 0xfe3b00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+ /** Firmware layout for the Archer A6 v3 */
+ {
+ .id = "ARCHER-A6-V3",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:Archer A6,product_ver:3.0.0,special_id:43410000}\n"
+ "{product_name:Archer A6,product_ver:3.0.0,special_id:55530000}\n"
+ "{product_name:Archer A6,product_ver:3.0.0,special_id:54570000}\n"
+ "{product_name:Archer A6,product_ver:3.0.0,special_id:4A500000}\n"
+ "{product_name:Archer A6,product_ver:3.20,special_id:45550000}\n"
+ "{product_name:Archer A6,product_ver:3.20,special_id:52550000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.5\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00200},
+ {"pin", 0xfa0200, 0x00100},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"default-config", 0xfb0000, 0x08000},
+ {"ap-def-config", 0xfb8000, 0x08000},
+ {"user-config", 0xfc0000, 0x0a000},
+ {"ag-config", 0xfca000, 0x04000},
+ {"certificate", 0xfce000, 0x02000},
+ {"ap-config", 0xfd0000, 0x06000},
+ {"router-config", 0xfd6000, 0x06000},
+ {"favicon", 0xfdc000, 0x02000},
+ {"logo", 0xfde000, 0x02000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00200},
+ {"profile", 0xfe0b00, 0x03000},
+ {"extra-para", 0xfe3b00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+ /** Firmware layout for the Archer C6U v1 */
+ {
+ .id = "ARCHER-C6U-V1",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:Archer C6U,product_ver:1.0.0,special_id:45550000}\n"
+ "{product_name:Archer C6U,product_ver:1.0.0,special_id:52550000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.2\n"),
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00200},
+ {"pin", 0xfa0200, 0x00100},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"default-config", 0xfb0000, 0x08000},
+ {"ap-def-config", 0xfb8000, 0x08000},
+ {"user-config", 0xfc0000, 0x0c000},
+ {"certificate", 0xfcc000, 0x04000},
+ {"ap-config", 0xfd0000, 0x08000},
+ {"router-config", 0xfd8000, 0x08000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00200},
+ {"profile", 0xfe0b00, 0x03000},
+ {"extra-para", 0xfe3b00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
/** Firmware layout for the C60v1 */
{
.id = "ARCHER-C60-V1",
.support_list =
"SupportList:\r\n"
"{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
+ "{product_name:Archer C60,product_ver:1.0.0,special_id:43410000}\r\n"
"{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
"{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
.partitions = {
{"fs-uboot", 0x00000, 0x10000},
.support_list =
"SupportList:\r\n"
"{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
+ "{product_name:Archer C60,product_ver:2.0.0,special_id:43410000}\r\n"
"{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
"{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:2.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
.partitions = {
{"factory-boot", 0x00000, 0x1fb00},
.support_list =
"SupportList:\r\n"
"{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
+ "{product_name:Archer C60,product_ver:3.0.0,special_id:43410000}\r\n"
"{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
"{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:3.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.0\n"),
.partitions = {
{"factory-boot", 0x00000, 0x1fb00},
"{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
"{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x40000},
"{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
"{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:7.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"product_ver:1.0.0,"
"special_id:00000000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x40000},
.last_sysupgrade_partition = "file-system"
},
+ /** Firmware layout for the Deco M4R v1 and v2 */
+ {
+ .id = "DECO-M4R-V1",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:55530000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:45550000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:43410000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:4A500000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:41550000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:4B520000}\n"
+ "{product_name:M4R,product_ver:1.0.0,special_id:49440000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:55530000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:45550000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:43410000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:4A500000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:41550000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:4B520000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:54570000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:42340000}\n"
+ "{product_name:M4R,product_ver:2.0.0,special_id:49440000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x80000},
+ {"firmware", 0x80000, 0xe00000},
+ {"product-info", 0xe80000, 0x05000},
+ {"default-mac", 0xe85000, 0x01000},
+ {"device-id", 0xe86000, 0x01000},
+ {"support-list", 0xe87000, 0x10000},
+ {"user-config", 0xea7000, 0x10000},
+ {"device-config", 0xeb7000, 0x10000},
+ {"group-info", 0xec7000, 0x10000},
+ {"partition-table", 0xed7000, 0x02000},
+ {"soft-version", 0xed9000, 0x10000},
+ {"profile", 0xee9000, 0x10000},
+ {"default-config", 0xef9000, 0x10000},
+ {"url-sig", 0xfe0000, 0x10000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
+ /** Firmware layout for the Deco M4R v4 */
+ {
+ .id = "DECO-M4R-V4",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:M4R,product_ver:4.0.0,special_id:55530000}\n"
+ "{product_name:M4R,product_ver:4.0.0,special_id:45550000}\n"
+ "{product_name:M4R,product_ver:4.0.0,special_id:4A500000}\n"
+ "{product_name:M4R,product_ver:4.0.0,special_id:42340000}\n"
