tplink-safeloader: fix product_name of TP-Link AD7200
[openwrt/openwrt.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Partition trailing padding definitions
74 * Values 0x00 to 0xff are reserved to indicate the padding value
75 * Values from 0x100 are reserved to indicate other behaviour */
76 enum partition_trail_value {
77 PART_TRAIL_00 = 0x00,
78 PART_TRAIL_FF = 0xff,
79 PART_TRAIL_MAX = 0xff,
80 PART_TRAIL_NONE = 0x100
81 };
82
83 /** Firmware layout description */
84 struct device_info {
85 const char *id;
86 const char *vendor;
87 const char *support_list;
88 enum partition_trail_value part_trail;
89 const char *soft_ver;
90 uint32_t soft_ver_compat_level;
91 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
92 const char *first_sysupgrade_partition;
93 const char *last_sysupgrade_partition;
94 };
95
96 struct __attribute__((__packed__)) meta_header {
97 uint32_t length;
98 uint32_t zero;
99 };
100
101 /** The content of the soft-version structure */
102 struct __attribute__((__packed__)) soft_version {
103 uint8_t pad1;
104 uint8_t version_major;
105 uint8_t version_minor;
106 uint8_t version_patch;
107 uint8_t year_hi;
108 uint8_t year_lo;
109 uint8_t month;
110 uint8_t day;
111 uint32_t rev;
112 uint32_t compat_level;
113 };
114
115
116 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
117
118
119 /**
120 Salt for the MD5 hash
121
122 Fortunately, TP-LINK seems to use the same salt for most devices which use
123 the new image format.
124 */
125 static const uint8_t md5_salt[16] = {
126 0x7a, 0x2b, 0x15, 0xed,
127 0x9b, 0x98, 0x59, 0x6d,
128 0xe5, 0x04, 0xab, 0x44,
129 0xac, 0x2a, 0x9f, 0x4e,
130 };
131
132
133 /** Firmware layout table */
134 static struct device_info boards[] = {
135 /** Firmware layout for the CPE210/220 V1 */
136 {
137 .id = "CPE210",
138 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
139 .support_list =
140 "SupportList:\r\n"
141 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
142 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
143 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
144 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
145 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
146 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
147 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
148 .part_trail = 0xff,
149 .soft_ver = NULL,
150
151 .partitions = {
152 {"fs-uboot", 0x00000, 0x20000},
153 {"partition-table", 0x20000, 0x02000},
154 {"default-mac", 0x30000, 0x00020},
155 {"product-info", 0x31100, 0x00100},
156 {"signature", 0x32000, 0x00400},
157 {"os-image", 0x40000, 0x300000},
158 {"file-system", 0x340000, 0x470000},
159 {"soft-version", 0x7b0000, 0x00100},
160 {"support-list", 0x7b1000, 0x00400},
161 {"user-config", 0x7c0000, 0x10000},
162 {"default-config", 0x7d0000, 0x10000},
163 {"log", 0x7e0000, 0x10000},
164 {"radio", 0x7f0000, 0x10000},
165 {NULL, 0, 0}
166 },
167
168 .first_sysupgrade_partition = "os-image",
169 .last_sysupgrade_partition = "support-list",
170 },
171
172 /** Firmware layout for the CPE210 V2 */
173 {
174 .id = "CPE210V2",
175 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
176 .support_list =
177 "SupportList:\r\n"
178 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
179 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
180 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
181 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
182 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
183 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
184 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
185 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
186 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
187 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
188 .part_trail = 0xff,
189 .soft_ver = NULL,
190
191 .partitions = {
192 {"fs-uboot", 0x00000, 0x20000},
193 {"partition-table", 0x20000, 0x02000},
194 {"default-mac", 0x30000, 0x00020},
195 {"product-info", 0x31100, 0x00100},
196 {"device-info", 0x31400, 0x00400},
197 {"signature", 0x32000, 0x00400},
198 {"device-id", 0x33000, 0x00100},
199 {"firmware", 0x40000, 0x770000},
200 {"soft-version", 0x7b0000, 0x00100},
201 {"support-list", 0x7b1000, 0x01000},
202 {"user-config", 0x7c0000, 0x10000},
203 {"default-config", 0x7d0000, 0x10000},
204 {"log", 0x7e0000, 0x10000},
205 {"radio", 0x7f0000, 0x10000},
206 {NULL, 0, 0}
207 },
208
209 .first_sysupgrade_partition = "os-image",
210 .last_sysupgrade_partition = "support-list",
211 },
212
213 /** Firmware layout for the CPE210 V3 */
214 {
215 .id = "CPE210V3",
216 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
217 .support_list =
218 "SupportList:\r\n"
219 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
220 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
221 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
222 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
223 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
224 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
225 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
226 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
227 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
228 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
229 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
230 .part_trail = 0xff,
231 .soft_ver = NULL,
232
233 .partitions = {
234 {"fs-uboot", 0x00000, 0x20000},
235 {"partition-table", 0x20000, 0x01000},
236 {"default-mac", 0x30000, 0x00020},
237 {"product-info", 0x31100, 0x00100},
238 {"device-info", 0x31400, 0x00400},
239 {"signature", 0x32000, 0x00400},
240 {"device-id", 0x33000, 0x00100},
241 {"firmware", 0x40000, 0x770000},
242 {"soft-version", 0x7b0000, 0x00100},
243 {"support-list", 0x7b1000, 0x01000},
244 {"user-config", 0x7c0000, 0x10000},
245 {"default-config", 0x7d0000, 0x10000},
246 {"log", 0x7e0000, 0x10000},
247 {"radio", 0x7f0000, 0x10000},
248 {NULL, 0, 0}
249 },
250
251 .first_sysupgrade_partition = "os-image",
252 .last_sysupgrade_partition = "support-list",
253 },
254
255 /** Firmware layout for the CPE220 V2 */
256 {
257 .id = "CPE220V2",
258 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
259 .support_list =
260 "SupportList:\r\n"
261 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
262 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
263 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
264 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
265 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
266 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
267 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
268 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
269 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
270 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
271 .part_trail = 0xff,
272 .soft_ver = NULL,
273
274 .partitions = {
275 {"fs-uboot", 0x00000, 0x20000},
276 {"partition-table", 0x20000, 0x02000},
277 {"default-mac", 0x30000, 0x00020},
278 {"product-info", 0x31100, 0x00100},
279 {"signature", 0x32000, 0x00400},
280 {"os-image", 0x40000, 0x300000},
281 {"file-system", 0x340000, 0x470000},
282 {"soft-version", 0x7b0000, 0x00100},
283 {"support-list", 0x7b1000, 0x00400},
284 {"user-config", 0x7c0000, 0x10000},
285 {"default-config", 0x7d0000, 0x10000},
286 {"log", 0x7e0000, 0x10000},
287 {"radio", 0x7f0000, 0x10000},
288 {NULL, 0, 0}
289 },
290
291 .first_sysupgrade_partition = "os-image",
292 .last_sysupgrade_partition = "support-list",
293 },
294
295 /** Firmware layout for the CPE220 V3 */
296 {
297 .id = "CPE220V3",
298 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
299 .support_list =
300 "SupportList:\r\n"
301 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
302 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
303 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
304 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
305 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
306 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
307 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
308 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
309 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
310 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
311 .part_trail = 0xff,
312 .soft_ver = NULL,
313
314 .partitions = {
315 {"fs-uboot", 0x00000, 0x20000},
316 {"partition-table", 0x20000, 0x02000},
317 {"default-mac", 0x30000, 0x00020},
318 {"product-info", 0x31100, 0x00100},
319 {"device-info", 0x31400, 0x00400},
320 {"signature", 0x32000, 0x00400},
321 {"device-id", 0x33000, 0x00100},
322 {"firmware", 0x40000, 0x770000},
323 {"soft-version", 0x7b0000, 0x00100},
324 {"support-list", 0x7b1000, 0x01000},
325 {"user-config", 0x7c0000, 0x10000},
326 {"default-config", 0x7d0000, 0x10000},
327 {"log", 0x7e0000, 0x10000},
328 {"radio", 0x7f0000, 0x10000},
329 {NULL, 0, 0}
330 },
331
332 .first_sysupgrade_partition = "os-image",
333 .last_sysupgrade_partition = "support-list",
334 },
335
336 /** Firmware layout for the CPE510/520 V1 */
337 {
338 .id = "CPE510",
339 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
340 .support_list =
341 "SupportList:\r\n"
342 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
343 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
344 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
345 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
346 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
347 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
348 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
349 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
350 .part_trail = 0xff,
351 .soft_ver = NULL,
352
353 .partitions = {
354 {"fs-uboot", 0x00000, 0x20000},
355 {"partition-table", 0x20000, 0x02000},
356 {"default-mac", 0x30000, 0x00020},
357 {"product-info", 0x31100, 0x00100},
358 {"signature", 0x32000, 0x00400},
359 {"os-image", 0x40000, 0x300000},
360 {"file-system", 0x340000, 0x470000},
361 {"soft-version", 0x7b0000, 0x00100},
362 {"support-list", 0x7b1000, 0x00400},
363 {"user-config", 0x7c0000, 0x10000},
364 {"default-config", 0x7d0000, 0x10000},
365 {"log", 0x7e0000, 0x10000},
366 {"radio", 0x7f0000, 0x10000},
367 {NULL, 0, 0}
368 },
369
370 .first_sysupgrade_partition = "os-image",
371 .last_sysupgrade_partition = "support-list",
372 },
373
374 /** Firmware layout for the CPE510 V2 */
375 {
376 .id = "CPE510V2",
377 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
378 .support_list =
379 "SupportList:\r\n"
380 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
381 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
382 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
383 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
384 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
385 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
386 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
387 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
388 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
389 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
390 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
391 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
392 .part_trail = 0xff,
393 .soft_ver = NULL,
394
395 .partitions = {
396 {"fs-uboot", 0x00000, 0x20000},
397 {"partition-table", 0x20000, 0x02000},
398 {"default-mac", 0x30000, 0x00020},
399 {"product-info", 0x31100, 0x00100},
400 {"signature", 0x32000, 0x00400},
401 {"os-image", 0x40000, 0x300000},
402 {"file-system", 0x340000, 0x470000},
403 {"soft-version", 0x7b0000, 0x00100},
404 {"support-list", 0x7b1000, 0x00400},
405 {"user-config", 0x7c0000, 0x10000},
406 {"default-config", 0x7d0000, 0x10000},
407 {"log", 0x7e0000, 0x10000},
408 {"radio", 0x7f0000, 0x10000},
409 {NULL, 0, 0}
410 },
411
412 .first_sysupgrade_partition = "os-image",
413 .last_sysupgrade_partition = "support-list",
414 },
415
416 /** Firmware layout for the CPE510 V3 */
417 {
418 .id = "CPE510V3",
419 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
420 .support_list =
421 "SupportList:\r\n"
422 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
423 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
424 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
425 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
426 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
427 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
428 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
429 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
