1 // SPDX-License-Identifier: BSD-2-Clause 2 /* 3 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net> 4 All rights reserved. 5 */ 6 7 8 /* 9 tplink-safeloader 10 11 Image generation tool for the TP-LINK SafeLoader as seen on 12 TP-LINK Pharos devices (CPE210/220/510/520) 13 */ 14 15 16 #include <assert.h> 17 #include <ctype.h> 18 #include <errno.h> 19 #include <stdbool.h> 20 #include <stddef.h> 21 #include <stdio.h> 22 #include <stdint.h> 23 #include <stdlib.h> 24 #include <string.h> 25 #include <time.h> 26 #include <unistd.h> 27 28 #include <arpa/inet.h> 29 30 #include <sys/types.h> 31 #include <sys/stat.h> 32 #include <limits.h> 33 34 #include "md5.h" 35 36 37 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); }) 38 39 40 #define MAX_PARTITIONS 32 41 42 /** An image partition table entry */ 43 struct image_partition_entry { 44 const char *name; 45 size_t size; 46 uint8_t *data; 47 }; 48 49 /** A flash partition table entry */ 50 struct flash_partition_entry { 51 const char *name; 52 uint32_t base; 53 uint32_t size; 54 }; 55 56 /** Flash partition names table entry */ 57 struct factory_partition_names { 58 const char *partition_table; 59 const char *soft_ver; 60 const char *os_image; 61 const char *support_list; 62 const char *file_system; 63 const char *extra_para; 64 }; 65 66 /** Partition trailing padding definitions 67 * Values 0x00 to 0xff are reserved to indicate the padding value 68 * Values from 0x100 are reserved to indicate other behaviour */ 69 enum partition_trail_value { 70 PART_TRAIL_00 = 0x00, 71 PART_TRAIL_FF = 0xff, 72 PART_TRAIL_MAX = 0xff, 73 PART_TRAIL_NONE = 0x100 74 }; 75 76 /** soft-version value overwrite types 77 * The default (for an uninitialised soft_ver field) is to use the numerical 78 * version number "0.0.0" 79 */ 80 enum soft_ver_type { 81 SOFT_VER_TYPE_NUMERIC = 0, 82 SOFT_VER_TYPE_TEXT = 1, 83 }; 84 85 /** Firmware layout description */ 86 struct device_info { 87 const char *id; 88 const char *vendor; 89 const char *support_list; 90 enum partition_trail_value part_trail; 91 struct { 92 enum soft_ver_type type; 93 union { 94 const char *text; 95 uint8_t num[3]; 96 }; 97 } soft_ver; 98 uint32_t soft_ver_compat_level; 99 struct flash_partition_entry partitions[MAX_PARTITIONS+1]; 100 const char *first_sysupgrade_partition; 101 const char *last_sysupgrade_partition; 102 struct factory_partition_names partition_names; 103 }; 104 105 #define SOFT_VER_TEXT(_t) {.type = SOFT_VER_TYPE_TEXT, .text = _t} 106 #define SOFT_VER_NUMERIC(_maj, _min, _patch) { \ 107 .type = SOFT_VER_TYPE_NUMERIC, \ 108 .num = {_maj, _min, _patch}} 109 #define SOFT_VER_DEFAULT SOFT_VER_NUMERIC(0, 0, 0) 110 111 struct __attribute__((__packed__)) meta_header { 112 uint32_t length; 113 uint32_t zero; 114 }; 115 116 /** The content of the soft-version structure */ 117 struct __attribute__((__packed__)) soft_version { 118 uint8_t pad1; 119 uint8_t version_major; 120 uint8_t version_minor; 121 uint8_t version_patch; 122 uint8_t year_hi; 123 uint8_t year_lo; 124 uint8_t month; 125 uint8_t day; 126 uint32_t rev; 127 uint32_t compat_level; 128 }; 129 130 /* 131 * Safeloader image type 132 * Safeloader images contain a 0x14 byte preamble with image size (big endian 133 * UINT32) and md5 checksum (16 bytes). 134 * 135 * SAFEFLOADER_TYPE_DEFAULT 136 * Standard preamble with size including preamble length, and checksum. 137 * Header of 0x1000 bytes, contents of which are not specified. 138 * Payload starts at offset 0x1014. 139 * 140 * SAFELOADER_TYPE_VENDOR 141 * Standard preamble with size including preamble length, and checksum. 142 * Header contains up to 0x1000 bytes of vendor data, starting with a big endian 143 * UINT32 size, followed by that number of bytes containing (text) data. 144 * Padded with 0xFF. Payload starts at offset 0x1014. 145 * 146 * SAFELOADER_TYPE_CLOUD 147 * Standard preamble with size including preamble length, and checksum. 148 * Followed by the 'fw-type:Cloud' string and some (unknown) data. 149 * Payload starts at offset 0x1014. 150 * 151 * SAFELOADER_TYPE_QNEW 152 * Reversed order preamble, with (apparent) md5 checksum before the image 153 * size. The size does not include the preamble length. 154 * Header starts with 0x3C bytes, starting with the string '?NEW' (format not 155 * understood). Then another 0x1000 bytes follow, with the data payload 156 * starting at 0x1050. 157 */ 158 enum safeloader_image_type { 159 SAFELOADER_TYPE_DEFAULT, 160 SAFELOADER_TYPE_VENDOR, 161 SAFELOADER_TYPE_CLOUD, 162 SAFELOADER_TYPE_QNEW, 163 }; 164 165 /* Internal representation of safeloader image data */ 166 struct safeloader_image_info { 167 enum safeloader_image_type type; 168 size_t payload_offset; 169 struct flash_partition_entry entries[MAX_PARTITIONS]; 170 }; 171 172 #define SAFELOADER_PREAMBLE_SIZE 0x14 173 #define SAFELOADER_HEADER_SIZE 0x1000 174 #define SAFELOADER_PAYLOAD_OFFSET (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_HEADER_SIZE) 175 176 #define SAFELOADER_QNEW_HEADER_SIZE 0x3C 177 #define SAFELOADER_QNEW_PAYLOAD_OFFSET \ 178 (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_QNEW_HEADER_SIZE + SAFELOADER_HEADER_SIZE) 179 180 #define SAFELOADER_PAYLOAD_TABLE_SIZE 0x800 181 182 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde}; 183 184 185 /** 186 Salt for the MD5 hash 187 188 Fortunately, TP-LINK seems to use the same salt for most devices which use 189 the new image format. 190 */ 191 static const uint8_t md5_salt[16] = { 192 0x7a, 0x2b, 0x15, 0xed, 193 0x9b, 0x98, 0x59, 0x6d, 194 0xe5, 0x04, 0xab, 0x44, 195 0xac, 0x2a, 0x9f, 0x4e, 196 }; 197 198 199 /** Firmware layout table */ 200 static struct device_info boards[] = { 201 /** Firmware layout for the CPE210/220 V1 */ 202 { 203 .id = "CPE210", 204 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 205 .support_list = 206 "SupportList:\r\n" 207 "CPE210(TP-LINK|UN|N300-2):1.0\r\n" 208 "CPE210(TP-LINK|UN|N300-2):1.1\r\n" 209 "CPE210(TP-LINK|US|N300-2):1.1\r\n" 210 "CPE210(TP-LINK|EU|N300-2):1.1\r\n" 211 "CPE220(TP-LINK|UN|N300-2):1.1\r\n" 212 "CPE220(TP-LINK|US|N300-2):1.1\r\n" 213 "CPE220(TP-LINK|EU|N300-2):1.1\r\n", 214 .part_trail = 0xff, 215 .soft_ver = SOFT_VER_DEFAULT, 216 217 .partitions = { 218 {"fs-uboot", 0x00000, 0x20000}, 219 {"partition-table", 0x20000, 0x02000}, 220 {"default-mac", 0x30000, 0x00020}, 221 {"product-info", 0x31100, 0x00100}, 222 {"signature", 0x32000, 0x00400}, 223 {"firmware", 0x40000, 0x770000}, 224 {"soft-version", 0x7b0000, 0x00100}, 225 {"support-list", 0x7b1000, 0x00400}, 226 {"user-config", 0x7c0000, 0x10000}, 227 {"default-config", 0x7d0000, 0x10000}, 228 {"log", 0x7e0000, 0x10000}, 229 {"radio", 0x7f0000, 0x10000}, 230 {NULL, 0, 0} 231 }, 232 233 .first_sysupgrade_partition = "os-image", 234 .last_sysupgrade_partition = "support-list", 235 }, 236 237 /** Firmware layout for the CPE210 V2 */ 238 { 239 .id = "CPE210V2", 240 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n", 241 .support_list = 242 "SupportList:\r\n" 243 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n" 244 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n" 245 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n" 246 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n" 247 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n" 248 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n" 249 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n" 250 "CPE210(TP-LINK|UN|N300-2):2.0\r\n" 251 "CPE210(TP-LINK|EU|N300-2):2.0\r\n" 252 "CPE210(TP-LINK|US|N300-2):2.0\r\n", 253 .part_trail = 0xff, 254 .soft_ver = SOFT_VER_DEFAULT, 255 256 .partitions = { 257 {"fs-uboot", 0x00000, 0x20000}, 258 {"partition-table", 0x20000, 0x02000}, 259 {"default-mac", 0x30000, 0x00020}, 260 {"product-info", 0x31100, 0x00100}, 261 {"device-info", 0x31400, 0x00400}, 262 {"signature", 0x32000, 0x00400}, 263 {"device-id", 0x33000, 0x00100}, 264 {"firmware", 0x40000, 0x770000}, 265 {"soft-version", 0x7b0000, 0x00100}, 266 {"support-list", 0x7b1000, 0x01000}, 267 {"user-config", 0x7c0000, 0x10000}, 268 {"default-config", 0x7d0000, 0x10000}, 269 {"log", 0x7e0000, 0x10000}, 270 {"radio", 0x7f0000, 0x10000}, 271 {NULL, 0, 0} 272 }, 273 274 .first_sysupgrade_partition = "os-image", 275 .last_sysupgrade_partition = "support-list", 