+ "{product_name:M4R,product_ver:4.0.0,special_id:5A470000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00300},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"group-info", 0xfb0000, 0x04000},
+ {"user-config", 0xfb4000, 0x0c000},
+ {"device-config", 0xfc0000, 0x10000},
+ {"default-config", 0xfd0000, 0x10000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00200},
+ {"profile", 0xfe0b00, 0x03000},
+ {"extra-para", 0xfe3b00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
+ /** Firmware layout for the Deco M5 */
+ {
+ .id = "DECO-M5",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:55530000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:45550000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:43410000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:4A500000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:41550000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:4B520000}\n"
+ "{product_name:M5,product_ver:1.0.0,special_id:49440000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:55530000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:45550000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:43410000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:4A500000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:41550000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:4B520000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:49440000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:53570000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:42340000}\n"
+ "{product_name:M5,product_ver:3.0.0,special_id:54570000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:55530000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:45550000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:43410000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:4A500000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:41550000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:4B520000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:49440000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:53570000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:42340000}\n"
+ "{product_name:M5,product_ver:3.2.0,special_id:54570000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"SBL1", 0x00000, 0x30000},
+ {"boot-config_0", 0x30000, 0x10000},
+ {"MIBIB", 0x40000, 0x10000},
+ {"boot-config_1", 0x50000, 0x10000},
+ {"QSEE", 0x60000, 0x60000},
+ {"CDT", 0xc0000, 0x10000},
+ {"DDRPARAMS", 0xd0000, 0x10000},
+ {"uboot-env", 0xe0000, 0x10000},
+ {"fs-uboot@0", 0xf0000, 0x80000},
+ {"radio", 0x170000, 0x0fff0},
+ {"bluetooth-XTAL", 0x17fff0, 0x00010},
+ {"default-mac", 0x180000, 0x01000},
+ {"device-id", 0x182000, 0x01000},
+ {"product-info", 0x183000, 0x05000},
+ {"support-list", 0x190000, 0x10000},
+ {"user-config", 0x200000, 0x10000},
+ {"device-config", 0x210000, 0x10000},
+ {"group-info", 0x220000, 0x10000},
+ {"partition-table@0", 0x230000, 0x02000},
+ {"os-image@0", 0x240000, 0x300000},
+ {"file-system@0", 0x540000, 0x790000},
+ {"soft-version@0", 0xcd0000, 0x10000},
+ {"profile@0", 0xce0000, 0x10000},
+ {"default-config@0", 0xcf0000, 0x10000},
+ {"partition-table@1", 0xd00000, 0x02000},
+ {"fs-uboot@1", 0xd10000, 0x80000},
+ {"os-image@1", 0xd90000, 0x400000},
+ {"file-system@1", 0x1190000, 0xc40000},
+ {"soft-version@1", 0x1dd0000, 0x10000},
+ {"profile@1", 0x1de0000, 0x10000},
+ {"default-config@1", 0x1df0000, 0x10000},
+ {"tm-sig", 0x1e00000, 0x200000},
+ {NULL, 0, 0}
+ },
+
+ .partition_names.partition_table = "partition-table@1",
+ .partition_names.soft_ver = "soft-version@1",
+ .partition_names.os_image = "os-image@1",
+ .partition_names.file_system = "file-system@1",
+
+ .first_sysupgrade_partition = "os-image@1",
+ .last_sysupgrade_partition = "file-system@1"
+ },
+
+ /** Firmware layout for the Deco S4 v2 */
+ {
+ .id = "DECO-S4-V2",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:55530000}\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:45550000}\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:43410000}\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:4A500000}\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:41550000}\n"
+ "{product_name:S4,product_ver:1.0.0,special_id:4B520000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:55530000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:45550000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:43410000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:4A500000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:41550000}\n"
+ "{product_name:S4,product_ver:2.0.0,special_id:4B520000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x80000},
+ {"product-info", 0x80000, 0x05000},
+ {"default-mac", 0x85000, 0x01000},
+ {"device-id", 0x86000, 0x01000},
+ {"support-list", 0x87000, 0x10000},
+ {"user-config", 0xa7000, 0x10000},
+ {"device-config", 0xb7000, 0x10000},
+ {"group-info", 0xc7000, 0x10000},
+ {"partition-table", 0xd7000, 0x02000},
+ {"soft-version", 0xd9000, 0x10000},
+ {"profile", 0xe9000, 0x10000},
+ {"default-config", 0xf9000, 0x10000},
+ {"url-sig", 0x1e0000, 0x10000},
+ {"radio", 0x1f0000, 0x10000},
+ {"firmware", 0x200000, 0xe00000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
/** Firmware layout for the EAP120 */
{
.id = "EAP120",
"SupportList:\r\n"
"EAP120(TP-LINK|UN|N300-2):1.0\r\n",
.part_trail = 0xff,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"SupportList:\r\n"
"EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.soft_ver_compat_level = 1,
.partitions = {
.last_sysupgrade_partition = "file-system"
},
- /** Firmware layout for the EAP225 v3 */
+ /** Firmware layout for the EAP225 v1 */
+ {
+ .id = "EAP225-V1",
+ .support_list =
+ "SupportList:\r\n"
+ "EAP225(TP-LINK|UN|AC1200-D):1.0\r\n",