430 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
431 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
432 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
433 "CPE510(TP-LINK|US|N300-5):3.0\r\n"
434 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n"
435 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
436 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
437 .part_trail = 0xff,
438 .soft_ver = NULL,
439
440 .partitions = {
441 {"fs-uboot", 0x00000, 0x20000},
442 {"partition-table", 0x20000, 0x02000},
443 {"default-mac", 0x30000, 0x00020},
444 {"product-info", 0x31100, 0x00100},
445 {"signature", 0x32000, 0x00400},
446 {"os-image", 0x40000, 0x300000},
447 {"file-system", 0x340000, 0x470000},
448 {"soft-version", 0x7b0000, 0x00100},
449 {"support-list", 0x7b1000, 0x00400},
450 {"user-config", 0x7c0000, 0x10000},
451 {"default-config", 0x7d0000, 0x10000},
452 {"log", 0x7e0000, 0x10000},
453 {"radio", 0x7f0000, 0x10000},
454 {NULL, 0, 0}
455 },
456
457 .first_sysupgrade_partition = "os-image",
458 .last_sysupgrade_partition = "support-list",
459 },
460
461 /** Firmware layout for the CPE610V1 */
462 {
463 .id = "CPE610V1",
464 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
465 .support_list =
466 "SupportList:\r\n"
467 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
468 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
469 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
470 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
471 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
472 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
473 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
474 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
475 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
476 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
477 .part_trail = 0xff,
478 .soft_ver = NULL,
479
480 .partitions = {
481 {"fs-uboot", 0x00000, 0x20000},
482 {"partition-table", 0x20000, 0x02000},
483 {"default-mac", 0x30000, 0x00020},
484 {"product-info", 0x31100, 0x00100},
485 {"signature", 0x32000, 0x00400},
486 {"os-image", 0x40000, 0x300000},
487 {"file-system", 0x340000, 0x470000},
488 {"soft-version", 0x7b0000, 0x00100},
489 {"support-list", 0x7b1000, 0x00400},
490 {"user-config", 0x7c0000, 0x10000},
491 {"default-config", 0x7d0000, 0x10000},
492 {"log", 0x7e0000, 0x10000},
493 {"radio", 0x7f0000, 0x10000},
494 {NULL, 0, 0}
495 },
496
497 .first_sysupgrade_partition = "os-image",
498 .last_sysupgrade_partition = "support-list",
499 },
500
501 /** Firmware layout for the CPE610V2 */
502 {
503 .id = "CPE610V2",
504 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
505 .support_list =
506 "SupportList:\r\n"
507 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
508 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
509 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
510 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
511 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
512 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
513 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
514 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
515 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
516 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
517 .part_trail = 0xff,
518 .soft_ver = NULL,
519
520 .partitions = {
521 {"fs-uboot", 0x00000, 0x20000},
522 {"partition-table", 0x20000, 0x02000},
523 {"default-mac", 0x30000, 0x00020},
524 {"product-info", 0x31100, 0x00100},
525 {"signature", 0x32000, 0x00400},
526 {"os-image", 0x40000, 0x300000},
527 {"file-system", 0x340000, 0x470000},
528 {"soft-version", 0x7b0000, 0x00100},
529 {"support-list", 0x7b1000, 0x00400},
530 {"user-config", 0x7c0000, 0x10000},
531 {"default-config", 0x7d0000, 0x10000},
532 {"log", 0x7e0000, 0x10000},
533 {"radio", 0x7f0000, 0x10000},
534 {NULL, 0, 0}
535 },
536
537 .first_sysupgrade_partition = "os-image",
538 .last_sysupgrade_partition = "support-list",
539 },
540
541 {
542 .id = "WBS210",
543 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
544 .support_list =
545 "SupportList:\r\n"
546 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
547 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
548 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
549 .part_trail = 0xff,
550 .soft_ver = NULL,
551
552 .partitions = {
553 {"fs-uboot", 0x00000, 0x20000},
554 {"partition-table", 0x20000, 0x02000},
555 {"default-mac", 0x30000, 0x00020},
556 {"product-info", 0x31100, 0x00100},
557 {"signature", 0x32000, 0x00400},
558 {"os-image", 0x40000, 0x300000},
559 {"file-system", 0x340000, 0x470000},
560 {"soft-version", 0x7b0000, 0x00100},
561 {"support-list", 0x7b1000, 0x00400},
562 {"user-config", 0x7c0000, 0x10000},
563 {"default-config", 0x7d0000, 0x10000},
564 {"log", 0x7e0000, 0x10000},
565 {"radio", 0x7f0000, 0x10000},
566 {NULL, 0, 0}
567 },
568
569 .first_sysupgrade_partition = "os-image",
570 .last_sysupgrade_partition = "support-list",
571 },
572
573 {
574 .id = "WBS210V2",
575 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
576 .support_list =
577 "SupportList:\r\n"
578 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
579 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
580 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
581 .part_trail = 0xff,
582 .soft_ver = NULL,
583
584 .partitions = {
585 {"fs-uboot", 0x00000, 0x20000},
586 {"partition-table", 0x20000, 0x02000},
587 {"default-mac", 0x30000, 0x00020},
588 {"product-info", 0x31100, 0x00100},
589 {"signature", 0x32000, 0x00400},
590 {"os-image", 0x40000, 0x300000},
591 {"file-system", 0x340000, 0x470000},
592 {"soft-version", 0x7b0000, 0x00100},
593 {"support-list", 0x7b1000, 0x00400},
594 {"user-config", 0x7c0000, 0x10000},
595 {"default-config", 0x7d0000, 0x10000},
596 {"log", 0x7e0000, 0x10000},
597 {"radio", 0x7f0000, 0x10000},
598 {NULL, 0, 0}
599 },
600
601 .first_sysupgrade_partition = "os-image",
602 .last_sysupgrade_partition = "support-list",
603 },
604
605 {
606 .id = "WBS510",
607 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
608 .support_list =
609 "SupportList:\r\n"
610 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
611 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
612 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
613 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
614 .part_trail = 0xff,
615 .soft_ver = NULL,
616
617 .partitions = {
618 {"fs-uboot", 0x00000, 0x20000},
619 {"partition-table", 0x20000, 0x02000},
620 {"default-mac", 0x30000, 0x00020},
621 {"product-info", 0x31100, 0x00100},
622 {"signature", 0x32000, 0x00400},
623 {"os-image", 0x40000, 0x300000},
624 {"file-system", 0x340000, 0x470000},
625 {"soft-version", 0x7b0000, 0x00100},
626 {"support-list", 0x7b1000, 0x00400},
627 {"user-config", 0x7c0000, 0x10000},
628 {"default-config", 0x7d0000, 0x10000},
629 {"log", 0x7e0000, 0x10000},
630 {"radio", 0x7f0000, 0x10000},
631 {NULL, 0, 0}
632 },
633
634 .first_sysupgrade_partition = "os-image",
635 .last_sysupgrade_partition = "support-list",
636 },
637
638 {
639 .id = "WBS510V2",
640 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
641 .support_list =
642 "SupportList:\r\n"
643 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
644 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
645 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
646 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
647 .part_trail = 0xff,
648 .soft_ver = NULL,
649
650 .partitions = {
651 {"fs-uboot", 0x00000, 0x20000},
652 {"partition-table", 0x20000, 0x02000},
653 {"default-mac", 0x30000, 0x00020},
654 {"product-info", 0x31100, 0x00100},
655 {"signature", 0x32000, 0x00400},
656 {"os-image", 0x40000, 0x300000},
657 {"file-system", 0x340000, 0x470000},
658 {"soft-version", 0x7b0000, 0x00100},
659 {"support-list", 0x7b1000, 0x00400},
660 {"user-config", 0x7c0000, 0x10000},
661 {"default-config", 0x7d0000, 0x10000},
662 {"log", 0x7e0000, 0x10000},
663 {"radio", 0x7f0000, 0x10000},
664 {NULL, 0, 0}
665 },
666
667 .first_sysupgrade_partition = "os-image",
668 .last_sysupgrade_partition = "support-list",
669 },
670
671 /** Firmware layout for the AD7200 */
672 {
673 .id = "AD7200",
674 .vendor = "",
675 .support_list =
676 "SupportList:\r\n"
677 "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
678 .part_trail = 0x00,
679 .soft_ver = NULL,
680
681 .partitions = {
682 {"SBL1", 0x00000, 0x20000},
683 {"MIBIB", 0x20000, 0x20000},
684 {"SBL2", 0x40000, 0x20000},
685 {"SBL3", 0x60000, 0x30000},
686 {"DDRCONFIG", 0x90000, 0x10000},
687 {"SSD", 0xa0000, 0x10000},
688 {"TZ", 0xb0000, 0x30000},
689 {"RPM", 0xe0000, 0x20000},
690 {"fs-uboot", 0x100000, 0x70000},
691 {"uboot-env", 0x170000, 0x40000},
692 {"radio", 0x1b0000, 0x40000},
693 {"os-image", 0x1f0000, 0x400000},
694 {"file-system", 0x5f0000, 0x1900000},
695 {"default-mac", 0x1ef0000, 0x00200},
696 {"pin", 0x1ef0200, 0x00200},
697 {"device-id", 0x1ef0400, 0x00200},
698 {"product-info", 0x1ef0600, 0x0fa00},
699 {"partition-table", 0x1f00000, 0x10000},
700 {"soft-version", 0x1f10000, 0x10000},
701 {"support-list", 0x1f20000, 0x10000},
702 {"profile", 0x1f30000, 0x10000},
703 {"default-config", 0x1f40000, 0x10000},
704 {"user-config", 0x1f50000, 0x40000},
705 {"qos-db", 0x1f90000, 0x40000},
706 {"usb-config", 0x1fd0000, 0x10000},
707 {"log", 0x1fe0000, 0x20000},
708 {NULL, 0, 0}
709 },
710
711 .first_sysupgrade_partition = "os-image",
712 .last_sysupgrade_partition = "file-system"
713 },
714
715 /** Firmware layout for the C2600 */
716 {
717 .id = "C2600",
718 .vendor = "",
719 .support_list =
720 "SupportList:\r\n"
721 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
722 .part_trail = 0x00,
723 .soft_ver = NULL,
724
725 /**
726 We use a bigger os-image partition than the stock images (and thus
727 smaller file-system), as our kernel doesn't fit in the stock firmware's
728 2 MB os-image since kernel 4.14.
729 */
730 .partitions = {
731 {"SBL1", 0x00000, 0x20000},
732 {"MIBIB", 0x20000, 0x20000},
733 {"SBL2", 0x40000, 0x20000},
734 {"SBL3", 0x60000, 0x30000},
735 {"DDRCONFIG", 0x90000, 0x10000},
736 {"SSD", 0xa0000, 0x10000},
737 {"TZ", 0xb0000, 0x30000},
738 {"RPM", 0xe0000, 0x20000},
739 {"fs-uboot", 0x100000, 0x70000},
740 {"uboot-env", 0x170000, 0x40000},
741 {"radio", 0x1b0000, 0x40000},
742 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
743 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
744 {"default-mac", 0x1ef0000, 0x00200},
745 {"pin", 0x1ef0200, 0x00200},
746 {"product-info", 0x1ef0400, 0x0fc00},
747 {"partition-table", 0x1f00000, 0x10000},
748 {"soft-version", 0x1f10000, 0x10000},
749 {"support-list", 0x1f20000, 0x10000},
750 {"profile", 0x1f30000, 0x10000},
751 {"default-config", 0x1f40000, 0x10000},
752 {"user-config", 0x1f50000, 0x40000},
753 {"qos-db", 0x1f90000, 0x40000},
754 {"usb-config", 0x1fd0000, 0x10000},
755 {"log", 0x1fe0000, 0x20000},
756 {NULL, 0, 0}
757 },
758
759 .first_sysupgrade_partition = "os-image",
760 .last_sysupgrade_partition = "file-system"
761 },
762
763 /** Firmware layout for the A7-V5 */
764 {
765 .id = "ARCHER-A7-V5",
766 .support_list =
767 "SupportList:\n"
768 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
769 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
770 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
771 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
772 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
773 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
774 .part_trail = 0x00,
775 .soft_ver = "soft_ver:1.0.0\n",
776
777 /* We're using a dynamic kernel/rootfs split here */
778 .partitions = {
779 {"factory-boot", 0x00000, 0x20000},
780 {"fs-uboot", 0x20000, 0x20000},
781 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
782 /* Stock: name file-system base 0x160000 size 0xda0000 */
783 {"default-mac", 0xf40000, 0x00200},
784 {"pin", 0xf40200, 0x00200},
785 {"device-id", 0xf40400, 0x00100},
786 {"product-info", 0xf40500, 0x0fb00},
787 {"soft-version", 0xf50000, 0x00100},
788 {"extra-para", 0xf51000, 0x01000},
789 {"support-list", 0xf52000, 0x0a000},
790 {"profile", 0xf5c000, 0x04000},
791 {"default-config", 0xf60000, 0x10000},
792 {"user-config", 0xf70000, 0x40000},
793 {"certificate", 0xfb0000, 0x10000},
794 {"partition-table", 0xfc0000, 0x10000},
795 {"log", 0xfd0000, 0x20000},
796 {"radio", 0xff0000, 0x10000},
797 {NULL, 0, 0}
798 },
799
800 .first_sysupgrade_partition = "os-image",
801 .last_sysupgrade_partition = "file-system",
802 },
803
804 /** Firmware layout for the C2v3 */
