ath79: add support for TP-Link Archer C6 v2 (US) and A6 (US/TW)
[openwrt/openwrt.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Firmware layout description */
74 struct device_info {
75 const char *id;
76 const char *vendor;
77 const char *support_list;
78 char support_trail;
79 const char *soft_ver;
80 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
81 const char *first_sysupgrade_partition;
82 const char *last_sysupgrade_partition;
83 };
84
85 /** The content of the soft-version structure */
86 struct __attribute__((__packed__)) soft_version {
87 uint32_t magic;
88 uint32_t zero;
89 uint8_t pad1;
90 uint8_t version_major;
91 uint8_t version_minor;
92 uint8_t version_patch;
93 uint8_t year_hi;
94 uint8_t year_lo;
95 uint8_t month;
96 uint8_t day;
97 uint32_t rev;
98 uint8_t pad2;
99 };
100
101
102 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
103
104
105 /**
106 Salt for the MD5 hash
107
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
110 */
111 static const uint8_t md5_salt[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
116 };
117
118
119 /** Firmware layout table */
120 static struct device_info boards[] = {
121 /** Firmware layout for the CPE210/220 V1 */
122 {
123 .id = "CPE210",
124 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
125 .support_list =
126 "SupportList:\r\n"
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail = '\xff',
135 .soft_ver = NULL,
136
137 .partitions = {
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x200000},
144 {"file-system", 0x240000, 0x570000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
151 {NULL, 0, 0}
152 },
153
154 .first_sysupgrade_partition = "os-image",
155 .last_sysupgrade_partition = "support-list",
156 },
157
158 /** Firmware layout for the CPE210 V2 */
159 {
160 .id = "CPE210V2",
161 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
162 .support_list =
163 "SupportList:\r\n"
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail = '\xff',
175 .soft_ver = NULL,
176
177 .partitions = {
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"firmware", 0x40000, 0x770000},
186 {"soft-version", 0x7b0000, 0x00100},
187 {"support-list", 0x7b1000, 0x01000},
188 {"user-config", 0x7c0000, 0x10000},
189 {"default-config", 0x7d0000, 0x10000},
190 {"log", 0x7e0000, 0x10000},
191 {"radio", 0x7f0000, 0x10000},
192 {NULL, 0, 0}
193 },
194
195 .first_sysupgrade_partition = "os-image",
196 .last_sysupgrade_partition = "support-list",
197 },
198
199 /** Firmware layout for the CPE210 V3 */
200 {
201 .id = "CPE210V3",
202 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
203 .support_list =
204 "SupportList:\r\n"
205 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
206 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
207 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
208 "CPE210(TP-LINK|EU|N300-2):3.0\r\n",
209 .support_trail = '\xff',
210 .soft_ver = NULL,
211
212 .partitions = {
213 {"fs-uboot", 0x00000, 0x20000},
214 {"partition-table", 0x20000, 0x01000},
215 {"default-mac", 0x30000, 0x00020},
216 {"product-info", 0x31100, 0x00100},
217 {"device-info", 0x31400, 0x00400},
218 {"signature", 0x32000, 0x00400},
219 {"device-id", 0x33000, 0x00100},
220 {"firmware", 0x40000, 0x770000},
221 {"soft-version", 0x7b0000, 0x00100},
222 {"support-list", 0x7b1000, 0x01000},
223 {"user-config", 0x7c0000, 0x10000},
224 {"default-config", 0x7d0000, 0x10000},
225 {"log", 0x7e0000, 0x10000},
226 {"radio", 0x7f0000, 0x10000},
227 {NULL, 0, 0}
228 },
229
230 .first_sysupgrade_partition = "os-image",
231 .last_sysupgrade_partition = "support-list",
232 },
233
234 /** Firmware layout for the CPE220 V2 */
235 {
236 .id = "CPE220V2",
237 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
238 .support_list =
239 "SupportList:\r\n"
240 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
241 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
242 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
243 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
244 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
245 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
246 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
247 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
248 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
249 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
250 .support_trail = '\xff',
251 .soft_ver = NULL,
252
253 .partitions = {
254 {"fs-uboot", 0x00000, 0x20000},
255 {"partition-table", 0x20000, 0x02000},
256 {"default-mac", 0x30000, 0x00020},
257 {"product-info", 0x31100, 0x00100},
258 {"signature", 0x32000, 0x00400},
259 {"os-image", 0x40000, 0x200000},
260 {"file-system", 0x240000, 0x570000},
261 {"soft-version", 0x7b0000, 0x00100},
262 {"support-list", 0x7b1000, 0x00400},
263 {"user-config", 0x7c0000, 0x10000},
264 {"default-config", 0x7d0000, 0x10000},
265 {"log", 0x7e0000, 0x10000},
266 {"radio", 0x7f0000, 0x10000},
267 {NULL, 0, 0}
268 },
269
270 .first_sysupgrade_partition = "os-image",
271 .last_sysupgrade_partition = "support-list",
272 },
273
274 /** Firmware layout for the CPE220 V3 */
275 {
276 .id = "CPE220V3",
277 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
278 .support_list =
279 "SupportList:\r\n"
280 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
281 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
282 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
283 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
284 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
285 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
286 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
287 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
288 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
289 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
290 .support_trail = '\xff',
291 .soft_ver = NULL,
292
293 .partitions = {
294 {"fs-uboot", 0x00000, 0x20000},
295 {"partition-table", 0x20000, 0x02000},
296 {"default-mac", 0x30000, 0x00020},
297 {"product-info", 0x31100, 0x00100},
298 {"device-info", 0x31400, 0x00400},
299 {"signature", 0x32000, 0x00400},
300 {"device-id", 0x33000, 0x00100},
301 {"firmware", 0x40000, 0x770000},
302 {"soft-version", 0x7b0000, 0x00100},
303 {"support-list", 0x7b1000, 0x01000},
304 {"user-config", 0x7c0000, 0x10000},
305 {"default-config", 0x7d0000, 0x10000},
306 {"log", 0x7e0000, 0x10000},
307 {"radio", 0x7f0000, 0x10000},
308 {NULL, 0, 0}
309 },
310
311 .first_sysupgrade_partition = "os-image",
312 .last_sysupgrade_partition = "support-list",
313 },
314
315 /** Firmware layout for the CPE510/520 V1 */
316 {
317 .id = "CPE510",
318 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
319 .support_list =
320 "SupportList:\r\n"
321 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
322 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
323 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
324 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
325 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
326 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
327 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
328 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
329 .support_trail = '\xff',
330 .soft_ver = NULL,
331
332 .partitions = {
333 {"fs-uboot", 0x00000, 0x20000},
334 {"partition-table", 0x20000, 0x02000},
335 {"default-mac", 0x30000, 0x00020},
336 {"product-info", 0x31100, 0x00100},
337 {"signature", 0x32000, 0x00400},
338 {"os-image", 0x40000, 0x200000},
339 {"file-system", 0x240000, 0x570000},
340 {"soft-version", 0x7b0000, 0x00100},
341 {"support-list", 0x7b1000, 0x00400},
342 {"user-config", 0x7c0000, 0x10000},
343 {"default-config", 0x7d0000, 0x10000},
344 {"log", 0x7e0000, 0x10000},
345 {"radio", 0x7f0000, 0x10000},
346 {NULL, 0, 0}
347 },
348
349 .first_sysupgrade_partition = "os-image",
350 .last_sysupgrade_partition = "support-list",
351 },
352
353 /** Firmware layout for the CPE510 V2 */
354 {
355 .id = "CPE510V2",
356 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
357 .support_list =
358 "SupportList:\r\n"
359 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
360 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
361 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
362 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
363 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
364 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
365 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
366 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
367 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
368 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
369 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
370 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
371 .support_trail = '\xff',
372 .soft_ver = NULL,
373
374 .partitions = {
375 {"fs-uboot", 0x00000, 0x20000},
376 {"partition-table", 0x20000, 0x02000},
377 {"default-mac", 0x30000, 0x00020},
378 {"product-info", 0x31100, 0x00100},
379 {"signature", 0x32000, 0x00400},
380 {"os-image", 0x40000, 0x200000},
381 {"file-system", 0x240000, 0x570000},
382 {"soft-version", 0x7b0000, 0x00100},
383 {"support-list", 0x7b1000, 0x00400},
384 {"user-config", 0x7c0000, 0x10000},
385 {"default-config", 0x7d0000, 0x10000},
386 {"log", 0x7e0000, 0x10000},
387 {"radio", 0x7f0000, 0x10000},
388 {NULL, 0, 0}
389 },
390
391 .first_sysupgrade_partition = "os-image",
392 .last_sysupgrade_partition = "support-list",
393 },
394
395 /** Firmware layout for the CPE510 V3 */
396 {
397 .id = "CPE510V3",
398 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
399 .support_list =