+ .part_trail = PART_TRAIL_NONE,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"partition-table", 0x20000, 0x02000},
+ {"default-mac", 0x30000, 0x01000},
+ {"support-list", 0x31000, 0x00100},
+ {"product-info", 0x31100, 0x00400},
+ {"soft-version", 0x32000, 0x00100},
+ {"firmware", 0x40000, 0xd80000},
+ {"user-config", 0xdc0000, 0x30000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
+ /** Firmware layout for the EAP225 v3
+ * Also compatible with:
+ * - EAP225 v3.20
+ * - EAP225 v4
+ * - EAP225-Outdoor v1
+ * - EAP225-Outdoor v3
+ * */
{
.id = "EAP225-V3",
.support_list =
"SupportList:\r\n"
- "EAP225(TP-Link|UN|AC1350-D):3.0\r\n",
+ "EAP225(TP-Link|UN|AC1350-D):3.0\r\n"
+ "EAP225(TP-Link|UN|AC1350-D):3.20\r\n"
+ "EAP225(TP-Link|UN|AC1350-D):4.0 CA\r\n"
+ "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n"
+ "EAP225-Outdoor(TP-Link|UN|AC1200-D):3.0 CA,JP\r\n",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.soft_ver_compat_level = 1,
.partitions = {
"SupportList:\r\n"
"EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.soft_ver_compat_level = 1,
.partitions = {
"SupportList:\r\n"
"EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_NUMERIC(3, 0, 0),
.soft_ver_compat_level = 1,
.partitions = {
"SupportList:\r\n"
"EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
.id = "EAP245-V3",
.support_list =
"SupportList:\r\n"
- "EAP245(TP-Link|UN|AC1750-D):3.0\r\n",
+ "EAP245(TP-Link|UN|AC1750-D):3.0\r\n"
+ "EAP265 HD(TP-Link|UN|AC1750-D):1.0",
.part_trail = PART_TRAIL_NONE,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.soft_ver_compat_level = 1,
/** Firmware partition with dynamic kernel/rootfs split */
.last_sysupgrade_partition = "file-system"
},
+ /** Firmware layout for the EAP610 v3/EAP613 v1 */
+ {
+ .id = "EAP610-V3",
+ .soft_ver = SOFT_VER_DEFAULT,
+ .soft_ver_compat_level = 1,
+ .support_list =
+ "SupportList:\r\n"
+ "EAP610(TP-Link|UN|AX1800-D):3.0\r\n"
+ "EAP610(TP-Link|JP|AX1800-D):3.0\r\n"
+ "EAP610(TP-Link|EG|AX1800-D):3.0\r\n"
+ "EAP610(TP-Link|CA|AX1800-D):3.0\r\n"
+ "EAP613(TP-Link|UN|AX1800-D):1.0 JP\r\n",
+ .part_trail = PART_TRAIL_NONE,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x80000},
+ {"partition-table", 0x80000, 0x02000},
+ {"default-mac", 0x90000, 0x01000},
+ {"support-list", 0x91000, 0x00100},
+ {"product-info", 0x91100, 0x00400},
+ {"soft-version", 0x92000, 0x00100},
+ {"firmware", 0xa0000, 0xcf0000},
+ {"user-config", 0xd90000, 0x60000},
+ {"mutil-log", 0xf30000, 0x80000},
+ {"oops", 0xfb0000, 0x40000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
+ /** Firmware layout for the EAP615-Wall v1 */
+ {
+ .id = "EAP615-WALL-V1",
+ .soft_ver = SOFT_VER_DEFAULT,
+ .soft_ver_compat_level = 1,
+ .support_list =
+ "SupportList:\r\n"
+ "EAP615-Wall(TP-Link|UN|AX1800-D):1.0\r\n"
+ "EAP615-Wall(TP-Link|CA|AX1800-D):1.0\r\n"
+ "EAP615-Wall(TP-Link|JP|AX1800-D):1.0\r\n",
+ .part_trail = PART_TRAIL_NONE,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x80000},
+ {"partition-table", 0x80000, 0x02000},
+ {"default-mac", 0x90000, 0x01000},
+ {"support-list", 0x91000, 0x00100},
+ {"product-info", 0x91100, 0x00400},
+ {"soft-version", 0x92000, 0x00100},
+ {"firmware", 0xa0000, 0xcf0000},
+ {"user-config", 0xd90000, 0x60000},
+ {"mutil-log", 0xf30000, 0x80000},
+ {"oops", 0xfb0000, 0x40000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
+ /** Firmware layout for the TL-WA1201 v2 */
+ {
+ .id = "TL-WA1201-V2",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:TL-WA1201,product_ver:2.0.0,special_id:45550000}\n"
+ "{product_name:TL-WA1201,product_ver:2.0.0,special_id:55530000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.1 Build 20200709 rel.66244\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"default-mac", 0x20000, 0x00200},
+ {"pin", 0x20200, 0x00100},
+ {"product-info", 0x20300, 0x00200},
+ {"device-id", 0x20500, 0x0fb00},
+ {"firmware", 0x30000, 0xce0000},
+ {"portal-logo", 0xd10000, 0x20000},
+ {"portal-back", 0xd30000, 0x200000},
+ {"soft-version", 0xf30000, 0x00200},
+ {"extra-para", 0xf30200, 0x00200},
+ {"support-list", 0xf30400, 0x00200},
+ {"profile", 0xf30600, 0x0fa00},
+ {"apdef-config", 0xf40000, 0x10000},
+ {"ap-config", 0xf50000, 0x10000},
+ {"redef-config", 0xf60000, 0x10000},
+ {"re-config", 0xf70000, 0x10000},
+ {"multidef-config", 0xf80000, 0x10000},
+ {"multi-config", 0xf90000, 0x10000},
+ {"clientdef-config", 0xfa0000, 0x10000},
+ {"client-config", 0xfb0000, 0x10000},
+ {"partition-table", 0xfc0000, 0x10000},
+ {"user-config", 0xfd0000, 0x10000},
+ {"certificate", 0xfe0000, 0x10000},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
/** Firmware layout for the TL-WA850RE v2 */
{
.id = "TLWA850REV2",
"{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
"{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/**
576KB were moved from file-system to os-image
"{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
"{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"SupportList:\n"
"{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"factory-uboot", 0x00000, 0x20000},
"{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
"{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"factory-uboot", 0x00000, 0x20000},
"SupportList:\n"
"{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"factory-uboot", 0x00000, 0x20000},
.last_sysupgrade_partition = "file-system"
},
+ /** Firmware layout for the TL-WPA8631P v3 */
+ {
+ .id = "TL-WPA8631P-V3",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:41550000}\n"
+ "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:45550000}\n"
+ "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:55530000}\n"
+ "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:41550000}\n"
+ "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:45550000}\n"
