9005ffa4874504d32e8cb4decded1daf46bca04f
[openwrt/openwrt.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Firmware layout description */
74 struct device_info {
75 const char *id;
76 const char *vendor;
77 const char *support_list;
78 char support_trail;
79 const char *soft_ver;
80 uint32_t soft_ver_compat_level;
81 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
82 const char *first_sysupgrade_partition;
83 const char *last_sysupgrade_partition;
84 };
85
86 /** The content of the soft-version structure */
87 struct __attribute__((__packed__)) soft_version {
88 uint32_t data_len;
89 uint32_t zero;
90 uint8_t pad1;
91 uint8_t version_major;
92 uint8_t version_minor;
93 uint8_t version_patch;
94 uint8_t year_hi;
95 uint8_t year_lo;
96 uint8_t month;
97 uint8_t day;
98 uint32_t rev;
99 };
100
101
102 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
103
104
105 /**
106 Salt for the MD5 hash
107
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
110 */
111 static const uint8_t md5_salt[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
116 };
117
118
119 /** Firmware layout table */
120 static struct device_info boards[] = {
121 /** Firmware layout for the CPE210/220 V1 */
122 {
123 .id = "CPE210",
124 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
125 .support_list =
126 "SupportList:\r\n"
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail = '\xff',
135 .soft_ver = NULL,
136
137 .partitions = {
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x300000},
144 {"file-system", 0x340000, 0x470000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
151 {NULL, 0, 0}
152 },
153
154 .first_sysupgrade_partition = "os-image",
155 .last_sysupgrade_partition = "support-list",
156 },
157
158 /** Firmware layout for the CPE210 V2 */
159 {
160 .id = "CPE210V2",
161 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
162 .support_list =
163 "SupportList:\r\n"
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail = '\xff',
175 .soft_ver = NULL,
176
177 .partitions = {
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"firmware", 0x40000, 0x770000},
186 {"soft-version", 0x7b0000, 0x00100},
187 {"support-list", 0x7b1000, 0x01000},
188 {"user-config", 0x7c0000, 0x10000},
189 {"default-config", 0x7d0000, 0x10000},
190 {"log", 0x7e0000, 0x10000},
191 {"radio", 0x7f0000, 0x10000},
192 {NULL, 0, 0}
193 },
194
195 .first_sysupgrade_partition = "os-image",
196 .last_sysupgrade_partition = "support-list",
197 },
198
199 /** Firmware layout for the CPE210 V3 */
200 {
201 .id = "CPE210V3",
202 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
203 .support_list =
204 "SupportList:\r\n"
205 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
206 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
207 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
209 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
210 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
211 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
212 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
213 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
214 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
215 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
216 .support_trail = '\xff',
217 .soft_ver = NULL,
218
219 .partitions = {
220 {"fs-uboot", 0x00000, 0x20000},
221 {"partition-table", 0x20000, 0x01000},
222 {"default-mac", 0x30000, 0x00020},
223 {"product-info", 0x31100, 0x00100},
224 {"device-info", 0x31400, 0x00400},
225 {"signature", 0x32000, 0x00400},
226 {"device-id", 0x33000, 0x00100},
227 {"firmware", 0x40000, 0x770000},
228 {"soft-version", 0x7b0000, 0x00100},
229 {"support-list", 0x7b1000, 0x01000},
230 {"user-config", 0x7c0000, 0x10000},
231 {"default-config", 0x7d0000, 0x10000},
232 {"log", 0x7e0000, 0x10000},
233 {"radio", 0x7f0000, 0x10000},
234 {NULL, 0, 0}
235 },
236
237 .first_sysupgrade_partition = "os-image",
238 .last_sysupgrade_partition = "support-list",
239 },
240
241 /** Firmware layout for the CPE220 V2 */
242 {
243 .id = "CPE220V2",
244 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
245 .support_list =
246 "SupportList:\r\n"
247 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
248 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
249 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
250 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
251 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
252 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
253 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
254 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
255 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
256 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
257 .support_trail = '\xff',
258 .soft_ver = NULL,
259
260 .partitions = {
261 {"fs-uboot", 0x00000, 0x20000},
262 {"partition-table", 0x20000, 0x02000},
263 {"default-mac", 0x30000, 0x00020},
264 {"product-info", 0x31100, 0x00100},
265 {"signature", 0x32000, 0x00400},
266 {"os-image", 0x40000, 0x300000},
267 {"file-system", 0x340000, 0x470000},
268 {"soft-version", 0x7b0000, 0x00100},
269 {"support-list", 0x7b1000, 0x00400},
270 {"user-config", 0x7c0000, 0x10000},
271 {"default-config", 0x7d0000, 0x10000},
272 {"log", 0x7e0000, 0x10000},
273 {"radio", 0x7f0000, 0x10000},
274 {NULL, 0, 0}
275 },
276
277 .first_sysupgrade_partition = "os-image",
278 .last_sysupgrade_partition = "support-list",
279 },
280
281 /** Firmware layout for the CPE220 V3 */
282 {
283 .id = "CPE220V3",
284 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
285 .support_list =
286 "SupportList:\r\n"
287 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
288 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
289 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
290 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
291 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
292 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
293 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
294 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
295 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
296 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
297 .support_trail = '\xff',
298 .soft_ver = NULL,
299
300 .partitions = {
301 {"fs-uboot", 0x00000, 0x20000},
302 {"partition-table", 0x20000, 0x02000},
303 {"default-mac", 0x30000, 0x00020},
304 {"product-info", 0x31100, 0x00100},
305 {"device-info", 0x31400, 0x00400},
306 {"signature", 0x32000, 0x00400},
307 {"device-id", 0x33000, 0x00100},
308 {"firmware", 0x40000, 0x770000},
309 {"soft-version", 0x7b0000, 0x00100},
310 {"support-list", 0x7b1000, 0x01000},
311 {"user-config", 0x7c0000, 0x10000},
312 {"default-config", 0x7d0000, 0x10000},
313 {"log", 0x7e0000, 0x10000},
314 {"radio", 0x7f0000, 0x10000},
315 {NULL, 0, 0}
316 },
317
318 .first_sysupgrade_partition = "os-image",
319 .last_sysupgrade_partition = "support-list",
320 },
321
322 /** Firmware layout for the CPE510/520 V1 */
323 {
324 .id = "CPE510",
325 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
326 .support_list =
327 "SupportList:\r\n"
328 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
329 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
330 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
331 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
332 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
333 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
334 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
335 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
336 .support_trail = '\xff',
337 .soft_ver = NULL,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"os-image", 0x40000, 0x300000},
346 {"file-system", 0x340000, 0x470000},
347 {"soft-version", 0x7b0000, 0x00100},
348 {"support-list", 0x7b1000, 0x00400},
349 {"user-config", 0x7c0000, 0x10000},
350 {"default-config", 0x7d0000, 0x10000},
351 {"log", 0x7e0000, 0x10000},
352 {"radio", 0x7f0000, 0x10000},
353 {NULL, 0, 0}
354 },
355
356 .first_sysupgrade_partition = "os-image",
357 .last_sysupgrade_partition = "support-list",
358 },
359
360 /** Firmware layout for the CPE510 V2 */
361 {
362 .id = "CPE510V2",
363 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
364 .support_list =
365 "SupportList:\r\n"
366 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
367 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
368 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
369 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
370 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
371 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
372 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
373 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
374 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
375 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
376 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
377 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
378 .support_trail = '\xff',
379 .soft_ver = NULL,
380
381 .partitions = {
382 {"fs-uboot", 0x00000, 0x20000},
383 {"partition-table", 0x20000, 0x02000},
384 {"default-mac", 0x30000, 0x00020},
385 {"product-info", 0x31100, 0x00100},
386 {"signature", 0x32000, 0x00400},
387 {"os-image", 0x40000, 0x300000},
388 {"file-system", 0x340000, 0x470000},
389 {"soft-version", 0x7b0000, 0x00100},
390 {"support-list", 0x7b1000, 0x00400},
391 {"user-config", 0x7c0000, 0x10000},
392 {"default-config", 0x7d0000, 0x10000},
393 {"log", 0x7e0000, 0x10000},
394 {"radio", 0x7f0000, 0x10000},
395 {NULL, 0, 0}
396 },
397
398 .first_sysupgrade_partition = "os-image",
399 .last_sysupgrade_partition = "support-list",
400 },
401
402 /** Firmware layout for the CPE510 V3 */
403 {
404 .id = "CPE510V3",
405 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
406 .support_list =
407 "SupportList:\r\n"
408 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
409 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
410 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
411 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
412 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
413 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
414 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
415 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
416 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
417 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
418 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
419 "CPE510(TP-LINK|US|N300-5):3.0\r\n",
420 .support_trail = '\xff',
421 .soft_ver = NULL,
422
423 .partitions = {
424 {"fs-uboot", 0x00000, 0x20000},
425 {"partition-table", 0x20000, 0x02000},
426 {"default-mac", 0x30000, 0x00020},
427 {"product-info", 0x31100, 0x00100},
428 {"signature", 0x32000, 0x00400},
429 {"os-image", 0x40000, 0x300000},
430 {"file-system", 0x340000, 0x470000},
431 {"soft-version", 0x7b0000, 0x00100},
432 {"support-list", 0x7b1000, 0x00400},
433 {"user-config", 0x7c0000, 0x10000},
434 {"default-config", 0x7d0000, 0x10000},
435 {"log", 0x7e0000, 0x10000},
436 {"radio", 0x7f0000, 0x10000},
437 {NULL, 0, 0}
438 },
439
440 .first_sysupgrade_partition = "os-image",
441 .last_sysupgrade_partition = "support-list",
442 },
443
444 /** Firmware layout for the CPE610V1 */
445 {
446 .id = "CPE610V1",
447 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
448 .support_list =
449 "SupportList:\r\n"
450 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
451 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
452 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
453 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
454 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
455 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
456 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
457 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
458 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
459 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
460 .support_trail = '\xff',
461 .soft_ver = NULL,
462
463 .partitions = {
