ath79: support for TP-Link EAP225 v3
[openwrt/openwrt.git] / tools / firmware-utils / src / tplink-safeloader.c
1 /*
2 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
3 All rights reserved.
4
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions are met:
7
8 1. Redistributions of source code must retain the above copyright notice,
9 this list of conditions and the following disclaimer.
10 2. Redistributions in binary form must reproduce the above copyright notice,
11 this list of conditions and the following disclaimer in the documentation
12 and/or other materials provided with the distribution.
13
14 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
15 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
18 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
22 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26
27 /*
28 tplink-safeloader
29
30 Image generation tool for the TP-LINK SafeLoader as seen on
31 TP-LINK Pharos devices (CPE210/220/510/520)
32 */
33
34
35 #include <assert.h>
36 #include <errno.h>
37 #include <stdbool.h>
38 #include <stdio.h>
39 #include <stdint.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <time.h>
43 #include <unistd.h>
44
45 #include <arpa/inet.h>
46
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <limits.h>
50
51 #include "md5.h"
52
53
54 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
55
56
57 #define MAX_PARTITIONS 32
58
59 /** An image partition table entry */
60 struct image_partition_entry {
61 const char *name;
62 size_t size;
63 uint8_t *data;
64 };
65
66 /** A flash partition table entry */
67 struct flash_partition_entry {
68 char *name;
69 uint32_t base;
70 uint32_t size;
71 };
72
73 /** Firmware layout description */
74 struct device_info {
75 const char *id;
76 const char *vendor;
77 const char *support_list;
78 char support_trail;
79 const char *soft_ver;
80 uint32_t soft_ver_compat_level;
81 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
82 const char *first_sysupgrade_partition;
83 const char *last_sysupgrade_partition;
84 };
85
86 /** The content of the soft-version structure */
87 struct __attribute__((__packed__)) soft_version {
88 uint32_t data_len;
89 uint32_t zero;
90 uint8_t pad1;
91 uint8_t version_major;
92 uint8_t version_minor;
93 uint8_t version_patch;
94 uint8_t year_hi;
95 uint8_t year_lo;
96 uint8_t month;
97 uint8_t day;
98 uint32_t rev;
99 };
100
101
102 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
103
104
105 /**
106 Salt for the MD5 hash
107
108 Fortunately, TP-LINK seems to use the same salt for most devices which use
109 the new image format.
110 */
111 static const uint8_t md5_salt[16] = {
112 0x7a, 0x2b, 0x15, 0xed,
113 0x9b, 0x98, 0x59, 0x6d,
114 0xe5, 0x04, 0xab, 0x44,
115 0xac, 0x2a, 0x9f, 0x4e,
116 };
117
118
119 /** Firmware layout table */
120 static struct device_info boards[] = {
121 /** Firmware layout for the CPE210/220 V1 */
122 {
123 .id = "CPE210",
124 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
125 .support_list =
126 "SupportList:\r\n"
127 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
128 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
129 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
130 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
131 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
132 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
133 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
134 .support_trail = '\xff',
135 .soft_ver = NULL,
136
137 .partitions = {
138 {"fs-uboot", 0x00000, 0x20000},
139 {"partition-table", 0x20000, 0x02000},
140 {"default-mac", 0x30000, 0x00020},
141 {"product-info", 0x31100, 0x00100},
142 {"signature", 0x32000, 0x00400},
143 {"os-image", 0x40000, 0x300000},
144 {"file-system", 0x340000, 0x470000},
145 {"soft-version", 0x7b0000, 0x00100},
146 {"support-list", 0x7b1000, 0x00400},
147 {"user-config", 0x7c0000, 0x10000},
148 {"default-config", 0x7d0000, 0x10000},
149 {"log", 0x7e0000, 0x10000},
150 {"radio", 0x7f0000, 0x10000},
151 {NULL, 0, 0}
152 },
153
154 .first_sysupgrade_partition = "os-image",
155 .last_sysupgrade_partition = "support-list",
156 },
157
158 /** Firmware layout for the CPE210 V2 */
159 {
160 .id = "CPE210V2",
161 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
162 .support_list =
163 "SupportList:\r\n"
164 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
165 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
166 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
167 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
168 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
169 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
170 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
171 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
172 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
173 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
174 .support_trail = '\xff',
175 .soft_ver = NULL,
176
177 .partitions = {
178 {"fs-uboot", 0x00000, 0x20000},
179 {"partition-table", 0x20000, 0x02000},
180 {"default-mac", 0x30000, 0x00020},
181 {"product-info", 0x31100, 0x00100},
182 {"device-info", 0x31400, 0x00400},
183 {"signature", 0x32000, 0x00400},
184 {"device-id", 0x33000, 0x00100},
185 {"firmware", 0x40000, 0x770000},
186 {"soft-version", 0x7b0000, 0x00100},
187 {"support-list", 0x7b1000, 0x01000},
188 {"user-config", 0x7c0000, 0x10000},
189 {"default-config", 0x7d0000, 0x10000},
190 {"log", 0x7e0000, 0x10000},
191 {"radio", 0x7f0000, 0x10000},
192 {NULL, 0, 0}
193 },
194
195 .first_sysupgrade_partition = "os-image",
196 .last_sysupgrade_partition = "support-list",
197 },
198
199 /** Firmware layout for the CPE210 V3 */
200 {
201 .id = "CPE210V3",
202 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
203 .support_list =
204 "SupportList:\r\n"
205 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
206 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
207 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
209 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
210 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
211 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
212 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
213 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
214 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
215 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
216 .support_trail = '\xff',
217 .soft_ver = NULL,
218
219 .partitions = {
220 {"fs-uboot", 0x00000, 0x20000},
221 {"partition-table", 0x20000, 0x01000},
222 {"default-mac", 0x30000, 0x00020},
223 {"product-info", 0x31100, 0x00100},
224 {"device-info", 0x31400, 0x00400},
225 {"signature", 0x32000, 0x00400},
226 {"device-id", 0x33000, 0x00100},
227 {"firmware", 0x40000, 0x770000},
228 {"soft-version", 0x7b0000, 0x00100},
229 {"support-list", 0x7b1000, 0x01000},
230 {"user-config", 0x7c0000, 0x10000},
231 {"default-config", 0x7d0000, 0x10000},
232 {"log", 0x7e0000, 0x10000},
233 {"radio", 0x7f0000, 0x10000},
234 {NULL, 0, 0}
235 },
236
237 .first_sysupgrade_partition = "os-image",
238 .last_sysupgrade_partition = "support-list",
239 },
240
241 /** Firmware layout for the CPE220 V2 */
242 {
243 .id = "CPE220V2",
244 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
245 .support_list =
246 "SupportList:\r\n"
247 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
248 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
249 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
250 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
251 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
252 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
253 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
254 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
255 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
256 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
257 .support_trail = '\xff',
258 .soft_ver = NULL,
259
260 .partitions = {
261 {"fs-uboot", 0x00000, 0x20000},
262 {"partition-table", 0x20000, 0x02000},
263 {"default-mac", 0x30000, 0x00020},
264 {"product-info", 0x31100, 0x00100},
265 {"signature", 0x32000, 0x00400},
266 {"os-image", 0x40000, 0x300000},
267 {"file-system", 0x340000, 0x470000},
268 {"soft-version", 0x7b0000, 0x00100},
269 {"support-list", 0x7b1000, 0x00400},
270 {"user-config", 0x7c0000, 0x10000},
271 {"default-config", 0x7d0000, 0x10000},
272 {"log", 0x7e0000, 0x10000},
273 {"radio", 0x7f0000, 0x10000},
274 {NULL, 0, 0}
275 },
276
277 .first_sysupgrade_partition = "os-image",
278 .last_sysupgrade_partition = "support-list",
279 },
280
281 /** Firmware layout for the CPE220 V3 */
282 {
283 .id = "CPE220V3",
284 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
285 .support_list =
286 "SupportList:\r\n"
287 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
288 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
289 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
290 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
291 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
292 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
293 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
294 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
295 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
296 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
297 .support_trail = '\xff',
298 .soft_ver = NULL,
299
300 .partitions = {
301 {"fs-uboot", 0x00000, 0x20000},
302 {"partition-table", 0x20000, 0x02000},
303 {"default-mac", 0x30000, 0x00020},
304 {"product-info", 0x31100, 0x00100},
305 {"device-info", 0x31400, 0x00400},
306 {"signature", 0x32000, 0x00400},
307 {"device-id", 0x33000, 0x00100},
308 {"firmware", 0x40000, 0x770000},
309 {"soft-version", 0x7b0000, 0x00100},
310 {"support-list", 0x7b1000, 0x01000},
311 {"user-config", 0x7c0000, 0x10000},
312 {"default-config", 0x7d0000, 0x10000},
313 {"log", 0x7e0000, 0x10000},
314 {"radio", 0x7f0000, 0x10000},
315 {NULL, 0, 0}
316 },
317
318 .first_sysupgrade_partition = "os-image",
319 .last_sysupgrade_partition = "support-list",
320 },
321
322 /** Firmware layout for the CPE510/520 V1 */
323 {
324 .id = "CPE510",
325 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
326 .support_list =
327 "SupportList:\r\n"
328 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
329 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
330 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
331 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
332 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
333 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
334 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
335 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
336 .support_trail = '\xff',
337 .soft_ver = NULL,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"os-image", 0x40000, 0x300000},
346 {"file-system", 0x340000, 0x470000},
347 {"soft-version", 0x7b0000, 0x00100},
348 {"support-list", 0x7b1000, 0x00400},
349 {"user-config", 0x7c0000, 0x10000},
350 {"default-config", 0x7d0000, 0x10000},
351 {"log", 0x7e0000, 0x10000},
352 {"radio", 0x7f0000, 0x10000},
353 {NULL, 0, 0}
354 },
355
356 .first_sysupgrade_partition = "os-image",
357 .last_sysupgrade_partition = "support-list",
358 },
359
360 /** Firmware layout for the CPE510 V2 */
361 {
362 .id = "CPE510V2",
363 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
364 .support_list =
365 "SupportList:\r\n"
366 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
367 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
368 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
369 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
370 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
371 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
372 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
373 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
374 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
375 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
376 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
377 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
378 .support_trail = '\xff',
379 .soft_ver = NULL,
380
381 .partitions = {
382 {"fs-uboot", 0x00000, 0x20000},
383 {"partition-table", 0x20000, 0x02000},
384 {"default-mac", 0x30000, 0x00020},
385 {"product-info", 0x31100, 0x00100},
386 {"signature", 0x32000, 0x00400},
387 {"os-image", 0x40000, 0x300000},
388 {"file-system", 0x340000, 0x470000},
389 {"soft-version", 0x7b0000, 0x00100},
390 {"support-list", 0x7b1000, 0x00400},
391 {"user-config", 0x7c0000, 0x10000},
392 {"default-config", 0x7d0000, 0x10000},
393 {"log", 0x7e0000, 0x10000},
394 {"radio", 0x7f0000, 0x10000},
395 {NULL, 0, 0}
396 },
397
398 .first_sysupgrade_partition = "os-image",
399 .last_sysupgrade_partition = "support-list",
400 },
401
402 /** Firmware layout for the CPE510 V3 */
403 {
404 .id = "CPE510V3",
405 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
406 .support_list =
407 "SupportList:\r\n"
408 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
409 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