+ "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:55530000}\n"
+ "{product_name:TL-WPA8635P,product_ver:3.0.0,special_id:46520000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"firmware", 0x20000, 0x710000},
+ {"partition-table", 0x730000, 0x02000},
+ {"default-mac", 0x732000, 0x00020},
+ {"pin", 0x732100, 0x00020},
+ {"device-id", 0x732200, 0x00030},
+ {"default-region", 0x732300, 0x00010},
+ {"product-info", 0x732400, 0x00200},
+ {"extra-para", 0x732600, 0x00200},
+ {"soft-version", 0x732800, 0x00100},
+ {"support-list", 0x732900, 0x00200},
+ {"profile", 0x732b00, 0x00100},
+ {"default-config", 0x732c00, 0x00800},
+ {"plc-type", 0x733400, 0x00020},
+ {"default-pib", 0x733500, 0x06000},
+ {"user-config", 0x740000, 0x10000},
+ {"plc-pib", 0x750000, 0x10000},
+ {"plc-nvm", 0x760000, 0x90000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
/** Firmware layout for the TL-WR1043 v5 */
{
.id = "TLWR1043NV5",
"{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
"{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.0.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
.partitions = {
{"factory-boot", 0x00000, 0x20000},
{"fs-uboot", 0x20000, 0x20000},
"SupportList:\n"
"{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
"{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/**
384KB were moved from file-system to os-image
.last_sysupgrade_partition = "file-system",
},
+ /** Firmware layout for the TL-WR941HP v1 */
+ {
+ .id = "TL-WR941HP-V1",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:TL-WR941HP,product_ver:1.0.0,special_id:00000000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"firmware", 0x20000, 0x730000},
+ {"default-mac", 0x750000, 0x00200},
+ {"pin", 0x750200, 0x00200},
+ {"product-info", 0x750400, 0x0fc00},
+ {"soft-version", 0x760000, 0x0b000},
+ {"support-list", 0x76b000, 0x04000},
+ {"profile", 0x770000, 0x04000},
+ {"default-config", 0x774000, 0x0b000},
+ {"user-config", 0x780000, 0x40000},
+ {"partition-table", 0x7c0000, 0x10000},
+ {"log", 0x7d0000, 0x20000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system",
+ },
+
/** Firmware layout for the TL-WR942N V1 */
{
.id = "TLWR942NV1",
"{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
"{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
"{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
"{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
"{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
.part_trail = 0x00,
- .soft_ver = "soft_ver:1.1.0\n",
+ .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
"{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
"{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
"{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
.partitions = {
{"fs-uboot", 0x00000, 0x20000},
.last_sysupgrade_partition = "file-system"
},
+ /** Firmware layout for the RE305 v3 */
+ {
+ .id = "RE305-V3",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:00000000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:45550000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:4A500000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:4B520000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:41550000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:42520000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:55530000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:45530000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:41530000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:43410000}\n"
+ "{product_name:RE305,product_ver:3.0.0,special_id:52550000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"firmware", 0x20000, 0x7a0000},
+ {"partition-table", 0x7c0000, 0x02000},
+ {"default-mac", 0x7c2000, 0x00020},
+ {"pin", 0x7c2100, 0x00020},
+ {"product-info", 0x7c3100, 0x01000},
+ {"soft-version", 0x7c4200, 0x01000},
+ {"support-list", 0x7c5200, 0x01000},
+ {"profile", 0x7c6200, 0x08000},
+ {"config-info", 0x7ce200, 0x00400},
+ {"user-config", 0x7d0000, 0x10000},
+ {"default-config", 0x7e0000, 0x10000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
/** Firmware layout for the RE350 v1 */
{
.id = "RE350-V1",
"{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
"{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/** We're using a dynamic kernel/rootfs split here */
.partitions = {
"SupportList:\n"
"{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/** We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
"{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
"{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/** We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
"{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
"{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ /* We're using a dynamic kernel/rootfs split here */
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"default-mac", 0x20000, 0x00020},
+ {"pin", 0x20020, 0x00020},
+ {"product-info", 0x21000, 0x01000},
+ {"partition-table", 0x22000, 0x02000},
+ {"soft-version", 0x24000, 0x01000},
+ {"support-list", 0x25000, 0x01000},
+ {"profile", 0x26000, 0x08000},
+ {"user-config", 0x2e000, 0x10000},
+ {"default-config", 0x3e000, 0x10000},
+ {"config-info", 0x4e000, 0x00400},
+ {"firmware", 0x50000, 0x7a0000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
+ /** Firmware layout for the RE455 v1 */
+ {
+ .id = "RE455-V1",
+ .vendor = "",
+ .support_list =
+ "SupportList:\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:00000000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:55530000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:45550000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:4A500000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:43410000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:41550000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:41530000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:4B520000}\r\n"