464 {"fs-uboot", 0x00000, 0x20000},
465 {"partition-table", 0x20000, 0x02000},
466 {"default-mac", 0x30000, 0x00020},
467 {"product-info", 0x31100, 0x00100},
468 {"signature", 0x32000, 0x00400},
469 {"os-image", 0x40000, 0x300000},
470 {"file-system", 0x340000, 0x470000},
471 {"soft-version", 0x7b0000, 0x00100},
472 {"support-list", 0x7b1000, 0x00400},
473 {"user-config", 0x7c0000, 0x10000},
474 {"default-config", 0x7d0000, 0x10000},
475 {"log", 0x7e0000, 0x10000},
476 {"radio", 0x7f0000, 0x10000},
477 {NULL, 0, 0}
478 },
479
480 .first_sysupgrade_partition = "os-image",
481 .last_sysupgrade_partition = "support-list",
482 },
483
484 /** Firmware layout for the CPE610V2 */
485 {
486 .id = "CPE610V2",
487 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
488 .support_list =
489 "SupportList:\r\n"
490 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
491 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
492 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
493 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
494 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
495 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
496 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
497 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
498 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
499 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
500 .support_trail = '\xff',
501 .soft_ver = NULL,
502
503 .partitions = {
504 {"fs-uboot", 0x00000, 0x20000},
505 {"partition-table", 0x20000, 0x02000},
506 {"default-mac", 0x30000, 0x00020},
507 {"product-info", 0x31100, 0x00100},
508 {"signature", 0x32000, 0x00400},
509 {"os-image", 0x40000, 0x300000},
510 {"file-system", 0x340000, 0x470000},
511 {"soft-version", 0x7b0000, 0x00100},
512 {"support-list", 0x7b1000, 0x00400},
513 {"user-config", 0x7c0000, 0x10000},
514 {"default-config", 0x7d0000, 0x10000},
515 {"log", 0x7e0000, 0x10000},
516 {"radio", 0x7f0000, 0x10000},
517 {NULL, 0, 0}
518 },
519
520 .first_sysupgrade_partition = "os-image",
521 .last_sysupgrade_partition = "support-list",
522 },
523
524 {
525 .id = "WBS210",
526 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
527 .support_list =
528 "SupportList:\r\n"
529 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
530 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
531 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
532 .support_trail = '\xff',
533 .soft_ver = NULL,
534
535 .partitions = {
536 {"fs-uboot", 0x00000, 0x20000},
537 {"partition-table", 0x20000, 0x02000},
538 {"default-mac", 0x30000, 0x00020},
539 {"product-info", 0x31100, 0x00100},
540 {"signature", 0x32000, 0x00400},
541 {"os-image", 0x40000, 0x300000},
542 {"file-system", 0x340000, 0x470000},
543 {"soft-version", 0x7b0000, 0x00100},
544 {"support-list", 0x7b1000, 0x00400},
545 {"user-config", 0x7c0000, 0x10000},
546 {"default-config", 0x7d0000, 0x10000},
547 {"log", 0x7e0000, 0x10000},
548 {"radio", 0x7f0000, 0x10000},
549 {NULL, 0, 0}
550 },
551
552 .first_sysupgrade_partition = "os-image",
553 .last_sysupgrade_partition = "support-list",
554 },
555
556 {
557 .id = "WBS210V2",
558 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
559 .support_list =
560 "SupportList:\r\n"
561 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
562 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
563 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
564 .support_trail = '\xff',
565 .soft_ver = NULL,
566
567 .partitions = {
568 {"fs-uboot", 0x00000, 0x20000},
569 {"partition-table", 0x20000, 0x02000},
570 {"default-mac", 0x30000, 0x00020},
571 {"product-info", 0x31100, 0x00100},
572 {"signature", 0x32000, 0x00400},
573 {"os-image", 0x40000, 0x300000},
574 {"file-system", 0x340000, 0x470000},
575 {"soft-version", 0x7b0000, 0x00100},
576 {"support-list", 0x7b1000, 0x00400},
577 {"user-config", 0x7c0000, 0x10000},
578 {"default-config", 0x7d0000, 0x10000},
579 {"log", 0x7e0000, 0x10000},
580 {"radio", 0x7f0000, 0x10000},
581 {NULL, 0, 0}
582 },
583
584 .first_sysupgrade_partition = "os-image",
585 .last_sysupgrade_partition = "support-list",
586 },
587
588 {
589 .id = "WBS510",
590 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
591 .support_list =
592 "SupportList:\r\n"
593 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
594 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
595 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
596 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
597 .support_trail = '\xff',
598 .soft_ver = NULL,
599
600 .partitions = {
601 {"fs-uboot", 0x00000, 0x20000},
602 {"partition-table", 0x20000, 0x02000},
603 {"default-mac", 0x30000, 0x00020},
604 {"product-info", 0x31100, 0x00100},
605 {"signature", 0x32000, 0x00400},
606 {"os-image", 0x40000, 0x300000},
607 {"file-system", 0x340000, 0x470000},
608 {"soft-version", 0x7b0000, 0x00100},
609 {"support-list", 0x7b1000, 0x00400},
610 {"user-config", 0x7c0000, 0x10000},
611 {"default-config", 0x7d0000, 0x10000},
612 {"log", 0x7e0000, 0x10000},
613 {"radio", 0x7f0000, 0x10000},
614 {NULL, 0, 0}
615 },
616
617 .first_sysupgrade_partition = "os-image",
618 .last_sysupgrade_partition = "support-list",
619 },
620
621 {
622 .id = "WBS510V2",
623 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
624 .support_list =
625 "SupportList:\r\n"
626 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
627 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
628 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
629 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
630 .support_trail = '\xff',
631 .soft_ver = NULL,
632
633 .partitions = {
634 {"fs-uboot", 0x00000, 0x20000},
635 {"partition-table", 0x20000, 0x02000},
636 {"default-mac", 0x30000, 0x00020},
637 {"product-info", 0x31100, 0x00100},
638 {"signature", 0x32000, 0x00400},
639 {"os-image", 0x40000, 0x300000},
640 {"file-system", 0x340000, 0x470000},
641 {"soft-version", 0x7b0000, 0x00100},
642 {"support-list", 0x7b1000, 0x00400},
643 {"user-config", 0x7c0000, 0x10000},
644 {"default-config", 0x7d0000, 0x10000},
645 {"log", 0x7e0000, 0x10000},
646 {"radio", 0x7f0000, 0x10000},
647 {NULL, 0, 0}
648 },
649
650 .first_sysupgrade_partition = "os-image",
651 .last_sysupgrade_partition = "support-list",
652 },
653
654 /** Firmware layout for the C2600 */
655 {
656 .id = "C2600",
657 .vendor = "",
658 .support_list =
659 "SupportList:\r\n"
660 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
661 .support_trail = '\x00',
662 .soft_ver = NULL,
663
664 /**
665 We use a bigger os-image partition than the stock images (and thus
666 smaller file-system), as our kernel doesn't fit in the stock firmware's
667 2 MB os-image since kernel 4.14.
668 */
669 .partitions = {
670 {"SBL1", 0x00000, 0x20000},
671 {"MIBIB", 0x20000, 0x20000},
672 {"SBL2", 0x40000, 0x20000},
673 {"SBL3", 0x60000, 0x30000},
674 {"DDRCONFIG", 0x90000, 0x10000},
675 {"SSD", 0xa0000, 0x10000},
676 {"TZ", 0xb0000, 0x30000},
677 {"RPM", 0xe0000, 0x20000},
678 {"fs-uboot", 0x100000, 0x70000},
679 {"uboot-env", 0x170000, 0x40000},
680 {"radio", 0x1b0000, 0x40000},
681 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
682 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
683 {"default-mac", 0x1ef0000, 0x00200},
684 {"pin", 0x1ef0200, 0x00200},
685 {"product-info", 0x1ef0400, 0x0fc00},
686 {"partition-table", 0x1f00000, 0x10000},
687 {"soft-version", 0x1f10000, 0x10000},
688 {"support-list", 0x1f20000, 0x10000},
689 {"profile", 0x1f30000, 0x10000},
690 {"default-config", 0x1f40000, 0x10000},
691 {"user-config", 0x1f50000, 0x40000},
692 {"qos-db", 0x1f90000, 0x40000},
693 {"usb-config", 0x1fd0000, 0x10000},
694 {"log", 0x1fe0000, 0x20000},
695 {NULL, 0, 0}
696 },
697
698 .first_sysupgrade_partition = "os-image",
699 .last_sysupgrade_partition = "file-system"
700 },
701
702 /** Firmware layout for the A7-V5 */
703 {
704 .id = "ARCHER-A7-V5",
705 .support_list =
706 "SupportList:\n"
707 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
708 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
709 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
710 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
711 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
712 .support_trail = '\x00',
713 .soft_ver = "soft_ver:1.0.0\n",
714
715 /* We're using a dynamic kernel/rootfs split here */
716 .partitions = {
717 {"factory-boot", 0x00000, 0x20000},
718 {"fs-uboot", 0x20000, 0x20000},
719 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
720 /* Stock: name file-system base 0x160000 size 0xda0000 */
721 {"default-mac", 0xf40000, 0x00200},
722 {"pin", 0xf40200, 0x00200},
723 {"device-id", 0xf40400, 0x00100},
724 {"product-info", 0xf40500, 0x0fb00},
725 {"soft-version", 0xf50000, 0x00100},
726 {"extra-para", 0xf51000, 0x01000},
727 {"support-list", 0xf52000, 0x0a000},
728 {"profile", 0xf5c000, 0x04000},
729 {"default-config", 0xf60000, 0x10000},
730 {"user-config", 0xf70000, 0x40000},
731 {"certificate", 0xfb0000, 0x10000},
732 {"partition-table", 0xfc0000, 0x10000},
733 {"log", 0xfd0000, 0x20000},
734 {"radio", 0xff0000, 0x10000},
735 {NULL, 0, 0}
736 },
737
738 .first_sysupgrade_partition = "os-image",
739 .last_sysupgrade_partition = "file-system",
740 },
741
742 /** Firmware layout for the C2v3 */
743 {
744 .id = "ARCHER-C2-V3",
745 .support_list =
746 "SupportList:\n"
747 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
748 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
749 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
750 .support_trail = '\x00',
751 .soft_ver = "soft_ver:3.0.1\n",
752
753 /** We're using a dynamic kernel/rootfs split here */
754
755 .partitions = {
756 {"factory-boot", 0x00000, 0x20000},
757 {"fs-uboot", 0x20000, 0x10000},
758 {"firmware", 0x30000, 0x7a0000},
759 {"user-config", 0x7d0000, 0x04000},
760 {"default-mac", 0x7e0000, 0x00100},
761 {"device-id", 0x7e0100, 0x00100},
762 {"extra-para", 0x7e0200, 0x00100},
763 {"pin", 0x7e0300, 0x00100},
764 {"support-list", 0x7e0400, 0x00400},
765 {"soft-version", 0x7e0800, 0x00400},
766 {"product-info", 0x7e0c00, 0x01400},
767 {"partition-table", 0x7e2000, 0x01000},
768 {"profile", 0x7e3000, 0x01000},
769 {"default-config", 0x7e4000, 0x04000},
770 {"merge-config", 0x7ec000, 0x02000},
771 {"qos-db", 0x7ee000, 0x02000},
772 {"radio", 0x7f0000, 0x10000},
773 {NULL, 0, 0}
774 },
775
776 .first_sysupgrade_partition = "os-image",
777 .last_sysupgrade_partition = "file-system",
778 },
779
780 /** Firmware layout for the C25v1 */
781 {
782 .id = "ARCHER-C25-V1",
783 .support_list =
784 "SupportList:\n"
785 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
786 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
787 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
788 .support_trail = '\x00',
789 .soft_ver = "soft_ver:1.0.0\n",
790
791 /* We're using a dynamic kernel/rootfs split here */
792 .partitions = {
793 {"factory-boot", 0x00000, 0x20000},
794 {"fs-uboot", 0x20000, 0x10000},
795 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
796 /* Stock: name file-system base 0x130000 size 0x6a0000 */
797 {"user-config", 0x7d0000, 0x04000},
798 {"default-mac", 0x7e0000, 0x00100},
799 {"device-id", 0x7e0100, 0x00100},
800 {"extra-para", 0x7e0200, 0x00100},
801 {"pin", 0x7e0300, 0x00100},
802 {"support-list", 0x7e0400, 0x00400},
803 {"soft-version", 0x7e0800, 0x00400},
804 {"product-info", 0x7e0c00, 0x01400},
805 {"partition-table", 0x7e2000, 0x01000},
806 {"profile", 0x7e3000, 0x01000},
807 {"default-config", 0x7e4000, 0x04000},
808 {"merge-config", 0x7ec000, 0x02000},
809 {"qos-db", 0x7ee000, 0x02000},
810 {"radio", 0x7f0000, 0x10000},
811 {NULL, 0, 0}
812 },
813
814 .first_sysupgrade_partition = "os-image",
815 .last_sysupgrade_partition = "file-system",
816 },
817
818 /** Firmware layout for the C58v1 */
819 {
820 .id = "ARCHER-C58-V1",
821 .vendor = "",
822 .support_list =
823 "SupportList:\r\n"
824 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
825 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
826 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