276 }, 277 278 /** Firmware layout for the CPE210 V3 */ 279 { 280 .id = "CPE210V3", 281 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n", 282 .support_list = 283 "SupportList:\r\n" 284 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n" 285 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n" 286 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n" 287 "CPE210(TP-LINK|UN|N300-2):3.0\r\n" 288 "CPE210(TP-LINK|EU|N300-2):3.0\r\n" 289 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n" 290 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n" 291 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n" 292 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n" 293 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n" 294 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n", 295 .part_trail = 0xff, 296 .soft_ver = SOFT_VER_DEFAULT, 297 298 .partitions = { 299 {"fs-uboot", 0x00000, 0x20000}, 300 {"partition-table", 0x20000, 0x01000}, 301 {"default-mac", 0x30000, 0x00020}, 302 {"product-info", 0x31100, 0x00100}, 303 {"device-info", 0x31400, 0x00400}, 304 {"signature", 0x32000, 0x00400}, 305 {"device-id", 0x33000, 0x00100}, 306 {"firmware", 0x40000, 0x770000}, 307 {"soft-version", 0x7b0000, 0x00100}, 308 {"support-list", 0x7b1000, 0x01000}, 309 {"user-config", 0x7c0000, 0x10000}, 310 {"default-config", 0x7d0000, 0x10000}, 311 {"log", 0x7e0000, 0x10000}, 312 {"radio", 0x7f0000, 0x10000}, 313 {NULL, 0, 0} 314 }, 315 316 .first_sysupgrade_partition = "os-image", 317 .last_sysupgrade_partition = "support-list", 318 }, 319 320 /** Firmware layout for the CPE220 V2 */ 321 { 322 .id = "CPE220V2", 323 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 324 .support_list = 325 "SupportList:\r\n" 326 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n" 327 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n" 328 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n" 329 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n" 330 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n" 331 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n" 332 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n" 333 "CPE220(TP-LINK|UN|N300-2):2.0\r\n" 334 "CPE220(TP-LINK|EU|N300-2):2.0\r\n" 335 "CPE220(TP-LINK|US|N300-2):2.0\r\n", 336 .part_trail = 0xff, 337 .soft_ver = SOFT_VER_DEFAULT, 338 339 .partitions = { 340 {"fs-uboot", 0x00000, 0x20000}, 341 {"partition-table", 0x20000, 0x02000}, 342 {"default-mac", 0x30000, 0x00020}, 343 {"product-info", 0x31100, 0x00100}, 344 {"signature", 0x32000, 0x00400}, 345 {"firmware", 0x40000, 0x770000}, 346 {"soft-version", 0x7b0000, 0x00100}, 347 {"support-list", 0x7b1000, 0x00400}, 348 {"user-config", 0x7c0000, 0x10000}, 349 {"default-config", 0x7d0000, 0x10000}, 350 {"log", 0x7e0000, 0x10000}, 351 {"radio", 0x7f0000, 0x10000}, 352 {NULL, 0, 0} 353 }, 354 355 .first_sysupgrade_partition = "os-image", 356 .last_sysupgrade_partition = "support-list", 357 }, 358 359 /** Firmware layout for the CPE220 V3 */ 360 { 361 .id = "CPE220V3", 362 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n", 363 .support_list = 364 "SupportList:\r\n" 365 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n" 366 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n" 367 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n" 368 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n" 369 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n" 370 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n" 371 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n" 372 "CPE220(TP-LINK|UN|N300-2):3.0\r\n" 373 "CPE220(TP-LINK|EU|N300-2):3.0\r\n" 374 "CPE220(TP-LINK|US|N300-2):3.0\r\n", 375 .part_trail = 0xff, 376 .soft_ver = SOFT_VER_DEFAULT, 377 378 .partitions = { 379 {"fs-uboot", 0x00000, 0x20000}, 380 {"partition-table", 0x20000, 0x02000}, 381 {"default-mac", 0x30000, 0x00020}, 382 {"product-info", 0x31100, 0x00100}, 383 {"device-info", 0x31400, 0x00400}, 384 {"signature", 0x32000, 0x00400}, 385 {"device-id", 0x33000, 0x00100}, 386 {"firmware", 0x40000, 0x770000}, 387 {"soft-version", 0x7b0000, 0x00100}, 388 {"support-list", 0x7b1000, 0x01000}, 389 {"user-config", 0x7c0000, 0x10000}, 390 {"default-config", 0x7d0000, 0x10000}, 391 {"log", 0x7e0000, 0x10000}, 392 {"radio", 0x7f0000, 0x10000}, 393 {NULL, 0, 0} 394 }, 395 396 .first_sysupgrade_partition = "os-image", 397 .last_sysupgrade_partition = "support-list", 398 }, 399 400 /** Firmware layout for the CPE510/520 V1 */ 401 { 402 .id = "CPE510", 403 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 404 .support_list = 405 "SupportList:\r\n" 406 "CPE510(TP-LINK|UN|N300-5):1.0\r\n" 407 "CPE510(TP-LINK|UN|N300-5):1.1\r\n" 408 "CPE510(TP-LINK|UN|N300-5):1.1\r\n" 409 "CPE510(TP-LINK|US|N300-5):1.1\r\n" 410 "CPE510(TP-LINK|CA|N300-5):1.1\r\n" 411 "CPE510(TP-LINK|EU|N300-5):1.1\r\n" 412 "CPE520(TP-LINK|UN|N300-5):1.1\r\n" 413 "CPE520(TP-LINK|US|N300-5):1.1\r\n" 414 "CPE520(TP-LINK|EU|N300-5):1.1\r\n", 415 .part_trail = 0xff, 416 .soft_ver = SOFT_VER_DEFAULT, 417 418 .partitions = { 419 {"fs-uboot", 0x00000, 0x20000}, 420 {"partition-table", 0x20000, 0x02000}, 421 {"default-mac", 0x30000, 0x00020}, 422 {"product-info", 0x31100, 0x00100}, 423 {"signature", 0x32000, 0x00400}, 424 {"firmware", 0x40000, 0x770000}, 425 {"soft-version", 0x7b0000, 0x00100}, 426 {"support-list", 0x7b1000, 0x00400}, 427 {"user-config", 0x7c0000, 0x10000}, 428 {"default-config", 0x7d0000, 0x10000}, 429 {"log", 0x7e0000, 0x10000}, 430 {"radio", 0x7f0000, 0x10000}, 431 {NULL, 0, 0} 432 }, 433 434 .first_sysupgrade_partition = "os-image", 435 .last_sysupgrade_partition = "support-list", 436 }, 437 438 /** Firmware layout for the CPE510 V2 */ 439 { 440 .id = "CPE510V2", 441 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n", 442 .support_list = 443 "SupportList:\r\n" 444 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n" 445 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n" 446 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n" 447 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n" 448 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n" 449 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n" 450 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n" 451 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n" 452 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n" 453 "CPE510(TP-LINK|UN|N300-5):2.0\r\n" 454 "CPE510(TP-LINK|EU|N300-5):2.0\r\n" 455 "CPE510(TP-LINK|US|N300-5):2.0\r\n", 456 .part_trail = 0xff, 457 .soft_ver = SOFT_VER_DEFAULT, 458 459 .partitions = { 460 {"fs-uboot", 0x00000, 0x20000}, 461 {"partition-table", 0x20000, 0x02000}, 462 {"default-mac", 0x30000, 0x00020}, 463 {"product-info", 0x31100, 0x00100}, 464 {"signature", 0x32000, 0x00400}, 465 {"firmware", 0x40000, 0x770000}, 466 {"soft-version", 0x7b0000, 0x00100}, 467 {"support-list", 0x7b1000, 0x00400}, 468 {"user-config", 0x7c0000, 0x10000}, 469 {"default-config", 0x7d0000, 0x10000}, 470 {"log", 0x7e0000, 0x10000}, 471 {"radio", 0x7f0000, 0x10000}, 472 {NULL, 0, 0} 473 }, 474 475 .first_sysupgrade_partition = "os-image", 476 .last_sysupgrade_partition = "support-list", 477 }, 478 479 /** Firmware layout for the CPE510 V3 */ 480 { 481 .id = "CPE510V3", 482 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n", 483 .support_list = 484 "SupportList:\r\n" 485 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n" 486 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n" 487 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n" 488 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n" 489 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n" 490 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n" 491 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n" 492 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n" 493 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n" 494 "CPE510(TP-LINK|UN|N300-5):3.0\r\n" 495 "CPE510(TP-LINK|EU|N300-5):3.0\r\n" 496 "CPE510(TP-LINK|US|N300-5):3.0\r\n" 497 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n" 498 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n" 499 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n", 500 .part_trail = 0xff, 501 .soft_ver = SOFT_VER_DEFAULT, 502 503 .partitions = { 