410 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
411 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
412 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
413 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
414 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
415 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
416 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
417 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
418 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
419 "CPE510(TP-LINK|US|N300-5):3.0\r\n",
420 .support_trail = '\xff',
421 .soft_ver = NULL,
422
423 .partitions = {
424 {"fs-uboot", 0x00000, 0x20000},
425 {"partition-table", 0x20000, 0x02000},
426 {"default-mac", 0x30000, 0x00020},
427 {"product-info", 0x31100, 0x00100},
428 {"signature", 0x32000, 0x00400},
429 {"os-image", 0x40000, 0x300000},
430 {"file-system", 0x340000, 0x470000},
431 {"soft-version", 0x7b0000, 0x00100},
432 {"support-list", 0x7b1000, 0x00400},
433 {"user-config", 0x7c0000, 0x10000},
434 {"default-config", 0x7d0000, 0x10000},
435 {"log", 0x7e0000, 0x10000},
436 {"radio", 0x7f0000, 0x10000},
437 {NULL, 0, 0}
438 },
439
440 .first_sysupgrade_partition = "os-image",
441 .last_sysupgrade_partition = "support-list",
442 },
443
444 /** Firmware layout for the CPE610V1 */
445 {
446 .id = "CPE610V1",
447 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
448 .support_list =
449 "SupportList:\r\n"
450 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
451 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
452 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
453 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
454 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
455 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
456 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
457 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
458 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
459 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
460 .support_trail = '\xff',
461 .soft_ver = NULL,
462
463 .partitions = {
464 {"fs-uboot", 0x00000, 0x20000},
465 {"partition-table", 0x20000, 0x02000},
466 {"default-mac", 0x30000, 0x00020},
467 {"product-info", 0x31100, 0x00100},
468 {"signature", 0x32000, 0x00400},
469 {"os-image", 0x40000, 0x300000},
470 {"file-system", 0x340000, 0x470000},
471 {"soft-version", 0x7b0000, 0x00100},
472 {"support-list", 0x7b1000, 0x00400},
473 {"user-config", 0x7c0000, 0x10000},
474 {"default-config", 0x7d0000, 0x10000},
475 {"log", 0x7e0000, 0x10000},
476 {"radio", 0x7f0000, 0x10000},
477 {NULL, 0, 0}
478 },
479
480 .first_sysupgrade_partition = "os-image",
481 .last_sysupgrade_partition = "support-list",
482 },
483
484 /** Firmware layout for the CPE610V2 */
485 {
486 .id = "CPE610V2",
487 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
488 .support_list =
489 "SupportList:\r\n"
490 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
491 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
492 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
493 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
494 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
495 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
496 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
497 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
498 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
499 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
500 .support_trail = '\xff',
501 .soft_ver = NULL,
502
503 .partitions = {
504 {"fs-uboot", 0x00000, 0x20000},
505 {"partition-table", 0x20000, 0x02000},
506 {"default-mac", 0x30000, 0x00020},
507 {"product-info", 0x31100, 0x00100},
508 {"signature", 0x32000, 0x00400},
509 {"os-image", 0x40000, 0x300000},
510 {"file-system", 0x340000, 0x470000},
511 {"soft-version", 0x7b0000, 0x00100},
512 {"support-list", 0x7b1000, 0x00400},
513 {"user-config", 0x7c0000, 0x10000},
514 {"default-config", 0x7d0000, 0x10000},
515 {"log", 0x7e0000, 0x10000},
516 {"radio", 0x7f0000, 0x10000},
517 {NULL, 0, 0}
518 },
519
520 .first_sysupgrade_partition = "os-image",
521 .last_sysupgrade_partition = "support-list",
522 },
523
524 {
525 .id = "WBS210",
526 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
527 .support_list =
528 "SupportList:\r\n"
529 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
530 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
531 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
532 .support_trail = '\xff',
533 .soft_ver = NULL,
534
535 .partitions = {
536 {"fs-uboot", 0x00000, 0x20000},
537 {"partition-table", 0x20000, 0x02000},
538 {"default-mac", 0x30000, 0x00020},
539 {"product-info", 0x31100, 0x00100},
540 {"signature", 0x32000, 0x00400},
541 {"os-image", 0x40000, 0x300000},
542 {"file-system", 0x340000, 0x470000},
543 {"soft-version", 0x7b0000, 0x00100},
544 {"support-list", 0x7b1000, 0x00400},
545 {"user-config", 0x7c0000, 0x10000},
546 {"default-config", 0x7d0000, 0x10000},
547 {"log", 0x7e0000, 0x10000},
548 {"radio", 0x7f0000, 0x10000},
549 {NULL, 0, 0}
550 },
551
552 .first_sysupgrade_partition = "os-image",
553 .last_sysupgrade_partition = "support-list",
554 },
555
556 {
557 .id = "WBS210V2",
558 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
559 .support_list =
560 "SupportList:\r\n"
561 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
562 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
563 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
564 .support_trail = '\xff',
565 .soft_ver = NULL,
566
567 .partitions = {
568 {"fs-uboot", 0x00000, 0x20000},
569 {"partition-table", 0x20000, 0x02000},
570 {"default-mac", 0x30000, 0x00020},
571 {"product-info", 0x31100, 0x00100},
572 {"signature", 0x32000, 0x00400},
573 {"os-image", 0x40000, 0x300000},
574 {"file-system", 0x340000, 0x470000},
575 {"soft-version", 0x7b0000, 0x00100},
576 {"support-list", 0x7b1000, 0x00400},
577 {"user-config", 0x7c0000, 0x10000},
578 {"default-config", 0x7d0000, 0x10000},
579 {"log", 0x7e0000, 0x10000},
580 {"radio", 0x7f0000, 0x10000},
581 {NULL, 0, 0}
582 },
583
584 .first_sysupgrade_partition = "os-image",
585 .last_sysupgrade_partition = "support-list",
586 },
587
588 {
589 .id = "WBS510",
590 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
591 .support_list =
592 "SupportList:\r\n"
593 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
594 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
595 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
596 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
597 .support_trail = '\xff',
598 .soft_ver = NULL,
599
600 .partitions = {
601 {"fs-uboot", 0x00000, 0x20000},
602 {"partition-table", 0x20000, 0x02000},
603 {"default-mac", 0x30000, 0x00020},
604 {"product-info", 0x31100, 0x00100},
605 {"signature", 0x32000, 0x00400},
606 {"os-image", 0x40000, 0x300000},
607 {"file-system", 0x340000, 0x470000},
608 {"soft-version", 0x7b0000, 0x00100},
609 {"support-list", 0x7b1000, 0x00400},
610 {"user-config", 0x7c0000, 0x10000},
611 {"default-config", 0x7d0000, 0x10000},
612 {"log", 0x7e0000, 0x10000},
613 {"radio", 0x7f0000, 0x10000},
614 {NULL, 0, 0}
615 },
616
617 .first_sysupgrade_partition = "os-image",
618 .last_sysupgrade_partition = "support-list",
619 },
620
621 {
622 .id = "WBS510V2",
623 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
624 .support_list =
625 "SupportList:\r\n"
626 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
627 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
628 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
629 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
630 .support_trail = '\xff',
631 .soft_ver = NULL,
632
633 .partitions = {
634 {"fs-uboot", 0x00000, 0x20000},
635 {"partition-table", 0x20000, 0x02000},
636 {"default-mac", 0x30000, 0x00020},
637 {"product-info", 0x31100, 0x00100},
638 {"signature", 0x32000, 0x00400},
639 {"os-image", 0x40000, 0x300000},
640 {"file-system", 0x340000, 0x470000},
641 {"soft-version", 0x7b0000, 0x00100},
642 {"support-list", 0x7b1000, 0x00400},
643 {"user-config", 0x7c0000, 0x10000},
644 {"default-config", 0x7d0000, 0x10000},
645 {"log", 0x7e0000, 0x10000},
646 {"radio", 0x7f0000, 0x10000},
647 {NULL, 0, 0}
648 },
649
650 .first_sysupgrade_partition = "os-image",
651 .last_sysupgrade_partition = "support-list",
652 },
653
654 /** Firmware layout for the C2600 */
655 {
656 .id = "C2600",
657 .vendor = "",
658 .support_list =
659 "SupportList:\r\n"
660 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
661 .support_trail = '\x00',
662 .soft_ver = NULL,
663
664 /**
665 We use a bigger os-image partition than the stock images (and thus
666 smaller file-system), as our kernel doesn't fit in the stock firmware's
667 2 MB os-image since kernel 4.14.
668 */
669 .partitions = {
670 {"SBL1", 0x00000, 0x20000},
671 {"MIBIB", 0x20000, 0x20000},
672 {"SBL2", 0x40000, 0x20000},
673 {"SBL3", 0x60000, 0x30000},
674 {"DDRCONFIG", 0x90000, 0x10000},
675 {"SSD", 0xa0000, 0x10000},
676 {"TZ", 0xb0000, 0x30000},
677 {"RPM", 0xe0000, 0x20000},
678 {"fs-uboot", 0x100000, 0x70000},
679 {"uboot-env", 0x170000, 0x40000},
680 {"radio", 0x1b0000, 0x40000},
681 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
682 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
683 {"default-mac", 0x1ef0000, 0x00200},
684 {"pin", 0x1ef0200, 0x00200},
685 {"product-info", 0x1ef0400, 0x0fc00},
686 {"partition-table", 0x1f00000, 0x10000},
687 {"soft-version", 0x1f10000, 0x10000},
688 {"support-list", 0x1f20000, 0x10000},
689 {"profile", 0x1f30000, 0x10000},
690 {"default-config", 0x1f40000, 0x10000},
691 {"user-config", 0x1f50000, 0x40000},
692 {"qos-db", 0x1f90000, 0x40000},
693 {"usb-config", 0x1fd0000, 0x10000},
694 {"log", 0x1fe0000, 0x20000},
695 {NULL, 0, 0}
696 },
697
698 .first_sysupgrade_partition = "os-image",
699 .last_sysupgrade_partition = "file-system"
700 },
701
702 /** Firmware layout for the A7-V5 */
703 {
704 .id = "ARCHER-A7-V5",
705 .support_list =
706 "SupportList:\n"
707 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
708 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
709 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
710 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
711 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n",
712 .support_trail = '\x00',
713 .soft_ver = "soft_ver:1.0.0\n",
714
715 /* We're using a dynamic kernel/rootfs split here */
716 .partitions = {
717 {"factory-boot", 0x00000, 0x20000},
718 {"fs-uboot", 0x20000, 0x20000},
719 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
720 /* Stock: name file-system base 0x160000 size 0xda0000 */
721 {"default-mac", 0xf40000, 0x00200},
722 {"pin", 0xf40200, 0x00200},
723 {"device-id", 0xf40400, 0x00100},
724 {"product-info", 0xf40500, 0x0fb00},
725 {"soft-version", 0xf50000, 0x00100},
726 {"extra-para", 0xf51000, 0x01000},
727 {"support-list", 0xf52000, 0x0a000},
728 {"profile", 0xf5c000, 0x04000},
729 {"default-config", 0xf60000, 0x10000},
730 {"user-config", 0xf70000, 0x40000},
731 {"certificate", 0xfb0000, 0x10000},
732 {"partition-table", 0xfc0000, 0x10000},
733 {"log", 0xfd0000, 0x20000},
734 {"radio", 0xff0000, 0x10000},
735 {NULL, 0, 0}
736 },
737
738 .first_sysupgrade_partition = "os-image",
739 .last_sysupgrade_partition = "file-system",
740 },
741
742 /** Firmware layout for the C2v3 */
743 {
744 .id = "ARCHER-C2-V3",
745 .support_list =
746 "SupportList:\n"
747 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
748 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
749 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
750 .support_trail = '\x00',
751 .soft_ver = "soft_ver:3.0.1\n",
752
753 /** We're using a dynamic kernel/rootfs split here */
754
755 .partitions = {
756 {"factory-boot", 0x00000, 0x20000},
757 {"fs-uboot", 0x20000, 0x10000},
758 {"firmware", 0x30000, 0x7a0000},
759 {"user-config", 0x7d0000, 0x04000},
760 {"default-mac", 0x7e0000, 0x00100},
761 {"device-id", 0x7e0100, 0x00100},
762 {"extra-para", 0x7e0200, 0x00100},
763 {"pin", 0x7e0300, 0x00100},
764 {"support-list", 0x7e0400, 0x00400},
765 {"soft-version", 0x7e0800, 0x00400},
766 {"product-info", 0x7e0c00, 0x01400},
767 {"partition-table", 0x7e2000, 0x01000},
768 {"profile", 0x7e3000, 0x01000},
769 {"default-config", 0x7e4000, 0x04000},
770 {"merge-config", 0x7ec000, 0x02000},
771 {"qos-db", 0x7ee000, 0x02000},
772 {"radio", 0x7f0000, 0x10000},
773 {NULL, 0, 0}
774 },
775
776 .first_sysupgrade_partition = "os-image",
777 .last_sysupgrade_partition = "file-system",
778 },
779
780 /** Firmware layout for the C25v1 */
781 {
782 .id = "ARCHER-C25-V1",
783 .support_list =
784 "SupportList:\n"
785 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
786 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
787 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
788 .support_trail = '\x00',
789 .soft_ver = "soft_ver:1.0.0\n",
790
791 /* We're using a dynamic kernel/rootfs split here */
792 .partitions = {
793 {"factory-boot", 0x00000, 0x20000},
794 {"fs-uboot", 0x20000, 0x10000},
795 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