827 .support_trail = '\x00',
828 .soft_ver = "soft_ver:1.0.0\n",
829
830 .partitions = {
831 {"fs-uboot", 0x00000, 0x10000},
832 {"default-mac", 0x10000, 0x00200},
833 {"pin", 0x10200, 0x00200},
834 {"product-info", 0x10400, 0x00100},
835 {"partition-table", 0x10500, 0x00800},
836 {"soft-version", 0x11300, 0x00200},
837 {"support-list", 0x11500, 0x00100},
838 {"device-id", 0x11600, 0x00100},
839 {"profile", 0x11700, 0x03900},
840 {"default-config", 0x15000, 0x04000},
841 {"user-config", 0x19000, 0x04000},
842 {"firmware", 0x20000, 0x7c8000},
843 {"certyficate", 0x7e8000, 0x08000},
844 {"radio", 0x7f0000, 0x10000},
845 {NULL, 0, 0}
846 },
847
848 .first_sysupgrade_partition = "os-image",
849 .last_sysupgrade_partition = "file-system",
850 },
851
852 /** Firmware layout for the C59v1 */
853 {
854 .id = "ARCHER-C59-V1",
855 .vendor = "",
856 .support_list =
857 "SupportList:\r\n"
858 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
859 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
860 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
861 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
862 .support_trail = '\x00',
863 .soft_ver = "soft_ver:1.0.0\n",
864
865 /* We're using a dynamic kernel/rootfs split here */
866 .partitions = {
867 {"fs-uboot", 0x00000, 0x10000},
868 {"default-mac", 0x10000, 0x00200},
869 {"pin", 0x10200, 0x00200},
870 {"device-id", 0x10400, 0x00100},
871 {"product-info", 0x10500, 0x0fb00},
872 {"firmware", 0x20000, 0xe30000},
873 {"partition-table", 0xe50000, 0x10000},
874 {"soft-version", 0xe60000, 0x10000},
875 {"support-list", 0xe70000, 0x10000},
876 {"profile", 0xe80000, 0x10000},
877 {"default-config", 0xe90000, 0x10000},
878 {"user-config", 0xea0000, 0x40000},
879 {"usb-config", 0xee0000, 0x10000},
880 {"certificate", 0xef0000, 0x10000},
881 {"qos-db", 0xf00000, 0x40000},
882 {"log", 0xfe0000, 0x10000},
883 {"radio", 0xff0000, 0x10000},
884 {NULL, 0, 0}
885 },
886
887 .first_sysupgrade_partition = "os-image",
888 .last_sysupgrade_partition = "file-system",
889 },
890
891 /** Firmware layout for the C59v2 */
892 {
893 .id = "ARCHER-C59-V2",
894 .vendor = "",
895 .support_list =
896 "SupportList:\r\n"
897 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
898 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
899 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
900 .support_trail = '\x00',
901 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
902
903 /** We're using a dynamic kernel/rootfs split here */
904 .partitions = {
905 {"factory-boot", 0x00000, 0x20000},
906 {"fs-uboot", 0x20000, 0x10000},
907 {"default-mac", 0x30000, 0x00200},
908 {"pin", 0x30200, 0x00200},
909 {"device-id", 0x30400, 0x00100},
910 {"product-info", 0x30500, 0x0fb00},
911 {"firmware", 0x40000, 0xe10000},
912 {"partition-table", 0xe50000, 0x10000},
913 {"soft-version", 0xe60000, 0x10000},
914 {"support-list", 0xe70000, 0x10000},
915 {"profile", 0xe80000, 0x10000},
916 {"default-config", 0xe90000, 0x10000},
917 {"user-config", 0xea0000, 0x40000},
918 {"usb-config", 0xee0000, 0x10000},
919 {"certificate", 0xef0000, 0x10000},
920 {"extra-para", 0xf00000, 0x10000},
921 {"qos-db", 0xf10000, 0x30000},
922 {"log", 0xfe0000, 0x10000},
923 {"radio", 0xff0000, 0x10000},
924 {NULL, 0, 0}
925 },
926
927 .first_sysupgrade_partition = "os-image",
928 .last_sysupgrade_partition = "file-system",
929 },
930
931 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
932 {
933 .id = "ARCHER-C6-V2",
934 .vendor = "",
935 .support_list =
936 "SupportList:\r\n"
937 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
938 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
939 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
940 .support_trail = '\x00',
941 .soft_ver = "soft_ver:1.9.1\n",
942
943 .partitions = {
944 {"fs-uboot", 0x00000, 0x20000},
945 {"default-mac", 0x20000, 0x00200},
946 {"pin", 0x20200, 0x00100},
947 {"product-info", 0x20300, 0x00200},
948 {"device-id", 0x20500, 0x0fb00},
949 {"firmware", 0x30000, 0x7a9400},
950 {"soft-version", 0x7d9400, 0x00100},
951 {"extra-para", 0x7d9500, 0x00100},
952 {"support-list", 0x7d9600, 0x00200},
953 {"profile", 0x7d9800, 0x03000},
954 {"default-config", 0x7dc800, 0x03000},
955 {"partition-table", 0x7df800, 0x00800},
956 {"user-config", 0x7e0000, 0x0c000},
957 {"certificate", 0x7ec000, 0x04000},
958 {"radio", 0x7f0000, 0x10000},
959 {NULL, 0, 0}
960 },
961
962 .first_sysupgrade_partition = "os-image",
963 .last_sysupgrade_partition = "file-system",
964 },
965
966 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
967 {
968 .id = "ARCHER-C6-V2-US",
969 .vendor = "",
970 .support_list =
971 "SupportList:\n"
972 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
973 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
974 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
975 .support_trail = '\x00',
976 .soft_ver = "soft_ver:1.9.1\n",
977
978 .partitions = {
979 {"factory-boot", 0x00000, 0x20000},
980 {"default-mac", 0x20000, 0x00200},
981 {"pin", 0x20200, 0x00100},
982 {"product-info", 0x20300, 0x00200},
983 {"device-id", 0x20500, 0x0fb00},
984 {"fs-uboot", 0x30000, 0x20000},
985 {"firmware", 0x50000, 0xf89400},
986 {"soft-version", 0xfd9400, 0x00100},
987 {"extra-para", 0xfd9500, 0x00100},
988 {"support-list", 0xfd9600, 0x00200},
989 {"profile", 0xfd9800, 0x03000},
990 {"default-config", 0xfdc800, 0x03000},
991 {"partition-table", 0xfdf800, 0x00800},
992 {"user-config", 0xfe0000, 0x0c000},
993 {"certificate", 0xfec000, 0x04000},
994 {"radio", 0xff0000, 0x10000},
995 {NULL, 0, 0}
996 },
997 .first_sysupgrade_partition = "os-image",
998 .last_sysupgrade_partition = "file-system",
999 },
1000
1001 /** Firmware layout for the C60v1 */
1002 {
1003 .id = "ARCHER-C60-V1",
1004 .vendor = "",
1005 .support_list =
1006 "SupportList:\r\n"
1007 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1008 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1009 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1010 .support_trail = '\x00',
1011 .soft_ver = "soft_ver:1.0.0\n",
1012
1013 .partitions = {
1014 {"fs-uboot", 0x00000, 0x10000},
1015 {"default-mac", 0x10000, 0x00200},
1016 {"pin", 0x10200, 0x00200},
1017 {"product-info", 0x10400, 0x00100},
1018 {"partition-table", 0x10500, 0x00800},
1019 {"soft-version", 0x11300, 0x00200},
1020 {"support-list", 0x11500, 0x00100},
1021 {"device-id", 0x11600, 0x00100},
1022 {"profile", 0x11700, 0x03900},
1023 {"default-config", 0x15000, 0x04000},
1024 {"user-config", 0x19000, 0x04000},
1025 {"firmware", 0x20000, 0x7c8000},
1026 {"certyficate", 0x7e8000, 0x08000},
1027 {"radio", 0x7f0000, 0x10000},
1028 {NULL, 0, 0}
1029 },
1030
1031 .first_sysupgrade_partition = "os-image",
1032 .last_sysupgrade_partition = "file-system",
1033 },
1034
1035 /** Firmware layout for the C60v2 */
1036 {
1037 .id = "ARCHER-C60-V2",
1038 .vendor = "",
1039 .support_list =
1040 "SupportList:\r\n"
1041 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1042 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1043 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1044 .support_trail = '\x00',
1045 .soft_ver = "soft_ver:2.0.0\n",
1046
1047 .partitions = {
1048 {"factory-boot", 0x00000, 0x1fb00},
1049 {"default-mac", 0x1fb00, 0x00200},
1050 {"pin", 0x1fd00, 0x00100},
1051 {"product-info", 0x1fe00, 0x00100},
1052 {"device-id", 0x1ff00, 0x00100},
1053 {"fs-uboot", 0x20000, 0x10000},
1054 {"firmware", 0x30000, 0x7a0000},
1055 {"soft-version", 0x7d9500, 0x00100},
1056 {"support-list", 0x7d9600, 0x00100},
1057 {"extra-para", 0x7d9700, 0x00100},
1058 {"profile", 0x7d9800, 0x03000},
1059 {"default-config", 0x7dc800, 0x03000},
1060 {"partition-table", 0x7df800, 0x00800},
1061 {"user-config", 0x7e0000, 0x0c000},
1062 {"certificate", 0x7ec000, 0x04000},
1063 {"radio", 0x7f0000, 0x10000},
1064 {NULL, 0, 0}
1065 },
1066
1067 .first_sysupgrade_partition = "os-image",
1068 .last_sysupgrade_partition = "file-system",
1069 },
1070
1071 /** Firmware layout for the C60v3 */
1072 {
1073 .id = "ARCHER-C60-V3",
1074 .vendor = "",
1075 .support_list =
1076 "SupportList:\r\n"
1077 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1078 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1079 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1080 .support_trail = '\x00',
1081 .soft_ver = "soft_ver:3.0.0\n",
1082
1083 .partitions = {
1084 {"factory-boot", 0x00000, 0x1fb00},
1085 {"default-mac", 0x1fb00, 0x00200},
1086 {"pin", 0x1fd00, 0x00100},
1087 {"product-info", 0x1fe00, 0x00100},
1088 {"device-id", 0x1ff00, 0x00100},
1089 {"fs-uboot", 0x20000, 0x10000},
1090 {"firmware", 0x30000, 0x7a0000},
1091 {"soft-version", 0x7d9500, 0x00100},
1092 {"support-list", 0x7d9600, 0x00100},
1093 {"extra-para", 0x7d9700, 0x00100},
1094 {"profile", 0x7d9800, 0x03000},
1095 {"default-config", 0x7dc800, 0x03000},
1096 {"partition-table", 0x7df800, 0x00800},
1097 {"user-config", 0x7e0000, 0x0c000},
1098 {"certificate", 0x7ec000, 0x04000},
1099 {"radio", 0x7f0000, 0x10000},
1100 {NULL, 0, 0}
1101 },
1102
1103 .first_sysupgrade_partition = "os-image",
1104 .last_sysupgrade_partition = "file-system",
1105 },
1106
1107 /** Firmware layout for the C5 */
1108 {
1109 .id = "ARCHER-C5-V2",
1110 .vendor = "",
1111 .support_list =
1112 "SupportList:\r\n"
1113 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1114 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1115 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1116 .support_trail = '\x00',
1117 .soft_ver = NULL,
1118
1119 .partitions = {
1120 {"fs-uboot", 0x00000, 0x40000},
1121 {"os-image", 0x40000, 0x200000},
1122 {"file-system", 0x240000, 0xc00000},
1123 {"default-mac", 0xe40000, 0x00200},
1124 {"pin", 0xe40200, 0x00200},
1125 {"product-info", 0xe40400, 0x00200},
1126 {"partition-table", 0xe50000, 0x10000},
1127 {"soft-version", 0xe60000, 0x00200},
1128 {"support-list", 0xe61000, 0x0f000},
1129 {"profile", 0xe70000, 0x10000},
1130 {"default-config", 0xe80000, 0x10000},
1131 {"user-config", 0xe90000, 0x50000},
1132 {"log", 0xee0000, 0x100000},
1133 {"radio_bk", 0xfe0000, 0x10000},
1134 {"radio", 0xff0000, 0x10000},
1135 {NULL, 0, 0}
1136 },
1137
1138 .first_sysupgrade_partition = "os-image",
1139 .last_sysupgrade_partition = "file-system"
1140 },
1141
1142 /** Firmware layout for the C7 */
1143 {
1144 .id = "ARCHER-C7-V4",
1145 .support_list =
1146 "SupportList:\n"
1147 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1148 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1149 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1150 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1151 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1152 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1153 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1154 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1155 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1156 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1157 .support_trail = '\x00',
1158 .soft_ver = "soft_ver:1.0.0\n",
1159
1160 /* We're using a dynamic kernel/rootfs split here */
1161 .partitions = {
1162 {"factory-boot", 0x00000, 0x20000},
1163 {"fs-uboot", 0x20000, 0x20000},
1164 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1165 /* Stock: name file-system base 0x160000 size 0xda0000 */
1166 {"default-mac", 0xf00000, 0x00200},
1167 {"pin", 0xf00200, 0x00200},
1168 {"device-id", 0xf00400, 0x00100},
1169 {"product-info", 0xf00500, 0x0fb00},
1170 {"soft-version", 0xf10000, 0x00100},
1171 {"extra-para", 0xf11000, 0x01000},
1172 {"support-list", 0xf12000, 0x0a000},
1173 {"profile", 0xf1c000, 0x04000},
1174 {"default-config", 0xf20000, 0x10000},
1175 {"user-config", 0xf30000, 0x40000},
1176 {"qos-db", 0xf70000, 0x40000},
1177 {"certificate", 0xfb0000, 0x10000},
1178 {"partition-table", 0xfc0000, 0x10000},
1179 {"log", 0xfd0000, 0x20000},
1180 {"radio", 0xff0000, 0x10000},
1181 {NULL, 0, 0}
1182 },
1183
1184 .first_sysupgrade_partition = "os-image",
1185 .last_sysupgrade_partition = "file-system",
1186 },
1187
1188 /** Firmware layout for the C7 v5*/
1189 {
1190 .id = "ARCHER-C7-V5",