+ "{product_name:RE455,product_ver:1.0.0,special_id:42520000}\r\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
"{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
"{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
"{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
.part_trail = 0x00,
- .soft_ver = NULL,
+ .soft_ver = SOFT_VER_DEFAULT,
/* We're using a dynamic kernel/rootfs split here */
.partitions = {
.first_sysupgrade_partition = "os-image",
.last_sysupgrade_partition = "file-system"
},
+ /** Firmware layout for the RE650 V2 (8MB Flash)*/
+ {
+ .id = "RE650-V2",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:00000000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:45550000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:4A500000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:41550000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:43410000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:41530000}\n"
+ "{product_name:RE650,product_ver:2.0.0,special_id:55530000}\n",
+ .part_trail = 0x00,
+ /* For RE650 v2, soft ver is required, otherwise OEM install doesn't work */
+ .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
+
+ /* We're using a dynamic kernel/rootfs split here */
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x20000},
+ {"firmware", 0x20000, 0x7a0000},
+ {"partition-table", 0x7c0000, 0x02000},
+ {"default-mac", 0x7c2000, 0x00020},
+ {"pin", 0x7c2100, 0x00020},
+ {"product-info", 0x7c3100, 0x01000},
+ {"soft-version", 0x7c4200, 0x01000},
+ {"support-list", 0x7c5200, 0x01000},
+ {"profile", 0x7c6200, 0x08000},
+ {"config-info", 0x7ce200, 0x00400},
+ {"user-config", 0x7d0000, 0x10000},
+ {"default-config", 0x7e0000, 0x10000},
+ {"radio", 0x7f0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
+
+ /** Firmware layout for the Mercusys MR70X */
+ {
+ .id = "MR70X",
+ .vendor = "",
+ .support_list =
+ "SupportList:\n"
+ "{product_name:MR70X,product_ver:1.0.0,special_id:45550000}\n"
+ "{product_name:MR70X,product_ver:1.0.0,special_id:4A500000}\n"
+ "{product_name:MR70X,product_ver:1.0.0,special_id:55530000}\n",
+ .part_trail = 0x00,
+ .soft_ver = SOFT_VER_DEFAULT,
+
+ .partitions = {
+ {"fs-uboot", 0x00000, 0x40000},
+ {"firmware", 0x40000, 0xf60000},
+ {"default-mac", 0xfa0000, 0x00200},
+ {"pin", 0xfa0200, 0x00100},
+ {"device-id", 0xfa0300, 0x00100},
+ {"product-info", 0xfa0400, 0x0fc00},
+ {"default-config", 0xfb0000, 0x08000},
+ {"ap-def-config", 0xfb8000, 0x08000},
+ {"user-config", 0xfc0000, 0x0a000},
+ {"ag-config", 0xfca000, 0x04000},
+ {"certificate", 0xfce000, 0x02000},
+ {"ap-config", 0xfd0000, 0x06000},
+ {"router-config", 0xfd6000, 0x06000},
+ {"favicon", 0xfdc000, 0x02000},
+ {"logo", 0xfde000, 0x02000},
+ {"partition-table", 0xfe0000, 0x00800},
+ {"soft-version", 0xfe0800, 0x00100},
+ {"support-list", 0xfe0900, 0x00200},
+ {"profile", 0xfe0b00, 0x03000},
+ {"extra-para", 0xfe3b00, 0x00100},
+ {"radio", 0xff0000, 0x10000},
+ {NULL, 0, 0}
+ },
+
+ .first_sysupgrade_partition = "os-image",
+ .last_sysupgrade_partition = "file-system"
+ },
{}
};
return entry;
}
+/** Sets up default partition names whenever custom names aren't specified */
+static void set_partition_names(struct device_info *info)
+{
+ if (!info->partition_names.partition_table)
+ info->partition_names.partition_table = "partition-table";
+ if (!info->partition_names.soft_ver)
+ info->partition_names.soft_ver = "soft-version";
+ if (!info->partition_names.os_image)
+ info->partition_names.os_image = "os-image";
+ if (!info->partition_names.support_list)
+ info->partition_names.support_list = "support-list";
+ if (!info->partition_names.file_system)
+ info->partition_names.file_system = "file-system";
+ if (!info->partition_names.extra_para)
+ info->partition_names.extra_para = "extra-para";
+}
+
/** Frees an image partition */
-static void free_image_partition(struct image_partition_entry entry) {
- free(entry.data);
+static void free_image_partition(struct image_partition_entry *entry)
+{
+ void *data = entry->data;
+
+ entry->name = NULL;
+ entry->size = 0;
+ entry->data = NULL;
+
+ free(data);
}
static time_t source_date_epoch = -1;
}
/** Generates the partition-table partition */
-static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
- struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
+static struct image_partition_entry make_partition_table(const struct device_info *p)
+{
+ struct image_partition_entry entry = alloc_image_partition(p->partition_names.partition_table, SAFELOADER_PAYLOAD_TABLE_SIZE);
char *s = (char *)entry.data, *end = (char *)(s+entry.size);
*(s++) = 0x00;
size_t i;
- for (i = 0; p[i].name; i++) {
+ for (i = 0; p->partitions[i].name; i++) {
size_t len = end-s;
- size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
+ size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n",
+ p->partitions[i].name, p->partitions[i].base, p->partitions[i].size);
if (w > len-1)
error(1, 0, "flash partition table overflow?");
/** Generates the soft-version partition */
-static struct image_partition_entry make_soft_version(
- const struct device_info *info, uint32_t rev)
+static struct image_partition_entry make_soft_version(const struct device_info *info, uint32_t rev)
{
/** If an info string is provided, use this instead of
* the structured data, and include the null-termination */
- if (info->soft_ver) {
- uint32_t len = strlen(info->soft_ver) + 1;
- return init_meta_partition_entry("soft-version",
- info->soft_ver, len, info->part_trail);
+ if (info->soft_ver.type == SOFT_VER_TYPE_TEXT) {
+ uint32_t len = strlen(info->soft_ver.text) + 1;