400 "SupportList:\r\n"
401 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
402 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
403 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
404 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
405 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
406 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
407 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
408 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
409 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
410 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
411 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
412 "CPE510(TP-LINK|US|N300-5):3.0\r\n",
413 .support_trail = '\xff',
414 .soft_ver = NULL,
415
416 .partitions = {
417 {"fs-uboot", 0x00000, 0x20000},
418 {"partition-table", 0x20000, 0x02000},
419 {"default-mac", 0x30000, 0x00020},
420 {"product-info", 0x31100, 0x00100},
421 {"signature", 0x32000, 0x00400},
422 {"os-image", 0x40000, 0x200000},
423 {"file-system", 0x240000, 0x570000},
424 {"soft-version", 0x7b0000, 0x00100},
425 {"support-list", 0x7b1000, 0x00400},
426 {"user-config", 0x7c0000, 0x10000},
427 {"default-config", 0x7d0000, 0x10000},
428 {"log", 0x7e0000, 0x10000},
429 {"radio", 0x7f0000, 0x10000},
430 {NULL, 0, 0}
431 },
432
433 .first_sysupgrade_partition = "os-image",
434 .last_sysupgrade_partition = "support-list",
435 },
436
437 /** Firmware layout for the CPE610V1 */
438 {
439 .id = "CPE610V1",
440 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
441 .support_list =
442 "SupportList:\r\n"
443 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
444 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
445 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
446 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
447 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
448 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
449 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
450 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
451 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
452 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
453 .support_trail = '\xff',
454 .soft_ver = NULL,
455
456 .partitions = {
457 {"fs-uboot", 0x00000, 0x20000},
458 {"partition-table", 0x20000, 0x02000},
459 {"default-mac", 0x30000, 0x00020},
460 {"product-info", 0x31100, 0x00100},
461 {"signature", 0x32000, 0x00400},
462 {"os-image", 0x40000, 0x200000},
463 {"file-system", 0x240000, 0x570000},
464 {"soft-version", 0x7b0000, 0x00100},
465 {"support-list", 0x7b1000, 0x00400},
466 {"user-config", 0x7c0000, 0x10000},
467 {"default-config", 0x7d0000, 0x10000},
468 {"log", 0x7e0000, 0x10000},
469 {"radio", 0x7f0000, 0x10000},
470 {NULL, 0, 0}
471 },
472
473 .first_sysupgrade_partition = "os-image",
474 .last_sysupgrade_partition = "support-list",
475 },
476
477 {
478 .id = "WBS210",
479 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
480 .support_list =
481 "SupportList:\r\n"
482 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
483 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
484 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
485 .support_trail = '\xff',
486 .soft_ver = NULL,
487
488 .partitions = {
489 {"fs-uboot", 0x00000, 0x20000},
490 {"partition-table", 0x20000, 0x02000},
491 {"default-mac", 0x30000, 0x00020},
492 {"product-info", 0x31100, 0x00100},
493 {"signature", 0x32000, 0x00400},
494 {"os-image", 0x40000, 0x200000},
495 {"file-system", 0x240000, 0x570000},
496 {"soft-version", 0x7b0000, 0x00100},
497 {"support-list", 0x7b1000, 0x00400},
498 {"user-config", 0x7c0000, 0x10000},
499 {"default-config", 0x7d0000, 0x10000},
500 {"log", 0x7e0000, 0x10000},
501 {"radio", 0x7f0000, 0x10000},
502 {NULL, 0, 0}
503 },
504
505 .first_sysupgrade_partition = "os-image",
506 .last_sysupgrade_partition = "support-list",
507 },
508
509 {
510 .id = "WBS210V2",
511 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
512 .support_list =
513 "SupportList:\r\n"
514 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
515 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
516 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
517 .support_trail = '\xff',
518 .soft_ver = NULL,
519
520 .partitions = {
521 {"fs-uboot", 0x00000, 0x20000},
522 {"partition-table", 0x20000, 0x02000},
523 {"default-mac", 0x30000, 0x00020},
524 {"product-info", 0x31100, 0x00100},
525 {"signature", 0x32000, 0x00400},
526 {"os-image", 0x40000, 0x200000},
527 {"file-system", 0x240000, 0x570000},
528 {"soft-version", 0x7b0000, 0x00100},
529 {"support-list", 0x7b1000, 0x00400},
530 {"user-config", 0x7c0000, 0x10000},
531 {"default-config", 0x7d0000, 0x10000},
532 {"log", 0x7e0000, 0x10000},
533 {"radio", 0x7f0000, 0x10000},
534 {NULL, 0, 0}
535 },
536
537 .first_sysupgrade_partition = "os-image",
538 .last_sysupgrade_partition = "support-list",
539 },
540
541 {
542 .id = "WBS510",
543 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
544 .support_list =
545 "SupportList:\r\n"
546 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
547 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
548 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
549 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
550 .support_trail = '\xff',
551 .soft_ver = NULL,
552
553 .partitions = {
554 {"fs-uboot", 0x00000, 0x20000},
555 {"partition-table", 0x20000, 0x02000},
556 {"default-mac", 0x30000, 0x00020},
557 {"product-info", 0x31100, 0x00100},
558 {"signature", 0x32000, 0x00400},
559 {"os-image", 0x40000, 0x200000},
560 {"file-system", 0x240000, 0x570000},
561 {"soft-version", 0x7b0000, 0x00100},
562 {"support-list", 0x7b1000, 0x00400},
563 {"user-config", 0x7c0000, 0x10000},
564 {"default-config", 0x7d0000, 0x10000},
565 {"log", 0x7e0000, 0x10000},
566 {"radio", 0x7f0000, 0x10000},
567 {NULL, 0, 0}
568 },
569
570 .first_sysupgrade_partition = "os-image",
571 .last_sysupgrade_partition = "support-list",
572 },
573
574 {
575 .id = "WBS510V2",
576 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
577 .support_list =
578 "SupportList:\r\n"
579 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
580 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
581 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
582 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
583 .support_trail = '\xff',
584 .soft_ver = NULL,
585
586 .partitions = {
587 {"fs-uboot", 0x00000, 0x20000},
588 {"partition-table", 0x20000, 0x02000},
589 {"default-mac", 0x30000, 0x00020},
590 {"product-info", 0x31100, 0x00100},
591 {"signature", 0x32000, 0x00400},
592 {"os-image", 0x40000, 0x200000},
593 {"file-system", 0x240000, 0x570000},
594 {"soft-version", 0x7b0000, 0x00100},
595 {"support-list", 0x7b1000, 0x00400},
596 {"user-config", 0x7c0000, 0x10000},
597 {"default-config", 0x7d0000, 0x10000},
598 {"log", 0x7e0000, 0x10000},
599 {"radio", 0x7f0000, 0x10000},
600 {NULL, 0, 0}
601 },
602
603 .first_sysupgrade_partition = "os-image",
604 .last_sysupgrade_partition = "support-list",
605 },
606
607 /** Firmware layout for the C2600 */
608 {
609 .id = "C2600",
610 .vendor = "",
611 .support_list =
612 "SupportList:\r\n"
613 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
614 .support_trail = '\x00',
615 .soft_ver = NULL,
616
617 /**
618 We use a bigger os-image partition than the stock images (and thus
619 smaller file-system), as our kernel doesn't fit in the stock firmware's
620 2 MB os-image since kernel 4.14.
621 */
622 .partitions = {
623 {"SBL1", 0x00000, 0x20000},
624 {"MIBIB", 0x20000, 0x20000},
625 {"SBL2", 0x40000, 0x20000},
626 {"SBL3", 0x60000, 0x30000},
627 {"DDRCONFIG", 0x90000, 0x10000},
628 {"SSD", 0xa0000, 0x10000},
629 {"TZ", 0xb0000, 0x30000},
630 {"RPM", 0xe0000, 0x20000},
631 {"fs-uboot", 0x100000, 0x70000},
632 {"uboot-env", 0x170000, 0x40000},
633 {"radio", 0x1b0000, 0x40000},
634 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
635 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
636 {"default-mac", 0x1ef0000, 0x00200},
637 {"pin", 0x1ef0200, 0x00200},
638 {"product-info", 0x1ef0400, 0x0fc00},
639 {"partition-table", 0x1f00000, 0x10000},
640 {"soft-version", 0x1f10000, 0x10000},
641 {"support-list", 0x1f20000, 0x10000},
642 {"profile", 0x1f30000, 0x10000},
643 {"default-config", 0x1f40000, 0x10000},
644 {"user-config", 0x1f50000, 0x40000},
645 {"qos-db", 0x1f90000, 0x40000},
646 {"usb-config", 0x1fd0000, 0x10000},
647 {"log", 0x1fe0000, 0x20000},
648 {NULL, 0, 0}
649 },
650
651 .first_sysupgrade_partition = "os-image",
652 .last_sysupgrade_partition = "file-system"
653 },
654
655 /** Firmware layout for the A7-V5 */
656 {
657 .id = "ARCHER-A7-V5",
658 .support_list =
659 "SupportList:\n"
660 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
661 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
662 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
663 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
664 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
665 .support_trail = '\x00',
666 .soft_ver = "soft_ver:1.0.0\n",
667
668 /* We're using a dynamic kernel/rootfs split here */
669 .partitions = {
670 {"factory-boot", 0x00000, 0x20000},
671 {"fs-uboot", 0x20000, 0x20000},
672 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
673 /* Stock: name file-system base 0x160000 size 0xda0000 */
674 {"default-mac", 0xf40000, 0x00200},
675 {"pin", 0xf40200, 0x00200},
676 {"device-id", 0xf40400, 0x00100},
677 {"product-info", 0xf40500, 0x0fb00},
678 {"soft-version", 0xf50000, 0x00100},
679 {"extra-para", 0xf51000, 0x01000},
680 {"support-list", 0xf52000, 0x0a000},
681 {"profile", 0xf5c000, 0x04000},
682 {"default-config", 0xf60000, 0x10000},