796 /* Stock: name file-system base 0x130000 size 0x6a0000 */
797 {"user-config", 0x7d0000, 0x04000},
798 {"default-mac", 0x7e0000, 0x00100},
799 {"device-id", 0x7e0100, 0x00100},
800 {"extra-para", 0x7e0200, 0x00100},
801 {"pin", 0x7e0300, 0x00100},
802 {"support-list", 0x7e0400, 0x00400},
803 {"soft-version", 0x7e0800, 0x00400},
804 {"product-info", 0x7e0c00, 0x01400},
805 {"partition-table", 0x7e2000, 0x01000},
806 {"profile", 0x7e3000, 0x01000},
807 {"default-config", 0x7e4000, 0x04000},
808 {"merge-config", 0x7ec000, 0x02000},
809 {"qos-db", 0x7ee000, 0x02000},
810 {"radio", 0x7f0000, 0x10000},
811 {NULL, 0, 0}
812 },
813
814 .first_sysupgrade_partition = "os-image",
815 .last_sysupgrade_partition = "file-system",
816 },
817
818 /** Firmware layout for the C58v1 */
819 {
820 .id = "ARCHER-C58-V1",
821 .vendor = "",
822 .support_list =
823 "SupportList:\r\n"
824 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
825 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
826 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
827 .support_trail = '\x00',
828 .soft_ver = "soft_ver:1.0.0\n",
829
830 .partitions = {
831 {"fs-uboot", 0x00000, 0x10000},
832 {"default-mac", 0x10000, 0x00200},
833 {"pin", 0x10200, 0x00200},
834 {"product-info", 0x10400, 0x00100},
835 {"partition-table", 0x10500, 0x00800},
836 {"soft-version", 0x11300, 0x00200},
837 {"support-list", 0x11500, 0x00100},
838 {"device-id", 0x11600, 0x00100},
839 {"profile", 0x11700, 0x03900},
840 {"default-config", 0x15000, 0x04000},
841 {"user-config", 0x19000, 0x04000},
842 {"firmware", 0x20000, 0x7c8000},
843 {"certyficate", 0x7e8000, 0x08000},
844 {"radio", 0x7f0000, 0x10000},
845 {NULL, 0, 0}
846 },
847
848 .first_sysupgrade_partition = "os-image",
849 .last_sysupgrade_partition = "file-system",
850 },
851
852 /** Firmware layout for the C59v1 */
853 {
854 .id = "ARCHER-C59-V1",
855 .vendor = "",
856 .support_list =
857 "SupportList:\r\n"
858 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
859 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
860 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
861 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
862 .support_trail = '\x00',
863 .soft_ver = "soft_ver:1.0.0\n",
864
865 /* We're using a dynamic kernel/rootfs split here */
866 .partitions = {
867 {"fs-uboot", 0x00000, 0x10000},
868 {"default-mac", 0x10000, 0x00200},
869 {"pin", 0x10200, 0x00200},
870 {"device-id", 0x10400, 0x00100},
871 {"product-info", 0x10500, 0x0fb00},
872 {"firmware", 0x20000, 0xe30000},
873 {"partition-table", 0xe50000, 0x10000},
874 {"soft-version", 0xe60000, 0x10000},
875 {"support-list", 0xe70000, 0x10000},
876 {"profile", 0xe80000, 0x10000},
877 {"default-config", 0xe90000, 0x10000},
878 {"user-config", 0xea0000, 0x40000},
879 {"usb-config", 0xee0000, 0x10000},
880 {"certificate", 0xef0000, 0x10000},
881 {"qos-db", 0xf00000, 0x40000},
882 {"log", 0xfe0000, 0x10000},
883 {"radio", 0xff0000, 0x10000},
884 {NULL, 0, 0}
885 },
886
887 .first_sysupgrade_partition = "os-image",
888 .last_sysupgrade_partition = "file-system",
889 },
890
891 /** Firmware layout for the C59v2 */
892 {
893 .id = "ARCHER-C59-V2",
894 .vendor = "",
895 .support_list =
896 "SupportList:\r\n"
897 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
898 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
899 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
900 .support_trail = '\x00',
901 .soft_ver = "soft_ver:2.0.0 Build 20161206 rel.7303\n",
902
903 /** We're using a dynamic kernel/rootfs split here */
904 .partitions = {
905 {"factory-boot", 0x00000, 0x20000},
906 {"fs-uboot", 0x20000, 0x10000},
907 {"default-mac", 0x30000, 0x00200},
908 {"pin", 0x30200, 0x00200},
909 {"device-id", 0x30400, 0x00100},
910 {"product-info", 0x30500, 0x0fb00},
911 {"firmware", 0x40000, 0xe10000},
912 {"partition-table", 0xe50000, 0x10000},
913 {"soft-version", 0xe60000, 0x10000},
914 {"support-list", 0xe70000, 0x10000},
915 {"profile", 0xe80000, 0x10000},
916 {"default-config", 0xe90000, 0x10000},
917 {"user-config", 0xea0000, 0x40000},
918 {"usb-config", 0xee0000, 0x10000},
919 {"certificate", 0xef0000, 0x10000},
920 {"extra-para", 0xf00000, 0x10000},
921 {"qos-db", 0xf10000, 0x30000},
922 {"log", 0xfe0000, 0x10000},
923 {"radio", 0xff0000, 0x10000},
924 {NULL, 0, 0}
925 },
926
927 .first_sysupgrade_partition = "os-image",
928 .last_sysupgrade_partition = "file-system",
929 },
930
931 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
932 {
933 .id = "ARCHER-C6-V2",
934 .vendor = "",
935 .support_list =
936 "SupportList:\r\n"
937 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
938 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
939 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
940 .support_trail = '\x00',
941 .soft_ver = "soft_ver:1.9.1\n",
942
943 .partitions = {
944 {"fs-uboot", 0x00000, 0x20000},
945 {"default-mac", 0x20000, 0x00200},
946 {"pin", 0x20200, 0x00100},
947 {"product-info", 0x20300, 0x00200},
948 {"device-id", 0x20500, 0x0fb00},
949 {"firmware", 0x30000, 0x7a9400},
950 {"soft-version", 0x7d9400, 0x00100},
951 {"extra-para", 0x7d9500, 0x00100},
952 {"support-list", 0x7d9600, 0x00200},
953 {"profile", 0x7d9800, 0x03000},
954 {"default-config", 0x7dc800, 0x03000},
955 {"partition-table", 0x7df800, 0x00800},
956 {"user-config", 0x7e0000, 0x0c000},
957 {"certificate", 0x7ec000, 0x04000},
958 {"radio", 0x7f0000, 0x10000},
959 {NULL, 0, 0}
960 },
961
962 .first_sysupgrade_partition = "os-image",
963 .last_sysupgrade_partition = "file-system",
964 },
965
966 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
967 {
968 .id = "ARCHER-C6-V2-US",
969 .vendor = "",
970 .support_list =
971 "SupportList:\n"
972 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
973 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
974 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
975 .support_trail = '\x00',
976 .soft_ver = "soft_ver:1.9.1\n",
977
978 .partitions = {
979 {"factory-boot", 0x00000, 0x20000},
980 {"default-mac", 0x20000, 0x00200},
981 {"pin", 0x20200, 0x00100},
982 {"product-info", 0x20300, 0x00200},
983 {"device-id", 0x20500, 0x0fb00},
984 {"fs-uboot", 0x30000, 0x20000},
985 {"firmware", 0x50000, 0xf89400},
986 {"soft-version", 0xfd9400, 0x00100},
987 {"extra-para", 0xfd9500, 0x00100},
988 {"support-list", 0xfd9600, 0x00200},
989 {"profile", 0xfd9800, 0x03000},
990 {"default-config", 0xfdc800, 0x03000},
991 {"partition-table", 0xfdf800, 0x00800},
992 {"user-config", 0xfe0000, 0x0c000},
993 {"certificate", 0xfec000, 0x04000},
994 {"radio", 0xff0000, 0x10000},
995 {NULL, 0, 0}
996 },
997 .first_sysupgrade_partition = "os-image",
998 .last_sysupgrade_partition = "file-system",
999 },
1000
1001 /** Firmware layout for the C60v1 */
1002 {
1003 .id = "ARCHER-C60-V1",
1004 .vendor = "",
1005 .support_list =
1006 "SupportList:\r\n"
1007 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1008 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1009 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1010 .support_trail = '\x00',
1011 .soft_ver = "soft_ver:1.0.0\n",
1012
1013 .partitions = {
1014 {"fs-uboot", 0x00000, 0x10000},
1015 {"default-mac", 0x10000, 0x00200},
1016 {"pin", 0x10200, 0x00200},
1017 {"product-info", 0x10400, 0x00100},
1018 {"partition-table", 0x10500, 0x00800},
1019 {"soft-version", 0x11300, 0x00200},
1020 {"support-list", 0x11500, 0x00100},
1021 {"device-id", 0x11600, 0x00100},
1022 {"profile", 0x11700, 0x03900},
1023 {"default-config", 0x15000, 0x04000},
1024 {"user-config", 0x19000, 0x04000},
1025 {"firmware", 0x20000, 0x7c8000},
1026 {"certyficate", 0x7e8000, 0x08000},
1027 {"radio", 0x7f0000, 0x10000},
1028 {NULL, 0, 0}
1029 },
1030
1031 .first_sysupgrade_partition = "os-image",
1032 .last_sysupgrade_partition = "file-system",
1033 },
1034
1035 /** Firmware layout for the C60v2 */
1036 {
1037 .id = "ARCHER-C60-V2",
1038 .vendor = "",
1039 .support_list =
1040 "SupportList:\r\n"
1041 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1042 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1043 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1044 .support_trail = '\x00',
1045 .soft_ver = "soft_ver:2.0.0\n",
1046
1047 .partitions = {
1048 {"factory-boot", 0x00000, 0x1fb00},
1049 {"default-mac", 0x1fb00, 0x00200},
1050 {"pin", 0x1fd00, 0x00100},
1051 {"product-info", 0x1fe00, 0x00100},
1052 {"device-id", 0x1ff00, 0x00100},
1053 {"fs-uboot", 0x20000, 0x10000},
1054 {"firmware", 0x30000, 0x7a0000},
1055 {"soft-version", 0x7d9500, 0x00100},
1056 {"support-list", 0x7d9600, 0x00100},
1057 {"extra-para", 0x7d9700, 0x00100},
1058 {"profile", 0x7d9800, 0x03000},
1059 {"default-config", 0x7dc800, 0x03000},
1060 {"partition-table", 0x7df800, 0x00800},
1061 {"user-config", 0x7e0000, 0x0c000},
1062 {"certificate", 0x7ec000, 0x04000},
1063 {"radio", 0x7f0000, 0x10000},
1064 {NULL, 0, 0}
1065 },
1066
1067 .first_sysupgrade_partition = "os-image",
1068 .last_sysupgrade_partition = "file-system",
1069 },
1070
1071 /** Firmware layout for the C60v3 */
1072 {
1073 .id = "ARCHER-C60-V3",
1074 .vendor = "",
1075 .support_list =
1076 "SupportList:\r\n"
1077 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1078 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1079 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1080 .support_trail = '\x00',
1081 .soft_ver = "soft_ver:3.0.0\n",
1082
1083 .partitions = {
1084 {"factory-boot", 0x00000, 0x1fb00},
1085 {"default-mac", 0x1fb00, 0x00200},
1086 {"pin", 0x1fd00, 0x00100},
1087 {"product-info", 0x1fe00, 0x00100},
1088 {"device-id", 0x1ff00, 0x00100},
1089 {"fs-uboot", 0x20000, 0x10000},
1090 {"firmware", 0x30000, 0x7a0000},
1091 {"soft-version", 0x7d9500, 0x00100},
1092 {"support-list", 0x7d9600, 0x00100},
1093 {"extra-para", 0x7d9700, 0x00100},
1094 {"profile", 0x7d9800, 0x03000},
1095 {"default-config", 0x7dc800, 0x03000},
1096 {"partition-table", 0x7df800, 0x00800},
1097 {"user-config", 0x7e0000, 0x0c000},
1098 {"certificate", 0x7ec000, 0x04000},
1099 {"radio", 0x7f0000, 0x10000},
1100 {NULL, 0, 0}
1101 },
1102
1103 .first_sysupgrade_partition = "os-image",
1104 .last_sysupgrade_partition = "file-system",
1105 },
1106
1107 /** Firmware layout for the C5 */
1108 {
1109 .id = "ARCHER-C5-V2",
1110 .vendor = "",
1111 .support_list =
1112 "SupportList:\r\n"
1113 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1114 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1115 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1116 .support_trail = '\x00',
1117 .soft_ver = NULL,
1118
1119 .partitions = {
1120 {"fs-uboot", 0x00000, 0x40000},
1121 {"os-image", 0x40000, 0x200000},
1122 {"file-system", 0x240000, 0xc00000},
1123 {"default-mac", 0xe40000, 0x00200},
1124 {"pin", 0xe40200, 0x00200},
1125 {"product-info", 0xe40400, 0x00200},
1126 {"partition-table", 0xe50000, 0x10000},
1127 {"soft-version", 0xe60000, 0x00200},
1128 {"support-list", 0xe61000, 0x0f000},
1129 {"profile", 0xe70000, 0x10000},
1130 {"default-config", 0xe80000, 0x10000},
1131 {"user-config", 0xe90000, 0x50000},
1132 {"log", 0xee0000, 0x100000},
1133 {"radio_bk", 0xfe0000, 0x10000},
1134 {"radio", 0xff0000, 0x10000},
1135 {NULL, 0, 0}
1136 },
1137
1138 .first_sysupgrade_partition = "os-image",
1139 .last_sysupgrade_partition = "file-system"
1140 },
1141
1142 /** Firmware layout for the C7 */
1143 {
1144 .id = "ARCHER-C7-V4",
1145 .support_list =
1146 "SupportList:\n"
1147 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1148 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1149 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1150 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1151 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1152 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1153 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1154 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1155 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1156 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1157 .support_trail = '\x00',
1158 .soft_ver = "soft_ver:1.0.0\n",
1159
1160 /* We're using a dynamic kernel/rootfs split here */
1161 .partitions = {
1162 {"factory-boot", 0x00000, 0x20000},
1163 {"fs-uboot", 0x20000, 0x20000},
1164 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1165 /* Stock: name file-system base 0x160000 size 0xda0000 */
1166 {"default-mac", 0xf00000, 0x00200},
1167 {"pin", 0xf00200, 0x00200},
1168 {"device-id", 0xf00400, 0x00100},
1169 {"product-info", 0xf00500, 0x0fb00},
1170 {"soft-version", 0xf10000, 0x00100},
1171 {"extra-para", 0xf11000, 0x01000},
1172 {"support-list", 0xf12000, 0x0a000},
1173 {"profile", 0xf1c000, 0x04000},
1174 {"default-config", 0xf20000, 0x10000},
1175 {"user-config", 0xf30000, 0x40000},
1176 {"qos-db", 0xf70000, 0x40000},
1177 {"certificate", 0xfb0000, 0x10000},
1178 {"partition-table", 0xfc0000, 0x10000},
1179 {"log", 0xfd0000, 0x20000},
1180 {"radio", 0xff0000, 0x10000},
1181 {NULL, 0, 0}
1182 },
1183
1184 .first_sysupgrade_partition = "os-image",
1185 .last_sysupgrade_partition = "file-system",
1186 },
1187
1188 /** Firmware layout for the C7 v5*/
1189 {
1190 .id = "ARCHER-C7-V5",
1191 .support_list =