+ return init_meta_partition_entry(info->partition_names.soft_ver,
+ info->soft_ver.text, len, info->part_trail);
}
time_t t;
struct soft_version s = {
.pad1 = 0xff,
- .version_major = 0,
- .version_minor = 0,
- .version_patch = 0,
+ .version_major = info->soft_ver.num[0],
+ .version_minor = info->soft_ver.num[1],
+ .version_patch = info->soft_ver.num[2],
.year_hi = bcd((1900+tm->tm_year)/100),
.year_lo = bcd(tm->tm_year%100),
.month = bcd(tm->tm_mon+1),
.day = bcd(tm->tm_mday),
+ .rev = htonl(rev),
.compat_level = htonl(info->soft_ver_compat_level)
};
if (info->soft_ver_compat_level == 0)
- return init_meta_partition_entry("soft-version", &s,
+ return init_meta_partition_entry(info->partition_names.soft_ver, &s,
(uint8_t *)(&s.compat_level) - (uint8_t *)(&s),
info->part_trail);
else
- return init_meta_partition_entry("soft-version", &s,
+ return init_meta_partition_entry(info->partition_names.soft_ver, &s,
sizeof(s), info->part_trail);
}
const struct device_info *info)
{
uint32_t len = strlen(info->support_list);
- return init_meta_partition_entry("support-list", info->support_list,
+ return init_meta_partition_entry(info->partition_names.support_list, info->support_list,
len, info->part_trail);
}
static struct image_partition_entry make_extra_para(
const struct device_info *info, const uint8_t *extra_para, size_t len)
{
- return init_meta_partition_entry("extra-para", extra_para, len,
+ return init_meta_partition_entry(info->partition_names.extra_para, extra_para, len,
info->part_trail);
}
*/
static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
size_t i, j;
- char *image_pt = (char *)buffer, *end = image_pt + 0x800;
+ char *image_pt = (char *)buffer, *end = image_pt + SAFELOADER_PAYLOAD_TABLE_SIZE;
- size_t base = 0x800;
+ size_t base = SAFELOADER_PAYLOAD_TABLE_SIZE;
for (i = 0; parts[i].name; i++) {
for (j = 0; flash_parts[j].name; j++) {
if (!strcmp(flash_parts[j].name, parts[i].name)) {
1814-xxxx Firmware partitions
*/
static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
- *len = 0x1814;
+ *len = SAFELOADER_PAYLOAD_OFFSET + SAFELOADER_PAYLOAD_TABLE_SIZE;
size_t i;
for (i = 0; parts[i].name; i++)
if (info->vendor) {
size_t vendor_len = strlen(info->vendor);
- put32(image+0x14, vendor_len);
- memcpy(image+0x18, info->vendor, vendor_len);
+ put32(image + SAFELOADER_PREAMBLE_SIZE, vendor_len);
+ memcpy(image + SAFELOADER_PREAMBLE_SIZE + 0x4, info->vendor, vendor_len);
}
- put_partitions(image + 0x1014, info->partitions, parts);
- put_md5(image+0x04, image+0x14, *len-0x14);
+ put_partitions(image + SAFELOADER_PAYLOAD_OFFSET, info->partitions, parts);
+ put_md5(image + 0x04, image + SAFELOADER_PREAMBLE_SIZE, *len - SAFELOADER_PREAMBLE_SIZE);
return image;
}
struct flash_partition_entry *file_system_partition = NULL;
size_t firmware_partition_index = 0;
+ set_partition_names(info);
+
for (i = 0; info->partitions[i].name; i++) {
if (!strcmp(info->partitions[i].name, "firmware"))
{
for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
info->partitions[i+1] = info->partitions[i];
- file_system_partition->name = "file-system";
+ file_system_partition->name = info->partition_names.file_system;
+
file_system_partition->base = firmware_partition->base + kernel.st_size;
/* Align partition start to erase blocks for factory images only */
file_system_partition->size = firmware_partition->size - file_system_partition->base;
- os_image_partition->name = "os-image";
+ os_image_partition->name = info->partition_names.os_image;
+
os_image_partition->size = kernel.st_size;
}
- parts[0] = make_partition_table(info->partitions);
+ parts[0] = make_partition_table(info);
parts[1] = make_soft_version(info, rev);
parts[2] = make_support_list(info);
- parts[3] = read_file("os-image", kernel_image, false, NULL);
- parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
+ parts[3] = read_file(info->partition_names.os_image, kernel_image, false, NULL);
+ parts[4] = read_file(info->partition_names.file_system, rootfs_image, add_jffs2_eof, file_system_partition);
+
/* Some devices need the extra-para partition to accept the firmware */
- if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
+ if (strcasecmp(info->id, "ARCHER-A6-V3") == 0 ||
+ strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
+ strcasecmp(info->id, "ARCHER-A9-V6") == 0 ||
+ strcasecmp(info->id, "ARCHER-AX23-V1") == 0 ||
strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
strcasecmp(info->id, "ARCHER-C7-V4") == 0 ||
strcasecmp(info->id, "ARCHER-C7-V5") == 0 ||
strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
+ strcasecmp(info->id, "ARCHER-C6U-V1") == 0 ||
+ strcasecmp(info->id, "ARCHER-C6-V3") == 0 ||
+ strcasecmp(info->id, "DECO-M4R-V4") == 0 ||
+ strcasecmp(info->id, "MR70X") == 0 ||
strcasecmp(info->id, "TLWR1043NV5") == 0) {
const uint8_t extra_para[2] = {0x01, 0x00};
parts[5] = make_extra_para(info, extra_para,
sizeof(extra_para));
- } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
+ } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0 ||
+ strcasecmp(info->id, "TL-WA1201-V2") == 0) {
const uint8_t extra_para[2] = {0x00, 0x01};
parts[5] = make_extra_para(info, extra_para,
sizeof(extra_para));
free(image);
for (i = 0; parts[i].name; i++)
- free_image_partition(parts[i]);
+ free_image_partition(&parts[i]);
}
/** Usage output */
}
/** read the partition table into struct flash_partition_entry */
+enum PARTITION_TABLE_TYPE {
+ PARTITION_TABLE_FWUP,
+ PARTITION_TABLE_FLASH,
+};
+
static int read_partition_table(
FILE *file, long offset,
struct flash_partition_entry *entries, size_t max_entries,
int type)
{
- char buf[2048];
+ char buf[SAFELOADER_PAYLOAD_TABLE_SIZE];
char *ptr, *end;
const char *parthdr = NULL;
const char *fwuphdr = "fwup-ptn";
/* TODO: search for the partition table */