683 {"user-config", 0xf70000, 0x40000},
684 {"certificate", 0xfb0000, 0x10000},
685 {"partition-table", 0xfc0000, 0x10000},
686 {"log", 0xfd0000, 0x20000},
687 {"radio", 0xff0000, 0x10000},
688 {NULL, 0, 0}
689 },
690
691 .first_sysupgrade_partition = "os-image",
692 .last_sysupgrade_partition = "file-system",
693 },
694
695 /** Firmware layout for the C2v3 */
696 {
697 .id = "ARCHER-C2-V3",
698 .support_list =
699 "SupportList:\n"
700 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
701 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
702 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
703 .support_trail = '\x00',
704 .soft_ver = "soft_ver:3.0.1\n",
705
706 /** We're using a dynamic kernel/rootfs split here */
707
708 .partitions = {
709 {"factory-boot", 0x00000, 0x20000},
710 {"fs-uboot", 0x20000, 0x10000},
711 {"firmware", 0x30000, 0x7a0000},
712 {"user-config", 0x7d0000, 0x04000},
713 {"default-mac", 0x7e0000, 0x00100},
714 {"device-id", 0x7e0100, 0x00100},
715 {"extra-para", 0x7e0200, 0x00100},
716 {"pin", 0x7e0300, 0x00100},
717 {"support-list", 0x7e0400, 0x00400},
718 {"soft-version", 0x7e0800, 0x00400},
719 {"product-info", 0x7e0c00, 0x01400},
720 {"partition-table", 0x7e2000, 0x01000},
721 {"profile", 0x7e3000, 0x01000},
722 {"default-config", 0x7e4000, 0x04000},
723 {"merge-config", 0x7ec000, 0x02000},
724 {"qos-db", 0x7ee000, 0x02000},
725 {"radio", 0x7f0000, 0x10000},
726 {NULL, 0, 0}
727 },
728
729 .first_sysupgrade_partition = "os-image",
730 .last_sysupgrade_partition = "file-system",
731 },
732
733 /** Firmware layout for the C25v1 */
734 {
735 .id = "ARCHER-C25-V1",
736 .support_list =
737 "SupportList:\n"
738 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
739 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
740 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
741 .support_trail = '\x00',
742 .soft_ver = "soft_ver:1.0.0\n",
743
744 /* We're using a dynamic kernel/rootfs split here */
745 .partitions = {
746 {"factory-boot", 0x00000, 0x20000},
747 {"fs-uboot", 0x20000, 0x10000},
748 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
749 /* Stock: name file-system base 0x130000 size 0x6a0000 */
750 {"user-config", 0x7d0000, 0x04000},
751 {"default-mac", 0x7e0000, 0x00100},
752 {"device-id", 0x7e0100, 0x00100},
753 {"extra-para", 0x7e0200, 0x00100},
754 {"pin", 0x7e0300, 0x00100},
755 {"support-list", 0x7e0400, 0x00400},
756 {"soft-version", 0x7e0800, 0x00400},
757 {"product-info", 0x7e0c00, 0x01400},
758 {"partition-table", 0x7e2000, 0x01000},
759 {"profile", 0x7e3000, 0x01000},
760 {"default-config", 0x7e4000, 0x04000},
761 {"merge-config", 0x7ec000, 0x02000},
762 {"qos-db", 0x7ee000, 0x02000},
763 {"radio", 0x7f0000, 0x10000},
764 {NULL, 0, 0}
765 },
766
767 .first_sysupgrade_partition = "os-image",
768 .last_sysupgrade_partition = "file-system",
769 },
770
771 /** Firmware layout for the C58v1 */
772 {
773 .id = "ARCHER-C58-V1",
774 .vendor = "",
775 .support_list =
776 "SupportList:\r\n"
777 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
778 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
779 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
780 .support_trail = '\x00',
781 .soft_ver = "soft_ver:1.0.0\n",
782
783 .partitions = {
784 {"fs-uboot", 0x00000, 0x10000},
785 {"default-mac", 0x10000, 0x00200},
786 {"pin", 0x10200, 0x00200},
787 {"product-info", 0x10400, 0x00100},
788 {"partition-table", 0x10500, 0x00800},
789 {"soft-version", 0x11300, 0x00200},
790 {"support-list", 0x11500, 0x00100},
791 {"device-id", 0x11600, 0x00100},
792 {"profile", 0x11700, 0x03900},
793 {"default-config", 0x15000, 0x04000},
794 {"user-config", 0x19000, 0x04000},
795 {"firmware", 0x20000, 0x7c8000},
796 {"certyficate", 0x7e8000, 0x08000},
797 {"radio", 0x7f0000, 0x10000},
798 {NULL, 0, 0}
799 },
800
801 .first_sysupgrade_partition = "os-image",
802 .last_sysupgrade_partition = "file-system",
803 },
804
805 /** Firmware layout for the C59v1 */
806 {
807 .id = "ARCHER-C59-V1",
808 .vendor = "",
809 .support_list =
810 "SupportList:\r\n"
811 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
812 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
813 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
814 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
815 .support_trail = '\x00',
816 .soft_ver = "soft_ver:1.0.0\n",
817
818 /* We're using a dynamic kernel/rootfs split here */
819 .partitions = {
820 {"fs-uboot", 0x00000, 0x10000},
821 {"default-mac", 0x10000, 0x00200},
822 {"pin", 0x10200, 0x00200},
823 {"device-id", 0x10400, 0x00100},
824 {"product-info", 0x10500, 0x0fb00},
825 {"firmware", 0x20000, 0xe30000},
826 {"partition-table", 0xe50000, 0x10000},
827 {"soft-version", 0xe60000, 0x10000},
828 {"support-list", 0xe70000, 0x10000},
829 {"profile", 0xe80000, 0x10000},
830 {"default-config", 0xe90000, 0x10000},
831 {"user-config", 0xea0000, 0x40000},
832 {"usb-config", 0xee0000, 0x10000},
833 {"certificate", 0xef0000, 0x10000},
834 {"qos-db", 0xf00000, 0x40000},
835 {"log", 0xfe0000, 0x10000},
836 {"radio", 0xff0000, 0x10000},
837 {NULL, 0, 0}
838 },
839
840 .first_sysupgrade_partition = "os-image",
841 .last_sysupgrade_partition = "file-system",
842 },
843
844 /** Firmware layout for the C59v2 */
845 {
846 .id = "ARCHER-C59-V2",
847 .vendor = "",
848 .support_list =
849 "SupportList:\r\n"
850 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
851 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
852 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
853 .support_trail = '\x00',
854 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
855
856 /** We're using a dynamic kernel/rootfs split here */
857 .partitions = {
858 {"factory-boot", 0x00000, 0x20000},
859 {"fs-uboot", 0x20000, 0x10000},
860 {"default-mac", 0x30000, 0x00200},
861 {"pin", 0x30200, 0x00200},
862 {"device-id", 0x30400, 0x00100},
863 {"product-info", 0x30500, 0x0fb00},
864 {"firmware", 0x40000, 0xe10000},
865 {"partition-table", 0xe50000, 0x10000},
866 {"soft-version", 0xe60000, 0x10000},
867 {"support-list", 0xe70000, 0x10000},
868 {"profile", 0xe80000, 0x10000},
869 {"default-config", 0xe90000, 0x10000},
870 {"user-config", 0xea0000, 0x40000},
871 {"usb-config", 0xee0000, 0x10000},
872 {"certificate", 0xef0000, 0x10000},
873 {"extra-para", 0xf00000, 0x10000},
874 {"qos-db", 0xf10000, 0x30000},
875 {"log", 0xfe0000, 0x10000},
876 {"radio", 0xff0000, 0x10000},
877 {NULL, 0, 0}
878 },
879
880 .first_sysupgrade_partition = "os-image",
881 .last_sysupgrade_partition = "file-system",
882 },
883
884 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
885 {
886 .id = "ARCHER-C6-V2",
887 .vendor = "",
888 .support_list =
889 "SupportList:\r\n"
890 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
891 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
892 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
893 .support_trail = '\x00',
894 .soft_ver = "soft_ver:1.0.0\n",
895
896 .partitions = {
897 {"fs-uboot", 0x00000, 0x20000},
898 {"default-mac", 0x20000, 0x00200},
899 {"pin", 0x20200, 0x00100},
900 {"product-info", 0x20300, 0x00200},
901 {"device-id", 0x20500, 0x0fb00},
902 {"firmware", 0x30000, 0x7a9400},
903 {"soft-version", 0x7d9400, 0x00100},
904 {"extra-para", 0x7d9500, 0x00100},
905 {"support-list", 0x7d9600, 0x00200},
906 {"profile", 0x7d9800, 0x03000},
907 {"default-config", 0x7dc800, 0x03000},
908 {"partition-table", 0x7df800, 0x00800},
909 {"user-config", 0x7e0000, 0x0c000},
910 {"certificate", 0x7ec000, 0x04000},
911 {"radio", 0x7f0000, 0x10000},
912 {NULL, 0, 0}
913 },
914
915 .first_sysupgrade_partition = "os-image",
916 .last_sysupgrade_partition = "file-system",
917 },
918
919 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
920 {
921 .id = "ARCHER-C6-V2-US",
922 .vendor = "",
923 .support_list =
924 "SupportList:\n"
925 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
926 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
927 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
928 .support_trail = '\x00',
929 .soft_ver = "soft_ver:1.1.1\n",
930
931 .partitions = {
932 {"factory-boot", 0x00000, 0x20000},
933 {"default-mac", 0x20000, 0x00200},
934 {"pin", 0x20200, 0x00100},
935 {"product-info", 0x20300, 0x00200},
936 {"device-id", 0x20500, 0x0fb00},
937 {"fs-uboot", 0x30000, 0x20000},
938 {"firmware", 0x50000, 0xf89400},
939 {"soft-version", 0xfd9400, 0x00100},
940 {"extra-para", 0xfd9500, 0x00100},
941 {"support-list", 0xfd9600, 0x00200},
942 {"profile", 0xfd9800, 0x03000},
943 {"default-config", 0xfdc800, 0x03000},
944 {"partition-table", 0xfdf800, 0x00800},
945 {"user-config", 0xfe0000, 0x0c000},
946 {"certificate", 0xfec000, 0x04000},
947 {"radio", 0xff0000, 0x10000},
948 {NULL, 0, 0}
949 },
950 .first_sysupgrade_partition = "os-image",
951 .last_sysupgrade_partition = "file-system",
952 },
953
954 /** Firmware layout for the C60v1 */
955 {
956 .id = "ARCHER-C60-V1",
957 .vendor = "",
958 .support_list =
959 "SupportList:\r\n"
960 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
961 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
962 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
963 .support_trail = '\x00',
964 .soft_ver = "soft_ver:1.0.0\n",
965
966 .partitions = {
967 {"fs-uboot", 0x00000, 0x10000},
968 {"default-mac", 0x10000, 0x00200},
969 {"pin", 0x10200, 0x00200},
970 {"product-info", 0x10400, 0x00100},
971 {"partition-table", 0x10500, 0x00800},
972 {"soft-version", 0x11300, 0x00200},
973 {"support-list", 0x11500, 0x00100},
974 {"device-id", 0x11600, 0x00100},
975 {"profile", 0x11700, 0x03900},
976 {"default-config", 0x15000, 0x04000},
977 {"user-config", 0x19000, 0x04000},