1192 "SupportList:\n"
1193 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1194 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1195 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1196 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1197 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1198 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1199 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1200 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1201
1202 .support_trail = '\x00',
1203 .soft_ver = "soft_ver:1.0.0\n",
1204
1205 /* We're using a dynamic kernel/rootfs split here */
1206 .partitions = {
1207 {"factory-boot", 0x00000, 0x20000},
1208 {"fs-uboot", 0x20000, 0x20000},
1209 {"partition-table", 0x40000, 0x10000},
1210 {"radio", 0x50000, 0x10000},
1211 {"default-mac", 0x60000, 0x00200},
1212 {"pin", 0x60200, 0x00200},
1213 {"device-id", 0x60400, 0x00100},
1214 {"product-info", 0x60500, 0x0fb00},
1215 {"soft-version", 0x70000, 0x01000},
1216 {"extra-para", 0x71000, 0x01000},
1217 {"support-list", 0x72000, 0x0a000},
1218 {"profile", 0x7c000, 0x04000},
1219 {"user-config", 0x80000, 0x40000},
1220
1221
1222 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1223 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1224
1225 {"log", 0xfc0000, 0x20000},
1226 {"certificate", 0xfe0000, 0x10000},
1227 {"default-config", 0xff0000, 0x10000},
1228 {NULL, 0, 0}
1229
1230 },
1231
1232 .first_sysupgrade_partition = "os-image",
1233 .last_sysupgrade_partition = "file-system",
1234 },
1235
1236 /** Firmware layout for the C9 */
1237 {
1238 .id = "ARCHERC9",
1239 .vendor = "",
1240 .support_list =
1241 "SupportList:\n"
1242 "{product_name:ArcherC9,"
1243 "product_ver:1.0.0,"
1244 "special_id:00000000}\n",
1245 .support_trail = '\x00',
1246 .soft_ver = NULL,
1247
1248 .partitions = {
1249 {"fs-uboot", 0x00000, 0x40000},
1250 {"os-image", 0x40000, 0x200000},
1251 {"file-system", 0x240000, 0xc00000},
1252 {"default-mac", 0xe40000, 0x00200},
1253 {"pin", 0xe40200, 0x00200},
1254 {"product-info", 0xe40400, 0x00200},
1255 {"partition-table", 0xe50000, 0x10000},
1256 {"soft-version", 0xe60000, 0x00200},
1257 {"support-list", 0xe61000, 0x0f000},
1258 {"profile", 0xe70000, 0x10000},
1259 {"default-config", 0xe80000, 0x10000},
1260 {"user-config", 0xe90000, 0x50000},
1261 {"log", 0xee0000, 0x100000},
1262 {"radio_bk", 0xfe0000, 0x10000},
1263 {"radio", 0xff0000, 0x10000},
1264 {NULL, 0, 0}
1265 },
1266
1267 .first_sysupgrade_partition = "os-image",
1268 .last_sysupgrade_partition = "file-system"
1269 },
1270
1271 /** Firmware layout for the EAP120 */
1272 {
1273 .id = "EAP120",
1274 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1275 .support_list =
1276 "SupportList:\r\n"
1277 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1278 .support_trail = '\xff',
1279 .soft_ver = NULL,
1280
1281 .partitions = {
1282 {"fs-uboot", 0x00000, 0x20000},
1283 {"partition-table", 0x20000, 0x02000},
1284 {"default-mac", 0x30000, 0x00020},
1285 {"support-list", 0x31000, 0x00100},
1286 {"product-info", 0x31100, 0x00100},
1287 {"soft-version", 0x32000, 0x00100},
1288 {"os-image", 0x40000, 0x180000},
1289 {"file-system", 0x1c0000, 0x600000},
1290 {"user-config", 0x7c0000, 0x10000},
1291 {"backup-config", 0x7d0000, 0x10000},
1292 {"log", 0x7e0000, 0x10000},
1293 {"radio", 0x7f0000, 0x10000},
1294 {NULL, 0, 0}
1295 },
1296
1297 .first_sysupgrade_partition = "os-image",
1298 .last_sysupgrade_partition = "file-system"
1299 },
1300
1301 /** Firmware layout for the EAP225-Outdoor v1 */
1302 {
1303 .id = "EAP225-OUTDOOR-V1",
1304 .support_list =
1305 "SupportList:\r\n"
1306 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1307 .support_trail = '\xff',
1308 .soft_ver = NULL,
1309 .soft_ver_compat_level = 1,
1310
1311 .partitions = {
1312 {"fs-uboot", 0x00000, 0x20000},
1313 {"partition-table", 0x20000, 0x02000},
1314 {"default-mac", 0x30000, 0x01000},
1315 {"support-list", 0x31000, 0x00100},
1316 {"product-info", 0x31100, 0x00400},
1317 {"soft-version", 0x32000, 0x00100},
1318 {"firmware", 0x40000, 0xd80000},
1319 {"user-config", 0xdc0000, 0x30000},
1320 {"mutil-log", 0xf30000, 0x80000},
1321 {"oops", 0xfb0000, 0x40000},
1322 {"radio", 0xff0000, 0x10000},
1323 {NULL, 0, 0}
1324 },
1325
1326 .first_sysupgrade_partition = "os-image",
1327 .last_sysupgrade_partition = "file-system"
1328 },
1329
1330 /** Firmware layout for the EAP225 v3 */
1331 {
1332 .id = "EAP225-V3",
1333 .support_list =
1334 "SupportList:\r\n"
1335 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n",
1336 .support_trail = '\xff',
1337 .soft_ver = NULL,
1338 .soft_ver_compat_level = 1,
1339
1340 .partitions = {
1341 {"fs-uboot", 0x00000, 0x20000},
1342 {"partition-table", 0x20000, 0x02000},
1343 {"default-mac", 0x30000, 0x01000},
1344 {"support-list", 0x31000, 0x00100},
1345 {"product-info", 0x31100, 0x00400},
1346 {"soft-version", 0x32000, 0x00100},
1347 {"firmware", 0x40000, 0xd80000},
1348 {"user-config", 0xdc0000, 0x30000},
1349 {"mutil-log", 0xf30000, 0x80000},
1350 {"oops", 0xfb0000, 0x40000},
1351 {"radio", 0xff0000, 0x10000},
1352 {NULL, 0, 0}
1353 },
1354
1355 .first_sysupgrade_partition = "os-image",
1356 .last_sysupgrade_partition = "file-system"
1357 },
1358
1359 /** Firmware layout for the EAP225-Wall v2 */
1360 {
1361 .id = "EAP225-WALL-V2",
1362 .support_list =
1363 "SupportList:\r\n"
1364 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1365 .support_trail = '\xff',
1366 .soft_ver = NULL,
1367 .soft_ver_compat_level = 1,
1368
1369 .partitions = {
1370 {"fs-uboot", 0x00000, 0x20000},
1371 {"partition-table", 0x20000, 0x02000},
1372 {"default-mac", 0x30000, 0x01000},
1373 {"support-list", 0x31000, 0x00100},
1374 {"product-info", 0x31100, 0x00400},
1375 {"soft-version", 0x32000, 0x00100},
1376 {"firmware", 0x40000, 0xd80000},
1377 {"user-config", 0xdc0000, 0x30000},
1378 {"mutil-log", 0xf30000, 0x80000},
1379 {"oops", 0xfb0000, 0x40000},
1380 {"radio", 0xff0000, 0x10000},
1381 {NULL, 0, 0}
1382 },
1383
1384 .first_sysupgrade_partition = "os-image",
1385 .last_sysupgrade_partition = "file-system"
1386 },
1387
1388 /** Firmware layout for the EAP245 v1 */
1389 {
1390 .id = "EAP245-V1",
1391 .support_list =
1392 "SupportList:\r\n"
1393 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1394 .support_trail = '\xff',
1395 .soft_ver = NULL,
1396
1397 .partitions = {
1398 {"fs-uboot", 0x00000, 0x20000},
1399 {"partition-table", 0x20000, 0x02000},
1400 {"default-mac", 0x30000, 0x01000},
1401 {"support-list", 0x31000, 0x00100},
1402 {"product-info", 0x31100, 0x00400},
1403 {"soft-version", 0x32000, 0x00100},
1404 {"firmware", 0x40000, 0xd80000},
1405 {"user-config", 0xdc0000, 0x30000},
1406 {"radio", 0xff0000, 0x10000},
1407 {NULL, 0, 0}
1408 },
1409
1410 .first_sysupgrade_partition = "os-image",
1411 .last_sysupgrade_partition = "file-system"
1412 },
1413
1414 /** Firmware layout for the EAP245 v3 */
1415 {
1416 .id = "EAP245-V3",
1417 .support_list =
1418 "SupportList:\r\n"
1419 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n",
1420 .support_trail = '\xff',
1421 .soft_ver = NULL,
1422 .soft_ver_compat_level = 1,
1423
1424 /** Firmware partition with dynamic kernel/rootfs split */
1425 .partitions = {
1426 {"factroy-boot", 0x00000, 0x40000},
1427 {"fs-uboot", 0x40000, 0x40000},
1428 {"partition-table", 0x80000, 0x10000},
1429 {"default-mac", 0x90000, 0x01000},
1430 {"support-list", 0x91000, 0x00100},
1431 {"product-info", 0x91100, 0x00400},
1432 {"soft-version", 0x92000, 0x00100},
1433 {"radio", 0xa0000, 0x10000},
1434 {"extra-para", 0xb0000, 0x10000},
1435 {"firmware", 0xc0000, 0xe40000},
1436 {"config", 0xf00000, 0x30000},
1437 {"mutil-log", 0xf30000, 0x80000},
1438 {"oops", 0xfb0000, 0x40000},
1439 {NULL, 0, 0}
1440 },
1441
1442 .first_sysupgrade_partition = "os-image",
1443 .last_sysupgrade_partition = "file-system"
1444 },
1445
1446 /** Firmware layout for the TL-WA850RE v2 */
1447 {
1448 .id = "TLWA850REV2",
1449 .vendor = "",
1450 .support_list =
1451 "SupportList:\n"
1452 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
1453 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
1454 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
1455 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
1456 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
1457 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
1458 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
1459 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
1460 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
1461 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
1462 .support_trail = '\x00',
1463 .soft_ver = NULL,
1464
1465 /**
1466 576KB were moved from file-system to os-image
1467 in comparison to the stock image
1468 */
1469 .partitions = {
1470 {"fs-uboot", 0x00000, 0x20000},
1471 {"firmware", 0x20000, 0x390000},
1472 {"partition-table", 0x3b0000, 0x02000},
1473 {"default-mac", 0x3c0000, 0x00020},
1474 {"pin", 0x3c0100, 0x00020},
1475 {"product-info", 0x3c1000, 0x01000},
1476 {"soft-version", 0x3c2000, 0x00100},
1477 {"support-list", 0x3c3000, 0x01000},
1478 {"profile", 0x3c4000, 0x08000},
1479 {"user-config", 0x3d0000, 0x10000},
1480 {"default-config", 0x3e0000, 0x10000},
1481 {"radio", 0x3f0000, 0x10000},
1482 {NULL, 0, 0}
1483 },
1484
1485 .first_sysupgrade_partition = "os-image",
1486 .last_sysupgrade_partition = "file-system"
1487 },
1488
1489 /** Firmware layout for the TL-WA855RE v1 */
1490 {
1491 .id = "TLWA855REV1",
1492 .vendor = "",
1493 .support_list =
1494 "SupportList:\n"
1495 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
1496 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
1497 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
1498 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
1499 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
1500 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
1501 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
1502 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
1503 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
1504 .support_trail = '\x00',
1505 .soft_ver = NULL,
1506
1507 .partitions = {
1508 {"fs-uboot", 0x00000, 0x20000},
1509 {"os-image", 0x20000, 0x150000},
1510 {"file-system", 0x170000, 0x240000},
1511 {"partition-table", 0x3b0000, 0x02000},
1512 {"default-mac", 0x3c0000, 0x00020},
1513 {"pin", 0x3c0100, 0x00020},
1514 {"product-info", 0x3c1000, 0x01000},
1515 {"soft-version", 0x3c2000, 0x00100},
1516 {"support-list", 0x3c3000, 0x01000},
1517 {"profile", 0x3c4000, 0x08000},
1518 {"user-config", 0x3d0000, 0x10000},
1519 {"default-config", 0x3e0000, 0x10000},
1520 {"radio", 0x3f0000, 0x10000},
1521 {NULL, 0, 0}
1522 },
1523
1524 .first_sysupgrade_partition = "os-image",
1525 .last_sysupgrade_partition = "file-system"
1526 },
1527
1528 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
1529 {
1530 .id = "TL-WPA8630P-V2.0-EU",
1531 .vendor = "",
1532 .support_list =
1533 "SupportList:\n"
1534 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
1535 .support_trail = '\x00',
1536 .soft_ver = NULL,
1537
1538 .partitions = {
1539 {"factory-uboot", 0x00000, 0x20000},
1540 {"fs-uboot", 0x20000, 0x20000},
1541 {"firmware", 0x40000, 0x5e0000},
1542 {"partition-table", 0x620000, 0x02000},
1543 {"default-mac", 0x630000, 0x00020},
1544 {"pin", 0x630100, 0x00020},
1545 {"device-id", 0x630200, 0x00030},
1546 {"product-info", 0x631100, 0x01000},
1547 {"extra-para", 0x632100, 0x01000},
1548 {"soft-version", 0x640000, 0x01000},
1549 {"support-list", 0x641000, 0x01000},
1550 {"profile", 0x642000, 0x08000},
1551 {"user-config", 0x650000, 0x10000},
1552 {"default-config", 0x660000, 0x10000},
1553 {"default-nvm", 0x670000, 0xc0000},
1554 {"default-pib", 0x730000, 0x40000},
1555 {"radio", 0x7f0000, 0x10000},
1556 {NULL, 0, 0}
1557 },
1558
1559 .first_sysupgrade_partition = "os-image",
1560 .last_sysupgrade_partition = "file-system"
1561 },
1562
1563 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
1564 {
1565 .id = "TL-WPA8630P-V2-INT",
1566 .vendor = "",
1567 .support_list =
1568 "SupportList:\n"
1569 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
1570 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
1571 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
1572 .support_trail = '\x00',
1573 .soft_ver = NULL,
1574
1575 .partitions = {
1576 {"factory-uboot", 0x00000, 0x20000},
1577 {"fs-uboot", 0x20000, 0x20000},
1578 {"firmware", 0x40000, 0x5e0000},
1579 {"partition-table", 0x620000, 0x02000},
1580 {"extra-para", 0x632100, 0x01000},
1581 {"soft-version", 0x640000, 0x01000},
1582 {"support-list", 0x641000, 0x01000},
1583 {"profile", 0x642000, 0x08000},
1584 {"user-config", 0x650000, 0x10000},
1585 {"default-config", 0x660000, 0x10000},
1586 {"default-nvm", 0x670000, 0xc0000},
1587 {"default-pib", 0x730000, 0x40000},
1588 {"default-mac", 0x7e0000, 0x00020},
1589 {"pin", 0x7e0100, 0x00020},
1590 {"device-id", 0x7e0200, 0x00030},
1591 {"product-info", 0x7e1100, 0x01000},
1592 {"radio", 0x7f0000, 0x10000},
1593 {NULL, 0, 0}
1594 },
1595
1596 .first_sysupgrade_partition = "os-image",
1597 .last_sysupgrade_partition = "file-system"
1598 },
1599