1191 .support_list =
1192 "SupportList:\n"
1193 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1194 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1195 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1196 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1197 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1198 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1199 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1200 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1201
1202 .support_trail = '\x00',
1203 .soft_ver = "soft_ver:1.0.0\n",
1204
1205 /* We're using a dynamic kernel/rootfs split here */
1206 .partitions = {
1207 {"factory-boot", 0x00000, 0x20000},
1208 {"fs-uboot", 0x20000, 0x20000},
1209 {"partition-table", 0x40000, 0x10000},
1210 {"radio", 0x50000, 0x10000},
1211 {"default-mac", 0x60000, 0x00200},
1212 {"pin", 0x60200, 0x00200},
1213 {"device-id", 0x60400, 0x00100},
1214 {"product-info", 0x60500, 0x0fb00},
1215 {"soft-version", 0x70000, 0x01000},
1216 {"extra-para", 0x71000, 0x01000},
1217 {"support-list", 0x72000, 0x0a000},
1218 {"profile", 0x7c000, 0x04000},
1219 {"user-config", 0x80000, 0x40000},
1220
1221
1222 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1223 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1224
1225 {"log", 0xfc0000, 0x20000},
1226 {"certificate", 0xfe0000, 0x10000},
1227 {"default-config", 0xff0000, 0x10000},
1228 {NULL, 0, 0}
1229
1230 },
1231
1232 .first_sysupgrade_partition = "os-image",
1233 .last_sysupgrade_partition = "file-system",
1234 },
1235
1236 /** Firmware layout for the C9 */
1237 {
1238 .id = "ARCHERC9",
1239 .vendor = "",
1240 .support_list =
1241 "SupportList:\n"
1242 "{product_name:ArcherC9,"
1243 "product_ver:1.0.0,"
1244 "special_id:00000000}\n",
1245 .support_trail = '\x00',
1246 .soft_ver = NULL,
1247
1248 .partitions = {
1249 {"fs-uboot", 0x00000, 0x40000},
1250 {"os-image", 0x40000, 0x200000},
1251 {"file-system", 0x240000, 0xc00000},
1252 {"default-mac", 0xe40000, 0x00200},
1253 {"pin", 0xe40200, 0x00200},
1254 {"product-info", 0xe40400, 0x00200},
1255 {"partition-table", 0xe50000, 0x10000},
1256 {"soft-version", 0xe60000, 0x00200},
1257 {"support-list", 0xe61000, 0x0f000},
1258 {"profile", 0xe70000, 0x10000},
1259 {"default-config", 0xe80000, 0x10000},
1260 {"user-config", 0xe90000, 0x50000},
1261 {"log", 0xee0000, 0x100000},
1262 {"radio_bk", 0xfe0000, 0x10000},
1263 {"radio", 0xff0000, 0x10000},
1264 {NULL, 0, 0}
1265 },
1266
1267 .first_sysupgrade_partition = "os-image",
1268 .last_sysupgrade_partition = "file-system"
1269 },
1270
1271 /** Firmware layout for the EAP120 */
1272 {
1273 .id = "EAP120",
1274 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1275 .support_list =
1276 "SupportList:\r\n"
1277 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1278 .support_trail = '\xff',
1279 .soft_ver = NULL,
1280
1281 .partitions = {
1282 {"fs-uboot", 0x00000, 0x20000},
1283 {"partition-table", 0x20000, 0x02000},
1284 {"default-mac", 0x30000, 0x00020},
1285 {"support-list", 0x31000, 0x00100},
1286 {"product-info", 0x31100, 0x00100},
1287 {"soft-version", 0x32000, 0x00100},
1288 {"os-image", 0x40000, 0x180000},
1289 {"file-system", 0x1c0000, 0x600000},
1290 {"user-config", 0x7c0000, 0x10000},
1291 {"backup-config", 0x7d0000, 0x10000},
1292 {"log", 0x7e0000, 0x10000},
1293 {"radio", 0x7f0000, 0x10000},
1294 {NULL, 0, 0}
1295 },
1296
1297 .first_sysupgrade_partition = "os-image",
1298 .last_sysupgrade_partition = "file-system"
1299 },
1300
1301 /** Firmware layout for the TL-WA850RE v2 */
1302 {
1303 .id = "TLWA850REV2",
1304 .vendor = "",
1305 .support_list =
1306 "SupportList:\n"
1307 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1308 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1309 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1310 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1311 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1312 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1313 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1314 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1315 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1316 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1317 .support_trail = '\x00',
1318 .soft_ver = NULL,
1319
1320 /**
1321 576KB were moved from file-system to os-image
1322 in comparison to the stock image
1323 */
1324 .partitions = {
1325 {"fs-uboot", 0x00000, 0x20000},
1326 {"firmware", 0x20000, 0x390000},
1327 {"partition-table", 0x3b0000, 0x02000},
1328 {"default-mac", 0x3c0000, 0x00020},
1329 {"pin", 0x3c0100, 0x00020},
1330 {"product-info", 0x3c1000, 0x01000},
1331 {"soft-version", 0x3c2000, 0x00100},
1332 {"support-list", 0x3c3000, 0x01000},
1333 {"profile", 0x3c4000, 0x08000},
1334 {"user-config", 0x3d0000, 0x10000},
1335 {"default-config", 0x3e0000, 0x10000},
1336 {"radio", 0x3f0000, 0x10000},
1337 {NULL, 0, 0}
1338 },
1339
1340 .first_sysupgrade_partition = "os-image",
1341 .last_sysupgrade_partition = "file-system"
1342 },
1343
1344 /** Firmware layout for the TL-WA855RE v1 */
1345 {
1346 .id = "TLWA855REV1",
1347 .vendor = "",
1348 .support_list =
1349 "SupportList:\n"
1350 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1351 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1352 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1353 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1354 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1355 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1356 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1357 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1358 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1359 .support_trail = '\x00',
1360 .soft_ver = NULL,
1361
1362 .partitions = {
1363 {"fs-uboot", 0x00000, 0x20000},
1364 {"os-image", 0x20000, 0x150000},
1365 {"file-system", 0x170000, 0x240000},
1366 {"partition-table", 0x3b0000, 0x02000},
1367 {"default-mac", 0x3c0000, 0x00020},
1368 {"pin", 0x3c0100, 0x00020},
1369 {"product-info", 0x3c1000, 0x01000},
1370 {"soft-version", 0x3c2000, 0x00100},
1371 {"support-list", 0x3c3000, 0x01000},
1372 {"profile", 0x3c4000, 0x08000},
1373 {"user-config", 0x3d0000, 0x10000},
1374 {"default-config", 0x3e0000, 0x10000},
1375 {"radio", 0x3f0000, 0x10000},
1376 {NULL, 0, 0}
1377 },
1378
1379 .first_sysupgrade_partition = "os-image",
1380 .last_sysupgrade_partition = "file-system"
1381 },
1382
1383 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
1384 {
1385 .id = "TL-WPA8630P-V2-EU",
1386 .vendor = "",
1387 .support_list =
1388 "SupportList:\n"
1389 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
1390 .support_trail = '\x00',
1391 .soft_ver = NULL,
1392
1393 .partitions = {
1394 {"factory-uboot", 0x00000, 0x20000},
1395 {"fs-uboot", 0x20000, 0x20000},
1396 {"firmware", 0x40000, 0x5e0000},
1397 {"partition-table", 0x620000, 0x02000},
1398 {"default-mac", 0x630000, 0x00020},
1399 {"pin", 0x630100, 0x00020},
1400 {"device-id", 0x630200, 0x00030},
1401 {"product-info", 0x631100, 0x01000},
1402 {"extra-para", 0x632100, 0x01000},
1403 {"soft-version", 0x640000, 0x01000},
1404 {"support-list", 0x641000, 0x01000},
1405 {"profile", 0x642000, 0x08000},
1406 {"user-config", 0x650000, 0x10000},
1407 {"default-config", 0x660000, 0x10000},
1408 {"default-nvm", 0x670000, 0xc0000},
1409 {"default-pib", 0x730000, 0x40000},
1410 {"radio", 0x7f0000, 0x10000},
1411 {NULL, 0, 0}
1412 },
1413
1414 .first_sysupgrade_partition = "os-image",
1415 .last_sysupgrade_partition = "file-system"
1416 },
1417
1418 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
1419 {
1420 .id = "TL-WPA8630P-V2-INT",
1421 .vendor = "",
1422 .support_list =
1423 "SupportList:\n"
1424 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
1425 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
1426 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
1427 .support_trail = '\x00',
1428 .soft_ver = NULL,
1429
1430 .partitions = {
1431 {"factory-uboot", 0x00000, 0x20000},
1432 {"fs-uboot", 0x20000, 0x20000},
1433 {"firmware", 0x40000, 0x5e0000},
1434 {"partition-table", 0x620000, 0x02000},
1435 {"extra-para", 0x632100, 0x01000},
1436 {"soft-version", 0x640000, 0x01000},
1437 {"support-list", 0x641000, 0x01000},
1438 {"profile", 0x642000, 0x08000},
1439 {"user-config", 0x650000, 0x10000},
1440 {"default-config", 0x660000, 0x10000},
1441 {"default-nvm", 0x670000, 0xc0000},
1442 {"default-pib", 0x730000, 0x40000},
1443 {"default-mac", 0x7e0000, 0x00020},
1444 {"pin", 0x7e0100, 0x00020},
1445 {"device-id", 0x7e0200, 0x00030},
1446 {"product-info", 0x7e1100, 0x01000},
1447 {"radio", 0x7f0000, 0x10000},
1448 {NULL, 0, 0}
1449 },
1450
1451 .first_sysupgrade_partition = "os-image",
1452 .last_sysupgrade_partition = "file-system"
1453 },
1454
1455 /** Firmware layout for the TL-WR1043 v5 */
1456 {
1457 .id = "TLWR1043NV5",
1458 .vendor = "",
1459 .support_list =
1460 "SupportList:\n"
1461 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1462 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1463 .support_trail = '\x00',
1464 .soft_ver = "soft_ver:1.0.0\n",
1465 .partitions = {
1466 {"factory-boot", 0x00000, 0x20000},
1467 {"fs-uboot", 0x20000, 0x20000},
1468 {"firmware", 0x40000, 0xec0000},
1469 {"default-mac", 0xf00000, 0x00200},
1470 {"pin", 0xf00200, 0x00200},
1471 {"device-id", 0xf00400, 0x00100},
1472 {"product-info", 0xf00500, 0x0fb00},
1473 {"soft-version", 0xf10000, 0x01000},
1474 {"extra-para", 0xf11000, 0x01000},
1475 {"support-list", 0xf12000, 0x0a000},
1476 {"profile", 0xf1c000, 0x04000},
1477 {"default-config", 0xf20000, 0x10000},
1478 {"user-config", 0xf30000, 0x40000},
1479 {"qos-db", 0xf70000, 0x40000},
1480 {"certificate", 0xfb0000, 0x10000},
1481 {"partition-table", 0xfc0000, 0x10000},
1482 {"log", 0xfd0000, 0x20000},
1483 {"radio", 0xff0000, 0x10000},
1484 {NULL, 0, 0}
1485 },
1486 .first_sysupgrade_partition = "os-image",
1487 .last_sysupgrade_partition = "file-system"
1488 },
1489
1490 /** Firmware layout for the TL-WR1043 v4 */
1491 {
1492 .id = "TLWR1043NDV4",
1493 .vendor = "",
1494 .support_list =
1495 "SupportList:\n"
1496 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1497 .support_trail = '\x00',
1498 .soft_ver = NULL,
1499
1500 /* We're using a dynamic kernel/rootfs split here */
1501 .partitions = {
1502 {"fs-uboot", 0x00000, 0x20000},
1503 {"firmware", 0x20000, 0xf30000},
1504 {"default-mac", 0xf50000, 0x00200},
1505 {"pin", 0xf50200, 0x00200},
1506 {"product-info", 0xf50400, 0x0fc00},
1507 {"soft-version", 0xf60000, 0x0b000},
1508 {"support-list", 0xf6b000, 0x04000},
1509 {"profile", 0xf70000, 0x04000},
1510 {"default-config", 0xf74000, 0x0b000},
1511 {"user-config", 0xf80000, 0x40000},
1512 {"partition-table", 0xfc0000, 0x10000},
1513 {"log", 0xfd0000, 0x20000},
1514 {"radio", 0xff0000, 0x10000},
1515 {NULL, 0, 0}
1516 },
1517
1518 .first_sysupgrade_partition = "os-image",
1519 .last_sysupgrade_partition = "file-system"
1520 },
1521
1522 /** Firmware layout for the TL-WR902AC v1 */
1523 {
1524 .id = "TL-WR902AC-V1",
1525 .vendor = "",
1526 .support_list =
1527 "SupportList:\n"
1528 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1529 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1530 .support_trail = '\x00',
1531 .soft_ver = NULL,
1532
1533 /**
1534 384KB were moved from file-system to os-image
1535 in comparison to the stock image
1536 */
1537 .partitions = {
1538 {"fs-uboot", 0x00000, 0x20000},
1539 {"firmware", 0x20000, 0x730000},
1540 {"default-mac", 0x750000, 0x00200},
1541 {"pin", 0x750200, 0x00200},
1542 {"product-info", 0x750400, 0x0fc00},
1543 {"soft-version", 0x760000, 0x0b000},
1544 {"support-list", 0x76b000, 0x04000},
1545 {"profile", 0x770000, 0x04000},
1546 {"default-config", 0x774000, 0x0b000},
1547 {"user-config", 0x780000, 0x40000},
1548 {"partition-table", 0x7c0000, 0x10000},
1549 {"log", 0x7d0000, 0x20000},
1550 {"radio", 0x7f0000, 0x10000},
1551 {NULL, 0, 0}
1552 },
1553
1554 .first_sysupgrade_partition = "os-image",
1555 .last_sysupgrade_partition = "file-system",
1556 },
1557