978 {"firmware", 0x20000, 0x7c8000},
979 {"certyficate", 0x7e8000, 0x08000},
980 {"radio", 0x7f0000, 0x10000},
981 {NULL, 0, 0}
982 },
983
984 .first_sysupgrade_partition = "os-image",
985 .last_sysupgrade_partition = "file-system",
986 },
987
988 /** Firmware layout for the C60v2 */
989 {
990 .id = "ARCHER-C60-V2",
991 .vendor = "",
992 .support_list =
993 "SupportList:\r\n"
994 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
995 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
996 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
997 .support_trail = '\x00',
998 .soft_ver = "soft_ver:2.0.0\n",
999
1000 .partitions = {
1001 {"factory-boot", 0x00000, 0x1fb00},
1002 {"default-mac", 0x1fb00, 0x00200},
1003 {"pin", 0x1fd00, 0x00100},
1004 {"product-info", 0x1fe00, 0x00100},
1005 {"device-id", 0x1ff00, 0x00100},
1006 {"fs-uboot", 0x20000, 0x10000},
1007 {"firmware", 0x30000, 0x7a0000},
1008 {"soft-version", 0x7d9500, 0x00100},
1009 {"support-list", 0x7d9600, 0x00100},
1010 {"extra-para", 0x7d9700, 0x00100},
1011 {"profile", 0x7d9800, 0x03000},
1012 {"default-config", 0x7dc800, 0x03000},
1013 {"partition-table", 0x7df800, 0x00800},
1014 {"user-config", 0x7e0000, 0x0c000},
1015 {"certificate", 0x7ec000, 0x04000},
1016 {"radio", 0x7f0000, 0x10000},
1017 {NULL, 0, 0}
1018 },
1019
1020 .first_sysupgrade_partition = "os-image",
1021 .last_sysupgrade_partition = "file-system",
1022 },
1023
1024 /** Firmware layout for the C5 */
1025 {
1026 .id = "ARCHER-C5-V2",
1027 .vendor = "",
1028 .support_list =
1029 "SupportList:\r\n"
1030 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1031 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1032 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1033 .support_trail = '\x00',
1034 .soft_ver = NULL,
1035
1036 .partitions = {
1037 {"fs-uboot", 0x00000, 0x40000},
1038 {"os-image", 0x40000, 0x200000},
1039 {"file-system", 0x240000, 0xc00000},
1040 {"default-mac", 0xe40000, 0x00200},
1041 {"pin", 0xe40200, 0x00200},
1042 {"product-info", 0xe40400, 0x00200},
1043 {"partition-table", 0xe50000, 0x10000},
1044 {"soft-version", 0xe60000, 0x00200},
1045 {"support-list", 0xe61000, 0x0f000},
1046 {"profile", 0xe70000, 0x10000},
1047 {"default-config", 0xe80000, 0x10000},
1048 {"user-config", 0xe90000, 0x50000},
1049 {"log", 0xee0000, 0x100000},
1050 {"radio_bk", 0xfe0000, 0x10000},
1051 {"radio", 0xff0000, 0x10000},
1052 {NULL, 0, 0}
1053 },
1054
1055 .first_sysupgrade_partition = "os-image",
1056 .last_sysupgrade_partition = "file-system"
1057 },
1058
1059 /** Firmware layout for the C7 */
1060 {
1061 .id = "ARCHER-C7-V4",
1062 .support_list =
1063 "SupportList:\n"
1064 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1065 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1066 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1067 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1068 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1069 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1070 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1071 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1072 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1073 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1074 .support_trail = '\x00',
1075 .soft_ver = "soft_ver:1.0.0\n",
1076
1077 /* We're using a dynamic kernel/rootfs split here */
1078 .partitions = {
1079 {"factory-boot", 0x00000, 0x20000},
1080 {"fs-uboot", 0x20000, 0x20000},
1081 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1082 /* Stock: name file-system base 0x160000 size 0xda0000 */
1083 {"default-mac", 0xf00000, 0x00200},
1084 {"pin", 0xf00200, 0x00200},
1085 {"device-id", 0xf00400, 0x00100},
1086 {"product-info", 0xf00500, 0x0fb00},
1087 {"soft-version", 0xf10000, 0x00100},
1088 {"extra-para", 0xf11000, 0x01000},
1089 {"support-list", 0xf12000, 0x0a000},
1090 {"profile", 0xf1c000, 0x04000},
1091 {"default-config", 0xf20000, 0x10000},
1092 {"user-config", 0xf30000, 0x40000},
1093 {"qos-db", 0xf70000, 0x40000},
1094 {"certificate", 0xfb0000, 0x10000},
1095 {"partition-table", 0xfc0000, 0x10000},
1096 {"log", 0xfd0000, 0x20000},
1097 {"radio", 0xff0000, 0x10000},
1098 {NULL, 0, 0}
1099 },
1100
1101 .first_sysupgrade_partition = "os-image",
1102 .last_sysupgrade_partition = "file-system",
1103 },
1104
1105 /** Firmware layout for the C7 v5*/
1106 {
1107 .id = "ARCHER-C7-V5",
1108 .support_list =
1109 "SupportList:\n"
1110 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1111 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1112 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1113 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1114 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1115 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1116 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1117 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1118
1119 .support_trail = '\x00',
1120 .soft_ver = "soft_ver:1.0.0\n",
1121
1122 /* We're using a dynamic kernel/rootfs split here */
1123 .partitions = {
1124 {"factory-boot", 0x00000, 0x20000},
1125 {"fs-uboot", 0x20000, 0x20000},
1126 {"partition-table", 0x40000, 0x10000},
1127 {"radio", 0x50000, 0x10000},
1128 {"default-mac", 0x60000, 0x00200},
1129 {"pin", 0x60200, 0x00200},
1130 {"device-id", 0x60400, 0x00100},
1131 {"product-info", 0x60500, 0x0fb00},
1132 {"soft-version", 0x70000, 0x01000},
1133 {"extra-para", 0x71000, 0x01000},
1134 {"support-list", 0x72000, 0x0a000},
1135 {"profile", 0x7c000, 0x04000},
1136 {"user-config", 0x80000, 0x40000},
1137
1138
1139 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1140 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1141
1142 {"log", 0xfc0000, 0x20000},
1143 {"certificate", 0xfe0000, 0x10000},
1144 {"default-config", 0xff0000, 0x10000},
1145 {NULL, 0, 0}
1146
1147 },
1148
1149 .first_sysupgrade_partition = "os-image",
1150 .last_sysupgrade_partition = "file-system",
1151 },
1152
1153 /** Firmware layout for the C9 */
1154 {
1155 .id = "ARCHERC9",
1156 .vendor = "",
1157 .support_list =
1158 "SupportList:\n"
1159 "{product_name:ArcherC9,"
1160 "product_ver:1.0.0,"
1161 "special_id:00000000}\n",
1162 .support_trail = '\x00',
1163 .soft_ver = NULL,
1164
1165 .partitions = {
1166 {"fs-uboot", 0x00000, 0x40000},
1167 {"os-image", 0x40000, 0x200000},
1168 {"file-system", 0x240000, 0xc00000},
1169 {"default-mac", 0xe40000, 0x00200},
1170 {"pin", 0xe40200, 0x00200},
1171 {"product-info", 0xe40400, 0x00200},
1172 {"partition-table", 0xe50000, 0x10000},
1173 {"soft-version", 0xe60000, 0x00200},
1174 {"support-list", 0xe61000, 0x0f000},
1175 {"profile", 0xe70000, 0x10000},
1176 {"default-config", 0xe80000, 0x10000},
1177 {"user-config", 0xe90000, 0x50000},
1178 {"log", 0xee0000, 0x100000},
1179 {"radio_bk", 0xfe0000, 0x10000},
1180 {"radio", 0xff0000, 0x10000},
1181 {NULL, 0, 0}
1182 },
1183
1184 .first_sysupgrade_partition = "os-image",
1185 .last_sysupgrade_partition = "file-system"
1186 },
1187
1188 /** Firmware layout for the EAP120 */
1189 {
1190 .id = "EAP120",
1191 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1192 .support_list =
1193 "SupportList:\r\n"
1194 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1195 .support_trail = '\xff',
1196 .soft_ver = NULL,
1197
1198 .partitions = {
1199 {"fs-uboot", 0x00000, 0x20000},
1200 {"partition-table", 0x20000, 0x02000},
1201 {"default-mac", 0x30000, 0x00020},
1202 {"support-list", 0x31000, 0x00100},
1203 {"product-info", 0x31100, 0x00100},
1204 {"soft-version", 0x32000, 0x00100},
1205 {"os-image", 0x40000, 0x180000},
1206 {"file-system", 0x1c0000, 0x600000},
1207 {"user-config", 0x7c0000, 0x10000},
1208 {"backup-config", 0x7d0000, 0x10000},
1209 {"log", 0x7e0000, 0x10000},
1210 {"radio", 0x7f0000, 0x10000},
1211 {NULL, 0, 0}
1212 },
1213
1214 .first_sysupgrade_partition = "os-image",
1215 .last_sysupgrade_partition = "file-system"
1216 },
1217
1218 /** Firmware layout for the TL-WA850RE v2 */
1219 {
1220 .id = "TLWA850REV2",
1221 .vendor = "",
1222 .support_list =
1223 "SupportList:\n"
1224 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1225 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1226 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1227 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1228 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1229 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1230 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1231 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1232 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1233 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1234 .support_trail = '\x00',
1235 .soft_ver = NULL,
1236
1237 /**
1238 576KB were moved from file-system to os-image
1239 in comparison to the stock image
1240 */
1241 .partitions = {
1242 {"fs-uboot", 0x00000, 0x20000},
1243 {"os-image", 0x20000, 0x150000},
1244 {"file-system", 0x170000, 0x240000},
1245 {"partition-table", 0x3b0000, 0x02000},
1246 {"default-mac", 0x3c0000, 0x00020},
1247 {"pin", 0x3c0100, 0x00020},
1248 {"product-info", 0x3c1000, 0x01000},
1249 {"soft-version", 0x3c2000, 0x00100},
1250 {"support-list", 0x3c3000, 0x01000},
1251 {"profile", 0x3c4000, 0x08000},
1252 {"user-config", 0x3d0000, 0x10000},
1253 {"default-config", 0x3e0000, 0x10000},
1254 {"radio", 0x3f0000, 0x10000},
1255 {NULL, 0, 0}
1256 },
1257
1258 .first_sysupgrade_partition = "os-image",
1259 .last_sysupgrade_partition = "file-system"
1260 },
1261
1262 /** Firmware layout for the TL-WA855RE v1 */
1263 {
1264 .id = "TLWA855REV1",
1265 .vendor = "",
1266 .support_list =
1267 "SupportList:\n"