1600 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
1601 {
1602 .id = "TL-WPA8630P-V2.1-EU",
1603 .vendor = "",
1604 .support_list =
1605 "SupportList:\n"
1606 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
1607 .support_trail = '\x00',
1608 .soft_ver = NULL,
1609
1610 .partitions = {
1611 {"factory-uboot", 0x00000, 0x20000},
1612 {"fs-uboot", 0x20000, 0x20000},
1613 {"firmware", 0x40000, 0x5e0000},
1614 {"extra-para", 0x680000, 0x01000},
1615 {"product-info", 0x690000, 0x01000},
1616 {"partition-table", 0x6a0000, 0x02000},
1617 {"soft-version", 0x6b0000, 0x01000},
1618 {"support-list", 0x6b1000, 0x01000},
1619 {"profile", 0x6b2000, 0x08000},
1620 {"user-config", 0x6c0000, 0x10000},
1621 {"default-config", 0x6d0000, 0x10000},
1622 {"default-nvm", 0x6e0000, 0xc0000},
1623 {"default-pib", 0x7a0000, 0x40000},
1624 {"default-mac", 0x7e0000, 0x00020},
1625 {"pin", 0x7e0100, 0x00020},
1626 {"device-id", 0x7e0200, 0x00030},
1627 {"radio", 0x7f0000, 0x10000},
1628 {NULL, 0, 0}
1629 },
1630
1631 .first_sysupgrade_partition = "os-image",
1632 .last_sysupgrade_partition = "file-system"
1633 },
1634
1635 /** Firmware layout for the TL-WR1043 v5 */
1636 {
1637 .id = "TLWR1043NV5",
1638 .vendor = "",
1639 .support_list =
1640 "SupportList:\n"
1641 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
1642 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
1643 .support_trail = '\x00',
1644 .soft_ver = "soft_ver:1.0.0\n",
1645 .partitions = {
1646 {"factory-boot", 0x00000, 0x20000},
1647 {"fs-uboot", 0x20000, 0x20000},
1648 {"firmware", 0x40000, 0xec0000},
1649 {"default-mac", 0xf00000, 0x00200},
1650 {"pin", 0xf00200, 0x00200},
1651 {"device-id", 0xf00400, 0x00100},
1652 {"product-info", 0xf00500, 0x0fb00},
1653 {"soft-version", 0xf10000, 0x01000},
1654 {"extra-para", 0xf11000, 0x01000},
1655 {"support-list", 0xf12000, 0x0a000},
1656 {"profile", 0xf1c000, 0x04000},
1657 {"default-config", 0xf20000, 0x10000},
1658 {"user-config", 0xf30000, 0x40000},
1659 {"qos-db", 0xf70000, 0x40000},
1660 {"certificate", 0xfb0000, 0x10000},
1661 {"partition-table", 0xfc0000, 0x10000},
1662 {"log", 0xfd0000, 0x20000},
1663 {"radio", 0xff0000, 0x10000},
1664 {NULL, 0, 0}
1665 },
1666 .first_sysupgrade_partition = "os-image",
1667 .last_sysupgrade_partition = "file-system"
1668 },
1669
1670 /** Firmware layout for the TL-WR1043 v4 */
1671 {
1672 .id = "TLWR1043NDV4",
1673 .vendor = "",
1674 .support_list =
1675 "SupportList:\n"
1676 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
1677 .support_trail = '\x00',
1678 .soft_ver = NULL,
1679
1680 /* We're using a dynamic kernel/rootfs split here */
1681 .partitions = {
1682 {"fs-uboot", 0x00000, 0x20000},
1683 {"firmware", 0x20000, 0xf30000},
1684 {"default-mac", 0xf50000, 0x00200},
1685 {"pin", 0xf50200, 0x00200},
1686 {"product-info", 0xf50400, 0x0fc00},
1687 {"soft-version", 0xf60000, 0x0b000},
1688 {"support-list", 0xf6b000, 0x04000},
1689 {"profile", 0xf70000, 0x04000},
1690 {"default-config", 0xf74000, 0x0b000},
1691 {"user-config", 0xf80000, 0x40000},
1692 {"partition-table", 0xfc0000, 0x10000},
1693 {"log", 0xfd0000, 0x20000},
1694 {"radio", 0xff0000, 0x10000},
1695 {NULL, 0, 0}
1696 },
1697
1698 .first_sysupgrade_partition = "os-image",
1699 .last_sysupgrade_partition = "file-system"
1700 },
1701
1702 /** Firmware layout for the TL-WR902AC v1 */
1703 {
1704 .id = "TL-WR902AC-V1",
1705 .vendor = "",
1706 .support_list =
1707 "SupportList:\n"
1708 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
1709 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
1710 .support_trail = '\x00',
1711 .soft_ver = NULL,
1712
1713 /**
1714 384KB were moved from file-system to os-image
1715 in comparison to the stock image
1716 */
1717 .partitions = {
1718 {"fs-uboot", 0x00000, 0x20000},
1719 {"firmware", 0x20000, 0x730000},
1720 {"default-mac", 0x750000, 0x00200},
1721 {"pin", 0x750200, 0x00200},
1722 {"product-info", 0x750400, 0x0fc00},
1723 {"soft-version", 0x760000, 0x0b000},
1724 {"support-list", 0x76b000, 0x04000},
1725 {"profile", 0x770000, 0x04000},
1726 {"default-config", 0x774000, 0x0b000},
1727 {"user-config", 0x780000, 0x40000},
1728 {"partition-table", 0x7c0000, 0x10000},
1729 {"log", 0x7d0000, 0x20000},
1730 {"radio", 0x7f0000, 0x10000},
1731 {NULL, 0, 0}
1732 },
1733
1734 .first_sysupgrade_partition = "os-image",
1735 .last_sysupgrade_partition = "file-system",
1736 },
1737
1738 /** Firmware layout for the TL-WR942N V1 */
1739 {
1740 .id = "TLWR942NV1",
1741 .vendor = "",
1742 .support_list =
1743 "SupportList:\r\n"
1744 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
1745 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
1746 .support_trail = '\x00',
1747 .soft_ver = NULL,
1748
1749 .partitions = {
1750 {"fs-uboot", 0x00000, 0x20000},
1751 {"firmware", 0x20000, 0xe20000},
1752 {"default-mac", 0xe40000, 0x00200},
1753 {"pin", 0xe40200, 0x00200},
1754 {"product-info", 0xe40400, 0x0fc00},
1755 {"partition-table", 0xe50000, 0x10000},
1756 {"soft-version", 0xe60000, 0x10000},
1757 {"support-list", 0xe70000, 0x10000},
1758 {"profile", 0xe80000, 0x10000},
1759 {"default-config", 0xe90000, 0x10000},
1760 {"user-config", 0xea0000, 0x40000},
1761 {"qos-db", 0xee0000, 0x40000},
1762 {"certificate", 0xf20000, 0x10000},
1763 {"usb-config", 0xfb0000, 0x10000},
1764 {"log", 0xfc0000, 0x20000},
1765 {"radio-bk", 0xfe0000, 0x10000},
1766 {"radio", 0xff0000, 0x10000},
1767 {NULL, 0, 0}
1768 },
1769
1770 .first_sysupgrade_partition = "os-image",
1771 .last_sysupgrade_partition = "file-system",
1772 },
1773
1774 /** Firmware layout for the RE200 v2 */
1775 {
1776 .id = "RE200-V2",
1777 .vendor = "",
1778 .support_list =
1779 "SupportList:\n"
1780 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
1781 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
1782 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
1783 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
1784 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
1785 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
1786 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
1787 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
1788 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
1789 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
1790 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
1791 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
1792 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
1793 .support_trail = '\x00',
1794 .soft_ver = NULL,
1795
1796 .partitions = {
1797 {"fs-uboot", 0x00000, 0x20000},
1798 {"firmware", 0x20000, 0x7a0000},
1799 {"partition-table", 0x7c0000, 0x02000},
1800 {"default-mac", 0x7c2000, 0x00020},
1801 {"pin", 0x7c2100, 0x00020},
1802 {"product-info", 0x7c3100, 0x01000},
1803 {"soft-version", 0x7c4200, 0x01000},
1804 {"support-list", 0x7c5200, 0x01000},
1805 {"profile", 0x7c6200, 0x08000},
1806 {"config-info", 0x7ce200, 0x00400},
1807 {"user-config", 0x7d0000, 0x10000},
1808 {"default-config", 0x7e0000, 0x10000},
1809 {"radio", 0x7f0000, 0x10000},
1810 {NULL, 0, 0}
1811 },
1812
1813 .first_sysupgrade_partition = "os-image",
1814 .last_sysupgrade_partition = "file-system"
1815 },
1816
1817 /** Firmware layout for the RE200 v3 */
1818 {
1819 .id = "RE200-V3",
1820 .vendor = "",
1821 .support_list =
1822 "SupportList:\n"
1823 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
1824 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
1825 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
1826 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
1827 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
1828 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
1829 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
1830 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
1831 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
1832 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
1833 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
1834 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
1835 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
1836 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
1837 .support_trail = '\x00',
1838 .soft_ver = NULL,
1839
1840 .partitions = {
1841 {"fs-uboot", 0x00000, 0x20000},
1842 {"firmware", 0x20000, 0x7a0000},
1843 {"partition-table", 0x7c0000, 0x02000},
1844 {"default-mac", 0x7c2000, 0x00020},
1845 {"pin", 0x7c2100, 0x00020},
1846 {"product-info", 0x7c3100, 0x01000},
1847 {"soft-version", 0x7c4200, 0x01000},
1848 {"support-list", 0x7c5200, 0x01000},
1849 {"profile", 0x7c6200, 0x08000},
1850 {"config-info", 0x7ce200, 0x00400},
1851 {"user-config", 0x7d0000, 0x10000},
1852 {"default-config", 0x7e0000, 0x10000},
1853 {"radio", 0x7f0000, 0x10000},
1854 {NULL, 0, 0}
1855 },
1856
1857 .first_sysupgrade_partition = "os-image",
1858 .last_sysupgrade_partition = "file-system"
1859 },
1860
1861 /** Firmware layout for the RE200 v4 */
1862 {
1863 .id = "RE200-V4",
1864 .vendor = "",
1865 .support_list =
1866 "SupportList:\n"
1867 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
1868 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
1869 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
1870 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
1871 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
1872 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
1873 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
1874 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
1875 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
1876 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
1877 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
1878 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
1879 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
1880 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
1881 .support_trail = '\x00',
1882 .soft_ver = "soft_ver:1.1.0\n",
1883
1884 .partitions = {
1885 {"fs-uboot", 0x00000, 0x20000},
1886 {"firmware", 0x20000, 0x7a0000},
1887 {"partition-table", 0x7c0000, 0x02000},
1888 {"default-mac", 0x7c2000, 0x00020},
1889 {"pin", 0x7c2100, 0x00020},
1890 {"product-info", 0x7c3100, 0x01000},
1891 {"soft-version", 0x7c4200, 0x01000},
1892 {"support-list", 0x7c5200, 0x01000},
1893 {"profile", 0x7c6200, 0x08000},
1894 {"config-info", 0x7ce200, 0x00400},
1895 {"user-config", 0x7d0000, 0x10000},
1896 {"default-config", 0x7e0000, 0x10000},
1897 {"radio", 0x7f0000, 0x10000},
1898 {NULL, 0, 0}
1899 },
1900
1901 .first_sysupgrade_partition = "os-image",
1902 .last_sysupgrade_partition = "file-system"
1903 },
1904
1905 /** Firmware layout for the RE220 v2 */
1906 {
1907 .id = "RE220-V2",
1908 .vendor = "",
1909 .support_list =
1910 "SupportList:\n"
1911 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
1912 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
1913 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
1914 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
1915 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
1916 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
1917 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
1918 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
1919 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
1920 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
1921 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
1922 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
1923 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
1924 .support_trail = '\x00',
1925 .soft_ver = NULL,
1926
1927 .partitions = {
1928 {"fs-uboot", 0x00000, 0x20000},
1929 {"firmware", 0x20000, 0x7a0000},
1930 {"partition-table", 0x7c0000, 0x02000},
1931 {"default-mac", 0x7c2000, 0x00020},
1932 {"pin", 0x7c2100, 0x00020},
1933 {"product-info", 0x7c3100, 0x01000},
1934 {"soft-version", 0x7c4200, 0x01000},
1935 {"support-list", 0x7c5200, 0x01000},
1936 {"profile", 0x7c6200, 0x08000},
1937 {"config-info", 0x7ce200, 0x00400},
1938 {"user-config", 0x7d0000, 0x10000},
1939 {"default-config", 0x7e0000, 0x10000},
1940 {"radio", 0x7f0000, 0x10000},
1941 {NULL, 0, 0}
1942 },
1943
1944 .first_sysupgrade_partition = "os-image",
1945 .last_sysupgrade_partition = "file-system"
1946 },
1947
1948 /** Firmware layout for the RE305 v1 */
1949 {
1950 .id = "RE305-V1",
1951 .vendor = "",
1952 .support_list =
1953 "SupportList:\n"
1954 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
1955 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
1956 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
1957 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
1958 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
1959 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
1960 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
1961 .support_trail = '\x00',
1962 .soft_ver = NULL,
1963
1964 .partitions = {
1965 {"fs-uboot", 0x00000, 0x20000},
1966 {"firmware", 0x20000, 0x5e0000},
1967 {"partition-table", 0x600000, 0x02000},
1968 {"default-mac", 0x610000, 0x00020},
1969 {"pin", 0x610100, 0x00020},
1970 {"product-info", 0x611100, 0x01000},
1971 {"soft-version", 0x620000, 0x01000},
1972 {"support-list", 0x621000, 0x01000},