805 {
806 .id = "ARCHER-C2-V3",
807 .support_list =
808 "SupportList:\n"
809 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
810 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
811 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
812 .part_trail = 0x00,
813 .soft_ver = "soft_ver:3.0.1\n",
814
815 /** We're using a dynamic kernel/rootfs split here */
816
817 .partitions = {
818 {"factory-boot", 0x00000, 0x20000},
819 {"fs-uboot", 0x20000, 0x10000},
820 {"firmware", 0x30000, 0x7a0000},
821 {"user-config", 0x7d0000, 0x04000},
822 {"default-mac", 0x7e0000, 0x00100},
823 {"device-id", 0x7e0100, 0x00100},
824 {"extra-para", 0x7e0200, 0x00100},
825 {"pin", 0x7e0300, 0x00100},
826 {"support-list", 0x7e0400, 0x00400},
827 {"soft-version", 0x7e0800, 0x00400},
828 {"product-info", 0x7e0c00, 0x01400},
829 {"partition-table", 0x7e2000, 0x01000},
830 {"profile", 0x7e3000, 0x01000},
831 {"default-config", 0x7e4000, 0x04000},
832 {"merge-config", 0x7ec000, 0x02000},
833 {"qos-db", 0x7ee000, 0x02000},
834 {"radio", 0x7f0000, 0x10000},
835 {NULL, 0, 0}
836 },
837
838 .first_sysupgrade_partition = "os-image",
839 .last_sysupgrade_partition = "file-system",
840 },
841
842 /** Firmware layout for the C25v1 */
843 {
844 .id = "ARCHER-C25-V1",
845 .support_list =
846 "SupportList:\n"
847 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
848 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
849 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
850 .part_trail = 0x00,
851 .soft_ver = "soft_ver:1.0.0\n",
852
853 /* We're using a dynamic kernel/rootfs split here */
854 .partitions = {
855 {"factory-boot", 0x00000, 0x20000},
856 {"fs-uboot", 0x20000, 0x10000},
857 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
858 /* Stock: name file-system base 0x130000 size 0x6a0000 */
859 {"user-config", 0x7d0000, 0x04000},
860 {"default-mac", 0x7e0000, 0x00100},
861 {"device-id", 0x7e0100, 0x00100},
862 {"extra-para", 0x7e0200, 0x00100},
863 {"pin", 0x7e0300, 0x00100},
864 {"support-list", 0x7e0400, 0x00400},
865 {"soft-version", 0x7e0800, 0x00400},
866 {"product-info", 0x7e0c00, 0x01400},
867 {"partition-table", 0x7e2000, 0x01000},
868 {"profile", 0x7e3000, 0x01000},
869 {"default-config", 0x7e4000, 0x04000},
870 {"merge-config", 0x7ec000, 0x02000},
871 {"qos-db", 0x7ee000, 0x02000},
872 {"radio", 0x7f0000, 0x10000},
873 {NULL, 0, 0}
874 },
875
876 .first_sysupgrade_partition = "os-image",
877 .last_sysupgrade_partition = "file-system",
878 },
879
880 /** Firmware layout for the C58v1 */
881 {
882 .id = "ARCHER-C58-V1",
883 .vendor = "",
884 .support_list =
885 "SupportList:\r\n"
886 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
887 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
888 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
889 .part_trail = 0x00,
890 .soft_ver = "soft_ver:1.0.0\n",
891
892 .partitions = {
893 {"fs-uboot", 0x00000, 0x10000},
894 {"default-mac", 0x10000, 0x00200},
895 {"pin", 0x10200, 0x00200},
896 {"product-info", 0x10400, 0x00100},
897 {"partition-table", 0x10500, 0x00800},
898 {"soft-version", 0x11300, 0x00200},
899 {"support-list", 0x11500, 0x00100},
900 {"device-id", 0x11600, 0x00100},
901 {"profile", 0x11700, 0x03900},
902 {"default-config", 0x15000, 0x04000},
903 {"user-config", 0x19000, 0x04000},
904 {"firmware", 0x20000, 0x7c8000},
905 {"certyficate", 0x7e8000, 0x08000},
906 {"radio", 0x7f0000, 0x10000},
907 {NULL, 0, 0}
908 },
909
910 .first_sysupgrade_partition = "os-image",
911 .last_sysupgrade_partition = "file-system",
912 },
913
914 /** Firmware layout for the C59v1 */
915 {
916 .id = "ARCHER-C59-V1",
917 .vendor = "",
918 .support_list =
919 "SupportList:\r\n"
920 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
921 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
922 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
923 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
924 .part_trail = 0x00,
925 .soft_ver = "soft_ver:1.0.0\n",
926
927 /* We're using a dynamic kernel/rootfs split here */
928 .partitions = {
929 {"fs-uboot", 0x00000, 0x10000},
930 {"default-mac", 0x10000, 0x00200},
931 {"pin", 0x10200, 0x00200},
932 {"device-id", 0x10400, 0x00100},
933 {"product-info", 0x10500, 0x0fb00},
934 {"firmware", 0x20000, 0xe30000},
935 {"partition-table", 0xe50000, 0x10000},
936 {"soft-version", 0xe60000, 0x10000},
937 {"support-list", 0xe70000, 0x10000},
938 {"profile", 0xe80000, 0x10000},
939 {"default-config", 0xe90000, 0x10000},
940 {"user-config", 0xea0000, 0x40000},
941 {"usb-config", 0xee0000, 0x10000},
942 {"certificate", 0xef0000, 0x10000},
943 {"qos-db", 0xf00000, 0x40000},
944 {"log", 0xfe0000, 0x10000},
945 {"radio", 0xff0000, 0x10000},
946 {NULL, 0, 0}
947 },
948
949 .first_sysupgrade_partition = "os-image",
950 .last_sysupgrade_partition = "file-system",
951 },
952
953 /** Firmware layout for the C59v2 */
954 {
955 .id = "ARCHER-C59-V2",
956 .vendor = "",
957 .support_list =
958 "SupportList:\r\n"
959 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
960 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
961 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
962 .part_trail = 0x00,
963 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
964
965 /** We're using a dynamic kernel/rootfs split here */
966 .partitions = {
967 {"factory-boot", 0x00000, 0x20000},
968 {"fs-uboot", 0x20000, 0x10000},
969 {"default-mac", 0x30000, 0x00200},
970 {"pin", 0x30200, 0x00200},
971 {"device-id", 0x30400, 0x00100},
972 {"product-info", 0x30500, 0x0fb00},
973 {"firmware", 0x40000, 0xe10000},
974 {"partition-table", 0xe50000, 0x10000},
975 {"soft-version", 0xe60000, 0x10000},
976 {"support-list", 0xe70000, 0x10000},
977 {"profile", 0xe80000, 0x10000},
978 {"default-config", 0xe90000, 0x10000},
979 {"user-config", 0xea0000, 0x40000},
980 {"usb-config", 0xee0000, 0x10000},
981 {"certificate", 0xef0000, 0x10000},
982 {"extra-para", 0xf00000, 0x10000},
983 {"qos-db", 0xf10000, 0x30000},
984 {"log", 0xfe0000, 0x10000},
985 {"radio", 0xff0000, 0x10000},
986 {NULL, 0, 0}
987 },
988
989 .first_sysupgrade_partition = "os-image",
990 .last_sysupgrade_partition = "file-system",
991 },
992
993 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
994 {
995 .id = "ARCHER-C6-V2",
996 .vendor = "",
997 .support_list =
998 "SupportList:\r\n"
999 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
1000 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
1001 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
1002 .part_trail = 0x00,
1003 .soft_ver = "soft_ver:1.9.1\n",
1004
1005 .partitions = {
1006 {"fs-uboot", 0x00000, 0x20000},
1007 {"default-mac", 0x20000, 0x00200},
1008 {"pin", 0x20200, 0x00100},
1009 {"product-info", 0x20300, 0x00200},
1010 {"device-id", 0x20500, 0x0fb00},
1011 {"firmware", 0x30000, 0x7a9400},
1012 {"soft-version", 0x7d9400, 0x00100},
1013 {"extra-para", 0x7d9500, 0x00100},
1014 {"support-list", 0x7d9600, 0x00200},
1015 {"profile", 0x7d9800, 0x03000},
1016 {"default-config", 0x7dc800, 0x03000},
1017 {"partition-table", 0x7df800, 0x00800},
1018 {"user-config", 0x7e0000, 0x0c000},
1019 {"certificate", 0x7ec000, 0x04000},
1020 {"radio", 0x7f0000, 0x10000},
1021 {NULL, 0, 0}
1022 },
1023
1024 .first_sysupgrade_partition = "os-image",
1025 .last_sysupgrade_partition = "file-system",
1026 },
1027
1028 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
1029 {
1030 .id = "ARCHER-C6-V2-US",
1031 .vendor = "",
1032 .support_list =
1033 "SupportList:\n"
1034 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
1035 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
1036 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
1037 .part_trail = 0x00,
1038 .soft_ver = "soft_ver:1.9.1\n",
1039
1040 .partitions = {
1041 {"factory-boot", 0x00000, 0x20000},
1042 {"default-mac", 0x20000, 0x00200},
1043 {"pin", 0x20200, 0x00100},
1044 {"product-info", 0x20300, 0x00200},
1045 {"device-id", 0x20500, 0x0fb00},
1046 {"fs-uboot", 0x30000, 0x20000},
1047 {"firmware", 0x50000, 0xf89400},
1048 {"soft-version", 0xfd9400, 0x00100},
1049 {"extra-para", 0xfd9500, 0x00100},
1050 {"support-list", 0xfd9600, 0x00200},
1051 {"profile", 0xfd9800, 0x03000},
1052 {"default-config", 0xfdc800, 0x03000},
1053 {"partition-table", 0xfdf800, 0x00800},
1054 {"user-config", 0xfe0000, 0x0c000},
1055 {"certificate", 0xfec000, 0x04000},
1056 {"radio", 0xff0000, 0x10000},
1057 {NULL, 0, 0}
1058 },
1059 .first_sysupgrade_partition = "os-image",
1060 .last_sysupgrade_partition = "file-system",
1061 },
1062
1063 /** Firmware layout for the C60v1 */
1064 {
1065 .id = "ARCHER-C60-V1",
1066 .vendor = "",
1067 .support_list =
1068 "SupportList:\r\n"
1069 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1070 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1071 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1072 .part_trail = 0x00,
1073 .soft_ver = "soft_ver:1.0.0\n",
1074
1075 .partitions = {
1076 {"fs-uboot", 0x00000, 0x10000},
1077 {"default-mac", 0x10000, 0x00200},
1078 {"pin", 0x10200, 0x00200},
1079 {"product-info", 0x10400, 0x00100},
1080 {"partition-table", 0x10500, 0x00800},
1081 {"soft-version", 0x11300, 0x00200},
1082 {"support-list", 0x11500, 0x00100},
1083 {"device-id", 0x11600, 0x00100},
1084 {"profile", 0x11700, 0x03900},
1085 {"default-config", 0x15000, 0x04000},
1086 {"user-config", 0x19000, 0x04000},
1087 {"firmware", 0x20000, 0x7c8000},
1088 {"certyficate", 0x7e8000, 0x08000},
1089 {"radio", 0x7f0000, 0x10000},
1090 {NULL, 0, 0}
1091 },
1092
1093 .first_sysupgrade_partition = "os-image",
1094 .last_sysupgrade_partition = "file-system",
1095 },
1096
1097 /** Firmware layout for the C60v2 */
1098 {
1099 .id = "ARCHER-C60-V2",
1100 .vendor = "",
1101 .support_list =
1102 "SupportList:\r\n"
1103 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1104 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1105 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1106 .part_trail = 0x00,
1107 .soft_ver = "soft_ver:2.0.0\n",
1108
1109 .partitions = {
1110 {"factory-boot", 0x00000, 0x1fb00},
1111 {"default-mac", 0x1fb00, 0x00200},
1112 {"pin", 0x1fd00, 0x00100},
1113 {"product-info", 0x1fe00, 0x00100},
1114 {"device-id", 0x1ff00, 0x00100},
1115 {"fs-uboot", 0x20000, 0x10000},
1116 {"firmware", 0x30000, 0x7a0000},
1117 {"soft-version", 0x7d9500, 0x00100},
1118 {"support-list", 0x7d9600, 0x00100},
1119 {"extra-para", 0x7d9700, 0x00100},
1120 {"profile", 0x7d9800, 0x03000},
1121 {"default-config", 0x7dc800, 0x03000},
1122 {"partition-table", 0x7df800, 0x00800},
1123 {"user-config", 0x7e0000, 0x0c000},
1124 {"certificate", 0x7ec000, 0x04000},
1125 {"radio", 0x7f0000, 0x10000},
1126 {NULL, 0, 0}
1127 },
1128
1129 .first_sysupgrade_partition = "os-image",
1130 .last_sysupgrade_partition = "file-system",
1131 },
1132
1133 /** Firmware layout for the C60v3 */
1134 {
1135 .id = "ARCHER-C60-V3",
1136 .vendor = "",
1137 .support_list =
1138 "SupportList:\r\n"
1139 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1140 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1141 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1142 .part_trail = 0x00,
1143 .soft_ver = "soft_ver:3.0.0\n",
1144
1145 .partitions = {
1146 {"factory-boot", 0x00000, 0x1fb00},
1147 {"default-mac", 0x1fb00, 0x00200},
1148 {"pin", 0x1fd00, 0x00100},
1149 {"product-info", 0x1fe00, 0x00100},
1150 {"device-id", 0x1ff00, 0x00100},
1151 {"fs-uboot", 0x20000, 0x10000},
1152 {"firmware", 0x30000, 0x7a0000},
1153 {"soft-version", 0x7d9500, 0x00100},
1154 {"support-list", 0x7d9600, 0x00100},
1155 {"extra-para", 0x7d9700, 0x00100},
1156 {"profile", 0x7d9800, 0x03000},
1157 {"default-config", 0x7dc800, 0x03000},
1158 {"partition-table", 0x7df800, 0x00800},
1159 {"user-config", 0x7e0000, 0x0c000},
1160 {"certificate", 0x7ec000, 0x04000},
1161 {"radio", 0x7f0000, 0x10000},
1162 {NULL, 0, 0}
1163 },
1164
1165 .first_sysupgrade_partition = "os-image",
1166 .last_sysupgrade_partition = "file-system",
1167 },
1168
1169 /** Firmware layout for the C5 */
1170 {
1171 .id = "ARCHER-C5-V2",
1172 .vendor = "",
1173 .support_list =
1174 "SupportList:\r\n"
1175 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1176 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1177 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1178 .part_trail = 0x00,
1179 .soft_ver = NULL,
1180
1181 .partitions = {
1182 {"fs-uboot", 0x00000, 0x40000},
1183 {"os-image", 0x40000, 0x200000},
1184 {"file-system", 0x240000, 0xc00000},
1185 {"default-mac", 0xe40000, 0x00200},
1186 {"pin", 0xe40200, 0x00200},
1187 {"product-info", 0xe40400, 0x00200},