1268 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1269 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1270 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1271 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1272 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1273 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1274 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1275 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1276 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1277 .support_trail = '\x00',
1278 .soft_ver = NULL,
1279
1280 .partitions = {
1281 {"fs-uboot", 0x00000, 0x20000},
1282 {"os-image", 0x20000, 0x150000},
1283 {"file-system", 0x170000, 0x240000},
1284 {"partition-table", 0x3b0000, 0x02000},
1285 {"default-mac", 0x3c0000, 0x00020},
1286 {"pin", 0x3c0100, 0x00020},
1287 {"product-info", 0x3c1000, 0x01000},
1288 {"soft-version", 0x3c2000, 0x00100},
1289 {"support-list", 0x3c3000, 0x01000},
1290 {"profile", 0x3c4000, 0x08000},
1291 {"user-config", 0x3d0000, 0x10000},
1292 {"default-config", 0x3e0000, 0x10000},
1293 {"radio", 0x3f0000, 0x10000},
1294 {NULL, 0, 0}
1295 },
1296
1297 .first_sysupgrade_partition = "os-image",
1298 .last_sysupgrade_partition = "file-system"
1299 },
1300
1301 /** Firmware layout for the TL-WR1043 v5 */
1302 {
1303 .id = "TLWR1043NV5",
1304 .vendor = "",
1305 .support_list =
1306 "SupportList:\n"
1307 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1308 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1309 .support_trail = '\x00',
1310 .soft_ver = "soft_ver:1.0.0\n",
1311 .partitions = {
1312 {"factory-boot", 0x00000, 0x20000},
1313 {"fs-uboot", 0x20000, 0x20000},
1314 {"firmware", 0x40000, 0xec0000},
1315 {"default-mac", 0xf00000, 0x00200},
1316 {"pin", 0xf00200, 0x00200},
1317 {"device-id", 0xf00400, 0x00100},
1318 {"product-info", 0xf00500, 0x0fb00},
1319 {"soft-version", 0xf10000, 0x01000},
1320 {"extra-para", 0xf11000, 0x01000},
1321 {"support-list", 0xf12000, 0x0a000},
1322 {"profile", 0xf1c000, 0x04000},
1323 {"default-config", 0xf20000, 0x10000},
1324 {"user-config", 0xf30000, 0x40000},
1325 {"qos-db", 0xf70000, 0x40000},
1326 {"certificate", 0xfb0000, 0x10000},
1327 {"partition-table", 0xfc0000, 0x10000},
1328 {"log", 0xfd0000, 0x20000},
1329 {"radio", 0xff0000, 0x10000},
1330 {NULL, 0, 0}
1331 },
1332 .first_sysupgrade_partition = "os-image",
1333 .last_sysupgrade_partition = "file-system"
1334 },
1335
1336 /** Firmware layout for the TL-WR1043 v4 */
1337 {
1338 .id = "TLWR1043NDV4",
1339 .vendor = "",
1340 .support_list =
1341 "SupportList:\n"
1342 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1343 .support_trail = '\x00',
1344 .soft_ver = NULL,
1345
1346 /* We're using a dynamic kernel/rootfs split here */
1347 .partitions = {
1348 {"fs-uboot", 0x00000, 0x20000},
1349 {"firmware", 0x20000, 0xf30000},
1350 {"default-mac", 0xf50000, 0x00200},
1351 {"pin", 0xf50200, 0x00200},
1352 {"product-info", 0xf50400, 0x0fc00},
1353 {"soft-version", 0xf60000, 0x0b000},
1354 {"support-list", 0xf6b000, 0x04000},
1355 {"profile", 0xf70000, 0x04000},
1356 {"default-config", 0xf74000, 0x0b000},
1357 {"user-config", 0xf80000, 0x40000},
1358 {"partition-table", 0xfc0000, 0x10000},
1359 {"log", 0xfd0000, 0x20000},
1360 {"radio", 0xff0000, 0x10000},
1361 {NULL, 0, 0}
1362 },
1363
1364 .first_sysupgrade_partition = "os-image",
1365 .last_sysupgrade_partition = "file-system"
1366 },
1367
1368 /** Firmware layout for the TL-WR902AC v1 */
1369 {
1370 .id = "TL-WR902AC-V1",
1371 .vendor = "",
1372 .support_list =
1373 "SupportList:\n"
1374 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1375 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1376 .support_trail = '\x00',
1377 .soft_ver = NULL,
1378
1379 /**
1380 384KB were moved from file-system to os-image
1381 in comparison to the stock image
1382 */
1383 .partitions = {
1384 {"fs-uboot", 0x00000, 0x20000},
1385 {"firmware", 0x20000, 0x730000},
1386 {"default-mac", 0x750000, 0x00200},
1387 {"pin", 0x750200, 0x00200},
1388 {"product-info", 0x750400, 0x0fc00},
1389 {"soft-version", 0x760000, 0x0b000},
1390 {"support-list", 0x76b000, 0x04000},
1391 {"profile", 0x770000, 0x04000},
1392 {"default-config", 0x774000, 0x0b000},
1393 {"user-config", 0x780000, 0x40000},
1394 {"partition-table", 0x7c0000, 0x10000},
1395 {"log", 0x7d0000, 0x20000},
1396 {"radio", 0x7f0000, 0x10000},
1397 {NULL, 0, 0}
1398 },
1399
1400 .first_sysupgrade_partition = "os-image",
1401 .last_sysupgrade_partition = "file-system",
1402 },
1403
1404 /** Firmware layout for the TL-WR942N V1 */
1405 {
1406 .id = "TLWR942NV1",
1407 .vendor = "",
1408 .support_list =
1409 "SupportList:\r\n"
1410 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1411 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1412 .support_trail = '\x00',
1413 .soft_ver = NULL,
1414
1415 .partitions = {
1416 {"fs-uboot", 0x00000, 0x20000},
1417 {"firmware", 0x20000, 0xe20000},
1418 {"default-mac", 0xe40000, 0x00200},
1419 {"pin", 0xe40200, 0x00200},
1420 {"product-info", 0xe40400, 0x0fc00},
1421 {"partition-table", 0xe50000, 0x10000},
1422 {"soft-version", 0xe60000, 0x10000},
1423 {"support-list", 0xe70000, 0x10000},
1424 {"profile", 0xe80000, 0x10000},
1425 {"default-config", 0xe90000, 0x10000},
1426 {"user-config", 0xea0000, 0x40000},
1427 {"qos-db", 0xee0000, 0x40000},
1428 {"certificate", 0xf20000, 0x10000},
1429 {"usb-config", 0xfb0000, 0x10000},
1430 {"log", 0xfc0000, 0x20000},
1431 {"radio-bk", 0xfe0000, 0x10000},
1432 {"radio", 0xff0000, 0x10000},
1433 {NULL, 0, 0}
1434 },
1435
1436 .first_sysupgrade_partition = "os-image",
1437 .last_sysupgrade_partition = "file-system",
1438 },
1439
1440 /** Firmware layout for the RE350 v1 */
1441 {
1442 .id = "RE350-V1",
1443 .vendor = "",
1444 .support_list =
1445 "SupportList:\n"
1446 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1447 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1448 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1449 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1450 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1451 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1452 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1453 .support_trail = '\x00',
1454 .soft_ver = NULL,
1455
1456 /** We're using a dynamic kernel/rootfs split here */
1457 .partitions = {
1458 {"fs-uboot", 0x00000, 0x20000},
1459 {"firmware", 0x20000, 0x5e0000},
1460 {"partition-table", 0x600000, 0x02000},
1461 {"default-mac", 0x610000, 0x00020},
1462 {"pin", 0x610100, 0x00020},
1463 {"product-info", 0x611100, 0x01000},
1464 {"soft-version", 0x620000, 0x01000},
1465 {"support-list", 0x621000, 0x01000},
1466 {"profile", 0x622000, 0x08000},
1467 {"user-config", 0x630000, 0x10000},
1468 {"default-config", 0x640000, 0x10000},
1469 {"radio", 0x7f0000, 0x10000},
1470 {NULL, 0, 0}
1471 },
1472
1473 .first_sysupgrade_partition = "os-image",
1474 .last_sysupgrade_partition = "file-system"
1475 },
1476
1477 /** Firmware layout for the RE350K v1 */
1478 {
1479 .id = "RE350K-V1",
1480 .vendor = "",
1481 .support_list =
1482 "SupportList:\n"
1483 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
1484 .support_trail = '\x00',
1485 .soft_ver = NULL,
1486
1487 /** We're using a dynamic kernel/rootfs split here */
1488 .partitions = {
1489 {"fs-uboot", 0x00000, 0x20000},
1490 {"firmware", 0x20000, 0xd70000},
1491 {"partition-table", 0xd90000, 0x02000},
1492 {"default-mac", 0xda0000, 0x00020},
1493 {"pin", 0xda0100, 0x00020},
1494 {"product-info", 0xda1100, 0x01000},
1495 {"soft-version", 0xdb0000, 0x01000},
1496 {"support-list", 0xdb1000, 0x01000},
1497 {"profile", 0xdb2000, 0x08000},
1498 {"user-config", 0xdc0000, 0x10000},
1499 {"default-config", 0xdd0000, 0x10000},
1500 {"device-id", 0xde0000, 0x00108},
1501 {"radio", 0xff0000, 0x10000},
1502 {NULL, 0, 0}
1503 },
1504
1505 .first_sysupgrade_partition = "os-image",
1506 .last_sysupgrade_partition = "file-system"
1507 },
1508
1509 /** Firmware layout for the RE355 */
1510 {
1511 .id = "RE355",
1512 .vendor = "",
1513 .support_list =
1514 "SupportList:\r\n"
1515 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
1516 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
1517 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
1518 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
1519 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
1520 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
1521 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
1522 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
1523 .support_trail = '\x00',
1524 .soft_ver = NULL,
1525
1526 /* We're using a dynamic kernel/rootfs split here */
1527 .partitions = {
1528 {"fs-uboot", 0x00000, 0x20000},
1529 {"firmware", 0x20000, 0x5e0000},
1530 {"partition-table", 0x600000, 0x02000},
1531 {"default-mac", 0x610000, 0x00020},
1532 {"pin", 0x610100, 0x00020},
1533 {"product-info", 0x611100, 0x01000},
1534 {"soft-version", 0x620000, 0x01000},
1535 {"support-list", 0x621000, 0x01000},
1536 {"profile", 0x622000, 0x08000},
1537 {"user-config", 0x630000, 0x10000},
1538 {"default-config", 0x640000, 0x10000},
1539 {"radio", 0x7f0000, 0x10000},
1540 {NULL, 0, 0}
1541 },
1542
1543 .first_sysupgrade_partition = "os-image",
1544 .last_sysupgrade_partition = "file-system"
1545 },
1546
1547 /** Firmware layout for the RE450 */
1548 {
1549 .id = "RE450",
1550 .vendor = "",
1551 .support_list =
1552 "SupportList:\r\n"
1553 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
1554 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
1555 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
1556 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
1557 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