1973 {"profile", 0x622000, 0x08000},
1974 {"user-config", 0x630000, 0x10000},
1975 {"default-config", 0x640000, 0x10000},
1976 {"radio", 0x7f0000, 0x10000},
1977 {NULL, 0, 0}
1978 },
1979
1980 .first_sysupgrade_partition = "os-image",
1981 .last_sysupgrade_partition = "file-system"
1982 },
1983
1984 /** Firmware layout for the RE350 v1 */
1985 {
1986 .id = "RE350-V1",
1987 .vendor = "",
1988 .support_list =
1989 "SupportList:\n"
1990 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
1991 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
1992 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
1993 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
1994 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
1995 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
1996 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
1997 .support_trail = '\x00',
1998 .soft_ver = NULL,
1999
2000 /** We're using a dynamic kernel/rootfs split here */
2001 .partitions = {
2002 {"fs-uboot", 0x00000, 0x20000},
2003 {"firmware", 0x20000, 0x5e0000},
2004 {"partition-table", 0x600000, 0x02000},
2005 {"default-mac", 0x610000, 0x00020},
2006 {"pin", 0x610100, 0x00020},
2007 {"product-info", 0x611100, 0x01000},
2008 {"soft-version", 0x620000, 0x01000},
2009 {"support-list", 0x621000, 0x01000},
2010 {"profile", 0x622000, 0x08000},
2011 {"user-config", 0x630000, 0x10000},
2012 {"default-config", 0x640000, 0x10000},
2013 {"radio", 0x7f0000, 0x10000},
2014 {NULL, 0, 0}
2015 },
2016
2017 .first_sysupgrade_partition = "os-image",
2018 .last_sysupgrade_partition = "file-system"
2019 },
2020
2021 /** Firmware layout for the RE350K v1 */
2022 {
2023 .id = "RE350K-V1",
2024 .vendor = "",
2025 .support_list =
2026 "SupportList:\n"
2027 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2028 .support_trail = '\x00',
2029 .soft_ver = NULL,
2030
2031 /** We're using a dynamic kernel/rootfs split here */
2032 .partitions = {
2033 {"fs-uboot", 0x00000, 0x20000},
2034 {"firmware", 0x20000, 0xd70000},
2035 {"partition-table", 0xd90000, 0x02000},
2036 {"default-mac", 0xda0000, 0x00020},
2037 {"pin", 0xda0100, 0x00020},
2038 {"product-info", 0xda1100, 0x01000},
2039 {"soft-version", 0xdb0000, 0x01000},
2040 {"support-list", 0xdb1000, 0x01000},
2041 {"profile", 0xdb2000, 0x08000},
2042 {"user-config", 0xdc0000, 0x10000},
2043 {"default-config", 0xdd0000, 0x10000},
2044 {"device-id", 0xde0000, 0x00108},
2045 {"radio", 0xff0000, 0x10000},
2046 {NULL, 0, 0}
2047 },
2048
2049 .first_sysupgrade_partition = "os-image",
2050 .last_sysupgrade_partition = "file-system"
2051 },
2052
2053 /** Firmware layout for the RE355 */
2054 {
2055 .id = "RE355",
2056 .vendor = "",
2057 .support_list =
2058 "SupportList:\r\n"
2059 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2060 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2061 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2062 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2063 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2064 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2065 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2066 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2067 .support_trail = '\x00',
2068 .soft_ver = NULL,
2069
2070 /* We're using a dynamic kernel/rootfs split here */
2071 .partitions = {
2072 {"fs-uboot", 0x00000, 0x20000},
2073 {"firmware", 0x20000, 0x5e0000},
2074 {"partition-table", 0x600000, 0x02000},
2075 {"default-mac", 0x610000, 0x00020},
2076 {"pin", 0x610100, 0x00020},
2077 {"product-info", 0x611100, 0x01000},
2078 {"soft-version", 0x620000, 0x01000},
2079 {"support-list", 0x621000, 0x01000},
2080 {"profile", 0x622000, 0x08000},
2081 {"user-config", 0x630000, 0x10000},
2082 {"default-config", 0x640000, 0x10000},
2083 {"radio", 0x7f0000, 0x10000},
2084 {NULL, 0, 0}
2085 },
2086
2087 .first_sysupgrade_partition = "os-image",
2088 .last_sysupgrade_partition = "file-system"
2089 },
2090
2091 /** Firmware layout for the RE450 */
2092 {
2093 .id = "RE450",
2094 .vendor = "",
2095 .support_list =
2096 "SupportList:\r\n"
2097 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2098 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2099 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2100 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2101 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2102 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2103 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2104 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2105 .support_trail = '\x00',
2106 .soft_ver = NULL,
2107
2108 /** We're using a dynamic kernel/rootfs split here */
2109 .partitions = {
2110 {"fs-uboot", 0x00000, 0x20000},
2111 {"firmware", 0x20000, 0x5e0000},
2112 {"partition-table", 0x600000, 0x02000},
2113 {"default-mac", 0x610000, 0x00020},
2114 {"pin", 0x610100, 0x00020},
2115 {"product-info", 0x611100, 0x01000},
2116 {"soft-version", 0x620000, 0x01000},
2117 {"support-list", 0x621000, 0x01000},
2118 {"profile", 0x622000, 0x08000},
2119 {"user-config", 0x630000, 0x10000},
2120 {"default-config", 0x640000, 0x10000},
2121 {"radio", 0x7f0000, 0x10000},
2122 {NULL, 0, 0}
2123 },
2124
2125 .first_sysupgrade_partition = "os-image",
2126 .last_sysupgrade_partition = "file-system"
2127 },
2128
2129 /** Firmware layout for the RE450 v2 */
2130 {
2131 .id = "RE450-V2",
2132 .vendor = "",
2133 .support_list =
2134 "SupportList:\r\n"
2135 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2136 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2137 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2138 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2139 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2140 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2141 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2142 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2143 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2144 .support_trail = '\x00',
2145 .soft_ver = NULL,
2146
2147 /* We're using a dynamic kernel/rootfs split here */
2148 .partitions = {
2149 {"fs-uboot", 0x00000, 0x20000},
2150 {"firmware", 0x20000, 0x5e0000},
2151 {"partition-table", 0x600000, 0x02000},
2152 {"default-mac", 0x610000, 0x00020},
2153 {"pin", 0x610100, 0x00020},
2154 {"product-info", 0x611100, 0x01000},
2155 {"soft-version", 0x620000, 0x01000},
2156 {"support-list", 0x621000, 0x01000},
2157 {"profile", 0x622000, 0x08000},
2158 {"user-config", 0x630000, 0x10000},
2159 {"default-config", 0x640000, 0x10000},
2160 {"radio", 0x7f0000, 0x10000},
2161 {NULL, 0, 0}
2162 },
2163
2164 .first_sysupgrade_partition = "os-image",
2165 .last_sysupgrade_partition = "file-system"
2166 },
2167
2168 /** Firmware layout for the RE450 v3 */
2169 {
2170 .id = "RE450-V3",
2171 .vendor = "",
2172 .support_list =
2173 "SupportList:\r\n"
2174 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2175 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2176 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2177 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2178 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2179 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2180 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2181 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2182 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2183 .support_trail = '\x00',
2184 .soft_ver = NULL,
2185
2186 /* We're using a dynamic kernel/rootfs split here */
2187 .partitions = {
2188 {"fs-uboot", 0x00000, 0x20000},
2189 {"default-mac", 0x20000, 0x00020},
2190 {"pin", 0x20020, 0x00020},
2191 {"product-info", 0x21000, 0x01000},
2192 {"partition-table", 0x22000, 0x02000},
2193 {"soft-version", 0x24000, 0x01000},
2194 {"support-list", 0x25000, 0x01000},
2195 {"profile", 0x26000, 0x08000},
2196 {"user-config", 0x2e000, 0x10000},
2197 {"default-config", 0x3e000, 0x10000},
2198 {"config-info", 0x4e000, 0x00400},
2199 {"firmware", 0x50000, 0x7a0000},
2200 {"radio", 0x7f0000, 0x10000},
2201 {NULL, 0, 0}
2202 },
2203
2204 .first_sysupgrade_partition = "os-image",
2205 .last_sysupgrade_partition = "file-system"
2206 },
2207
2208 /** Firmware layout for the RE500 */
2209 {
2210 .id = "RE500-V1",
2211 .vendor = "",
2212 .support_list =
2213 "SupportList:\r\n"
2214 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
2215 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
2216 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
2217 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
2218 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
2219 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
2220 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
2221 .support_trail = '\x00',
2222 .soft_ver = NULL,
2223
2224 /* We're using a dynamic kernel/rootfs split here */
2225 .partitions = {
2226 {"fs-uboot", 0x00000, 0x20000},
2227 {"firmware", 0x20000, 0xde0000},
2228 {"partition-table", 0xe00000, 0x02000},
2229 {"default-mac", 0xe10000, 0x00020},
2230 {"pin", 0xe10100, 0x00020},
2231 {"product-info", 0xe11100, 0x01000},
2232 {"soft-version", 0xe20000, 0x01000},
2233 {"support-list", 0xe21000, 0x01000},
2234 {"profile", 0xe22000, 0x08000},
2235 {"user-config", 0xe30000, 0x10000},
2236 {"default-config", 0xe40000, 0x10000},
2237 {"radio", 0xff0000, 0x10000},
2238 {NULL, 0, 0}
2239 },
2240
2241 .first_sysupgrade_partition = "os-image",
2242 .last_sysupgrade_partition = "file-system"
2243 },
2244
2245 /** Firmware layout for the RE650 */
2246 {
2247 .id = "RE650-V1",
2248 .vendor = "",
2249 .support_list =
2250 "SupportList:\r\n"
2251 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
2252 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
2253 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
2254 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
2255 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
2256 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
2257 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
2258 .support_trail = '\x00',
2259 .soft_ver = NULL,
2260
2261 /* We're using a dynamic kernel/rootfs split here */
2262 .partitions = {
2263 {"fs-uboot", 0x00000, 0x20000},
2264 {"firmware", 0x20000, 0xde0000},
2265 {"partition-table", 0xe00000, 0x02000},
2266 {"default-mac", 0xe10000, 0x00020},
2267 {"pin", 0xe10100, 0x00020},
2268 {"product-info", 0xe11100, 0x01000},
2269 {"soft-version", 0xe20000, 0x01000},
2270 {"support-list", 0xe21000, 0x01000},
2271 {"profile", 0xe22000, 0x08000},
2272 {"user-config", 0xe30000, 0x10000},
2273 {"default-config", 0xe40000, 0x10000},
2274 {"radio", 0xff0000, 0x10000},
2275 {NULL, 0, 0}
2276 },
2277
2278 .first_sysupgrade_partition = "os-image",
2279 .last_sysupgrade_partition = "file-system"
2280 },
2281
2282 {}
2283 };
2284
2285 #define error(_ret, _errno, _str, ...) \
2286 do { \
2287 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
2288 strerror(_errno)); \
2289 if (_ret) \
2290 exit(_ret); \
2291 } while (0)
2292
2293
2294 /** Stores a uint32 as big endian */
2295 static inline void put32(uint8_t *buf, uint32_t val) {
2296 buf[0] = val >> 24;
2297 buf[1] = val >> 16;
2298 buf[2] = val >> 8;
2299 buf[3] = val;
2300 }
2301
2302 /** Allocates a new image partition */
2303 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
2304 struct image_partition_entry entry = {name, len, malloc(len)};
2305 if (!entry.data)
2306 error(1, errno, "malloc");
2307
2308 return entry;
2309 }
2310
2311 /** Frees an image partition */
2312 static void free_image_partition(struct image_partition_entry entry) {
2313 free(entry.data);
2314 }
2315
2316 static time_t source_date_epoch = -1;
2317 static void set_source_date_epoch() {
2318 char *env = getenv("SOURCE_DATE_EPOCH");
2319 char *endptr = env;
2320 errno = 0;
2321 if (env && *env) {
2322 source_date_epoch = strtoull(env, &endptr, 10);
2323 if (errno || (endptr && *endptr != '\0')) {
2324 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
2325 exit(1);
2326 }
2327 }
2328 }
2329
2330 /** Generates the partition-table partition */
2331 static struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
2332 struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
2333
2334 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
2335
2336 *(s++) = 0x00;
2337 *(s++) = 0x04;
2338 *(s++) = 0x00;
2339 *(s++) = 0x00;
2340
2341 size_t i;
2342 for (i = 0; p[i].name; i++) {
2343 size_t len = end-s;
2344 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
2345
2346 if (w > len-1)
2347 error(1, 0, "flash partition table overflow?");
2348
2349 s += w;
2350 }
2351
2352 s++;
2353
2354 memset(s, 0xff, end-s);
2355
2356 return entry;
2357 }
2358
2359
2360 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
2361 static inline uint8_t bcd(uint8_t v) {
2362 return 0x10 * (v/10) + v%10;
2363 }
2364
2365
2366 /** Generates the soft-version partition */
2367 static struct image_partition_entry make_soft_version(struct device_info *info, uint32_t rev) {
2368 size_t part_len = sizeof(struct soft_version);
2369 if (info->soft_ver_compat_level > 0)
2370 part_len += sizeof(uint32_t);
2371
2372 struct image_partition_entry entry =