1188 {"partition-table", 0xe50000, 0x10000},
1189 {"soft-version", 0xe60000, 0x00200},
1190 {"support-list", 0xe61000, 0x0f000},
1191 {"profile", 0xe70000, 0x10000},
1192 {"default-config", 0xe80000, 0x10000},
1193 {"user-config", 0xe90000, 0x50000},
1194 {"log", 0xee0000, 0x100000},
1195 {"radio_bk", 0xfe0000, 0x10000},
1196 {"radio", 0xff0000, 0x10000},
1197 {NULL, 0, 0}
1198 },
1199
1200 .first_sysupgrade_partition = "os-image",
1201 .last_sysupgrade_partition = "file-system"
1202 },
1203
1204 /** Firmware layout for the C7 */
1205 {
1206 .id = "ARCHER-C7-V4",
1207 .support_list =
1208 "SupportList:\n"
1209 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1210 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1211 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1212 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1213 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1214 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1215 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1216 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1217 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1218 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1219 .part_trail = 0x00,
1220 .soft_ver = "soft_ver:1.0.0\n",
1221
1222 /* We're using a dynamic kernel/rootfs split here */
1223 .partitions = {
1224 {"factory-boot", 0x00000, 0x20000},
1225 {"fs-uboot", 0x20000, 0x20000},
1226 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1227 /* Stock: name file-system base 0x160000 size 0xda0000 */
1228 {"default-mac", 0xf00000, 0x00200},
1229 {"pin", 0xf00200, 0x00200},
1230 {"device-id", 0xf00400, 0x00100},
1231 {"product-info", 0xf00500, 0x0fb00},
1232 {"soft-version", 0xf10000, 0x00100},
1233 {"extra-para", 0xf11000, 0x01000},
1234 {"support-list", 0xf12000, 0x0a000},
1235 {"profile", 0xf1c000, 0x04000},
1236 {"default-config", 0xf20000, 0x10000},
1237 {"user-config", 0xf30000, 0x40000},
1238 {"qos-db", 0xf70000, 0x40000},
1239 {"certificate", 0xfb0000, 0x10000},
1240 {"partition-table", 0xfc0000, 0x10000},
1241 {"log", 0xfd0000, 0x20000},
1242 {"radio", 0xff0000, 0x10000},
1243 {NULL, 0, 0}
1244 },
1245
1246 .first_sysupgrade_partition = "os-image",
1247 .last_sysupgrade_partition = "file-system",
1248 },
1249
1250 /** Firmware layout for the C7 v5*/
1251 {
1252 .id = "ARCHER-C7-V5",
1253 .support_list =
1254 "SupportList:\n"
1255 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1256 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1257 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1258 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1259 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1260 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1261 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1262 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1263
1264 .part_trail = 0x00,
1265 .soft_ver = "soft_ver:7.0.0\n",
1266
1267 /* We're using a dynamic kernel/rootfs split here */
1268 .partitions = {
1269 {"factory-boot", 0x00000, 0x20000},
1270 {"fs-uboot", 0x20000, 0x20000},
1271 {"partition-table", 0x40000, 0x10000},
1272 {"radio", 0x50000, 0x10000},
1273 {"default-mac", 0x60000, 0x00200},
1274 {"pin", 0x60200, 0x00200},
1275 {"device-id", 0x60400, 0x00100},
1276 {"product-info", 0x60500, 0x0fb00},
1277 {"soft-version", 0x70000, 0x01000},
1278 {"extra-para", 0x71000, 0x01000},
1279 {"support-list", 0x72000, 0x0a000},
1280 {"profile", 0x7c000, 0x04000},
1281 {"user-config", 0x80000, 0x40000},
1282
1283
1284 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1285 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1286
1287 {"log", 0xfc0000, 0x20000},
1288 {"certificate", 0xfe0000, 0x10000},
1289 {"default-config", 0xff0000, 0x10000},
1290 {NULL, 0, 0}
1291
1292 },
1293
1294 .first_sysupgrade_partition = "os-image",
1295 .last_sysupgrade_partition = "file-system",
1296 },
1297
1298 /** Firmware layout for the C9 */
1299 {
1300 .id = "ARCHERC9",
1301 .vendor = "",
1302 .support_list =
1303 "SupportList:\n"
1304 "{product_name:ArcherC9,"
1305 "product_ver:1.0.0,"
1306 "special_id:00000000}\n",
1307 .part_trail = 0x00,
1308 .soft_ver = NULL,
1309
1310 .partitions = {
1311 {"fs-uboot", 0x00000, 0x40000},
1312 {"os-image", 0x40000, 0x200000},
1313 {"file-system", 0x240000, 0xc00000},
1314 {"default-mac", 0xe40000, 0x00200},
1315 {"pin", 0xe40200, 0x00200},
1316 {"product-info", 0xe40400, 0x00200},
1317 {"partition-table", 0xe50000, 0x10000},
1318 {"soft-version", 0xe60000, 0x00200},
1319 {"support-list", 0xe61000, 0x0f000},
1320 {"profile", 0xe70000, 0x10000},
1321 {"default-config", 0xe80000, 0x10000},
1322 {"user-config", 0xe90000, 0x50000},
1323 {"log", 0xee0000, 0x100000},
1324 {"radio_bk", 0xfe0000, 0x10000},
1325 {"radio", 0xff0000, 0x10000},
1326 {NULL, 0, 0}
1327 },
1328
1329 .first_sysupgrade_partition = "os-image",
1330 .last_sysupgrade_partition = "file-system"
1331 },
1332
1333 /** Firmware layout for the EAP120 */
1334 {
1335 .id = "EAP120",
1336 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1337 .support_list =
1338 "SupportList:\r\n"
1339 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1340 .part_trail = 0xff,
1341 .soft_ver = NULL,
1342
1343 .partitions = {
1344 {"fs-uboot", 0x00000, 0x20000},
1345 {"partition-table", 0x20000, 0x02000},
1346 {"default-mac", 0x30000, 0x00020},
1347 {"support-list", 0x31000, 0x00100},
1348 {"product-info", 0x31100, 0x00100},
1349 {"soft-version", 0x32000, 0x00100},
1350 {"os-image", 0x40000, 0x180000},
1351 {"file-system", 0x1c0000, 0x600000},
1352 {"user-config", 0x7c0000, 0x10000},
1353 {"backup-config", 0x7d0000, 0x10000},
1354 {"log", 0x7e0000, 0x10000},
1355 {"radio", 0x7f0000, 0x10000},
1356 {NULL, 0, 0}
1357 },
1358
1359 .first_sysupgrade_partition = "os-image",
1360 .last_sysupgrade_partition = "file-system"
1361 },
1362
1363 /** Firmware layout for the EAP225-Outdoor v1 */
1364 {
1365 .id = "EAP225-OUTDOOR-V1",
1366 .support_list =
1367 "SupportList:\r\n"
1368 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1369 .part_trail = PART_TRAIL_NONE,
1370 .soft_ver = NULL,
1371 .soft_ver_compat_level = 1,
1372
1373 .partitions = {
1374 {"fs-uboot", 0x00000, 0x20000},
1375 {"partition-table", 0x20000, 0x02000},
1376 {"default-mac", 0x30000, 0x01000},
1377 {"support-list", 0x31000, 0x00100},
1378 {"product-info", 0x31100, 0x00400},
1379 {"soft-version", 0x32000, 0x00100},
1380 {"firmware", 0x40000, 0xd80000},
1381 {"user-config", 0xdc0000, 0x30000},
1382 {"mutil-log", 0xf30000, 0x80000},
1383 {"oops", 0xfb0000, 0x40000},
1384 {"radio", 0xff0000, 0x10000},
1385 {NULL, 0, 0}
1386 },
1387
1388 .first_sysupgrade_partition = "os-image",
1389 .last_sysupgrade_partition = "file-system"
1390 },
1391
1392 /** Firmware layout for the EAP225 v3 */
1393 {
1394 .id = "EAP225-V3",
1395 .support_list =
1396 "SupportList:\r\n"
1397 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n",
1398 .part_trail = PART_TRAIL_NONE,
1399 .soft_ver = NULL,
1400 .soft_ver_compat_level = 1,
1401
1402 .partitions = {
1403 {"fs-uboot", 0x00000, 0x20000},
1404 {"partition-table", 0x20000, 0x02000},
1405 {"default-mac", 0x30000, 0x01000},
1406 {"support-list", 0x31000, 0x00100},
1407 {"product-info", 0x31100, 0x00400},
1408 {"soft-version", 0x32000, 0x00100},
1409 {"firmware", 0x40000, 0xd80000},
1410 {"user-config", 0xdc0000, 0x30000},
1411 {"mutil-log", 0xf30000, 0x80000},
1412 {"oops", 0xfb0000, 0x40000},
1413 {"radio", 0xff0000, 0x10000},
1414 {NULL, 0, 0}
1415 },
1416
1417 .first_sysupgrade_partition = "os-image",
1418 .last_sysupgrade_partition = "file-system"
1419 },
1420
1421 /** Firmware layout for the EAP225-Wall v2 */
1422 {
1423 .id = "EAP225-WALL-V2",
1424 .support_list =
1425 "SupportList:\r\n"
1426 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1427 .part_trail = PART_TRAIL_NONE,
1428 .soft_ver = NULL,
1429 .soft_ver_compat_level = 1,
1430
1431 .partitions = {
1432 {"fs-uboot", 0x00000, 0x20000},
1433 {"partition-table", 0x20000, 0x02000},
1434 {"default-mac", 0x30000, 0x01000},
1435 {"support-list", 0x31000, 0x00100},
1436 {"product-info", 0x31100, 0x00400},
1437 {"soft-version", 0x32000, 0x00100},
1438 {"firmware", 0x40000, 0xd80000},
1439 {"user-config", 0xdc0000, 0x30000},
1440 {"mutil-log", 0xf30000, 0x80000},
1441 {"oops", 0xfb0000, 0x40000},
1442 {"radio", 0xff0000, 0x10000},
1443 {NULL, 0, 0}
1444 },
1445
1446 .first_sysupgrade_partition = "os-image",
1447 .last_sysupgrade_partition = "file-system"
1448 },
1449
1450 /** Firmware layout for the EAP235-Wall v1 */
1451 {
1452 .id = "EAP235-WALL-V1",
1453 .support_list =
1454 "SupportList:\r\n"
1455 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
1456 .part_trail = PART_TRAIL_NONE,
1457 .soft_ver = NULL,
1458 .soft_ver_compat_level = 1,
1459
1460 .partitions = {
1461 {"fs-uboot", 0x00000, 0x80000},
1462 {"partition-table", 0x80000, 0x02000},
1463 {"default-mac", 0x90000, 0x01000},
1464 {"support-list", 0x91000, 0x00100},
1465 {"product-info", 0x91100, 0x00400},
1466 {"soft-version", 0x92000, 0x00100},
1467 {"firmware", 0xa0000, 0xd20000},
1468 {"user-config", 0xdc0000, 0x30000},
1469 {"mutil-log", 0xf30000, 0x80000},
1470 {"oops", 0xfb0000, 0x40000},
1471 {"radio", 0xff0000, 0x10000},
1472 {NULL, 0, 0}
1473 },
1474
1475 .first_sysupgrade_partition = "os-image",
1476 .last_sysupgrade_partition = "file-system"
1477 },
1478
1479 /** Firmware layout for the EAP245 v1 */
1480 {
1481 .id = "EAP245-V1",
1482 .support_list =
1483 "SupportList:\r\n"
1484 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1485 .part_trail = PART_TRAIL_NONE,
1486 .soft_ver = NULL,
1487
1488 .partitions = {
1489 {"fs-uboot", 0x00000, 0x20000},
1490 {"partition-table", 0x20000, 0x02000},
1491 {"default-mac", 0x30000, 0x01000},
1492 {"support-list", 0x31000, 0x00100},
1493 {"product-info", 0x31100, 0x00400},
1494 {"soft-version", 0x32000, 0x00100},
1495 {"firmware", 0x40000, 0xd80000},
1496 {"user-config", 0xdc0000, 0x30000},
1497 {"radio", 0xff0000, 0x10000},
1498 {NULL, 0, 0}
1499 },
1500
1501 .first_sysupgrade_partition = "os-image",
1502 .last_sysupgrade_partition = "file-system"
1503 },
1504
1505 /** Firmware layout for the EAP245 v3 */
1506 {
1507 .id = "EAP245-V3",
1508 .support_list =
1509 "SupportList:\r\n"
1510 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n",
1511 .part_trail = PART_TRAIL_NONE,
1512 .soft_ver = NULL,
1513 .soft_ver_compat_level = 1,
1514
1515 /** Firmware partition with dynamic kernel/rootfs split */
1516 .partitions = {
1517 {"factroy-boot", 0x00000, 0x40000},
1518 {"fs-uboot", 0x40000, 0x40000},
1519 {"partition-table", 0x80000, 0x10000},
1520 {"default-mac", 0x90000, 0x01000},
1521 {"support-list", 0x91000, 0x00100},
1522 {"product-info", 0x91100, 0x00400},
1523 {"soft-version", 0x92000, 0x00100},
1524 {"radio", 0xa0000, 0x10000},
1525 {"extra-para", 0xb0000, 0x10000},
1526 {"firmware", 0xc0000, 0xe40000},
1527 {"config", 0xf00000, 0x30000},
1528 {"mutil-log", 0xf30000, 0x80000},
1529 {"oops", 0xfb0000, 0x40000},
1530 {NULL, 0, 0}
1531 },
1532
1533 .first_sysupgrade_partition = "os-image",
1534 .last_sysupgrade_partition = "file-system"
1535 },
1536
1537 /** Firmware layout for the TL-WA850RE v2 */
1538 {
1539 .id = "TLWA850REV2",
1540 .vendor = "",
1541 .support_list =
1542 "SupportList:\n"
1543 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1544 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1545 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1546 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1547 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1548 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1549 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1550 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1551 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1552 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1553 .part_trail = 0x00,
1554 .soft_ver = NULL,
1555
1556 /**
1557 576KB were moved from file-system to os-image
1558 in comparison to the stock image
1559 */
1560 .partitions = {
1561 {"fs-uboot", 0x00000, 0x20000},
1562 {"firmware", 0x20000, 0x390000},
1563 {"partition-table", 0x3b0000, 0x02000},
1564 {"default-mac", 0x3c0000, 0x00020},
1565 {"pin", 0x3c0100, 0x00020},
1566 {"product-info", 0x3c1000, 0x01000},
1567 {"soft-version", 0x3c2000, 0x00100},
1568 {"support-list", 0x3c3000, 0x01000},
1569 {"profile", 0x3c4000, 0x08000},
1570 {"user-config", 0x3d0000, 0x10000},
1571 {"default-config", 0x3e0000, 0x10000},
1572 {"radio", 0x3f0000, 0x10000},
1573 {NULL, 0, 0}
1574 },
1575
1576 .first_sysupgrade_partition = "os-image",