504 {"fs-uboot", 0x00000, 0x20000}, 505 {"partition-table", 0x20000, 0x02000}, 506 {"default-mac", 0x30000, 0x00020}, 507 {"product-info", 0x31100, 0x00100}, 508 {"signature", 0x32000, 0x00400}, 509 {"firmware", 0x40000, 0x770000}, 510 {"soft-version", 0x7b0000, 0x00100}, 511 {"support-list", 0x7b1000, 0x00400}, 512 {"user-config", 0x7c0000, 0x10000}, 513 {"default-config", 0x7d0000, 0x10000}, 514 {"log", 0x7e0000, 0x10000}, 515 {"radio", 0x7f0000, 0x10000}, 516 {NULL, 0, 0} 517 }, 518 519 .first_sysupgrade_partition = "os-image", 520 .last_sysupgrade_partition = "support-list", 521 }, 522 523 /** Firmware layout for the CPE605V1 */ 524 { 525 .id = "CPE605V1", 526 .vendor = "CPE605(TP-LINK|UN|N150-5):1.0\r\n", 527 .support_list = 528 "SupportList:\r\n" 529 "CPE605(TP-LINK|UN|N150-5|00000000):1.0\r\n" 530 "CPE605(TP-LINK|EU|N150-5|45550000):1.0\r\n" 531 "CPE605(TP-LINK|US|N150-5|55530000):1.0\r\n", 532 .part_trail = 0x00, 533 .soft_ver = SOFT_VER_DEFAULT, 534 535 .partitions = { 536 {"fs-uboot", 0x00000, 0x20000}, 537 {"partition-table", 0x20000, 0x02000}, 538 {"default-mac", 0x30000, 0x00020}, 539 {"serial-number", 0x30100, 0x00020}, 540 {"product-info", 0x31100, 0x00100}, 541 {"device-info", 0x31400, 0x00400}, 542 {"signature", 0x32000, 0x00400}, 543 {"device-id", 0x33000, 0x00100}, 544 {"firmware", 0x40000, 0x770000}, 545 {"soft-version", 0x7b0000, 0x00100}, 546 {"support-list", 0x7b1000, 0x01000}, 547 {"user-config", 0x7c0000, 0x10000}, 548 {"default-config", 0x7d0000, 0x10000}, 549 {"log", 0x7e0000, 0x10000}, 550 {"radio", 0x7f0000, 0x10000}, 551 {NULL, 0, 0} 552 }, 553 554 .first_sysupgrade_partition = "os-image", 555 .last_sysupgrade_partition = "support-list", 556 }, 557 558 /** Firmware layout for the CPE610V1 */ 559 { 560 .id = "CPE610V1", 561 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n", 562 .support_list = 563 "SupportList:\r\n" 564 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n" 565 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n" 566 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n" 567 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n" 568 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n" 569 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n" 570 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n" 571 "CPE610(TP-LINK|UN|N300-5):1.0\r\n" 572 "CPE610(TP-LINK|EU|N300-5):1.0\r\n" 573 "CPE610(TP-LINK|US|N300-5):1.0\r\n", 574 .part_trail = 0xff, 575 .soft_ver = SOFT_VER_DEFAULT, 576 577 .partitions = { 578 {"fs-uboot", 0x00000, 0x20000}, 579 {"partition-table", 0x20000, 0x02000}, 580 {"default-mac", 0x30000, 0x00020}, 581 {"product-info", 0x31100, 0x00100}, 582 {"signature", 0x32000, 0x00400}, 583 {"firmware", 0x40000, 0x770000}, 584 {"soft-version", 0x7b0000, 0x00100}, 585 {"support-list", 0x7b1000, 0x00400}, 586 {"user-config", 0x7c0000, 0x10000}, 587 {"default-config", 0x7d0000, 0x10000}, 588 {"log", 0x7e0000, 0x10000}, 589 {"radio", 0x7f0000, 0x10000}, 590 {NULL, 0, 0} 591 }, 592 593 .first_sysupgrade_partition = "os-image", 594 .last_sysupgrade_partition = "support-list", 595 }, 596 597 /** Firmware layout for the CPE610V2 */ 598 { 599 .id = "CPE610V2", 600 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n", 601 .support_list = 602 "SupportList:\r\n" 603 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n" 604 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n" 605 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n" 606 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n" 607 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n" 608 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n" 609 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n" 610 "CPE610(TP-LINK|UN|N300-5):2.0\r\n" 611 "CPE610(TP-LINK|EU|N300-5):2.0\r\n" 612 "CPE610(TP-LINK|US|N300-5):2.0\r\n", 613 .part_trail = 0xff, 614 .soft_ver = SOFT_VER_DEFAULT, 615 616 .partitions = { 617 {"fs-uboot", 0x00000, 0x20000}, 618 {"partition-table", 0x20000, 0x02000}, 619 {"default-mac", 0x30000, 0x00020}, 620 {"product-info", 0x31100, 0x00100}, 621 {"signature", 0x32000, 0x00400}, 622 {"firmware", 0x40000, 0x770000}, 623 {"soft-version", 0x7b0000, 0x00100}, 624 {"support-list", 0x7b1000, 0x00400}, 625 {"user-config", 0x7c0000, 0x10000}, 626 {"default-config", 0x7d0000, 0x10000}, 627 {"log", 0x7e0000, 0x10000}, 628 {"radio", 0x7f0000, 0x10000}, 629 {NULL, 0, 0} 630 }, 631 632 .first_sysupgrade_partition = "os-image", 633 .last_sysupgrade_partition = "support-list", 634 }, 635 /** Firmware layout for the CPE710 V1 */ 636 { 637 .id = "CPE710V1", 638 .vendor = "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n", 639 .support_list = 640 "SupportList:\r\n" 641 "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n" 642 "CPE710(TP-LINK|EU|AC866-5|45550000):1.0\r\n" 643 "CPE710(TP-LINK|US|AC866-5|55530000):1.0\r\n" 644 "CPE710(TP-LINK|UN|AC866-5):1.0\r\n" 645 "CPE710(TP-LINK|EU|AC866-5):1.0\r\n" 646 "CPE710(TP-LINK|US|AC866-5):1.0\r\n", 647 .part_trail = 0xff, 648 .soft_ver = SOFT_VER_DEFAULT, 649 650 .partitions = { 651 {"fs-uboot", 0x00000, 0x50000}, 652 {"partition-table", 0x50000, 0x02000}, 653 {"default-mac", 0x60000, 0x00020}, 654 {"serial-number", 0x60100, 0x00020}, 655 {"product-info", 0x61100, 0x00100}, 656 {"device-info", 0x61400, 0x00400}, 657 {"signature", 0x62000, 0x00400}, 658 {"device-id", 0x63000, 0x00100}, 659 {"firmware", 0x70000, 0xf40000}, 660 {"soft-version", 0xfb0000, 0x00100}, 661 {"support-list", 0xfb1000, 0x01000}, 662 {"user-config", 0xfc0000, 0x10000}, 663 {"default-config", 0xfd0000, 0x10000}, 664 {"log", 0xfe0000, 0x10000}, 665 {"radio", 0xff0000, 0x10000}, 666 {NULL, 0, 0} 667 }, 668 669 .first_sysupgrade_partition = "os-image", 670 .last_sysupgrade_partition = "support-list", 671 }, 672 673 { 674 .id = "WBS210", 675 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 676 .support_list = 677 "SupportList:\r\n" 678 "WBS210(TP-LINK|UN|N300-2):1.20\r\n" 679 "WBS210(TP-LINK|US|N300-2):1.20\r\n" 680 "WBS210(TP-LINK|EU|N300-2):1.20\r\n", 681 .part_trail = 0xff, 682 .soft_ver = SOFT_VER_DEFAULT, 683 684 .partitions = { 685 {"fs-uboot", 0x00000, 0x20000}, 686 {"partition-table", 0x20000, 0x02000}, 687 {"default-mac", 0x30000, 0x00020}, 688 {"product-info", 0x31100, 0x00100}, 689 {"signature", 0x32000, 0x00400}, 690 {"firmware", 0x40000, 0x770000}, 691 {"soft-version", 0x7b0000, 0x00100}, 692 {"support-list", 0x7b1000, 0x00400}, 693 {"user-config", 0x7c0000, 0x10000}, 694 {"default-config", 0x7d0000, 0x10000}, 695 {"log", 0x7e0000, 0x10000}, 696 {"radio", 0x7f0000, 0x10000}, 697 {NULL, 0, 0} 698 }, 699 700 .first_sysupgrade_partition = "os-image", 701 .last_sysupgrade_partition = "support-list", 702 }, 703 704 { 705 .id = "WBS210V2", 706 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 707 .support_list = 708 "SupportList:\r\n" 709 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n" 710 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n" 711 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n", 712 .part_trail = 0xff, 713 .soft_ver = SOFT_VER_DEFAULT, 714 715 .partitions = { 716 {"fs-uboot", 0x00000, 0x20000}, 717 {"partition-table", 0x20000, 0x02000}, 718 {"default-mac", 0x30000, 0x00020}, 719 {"product-info", 0x31100, 0x00100}, 720 {"signature", 0x32000, 0x00400}, 721 {"firmware", 0x40000, 0x770000}, 722 {"soft-version", 0x7b0000, 0x00100}, 723 {"support-list", 0x7b1000, 0x00400}, 724 {"user-config", 0x7c0000, 0x10000}, 725 {"default-config", 0x7d0000, 0x10000}, 726 {"log", 0x7e0000, 0x10000}, 727 {"radio", 0x7f0000, 0x10000}, 728 {NULL, 0, 0} 729 }, 730 731 .first_sysupgrade_partition = "os-image", 732 .last_sysupgrade_partition = "support-list", 733 }, 734 735 { 736 .id = "WBS510", 737 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 738 .support_list = 739 "SupportList:\r\n" 740 "WBS510(TP-LINK|UN|N300-5):1.20\r\n" 741 "WBS510(TP-LINK|US|N300-5):1.20\r\n" 742 "WBS510(TP-LINK|EU|N300-5):1.20\r\n" 743 "WBS510(TP-LINK|CA|N300-5):1.20\r\n", 744 .part_trail = 0xff, 745 .soft_ver = SOFT_VER_DEFAULT, 746 747 .partitions = { 748 {"fs-uboot", 0x00000, 0x20000}, 749 {"partition-table", 0x20000, 0x02000}, 750 {"default-mac", 0x30000, 0x00020}, 751 {"product-info", 0x31100, 0x00100}, 752 {"signature", 0x32000, 0x00400}, 753 {"firmware", 