2373 alloc_image_partition("soft-version", part_len+1);
2374 struct soft_version *s = (struct soft_version *)entry.data;
2375
2376 time_t t;
2377
2378 if (source_date_epoch != -1)
2379 t = source_date_epoch;
2380 else if (time(&t) == (time_t)(-1))
2381 error(1, errno, "time");
2382
2383 struct tm *tm = gmtime(&t);
2384
2385 /* Partition contents size, minus 8 byte header and trailing byte */
2386 s->data_len = htonl(entry.size-9);
2387 s->zero = 0;
2388 s->pad1 = 0xff;
2389
2390 s->version_major = 0;
2391 s->version_minor = 0;
2392 s->version_patch = 0;
2393
2394 s->year_hi = bcd((1900+tm->tm_year)/100);
2395 s->year_lo = bcd(tm->tm_year%100);
2396 s->month = bcd(tm->tm_mon+1);
2397 s->day = bcd(tm->tm_mday);
2398 s->rev = htonl(rev);
2399
2400 if (info->soft_ver_compat_level > 0)
2401 *(uint32_t *)(entry.data + sizeof(struct soft_version)) =
2402 htonl(info->soft_ver_compat_level);
2403
2404 entry.data[entry.size-1] = 0xff;
2405
2406 return entry;
2407 }
2408
2409 static struct image_partition_entry make_soft_version_from_string(const char *soft_ver) {
2410 /** String length _including_ the terminating zero byte */
2411 uint32_t ver_len = strlen(soft_ver) + 1;
2412 /** Partition contains 64 bit header, the version string, and one additional null byte */
2413 size_t partition_len = 2*sizeof(uint32_t) + ver_len + 1;
2414 struct image_partition_entry entry = alloc_image_partition("soft-version", partition_len);
2415
2416 uint32_t *len = (uint32_t *)entry.data;
2417 len[0] = htonl(ver_len);
2418 len[1] = 0;
2419 memcpy(&len[2], soft_ver, ver_len);
2420
2421 entry.data[partition_len - 1] = 0;
2422
2423 return entry;
2424 }
2425
2426 /** Generates the support-list partition */
2427 static struct image_partition_entry make_support_list(struct device_info *info) {
2428 size_t len = strlen(info->support_list);
2429 struct image_partition_entry entry = alloc_image_partition("support-list", len + 9);
2430
2431 put32(entry.data, len);
2432 memset(entry.data+4, 0, 4);
2433 memcpy(entry.data+8, info->support_list, len);
2434 entry.data[len+8] = info->support_trail;
2435
2436 return entry;
2437 }
2438
2439 /** Creates a new image partition with an arbitrary name from a file */
2440 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
2441 struct stat statbuf;
2442
2443 if (stat(filename, &statbuf) < 0)
2444 error(1, errno, "unable to stat file `%s'", filename);
2445
2446 size_t len = statbuf.st_size;
2447
2448 if (add_jffs2_eof) {
2449 if (file_system_partition)
2450 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
2451 else
2452 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
2453 }
2454
2455 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2456
2457 FILE *file = fopen(filename, "rb");
2458 if (!file)
2459 error(1, errno, "unable to open file `%s'", filename);
2460
2461 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
2462 error(1, errno, "unable to read file `%s'", filename);
2463
2464 if (add_jffs2_eof) {
2465 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
2466
2467 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
2468 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
2469 }
2470
2471 fclose(file);
2472
2473 return entry;
2474 }
2475
2476 /** Creates a new image partition from arbitrary data */
2477 static struct image_partition_entry put_data(const char *part_name, const char *datain, size_t len) {
2478
2479 struct image_partition_entry entry = alloc_image_partition(part_name, len);
2480
2481 memcpy(entry.data, datain, len);
2482
2483 return entry;
2484 }
2485
2486 /**
2487 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
2488
2489 Example image partition table:
2490
2491 fwup-ptn partition-table base 0x00800 size 0x00800
2492 fwup-ptn os-image base 0x01000 size 0x113b45
2493 fwup-ptn file-system base 0x114b45 size 0x1d0004
2494 fwup-ptn support-list base 0x2e4b49 size 0x000d1
2495
2496 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
2497 the end of the partition table is marked with a zero byte.
2498
2499 The firmware image must contain at least the partition-table and support-list partitions
2500 to be accepted. There aren't any alignment constraints for the image partitions.
2501
2502 The partition-table partition contains the actual flash layout; partitions
2503 from the image partition table are mapped to the corresponding flash partitions during
2504 the firmware upgrade. The support-list partition contains a list of devices supported by
2505 the firmware image.
2506
2507 The base offsets in the firmware partition table are relative to the end
2508 of the vendor information block, so the partition-table partition will
2509 actually start at offset 0x1814 of the image.
2510
2511 I think partition-table must be the first partition in the firmware image.
2512 */
2513 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
2514 size_t i, j;
2515 char *image_pt = (char *)buffer, *end = image_pt + 0x800;
2516
2517 size_t base = 0x800;
2518 for (i = 0; parts[i].name; i++) {
2519 for (j = 0; flash_parts[j].name; j++) {
2520 if (!strcmp(flash_parts[j].name, parts[i].name)) {
2521 if (parts[i].size > flash_parts[j].size)
2522 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
2523 break;
2524 }
2525 }
2526
2527 assert(flash_parts[j].name);
2528
2529 memcpy(buffer + base, parts[i].data, parts[i].size);
2530
2531 size_t len = end-image_pt;
2532 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
2533
2534 if (w > len-1)
2535 error(1, 0, "image partition table overflow?");
2536
2537 image_pt += w;
2538
2539 base += parts[i].size;
2540 }
2541 }
2542
2543 /** Generates and writes the image MD5 checksum */
2544 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
2545 MD5_CTX ctx;
2546
2547 MD5_Init(&ctx);
2548 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
2549 MD5_Update(&ctx, buffer, len);
2550 MD5_Final(md5, &ctx);
2551 }
2552
2553
2554 /**
2555 Generates the firmware image in factory format
2556
2557 Image format:
2558
2559 Bytes (hex) Usage
2560 ----------- -----
2561 0000-0003 Image size (4 bytes, big endian)
2562 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
2563 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
2564 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
2565 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
2566 1014-1813 Image partition table (2048 bytes, padded with 0xff)
2567 1814-xxxx Firmware partitions
2568 */
2569 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
2570 *len = 0x1814;
2571
2572 size_t i;
2573 for (i = 0; parts[i].name; i++)
2574 *len += parts[i].size;
2575
2576 uint8_t *image = malloc(*len);
2577 if (!image)
2578 error(1, errno, "malloc");
2579
2580 memset(image, 0xff, *len);
2581 put32(image, *len);
2582
2583 if (info->vendor) {
2584 size_t vendor_len = strlen(info->vendor);
2585 put32(image+0x14, vendor_len);
2586 memcpy(image+0x18, info->vendor, vendor_len);
2587 }
2588
2589 put_partitions(image + 0x1014, info->partitions, parts);
2590 put_md5(image+0x04, image+0x14, *len-0x14);
2591
2592 return image;
2593 }
2594
2595 /**
2596 Generates the firmware image in sysupgrade format
2597
2598 This makes some assumptions about the provided flash and image partition tables and
2599 should be generalized when TP-LINK starts building its safeloader into hardware with
2600 different flash layouts.
2601 */
2602 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
2603 size_t i, j;
2604 size_t flash_first_partition_index = 0;
2605 size_t flash_last_partition_index = 0;
2606 const struct flash_partition_entry *flash_first_partition = NULL;
2607 const struct flash_partition_entry *flash_last_partition = NULL;
2608 const struct image_partition_entry *image_last_partition = NULL;
2609
2610 /** Find first and last partitions */
2611 for (i = 0; info->partitions[i].name; i++) {
2612 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
2613 flash_first_partition = &info->partitions[i];
2614 flash_first_partition_index = i;
2615 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
2616 flash_last_partition = &info->partitions[i];
2617 flash_last_partition_index = i;
2618 }
2619 }
2620
2621 assert(flash_first_partition && flash_last_partition);
2622 assert(flash_first_partition_index < flash_last_partition_index);
2623
2624 /** Find last partition from image to calculate needed size */
2625 for (i = 0; image_parts[i].name; i++) {
2626 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
2627 image_last_partition = &image_parts[i];
2628 break;
2629 }
2630 }
2631
2632 assert(image_last_partition);
2633
2634 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
2635
2636 uint8_t *image = malloc(*len);
2637 if (!image)
2638 error(1, errno, "malloc");
2639
2640 memset(image, 0xff, *len);
2641
2642 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
2643 for (j = 0; image_parts[j].name; j++) {
2644 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
2645 if (image_parts[j].size > info->partitions[i].size)
2646 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
2647 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
2648 break;
2649 }
2650
2651 assert(image_parts[j].name);
2652 }
2653 }
2654
2655 return image;
2656 }
2657
2658 /** Generates an image according to a given layout and writes it to a file */
2659 static void build_image(const char *output,
2660 const char *kernel_image,
2661 const char *rootfs_image,
2662 uint32_t rev,
2663 bool add_jffs2_eof,
2664 bool sysupgrade,
2665 struct device_info *info) {
2666
2667 size_t i;
2668
2669 struct image_partition_entry parts[7] = {};
2670
2671 struct flash_partition_entry *firmware_partition = NULL;
2672 struct flash_partition_entry *os_image_partition = NULL;
2673 struct flash_partition_entry *file_system_partition = NULL;
2674 size_t firmware_partition_index = 0;
2675
2676 for (i = 0; info->partitions[i].name; i++) {
2677 if (!strcmp(info->partitions[i].name, "firmware"))
2678 {
2679 firmware_partition = &info->partitions[i];
2680 firmware_partition_index = i;
2681 }
2682 }
2683
2684 if (firmware_partition)
2685 {
2686 os_image_partition = &info->partitions[firmware_partition_index];
2687 file_system_partition = &info->partitions[firmware_partition_index + 1];
2688
2689 struct stat kernel;
2690 if (stat(kernel_image, &kernel) < 0)
2691 error(1, errno, "unable to stat file `%s'", kernel_image);
2692
2693 if (kernel.st_size > firmware_partition->size)
2694 error(1, 0, "kernel overflowed firmware partition\n");
2695
2696 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
2697 info->partitions[i+1] = info->partitions[i];
2698
2699 file_system_partition->name = "file-system";
2700 file_system_partition->base = firmware_partition->base + kernel.st_size;
2701
2702 /* Align partition start to erase blocks for factory images only */
2703 if (!sysupgrade)
2704 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
2705
2706 file_system_partition->size = firmware_partition->size - file_system_partition->base;
2707
2708 os_image_partition->name = "os-image";
2709 os_image_partition->size = kernel.st_size;
2710 }
2711
2712 parts[0] = make_partition_table(info->partitions);
2713 if (info->soft_ver)
2714 parts[1] = make_soft_version_from_string(info->soft_ver);
2715 else
2716 parts[1] = make_soft_version(info, rev);
2717
2718 parts[2] = make_support_list(info);
2719 parts[3] = read_file("os-image", kernel_image, false, NULL);
2720 parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof, file_system_partition);
2721
2722 /* Some devices need the extra-para partition to accept the firmware */
2723 if (strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
2724 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
2725 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
2726 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
2727 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
2728 strcasecmp(info->id, "TLWR1043NV5") == 0) {
2729 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00};
2730 parts[5] = put_data("extra-para", mdat, 11);
2731 } else if (strcasecmp(info->id, "ARCHER-A7-V5") == 0 || strcasecmp(info->id, "ARCHER-C7-V4") == 0 || strcasecmp(info->id, "ARCHER-C7-V5") == 0) {
2732 const char mdat[11] = {0x01, 0x00, 0x00, 0x02, 0x00, 0x00, 0xca, 0x00, 0x01, 0x00, 0x00};
2733 parts[5] = put_data("extra-para", mdat, 11);
2734 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0) {
2735 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00};
2736 parts[5] = put_data("extra-para", mdat, 11);
2737 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0) {
2738 const char mdat[11] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01, 0x00};
2739 parts[5] = put_data("extra-para", mdat, 11);
2740 } else if (strcasecmp(info->id, "EAP245-V3") == 0) {
2741 const char mdat[10] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x01, 0x01};
2742 parts[5] = put_data("extra-para", mdat, 10);
2743 }
2744
2745 size_t len;
2746 void *image;
2747 if (sysupgrade)
2748 image = generate_sysupgrade_image(info, parts, &len);
2749 else
2750 image = generate_factory_image(info, parts, &len);
2751
2752 FILE *file = fopen(output, "wb");
2753 if (!file)
2754 error(1, errno, "unable to open output file");
2755