1558 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
1559 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
1560 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
1561 .support_trail = '\x00',
1562 .soft_ver = NULL,
1563
1564 /** We're using a dynamic kernel/rootfs split here */
1565 .partitions = {
1566 {"fs-uboot", 0x00000, 0x20000},
1567 {"firmware", 0x20000, 0x5e0000},
1568 {"partition-table", 0x600000, 0x02000},
1569 {"default-mac", 0x610000, 0x00020},
1570 {"pin", 0x610100, 0x00020},
1571 {"product-info", 0x611100, 0x01000},
1572 {"soft-version", 0x620000, 0x01000},
1573 {"support-list", 0x621000, 0x01000},
1574 {"profile", 0x622000, 0x08000},
1575 {"user-config", 0x630000, 0x10000},
1576 {"default-config", 0x640000, 0x10000},
1577 {"radio", 0x7f0000, 0x10000},
1578 {NULL, 0, 0}
1579 },
1580
1581 .first_sysupgrade_partition = "os-image",
1582 .last_sysupgrade_partition = "file-system"
1583 },
1584
1585 /** Firmware layout for the RE450 v2 */
1586 {
1587 .id = "RE450-V2",
1588 .vendor = "",
1589 .support_list =
1590 "SupportList:\r\n"
1591 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
1592 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
1593 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
1594 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
1595 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
1596 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
1597 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
1598 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
1599 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
1600 .support_trail = '\x00',
1601 .soft_ver = NULL,
1602
1603 /* We're using a dynamic kernel/rootfs split here */
1604 .partitions = {
1605 {"fs-uboot", 0x00000, 0x20000},
1606 {"firmware", 0x20000, 0x5e0000},
1607 {"partition-table", 0x600000, 0x02000},
1608 {"default-mac", 0x610000, 0x00020},
1609 {"pin", 0x610100, 0x00020},
1610 {"product-info", 0x611100, 0x01000},
1611 {"soft-version", 0x620000, 0x01000},
1612 {"support-list", 0x621000, 0x01000},
1613 {"profile", 0x622000, 0x08000},
1614 {"user-config", 0x630000, 0x10000},
1615 {"default-config", 0x640000, 0x10000},
1616 {"radio", 0x7f0000, 0x10000},
1617
1618 {NULL, 0, 0}
1619 },
1620
1621 .first_sysupgrade_partition = "os-image",
1622 .last_sysupgrade_partition = "file-system"
1623 },
1624
1625 /** Firmware layout for the RE650 */
1626 {
1627 .id = "RE650-V1",
1628 .vendor = "",
1629 .support_list =
1630 "SupportList:\r\n"
1631 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
1632 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
1633 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
1634 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
1635 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
1636 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
1637 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
1638 .support_trail = '\x00',
1639 .soft_ver = NULL,
1640
1641 /* We're using a dynamic kernel/rootfs split here */
1642 .partitions = {
1643 {"fs-uboot", 0x00000, 0x20000},
1644 {"firmware", 0x20000, 0xde0000},
1645 {"partition-table", 0xe00000, 0x02000},
1646 {"default-mac", 0xe10000, 0x00020},
1647 {"pin", 0xe10100, 0x00020},
1648 {"product-info", 0xe11100, 0x01000},
1649 {"soft-version", 0xe20000, 0x01000},
1650 {"support-list", 0xe21000, 0x01000},
1651 {"profile", 0xe22000, 0x08000},
1652 {"user-config", 0xe30000, 0x10000},
1653 {"default-config", 0xe40000, 0x10000},
1654 {"radio", 0xff0000, 0x10000},
1655 {NULL, 0, 0}
1656 },
1657
1658 .first_sysupgrade_partition = "os-image",
1659 .last_sysupgrade_partition = "file-system"
1660 },
1661
1662 {}
1663 };
1664
1665 #define error(_ret, _errno, _str, ...) \
1666 do { \
1667 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
1668 strerror(_errno)); \
1669 if (_ret) \
1670 exit(_ret); \
1671 } while (0)
1672
1673
1674 /** Stores a uint32 as big endian */
1675 static inline void put32(uint8_t *buf, uint32_t val) {
1676 buf[0] = val >> 24;
1677 buf[1] = val >> 16;
1678 buf[2] = val >> 8;
1679 buf[3] = val;
1680 }
1681
1682 /** Allocates a new image partition */
1683 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
1684 struct image_partition_entry entry = {name, len, malloc(len)};
1685 if (!entry.data)
1686 error(1, errno, "malloc");
1687
1688 return entry;
1689 }
1690
1691 /** Frees an image partition */
1692 static void free_image_partition(struct image_partition_entry entry) {
1693 free(entry.data);
1694 }
1695
1696 static time_t source_date_epoch = -1;
1697 static void set_source_date_epoch() {
1698 char *env = getenv("SOURCE_DATE_EPOCH");
1699 char *endptr = env;
1700 errno = 0;
1701 if (env && *env) {
1702 source_date_epoch = strtoull(env, &endptr, 10);
1703 if (errno || (endptr && *endptr != '\0')) {
1704 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
1705 exit(1);
1706 }
1707 }
1708 }
1709
1710 /** Generates the partition-table partition */
1711 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
1712 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
1713
1714 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
1715
1716 *(s++) = 0x00;
1717 *(s++) = 0x04;
1718 *(s++) = 0x00;
1719 *(s++) = 0x00;
1720
1721 size_t i;
1722 for (i = 0; p[i].name; i++) {
1723 size_t len = end-s;
1724 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
1725
1726 if (w > len-1)
1727 error(1, 0, "flash partition table overflow?");
1728
1729 s += w;
1730 }
1731
1732 s++;
1733
1734 memset(s, 0xff, end-s);
1735
1736 return entry;
1737 }
1738
1739
1740 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
1741 static inline uint8_t bcd(uint8_t v) {
1742 return 0x10 * (v/10) + v%10;
1743 }
1744
1745
1746 /** Generates the soft-version partition */
1747 static struct image_partition_entry make_soft_version(uint32_t rev) {
1748 struct image_partition_entry entry = alloc_image_partition("soft-version", sizeof(struct soft_version));
1749 struct soft_version *s = (struct soft_version *)entry.data;
1750
1751 time_t t;
1752
1753 if (source_date_epoch != -1)
1754 t = source_date_epoch;
1755 else if (time(&t) == (time_t)(-1))
1756 error(1, errno, "time");
1757
1758 struct tm *tm = localtime(&t);
1759
1760 s->magic = htonl(0x0000000c);
1761 s->zero = 0;
1762 s->pad1 = 0xff;
1763
1764 s->version_major = 0;
1765 s->version_minor = 0;
1766 s->version_patch = 0;
1767
1768 s->year_hi = bcd((1900+tm->tm_year)/100);
1769 s->year_lo = bcd(tm->tm_year%100);
1770 s->month = bcd(tm->tm_mon+1);
1771 s->day = bcd(tm->tm_mday);
1772 s->rev = htonl(rev);
1773
1774 s->pad2 = 0xff;
1775
1776 return entry;
1777 }
1778
1779 static struct image_partition_entry make_soft_version_from_string(const char *soft_ver) {
1780 /** String length _including_ the terminating zero byte */
1781 uint32_t ver_len = strlen(soft_ver) + 1;
1782 /** Partition contains 64 bit header, the version string, and one additional null byte */
1783 size_t partition_len = 2*sizeof(uint32_t) + ver_len + 1;
1784 struct image_partition_entry entry = alloc_image_partition("soft-version", partition_len);
1785
1786 uint32_t *len = (uint32_t *)entry.data;
1787 len[0] = htonl(ver_len);
1788 len[1] = 0;
1789 memcpy(&len[2], soft_ver, ver_len);
1790
1791 entry.data[partition_len - 1] = 0;
1792
1793 return entry;
1794 }
1795
1796 /** Generates the support-list partition */
1797 static struct image_partition_entry make_support_list(struct device_info *info) {
1798 size_t len = strlen(info->support_list);
1799 struct image_partition_entry entry = alloc_image_partition("support-list", len + 9);
1800
1801 put32(entry.data, len);
1802 memset(entry.data+4, 0, 4);
1803 memcpy(entry.data+8, info->support_list, len);
1804 entry.data[len+8] = info->support_trail;
1805
1806 return entry;
1807 }
1808
1809 /** Creates a new image partition with an arbitrary name from a file */
1810 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
1811 struct stat statbuf;
1812
1813 if (stat(filename, &statbuf) < 0)
1814 error(1, errno, "unable to stat file `%s'", filename);
1815
1816 size_t len = statbuf.st_size;
1817
1818 if (add_jffs2_eof) {
1819 if (file_system_partition)
1820 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
1821 else
1822 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
1823 }
1824
1825 struct image_partition_entry entry = alloc_image_partition(part_name, len);
1826
1827 FILE *file = fopen(filename, "rb");
1828 if (!file)
1829 error(1, errno, "unable to open file `%s'", filename);
1830
1831 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
1832 error(1, errno, "unable to read file `%s'", filename);
1833
1834 if (add_jffs2_eof) {
1835 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
1836
1837 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
1838 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
1839 }
1840
1841 fclose(file);
1842
1843 return entry;
1844 }
1845
1846 /** Creates a new image partition from arbitrary data */
1847 static struct image_partition_entry put_data(const char *part_name, const char *datain, size_t len) {
1848
1849 struct image_partition_entry entry = alloc_image_partition(part_name, len);
1850
1851 memcpy(entry.data, datain, len);
1852
1853 return entry;
1854 }
1855
1856 /**
1857 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
1858
1859 Example image partition table:
1860
1861 fwup-ptn partition-table base 0x00800 size 0x00800
1862 fwup-ptn os-image base 0x01000 size 0x113b45
1863 fwup-ptn file-system base 0x114b45 size 0x1d0004
1864 fwup-ptn support-list base 0x2e4b49 size 0x000d1
1865
1866 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
1867 the end of the partition table is marked with a zero byte.