0x40000, 0x770000}, 754 {"soft-version", 0x7b0000, 0x00100}, 755 {"support-list", 0x7b1000, 0x00400}, 756 {"user-config", 0x7c0000, 0x10000}, 757 {"default-config", 0x7d0000, 0x10000}, 758 {"log", 0x7e0000, 0x10000}, 759 {"radio", 0x7f0000, 0x10000}, 760 {NULL, 0, 0} 761 }, 762 763 .first_sysupgrade_partition = "os-image", 764 .last_sysupgrade_partition = "support-list", 765 }, 766 767 { 768 .id = "WBS510V2", 769 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n", 770 .support_list = 771 "SupportList:\r\n" 772 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n" 773 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n" 774 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n" 775 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n", 776 .part_trail = 0xff, 777 .soft_ver = SOFT_VER_DEFAULT, 778 779 .partitions = { 780 {"fs-uboot", 0x00000, 0x20000}, 781 {"partition-table", 0x20000, 0x02000}, 782 {"default-mac", 0x30000, 0x00020}, 783 {"product-info", 0x31100, 0x00100}, 784 {"signature", 0x32000, 0x00400}, 785 {"firmware", 0x40000, 0x770000}, 786 {"soft-version", 0x7b0000, 0x00100}, 787 {"support-list", 0x7b1000, 0x00400}, 788 {"user-config", 0x7c0000, 0x10000}, 789 {"default-config", 0x7d0000, 0x10000}, 790 {"log", 0x7e0000, 0x10000}, 791 {"radio", 0x7f0000, 0x10000}, 792 {NULL, 0, 0} 793 }, 794 795 .first_sysupgrade_partition = "os-image", 796 .last_sysupgrade_partition = "support-list", 797 }, 798 799 /** Firmware layout for the AD7200 */ 800 { 801 .id = "AD7200", 802 .vendor = "", 803 .support_list = 804 "SupportList:\r\n" 805 "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n", 806 .part_trail = 0x00, 807 .soft_ver = SOFT_VER_DEFAULT, 808 809 .partitions = { 810 {"SBL1", 0x00000, 0x20000}, 811 {"MIBIB", 0x20000, 0x20000}, 812 {"SBL2", 0x40000, 0x20000}, 813 {"SBL3", 0x60000, 0x30000}, 814 {"DDRCONFIG", 0x90000, 0x10000}, 815 {"SSD", 0xa0000, 0x10000}, 816 {"TZ", 0xb0000, 0x30000}, 817 {"RPM", 0xe0000, 0x20000}, 818 {"fs-uboot", 0x100000, 0x70000}, 819 {"uboot-env", 0x170000, 0x40000}, 820 {"radio", 0x1b0000, 0x40000}, 821 {"os-image", 0x1f0000, 0x400000}, 822 {"file-system", 0x5f0000, 0x1900000}, 823 {"default-mac", 0x1ef0000, 0x00200}, 824 {"pin", 0x1ef0200, 0x00200}, 825 {"device-id", 0x1ef0400, 0x00200}, 826 {"product-info", 0x1ef0600, 0x0fa00}, 827 {"partition-table", 0x1f00000, 0x10000}, 828 {"soft-version", 0x1f10000, 0x10000}, 829 {"support-list", 0x1f20000, 0x10000}, 830 {"profile", 0x1f30000, 0x10000}, 831 {"default-config", 0x1f40000, 0x10000}, 832 {"user-config", 0x1f50000, 0x40000}, 833 {"qos-db", 0x1f90000, 0x40000}, 834 {"usb-config", 0x1fd0000, 0x10000}, 835 {"log", 0x1fe0000, 0x20000}, 836 {NULL, 0, 0} 837 }, 838 839 .first_sysupgrade_partition = "os-image", 840 .last_sysupgrade_partition = "file-system" 841 }, 842 843 /** Firmware layout for the C2600 */ 844 { 845 .id = "C2600", 846 .vendor = "", 847 .support_list = 848 "SupportList:\r\n" 849 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n", 850 .part_trail = 0x00, 851 .soft_ver = SOFT_VER_DEFAULT, 852 853 /** 854 We use a bigger os-image partition than the stock images (and thus 855 smaller file-system), as our kernel doesn't fit in the stock firmware's 856 2 MB os-image since kernel 4.14. 857 */ 858 .partitions = { 859 {"SBL1", 0x00000, 0x20000}, 860 {"MIBIB", 0x20000, 0x20000}, 861 {"SBL2", 0x40000, 0x20000}, 862 {"SBL3", 0x60000, 0x30000}, 863 {"DDRCONFIG", 0x90000, 0x10000}, 864 {"SSD", 0xa0000, 0x10000}, 865 {"TZ", 0xb0000, 0x30000}, 866 {"RPM", 0xe0000, 0x20000}, 867 {"fs-uboot", 0x100000, 0x70000}, 868 {"uboot-env", 0x170000, 0x40000}, 869 {"radio", 0x1b0000, 0x40000}, 870 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */ 871 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */ 872 {"default-mac", 0x1ef0000, 0x00200}, 873 {"pin", 0x1ef0200, 0x00200}, 874 {"product-info", 0x1ef0400, 0x0fc00}, 875 {"partition-table", 0x1f00000, 0x10000}, 876 {"soft-version", 0x1f10000, 0x10000}, 877 {"support-list", 0x1f20000, 0x10000}, 878 {"profile", 0x1f30000, 0x10000}, 879 {"default-config", 0x1f40000, 0x10000}, 880 {"user-config", 0x1f50000, 0x40000}, 881 {"qos-db", 0x1f90000, 0x40000}, 882 {"usb-config", 0x1fd0000, 0x10000}, 883 {"log", 0x1fe0000, 0x20000}, 884 {NULL, 0, 0} 885 }, 886 887 .first_sysupgrade_partition = "os-image", 888 .last_sysupgrade_partition = "file-system" 889 }, 890 891 /** Firmware layout for the A7-V5 */ 892 { 893 .id = "ARCHER-A7-V5", 894 .support_list = 895 "SupportList:\n" 896 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n" 897 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n" 898 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n" 899 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n" 900 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n" 901 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n", 902 .part_trail = 0x00, 903 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"), 904 905 /* We're using a dynamic kernel/rootfs split here */ 906 .partitions = { 907 {"factory-boot", 0x00000, 0x20000}, 908 {"fs-uboot", 0x20000, 0x20000}, 909 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */ 910 /* Stock: name file-system base 0x160000 size 0xda0000 */ 911 {"default-mac", 0xf40000, 0x00200}, 912 {"pin", 0xf40200, 0x00200}, 913 {"device-id", 0xf40400, 0x00100}, 914 {"product-info", 0xf40500, 0x0fb00}, 915 {"soft-version", 0xf50000, 0x00100}, 916 {"extra-para", 0xf51000, 0x01000}, 917 {"support-list", 0xf52000, 0x0a000}, 918 {"profile", 0xf5c000, 0x04000}, 919 {"default-config", 0xf60000, 0x10000}, 920 {"user-config", 0xf70000, 0x40000}, 921 {"certificate", 0xfb0000, 0x10000}, 922 {"partition-table", 0xfc0000, 0x10000}, 923 {"log", 0xfd0000, 0x20000}, 924 {"radio", 0xff0000, 0x10000}, 925 {NULL, 0, 0} 926 }, 927 928 .first_sysupgrade_partition = "os-image", 929 .last_sysupgrade_partition = "file-system", 930 }, 931 932 /** Firmware layout for the Archer A9 v6 */ 933 { 934 .id = "ARCHER-A9-V6", 935 .support_list = 936 "SupportList:\n" 937 "{product_name:Archer A9,product_ver:6.0,special_id:55530000}\n" 938 "{product_name:Archer A9,product_ver:6.0,special_id:45550000}\n" 939 "{product_name:Archer A9,product_ver:6.0,special_id:52550000}\n" 940 "{product_name:Archer A9,product_ver:6.0,special_id:4A500000}\n" 941 "{product_name:Archer C90,product_ver:6.0,special_id:55530000}\n", 942 .part_trail = 0x00, 943 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"), 944 945 /* We're using a dynamic kernel/rootfs split here */ 946 .partitions = { 947 {"factory-boot", 0x00000, 0x20000}, 948 {"fs-uboot", 0x20000, 0x20000}, 949 {"partition-table", 0x40000, 0x10000}, 950 {"radio", 0x50000, 0x10000}, 951 {"default-mac", 0x60000, 0x00200}, 952 {"pin", 0x60200, 0x00200}, 953 {"device-id", 0x60400, 0x00100}, 954 {"product-info", 0x60500, 0x0fb00}, 955 {"soft-version", 0x70000, 0x01000}, 956 {"extra-para", 0x71000, 0x01000}, 957 {"support-list", 0x72000, 0x0a000}, 958 {"profile", 0x7c000, 0x04000}, 959 {"user-config", 0x80000, 0x10000}, 960 {"ap-config", 0x90000, 0x10000}, 961 {"apdef-config", 0xa0000, 0x10000}, 962 {"router-config", 0xb0000, 0x10000}, 963 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */ 964 /* Stock: name file-system base 0x1e0000 size 0xde0000 */ 965 {"log", 0xfc0000, 0x20000}, 966 {"certificate", 0xfe0000, 0x10000}, 967 {"default-config", 0xff0000, 0x10000}, 968 {NULL, 0, 0} 969 }, 970 971 .first_sysupgrade_partition = "os-image", 972 .last_sysupgrade_partition = "file-system", 973 }, 974 975 /** Firmware layout for the Archer AX23 v1 */ 976 { 977 .id = "ARCHER-AX23-V1", 978 .vendor = "", 979 .support_list = 980 "SupportList:\n" 981 "{product_name:Archer AX23,product_ver:1.0,special_id:45550000}\n" 982 "{product_name:Archer AX23,product_ver:1.0,special_id:4A500000}\n" 983 "{product_name:Archer AX23,product_ver:1.0,special_id:4B520000}\n" 984 "{product_name:Archer AX23,product_ver:1.0,special_id:52550000}\n" 985 "{product_name:Archer AX23,product_ver:1.0.0,special_id:43410000}\n" 986 "{product_name:Archer AX23,product_ver:1.0.0,special_id:54570000}\n" 987 "{product_name:Archer AX23,product_ver:1.0.0,special_id:55530000}\n" 988 "{product_name:Archer AX23,product_ver:1.20,special_id:45550000}\n" 989 "{product_name:Archer AX23,product_ver:1.20,special_id:4A500000}\n" 