2756 if (fwrite(image, len, 1, file) != 1)
2757 error(1, 0, "unable to write output file");
2758
2759 fclose(file);
2760
2761 free(image);
2762
2763 for (i = 0; parts[i].name; i++)
2764 free_image_partition(parts[i]);
2765 }
2766
2767 /** Usage output */
2768 static void usage(const char *argv0) {
2769 fprintf(stderr,
2770 "Usage: %s [OPTIONS...]\n"
2771 "\n"
2772 "Options:\n"
2773 " -h show this help\n"
2774 "\n"
2775 "Create a new image:\n"
2776 " -B <board> create image for the board specified with <board>\n"
2777 " -k <file> read kernel image from the file <file>\n"
2778 " -r <file> read rootfs image from the file <file>\n"
2779 " -o <file> write output to the file <file>\n"
2780 " -V <rev> sets the revision number to <rev>\n"
2781 " -j add jffs2 end-of-filesystem markers\n"
2782 " -S create sysupgrade instead of factory image\n"
2783 "Extract an old image:\n"
2784 " -x <file> extract all oem firmware partition\n"
2785 " -d <dir> destination to extract the firmware partition\n"
2786 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
2787 argv0
2788 );
2789 };
2790
2791
2792 static struct device_info *find_board(const char *id)
2793 {
2794 struct device_info *board = NULL;
2795
2796 for (board = boards; board->id != NULL; board++)
2797 if (strcasecmp(id, board->id) == 0)
2798 return board;
2799
2800 return NULL;
2801 }
2802
2803 static int add_flash_partition(
2804 struct flash_partition_entry *part_list,
2805 size_t max_entries,
2806 const char *name,
2807 unsigned long base,
2808 unsigned long size)
2809 {
2810 size_t ptr;
2811 /* check if the list has a free entry */
2812 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
2813 if (part_list->name == NULL &&
2814 part_list->base == 0 &&
2815 part_list->size == 0)
2816 break;
2817 }
2818
2819 if (ptr == max_entries) {
2820 error(1, 0, "No free flash part entry available.");
2821 }
2822
2823 part_list->name = calloc(1, strlen(name) + 1);
2824 if (!part_list->name) {
2825 error(1, 0, "Unable to allocate memory");
2826 }
2827
2828 memcpy((char *)part_list->name, name, strlen(name));
2829 part_list->base = base;
2830 part_list->size = size;
2831
2832 return 0;
2833 }
2834
2835 /** read the partition table into struct flash_partition_entry */
2836 static int read_partition_table(
2837 FILE *file, long offset,
2838 struct flash_partition_entry *entries, size_t max_entries,
2839 int type)
2840 {
2841 char buf[2048];
2842 char *ptr, *end;
2843 const char *parthdr = NULL;
2844 const char *fwuphdr = "fwup-ptn";
2845 const char *flashhdr = "partition";
2846
2847 /* TODO: search for the partition table */
2848
2849 switch(type) {
2850 case 0:
2851 parthdr = fwuphdr;
2852 break;
2853 case 1:
2854 parthdr = flashhdr;
2855 break;
2856 default:
2857 error(1, 0, "Invalid partition table");
2858 }
2859
2860 if (fseek(file, offset, SEEK_SET) < 0)
2861 error(1, errno, "Can not seek in the firmware");
2862
2863 if (fread(buf, 2048, 1, file) != 1)
2864 error(1, errno, "Can not read fwup-ptn from the firmware");
2865
2866 buf[2047] = '\0';
2867
2868 /* look for the partition header */
2869 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
2870 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
2871 return 1;
2872 }
2873
2874 ptr = buf;
2875 end = buf + sizeof(buf);
2876 while ((ptr + strlen(parthdr)) < end &&
2877 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
2878 char *end_part;
2879 char *end_element;
2880
2881 char name[32] = { 0 };
2882 int name_len = 0;
2883 unsigned long base = 0;
2884 unsigned long size = 0;
2885
2886 end_part = memchr(ptr, '\n', (end - ptr));
2887 if (end_part == NULL) {
2888 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
2889 break;
2890 }
2891
2892 for (int i = 0; i <= 4; i++) {
2893 if (end_part <= ptr)
2894 break;
2895
2896 end_element = memchr(ptr, 0x20, (end_part - ptr));
2897 if (end_element == NULL) {
2898 error(1, errno, "Ignoring the rest of the partition entries.");
2899 break;
2900 }
2901
2902 switch (i) {
2903 /* partition header */
2904 case 0:
2905 ptr = end_element + 1;
2906 continue;
2907 /* name */
2908 case 1:
2909 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
2910 strncpy(name, ptr, name_len);
2911 name[name_len] = '\0';
2912 ptr = end_element + 1;
2913 continue;
2914
2915 /* string "base" */
2916 case 2:
2917 ptr = end_element + 1;
2918 continue;
2919
2920 /* actual base */
2921 case 3:
2922 base = strtoul(ptr, NULL, 16);
2923 ptr = end_element + 1;
2924 continue;
2925
2926 /* string "size" */
2927 case 4:
2928 ptr = end_element + 1;
2929 /* actual size. The last element doesn't have a sepeartor */
2930 size = strtoul(ptr, NULL, 16);
2931 /* the part ends with 0x09, 0x0d, 0x0a */
2932 ptr = end_part + 1;
2933 add_flash_partition(entries, max_entries, name, base, size);
2934 continue;
2935 }
2936 }
2937 }
2938
2939 return 0;
2940 }
2941
2942 static void write_partition(
2943 FILE *input_file,
2944 size_t firmware_offset,
2945 struct flash_partition_entry *entry,
2946 FILE *output_file)
2947 {
2948 char buf[4096];
2949 size_t offset;
2950
2951 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
2952
2953 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
2954 if (fread(buf, sizeof(buf), 1, input_file) != 1)
2955 error(1, errno, "Can not read partition from input_file");
2956
2957 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
2958 error(1, errno, "Can not write partition to output_file");
2959 }
2960 /* write last chunk smaller than buffer */
2961 if (offset < entry->size) {
2962 offset = entry->size - offset;
2963 if (fread(buf, offset, 1, input_file) != 1)
2964 error(1, errno, "Can not read partition from input_file");
2965 if (fwrite(buf, offset, 1, output_file) != 1)
2966 error(1, errno, "Can not write partition to output_file");
2967 }
2968 }
2969
2970 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
2971 {
2972 FILE *output_file;
2973 char output[PATH_MAX];
2974
2975 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
2976 output_file = fopen(output, "wb+");
2977 if (output_file == NULL) {
2978 error(1, errno, "Can not open output file %s", output);
2979 }
2980
2981 write_partition(input_file, firmware_offset, entry, output_file);
2982
2983 fclose(output_file);
2984
2985 return 0;
2986 }
2987
2988 /** extract all partitions from the firmware file */
2989 static int extract_firmware(const char *input, const char *output_directory)
2990 {
2991 struct flash_partition_entry entries[16] = { 0 };
2992 size_t max_entries = 16;
2993 size_t firmware_offset = 0x1014;
2994 FILE *input_file;
2995
2996 struct stat statbuf;
2997
2998 /* check input file */
2999 if (stat(input, &statbuf)) {
3000 error(1, errno, "Can not read input firmware %s", input);
3001 }
3002
3003 /* check if output directory exists */
3004 if (stat(output_directory, &statbuf)) {
3005 error(1, errno, "Failed to stat output directory %s", output_directory);
3006 }
3007
3008 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
3009 error(1, errno, "Given output directory is not a directory %s", output_directory);
3010 }
3011
3012 input_file = fopen(input, "rb");
3013
3014 if (read_partition_table(input_file, firmware_offset, entries, 16, 0) != 0) {
3015 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3016 }
3017
3018 for (size_t i = 0; i < max_entries; i++) {
3019 if (entries[i].name == NULL &&
3020 entries[i].base == 0 &&
3021 entries[i].size == 0)
3022 continue;
3023
3024 extract_firmware_partition(input_file, firmware_offset, &entries[i], output_directory);
3025 }
3026
3027 return 0;
3028 }
3029
3030 static struct flash_partition_entry *find_partition(
3031 struct flash_partition_entry *entries, size_t max_entries,
3032 const char *name, const char *error_msg)
3033 {
3034 for (size_t i = 0; i < max_entries; i++, entries++) {
3035 if (strcmp(entries->name, name) == 0)
3036 return entries;
3037 }
3038
3039 error(1, 0, "%s", error_msg);
3040 return NULL;
3041 }
3042
3043 static void write_ff(FILE *output_file, size_t size)
3044 {
3045 char buf[4096];
3046 size_t offset;
3047
3048 memset(buf, 0xff, sizeof(buf));
3049
3050 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
3051 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3052 error(1, errno, "Can not write 0xff to output_file");
3053 }
3054
3055 /* write last chunk smaller than buffer */
3056 if (offset < size) {
3057 offset = size - offset;
3058 if (fwrite(buf, offset, 1, output_file) != 1)
3059 error(1, errno, "Can not write partition to output_file");
3060 }
3061 }
3062
3063 static void convert_firmware(const char *input, const char *output)
3064 {
3065 struct flash_partition_entry fwup[MAX_PARTITIONS] = { 0 };
3066 struct flash_partition_entry flash[MAX_PARTITIONS] = { 0 };
3067 struct flash_partition_entry *fwup_os_image = NULL, *fwup_file_system = NULL;
3068 struct flash_partition_entry *flash_os_image = NULL, *flash_file_system = NULL;
3069 struct flash_partition_entry *fwup_partition_table = NULL;
3070 size_t firmware_offset = 0x1014;
3071 FILE *input_file, *output_file;
3072
3073 struct stat statbuf;
3074
3075 /* check input file */
3076 if (stat(input, &statbuf)) {
3077 error(1, errno, "Can not read input firmware %s", input);
3078 }
3079
3080 input_file = fopen(input, "rb");
3081 if (!input_file)
3082 error(1, 0, "Can not open input firmware %s", input);
3083
3084 output_file = fopen(output, "wb");
3085 if (!output_file)
3086 error(1, 0, "Can not open output firmware %s", output);
3087
3088 if (read_partition_table(input_file, firmware_offset, fwup, MAX_PARTITIONS, 0) != 0) {
3089 error(1, 0, "Error can not read the partition table (fwup-ptn)");
3090 }
3091
3092 fwup_os_image = find_partition(fwup, MAX_PARTITIONS,
3093 "os-image", "Error can not find os-image partition (fwup)");
3094 fwup_file_system = find_partition(fwup, MAX_PARTITIONS,
3095 "file-system", "Error can not find file-system partition (fwup)");
3096 fwup_partition_table = find_partition(fwup, MAX_PARTITIONS,
3097 "partition-table", "Error can not find partition-table partition");
3098
3099 /* the flash partition table has a 0x00000004 magic haeder */
3100 if (read_partition_table(input_file, firmware_offset + fwup_partition_table->base + 4, flash, MAX_PARTITIONS, 1) != 0)
3101 error(1, 0, "Error can not read the partition table (flash)");
3102
3103 flash_os_image = find_partition(flash, MAX_PARTITIONS,
3104 "os-image", "Error can not find os-image partition (flash)");
3105 flash_file_system = find_partition(flash, MAX_PARTITIONS,
3106 "file-system", "Error can not find file-system partition (flash)");
3107
3108 /* write os_image to 0x0 */
3109 write_partition(input_file, firmware_offset, fwup_os_image, output_file);
3110 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
3111
3112 /* write file-system behind os_image */
3113 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
3114 write_partition(input_file, firmware_offset, fwup_file_system, output_file);
3115 write_ff(output_file, flash_file_system->size - fwup_file_system->size);
3116
3117 fclose(output_file);
3118 fclose(input_file);
3119 }
3120
3121 int main(int argc, char *argv[]) {
3122 const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
3123 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
3124 bool add_jffs2_eof = false, sysupgrade = false;
3125 unsigned rev = 0;
3126 struct device_info *info;
3127 set_source_date_epoch();
3128
3129 while (true) {
3130 int c;
3131
3132 c = getopt(argc, argv, "B:k:r:o:V:jSh:x:d:z:");
3133 if (c == -1)
3134 break;
3135
3136 switch (c) {
3137 case 'B':
3138 board = optarg;
3139 break;
3140
3141 case 'k':
3142 kernel_image = optarg;
3143 break;
3144
3145 case 'r':
3146 rootfs_image = optarg;
3147 break;
3148
3149 case 'o':
3150 output = optarg;
3151 break;
3152
3153 case 'V':
3154 sscanf(optarg, "r%u", &rev);
3155 break;
3156
3157 case 'j':
3158 add_jffs2_eof = true;
3159 break;
3160
3161 case 'S':
3162 sysupgrade = true;
3163 break;
3164
3165 case 'h':
3166 usage(argv[0]);
3167 return 0;
3168
3169 case 'd':
3170 output_directory = optarg;
3171 break;
3172
3173 case 'x':
3174 extract_image = optarg;
3175 break;
3176
3177 case 'z':
3178 convert_image = optarg;
3179 break;
3180
3181 default:
3182 usage(argv[0]);
3183 return 1;
3184 }
3185 }
3186
3187 if (extract_image || output_directory) {
3188 if (!extract_image)
3189 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
3190 if (!output_directory)
3191 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
3192 extract_firmware(extract_image, output_directory);
3193 } else if (convert_image) {
3194 if (!output)
3195 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
3196 convert_firmware(convert_image, output);
3197 } else {
3198 if (!board)
3199 error(1, 0, "no board has been specified");
3200 if (!kernel_image)
3201 error(1, 0, "no kernel image has been specified");
3202 if (!rootfs_image)
3203 error(1, 0, "no rootfs image has been specified");
3204 if (!output)
3205 error(1, 0, "no output filename has been specified");
3206
3207 info = find_board(board);
3208
3209 if (info == NULL)
3210 error(1, 0, "unsupported board %s", board);
3211
3212 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
3213 }
3214
3215 return 0;
3216 }