switch(type) {
- case 0:
- parthdr = fwuphdr;
- break;
- case 1:
- parthdr = flashhdr;
- break;
- default:
- error(1, 0, "Invalid partition table");
+ case PARTITION_TABLE_FWUP:
+ parthdr = fwuphdr;
+ break;
+ case PARTITION_TABLE_FLASH:
+ parthdr = flashhdr;
+ break;
+ default:
+ error(1, 0, "Invalid partition table");
}
if (fseek(file, offset, SEEK_SET) < 0)
error(1, errno, "Can not seek in the firmware");
- if (fread(buf, 2048, 1, file) != 1)
+ if (fread(buf, sizeof(buf), 1, file) != 1)
error(1, errno, "Can not read fwup-ptn from the firmware");
- buf[2047] = '\0';
+ buf[sizeof(buf) - 1] = '\0';
/* look for the partition header */
if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
return 0;
}
+static void safeloader_read_partition(FILE *input_file, size_t payload_offset,
+ struct flash_partition_entry *entry,
+ struct image_partition_entry *part)
+{
+ size_t part_size = entry->size;
+ void *part_data = malloc(part_size);
+
+ if (fseek(input_file, payload_offset, SEEK_SET))
+ error(1, errno, "Failed to seek to partition data");
+
+ if (!part_data)
+ error(1, ENOMEM, "Failed to allocate partition data");
+
+ if (fread(part_data, 1, part_size, input_file) < part_size)
+ error(1, errno, "Failed to read partition data");
+
+ part->data = part_data;
+ part->size = part_size;
+ part->name = entry->name;
+}
+
+static void safeloader_parse_image(FILE *input_file, struct safeloader_image_info *image)
+{
+ static const char *HEADER_ID_CLOUD = "fw-type:Cloud";
+ static const char *HEADER_ID_QNEW = "?NEW";
+
+ char buf[64];
+
+ if (!input_file)
+ return;
+
+ fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
+
+ if (fread(buf, sizeof(buf), 1, input_file) != 1)
+ error(1, errno, "Can not read image header");
+
+ if (memcmp(HEADER_ID_QNEW, &buf[0], strlen(HEADER_ID_QNEW)) == 0)
+ image->type = SAFELOADER_TYPE_QNEW;
+ else if (memcmp(HEADER_ID_CLOUD, &buf[0], strlen(HEADER_ID_CLOUD)) == 0)
+ image->type = SAFELOADER_TYPE_CLOUD;
+ else if (ntohl(*((uint32_t *) &buf[0])) <= SAFELOADER_HEADER_SIZE)
+ image->type = SAFELOADER_TYPE_VENDOR;
+ else
+ image->type = SAFELOADER_TYPE_DEFAULT;
+
+ switch (image->type) {
+ case SAFELOADER_TYPE_DEFAULT:
+ case SAFELOADER_TYPE_VENDOR:
+ case SAFELOADER_TYPE_CLOUD:
+ image->payload_offset = SAFELOADER_PAYLOAD_OFFSET;
+ break;
+ case SAFELOADER_TYPE_QNEW:
+ image->payload_offset = SAFELOADER_QNEW_PAYLOAD_OFFSET;
+ break;
+ }
+
+ /* Parse image partition table */
+ read_partition_table(input_file, image->payload_offset, &image->entries[0],
+ MAX_PARTITIONS, PARTITION_TABLE_FWUP);
+}
+
static void write_partition(
FILE *input_file,
size_t firmware_offset,
/** extract all partitions from the firmware file */
static int extract_firmware(const char *input, const char *output_directory)
{
- struct flash_partition_entry entries[16] = { 0 };
- size_t max_entries = 16;
- size_t firmware_offset = 0x1014;
- FILE *input_file;
-
+ struct safeloader_image_info info = {};
struct stat statbuf;
+ FILE *input_file;
/* check input file */
if (stat(input, &statbuf)) {
}
input_file = fopen(input, "rb");
+ safeloader_parse_image(input_file, &info);
- if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
- error(1, 0, "Error can not read the partition table (fwup-ptn)");
- }
-
- for (size_t i = 0; i < max_entries; i++) {
- if (entries[i].name == NULL &&
- entries[i].base == 0 &&
- entries[i].size == 0)
- continue;
-
- extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
- }
+ for (size_t i = 0; i < MAX_PARTITIONS && info.entries[i].name; i++)
+ extract_firmware_partition(input_file, info.payload_offset, &info.entries[i], output_directory);
return 0;
}
static int firmware_info(const char *input)
{
- struct flash_partition_entry pointers[MAX_PARTITIONS] = { };
+ struct safeloader_image_info info = {};
+ struct image_partition_entry part = {};
struct flash_partition_entry *e;
- FILE *fp;
- int i;
+ FILE *input_file;
+
+ input_file = fopen(input, "rb");
+
+ safeloader_parse_image(input_file, &info);
- fp = fopen(input, "r");
+ if (info.type == SAFELOADER_TYPE_VENDOR) {
+ char buf[SAFELOADER_HEADER_SIZE] = {};
+ uint32_t vendor_size;
- if (read_partition_table(fp, 0x1014, pointers, MAX_PARTITIONS, 0)) {
- error(1, 0, "Error can not read the partition table (fwup-ptn)");
+ fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
+ fread(&vendor_size, sizeof(uint32_t), 1, input_file);
+
+ vendor_size = ntohl(vendor_size);
+ fread(buf, vendor_size, 1, input_file);
+
+ printf("Firmware vendor string:\n");
+ fwrite(buf, strnlen(buf, vendor_size), 1, stdout);
+ printf("\n");
}
printf("Firmware image partitions:\n");
printf("%-8s %-8s %s\n", "base", "size", "name");
- for (i = 0; i < MAX_PARTITIONS; i++) {
- e = &pointers[i];
-
- if (!e->name && !e->base && !e->size)
- continue;
- printf("%08x %08x %s\n", e->base, e->size, e->name ? e->name : "");
- }
+ e = &info.entries[0];
+ for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
+ printf("%08x %08x %s\n", e->base, e->size, e->name);
- e = find_partition(pointers, MAX_PARTITIONS, "soft-version", NULL);
+ e = find_partition(&info.entries[0], MAX_PARTITIONS, "soft-version", NULL);
if (e) {
- size_t data_len = e->size - sizeof(struct meta_header);
- char *buf = malloc(data_len);
struct soft_version *s;
+ unsigned int ascii_len;
+ const uint8_t *buf;
+ size_t data_len;
bool isstr;
- int i;
-
- if (!buf)
- error(1, errno, "Failed to alloc buffer");
- if (fseek(fp, 0x1014 + e->base + sizeof(struct meta_header), SEEK_SET))
- error(1, errno, "Can not seek in the firmware");
+ safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
+ data_len = ntohl(((struct meta_header *) part.data)->length);
+ buf = part.data + sizeof(struct meta_header);
- if (fread(buf, data_len, 1, fp) != 1)
- error(1, errno, "Can not read fwup-ptn data from the firmware");