990 "{product_name:Archer AX23,product_ver:1.20,special_id:52550000}\n" 991 "{product_name:Archer AX23,product_ver:1.20,special_id:55530000}\n" 992 "{product_name:Archer AX1800,product_ver:1.20,special_id:45550000}\n" 993 "{product_name:Archer AX1800,product_ver:1.20,special_id:52550000}\n", 994 .part_trail = 0x00, 995 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.3\n"), 996 997 .partitions = { 998 {"fs-uboot", 0x00000, 0x40000}, 999 {"firmware", 0x40000, 0xf60000}, 1000 {"default-mac", 0xfa0000, 0x00200}, 1001 {"pin", 0xfa0200, 0x00100}, 1002 {"device-id", 0xfa0300, 0x00100}, 1003 {"product-info", 0xfa0400, 0x0fc00}, 1004 {"default-config", 0xfb0000, 0x08000}, 1005 {"ap-def-config", 0xfb8000, 0x08000}, 1006 {"user-config", 0xfc0000, 0x0a000}, 1007 {"ag-config", 0xfca000, 0x04000}, 1008 {"certificate", 0xfce000, 0x02000}, 1009 {"ap-config", 0xfd0000, 0x06000}, 1010 {"router-config", 0xfd6000, 0x06000}, 1011 {"favicon", 0xfdc000, 0x02000}, 1012 {"logo", 0xfde000, 0x02000}, 1013 {"partition-table", 0xfe0000, 0x00800}, 1014 {"soft-version", 0xfe0800, 0x00100}, 1015 {"support-list", 0xfe0900, 0x00400}, 1016 {"profile", 0xfe0d00, 0x03000}, 1017 {"extra-para", 0xfe3d00, 0x00100}, 1018 {"radio", 0xff0000, 0x10000}, 1019 {NULL, 0, 0} 1020 }, 1021 .first_sysupgrade_partition = "os-image", 1022 .last_sysupgrade_partition = "file-system", 1023 }, 1024 /** Firmware layout for the C2v3 */ 1025 { 1026 .id = "ARCHER-C2-V3", 1027 .support_list = 1028 "SupportList:\n" 1029 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n" 1030 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n" 1031 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n", 1032 .part_trail = 0x00, 1033 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.1\n"), 1034 1035 /** We're using a dynamic kernel/rootfs split here */ 1036 1037 .partitions = { 1038 {"factory-boot", 0x00000, 0x20000}, 1039 {"fs-uboot", 0x20000, 0x10000}, 1040 {"firmware", 0x30000, 0x7a0000}, 1041 {"user-config", 0x7d0000, 0x04000}, 1042 {"default-mac", 0x7e0000, 0x00100}, 1043 {"device-id", 0x7e0100, 0x00100}, 1044 {"extra-para", 0x7e0200, 0x00100}, 1045 {"pin", 0x7e0300, 0x00100}, 1046 {"support-list", 0x7e0400, 0x00400}, 1047 {"soft-version", 0x7e0800, 0x00400}, 1048 {"product-info", 0x7e0c00, 0x01400}, 1049 {"partition-table", 0x7e2000, 0x01000}, 1050 {"profile", 0x7e3000, 0x01000}, 1051 {"default-config", 0x7e4000, 0x04000}, 1052 {"merge-config", 0x7ec000, 0x02000}, 1053 {"qos-db", 0x7ee000, 0x02000}, 1054 {"radio", 0x7f0000, 0x10000}, 1055 {NULL, 0, 0} 1056 }, 1057 1058 .first_sysupgrade_partition = "os-image", 1059 .last_sysupgrade_partition = "file-system", 1060 }, 1061 1062 /** Firmware layout for the C25v1 */ 1063 { 1064 .id = "ARCHER-C25-V1", 1065 .support_list = 1066 "SupportList:\n" 1067 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n" 1068 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n" 1069 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n", 1070 .part_trail = 0x00, 1071 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1072 1073 /* We're using a dynamic kernel/rootfs split here */ 1074 .partitions = { 1075 {"factory-boot", 0x00000, 0x20000}, 1076 {"fs-uboot", 0x20000, 0x10000}, 1077 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */ 1078 /* Stock: name file-system base 0x130000 size 0x6a0000 */ 1079 {"user-config", 0x7d0000, 0x04000}, 1080 {"default-mac", 0x7e0000, 0x00100}, 1081 {"device-id", 0x7e0100, 0x00100}, 1082 {"extra-para", 0x7e0200, 0x00100}, 1083 {"pin", 0x7e0300, 0x00100}, 1084 {"support-list", 0x7e0400, 0x00400}, 1085 {"soft-version", 0x7e0800, 0x00400}, 1086 {"product-info", 0x7e0c00, 0x01400}, 1087 {"partition-table", 0x7e2000, 0x01000}, 1088 {"profile", 0x7e3000, 0x01000}, 1089 {"default-config", 0x7e4000, 0x04000}, 1090 {"merge-config", 0x7ec000, 0x02000}, 1091 {"qos-db", 0x7ee000, 0x02000}, 1092 {"radio", 0x7f0000, 0x10000}, 1093 {NULL, 0, 0} 1094 }, 1095 1096 .first_sysupgrade_partition = "os-image", 1097 .last_sysupgrade_partition = "file-system", 1098 }, 1099 1100 /** Firmware layout for the C58v1 */ 1101 { 1102 .id = "ARCHER-C58-V1", 1103 .vendor = "", 1104 .support_list = 1105 "SupportList:\r\n" 1106 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n" 1107 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n" 1108 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n", 1109 .part_trail = 0x00, 1110 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1111 1112 .partitions = { 1113 {"fs-uboot", 0x00000, 0x10000}, 1114 {"default-mac", 0x10000, 0x00200}, 1115 {"pin", 0x10200, 0x00200}, 1116 {"product-info", 0x10400, 0x00100}, 1117 {"partition-table", 0x10500, 0x00800}, 1118 {"soft-version", 0x11300, 0x00200}, 1119 {"support-list", 0x11500, 0x00100}, 1120 {"device-id", 0x11600, 0x00100}, 1121 {"profile", 0x11700, 0x03900}, 1122 {"default-config", 0x15000, 0x04000}, 1123 {"user-config", 0x19000, 0x04000}, 1124 {"firmware", 0x20000, 0x7c8000}, 1125 {"certyficate", 0x7e8000, 0x08000}, 1126 {"radio", 0x7f0000, 0x10000}, 1127 {NULL, 0, 0} 1128 }, 1129 1130 .first_sysupgrade_partition = "os-image", 1131 .last_sysupgrade_partition = "file-system", 1132 }, 1133 1134 /** Firmware layout for the C59v1 */ 1135 { 1136 .id = "ARCHER-C59-V1", 1137 .vendor = "", 1138 .support_list = 1139 "SupportList:\r\n" 1140 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n" 1141 "{product_name:Archer C59,product_ver:1.0.0,special_id:43410000}\r\n" 1142 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n" 1143 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n" 1144 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n", 1145 .part_trail = 0x00, 1146 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1147 1148 /* We're using a dynamic kernel/rootfs split here */ 1149 .partitions = { 1150 {"fs-uboot", 0x00000, 0x10000}, 1151 {"default-mac", 0x10000, 0x00200}, 1152 {"pin", 0x10200, 0x00200}, 1153 {"device-id", 0x10400, 0x00100}, 1154 {"product-info", 0x10500, 0x0fb00}, 1155 {"firmware", 0x20000, 0xe30000}, 1156 {"partition-table", 0xe50000, 0x10000}, 1157 {"soft-version", 0xe60000, 0x10000}, 1158 {"support-list", 0xe70000, 0x10000}, 1159 {"profile", 0xe80000, 0x10000}, 1160 {"default-config", 0xe90000, 0x10000}, 1161 {"user-config", 0xea0000, 0x40000}, 1162 {"usb-config", 0xee0000, 0x10000}, 1163 {"certificate", 0xef0000, 0x10000}, 1164 {"qos-db", 0xf00000, 0x40000}, 1165 {"log", 0xfe0000, 0x10000}, 1166 {"radio", 0xff0000, 0x10000}, 1167 {NULL, 0, 0} 1168 }, 1169 1170 .first_sysupgrade_partition = "os-image", 1171 .last_sysupgrade_partition = "file-system", 1172 }, 1173 1174 /** Firmware layout for the C59v2 */ 1175 { 1176 .id = "ARCHER-C59-V2", 1177 .vendor = "", 1178 .support_list = 1179 "SupportList:\r\n" 1180 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n" 1181 "{product_name:Archer C59,product_ver:2.0.0,special_id:43410000}\r\n" 1182 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n" 1183 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n", 1184 .part_trail = 0x00, 1185 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0 Build 20161206 rel.7303\n"), 1186 1187 /** We're using a dynamic kernel/rootfs split here */ 1188 .partitions = { 1189 {"factory-boot", 0x00000, 0x20000}, 1190 {"fs-uboot", 0x20000, 0x10000}, 1191 {"default-mac", 0x30000, 0x00200}, 1192 {"pin", 0x30200, 0x00200}, 1193 {"device-id", 0x30400, 0x00100}, 1194 {"product-info", 0x30500, 0x0fb00}, 1195 {"firmware", 0x40000, 0xe10000}, 1196 {"partition-table", 0xe50000, 0x10000}, 1197 {"soft-version", 0xe60000, 0x10000}, 1198 {"support-list", 0xe70000, 0x10000}, 1199 {"profile", 0xe80000, 0x10000}, 1200 {"default-config", 0xe90000, 0x10000}, 1201 {"user-config", 0xea0000, 0x40000}, 1202 {"usb-config", 0xee0000, 0x10000}, 1203 {"certificate", 0xef0000, 0x10000}, 1204 {"extra-para", 0xf00000, 0x10000}, 1205 {"qos-db", 0xf10000, 0x30000}, 1206 {"log", 0xfe0000, 0x10000}, 1207 {"radio", 0xff0000, 0x10000}, 1208 {NULL, 0, 0} 1209 }, 1210 1211 .first_sysupgrade_partition = "os-image", 1212 .last_sysupgrade_partition = "file-system", 1213 }, 1214 1215 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */ 1216 { 1217 .id = "ARCHER-C6-V2", 1218 .vendor = "", 1219 .support_list = 1220 "SupportList:\r\n" 1221 "{product_name:Archer