1558 /** Firmware layout for the TL-WR942N V1 */
1559 {
1560 .id = "TLWR942NV1",
1561 .vendor = "",
1562 .support_list =
1563 "SupportList:\r\n"
1564 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1565 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1566 .support_trail = '\x00',
1567 .soft_ver = NULL,
1568
1569 .partitions = {
1570 {"fs-uboot", 0x00000, 0x20000},
1571 {"firmware", 0x20000, 0xe20000},
1572 {"default-mac", 0xe40000, 0x00200},
1573 {"pin", 0xe40200, 0x00200},
1574 {"product-info", 0xe40400, 0x0fc00},
1575 {"partition-table", 0xe50000, 0x10000},
1576 {"soft-version", 0xe60000, 0x10000},
1577 {"support-list", 0xe70000, 0x10000},
1578 {"profile", 0xe80000, 0x10000},
1579 {"default-config", 0xe90000, 0x10000},
1580 {"user-config", 0xea0000, 0x40000},
1581 {"qos-db", 0xee0000, 0x40000},
1582 {"certificate", 0xf20000, 0x10000},
1583 {"usb-config", 0xfb0000, 0x10000},
1584 {"log", 0xfc0000, 0x20000},
1585 {"radio-bk", 0xfe0000, 0x10000},
1586 {"radio", 0xff0000, 0x10000},
1587 {NULL, 0, 0}
1588 },
1589
1590 .first_sysupgrade_partition = "os-image",
1591 .last_sysupgrade_partition = "file-system",
1592 },
1593
1594 /** Firmware layout for the RE200 v2 */
1595 {
1596 .id = "RE200-V2",
1597 .vendor = "",
1598 .support_list =
1599 "SupportList:\n"
1600 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1601 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1602 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1603 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1604 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1605 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1606 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1607 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1608 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1609 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1610 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1611 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1612 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1613 .support_trail = '\x00',
1614 .soft_ver = NULL,
1615
1616 .partitions = {
1617 {"fs-uboot", 0x00000, 0x20000},
1618 {"firmware", 0x20000, 0x7a0000},
1619 {"partition-table", 0x7c0000, 0x02000},
1620 {"default-mac", 0x7c2000, 0x00020},
1621 {"pin", 0x7c2100, 0x00020},
1622 {"product-info", 0x7c3100, 0x01000},
1623 {"soft-version", 0x7c4200, 0x01000},
1624 {"support-list", 0x7c5200, 0x01000},
1625 {"profile", 0x7c6200, 0x08000},
1626 {"config-info", 0x7ce200, 0x00400},
1627 {"user-config", 0x7d0000, 0x10000},
1628 {"default-config", 0x7e0000, 0x10000},
1629 {"radio", 0x7f0000, 0x10000},
1630 {NULL, 0, 0}
1631 },
1632
1633 .first_sysupgrade_partition = "os-image",
1634 .last_sysupgrade_partition = "file-system"
1635 },
1636
1637 /** Firmware layout for the RE200 v3 */
1638 {
1639 .id = "RE200-V3",
1640 .vendor = "",
1641 .support_list =
1642 "SupportList:\n"
1643 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
1644 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
1645 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
1646 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
1647 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
1648 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
1649 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
1650 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
1651 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
1652 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
1653 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
1654 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
1655 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
1656 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
1657 .support_trail = '\x00',
1658 .soft_ver = NULL,
1659
1660 .partitions = {
1661 {"fs-uboot", 0x00000, 0x20000},
1662 {"firmware", 0x20000, 0x7a0000},
1663 {"partition-table", 0x7c0000, 0x02000},
1664 {"default-mac", 0x7c2000, 0x00020},
1665 {"pin", 0x7c2100, 0x00020},
1666 {"product-info", 0x7c3100, 0x01000},
1667 {"soft-version", 0x7c4200, 0x01000},
1668 {"support-list", 0x7c5200, 0x01000},
1669 {"profile", 0x7c6200, 0x08000},
1670 {"config-info", 0x7ce200, 0x00400},
1671 {"user-config", 0x7d0000, 0x10000},
1672 {"default-config", 0x7e0000, 0x10000},
1673 {"radio", 0x7f0000, 0x10000},
1674 {NULL, 0, 0}
1675 },
1676
1677 .first_sysupgrade_partition = "os-image",
1678 .last_sysupgrade_partition = "file-system"
1679 },
1680
1681 /** Firmware layout for the RE220 v2 */
1682 {
1683 .id = "RE220-V2",
1684 .vendor = "",
1685 .support_list =
1686 "SupportList:\n"
1687 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
1688 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
1689 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
1690 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
1691 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
1692 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
1693 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
1694 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
1695 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
1696 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
1697 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
1698 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
1699 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
1700 .support_trail = '\x00',
1701 .soft_ver = NULL,
1702
1703 .partitions = {
1704 {"fs-uboot", 0x00000, 0x20000},
1705 {"firmware", 0x20000, 0x7a0000},
1706 {"partition-table", 0x7c0000, 0x02000},
1707 {"default-mac", 0x7c2000, 0x00020},
1708 {"pin", 0x7c2100, 0x00020},
1709 {"product-info", 0x7c3100, 0x01000},
1710 {"soft-version", 0x7c4200, 0x01000},
1711 {"support-list", 0x7c5200, 0x01000},
1712 {"profile", 0x7c6200, 0x08000},
1713 {"config-info", 0x7ce200, 0x00400},
1714 {"user-config", 0x7d0000, 0x10000},
1715 {"default-config", 0x7e0000, 0x10000},
1716 {"radio", 0x7f0000, 0x10000},
1717 {NULL, 0, 0}
1718 },
1719
1720 .first_sysupgrade_partition = "os-image",
1721 .last_sysupgrade_partition = "file-system"
1722 },
1723
1724 /** Firmware layout for the RE305 v1 */
1725 {
1726 .id = "RE305-V1",
1727 .vendor = "",
1728 .support_list =
1729 "SupportList:\n"
1730 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
1731 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
1732 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
1733 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
1734 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
1735 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
1736 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
1737 .support_trail = '\x00',
1738 .soft_ver = NULL,
1739
1740 .partitions = {
1741 {"fs-uboot", 0x00000, 0x20000},
1742 {"firmware", 0x20000, 0x5e0000},
1743 {"partition-table", 0x600000, 0x02000},
1744 {"default-mac", 0x610000, 0x00020},
1745 {"pin", 0x610100, 0x00020},
1746 {"product-info", 0x611100, 0x01000},
1747 {"soft-version", 0x620000, 0x01000},
1748 {"support-list", 0x621000, 0x01000},
1749 {"profile", 0x622000, 0x08000},
1750 {"user-config", 0x630000, 0x10000},
1751 {"default-config", 0x640000, 0x10000},
1752 {"radio", 0x7f0000, 0x10000},
1753 {NULL, 0, 0}
1754 },
1755
1756 .first_sysupgrade_partition = "os-image",
1757 .last_sysupgrade_partition = "file-system"
1758 },
1759
1760 /** Firmware layout for the RE350 v1 */
1761 {
1762 .id = "RE350-V1",
1763 .vendor = "",
1764 .support_list =
1765 "SupportList:\n"
1766 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1767 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1768 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1769 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1770 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1771 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1772 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1773 .support_trail = '\x00',
1774 .soft_ver = NULL,
1775
1776 /** We're using a dynamic kernel/rootfs split here */
1777 .partitions = {
1778 {"fs-uboot", 0x00000, 0x20000},
1779 {"firmware", 0x20000, 0x5e0000},
1780 {"partition-table", 0x600000, 0x02000},
1781 {"default-mac", 0x610000, 0x00020},
1782 {"pin", 0x610100, 0x00020},
1783 {"product-info", 0x611100, 0x01000},
1784 {"soft-version", 0x620000, 0x01000},
1785 {"support-list", 0x621000, 0x01000},
1786 {"profile", 0x622000, 0x08000},
1787 {"user-config", 0x630000, 0x10000},
1788 {"default-config", 0x640000, 0x10000},
1789 {"radio", 0x7f0000, 0x10000},
1790 {NULL, 0, 0}
1791 },
1792
1793 .first_sysupgrade_partition = "os-image",
1794 .last_sysupgrade_partition = "file-system"
1795 },
1796
1797 /** Firmware layout for the RE350K v1 */
1798 {
1799 .id = "RE350K-V1",
1800 .vendor = "",
1801 .support_list =
1802 "SupportList:\n"
1803 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
1804 .support_trail = '\x00',
1805 .soft_ver = NULL,
1806
1807 /** We're using a dynamic kernel/rootfs split here */
1808 .partitions = {
1809 {"fs-uboot", 0x00000, 0x20000},
1810 {"firmware", 0x20000, 0xd70000},
1811 {"partition-table", 0xd90000, 0x02000},
1812 {"default-mac", 0xda0000, 0x00020},
1813 {"pin", 0xda0100, 0x00020},
1814 {"product-info", 0xda1100, 0x01000},
1815 {"soft-version", 0xdb0000, 0x01000},
1816 {"support-list", 0xdb1000, 0x01000},
1817 {"profile", 0xdb2000, 0x08000},
1818 {"user-config", 0xdc0000, 0x10000},
1819 {"default-config", 0xdd0000, 0x10000},
1820 {"device-id", 0xde0000, 0x00108},
1821 {"radio", 0xff0000, 0x10000},
1822 {NULL, 0, 0}
1823 },
1824
1825 .first_sysupgrade_partition = "os-image",
1826 .last_sysupgrade_partition = "file-system"
1827 },
1828
1829 /** Firmware layout for the RE355 */
1830 {
1831 .id = "RE355",
1832 .vendor = "",
1833 .support_list =
1834 "SupportList:\r\n"
1835 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
1836 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
1837 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
1838 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
1839 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
1840 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
1841 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
1842 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
1843 .support_trail = '\x00',
1844 .soft_ver = NULL,
1845
1846 /* We're using a dynamic kernel/rootfs split here */
1847 .partitions = {
1848 {"fs-uboot", 0x00000, 0x20000},
1849 {"firmware", 0x20000, 0x5e0000},
1850 {"partition-table", 0x600000, 0x02000},
1851 {"default-mac", 0x610000, 0x00020},
1852 {"pin", 0x610100, 0x00020},
1853 {"product-info", 0x611100, 0x01000},
1854 {"soft-version", 0x620000, 0x01000},
1855 {"support-list", 0x621000, 0x01000},
1856 {"profile", 0x622000, 0x08000},
1857 {"user-config", 0x630000, 0x10000},
1858 {"default-config", 0x640000, 0x10000},
1859 {"radio", 0x7f0000, 0x10000},
1860 {NULL, 0, 0}
1861 },
1862
1863 .first_sysupgrade_partition = "os-image",
1864 .last_sysupgrade_partition = "file-system"
1865 },
1866
1867 /** Firmware layout for the RE450 */
1868 {
1869 .id = "RE450",
1870 .vendor = "",
1871 .support_list =
1872 "SupportList:\r\n"
1873 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
1874 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
1875 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
1876 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
1877 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
1878 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
1879 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
1880 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
1881 .support_trail = '\x00',
1882 .soft_ver = NULL,
1883
1884 /** We're using a dynamic kernel/rootfs split here */
1885 .partitions = {
1886 {"fs-uboot", 0x00000, 0x20000},
1887 {"firmware", 0x20000, 0x5e0000},
1888 {"partition-table", 0x600000, 0x02000},
1889 {"default-mac", 0x610000, 0x00020},
1890 {"pin", 0x610100, 0x00020},
1891 {"product-info", 0x611100, 0x01000},
1892 {"soft-version", 0x620000, 0x01000},
1893 {"support-list", 0x621000, 0x01000},
1894 {"profile", 0x622000, 0x08000},