1577 .last_sysupgrade_partition = "file-system"
1578 },
1579
1580 /** Firmware layout for the TL-WA855RE v1 */
1581 {
1582 .id = "TLWA855REV1",
1583 .vendor = "",
1584 .support_list =
1585 "SupportList:\n"
1586 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1587 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1588 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1589 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1590 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1591 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1592 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1593 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1594 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1595 .part_trail = 0x00,
1596 .soft_ver = NULL,
1597
1598 .partitions = {
1599 {"fs-uboot", 0x00000, 0x20000},
1600 {"os-image", 0x20000, 0x150000},
1601 {"file-system", 0x170000, 0x240000},
1602 {"partition-table", 0x3b0000, 0x02000},
1603 {"default-mac", 0x3c0000, 0x00020},
1604 {"pin", 0x3c0100, 0x00020},
1605 {"product-info", 0x3c1000, 0x01000},
1606 {"soft-version", 0x3c2000, 0x00100},
1607 {"support-list", 0x3c3000, 0x01000},
1608 {"profile", 0x3c4000, 0x08000},
1609 {"user-config", 0x3d0000, 0x10000},
1610 {"default-config", 0x3e0000, 0x10000},
1611 {"radio", 0x3f0000, 0x10000},
1612 {NULL, 0, 0}
1613 },
1614
1615 .first_sysupgrade_partition = "os-image",
1616 .last_sysupgrade_partition = "file-system"
1617 },
1618
1619 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
1620 {
1621 .id = "TL-WPA8630P-V2.0-EU",
1622 .vendor = "",
1623 .support_list =
1624 "SupportList:\n"
1625 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
1626 .part_trail = 0x00,
1627 .soft_ver = NULL,
1628
1629 .partitions = {
1630 {"factory-uboot", 0x00000, 0x20000},
1631 {"fs-uboot", 0x20000, 0x20000},
1632 {"firmware", 0x40000, 0x5e0000},
1633 {"partition-table", 0x620000, 0x02000},
1634 {"default-mac", 0x630000, 0x00020},
1635 {"pin", 0x630100, 0x00020},
1636 {"device-id", 0x630200, 0x00030},
1637 {"product-info", 0x631100, 0x01000},
1638 {"extra-para", 0x632100, 0x01000},
1639 {"soft-version", 0x640000, 0x01000},
1640 {"support-list", 0x641000, 0x01000},
1641 {"profile", 0x642000, 0x08000},
1642 {"user-config", 0x650000, 0x10000},
1643 {"default-config", 0x660000, 0x10000},
1644 {"default-nvm", 0x670000, 0xc0000},
1645 {"default-pib", 0x730000, 0x40000},
1646 {"radio", 0x7f0000, 0x10000},
1647 {NULL, 0, 0}
1648 },
1649
1650 .first_sysupgrade_partition = "os-image",
1651 .last_sysupgrade_partition = "file-system"
1652 },
1653
1654 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
1655 {
1656 .id = "TL-WPA8630P-V2-INT",
1657 .vendor = "",
1658 .support_list =
1659 "SupportList:\n"
1660 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
1661 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
1662 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
1663 .part_trail = 0x00,
1664 .soft_ver = NULL,
1665
1666 .partitions = {
1667 {"factory-uboot", 0x00000, 0x20000},
1668 {"fs-uboot", 0x20000, 0x20000},
1669 {"firmware", 0x40000, 0x5e0000},
1670 {"partition-table", 0x620000, 0x02000},
1671 {"extra-para", 0x632100, 0x01000},
1672 {"soft-version", 0x640000, 0x01000},
1673 {"support-list", 0x641000, 0x01000},
1674 {"profile", 0x642000, 0x08000},
1675 {"user-config", 0x650000, 0x10000},
1676 {"default-config", 0x660000, 0x10000},
1677 {"default-nvm", 0x670000, 0xc0000},
1678 {"default-pib", 0x730000, 0x40000},
1679 {"default-mac", 0x7e0000, 0x00020},
1680 {"pin", 0x7e0100, 0x00020},
1681 {"device-id", 0x7e0200, 0x00030},
1682 {"product-info", 0x7e1100, 0x01000},
1683 {"radio", 0x7f0000, 0x10000},
1684 {NULL, 0, 0}
1685 },
1686
1687 .first_sysupgrade_partition = "os-image",
1688 .last_sysupgrade_partition = "file-system"
1689 },
1690
1691 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
1692 {
1693 .id = "TL-WPA8630P-V2.1-EU",
1694 .vendor = "",
1695 .support_list =
1696 "SupportList:\n"
1697 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
1698 .part_trail = 0x00,
1699 .soft_ver = NULL,
1700
1701 .partitions = {
1702 {"factory-uboot", 0x00000, 0x20000},
1703 {"fs-uboot", 0x20000, 0x20000},
1704 {"firmware", 0x40000, 0x5e0000},
1705 {"extra-para", 0x680000, 0x01000},
1706 {"product-info", 0x690000, 0x01000},
1707 {"partition-table", 0x6a0000, 0x02000},
1708 {"soft-version", 0x6b0000, 0x01000},
1709 {"support-list", 0x6b1000, 0x01000},
1710 {"profile", 0x6b2000, 0x08000},
1711 {"user-config", 0x6c0000, 0x10000},
1712 {"default-config", 0x6d0000, 0x10000},
1713 {"default-nvm", 0x6e0000, 0xc0000},
1714 {"default-pib", 0x7a0000, 0x40000},
1715 {"default-mac", 0x7e0000, 0x00020},
1716 {"pin", 0x7e0100, 0x00020},
1717 {"device-id", 0x7e0200, 0x00030},
1718 {"radio", 0x7f0000, 0x10000},
1719 {NULL, 0, 0}
1720 },
1721
1722 .first_sysupgrade_partition = "os-image",
1723 .last_sysupgrade_partition = "file-system"
1724 },
1725
1726 /** Firmware layout for the TL-WR1043 v5 */
1727 {
1728 .id = "TLWR1043NV5",
1729 .vendor = "",
1730 .support_list =
1731 "SupportList:\n"
1732 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1733 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1734 .part_trail = 0x00,
1735 .soft_ver = "soft_ver:1.0.0\n",
1736 .partitions = {
1737 {"factory-boot", 0x00000, 0x20000},
1738 {"fs-uboot", 0x20000, 0x20000},
1739 {"firmware", 0x40000, 0xec0000},
1740 {"default-mac", 0xf00000, 0x00200},
1741 {"pin", 0xf00200, 0x00200},
1742 {"device-id", 0xf00400, 0x00100},
1743 {"product-info", 0xf00500, 0x0fb00},
1744 {"soft-version", 0xf10000, 0x01000},
1745 {"extra-para", 0xf11000, 0x01000},
1746 {"support-list", 0xf12000, 0x0a000},
1747 {"profile", 0xf1c000, 0x04000},
1748 {"default-config", 0xf20000, 0x10000},
1749 {"user-config", 0xf30000, 0x40000},
1750 {"qos-db", 0xf70000, 0x40000},
1751 {"certificate", 0xfb0000, 0x10000},
1752 {"partition-table", 0xfc0000, 0x10000},
1753 {"log", 0xfd0000, 0x20000},
1754 {"radio", 0xff0000, 0x10000},
1755 {NULL, 0, 0}
1756 },
1757 .first_sysupgrade_partition = "os-image",
1758 .last_sysupgrade_partition = "file-system"
1759 },
1760
1761 /** Firmware layout for the TL-WR1043 v4 */
1762 {
1763 .id = "TLWR1043NDV4",
1764 .vendor = "",
1765 .support_list =
1766 "SupportList:\n"
1767 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1768 .part_trail = 0x00,
1769 .soft_ver = NULL,
1770
1771 /* We're using a dynamic kernel/rootfs split here */
1772 .partitions = {
1773 {"fs-uboot", 0x00000, 0x20000},
1774 {"firmware", 0x20000, 0xf30000},
1775 {"default-mac", 0xf50000, 0x00200},
1776 {"pin", 0xf50200, 0x00200},
1777 {"product-info", 0xf50400, 0x0fc00},
1778 {"soft-version", 0xf60000, 0x0b000},
1779 {"support-list", 0xf6b000, 0x04000},
1780 {"profile", 0xf70000, 0x04000},
1781 {"default-config", 0xf74000, 0x0b000},
1782 {"user-config", 0xf80000, 0x40000},
1783 {"partition-table", 0xfc0000, 0x10000},
1784 {"log", 0xfd0000, 0x20000},
1785 {"radio", 0xff0000, 0x10000},
1786 {NULL, 0, 0}
1787 },
1788
1789 .first_sysupgrade_partition = "os-image",
1790 .last_sysupgrade_partition = "file-system"
1791 },
1792
1793 /** Firmware layout for the TL-WR902AC v1 */
1794 {
1795 .id = "TL-WR902AC-V1",
1796 .vendor = "",
1797 .support_list =
1798 "SupportList:\n"
1799 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1800 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1801 .part_trail = 0x00,
1802 .soft_ver = NULL,
1803
1804 /**
1805 384KB were moved from file-system to os-image
1806 in comparison to the stock image
1807 */
1808 .partitions = {
1809 {"fs-uboot", 0x00000, 0x20000},
1810 {"firmware", 0x20000, 0x730000},
1811 {"default-mac", 0x750000, 0x00200},
1812 {"pin", 0x750200, 0x00200},
1813 {"product-info", 0x750400, 0x0fc00},
1814 {"soft-version", 0x760000, 0x0b000},
1815 {"support-list", 0x76b000, 0x04000},
1816 {"profile", 0x770000, 0x04000},
1817 {"default-config", 0x774000, 0x0b000},
1818 {"user-config", 0x780000, 0x40000},
1819 {"partition-table", 0x7c0000, 0x10000},
1820 {"log", 0x7d0000, 0x20000},
1821 {"radio", 0x7f0000, 0x10000},
1822 {NULL, 0, 0}
1823 },
1824
1825 .first_sysupgrade_partition = "os-image",
1826 .last_sysupgrade_partition = "file-system",
1827 },
1828
1829 /** Firmware layout for the TL-WR942N V1 */
1830 {
1831 .id = "TLWR942NV1",
1832 .vendor = "",
1833 .support_list =
1834 "SupportList:\r\n"
1835 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1836 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1837 .part_trail = 0x00,
1838 .soft_ver = NULL,
1839
1840 .partitions = {
1841 {"fs-uboot", 0x00000, 0x20000},
1842 {"firmware", 0x20000, 0xe20000},
1843 {"default-mac", 0xe40000, 0x00200},
1844 {"pin", 0xe40200, 0x00200},
1845 {"product-info", 0xe40400, 0x0fc00},
1846 {"partition-table", 0xe50000, 0x10000},
1847 {"soft-version", 0xe60000, 0x10000},
1848 {"support-list", 0xe70000, 0x10000},
1849 {"profile", 0xe80000, 0x10000},
1850 {"default-config", 0xe90000, 0x10000},
1851 {"user-config", 0xea0000, 0x40000},
1852 {"qos-db", 0xee0000, 0x40000},
1853 {"certificate", 0xf20000, 0x10000},
1854 {"usb-config", 0xfb0000, 0x10000},
1855 {"log", 0xfc0000, 0x20000},
1856 {"radio-bk", 0xfe0000, 0x10000},
1857 {"radio", 0xff0000, 0x10000},
1858 {NULL, 0, 0}
1859 },
1860
1861 .first_sysupgrade_partition = "os-image",
1862 .last_sysupgrade_partition = "file-system",
1863 },
1864
1865 /** Firmware layout for the RE200 v2 */
1866 {
1867 .id = "RE200-V2",
1868 .vendor = "",
1869 .support_list =
1870 "SupportList:\n"
1871 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1872 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1873 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1874 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1875 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1876 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1877 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1878 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1879 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1880 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1881 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1882 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1883 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1884 .part_trail = 0x00,
1885 .soft_ver = NULL,
1886
1887 .partitions = {
1888 {"fs-uboot", 0x00000, 0x20000},
1889 {"firmware", 0x20000, 0x7a0000},
1890 {"partition-table", 0x7c0000, 0x02000},
1891 {"default-mac", 0x7c2000, 0x00020},
1892 {"pin", 0x7c2100, 0x00020},
1893 {"product-info", 0x7c3100, 0x01000},
1894 {"soft-version", 0x7c4200, 0x01000},
1895 {"support-list", 0x7c5200, 0x01000},
1896 {"profile", 0x7c6200, 0x08000},
1897 {"config-info", 0x7ce200, 0x00400},
1898 {"user-config", 0x7d0000, 0x10000},
1899 {"default-config", 0x7e0000, 0x10000},
1900 {"radio", 0x7f0000, 0x10000},
1901 {NULL, 0, 0}
1902 },
1903
1904 .first_sysupgrade_partition = "os-image",
1905 .last_sysupgrade_partition = "file-system"
1906 },
1907
1908 /** Firmware layout for the RE200 v3 */
1909 {
1910 .id = "RE200-V3",
1911 .vendor = "",
1912 .support_list =
1913 "SupportList:\n"
1914 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
1915 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
1916 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
1917 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
1918 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
1919 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
1920 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
1921 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
1922 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
1923 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
1924 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
1925 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
1926 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
1927 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
1928 .part_trail = 0x00,
1929 .soft_ver = NULL,
1930
1931 .partitions = {
1932 {"fs-uboot", 0x00000, 0x20000},
1933 {"firmware", 0x20000, 0x7a0000},
1934 {"partition-table", 0x7c0000, 0x02000},
1935 {"default-mac", 0x7c2000, 0x00020},
1936 {"pin", 0x7c2100, 0x00020},
1937 {"product-info", 0x7c3100, 0x01000},
1938 {"soft-version", 0x7c4200, 0x01000},
1939 {"support-list", 0x7c5200, 0x01000},
1940 {"profile", 0x7c6200, 0x08000},
1941 {"config-info", 0x7ce200, 0x00400},
1942 {"user-config", 0x7d0000, 0x10000},
1943 {"default-config", 0x7e0000, 0x10000},
1944 {"radio", 0x7f0000, 0x10000},
1945 {NULL, 0, 0}
1946 },
1947
1948 .first_sysupgrade_partition = "os-image",