1868
1869 The firmware image must contain at least the partition-table and support-list partitions
1870 to be accepted. There aren't any alignment constraints for the image partitions.
1871
1872 The partition-table partition contains the actual flash layout; partitions
1873 from the image partition table are mapped to the corresponding flash partitions during
1874 the firmware upgrade. The support-list partition contains a list of devices supported by
1875 the firmware image.
1876
1877 The base offsets in the firmware partition table are relative to the end
1878 of the vendor information block, so the partition-table partition will
1879 actually start at offset 0x1814 of the image.
1880
1881 I think partition-table must be the first partition in the firmware image.
1882 */
1883 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
1884 size_t i, j;
1885 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
1886
1887 size_t base = 0x800;
1888 for (i = 0; parts[i].name; i++) {
1889 for (j = 0; flash_parts[j].name; j++) {
1890 if (!strcmp(flash_parts[j].name, parts[i].name)) {
1891 if (parts[i].size > flash_parts[j].size)
1892 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
1893 break;
1894 }
1895 }
1896
1897 assert(flash_parts[j].name);
1898
1899 memcpy(buffer + base, parts[i].data, parts[i].size);
1900
1901 size_t len = end-image_pt;
1902 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
1903
1904 if (w > len-1)
1905 error(1, 0, "image partition table overflow?");
1906
1907 image_pt += w;
1908
1909 base += parts[i].size;
1910 }
1911 }
1912
1913 /** Generates and writes the image MD5 checksum */
1914 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
1915 MD5_CTX ctx;
1916
1917 MD5_Init(&ctx);
1918 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
1919 MD5_Update(&ctx, buffer, len);
1920 MD5_Final(md5, &ctx);
1921 }
1922
1923
1924 /**
1925 Generates the firmware image in factory format
1926
1927 Image format:
1928
1929 Bytes (hex) Usage
1930 ----------- -----
1931 0000-0003 Image size (4 bytes, big endian)
1932 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
1933 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
1934 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
1935 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
1936 1014-1813 Image partition table (2048 bytes, padded with 0xff)
1937 1814-xxxx Firmware partitions
1938 */
1939 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
1940 *len = 0x1814;
1941
1942 size_t i;
1943 for (i = 0; parts[i].name; i++)
1944 *len += parts[i].size;
1945
1946 uint8_t *image = malloc(*len);
1947 if (!image)
1948 error(1, errno, "malloc");
1949
1950 memset(image, 0xff, *len);
1951 put32(image, *len);
1952
1953 if (info->vendor) {
1954 size_t vendor_len = strlen(info->vendor);
1955 put32(image+0x14, vendor_len);
1956 memcpy(image+0x18, info->vendor, vendor_len);
1957 }
1958
1959 put_partitions(image + 0x1014, info->partitions, parts);
1960 put_md5(image+0x04, image+0x14, *len-0x14);
1961
1962 return image;
1963 }
1964
1965 /**
1966 Generates the firmware image in sysupgrade format
1967
1968 This makes some assumptions about the provided flash and image partition tables and
1969 should be generalized when TP-LINK starts building its safeloader into hardware with
1970 different flash layouts.
1971 */
1972 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
1973 size_t i, j;
1974 size_t flash_first_partition_index = 0;
1975 size_t flash_last_partition_index = 0;
1976 const struct flash_partition_entry *flash_first_partition = NULL;
1977 const struct flash_partition_entry *flash_last_partition = NULL;
1978 const struct image_partition_entry *image_last_partition = NULL;
1979
1980 /** Find first and last partitions */
1981 for (i = 0; info->partitions[i].name; i++) {
1982 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
1983 flash_first_partition = &info->partitions[i];
1984 flash_first_partition_index = i;
1985 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
1986 flash_last_partition = &info->partitions[i];
1987 flash_last_partition_index = i;
1988 }
1989 }
1990
1991 assert(flash_first_partition && flash_last_partition);
1992 assert(flash_first_partition_index < flash_last_partition_index);
1993
1994 /** Find last partition from image to calculate needed size */
1995 for (i = 0; image_parts[i].name; i++) {
1996 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
1997 image_last_partition = &image_parts[i];
1998 break;
1999 }
2000 }
2001
2002 assert(image_last_partition);
2003
2004 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2005
2006 uint8_t *image = malloc(*len);
2007 if (!image)
2008 error(1, errno, "malloc");
2009
2010 memset(image, 0xff, *len);
2011
2012 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2013 for (j = 0; image_parts[j].name; j++) {
2014 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2015 if (image_parts[j].size > info->partitions[i].size)
2016 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2017 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2018 break;
2019 }
2020
2021 assert(image_parts[j].name);
2022 }
2023 }
2024
2025 return image;
2026 }
2027
2028 /** Generates an image according to a given layout and writes it to a file */
2029 static void build_image(const char *output,
2030 const char *kernel_image,
2031 const char *rootfs_image,
2032 uint32_t rev,
2033 bool add_jffs2_eof,
2034 bool sysupgrade,
2035 struct device_info *info) {
2036
2037 size_t i;
2038
2039 struct image_partition_entry parts[7] = {};
2040
2041 struct flash_partition_entry *firmware_partition = NULL;
2042 struct flash_partition_entry *os_image_partition = NULL;
2043 struct flash_partition_entry *file_system_partition = NULL;
2044 size_t firmware_partition_index = 0;
2045
2046 for (i = 0; info->partitions[i].name; i++) {
2047 if (!strcmp(info->partitions[i].name, "firmware"))
2048 {
2049 firmware_partition = &info->partitions[i];
2050 firmware_partition_index = i;
2051 }
2052 }
2053
2054 if (firmware_partition)
2055 {
2056 os_image_partition = &info->partitions[firmware_partition_index];
2057 file_system_partition = &info->partitions[firmware_partition_index + 1];
2058
2059 struct stat kernel;
2060 if (stat(kernel_image, &kernel) < 0)
2061 error(1, errno, "unable to stat file `%s'", kernel_image);
2062
2063 if (kernel.st_size > firmware_partition->size)
2064 error(1, 0, "kernel overflowed firmware partition\n");
2065
2066 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2067 info->partitions[i+1] = info->partitions[i];
2068
2069 file_system_partition->name = "file-system";
2070 file_system_partition->base = firmware_partition->base + kernel.st_size;
2071
2072 /* Align partition start to erase blocks for factory images only */
2073 if (!sysupgrade)
2074 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2075
2076 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2077
2078 os_image_partition->name = "os-image";
2079 os_image_partition->size = kernel.st_size;
2080 }
2081
2082 parts[0] = make_partition_table(info->partitions);
2083 if (info->soft_ver)
2084 parts[1] = make_soft_version_from_string(info->soft_ver);
2085 else
2086 parts[1] = make_soft_version(rev);
2087
2088 parts[2] = make_support_list(info);
2089 parts[3] = read_file("os-image", kernel_image, false, NULL);
2090 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2091
2092 /* Some devices need the extra-para partition to accept the firmware */
2093 if (strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2094 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2095 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2096 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2097 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2098 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
2099 parts[5] = put_data("extra-para", mdat, 11);
2100 } else if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 || strcasecmp(info->id, "ARCHER-C7-V4") == 0 || strcasecmp(info->id, "ARCHER-C7-V5") == 0) {
2101 const char mdat[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
2102 parts[5] = put_data("extra-para", mdat, 11);
2103 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2104 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00};
2105 parts[5] = put_data("extra-para", mdat, 11);
2106 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0) {
2107 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x00};
2108 parts[5] = put_data("extra-para", mdat, 11);
2109 }
2110
2111 size_t len;
2112 void *image;
2113 if (sysupgrade)
2114 image = generate_sysupgrade_image(info, parts, &len);
2115 else
2116 image = generate_factory_image(info, parts, &len);
2117
2118 FILE *file = fopen(output, "wb");
2119 if (!file)
2120 error(1, errno, "unable to open output file");
2121
2122 if (fwrite(image, len, 1, file) != 1)
2123 error(1, 0, "unable to write output file");
2124
2125 fclose(file);
2126
2127 free(image);
2128
2129 for (i = 0; parts[i].name; i++)
2130 free_image_partition(parts[i]);
2131 }
2132
2133 /** Usage output */
2134 static void usage(const char *argv0) {
2135 fprintf(stderr,
2136 "Usage: %s [OPTIONS...]\n"
2137 "\n"
2138 "Options:\n"
2139 " -h show this help\n"
2140 "\n"
2141 "Create a new image:\n"
2142 " -B <board> create image for the board specified with <board>\n"
2143 " -k <file> read kernel image from the file <file>\n"
2144 " -r <file> read rootfs image from the file <file>\n"
2145 " -o <file> write output to the file <file>\n"
2146 " -V <rev> sets the revision number to <rev>\n"
2147 " -j add jffs2 end-of-filesystem markers\n"
2148 " -S create sysupgrade instead of factory image\n"
2149 "Extract an old image:\n"
2150 " -x <file> extract all oem firmware partition\n"
2151 " -d <dir> destination to extract the firmware partition\n"
2152 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2153 argv0
2154 );
2155 };
2156
2157
2158 static struct device_info *find_board(const char *id)
2159 {
2160 struct device_info *board = NULL;
2161
2162 for (board = boards; board->id != NULL; board++)
2163 if (strcasecmp(id, board->id) == 0)
2164 return board;
2165
2166 return NULL;
2167 }
2168
2169 static int add_flash_partition(
2170 struct flash_partition_entry *part_list,
2171 size_t max_entries,
2172 const char *name,
2173 unsigned long base,
2174 unsigned long size)
2175 {
2176 size_t ptr;
2177 /* check if the list has a free entry */
2178 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2179 if (part_list->name == NULL &&
2180 part_list->base == 0 &&
2181 part_list->size == 0)
2182 break;
2183 }
2184
2185 if (ptr == max_entries) {
2186 error(1, 0, "No free flash part entry available.");
2187 }
2188
2189 part_list->name = calloc(1, strlen(name) + 1);
2190 if (!part_list->name) {
2191 error(1, 0, "Unable to allocate memory");
2192 }
2193