1895 {"user-config", 0x630000, 0x10000},
1896 {"default-config", 0x640000, 0x10000},
1897 {"radio", 0x7f0000, 0x10000},
1898 {NULL, 0, 0}
1899 },
1900
1901 .first_sysupgrade_partition = "os-image",
1902 .last_sysupgrade_partition = "file-system"
1903 },
1904
1905 /** Firmware layout for the RE450 v2 */
1906 {
1907 .id = "RE450-V2",
1908 .vendor = "",
1909 .support_list =
1910 "SupportList:\r\n"
1911 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
1912 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
1913 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
1914 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
1915 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
1916 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
1917 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
1918 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
1919 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
1920 .support_trail = '\x00',
1921 .soft_ver = NULL,
1922
1923 /* We're using a dynamic kernel/rootfs split here */
1924 .partitions = {
1925 {"fs-uboot", 0x00000, 0x20000},
1926 {"firmware", 0x20000, 0x5e0000},
1927 {"partition-table", 0x600000, 0x02000},
1928 {"default-mac", 0x610000, 0x00020},
1929 {"pin", 0x610100, 0x00020},
1930 {"product-info", 0x611100, 0x01000},
1931 {"soft-version", 0x620000, 0x01000},
1932 {"support-list", 0x621000, 0x01000},
1933 {"profile", 0x622000, 0x08000},
1934 {"user-config", 0x630000, 0x10000},
1935 {"default-config", 0x640000, 0x10000},
1936 {"radio", 0x7f0000, 0x10000},
1937 {NULL, 0, 0}
1938 },
1939
1940 .first_sysupgrade_partition = "os-image",
1941 .last_sysupgrade_partition = "file-system"
1942 },
1943
1944 /** Firmware layout for the RE450 v3 */
1945 {
1946 .id = "RE450-V3",
1947 .vendor = "",
1948 .support_list =
1949 "SupportList:\r\n"
1950 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
1951 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
1952 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
1953 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
1954 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
1955 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
1956 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
1957 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
1958 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
1959 .support_trail = '\x00',
1960 .soft_ver = NULL,
1961
1962 /* We're using a dynamic kernel/rootfs split here */
1963 .partitions = {
1964 {"fs-uboot", 0x00000, 0x20000},
1965 {"default-mac", 0x20000, 0x00020},
1966 {"pin", 0x20020, 0x00020},
1967 {"product-info", 0x21000, 0x01000},
1968 {"partition-table", 0x22000, 0x02000},
1969 {"soft-version", 0x24000, 0x01000},
1970 {"support-list", 0x25000, 0x01000},
1971 {"profile", 0x26000, 0x08000},
1972 {"user-config", 0x2e000, 0x10000},
1973 {"default-config", 0x3e000, 0x10000},
1974 {"config-info", 0x4e000, 0x00400},
1975 {"firmware", 0x50000, 0x7a0000},
1976 {"radio", 0x7f0000, 0x10000},
1977 {NULL, 0, 0}
1978 },
1979
1980 .first_sysupgrade_partition = "os-image",
1981 .last_sysupgrade_partition = "file-system"
1982 },
1983
1984 /** Firmware layout for the RE500 */
1985 {
1986 .id = "RE500-V1",
1987 .vendor = "",
1988 .support_list =
1989 "SupportList:\r\n"
1990 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
1991 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
1992 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
1993 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
1994 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
1995 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
1996 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
1997 .support_trail = '\x00',
1998 .soft_ver = NULL,
1999
2000 /* We're using a dynamic kernel/rootfs split here */
2001 .partitions = {
2002 {"fs-uboot", 0x00000, 0x20000},
2003 {"firmware", 0x20000, 0xde0000},
2004 {"partition-table", 0xe00000, 0x02000},
2005 {"default-mac", 0xe10000, 0x00020},
2006 {"pin", 0xe10100, 0x00020},
2007 {"product-info", 0xe11100, 0x01000},
2008 {"soft-version", 0xe20000, 0x01000},
2009 {"support-list", 0xe21000, 0x01000},
2010 {"profile", 0xe22000, 0x08000},
2011 {"user-config", 0xe30000, 0x10000},
2012 {"default-config", 0xe40000, 0x10000},
2013 {"radio", 0xff0000, 0x10000},
2014 {NULL, 0, 0}
2015 },
2016
2017 .first_sysupgrade_partition = "os-image",
2018 .last_sysupgrade_partition = "file-system"
2019 },
2020
2021 /** Firmware layout for the RE650 */
2022 {
2023 .id = "RE650-V1",
2024 .vendor = "",
2025 .support_list =
2026 "SupportList:\r\n"
2027 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
2028 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
2029 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
2030 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
2031 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
2032 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
2033 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
2034 .support_trail = '\x00',
2035 .soft_ver = NULL,
2036
2037 /* We're using a dynamic kernel/rootfs split here */
2038 .partitions = {
2039 {"fs-uboot", 0x00000, 0x20000},
2040 {"firmware", 0x20000, 0xde0000},
2041 {"partition-table", 0xe00000, 0x02000},
2042 {"default-mac", 0xe10000, 0x00020},
2043 {"pin", 0xe10100, 0x00020},
2044 {"product-info", 0xe11100, 0x01000},
2045 {"soft-version", 0xe20000, 0x01000},
2046 {"support-list", 0xe21000, 0x01000},
2047 {"profile", 0xe22000, 0x08000},
2048 {"user-config", 0xe30000, 0x10000},
2049 {"default-config", 0xe40000, 0x10000},
2050 {"radio", 0xff0000, 0x10000},
2051 {NULL, 0, 0}
2052 },
2053
2054 .first_sysupgrade_partition = "os-image",
2055 .last_sysupgrade_partition = "file-system"
2056 },
2057
2058 {}
2059 };
2060
2061 #define error(_ret, _errno, _str, ...) \
2062 do { \
2063 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
2064 strerror(_errno)); \
2065 if (_ret) \
2066 exit(_ret); \
2067 } while (0)
2068
2069
2070 /** Stores a uint32 as big endian */
2071 static inline void put32(uint8_t *buf, uint32_t val) {
2072 buf[0] = val >> 24;
2073 buf[1] = val >> 16;
2074 buf[2] = val >> 8;
2075 buf[3] = val;
2076 }
2077
2078 /** Allocates a new image partition */
2079 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
2080 struct image_partition_entry entry = {name, len, malloc(len)};
2081 if (!entry.data)
2082 error(1, errno, "malloc");
2083
2084 return entry;
2085 }
2086
2087 /** Frees an image partition */
2088 static void free_image_partition(struct image_partition_entry entry) {
2089 free(entry.data);
2090 }
2091
2092 static time_t source_date_epoch = -1;
2093 static void set_source_date_epoch() {
2094 char *env = getenv("SOURCE_DATE_EPOCH");
2095 char *endptr = env;
2096 errno = 0;
2097 if (env && *env) {
2098 source_date_epoch = strtoull(env, &endptr, 10);
2099 if (errno || (endptr && *endptr != '\0')) {
2100 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
2101 exit(1);
2102 }
2103 }
2104 }
2105
2106 /** Generates the partition-table partition */
2107 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
2108 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
2109
2110 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
2111
2112 *(s++) = 0x00;
2113 *(s++) = 0x04;
2114 *(s++) = 0x00;
2115 *(s++) = 0x00;
2116
2117 size_t i;
2118 for (i = 0; p[i].name; i++) {
2119 size_t len = end-s;
2120 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
2121
2122 if (w > len-1)
2123 error(1, 0, "flash partition table overflow?");
2124
2125 s += w;
2126 }
2127
2128 s++;
2129
2130 memset(s, 0xff, end-s);
2131
2132 return entry;
2133 }
2134
2135
2136 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
2137 static inline uint8_t bcd(uint8_t v) {
2138 return 0x10 * (v/10) + v%10;
2139 }
2140
2141
2142 /** Generates the soft-version partition */
2143 static struct image_partition_entry make_soft_version(struct device_info *info, uint32_t rev) {
2144 size_t part_len = sizeof(struct soft_version);
2145 if (info->soft_ver_compat_level > 0)
2146 part_len += sizeof(uint32_t);
2147
2148 struct image_partition_entry entry =
2149 alloc_image_partition("soft-version", part_len+1);
2150 struct soft_version *s = (struct soft_version *)entry.data;
2151
2152 time_t t;
2153
2154 if (source_date_epoch != -1)
2155 t = source_date_epoch;
2156 else if (time(&t) == (time_t)(-1))
2157 error(1, errno, "time");
2158
2159 struct tm *tm = gmtime(&t);
2160
2161 /* Partition contents size, minus 8 byte header and trailing byte */
2162 s->data_len = htonl(entry.size-9);
2163 s->zero = 0;
2164 s->pad1 = 0xff;
2165
2166 s->version_major = 0;
2167 s->version_minor = 0;
2168 s->version_patch = 0;
2169
2170 s->year_hi = bcd((1900+tm->tm_year)/100);
2171 s->year_lo = bcd(tm->tm_year%100);
2172 s->month = bcd(tm->tm_mon+1);
2173 s->day = bcd(tm->tm_mday);
2174 s->rev = htonl(rev);
2175
2176 if (info->soft_ver_compat_level > 0)
2177 *(uint32_t *)(entry.data + sizeof(struct soft_version)) =
2178 htonl(info->soft_ver_compat_level);
2179
2180 entry.data[entry.size-1] = 0xff;
2181
2182 return entry;
2183 }
2184
2185 static struct image_partition_entry make_soft_version_from_string(const char *soft_ver) {
2186 /** String length _including_ the terminating zero byte */
2187 uint32_t ver_len = strlen(soft_ver) + 1;
2188 /** Partition contains 64 bit header, the version string, and one additional null byte */
2189 size_t partition_len = 2*sizeof(uint32_t) + ver_len + 1;
2190 struct image_partition_entry entry = alloc_image_partition("soft-version", partition_len);
2191
2192 uint32_t *len = (uint32_t *)entry.data;
2193 len[0] = htonl(ver_len);
2194 len[1] = 0;
2195 memcpy(&len[2], soft_ver, ver_len);
2196
2197 entry.data[partition_len - 1] = 0;
2198
2199 return entry;
2200 }
2201
2202 /** Generates the support-list partition */
2203 static struct image_partition_entry make_support_list(struct device_info *info) {
2204 size_t len = strlen(info->support_list);
2205 struct image_partition_entry entry = alloc_image_partition("support-list", len + 9);
2206
2207 put32(entry.data, len);
2208 memset(entry.data+4, 0, 4);
2209 memcpy(entry.data+8, info->support_list, len);
2210 entry.data[len+8] = info->support_trail;
2211
2212 return entry;
2213 }
2214
2215 /** Creates a new image partition with an arbitrary name from a file */
2216 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
2217 struct stat statbuf;
2218
2219 if (stat(filename, &statbuf) < 0)
2220 error(1, errno, "unable to stat file `%s'", filename);
2221
2222 size_t len = statbuf.st_size;
2223
2224 if (add_jffs2_eof) {
2225 if (file_system_partition)
2226 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
2227 else
2228 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
2229 }
2230
2231 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2232
2233 FILE *file = fopen(filename, "rb");
2234 if (!file)
2235 error(1, errno, "unable to open file `%s'", filename);
2236
2237 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
2238 error(1, errno, "unable to read file `%s'", filename);
2239
2240 if (add_jffs2_eof) {
2241 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
2242
2243 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
2244 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
2245 }
2246
2247 fclose(file);
2248
2249 return entry;
2250 }
2251
2252 /** Creates a new image partition from arbitrary data */
2253 static struct image_partition_entry put_data(const char *part_name, const char *datain, size_t len) {
2254
2255 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2256
2257 memcpy(entry.data, datain, len);
2258
2259 return entry;
2260 }
2261
2262 /**
2263 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2264
2265 Example image partition table:
2266
2267 fwup-ptn partition-table base 0x00800 size 0x00800
2268 fwup-ptn os-image base 0x01000 size 0x113b45
2269 fwup-ptn file-system base 0x114b45 size 0x1d0004
2270 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2271
2272 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2273 the end of the partition table is marked with a zero byte.