1949 .last_sysupgrade_partition = "file-system"
1950 },
1951
1952 /** Firmware layout for the RE200 v4 */
1953 {
1954 .id = "RE200-V4",
1955 .vendor = "",
1956 .support_list =
1957 "SupportList:\n"
1958 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
1959 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
1960 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
1961 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
1962 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
1963 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
1964 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
1965 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
1966 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
1967 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
1968 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
1969 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
1970 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
1971 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
1972 .part_trail = 0x00,
1973 .soft_ver = "soft_ver:1.1.0\n",
1974
1975 .partitions = {
1976 {"fs-uboot", 0x00000, 0x20000},
1977 {"firmware", 0x20000, 0x7a0000},
1978 {"partition-table", 0x7c0000, 0x02000},
1979 {"default-mac", 0x7c2000, 0x00020},
1980 {"pin", 0x7c2100, 0x00020},
1981 {"product-info", 0x7c3100, 0x01000},
1982 {"soft-version", 0x7c4200, 0x01000},
1983 {"support-list", 0x7c5200, 0x01000},
1984 {"profile", 0x7c6200, 0x08000},
1985 {"config-info", 0x7ce200, 0x00400},
1986 {"user-config", 0x7d0000, 0x10000},
1987 {"default-config", 0x7e0000, 0x10000},
1988 {"radio", 0x7f0000, 0x10000},
1989 {NULL, 0, 0}
1990 },
1991
1992 .first_sysupgrade_partition = "os-image",
1993 .last_sysupgrade_partition = "file-system"
1994 },
1995
1996 /** Firmware layout for the RE220 v2 */
1997 {
1998 .id = "RE220-V2",
1999 .vendor = "",
2000 .support_list =
2001 "SupportList:\n"
2002 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
2003 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
2004 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
2005 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
2006 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
2007 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
2008 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
2009 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
2010 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
2011 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
2012 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
2013 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
2014 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
2015 .part_trail = 0x00,
2016 .soft_ver = NULL,
2017
2018 .partitions = {
2019 {"fs-uboot", 0x00000, 0x20000},
2020 {"firmware", 0x20000, 0x7a0000},
2021 {"partition-table", 0x7c0000, 0x02000},
2022 {"default-mac", 0x7c2000, 0x00020},
2023 {"pin", 0x7c2100, 0x00020},
2024 {"product-info", 0x7c3100, 0x01000},
2025 {"soft-version", 0x7c4200, 0x01000},
2026 {"support-list", 0x7c5200, 0x01000},
2027 {"profile", 0x7c6200, 0x08000},
2028 {"config-info", 0x7ce200, 0x00400},
2029 {"user-config", 0x7d0000, 0x10000},
2030 {"default-config", 0x7e0000, 0x10000},
2031 {"radio", 0x7f0000, 0x10000},
2032 {NULL, 0, 0}
2033 },
2034
2035 .first_sysupgrade_partition = "os-image",
2036 .last_sysupgrade_partition = "file-system"
2037 },
2038
2039 /** Firmware layout for the RE305 v1 */
2040 {
2041 .id = "RE305-V1",
2042 .vendor = "",
2043 .support_list =
2044 "SupportList:\n"
2045 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
2046 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
2047 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
2048 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
2049 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
2050 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
2051 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
2052 .part_trail = 0x00,
2053 .soft_ver = NULL,
2054
2055 .partitions = {
2056 {"fs-uboot", 0x00000, 0x20000},
2057 {"firmware", 0x20000, 0x5e0000},
2058 {"partition-table", 0x600000, 0x02000},
2059 {"default-mac", 0x610000, 0x00020},
2060 {"pin", 0x610100, 0x00020},
2061 {"product-info", 0x611100, 0x01000},
2062 {"soft-version", 0x620000, 0x01000},
2063 {"support-list", 0x621000, 0x01000},
2064 {"profile", 0x622000, 0x08000},
2065 {"user-config", 0x630000, 0x10000},
2066 {"default-config", 0x640000, 0x10000},
2067 {"radio", 0x7f0000, 0x10000},
2068 {NULL, 0, 0}
2069 },
2070
2071 .first_sysupgrade_partition = "os-image",
2072 .last_sysupgrade_partition = "file-system"
2073 },
2074
2075 /** Firmware layout for the RE350 v1 */
2076 {
2077 .id = "RE350-V1",
2078 .vendor = "",
2079 .support_list =
2080 "SupportList:\n"
2081 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
2082 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
2083 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
2084 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
2085 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
2086 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
2087 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
2088 .part_trail = 0x00,
2089 .soft_ver = NULL,
2090
2091 /** We're using a dynamic kernel/rootfs split here */
2092 .partitions = {
2093 {"fs-uboot", 0x00000, 0x20000},
2094 {"firmware", 0x20000, 0x5e0000},
2095 {"partition-table", 0x600000, 0x02000},
2096 {"default-mac", 0x610000, 0x00020},
2097 {"pin", 0x610100, 0x00020},
2098 {"product-info", 0x611100, 0x01000},
2099 {"soft-version", 0x620000, 0x01000},
2100 {"support-list", 0x621000, 0x01000},
2101 {"profile", 0x622000, 0x08000},
2102 {"user-config", 0x630000, 0x10000},
2103 {"default-config", 0x640000, 0x10000},
2104 {"radio", 0x7f0000, 0x10000},
2105 {NULL, 0, 0}
2106 },
2107
2108 .first_sysupgrade_partition = "os-image",
2109 .last_sysupgrade_partition = "file-system"
2110 },
2111
2112 /** Firmware layout for the RE350K v1 */
2113 {
2114 .id = "RE350K-V1",
2115 .vendor = "",
2116 .support_list =
2117 "SupportList:\n"
2118 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2119 .part_trail = 0x00,
2120 .soft_ver = NULL,
2121
2122 /** We're using a dynamic kernel/rootfs split here */
2123 .partitions = {
2124 {"fs-uboot", 0x00000, 0x20000},
2125 {"firmware", 0x20000, 0xd70000},
2126 {"partition-table", 0xd90000, 0x02000},
2127 {"default-mac", 0xda0000, 0x00020},
2128 {"pin", 0xda0100, 0x00020},
2129 {"product-info", 0xda1100, 0x01000},
2130 {"soft-version", 0xdb0000, 0x01000},
2131 {"support-list", 0xdb1000, 0x01000},
2132 {"profile", 0xdb2000, 0x08000},
2133 {"user-config", 0xdc0000, 0x10000},
2134 {"default-config", 0xdd0000, 0x10000},
2135 {"device-id", 0xde0000, 0x00108},
2136 {"radio", 0xff0000, 0x10000},
2137 {NULL, 0, 0}
2138 },
2139
2140 .first_sysupgrade_partition = "os-image",
2141 .last_sysupgrade_partition = "file-system"
2142 },
2143
2144 /** Firmware layout for the RE355 */
2145 {
2146 .id = "RE355",
2147 .vendor = "",
2148 .support_list =
2149 "SupportList:\r\n"
2150 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2151 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2152 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2153 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2154 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2155 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2156 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2157 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2158 .part_trail = 0x00,
2159 .soft_ver = NULL,
2160
2161 /* We're using a dynamic kernel/rootfs split here */
2162 .partitions = {
2163 {"fs-uboot", 0x00000, 0x20000},
2164 {"firmware", 0x20000, 0x5e0000},
2165 {"partition-table", 0x600000, 0x02000},
2166 {"default-mac", 0x610000, 0x00020},
2167 {"pin", 0x610100, 0x00020},
2168 {"product-info", 0x611100, 0x01000},
2169 {"soft-version", 0x620000, 0x01000},
2170 {"support-list", 0x621000, 0x01000},
2171 {"profile", 0x622000, 0x08000},
2172 {"user-config", 0x630000, 0x10000},
2173 {"default-config", 0x640000, 0x10000},
2174 {"radio", 0x7f0000, 0x10000},
2175 {NULL, 0, 0}
2176 },
2177
2178 .first_sysupgrade_partition = "os-image",
2179 .last_sysupgrade_partition = "file-system"
2180 },
2181
2182 /** Firmware layout for the RE450 */
2183 {
2184 .id = "RE450",
2185 .vendor = "",
2186 .support_list =
2187 "SupportList:\r\n"
2188 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2189 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2190 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2191 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2192 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2193 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2194 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2195 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2196 .part_trail = 0x00,
2197 .soft_ver = NULL,
2198
2199 /** We're using a dynamic kernel/rootfs split here */
2200 .partitions = {
2201 {"fs-uboot", 0x00000, 0x20000},
2202 {"firmware", 0x20000, 0x5e0000},
2203 {"partition-table", 0x600000, 0x02000},
2204 {"default-mac", 0x610000, 0x00020},
2205 {"pin", 0x610100, 0x00020},
2206 {"product-info", 0x611100, 0x01000},
2207 {"soft-version", 0x620000, 0x01000},
2208 {"support-list", 0x621000, 0x01000},
2209 {"profile", 0x622000, 0x08000},
2210 {"user-config", 0x630000, 0x10000},
2211 {"default-config", 0x640000, 0x10000},
2212 {"radio", 0x7f0000, 0x10000},
2213 {NULL, 0, 0}
2214 },
2215
2216 .first_sysupgrade_partition = "os-image",
2217 .last_sysupgrade_partition = "file-system"
2218 },
2219
2220 /** Firmware layout for the RE450 v2 */
2221 {
2222 .id = "RE450-V2",
2223 .vendor = "",
2224 .support_list =
2225 "SupportList:\r\n"
2226 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2227 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2228 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2229 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2230 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2231 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2232 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2233 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2234 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2235 .part_trail = 0x00,
2236 .soft_ver = NULL,
2237
2238 /* We're using a dynamic kernel/rootfs split here */
2239 .partitions = {
2240 {"fs-uboot", 0x00000, 0x20000},
2241 {"firmware", 0x20000, 0x5e0000},
2242 {"partition-table", 0x600000, 0x02000},
2243 {"default-mac", 0x610000, 0x00020},
2244 {"pin", 0x610100, 0x00020},
2245 {"product-info", 0x611100, 0x01000},
2246 {"soft-version", 0x620000, 0x01000},
2247 {"support-list", 0x621000, 0x01000},
2248 {"profile", 0x622000, 0x08000},
2249 {"user-config", 0x630000, 0x10000},
2250 {"default-config", 0x640000, 0x10000},
2251 {"radio", 0x7f0000, 0x10000},
2252 {NULL, 0, 0}
2253 },
2254
2255 .first_sysupgrade_partition = "os-image",
2256 .last_sysupgrade_partition = "file-system"
2257 },
2258
2259 /** Firmware layout for the RE450 v3 */
2260 {
2261 .id = "RE450-V3",
2262 .vendor = "",
2263 .support_list =
2264 "SupportList:\r\n"
2265 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2266 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2267 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2268 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2269 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2270 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2271 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2272 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2273 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2274 .part_trail = 0x00,
2275 .soft_ver = NULL,
2276
2277 /* We're using a dynamic kernel/rootfs split here */
2278 .partitions = {
2279 {"fs-uboot", 0x00000, 0x20000},
2280 {"default-mac", 0x20000, 0x00020},
2281 {"pin", 0x20020, 0x00020},
2282 {"product-info", 0x21000, 0x01000},
2283 {"partition-table", 0x22000, 0x02000},
2284 {"soft-version", 0x24000, 0x01000},
2285 {"support-list", 0x25000, 0x01000},
2286 {"profile", 0x26000, 0x08000},
2287 {"user-config", 0x2e000, 0x10000},
2288 {"default-config", 0x3e000, 0x10000},
2289 {"config-info", 0x4e000, 0x00400},
2290 {"firmware", 0x50000, 0x7a0000},
2291 {"radio", 0x7f0000, 0x10000},
2292 {NULL, 0, 0}
2293 },
2294
2295 .first_sysupgrade_partition = "os-image",
2296 .last_sysupgrade_partition = "file-system"
2297 },
2298
2299 /** Firmware layout for the RE500 */
2300 {
2301 .id = "RE500-V1",
2302 .vendor = "",
2303 .support_list =
2304 "SupportList:\r\n"