A6,product_ver:2.0.0,special_id:45550000}\r\n" 1222 "{product_name:Archer A6,product_ver:2.0.0,special_id:52550000}\r\n" 1223 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n" 1224 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n" 1225 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n", 1226 .part_trail = 0x00, 1227 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"), 1228 1229 .partitions = { 1230 {"fs-uboot", 0x00000, 0x20000}, 1231 {"default-mac", 0x20000, 0x00200}, 1232 {"pin", 0x20200, 0x00100}, 1233 {"product-info", 0x20300, 0x00200}, 1234 {"device-id", 0x20500, 0x0fb00}, 1235 {"firmware", 0x30000, 0x7a9400}, 1236 {"soft-version", 0x7d9400, 0x00100}, 1237 {"extra-para", 0x7d9500, 0x00100}, 1238 {"support-list", 0x7d9600, 0x00200}, 1239 {"profile", 0x7d9800, 0x03000}, 1240 {"default-config", 0x7dc800, 0x03000}, 1241 {"partition-table", 0x7df800, 0x00800}, 1242 {"user-config", 0x7e0000, 0x0c000}, 1243 {"certificate", 0x7ec000, 0x04000}, 1244 {"radio", 0x7f0000, 0x10000}, 1245 {NULL, 0, 0} 1246 }, 1247 1248 .first_sysupgrade_partition = "os-image", 1249 .last_sysupgrade_partition = "file-system", 1250 }, 1251 1252 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */ 1253 { 1254 .id = "ARCHER-C6-V2-US", 1255 .vendor = "", 1256 .support_list = 1257 "SupportList:\n" 1258 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n" 1259 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n" 1260 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n", 1261 .part_trail = 0x00, 1262 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"), 1263 1264 .partitions = { 1265 {"factory-boot", 0x00000, 0x20000}, 1266 {"default-mac", 0x20000, 0x00200}, 1267 {"pin", 0x20200, 0x00100}, 1268 {"product-info", 0x20300, 0x00200}, 1269 {"device-id", 0x20500, 0x0fb00}, 1270 {"fs-uboot", 0x30000, 0x20000}, 1271 {"firmware", 0x50000, 0xf89400}, 1272 {"soft-version", 0xfd9400, 0x00100}, 1273 {"extra-para", 0xfd9500, 0x00100}, 1274 {"support-list", 0xfd9600, 0x00200}, 1275 {"profile", 0xfd9800, 0x03000}, 1276 {"default-config", 0xfdc800, 0x03000}, 1277 {"partition-table", 0xfdf800, 0x00800}, 1278 {"user-config", 0xfe0000, 0x0c000}, 1279 {"certificate", 0xfec000, 0x04000}, 1280 {"radio", 0xff0000, 0x10000}, 1281 {NULL, 0, 0} 1282 }, 1283 .first_sysupgrade_partition = "os-image", 1284 .last_sysupgrade_partition = "file-system", 1285 }, 1286 /** Firmware layout for the Archer C6 v3 */ 1287 { 1288 .id = "ARCHER-C6-V3", 1289 .vendor = "", 1290 .support_list = 1291 "SupportList:\n" 1292 "{product_name:Archer C6,product_ver:3.20,special_id:55530000}" 1293 "{product_name:Archer C6,product_ver:3.20,special_id:45550000}" 1294 "{product_name:Archer C6,product_ver:3.20,special_id:52550000}" 1295 "{product_name:Archer C6,product_ver:3.20,special_id:4A500000}" 1296 "{product_name:Archer C6,product_ver:3.20,special_id:4B520000}" 1297 "{product_name:Archer C6,product_ver:3.0.0,special_id:42520000}", 1298 .part_trail = 0x00, 1299 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.9\n"), 1300 1301 .partitions = { 1302 {"fs-uboot", 0x00000, 0x40000}, 1303 {"firmware", 0x40000, 0xf60000}, 1304 {"default-mac", 0xfa0000, 0x00200}, 1305 {"pin", 0xfa0200, 0x00100}, 1306 {"device-id", 0xfa0300, 0x00100}, 1307 {"product-info", 0xfa0400, 0x0fc00}, 1308 {"default-config", 0xfb0000, 0x08000}, 1309 {"ap-def-config", 0xfb8000, 0x08000}, 1310 {"user-config", 0xfc0000, 0x0a000}, 1311 {"ag-config", 0xfca000, 0x04000}, 1312 {"certificate", 0xfce000, 0x02000}, 1313 {"ap-config", 0xfd0000, 0x06000}, 1314 {"router-config", 0xfd6000, 0x06000}, 1315 {"favicon", 0xfdc000, 0x02000}, 1316 {"logo", 0xfde000, 0x02000}, 1317 {"partition-table", 0xfe0000, 0x00800}, 1318 {"soft-version", 0xfe0800, 0x00100}, 1319 {"support-list", 0xfe0900, 0x00200}, 1320 {"profile", 0xfe0b00, 0x03000}, 1321 {"extra-para", 0xfe3b00, 0x00100}, 1322 {"radio", 0xff0000, 0x10000}, 1323 {NULL, 0, 0} 1324 }, 1325 .first_sysupgrade_partition = "os-image", 1326 .last_sysupgrade_partition = "file-system", 1327 }, 1328 /** Firmware layout for the Archer A6 v3 */ 1329 { 1330 .id = "ARCHER-A6-V3", 1331 .vendor = "", 1332 .support_list = 1333 "SupportList:\n" 1334 "{product_name:Archer A6,product_ver:3.0.0,special_id:43410000}\n" 1335 "{product_name:Archer A6,product_ver:3.0.0,special_id:55530000}\n" 1336 "{product_name:Archer A6,product_ver:3.0.0,special_id:54570000}\n" 1337 "{product_name:Archer A6,product_ver:3.0.0,special_id:4A500000}\n" 1338 "{product_name:Archer A6,product_ver:3.20,special_id:45550000}\n" 1339 "{product_name:Archer A6,product_ver:3.20,special_id:52550000}\n", 1340 .part_trail = 0x00, 1341 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.5\n"), 1342 1343 .partitions = { 1344 {"fs-uboot", 0x00000, 0x40000}, 1345 {"firmware", 0x40000, 0xf60000}, 1346 {"default-mac", 0xfa0000, 0x00200}, 1347 {"pin", 0xfa0200, 0x00100}, 1348 {"device-id", 0xfa0300, 0x00100}, 1349 {"product-info", 0xfa0400, 0x0fc00}, 1350 {"default-config", 0xfb0000, 0x08000}, 1351 {"ap-def-config", 0xfb8000, 0x08000}, 1352 {"user-config", 0xfc0000, 0x0a000}, 1353 {"ag-config", 0xfca000, 0x04000}, 1354 {"certificate", 0xfce000, 0x02000}, 1355 {"ap-config", 0xfd0000, 0x06000}, 1356 {"router-config", 0xfd6000, 0x06000}, 1357 {"favicon", 0xfdc000, 0x02000}, 1358 {"logo", 0xfde000, 0x02000}, 1359 {"partition-table", 0xfe0000, 0x00800}, 1360 {"soft-version", 0xfe0800, 0x00100}, 1361 {"support-list", 0xfe0900, 0x00200}, 1362 {"profile", 0xfe0b00, 0x03000}, 1363 {"extra-para", 0xfe3b00, 0x00100}, 1364 {"radio", 0xff0000, 0x10000}, 1365 {NULL, 0, 0} 1366 }, 1367 .first_sysupgrade_partition = "os-image", 1368 .last_sysupgrade_partition = "file-system", 1369 }, 1370 /** Firmware layout for the Archer C6U v1 */ 1371 { 1372 .id = "ARCHER-C6U-V1", 1373 .vendor = "", 1374 .support_list = 1375 "SupportList:\n" 1376 "{product_name:Archer C6U,product_ver:1.0.0,special_id:45550000}\n" 1377 "{product_name:Archer C6U,product_ver:1.0.0,special_id:52550000}\n", 1378 .part_trail = 0x00, 1379 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.2\n"), 1380 1381 .partitions = { 1382 {"fs-uboot", 0x00000, 0x40000}, 1383 {"firmware", 0x40000, 0xf60000}, 1384 {"default-mac", 0xfa0000, 0x00200}, 1385 {"pin", 0xfa0200, 0x00100}, 1386 {"device-id", 0xfa0300, 0x00100}, 1387 {"product-info", 0xfa0400, 0x0fc00}, 1388 {"default-config", 0xfb0000, 0x08000}, 1389 {"ap-def-config", 0xfb8000, 0x08000}, 1390 {"user-config", 0xfc0000, 0x0c000}, 1391 {"certificate", 0xfcc000, 0x04000}, 1392 {"ap-config", 0xfd0000, 0x08000}, 1393 {"router-config", 0xfd8000, 0x08000}, 1394 {"partition-table", 0xfe0000, 0x00800}, 1395 {"soft-version", 0xfe0800, 0x00100}, 1396 {"support-list", 0xfe0900, 0x00200}, 1397 {"profile", 0xfe0b00, 0x03000}, 1398 {"extra-para", 0xfe3b00, 0x00100}, 1399 {"radio", 0xff0000, 0x10000}, 1400 {NULL, 0, 0} 1401 }, 1402 .first_sysupgrade_partition = "os-image", 1403 .last_sysupgrade_partition = "file-system", 1404 }, 1405 /** Firmware layout for the C60v1 */ 1406 { 1407 .id = "ARCHER-C60-V1", 1408 .vendor = "", 1409 .support_list = 1410 "SupportList:\r\n" 1411 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n" 1412 "{product_name:Archer C60,product_ver:1.0.0,special_id:43410000}\r\n" 1413 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n" 1414 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n", 1415 .part_trail = 0x00, 1416 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1417 1418 .partitions = { 1419 {"fs-uboot", 0x00000, 0x10000}, 1420 {"default-mac", 0x10000, 0x00200}, 1421 {"pin", 0x10200, 0x00200}, 1422 {"product-info", 0x10400, 0x00100}, 1423 {"partition-table", 0x10500, 0x00800}, 1424 {"soft-version", 0x11300, 0x00200}, 1425 {"support-list", 0x11500, 0x00100}, 1426 {"device-id", 0x11600, 0x00100}, 1427 {"profile", 0x11700, 0x03900}, 1428 {"default-config", 0x15000, 0x04000}, 1429 {"user-config", 0x19000, 0x04000}, 1430 {"firmware", 0x20000, 0x7c8000}, 1431 {"certyficate", 0x7e8000, 0x08000}, 1432 {"radio", 0x7f0000, 0x10000}, 1433 {NULL, 0, 0} 1434 }, 1435 1436 .first_sysupgrade_partition = "os-image", 1437 .last_sysupgrade_partition = "file-system", 1438 }, 1439 1440 /** Firmware layout for the C60v2 */ 1441 { 1442 .id = "ARCHER-C60-V2", 1443 .vendor = "", 1444 .support_list = 1445 "SupportList:\r\n" 1446 