2274
2275 The firmware image must contain at least the partition-table and support-list partitions
2276 to be accepted. There aren't any alignment constraints for the image partitions.
2277
2278 The partition-table partition contains the actual flash layout; partitions
2279 from the image partition table are mapped to the corresponding flash partitions during
2280 the firmware upgrade. The support-list partition contains a list of devices supported by
2281 the firmware image.
2282
2283 The base offsets in the firmware partition table are relative to the end
2284 of the vendor information block, so the partition-table partition will
2285 actually start at offset 0x1814 of the image.
2286
2287 I think partition-table must be the first partition in the firmware image.
2288 */
2289 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
2290 size_t i, j;
2291 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
2292
2293 size_t base = 0x800;
2294 for (i = 0; parts[i].name; i++) {
2295 for (j = 0; flash_parts[j].name; j++) {
2296 if (!strcmp(flash_parts[j].name, parts[i].name)) {
2297 if (parts[i].size > flash_parts[j].size)
2298 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
2299 break;
2300 }
2301 }
2302
2303 assert(flash_parts[j].name);
2304
2305 memcpy(buffer + base, parts[i].data, parts[i].size);
2306
2307 size_t len = end-image_pt;
2308 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
2309
2310 if (w > len-1)
2311 error(1, 0, "image partition table overflow?");
2312
2313 image_pt += w;
2314
2315 base += parts[i].size;
2316 }
2317 }
2318
2319 /** Generates and writes the image MD5 checksum */
2320 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
2321 MD5_CTX ctx;
2322
2323 MD5_Init(&ctx);
2324 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
2325 MD5_Update(&ctx, buffer, len);
2326 MD5_Final(md5, &ctx);
2327 }
2328
2329
2330 /**
2331 Generates the firmware image in factory format
2332
2333 Image format:
2334
2335 Bytes (hex) Usage
2336 ----------- -----
2337 0000-0003 Image size (4 bytes, big endian)
2338 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2339 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2340 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2341 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2342 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2343 1814-xxxx Firmware partitions
2344 */
2345 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
2346 *len = 0x1814;
2347
2348 size_t i;
2349 for (i = 0; parts[i].name; i++)
2350 *len += parts[i].size;
2351
2352 uint8_t *image = malloc(*len);
2353 if (!image)
2354 error(1, errno, "malloc");
2355
2356 memset(image, 0xff, *len);
2357 put32(image, *len);
2358
2359 if (info->vendor) {
2360 size_t vendor_len = strlen(info->vendor);
2361 put32(image+0x14, vendor_len);
2362 memcpy(image+0x18, info->vendor, vendor_len);
2363 }
2364
2365 put_partitions(image + 0x1014, info->partitions, parts);
2366 put_md5(image+0x04, image+0x14, *len-0x14);
2367
2368 return image;
2369 }
2370
2371 /**
2372 Generates the firmware image in sysupgrade format
2373
2374 This makes some assumptions about the provided flash and image partition tables and
2375 should be generalized when TP-LINK starts building its safeloader into hardware with
2376 different flash layouts.
2377 */
2378 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
2379 size_t i, j;
2380 size_t flash_first_partition_index = 0;
2381 size_t flash_last_partition_index = 0;
2382 const struct flash_partition_entry *flash_first_partition = NULL;
2383 const struct flash_partition_entry *flash_last_partition = NULL;
2384 const struct image_partition_entry *image_last_partition = NULL;
2385
2386 /** Find first and last partitions */
2387 for (i = 0; info->partitions[i].name; i++) {
2388 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
2389 flash_first_partition = &info->partitions[i];
2390 flash_first_partition_index = i;
2391 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
2392 flash_last_partition = &info->partitions[i];
2393 flash_last_partition_index = i;
2394 }
2395 }
2396
2397 assert(flash_first_partition && flash_last_partition);
2398 assert(flash_first_partition_index < flash_last_partition_index);
2399
2400 /** Find last partition from image to calculate needed size */
2401 for (i = 0; image_parts[i].name; i++) {
2402 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
2403 image_last_partition = &image_parts[i];
2404 break;
2405 }
2406 }
2407
2408 assert(image_last_partition);
2409
2410 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2411
2412 uint8_t *image = malloc(*len);
2413 if (!image)
2414 error(1, errno, "malloc");
2415
2416 memset(image, 0xff, *len);
2417
2418 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2419 for (j = 0; image_parts[j].name; j++) {
2420 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2421 if (image_parts[j].size > info->partitions[i].size)
2422 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2423 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2424 break;
2425 }
2426
2427 assert(image_parts[j].name);
2428 }
2429 }
2430
2431 return image;
2432 }
2433
2434 /** Generates an image according to a given layout and writes it to a file */
2435 static void build_image(const char *output,
2436 const char *kernel_image,
2437 const char *rootfs_image,
2438 uint32_t rev,
2439 bool add_jffs2_eof,
2440 bool sysupgrade,
2441 struct device_info *info) {
2442
2443 size_t i;
2444
2445 struct image_partition_entry parts[7] = {};
2446
2447 struct flash_partition_entry *firmware_partition = NULL;
2448 struct flash_partition_entry *os_image_partition = NULL;
2449 struct flash_partition_entry *file_system_partition = NULL;
2450 size_t firmware_partition_index = 0;
2451
2452 for (i = 0; info->partitions[i].name; i++) {
2453 if (!strcmp(info->partitions[i].name, "firmware"))
2454 {
2455 firmware_partition = &info->partitions[i];
2456 firmware_partition_index = i;
2457 }
2458 }
2459
2460 if (firmware_partition)
2461 {
2462 os_image_partition = &info->partitions[firmware_partition_index];
2463 file_system_partition = &info->partitions[firmware_partition_index + 1];
2464
2465 struct stat kernel;
2466 if (stat(kernel_image, &kernel) < 0)
2467 error(1, errno, "unable to stat file `%s'", kernel_image);
2468
2469 if (kernel.st_size > firmware_partition->size)
2470 error(1, 0, "kernel overflowed firmware partition\n");
2471
2472 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2473 info->partitions[i+1] = info->partitions[i];
2474
2475 file_system_partition->name = "file-system";
2476 file_system_partition->base = firmware_partition->base + kernel.st_size;
2477
2478 /* Align partition start to erase blocks for factory images only */
2479 if (!sysupgrade)
2480 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2481
2482 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2483
2484 os_image_partition->name = "os-image";
2485 os_image_partition->size = kernel.st_size;
2486 }
2487
2488 parts[0] = make_partition_table(info->partitions);
2489 if (info->soft_ver)
2490 parts[1] = make_soft_version_from_string(info->soft_ver);
2491 else
2492 parts[1] = make_soft_version(info, rev);
2493
2494 parts[2] = make_support_list(info);
2495 parts[3] = read_file("os-image", kernel_image, false, NULL);
2496 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2497
2498 /* Some devices need the extra-para partition to accept the firmware */
2499 if (strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2500 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2501 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2502 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2503 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
2504 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2505 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
2506 parts[5] = put_data("extra-para", mdat, 11);
2507 } else if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 || strcasecmp(info->id, "ARCHER-C7-V4") == 0 || strcasecmp(info->id, "ARCHER-C7-V5") == 0) {
2508 const char mdat[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
2509 parts[5] = put_data("extra-para", mdat, 11);
2510 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2511 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00};
2512 parts[5] = put_data("extra-para", mdat, 11);
2513 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0) {
2514 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x00};
2515 parts[5] = put_data("extra-para", mdat, 11);
2516 }
2517
2518 size_t len;
2519 void *image;
2520 if (sysupgrade)
2521 image = generate_sysupgrade_image(info, parts, &len);
2522 else
2523 image = generate_factory_image(info, parts, &len);
2524
2525 FILE *file = fopen(output, "wb");
2526 if (!file)
2527 error(1, errno, "unable to open output file");
2528
2529 if (fwrite(image, len, 1, file) != 1)
2530 error(1, 0, "unable to write output file");
2531
2532 fclose(file);
2533
2534 free(image);
2535
2536 for (i = 0; parts[i].name; i++)
2537 free_image_partition(parts[i]);
2538 }
2539
2540 /** Usage output */
2541 static void usage(const char *argv0) {
2542 fprintf(stderr,
2543 "Usage: %s [OPTIONS...]\n"
2544 "\n"
2545 "Options:\n"
2546 " -h show this help\n"
2547 "\n"
2548 "Create a new image:\n"
2549 " -B <board> create image for the board specified with <board>\n"
2550 " -k <file> read kernel image from the file <file>\n"
2551 " -r <file> read rootfs image from the file <file>\n"
2552 " -o <file> write output to the file <file>\n"
2553 " -V <rev> sets the revision number to <rev>\n"
2554 " -j add jffs2 end-of-filesystem markers\n"
2555 " -S create sysupgrade instead of factory image\n"
2556 "Extract an old image:\n"
2557 " -x <file> extract all oem firmware partition\n"
2558 " -d <dir> destination to extract the firmware partition\n"
2559 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2560 argv0
2561 );
2562 };
2563
2564
2565 static struct device_info *find_board(const char *id)
2566 {
2567 struct device_info *board = NULL;
2568
2569 for (board = boards; board->id != NULL; board++)
2570 if (strcasecmp(id, board->id) == 0)
2571 return board;
2572
2573 return NULL;
2574 }
2575
2576 static int add_flash_partition(
2577 struct flash_partition_entry *part_list,
2578 size_t max_entries,
2579 const char *name,
2580 unsigned long base,
2581 unsigned long size)
2582 {
2583 size_t ptr;
2584 /* check if the list has a free entry */
2585 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2586 if (part_list->name == NULL &&
2587 part_list->base == 0 &&
2588 part_list->size == 0)
2589 break;
2590 }
2591
2592 if (ptr == max_entries) {
2593 error(1, 0, "No free flash part entry available.");
2594 }
2595
2596 part_list->name = calloc(1, strlen(name) + 1);
2597 if (!part_list->name) {
2598 error(1, 0, "Unable to allocate memory");