2305 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
2306 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
2307 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
2308 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
2309 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
2310 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
2311 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
2312 .part_trail = 0x00,
2313 .soft_ver = NULL,
2314
2315 /* We're using a dynamic kernel/rootfs split here */
2316 .partitions = {
2317 {"fs-uboot", 0x00000, 0x20000},
2318 {"firmware", 0x20000, 0xde0000},
2319 {"partition-table", 0xe00000, 0x02000},
2320 {"default-mac", 0xe10000, 0x00020},
2321 {"pin", 0xe10100, 0x00020},
2322 {"product-info", 0xe11100, 0x01000},
2323 {"soft-version", 0xe20000, 0x01000},
2324 {"support-list", 0xe21000, 0x01000},
2325 {"profile", 0xe22000, 0x08000},
2326 {"user-config", 0xe30000, 0x10000},
2327 {"default-config", 0xe40000, 0x10000},
2328 {"radio", 0xff0000, 0x10000},
2329 {NULL, 0, 0}
2330 },
2331
2332 .first_sysupgrade_partition = "os-image",
2333 .last_sysupgrade_partition = "file-system"
2334 },
2335
2336 /** Firmware layout for the RE650 */
2337 {
2338 .id = "RE650-V1",
2339 .vendor = "",
2340 .support_list =
2341 "SupportList:\r\n"
2342 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
2343 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
2344 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
2345 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
2346 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
2347 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
2348 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
2349 .part_trail = 0x00,
2350 .soft_ver = NULL,
2351
2352 /* We're using a dynamic kernel/rootfs split here */
2353 .partitions = {
2354 {"fs-uboot", 0x00000, 0x20000},
2355 {"firmware", 0x20000, 0xde0000},
2356 {"partition-table", 0xe00000, 0x02000},
2357 {"default-mac", 0xe10000, 0x00020},
2358 {"pin", 0xe10100, 0x00020},
2359 {"product-info", 0xe11100, 0x01000},
2360 {"soft-version", 0xe20000, 0x01000},
2361 {"support-list", 0xe21000, 0x01000},
2362 {"profile", 0xe22000, 0x08000},
2363 {"user-config", 0xe30000, 0x10000},
2364 {"default-config", 0xe40000, 0x10000},
2365 {"radio", 0xff0000, 0x10000},
2366 {NULL, 0, 0}
2367 },
2368
2369 .first_sysupgrade_partition = "os-image",
2370 .last_sysupgrade_partition = "file-system"
2371 },
2372
2373 {}
2374 };
2375
2376 #define error(_ret, _errno, _str, ...) \
2377 do { \
2378 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
2379 strerror(_errno)); \
2380 if (_ret) \
2381 exit(_ret); \
2382 } while (0)
2383
2384
2385 /** Stores a uint32 as big endian */
2386 static inline void put32(uint8_t *buf, uint32_t val) {
2387 buf[0] = val >> 24;
2388 buf[1] = val >> 16;
2389 buf[2] = val >> 8;
2390 buf[3] = val;
2391 }
2392
2393 static inline bool meta_partition_should_pad(enum partition_trail_value pv)
2394 {
2395 return (pv >= 0) && (pv <= PART_TRAIL_MAX);
2396 }
2397
2398 /** Allocate a padded meta partition with a correctly initialised header
2399 * If the `data` pointer is NULL, then the required space is only allocated,
2400 * otherwise `data_len` bytes will be copied from `data` into the partition
2401 * entry. */
2402 static struct image_partition_entry init_meta_partition_entry(
2403 const char *name, const void *data, uint32_t data_len,
2404 enum partition_trail_value pad_value)
2405 {
2406 uint32_t total_len = sizeof(struct meta_header) + data_len;
2407 if (meta_partition_should_pad(pad_value))
2408 total_len += 1;
2409
2410 struct image_partition_entry entry = {
2411 .name = name,
2412 .size = total_len,
2413 .data = malloc(total_len)
2414 };
2415 if (!entry.data)
2416 error(1, errno, "failed to allocate meta partition entry");
2417
2418 struct meta_header *header = (struct meta_header *)entry.data;
2419 header->length = htonl(data_len);
2420 header->zero = 0;
2421
2422 if (data)
2423 memcpy(entry.data+sizeof(*header), data, data_len);
2424
2425 if (meta_partition_should_pad(pad_value))
2426 entry.data[total_len - 1] = (uint8_t) pad_value;
2427
2428 return entry;
2429 }
2430
2431 /** Allocates a new image partition */
2432 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
2433 struct image_partition_entry entry = {name, len, malloc(len)};
2434 if (!entry.data)
2435 error(1, errno, "malloc");
2436
2437 return entry;
2438 }
2439
2440 /** Frees an image partition */
2441 static void free_image_partition(struct image_partition_entry entry) {
2442 free(entry.data);
2443 }
2444
2445 static time_t source_date_epoch = -1;
2446 static void set_source_date_epoch() {
2447 char *env = getenv("SOURCE_DATE_EPOCH");
2448 char *endptr = env;
2449 errno = 0;
2450 if (env && *env) {
2451 source_date_epoch = strtoull(env, &endptr, 10);
2452 if (errno || (endptr && *endptr != '\0')) {
2453 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
2454 exit(1);
2455 }
2456 }
2457 }
2458
2459 /** Generates the partition-table partition */
2460 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
2461 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
2462
2463 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
2464
2465 *(s++) = 0x00;
2466 *(s++) = 0x04;
2467 *(s++) = 0x00;
2468 *(s++) = 0x00;
2469
2470 size_t i;
2471 for (i = 0; p[i].name; i++) {
2472 size_t len = end-s;
2473 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
2474
2475 if (w > len-1)
2476 error(1, 0, "flash partition table overflow?");
2477
2478 s += w;
2479 }
2480
2481 s++;
2482
2483 memset(s, 0xff, end-s);
2484
2485 return entry;
2486 }
2487
2488
2489 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
2490 static inline uint8_t bcd(uint8_t v) {
2491 return 0x10 * (v/10) + v%10;
2492 }
2493
2494
2495 /** Generates the soft-version partition */
2496 static struct image_partition_entry make_soft_version(
2497 const struct device_info *info, uint32_t rev)
2498 {
2499 /** If an info string is provided, use this instead of
2500 * the structured data, and include the null-termination */
2501 if (info->soft_ver) {
2502 uint32_t len = strlen(info->soft_ver) + 1;
2503 return init_meta_partition_entry("soft-version",
2504 info->soft_ver, len, info->part_trail);
2505 }
2506
2507 time_t t;
2508
2509 if (source_date_epoch != -1)
2510 t = source_date_epoch;
2511 else if (time(&t) == (time_t)(-1))
2512 error(1, errno, "time");
2513
2514 struct tm *tm = gmtime(&t);
2515
2516 struct soft_version s = {
2517 .pad1 = 0xff,
2518
2519 .version_major = 0,
2520 .version_minor = 0,
2521 .version_patch = 0,
2522
2523 .year_hi = bcd((1900+tm->tm_year)/100),
2524 .year_lo = bcd(tm->tm_year%100),
2525 .month = bcd(tm->tm_mon+1),
2526 .day = bcd(tm->tm_mday),
2527
2528 .compat_level = htonl(info->soft_ver_compat_level)
2529 };
2530
2531 if (info->soft_ver_compat_level == 0)
2532 return init_meta_partition_entry("soft-version", &s,
2533 (uint8_t *)(&s.compat_level) - (uint8_t *)(&s),
2534 info->part_trail);
2535 else
2536 return init_meta_partition_entry("soft-version", &s,
2537 sizeof(s), info->part_trail);
2538 }
2539
2540 /** Generates the support-list partition */
2541 static struct image_partition_entry make_support_list(
2542 const struct device_info *info)
2543 {
2544 uint32_t len = strlen(info->support_list);
2545 return init_meta_partition_entry("support-list", info->support_list,
2546 len, info->part_trail);
2547 }
2548
2549 /** Partition with extra-para data */
2550 static struct image_partition_entry make_extra_para(
2551 const struct device_info *info, const uint8_t *extra_para, size_t len)
2552 {
2553 return init_meta_partition_entry("extra-para", extra_para, len,
2554 info->part_trail);
2555 }
2556
2557 /** Creates a new image partition with an arbitrary name from a file */
2558 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
2559 struct stat statbuf;
2560
2561 if (stat(filename, &statbuf) < 0)
2562 error(1, errno, "unable to stat file `%s'", filename);
2563
2564 size_t len = statbuf.st_size;
2565
2566 if (add_jffs2_eof) {
2567 if (file_system_partition)
2568 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
2569 else
2570 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
2571 }
2572
2573 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2574
2575 FILE *file = fopen(filename, "rb");
2576 if (!file)
2577 error(1, errno, "unable to open file `%s'", filename);
2578
2579 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
2580 error(1, errno, "unable to read file `%s'", filename);
2581
2582 if (add_jffs2_eof) {
2583 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
2584
2585 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
2586 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
2587 }
2588
2589 fclose(file);
2590
2591 return entry;
2592 }
2593
2594 /**
2595 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2596
2597 Example image partition table:
2598
2599 fwup-ptn partition-table base 0x00800 size 0x00800
2600 fwup-ptn os-image base 0x01000 size 0x113b45
2601 fwup-ptn file-system base 0x114b45 size 0x1d0004
2602 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2603
2604 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2605 the end of the partition table is marked with a zero byte.
2606
2607 The firmware image must contain at least the partition-table and support-list partitions
2608 to be accepted. There aren't any alignment constraints for the image partitions.
2609
2610 The partition-table partition contains the actual flash layout; partitions
2611 from the image partition table are mapped to the corresponding flash partitions during
2612 the firmware upgrade. The support-list partition contains a list of devices supported by
2613 the firmware image.
2614
2615 The base offsets in the firmware partition table are relative to the end
2616 of the vendor information block, so the partition-table partition will
2617 actually start at offset 0x1814 of the image.
2618
2619 I think partition-table must be the first partition in the firmware image.
2620 */
2621 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
2622 size_t i, j;
2623 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
2624
2625 size_t base = 0x800;
2626 for (i = 0; parts[i].name; i++) {
2627 for (j = 0; flash_parts[j].name; j++) {
2628 if (!strcmp(flash_parts[j].name, parts[i].name)) {
2629 if (parts[i].size > flash_parts[j].size)
2630 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
2631 break;
2632 }
2633 }
2634
2635 assert(flash_parts[j].name);
2636
2637 memcpy(buffer + base, parts[i].data, parts[i].size);
2638
2639 size_t len = end-image_pt;
2640 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
2641
2642 if (w > len-1)
2643 error(1, 0, "image partition table overflow?");
2644
2645 image_pt += w;
2646
2647 base += parts[i].size;
2648 }
2649 }
2650
2651 /** Generates and writes the image MD5 checksum */
2652 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
2653 MD5_CTX ctx;
2654
2655 MD5_Init(&ctx);
2656 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
2657 MD5_Update(&ctx, buffer, len);
2658 MD5_Final(md5, &ctx);
2659 }
2660
2661
2662 /**
2663 Generates the firmware image in factory format
2664
2665 Image format:
2666
2667 Bytes (hex) Usage
2668 ----------- -----
2669 0000-0003 Image size (4 bytes, big endian)
2670 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2671 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2672 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2673 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2674 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2675 1814-xxxx Firmware partitions
2676 */
2677 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
2678 *len = 0x1814;
2679
2680 size_t i;
2681 for (i = 0; parts[i].name; i++)
2682 *len += parts[i].size;
2683
2684 uint8_t *image = malloc(*len);
2685 if (!image)
2686 error(1, errno, "malloc");
2687
2688 memset(image, 0xff, *len);
2689 put32(image, *len);
2690
2691 if (info->vendor) {
2692 size_t vendor_len = strlen(info->vendor);
2693 put32(image+0x14, vendor_len);
2694 memcpy(image+0x18, info->vendor, vendor_len);
2695 }
2696
2697 put_partitions(image + 0x1014, info->partitions, parts);
2698 put_md5(image+0x04, image+0x14, *len-0x14);
2699
2700 return image;
2701 }
2702
2703 /**
2704 Generates the firmware image in sysupgrade format
2705
2706 This makes some assumptions about the provided flash and image partition tables and
2707 should be generalized when TP-LINK starts building its safeloader into hardware with
2708 different flash layouts.