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n" 1447 "{product_name:Archer C60,product_ver:2.0.0,special_id:43410000}\r\n" 1448 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n" 1449 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n", 1450 .part_trail = 0x00, 1451 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"), 1452 1453 .partitions = { 1454 {"factory-boot", 0x00000, 0x1fb00}, 1455 {"default-mac", 0x1fb00, 0x00200}, 1456 {"pin", 0x1fd00, 0x00100}, 1457 {"product-info", 0x1fe00, 0x00100}, 1458 {"device-id", 0x1ff00, 0x00100}, 1459 {"fs-uboot", 0x20000, 0x10000}, 1460 {"firmware", 0x30000, 0x7a0000}, 1461 {"soft-version", 0x7d9500, 0x00100}, 1462 {"support-list", 0x7d9600, 0x00100}, 1463 {"extra-para", 0x7d9700, 0x00100}, 1464 {"profile", 0x7d9800, 0x03000}, 1465 {"default-config", 0x7dc800, 0x03000}, 1466 {"partition-table", 0x7df800, 0x00800}, 1467 {"user-config", 0x7e0000, 0x0c000}, 1468 {"certificate", 0x7ec000, 0x04000}, 1469 {"radio", 0x7f0000, 0x10000}, 1470 {NULL, 0, 0} 1471 }, 1472 1473 .first_sysupgrade_partition = "os-image", 1474 .last_sysupgrade_partition = "file-system", 1475 }, 1476 1477 /** Firmware layout for the C60v3 */ 1478 { 1479 .id = "ARCHER-C60-V3", 1480 .vendor = "", 1481 .support_list = 1482 "SupportList:\r\n" 1483 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n" 1484 "{product_name:Archer C60,product_ver:3.0.0,special_id:43410000}\r\n" 1485 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n" 1486 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n", 1487 .part_trail = 0x00, 1488 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.0\n"), 1489 1490 .partitions = { 1491 {"factory-boot", 0x00000, 0x1fb00}, 1492 {"default-mac", 0x1fb00, 0x00200}, 1493 {"pin", 0x1fd00, 0x00100}, 1494 {"product-info", 0x1fe00, 0x00100}, 1495 {"device-id", 0x1ff00, 0x00100}, 1496 {"fs-uboot", 0x20000, 0x10000}, 1497 {"firmware", 0x30000, 0x7a0000}, 1498 {"soft-version", 0x7d9500, 0x00100}, 1499 {"support-list", 0x7d9600, 0x00100}, 1500 {"extra-para", 0x7d9700, 0x00100}, 1501 {"profile", 0x7d9800, 0x03000}, 1502 {"default-config", 0x7dc800, 0x03000}, 1503 {"partition-table", 0x7df800, 0x00800}, 1504 {"user-config", 0x7e0000, 0x0c000}, 1505 {"certificate", 0x7ec000, 0x04000}, 1506 {"radio", 0x7f0000, 0x10000}, 1507 {NULL, 0, 0} 1508 }, 1509 1510 .first_sysupgrade_partition = "os-image", 1511 .last_sysupgrade_partition = "file-system", 1512 }, 1513 1514 /** Firmware layout for the C5 */ 1515 { 1516 .id = "ARCHER-C5-V2", 1517 .vendor = "", 1518 .support_list = 1519 "SupportList:\r\n" 1520 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n" 1521 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n" 1522 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */ 1523 .part_trail = 0x00, 1524 .soft_ver = SOFT_VER_DEFAULT, 1525 1526 .partitions = { 1527 {"fs-uboot", 0x00000, 0x40000}, 1528 {"os-image", 0x40000, 0x200000}, 1529 {"file-system", 0x240000, 0xc00000}, 1530 {"default-mac", 0xe40000, 0x00200}, 1531 {"pin", 0xe40200, 0x00200}, 1532 {"product-info", 0xe40400, 0x00200}, 1533 {"partition-table", 0xe50000, 0x10000}, 1534 {"soft-version", 0xe60000, 0x00200}, 1535 {"support-list", 0xe61000, 0x0f000}, 1536 {"profile", 0xe70000, 0x10000}, 1537 {"default-config", 0xe80000, 0x10000}, 1538 {"user-config", 0xe90000, 0x50000}, 1539 {"log", 0xee0000, 0x100000}, 1540 {"radio_bk", 0xfe0000, 0x10000}, 1541 {"radio", 0xff0000, 0x10000}, 1542 {NULL, 0, 0} 1543 }, 1544 1545 .first_sysupgrade_partition = "os-image", 1546 .last_sysupgrade_partition = "file-system" 1547 }, 1548 1549 /** Firmware layout for the C7 */ 1550 { 1551 .id = "ARCHER-C7-V4", 1552 .support_list = 1553 "SupportList:\n" 1554 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n" 1555 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n" 1556 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n" 1557 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n" 1558 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n" 1559 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n" 1560 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n" 1561 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n" 1562 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n" 1563 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n", 1564 .part_trail = 0x00, 1565 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1566 1567 /* We're using a dynamic kernel/rootfs split here */ 1568 .partitions = { 1569 {"factory-boot", 0x00000, 0x20000}, 1570 {"fs-uboot", 0x20000, 0x20000}, 1571 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */ 1572 /* Stock: name file-system base 0x160000 size 0xda0000 */ 1573 {"default-mac", 0xf00000, 0x00200}, 1574 {"pin", 0xf00200, 0x00200}, 1575 {"device-id", 0xf00400, 0x00100}, 1576 {"product-info", 0xf00500, 0x0fb00}, 1577 {"soft-version", 0xf10000, 0x00100}, 1578 {"extra-para", 0xf11000, 0x01000}, 1579 {"support-list", 0xf12000, 0x0a000}, 1580 {"profile", 0xf1c000, 0x04000}, 1581 {"default-config", 0xf20000, 0x10000}, 1582 {"user-config", 0xf30000, 0x40000}, 1583 {"qos-db", 0xf70000, 0x40000}, 1584 {"certificate", 0xfb0000, 0x10000}, 1585 {"partition-table", 0xfc0000, 0x10000}, 1586 {"log", 0xfd0000, 0x20000}, 1587 {"radio", 0xff0000, 0x10000}, 1588 {NULL, 0, 0} 1589 }, 1590 1591 .first_sysupgrade_partition = "os-image", 1592 .last_sysupgrade_partition = "file-system", 1593 }, 1594 1595 /** Firmware layout for the C7 v5*/ 1596 { 1597 .id = "ARCHER-C7-V5", 1598 .support_list = 1599 "SupportList:\n" 1600 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n" 1601 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n" 1602 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n" 1603 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n" 1604 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n" 1605 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n" 1606 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n" 1607 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n", 1608 1609 .part_trail = 0x00, 1610 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"), 1611 1612 /* We're using a dynamic kernel/rootfs split here */ 1613 .partitions = { 1614 {"factory-boot", 0x00000, 0x20000}, 1615 {"fs-uboot", 0x20000, 0x20000}, 1616 {"partition-table", 0x40000, 0x10000}, 1617 {"radio", 0x50000, 0x10000}, 1618 {"default-mac", 0x60000, 0x00200}, 1619 {"pin", 0x60200, 0x00200}, 1620 {"device-id", 0x60400, 0x00100}, 1621 {"product-info", 0x60500, 0x0fb00}, 1622 {"soft-version", 0x70000, 0x01000}, 1623 {"extra-para", 0x71000, 0x01000}, 1624 {"support-list", 0x72000, 0x0a000}, 1625 {"profile", 0x7c000, 0x04000}, 1626 {"user-config", 0x80000, 0x40000}, 1627 1628 1629 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */ 1630 /* Stock: name file-system base 0x1e0000 size 0xde0000 */ 1631 1632 {"log", 0xfc0000, 0x20000}, 1633 {"certificate", 0xfe0000, 0x10000}, 1634 {"default-config", 0xff0000, 0x10000}, 1635 {NULL, 0, 0} 1636 1637 }, 1638 1639 .first_sysupgrade_partition = "os-image", 1640 .last_sysupgrade_partition = "file-system", 1641 }, 1642 1643 /** Firmware layout for the C9 */ 1644 { 1645 .id = "ARCHERC9", 1646 .vendor = "", 1647 .support_list = 1648 "SupportList:\n" 1649 "{product_name:ArcherC9," 1650 "product_ver:1.0.0," 1651 "special_id:00000000}\n", 1652 .part_trail = 0x00, 1653 .soft_ver = SOFT_VER_DEFAULT, 1654 1655 .partitions = { 1656 {"fs-uboot", 0x00000, 0x40000}, 1657 {"os-image", 0x40000, 0x200000}, 1658 {"file-system", 0x240000, 0xc00000}, 1659 {"default-mac", 0xe40000, 0x00200}, 1660 {"pin", 0xe40200, 0x00200}, 1661 {"product-info", 0xe40400, 0x00200}, 1662 {"partition-table", 0xe50000, 0x10000}, 1663 {"soft-version", 0xe60000, 0x00200}, 1664 {"support-list", 0xe61000, 0x0f000}, 1665 {"profile", 0xe70000, 0x10000}, 1666 {"default-config", 0xe80000, 0x10000}, 1667 {"user-config", 0xe90000, 0x50000}, 1668 {"log", 0xee0000, 0x100000}, 1669 {"radio_bk", 0xfe0000, 0x10000}, 1670 {"radio", 0xff0000, 0x10000}, 1671 {NULL, 0, 0} 1672 }, 1673 1674 .first_sysupgrade_partition = "os-image", 1675 .last_sysupgrade_partition = "file-system" 1676 }, 1677 1678 /** Firmware layout for the Deco M4R v1 and v2 */ 1679 { 1680 .id = "DECO-M4R-V1", 1681 .vendor = "", 1682 .support_list = 1683 "SupportList:\n" 