2599 }
2600
2601 memcpy((char *)part_list->name, name, strlen(name));
2602 part_list->base = base;
2603 part_list->size = size;
2604
2605 return 0;
2606 }
2607
2608 /** read the partition table into struct flash_partition_entry */
2609 static int read_partition_table(
2610 FILE *file, long offset,
2611 struct flash_partition_entry *entries, size_t max_entries,
2612 int type)
2613 {
2614 char buf[2048];
2615 char *ptr, *end;
2616 const char *parthdr = NULL;
2617 const char *fwuphdr = "fwup-ptn";
2618 const char *flashhdr = "partition";
2619
2620 /* TODO: search for the partition table */
2621
2622 switch(type) {
2623 case 0:
2624 parthdr = fwuphdr;
2625 break;
2626 case 1:
2627 parthdr = flashhdr;
2628 break;
2629 default:
2630 error(1, 0, "Invalid partition table");
2631 }
2632
2633 if (fseek(file, offset, SEEK_SET) < 0)
2634 error(1, errno, "Can not seek in the firmware");
2635
2636 if (fread(buf, 2048, 1, file) != 1)
2637 error(1, errno, "Can not read fwup-ptn from the firmware");
2638
2639 buf[2047] = '\0';
2640
2641 /* look for the partition header */
2642 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2643 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2644 return 1;
2645 }
2646
2647 ptr = buf;
2648 end = buf + sizeof(buf);
2649 while ((ptr + strlen(parthdr)) < end &&
2650 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2651 char *end_part;
2652 char *end_element;
2653
2654 char name[32] = { 0 };
2655 int name_len = 0;
2656 unsigned long base = 0;
2657 unsigned long size = 0;
2658
2659 end_part = memchr(ptr, '\n', (end - ptr));
2660 if (end_part == NULL) {
2661 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2662 break;
2663 }
2664
2665 for (int i = 0; i <= 4; i++) {
2666 if (end_part <= ptr)
2667 break;
2668
2669 end_element = memchr(ptr, 0x20, (end_part - ptr));
2670 if (end_element == NULL) {
2671 error(1, errno, "Ignoring the rest of the partition entries.");
2672 break;
2673 }
2674
2675 switch (i) {
2676 /* partition header */
2677 case 0:
2678 ptr = end_element + 1;
2679 continue;
2680 /* name */
2681 case 1:
2682 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
2683 strncpy(name, ptr, name_len);
2684 name[name_len] = '\0';
2685 ptr = end_element + 1;
2686 continue;
2687
2688 /* string "base" */
2689 case 2:
2690 ptr = end_element + 1;
2691 continue;
2692
2693 /* actual base */
2694 case 3:
2695 base = strtoul(ptr, NULL, 16);
2696 ptr = end_element + 1;
2697 continue;
2698
2699 /* string "size" */
2700 case 4:
2701 ptr = end_element + 1;
2702 /* actual size. The last element doesn't have a sepeartor */
2703 size = strtoul(ptr, NULL, 16);
2704 /* the part ends with 0x09, 0x0d, 0x0a */
2705 ptr = end_part + 1;
2706 add_flash_partition(entries, max_entries, name, base, size);
2707 continue;
2708 }
2709 }
2710 }
2711
2712 return 0;
2713 }
2714
2715 static void write_partition(
2716 FILE *input_file,
2717 size_t firmware_offset,
2718 struct flash_partition_entry *entry,
2719 FILE *output_file)
2720 {
2721 char buf[4096];
2722 size_t offset;
2723
2724 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
2725
2726 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
2727 if (fread(buf, sizeof(buf), 1, input_file) != 1)
2728 error(1, errno, "Can not read partition from input_file");
2729
2730 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2731 error(1, errno, "Can not write partition to output_file");
2732 }
2733 /* write last chunk smaller than buffer */
2734 if (offset < entry->size) {
2735 offset = entry->size - offset;
2736 if (fread(buf, offset, 1, input_file) != 1)
2737 error(1, errno, "Can not read partition from input_file");
2738 if (fwrite(buf, offset, 1, output_file) != 1)
2739 error(1, errno, "Can not write partition to output_file");
2740 }
2741 }
2742
2743 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
2744 {
2745 FILE *output_file;
2746 char output[PATH_MAX];
2747
2748 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
2749 output_file = fopen(output, "wb+");
2750 if (output_file == NULL) {
2751 error(1, errno, "Can not open output file %s", output);
2752 }
2753
2754 write_partition(input_file, firmware_offset, entry, output_file);
2755
2756 fclose(output_file);
2757
2758 return 0;
2759 }
2760
2761 /** extract all partitions from the firmware file */
2762 static int extract_firmware(const char *input, const char *output_directory)
2763 {
2764 struct flash_partition_entry entries[16] = { 0 };
2765 size_t max_entries = 16;
2766 size_t firmware_offset = 0x1014;
2767 FILE *input_file;
2768
2769 struct stat statbuf;
2770
2771 /* check input file */
2772 if (stat(input, &statbuf)) {
2773 error(1, errno, "Can not read input firmware %s", input);
2774 }
2775
2776 /* check if output directory exists */
2777 if (stat(output_directory, &statbuf)) {
2778 error(1, errno, "Failed to stat output directory %s", output_directory);
2779 }
2780
2781 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
2782 error(1, errno, "Given output directory is not a directory %s", output_directory);
2783 }
2784
2785 input_file = fopen(input, "rb");
2786
2787 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
2788 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2789 }
2790
2791 for (size_t i = 0; i < max_entries; i++) {
2792 if (entries[i].name == NULL &&
2793 entries[i].base == 0 &&
2794 entries[i].size == 0)
2795 continue;
2796
2797 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
2798 }
2799
2800 return 0;
2801 }
2802
2803 static struct flash_partition_entry *find_partition(
2804 struct flash_partition_entry *entries, size_t max_entries,
2805 const char *name, const char *error_msg)
2806 {
2807 for (size_t i = 0; i < max_entries; i++, entries++) {
2808 if (strcmp(entries->name, name) == 0)
2809 return entries;
2810 }
2811
2812 error(1, 0, "%s", error_msg);
2813 return NULL;
2814 }
2815
2816 static void write_ff(FILE *output_file, size_t size)
2817 {
2818 char buf[4096];
2819 size_t offset;
2820
2821 memset(buf, 0xff, sizeof(buf));
2822
2823 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
2824 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2825 error(1, errno, "Can not write 0xff to output_file");
2826 }
2827
2828 /* write last chunk smaller than buffer */
2829 if (offset < size) {
2830 offset = size - offset;
2831 if (fwrite(buf, offset, 1, output_file) != 1)
2832 error(1, errno, "Can not write partition to output_file");
2833 }
2834 }
2835
2836 static void convert_firmware(const char *input, const char *output)
2837 {
2838 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
2839 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
2840 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
2841 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
2842 struct flash_partition_entry *fwup_partition_table = NULL;
2843 size_t firmware_offset = 0x1014;
2844 FILE *input_file, *output_file;
2845
2846 struct stat statbuf;
2847
2848 /* check input file */
2849 if (stat(input, &statbuf)) {
2850 error(1, errno, "Can not read input firmware %s", input);
2851 }
2852
2853 input_file = fopen(input, "rb");
2854 if (!input_file)
2855 error(1, 0, "Can not open input firmware %s", input);
2856
2857 output_file = fopen(output, "wb");
2858 if (!output_file)
2859 error(1, 0, "Can not open output firmware %s", output);
2860
2861 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
2862 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2863 }
2864
2865 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
2866 "os-image", "Error can not find os-image partition (fwup)");
2867 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
2868 "file-system", "Error can not find file-system partition (fwup)");
2869 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
2870 "partition-table", "Error can not find partition-table partition");
2871
2872 /* the flash partition table has a 0x00000004 magic haeder */
2873 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
2874 error(1, 0, "Error can not read the partition table (flash)");
2875
2876 flash_os_image = find_partition(flash, MAX_PARTITIONS,
2877 "os-image", "Error can not find os-image partition (flash)");
2878 flash_file_system = find_partition(flash, MAX_PARTITIONS,
2879 "file-system", "Error can not find file-system partition (flash)");
2880
2881 /* write os_image to 0x0 */
2882 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
2883 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
2884
2885 /* write file-system behind os_image */
2886 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
2887 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
2888 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
2889
2890 fclose(output_file);
2891 fclose(input_file);
2892 }
2893
2894 int main(int argc, char *argv[]) {
2895 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
2896 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
2897 bool add_jffs2_eof = false, sysupgrade = false;
2898 unsigned rev = 0;
2899 struct device_info *info;
2900 set_source_date_epoch();
2901
2902 while (true) {
2903 int c;
2904
2905 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
2906 if (c == -1)
2907 break;
2908
2909 switch (c) {
2910 case 'B':
2911 board = optarg;
2912 break;
2913
2914 case 'k':
2915 kernel_image = optarg;
2916 break;
2917
2918 case 'r':
2919 rootfs_image = optarg;
2920 break;
2921
2922 case 'o':
2923 output = optarg;
2924 break;
2925
2926 case 'V':
2927 sscanf(optarg, "r%u", &rev);
2928 break;
2929
2930 case 'j':
2931 add_jffs2_eof = true;
2932 break;
2933
2934 case 'S':
2935 sysupgrade = true;
2936 break;
2937
2938 case 'h':
2939 usage(argv[0]);
2940 return 0;
2941
2942 case 'd':
2943 output_directory = optarg;
2944 break;
2945
2946 case 'x':
2947 extract_image = optarg;
2948 break;
2949
2950 case 'z':
2951 convert_image = optarg;
2952 break;
2953
2954 default:
2955 usage(argv[0]);
2956 return 1;
2957 }
2958 }
2959
2960 if (extract_image || output_directory) {
2961 if (!extract_image)
2962 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
2963 if (!output_directory)
2964 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
2965 extract_firmware(extract_image, output_directory);
2966 } else if (convert_image) {
2967 if (!output)
2968 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
2969 convert_firmware(convert_image, output);
2970 } else {
2971 if (!board)
2972 error(1, 0, "no board has been specified");
2973 if (!kernel_image)
2974 error(1, 0, "no kernel image has been specified");
2975 if (!rootfs_image)
2976 error(1, 0, "no rootfs image has been specified");
2977 if (!output)
2978 error(1, 0, "no output filename has been specified");
2979
2980 info = find_board(board);
2981
2982 if (info == NULL)
2983 error(1, 0, "unsupported board %s", board);
2984
2985 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
2986 }
2987
2988 return 0;
2989 }