+ /* Check for (null-terminated) string */
+ ascii_len = 0;
+ while (ascii_len < data_len && isascii(buf[ascii_len]))
+ ascii_len++;
- /* Check for string ignoring padding character */
- isstr = true;
- for (i = 0; i < data_len - 1; i++) {
- if (!isascii(buf[i])) {
- isstr = false;
- break;
- }
- }
+ isstr = ascii_len == data_len;
printf("\n[Software version]\n");
if (isstr) {
- fwrite(buf, data_len, 1, stdout);
+ fwrite(buf, strnlen((const char *) buf, data_len), 1, stdout);
putchar('\n');
} else if (data_len >= offsetof(struct soft_version, rev)) {
- s = (struct soft_version *)buf;
+ s = (struct soft_version *) buf;
printf("Version: %d.%d.%d\n", s->version_major, s->version_minor, s->version_patch);
printf("Date: %02x%02x-%02x-%02x\n", s->year_hi, s->year_lo, s->month, s->day);
+ printf("Revision: %d\n", ntohl(s->rev));
} else {
printf("Failed to parse data\n");
}
- free(buf);
+ free_image_partition(&part);
}
- e = find_partition(pointers, MAX_PARTITIONS, "support-list", NULL);
+ e = find_partition(&info.entries[0], MAX_PARTITIONS, "support-list", NULL);
if (e) {
- char buf[128];
- size_t length;
- size_t bytes;
+ size_t data_len;
- if (fseek(fp, 0x1014 + e->base + sizeof(struct meta_header), SEEK_SET))
- error(1, errno, "Can not seek in the firmware");
+ safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
+ data_len = ntohl(((struct meta_header *) part.data)->length);
printf("\n[Support list]\n");
- for (length = e->size - sizeof(struct meta_header); length; length -= bytes) {
- bytes = fread(buf, 1, length > sizeof(buf) ? sizeof(buf) : length, fp);
- if (bytes <= 0)
- error(1, errno, "Can not read fwup-ptn data from the firmware");
+ fwrite(part.data + sizeof(struct meta_header), data_len, 1, stdout);
+ printf("\n");
- puts(buf);
- }
+ free_image_partition(&part);
}
- e = find_partition(pointers, MAX_PARTITIONS, "partition-table", NULL);
+ e = find_partition(&info.entries[0], MAX_PARTITIONS, "partition-table", NULL);
if (e) {
- struct flash_partition_entry parts[MAX_PARTITIONS] = { };
+ size_t flash_table_offset = info.payload_offset + e->base + 4;
+ struct flash_partition_entry parts[MAX_PARTITIONS] = {};
- if (read_partition_table(fp, 0x1014 + e->base + 4, parts, MAX_PARTITIONS, 1)) {
+ if (read_partition_table(input_file, flash_table_offset, parts, MAX_PARTITIONS, PARTITION_TABLE_FLASH))
error(1, 0, "Error can not read the partition table (partition)");
- }
printf("\n[Partition table]\n");
printf("%-8s %-8s %s\n", "base", "size", "name");
- for (i = 0; i < MAX_PARTITIONS; i++) {
- e = &parts[i];
-
- if (!e->name && !e->base && !e->size)
- continue;
- printf("%08x %08x %s\n", e->base, e->size, e->name ? e->name : "");
- }
+ e = &parts[0];
+ for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
+ printf("%08x %08x %s\n", e->base, e->size, e->name);
}
- fclose(fp);
+ fclose(input_file);
return 0;
}
static void convert_firmware(const char *input, const char *output)
{
- struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
- struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
- struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
- struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
- struct flash_partition_entry *fwup_partition_table = NULL;
- size_t firmware_offset = 0x1014;
- FILE *input_file, *output_file;
-
+ struct flash_partition_entry flash[MAX_PARTITIONS] = {};
+ struct flash_partition_entry *fwup_partition_table;
+ struct flash_partition_entry *flash_file_system;
+ struct flash_partition_entry *fwup_file_system;
+ struct flash_partition_entry *flash_os_image;
+ struct flash_partition_entry *fwup_os_image;
+ struct safeloader_image_info info = {};
+ size_t flash_table_offset;
struct stat statbuf;
+ FILE *output_file;
+ FILE *input_file;
/* check input file */
if (stat(input, &statbuf)) {
if (!output_file)
error(1, 0, "Can not open output firmware %s", output);
- if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
- error(1, 0, "Error can not read the partition table (fwup-ptn)");
- }
+ input_file = fopen(input, "rb");
+ safeloader_parse_image(input_file, &info);
- fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
+ fwup_os_image = find_partition(info.entries, MAX_PARTITIONS,
"os-image", "Error can not find os-image partition (fwup)");
- fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
+ fwup_file_system = find_partition(info.entries, MAX_PARTITIONS,
"file-system", "Error can not find file-system partition (fwup)");
- fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
+ fwup_partition_table = find_partition(info.entries, MAX_PARTITIONS,
"partition-table", "Error can not find partition-table partition");
/* the flash partition table has a 0x00000004 magic haeder */
- if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
+ flash_table_offset = info.payload_offset + fwup_partition_table->base + 4;
+ if (read_partition_table(input_file, flash_table_offset, flash, MAX_PARTITIONS, PARTITION_TABLE_FLASH) != 0)
error(1, 0, "Error can not read the partition table (flash)");
flash_os_image = find_partition(flash, MAX_PARTITIONS,
"file-system", "Error can not find file-system partition (flash)");
/* write os_image to 0x0 */
- write_partition(input_file, firmware_offset, fwup_os_image, output_file);
+ write_partition(input_file, info.payload_offset, fwup_os_image, output_file);
write_ff(output_file, flash_os_image->size - fwup_os_image->size);
/* write file-system behind os_image */
fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
- write_partition(input_file, firmware_offset, fwup_file_system, output_file);
- write_ff(output_file, flash_file_system->size - fwup_file_system->size);
+ write_partition(input_file, info.payload_offset, fwup_file_system, output_file);
fclose(output_file);
fclose(input_file);