2194 memcpy((char *)part_list->name, name, strlen(name));
2195 part_list->base = base;
2196 part_list->size = size;
2197
2198 return 0;
2199 }
2200
2201 /** read the partition table into struct flash_partition_entry */
2202 static int read_partition_table(
2203 FILE *file, long offset,
2204 struct flash_partition_entry *entries, size_t max_entries,
2205 int type)
2206 {
2207 char buf[2048];
2208 char *ptr, *end;
2209 const char *parthdr = NULL;
2210 const char *fwuphdr = "fwup-ptn";
2211 const char *flashhdr = "partition";
2212
2213 /* TODO: search for the partition table */
2214
2215 switch(type) {
2216 case 0:
2217 parthdr = fwuphdr;
2218 break;
2219 case 1:
2220 parthdr = flashhdr;
2221 break;
2222 default:
2223 error(1, 0, "Invalid partition table");
2224 }
2225
2226 if (fseek(file, offset, SEEK_SET) < 0)
2227 error(1, errno, "Can not seek in the firmware");
2228
2229 if (fread(buf, 2048, 1, file) != 1)
2230 error(1, errno, "Can not read fwup-ptn from the firmware");
2231
2232 buf[2047] = '\0';
2233
2234 /* look for the partition header */
2235 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2236 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2237 return 1;
2238 }
2239
2240 ptr = buf;
2241 end = buf + sizeof(buf);
2242 while ((ptr + strlen(parthdr)) < end &&
2243 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2244 char *end_part;
2245 char *end_element;
2246
2247 char name[32] = { 0 };
2248 int name_len = 0;
2249 unsigned long base = 0;
2250 unsigned long size = 0;
2251
2252 end_part = memchr(ptr, '\n', (end - ptr));
2253 if (end_part == NULL) {
2254 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2255 break;
2256 }
2257
2258 for (int i = 0; i <= 4; i++) {
2259 if (end_part <= ptr)
2260 break;
2261
2262 end_element = memchr(ptr, 0x20, (end_part - ptr));
2263 if (end_element == NULL) {
2264 error(1, errno, "Ignoring the rest of the partition entries.");
2265 break;
2266 }
2267
2268 switch (i) {
2269 /* partition header */
2270 case 0:
2271 ptr = end_element + 1;
2272 continue;
2273 /* name */
2274 case 1:
2275 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
2276 strncpy(name, ptr, name_len);
2277 name[name_len] = '\0';
2278 ptr = end_element + 1;
2279 continue;
2280
2281 /* string "base" */
2282 case 2:
2283 ptr = end_element + 1;
2284 continue;
2285
2286 /* actual base */
2287 case 3:
2288 base = strtoul(ptr, NULL, 16);
2289 ptr = end_element + 1;
2290 continue;
2291
2292 /* string "size" */
2293 case 4:
2294 ptr = end_element + 1;
2295 /* actual size. The last element doesn't have a sepeartor */
2296 size = strtoul(ptr, NULL, 16);
2297 /* the part ends with 0x09, 0x0d, 0x0a */
2298 ptr = end_part + 1;
2299 add_flash_partition(entries, max_entries, name, base, size);
2300 continue;
2301 }
2302 }
2303 }
2304
2305 return 0;
2306 }
2307
2308 static void write_partition(
2309 FILE *input_file,
2310 size_t firmware_offset,
2311 struct flash_partition_entry *entry,
2312 FILE *output_file)
2313 {
2314 char buf[4096];
2315 size_t offset;
2316
2317 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
2318
2319 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
2320 if (fread(buf, sizeof(buf), 1, input_file) != 1)
2321 error(1, errno, "Can not read partition from input_file");
2322
2323 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2324 error(1, errno, "Can not write partition to output_file");
2325 }
2326 /* write last chunk smaller than buffer */
2327 if (offset < entry->size) {
2328 offset = entry->size - offset;
2329 if (fread(buf, offset, 1, input_file) != 1)
2330 error(1, errno, "Can not read partition from input_file");
2331 if (fwrite(buf, offset, 1, output_file) != 1)
2332 error(1, errno, "Can not write partition to output_file");
2333 }
2334 }
2335
2336 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
2337 {
2338 FILE *output_file;
2339 char output[PATH_MAX];
2340
2341 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
2342 output_file = fopen(output, "wb+");
2343 if (output_file == NULL) {
2344 error(1, errno, "Can not open output file %s", output);
2345 }
2346
2347 write_partition(input_file, firmware_offset, entry, output_file);
2348
2349 fclose(output_file);
2350
2351 return 0;
2352 }
2353
2354 /** extract all partitions from the firmware file */
2355 static int extract_firmware(const char *input, const char *output_directory)
2356 {
2357 struct flash_partition_entry entries[16] = { 0 };
2358 size_t max_entries = 16;
2359 size_t firmware_offset = 0x1014;
2360 FILE *input_file;
2361
2362 struct stat statbuf;
2363
2364 /* check input file */
2365 if (stat(input, &statbuf)) {
2366 error(1, errno, "Can not read input firmware %s", input);
2367 }
2368
2369 /* check if output directory exists */
2370 if (stat(output_directory, &statbuf)) {
2371 error(1, errno, "Failed to stat output directory %s", output_directory);
2372 }
2373
2374 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
2375 error(1, errno, "Given output directory is not a directory %s", output_directory);
2376 }
2377
2378 input_file = fopen(input, "rb");
2379
2380 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
2381 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2382 }
2383
2384 for (size_t i = 0; i < max_entries; i++) {
2385 if (entries[i].name == NULL &&
2386 entries[i].base == 0 &&
2387 entries[i].size == 0)
2388 continue;
2389
2390 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
2391 }
2392
2393 return 0;
2394 }
2395
2396 static struct flash_partition_entry *find_partition(
2397 struct flash_partition_entry *entries, size_t max_entries,
2398 const char *name, const char *error_msg)
2399 {
2400 for (size_t i = 0; i < max_entries; i++, entries++) {
2401 if (strcmp(entries->name, name) == 0)
2402 return entries;
2403 }
2404
2405 error(1, 0, "%s", error_msg);
2406 return NULL;
2407 }
2408
2409 static void write_ff(FILE *output_file, size_t size)
2410 {
2411 char buf[4096];
2412 size_t offset;
2413
2414 memset(buf, 0xff, sizeof(buf));
2415
2416 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
2417 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2418 error(1, errno, "Can not write 0xff to output_file");
2419 }
2420
2421 /* write last chunk smaller than buffer */
2422 if (offset < size) {
2423 offset = size - offset;
2424 if (fwrite(buf, offset, 1, output_file) != 1)
2425 error(1, errno, "Can not write partition to output_file");
2426 }
2427 }
2428
2429 static void convert_firmware(const char *input, const char *output)
2430 {
2431 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
2432 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
2433 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
2434 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
2435 struct flash_partition_entry *fwup_partition_table = NULL;
2436 size_t firmware_offset = 0x1014;
2437 FILE *input_file, *output_file;
2438
2439 struct stat statbuf;
2440
2441 /* check input file */
2442 if (stat(input, &statbuf)) {
2443 error(1, errno, "Can not read input firmware %s", input);
2444 }
2445
2446 input_file = fopen(input, "rb");
2447 if (!input_file)
2448 error(1, 0, "Can not open input firmware %s", input);
2449
2450 output_file = fopen(output, "wb");
2451 if (!output_file)
2452 error(1, 0, "Can not open output firmware %s", output);
2453
2454 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
2455 error(1, 0, "Error can not read the partition table (fwup-ptn)");
2456 }
2457
2458 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
2459 "os-image", "Error can not find os-image partition (fwup)");
2460 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
2461 "file-system", "Error can not find file-system partition (fwup)");
2462 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
2463 "partition-table", "Error can not find partition-table partition");
2464
2465 /* the flash partition table has a 0x00000004 magic haeder */
2466 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
2467 error(1, 0, "Error can not read the partition table (flash)");
2468
2469 flash_os_image = find_partition(flash, MAX_PARTITIONS,
2470 "os-image", "Error can not find os-image partition (flash)");
2471 flash_file_system = find_partition(flash, MAX_PARTITIONS,
2472 "file-system", "Error can not find file-system partition (flash)");
2473
2474 /* write os_image to 0x0 */
2475 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
2476 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
2477
2478 /* write file-system behind os_image */
2479 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
2480 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
2481 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
2482
2483 fclose(output_file);
2484 fclose(input_file);
2485 }
2486
2487 int main(int argc, char *argv[]) {
2488 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
2489 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
2490 bool add_jffs2_eof = false, sysupgrade = false;
2491 unsigned rev = 0;
2492 struct device_info *info;
2493 set_source_date_epoch();
2494
2495 while (true) {
2496 int c;
2497
2498 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
2499 if (c == -1)
2500 break;
2501
2502 switch (c) {
2503 case 'B':
2504 board = optarg;
2505 break;
2506
2507 case 'k':
2508 kernel_image = optarg;
2509 break;
2510
2511 case 'r':
2512 rootfs_image = optarg;
2513 break;
2514
2515 case 'o':
2516 output = optarg;
2517 break;
2518
2519 case 'V':
2520 sscanf(optarg, "r%u", &rev);
2521 break;
2522
2523 case 'j':
2524 add_jffs2_eof = true;
2525 break;
2526
2527 case 'S':
2528 sysupgrade = true;
2529 break;
2530
2531 case 'h':
2532 usage(argv[0]);
2533 return 0;
2534
2535 case 'd':
2536 output_directory = optarg;
2537 break;
2538
2539 case 'x':
2540 extract_image = optarg;
2541 break;
2542
2543 case 'z':
2544 convert_image = optarg;
2545 break;
2546
2547 default:
2548 usage(argv[0]);
2549 return 1;
2550 }
2551 }
2552
2553 if (extract_image || output_directory) {
2554 if (!extract_image)
2555 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
2556 if (!output_directory)
2557 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
2558 extract_firmware(extract_image, output_directory);
2559 } else if (convert_image) {
2560 if (!output)
2561 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
2562 convert_firmware(convert_image, output);
2563 } else {
2564 if (!board)
2565 error(1, 0, "no board has been specified");
2566 if (!kernel_image)
2567 error(1, 0, "no kernel image has been specified");
2568 if (!rootfs_image)
2569 error(1, 0, "no rootfs image has been specified");
2570 if (!output)
2571 error(1, 0, "no output filename has been specified");
2572
2573 info = find_board(board);
2574
2575 if (info == NULL)
2576 error(1, 0, "unsupported board %s", board);
2577
2578 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
2579 }
2580
2581 return 0;
2582 }