2709 */
2710 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
2711 size_t i, j;
2712 size_t flash_first_partition_index = 0;
2713 size_t flash_last_partition_index = 0;
2714 const struct flash_partition_entry *flash_first_partition = NULL;
2715 const struct flash_partition_entry *flash_last_partition = NULL;
2716 const struct image_partition_entry *image_last_partition = NULL;
2717
2718 /** Find first and last partitions */
2719 for (i = 0; info->partitions[i].name; i++) {
2720 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
2721 flash_first_partition = &info->partitions[i];
2722 flash_first_partition_index = i;
2723 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
2724 flash_last_partition = &info->partitions[i];
2725 flash_last_partition_index = i;
2726 }
2727 }
2728
2729 assert(flash_first_partition && flash_last_partition);
2730 assert(flash_first_partition_index < flash_last_partition_index);
2731
2732 /** Find last partition from image to calculate needed size */
2733 for (i = 0; image_parts[i].name; i++) {
2734 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
2735 image_last_partition = &image_parts[i];
2736 break;
2737 }
2738 }
2739
2740 assert(image_last_partition);
2741
2742 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2743
2744 uint8_t *image = malloc(*len);
2745 if (!image)
2746 error(1, errno, "malloc");
2747
2748 memset(image, 0xff, *len);
2749
2750 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2751 for (j = 0; image_parts[j].name; j++) {
2752 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2753 if (image_parts[j].size > info->partitions[i].size)
2754 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2755 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2756 break;
2757 }
2758
2759 assert(image_parts[j].name);
2760 }
2761 }
2762
2763 return image;
2764 }
2765
2766 /** Generates an image according to a given layout and writes it to a file */
2767 static void build_image(const char *output,
2768 const char *kernel_image,
2769 const char *rootfs_image,
2770 uint32_t rev,
2771 bool add_jffs2_eof,
2772 bool sysupgrade,
2773 struct device_info *info) {
2774
2775 size_t i;
2776
2777 struct image_partition_entry parts[7] = {};
2778
2779 struct flash_partition_entry *firmware_partition = NULL;
2780 struct flash_partition_entry *os_image_partition = NULL;
2781 struct flash_partition_entry *file_system_partition = NULL;
2782 size_t firmware_partition_index = 0;
2783
2784 for (i = 0; info->partitions[i].name; i++) {
2785 if (!strcmp(info->partitions[i].name, "firmware"))
2786 {
2787 firmware_partition = &info->partitions[i];
2788 firmware_partition_index = i;
2789 }
2790 }
2791
2792 if (firmware_partition)
2793 {
2794 os_image_partition = &info->partitions[firmware_partition_index];
2795 file_system_partition = &info->partitions[firmware_partition_index + 1];
2796
2797 struct stat kernel;
2798 if (stat(kernel_image, &kernel) < 0)
2799 error(1, errno, "unable to stat file `%s'", kernel_image);
2800
2801 if (kernel.st_size > firmware_partition->size)
2802 error(1, 0, "kernel overflowed firmware partition\n");
2803
2804 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2805 info->partitions[i+1] = info->partitions[i];
2806
2807 file_system_partition->name = "file-system";
2808 file_system_partition->base = firmware_partition->base + kernel.st_size;
2809
2810 /* Align partition start to erase blocks for factory images only */
2811 if (!sysupgrade)
2812 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2813
2814 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2815
2816 os_image_partition->name = "os-image";
2817 os_image_partition->size = kernel.st_size;
2818 }
2819
2820 parts[0] = make_partition_table(info->partitions);
2821 parts[1] = make_soft_version(info, rev);
2822 parts[2] = make_support_list(info);
2823 parts[3] = read_file("os-image", kernel_image, false, NULL);
2824 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2825
2826 /* Some devices need the extra-para partition to accept the firmware */
2827 if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
2828 strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2829 strcasecmp(info->id, "ARCHER-C7-V4") == 0 ||
2830 strcasecmp(info->id, "ARCHER-C7-V5") == 0 ||
2831 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2832 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2833 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2834 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
2835 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2836 const uint8_t extra_para[2] = {0x01, 0x00};
2837 parts[5] = make_extra_para(info, extra_para,
2838 sizeof(extra_para));
2839 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2840 const uint8_t extra_para[2] = {0x00, 0x01};
2841 parts[5] = make_extra_para(info, extra_para,
2842 sizeof(extra_para));
2843 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0 ||
2844 strcasecmp(info->id, "EAP245-V3") == 0) {
2845 const uint8_t extra_para[2] = {0x01, 0x01};
2846 parts[5] = make_extra_para(info, extra_para,
2847 sizeof(extra_para));
2848 }
2849
2850 size_t len;
2851 void *image;
2852 if (sysupgrade)
2853 image = generate_sysupgrade_image(info, parts, &len);
2854 else
2855 image = generate_factory_image(info, parts, &len);
2856
2857 FILE *file = fopen(output, "wb");
2858 if (!file)
2859 error(1, errno, "unable to open output file");
2860
2861 if (fwrite(image, len, 1, file) != 1)
2862 error(1, 0, "unable to write output file");
2863
2864 fclose(file);
2865
2866 free(image);
2867
2868 for (i = 0; parts[i].name; i++)
2869 free_image_partition(parts[i]);
2870 }
2871
2872 /** Usage output */
2873 static void usage(const char *argv0) {
2874 fprintf(stderr,
2875 "Usage: %s [OPTIONS...]\n"
2876 "\n"
2877 "Options:\n"
2878 " -h show this help\n"
2879 "\n"
2880 "Create a new image:\n"
2881 " -B <board> create image for the board specified with <board>\n"
2882 " -k <file> read kernel image from the file <file>\n"
2883 " -r <file> read rootfs image from the file <file>\n"
2884 " -o <file> write output to the file <file>\n"
2885 " -V <rev> sets the revision number to <rev>\n"
2886 " -j add jffs2 end-of-filesystem markers\n"
2887 " -S create sysupgrade instead of factory image\n"
2888 "Extract an old image:\n"
2889 " -x <file> extract all oem firmware partition\n"
2890 " -d <dir> destination to extract the firmware partition\n"
2891 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2892 argv0
2893 );
2894 };
2895
2896
2897 static struct device_info *find_board(const char *id)
2898 {
2899 struct device_info *board = NULL;
2900
2901 for (board = boards; board->id != NULL; board++)
2902 if (strcasecmp(id, board->id) == 0)
2903 return board;
2904
2905 return NULL;
2906 }
2907
2908 static int add_flash_partition(
2909 struct flash_partition_entry *part_list,
2910 size_t max_entries,
2911 const char *name,
2912 unsigned long base,
2913 unsigned long size)
2914 {
2915 size_t ptr;
2916 /* check if the list has a free entry */
2917 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2918 if (part_list->name == NULL &&
2919 part_list->base == 0 &&
2920 part_list->size == 0)
2921 break;
2922 }
2923
2924 if (ptr == max_entries) {
2925 error(1, 0, "No free flash part entry available.");
2926 }
2927
2928 part_list->name = calloc(1, strlen(name) + 1);
2929 if (!part_list->name) {
2930 error(1, 0, "Unable to allocate memory");
2931 }
2932
2933 memcpy((char *)part_list->name, name, strlen(name));
2934 part_list->base = base;
2935 part_list->size = size;
2936
2937 return 0;
2938 }
2939
2940 /** read the partition table into struct flash_partition_entry */
2941 static int read_partition_table(
2942 FILE *file, long offset,
2943 struct flash_partition_entry *entries, size_t max_entries,
2944 int type)
2945 {
2946 char buf[2048];
2947 char *ptr, *end;
2948 const char *parthdr = NULL;
2949 const char *fwuphdr = "fwup-ptn";
2950 const char *flashhdr = "partition";
2951
2952 /* TODO: search for the partition table */
2953
2954 switch(type) {
2955 case 0:
2956 parthdr = fwuphdr;
2957 break;
2958 case 1:
2959 parthdr = flashhdr;
2960 break;
2961 default:
2962 error(1, 0, "Invalid partition table");
2963 }
2964
2965 if (fseek(file, offset, SEEK_SET) < 0)
2966 error(1, errno, "Can not seek in the firmware");
2967
2968 if (fread(buf, 2048, 1, file) != 1)
2969 error(1, errno, "Can not read fwup-ptn from the firmware");
2970
2971 buf[2047] = '\0';
2972
2973 /* look for the partition header */
2974 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2975 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2976 return 1;
2977 }
2978
2979 ptr = buf;
2980 end = buf + sizeof(buf);
2981 while ((ptr + strlen(parthdr)) < end &&
2982 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2983 char *end_part;
2984 char *end_element;
2985
2986 char name[32] = { 0 };
2987 int name_len = 0;
2988 unsigned long base = 0;
2989 unsigned long size = 0;
2990
2991 end_part = memchr(ptr, '\n', (end - ptr));
2992 if (end_part == NULL) {
2993 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2994 break;
2995 }
2996
2997 for (int i = 0; i <= 4; i++) {
2998 if (end_part <= ptr)
2999 break;
3000
3001 end_element = memchr(ptr, 0x20, (end_part - ptr));
3002 if (end_element == NULL) {
3003 error(1, errno, "Ignoring the rest of the partition entries.");
3004 break;
3005 }
3006
3007 switch (i) {
3008 /* partition header */
3009 case 0:
3010 ptr = end_element + 1;
3011 continue;
3012 /* name */
3013 case 1:
3014 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
3015 strncpy(name, ptr, name_len);
3016 name[name_len] = '\0';
3017 ptr = end_element + 1;
3018 continue;
3019
3020 /* string "base" */
3021 case 2:
3022 ptr = end_element + 1;
3023 continue;
3024
3025 /* actual base */
3026 case 3:
3027 base = strtoul(ptr, NULL, 16);
3028 ptr = end_element + 1;
3029 continue;
3030
3031 /* string "size" */
3032 case 4:
3033 ptr = end_element + 1;
3034 /* actual size. The last element doesn't have a sepeartor */
3035 size = strtoul(ptr, NULL, 16);
3036 /* the part ends with 0x09, 0x0d, 0x0a */
3037 ptr = end_part + 1;
3038 add_flash_partition(entries, max_entries, name, base, size);
3039 continue;
3040 }
3041 }
3042 }
3043
3044 return 0;
3045 }
3046
3047 static void write_partition(
3048 FILE *input_file,
3049 size_t firmware_offset,
3050 struct flash_partition_entry *entry,
3051 FILE *output_file)
3052 {
3053 char buf[4096];
3054 size_t offset;
3055
3056 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
3057
3058 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
3059 if (fread(buf, sizeof(buf), 1, input_file) != 1)
3060 error(1, errno, "Can not read partition from input_file");
3061
3062 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3063 error(1, errno, "Can not write partition to output_file");
3064 }
3065 /* write last chunk smaller than buffer */
3066 if (offset < entry->size) {
3067 offset = entry->size - offset;
3068 if (fread(buf, offset, 1, input_file) != 1)
3069 error(1, errno, "Can not read partition from input_file");
3070 if (fwrite(buf, offset, 1, output_file) != 1)
3071 error(1, errno, "Can not write partition to output_file");
3072 }
3073 }
3074
3075 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
3076 {
3077 FILE *output_file;
3078 char output[PATH_MAX];
3079
3080 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
3081 output_file = fopen(output, "wb+");
3082 if (output_file == NULL) {
3083 error(1, errno, "Can not open output file %s", output);
3084 }
3085
3086 write_partition(input_file, firmware_offset, entry, output_file);
3087
3088 fclose(output_file);
3089
3090 return 0;
3091 }
3092
3093 /** extract all partitions from the firmware file */
3094 static int extract_firmware(const char *input, const char *output_directory)
3095 {
3096 struct flash_partition_entry entries[16] = { 0 };
3097 size_t max_entries = 16;
3098 size_t firmware_offset = 0x1014;
3099 FILE *input_file;
3100
3101 struct stat statbuf;
3102
3103 /* check input file */
3104 if (stat(input, &statbuf)) {
3105 error(1, errno, "Can not read input firmware %s", input);
3106 }
3107
3108 /* check if output directory exists */
3109 if (stat(output_directory, &statbuf)) {
3110 error(1, errno, "Failed to stat output directory %s", output_directory);
3111 }
3112
3113 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
3114 error(1, errno, "Given output directory is not a directory %s", output_directory);
3115 }
3116
3117 input_file = fopen(input, "rb");
3118
3119 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
3120 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3121 }
3122
3123 for (size_t i = 0; i < max_entries; i++) {
3124 if (entries[i].name == NULL &&
3125 entries[i].base == 0 &&
3126 entries[i].size == 0)
3127 continue;
3128
3129 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
3130 }
3131
3132 return 0;
3133 }
3134
3135 static struct flash_partition_entry *find_partition(
3136 struct flash_partition_entry *entries, size_t max_entries,
3137 const char *name, const char *error_msg)
3138 {
3139 for (size_t i = 0; i < max_entries; i++, entries++) {
3140 if (strcmp(entries->name, name) == 0)
3141 return entries;
3142 }
3143
3144 error(1, 0, "%s", error_msg);
3145 return NULL;
3146 }
3147
3148 static void write_ff(FILE *output_file, size_t size)
3149 {
3150 char buf[4096];
3151 size_t offset;
3152
3153 memset(buf, 0xff, sizeof(buf));
3154
3155 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
3156 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3157 error(1, errno, "Can not write 0xff to output_file");
3158 }
3159
3160 /* write last chunk smaller than buffer */
3161 if (offset < size) {
3162 offset = size - offset;
3163 if (fwrite(buf, offset, 1, output_file) != 1)
3164 error(1, errno, "Can not write partition to output_file");
3165 }
3166 }
3167
3168 static void convert_firmware(const char *input, const char *output)
3169 {
3170 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
3171 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
3172 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
3173 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
3174 struct flash_partition_entry *fwup_partition_table = NULL;
3175 size_t firmware_offset = 0x1014;
3176 FILE *input_file, *output_file;
3177
3178 struct stat statbuf;
3179
3180 /* check input file */
3181 if (stat(input, &statbuf)) {
3182 error(1, errno, "Can not read input firmware %s", input);
3183 }
3184
3185 input_file = fopen(input, "rb");
3186 if (!input_file)
3187 error(1, 0, "Can not open input firmware %s", input);
3188
3189 output_file = fopen(output, "wb");
3190 if (!output_file)
3191 error(1, 0, "Can not open output firmware %s", output);
3192
3193 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
3194 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3195 }
3196
3197 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
3198 "os-image", "Error can not find os-image partition (fwup)");
3199 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
3200 "file-system", "Error can not find file-system partition (fwup)");
3201 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
3202 "partition-table", "Error can not find partition-table partition");
3203
3204 /* the flash partition table has a 0x00000004 magic haeder */
3205 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
3206 error(1, 0, "Error can not read the partition table (flash)");
3207
3208 flash_os_image = find_partition(flash, MAX_PARTITIONS,
3209 "os-image", "Error can not find os-image partition (flash)");
3210 flash_file_system = find_partition(flash, MAX_PARTITIONS,
3211 "file-system", "Error can not find file-system partition (flash)");
3212
3213 /* write os_image to 0x0 */
3214 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
3215 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
3216
3217 /* write file-system behind os_image */
3218 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
3219 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
3220 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
3221
3222 fclose(output_file);
3223 fclose(input_file);
3224 }
3225
3226 int main(int argc, char *argv[]) {
3227 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
3228 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
3229 bool add_jffs2_eof = false, sysupgrade = false;
3230 unsigned rev = 0;
3231 struct device_info *info;
3232 set_source_date_epoch();
3233
3234 while (true) {
3235 int c;
3236
3237 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
3238 if (c == -1)
3239 break;
3240
3241 switch (c) {
3242 case 'B':
3243 board = optarg;
3244 break;
3245
3246 case 'k':
3247 kernel_image = optarg;
3248 break;
3249
3250 case 'r':
3251 rootfs_image = optarg;
3252 break;
3253
3254 case 'o':
3255 output = optarg;
3256 break;
3257
3258 case 'V':
3259 sscanf(optarg, "r%u", &rev);
3260 break;
3261
3262 case 'j':
3263 add_jffs2_eof = true;
3264 break;
3265
3266 case 'S':
3267 sysupgrade = true;
3268 break;
3269
3270 case 'h':
3271 usage(argv[0]);
3272 return 0;
3273
3274 case 'd':
3275 output_directory = optarg;
3276 break;
3277
3278 case 'x':
3279 extract_image = optarg;
3280 break;
3281
3282 case 'z':
3283 convert_image = optarg;
3284 break;
3285
3286 default:
3287 usage(argv[0]);
3288 return 1;
3289 }
3290 }
3291
3292 if (extract_image || output_directory) {
3293 if (!extract_image)
3294 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
3295 if (!output_directory)
3296 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
3297 extract_firmware(extract_image, output_directory);
3298 } else if (convert_image) {
3299 if (!output)
3300 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
3301 convert_firmware(convert_image, output);
3302 } else {
3303 if (!board)
3304 error(1, 0, "no board has been specified");
3305 if (!kernel_image)
3306 error(1, 0, "no kernel image has been specified");
3307 if (!rootfs_image)
3308 error(1, 0, "no rootfs image has been specified");
3309 if (!output)
3310 error(1, 0, "no output filename has been specified");
3311
3312 info = find_board(board);
3313
3314 if (info == NULL)
3315 error(1, 0, "unsupported board %s", board);
3316
3317 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
3318 }
3319
3320 return 0;
3321 }