1684 "{product_name:M4R,product_ver:1.0.0,special_id:55530000}\n" 1685 "{product_name:M4R,product_ver:1.0.0,special_id:45550000}\n" 1686 "{product_name:M4R,product_ver:1.0.0,special_id:43410000}\n" 1687 "{product_name:M4R,product_ver:1.0.0,special_id:4A500000}\n" 1688 "{product_name:M4R,product_ver:1.0.0,special_id:41550000}\n" 1689 "{product_name:M4R,product_ver:1.0.0,special_id:4B520000}\n" 1690 "{product_name:M4R,product_ver:1.0.0,special_id:49440000}\n" 1691 "{product_name:M4R,product_ver:2.0.0,special_id:55530000}\n" 1692 "{product_name:M4R,product_ver:2.0.0,special_id:45550000}\n" 1693 "{product_name:M4R,product_ver:2.0.0,special_id:43410000}\n" 1694 "{product_name:M4R,product_ver:2.0.0,special_id:4A500000}\n" 1695 "{product_name:M4R,product_ver:2.0.0,special_id:41550000}\n" 1696 "{product_name:M4R,product_ver:2.0.0,special_id:4B520000}\n" 1697 "{product_name:M4R,product_ver:2.0.0,special_id:54570000}\n" 1698 "{product_name:M4R,product_ver:2.0.0,special_id:42340000}\n" 1699 "{product_name:M4R,product_ver:2.0.0,special_id:49440000}\n", 1700 .part_trail = 0x00, 1701 .soft_ver = SOFT_VER_DEFAULT, 1702 1703 .partitions = { 1704 {"fs-uboot", 0x00000, 0x80000}, 1705 {"firmware", 0x80000, 0xe00000}, 1706 {"product-info", 0xe80000, 0x05000}, 1707 {"default-mac", 0xe85000, 0x01000}, 1708 {"device-id", 0xe86000, 0x01000}, 1709 {"support-list", 0xe87000, 0x10000}, 1710 {"user-config", 0xea7000, 0x10000}, 1711 {"device-config", 0xeb7000, 0x10000}, 1712 {"group-info", 0xec7000, 0x10000}, 1713 {"partition-table", 0xed7000, 0x02000}, 1714 {"soft-version", 0xed9000, 0x10000}, 1715 {"profile", 0xee9000, 0x10000}, 1716 {"default-config", 0xef9000, 0x10000}, 1717 {"url-sig", 0xfe0000, 0x10000}, 1718 {"radio", 0xff0000, 0x10000}, 1719 {NULL, 0, 0} 1720 }, 1721 .first_sysupgrade_partition = "os-image", 1722 .last_sysupgrade_partition = "file-system", 1723 }, 1724 1725 /** Firmware layout for the Deco M4R v4 */ 1726 { 1727 .id = "DECO-M4R-V4", 1728 .vendor = "", 1729 .support_list = 1730 "SupportList:\n" 1731 "{product_name:M4R,product_ver:4.0.0,special_id:55530000}\n" 1732 "{product_name:M4R,product_ver:4.0.0,special_id:45550000}\n" 1733 "{product_name:M4R,product_ver:4.0.0,special_id:4A500000}\n" 1734 "{product_name:M4R,product_ver:4.0.0,special_id:42340000}\n" 1735 "{product_name:M4R,product_ver:4.0.0,special_id:5A470000}\n", 1736 .part_trail = 0x00, 1737 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 1738 1739 .partitions = { 1740 {"fs-uboot", 0x00000, 0x40000}, 1741 {"firmware", 0x40000, 0xf60000}, 1742 {"default-mac", 0xfa0000, 0x00300}, 1743 {"device-id", 0xfa0300, 0x00100}, 1744 {"product-info", 0xfa0400, 0x0fc00}, 1745 {"group-info", 0xfb0000, 0x04000}, 1746 {"user-config", 0xfb4000, 0x0c000}, 1747 {"device-config", 0xfc0000, 0x10000}, 1748 {"default-config", 0xfd0000, 0x10000}, 1749 {"partition-table", 0xfe0000, 0x00800}, 1750 {"soft-version", 0xfe0800, 0x00100}, 1751 {"support-list", 0xfe0900, 0x00200}, 1752 {"profile", 0xfe0b00, 0x03000}, 1753 {"extra-para", 0xfe3b00, 0x00100}, 1754 {"radio", 0xff0000, 0x10000}, 1755 {NULL, 0, 0} 1756 }, 1757 .first_sysupgrade_partition = "os-image", 1758 .last_sysupgrade_partition = "file-system", 1759 }, 1760 1761 /** Firmware layout for the Deco M5 */ 1762 { 1763 .id = "DECO-M5", 1764 .vendor = "", 1765 .support_list = 1766 "SupportList:\n" 1767 "{product_name:M5,product_ver:1.0.0,special_id:55530000}\n" 1768 "{product_name:M5,product_ver:1.0.0,special_id:45550000}\n" 1769 "{product_name:M5,product_ver:1.0.0,special_id:43410000}\n" 1770 "{product_name:M5,product_ver:1.0.0,special_id:4A500000}\n" 1771 "{product_name:M5,product_ver:1.0.0,special_id:41550000}\n" 1772 "{product_name:M5,product_ver:1.0.0,special_id:4B520000}\n" 1773 "{product_name:M5,product_ver:1.0.0,special_id:49440000}\n" 1774 "{product_name:M5,product_ver:3.0.0,special_id:55530000}\n" 1775 "{product_name:M5,product_ver:3.0.0,special_id:45550000}\n" 1776 "{product_name:M5,product_ver:3.0.0,special_id:43410000}\n" 1777 "{product_name:M5,product_ver:3.0.0,special_id:4A500000}\n" 1778 "{product_name:M5,product_ver:3.0.0,special_id:41550000}\n" 1779 "{product_name:M5,product_ver:3.0.0,special_id:4B520000}\n" 1780 "{product_name:M5,product_ver:3.0.0,special_id:49440000}\n" 1781 "{product_name:M5,product_ver:3.0.0,special_id:53570000}\n" 1782 "{product_name:M5,product_ver:3.0.0,special_id:42340000}\n" 1783 "{product_name:M5,product_ver:3.0.0,special_id:54570000}\n" 1784 "{product_name:M5,product_ver:3.2.0,special_id:55530000}\n" 1785 "{product_name:M5,product_ver:3.2.0,special_id:45550000}\n" 1786 "{product_name:M5,product_ver:3.2.0,special_id:43410000}\n" 1787 "{product_name:M5,product_ver:3.2.0,special_id:4A500000}\n" 1788 "{product_name:M5,product_ver:3.2.0,special_id:41550000}\n" 1789 "{product_name:M5,product_ver:3.2.0,special_id:4B520000}\n" 1790 "{product_name:M5,product_ver:3.2.0,special_id:49440000}\n" 1791 "{product_name:M5,product_ver:3.2.0,special_id:53570000}\n" 1792 "{product_name:M5,product_ver:3.2.0,special_id:42340000}\n" 1793 "{product_name:M5,product_ver:3.2.0,special_id:54570000}\n", 1794 .part_trail = 0x00, 1795 .soft_ver = SOFT_VER_DEFAULT, 1796 1797 .partitions = { 1798 {"SBL1", 0x00000, 0x30000}, 1799 {"boot-config_0", 0x30000, 0x10000}, 1800 {"MIBIB", 0x40000, 0x10000}, 1801 {"boot-config_1", 0x50000, 0x10000}, 1802 {"QSEE", 0x60000, 0x60000}, 1803 {"CDT", 0xc0000, 0x10000}, 1804 {"DDRPARAMS", 0xd0000, 0x10000}, 1805 {"uboot-env", 0xe0000, 0x10000}, 1806 {"fs-uboot@0", 0xf0000, 0x80000}, 1807 {"radio", 0x170000, 0x0fff0}, 1808 {"bluetooth-XTAL", 0x17fff0, 0x00010}, 1809 {"default-mac", 0x180000, 0x01000}, 1810 {"device-id", 0x182000, 0x01000}, 1811 {"product-info", 0x183000, 0x05000}, 1812 {"support-list", 0x190000, 0x10000}, 1813 {"user-config", 0x200000, 0x10000}, 1814 {"device-config", 0x210000, 0x10000}, 1815 {"group-info", 0x220000, 0x10000}, 1816 {"partition-table@0", 0x230000, 0x02000}, 1817 {"os-image@0", 0x240000, 0x300000}, 1818 {"file-system@0", 0x540000, 0x790000}, 1819 {"soft-version@0", 0xcd0000, 0x10000}, 1820 {"profile@0", 0xce0000, 0x10000}, 1821 {"default-config@0", 0xcf0000, 0x10000}, 1822 {"partition-table@1", 0xd00000, 0x02000}, 1823 {"fs-uboot@1", 0xd10000, 0x80000}, 1824 {"os-image@1", 0xd90000, 0x400000}, 1825 {"file-system@1", 0x1190000, 0xc40000}, 1826 {"soft-version@1", 0x1dd0000, 0x10000}, 1827 {"profile@1", 0x1de0000, 0x10000}, 1828 {"default-config@1", 0x1df0000, 0x10000}, 1829 {"tm-sig", 0x1e00000, 0x200000}, 1830 {NULL, 0, 0} 1831 }, 1832 1833 .partition_names.partition_table = "partition-table@1", 1834 .partition_names.soft_ver = "soft-version@1", 1835 .partition_names.os_image = "os-image@1", 1836 .partition_names.file_system = "file-system@1", 1837 1838 .first_sysupgrade_partition = "os-image@1", 1839 .last_sysupgrade_partition = "file-system@1" 1840 }, 1841 1842 /** Firmware layout for the Deco S4 v2 */ 1843 { 1844 .id = "DECO-S4-V2", 1845 .vendor = "", 1846 .support_list = 1847 "SupportList:\n" 1848 "{product_name:S4,product_ver:1.0.0,special_id:55530000}\n" 1849 "{product_name:S4,product_ver:1.0.0,special_id:45550000}\n" 1850 "{product_name:S4,product_ver:1.0.0,special_id:43410000}\n" 1851 "{product_name:S4,product_ver:1.0.0,special_id:4A500000}\n" 1852 "{product_name:S4,product_ver:1.0.0,special_id:41550000}\n" 1853 "{product_name:S4,product_ver:1.0.0,special_id:4B520000}\n" 1854 "{product_name:S4,product_ver:2.0.0,special_id:55530000}\n" 1855 "{product_name:S4,product_ver:2.0.0,special_id:45550000}\n" 1856 "{product_name:S4,product_ver:2.0.0,special_id:43410000}\n" 1857 "{product_name:S4,product_ver:2.0.0,special_id:4A500000}\n" 1858 "{product_name:S4,product_ver:2.0.0,special_id:41550000}\n" 1859 "{product_name:S4,product_ver:2.0.0,special_id:4B520000}\n", 1860 .part_trail = 0x00, 1861 .soft_ver = SOFT_VER_DEFAULT, 1862 1863 .partitions = { 1864 {"fs-uboot", 0x00000, 0x80000}, 1865 {"product-info", 0x80000, 0x05000}, 1866 {"default-mac", 0x85000, 0x01000}, 1867 {"device-id", 0x86000, 0x01000}, 1868 {"support-list", 0x87000, 0x10000}, 1869 {"user-config", 0xa7000, 0x10000}, 1870 {"device-config", 0xb7000, 0x10000}, 1871 {"group-info", 0xc7000, 0x10000}, 1872 {"partition-table", 0xd7000, 0x02000}, 1873 {"soft-version", 0xd9000, 0x10000}, 1874 {"profile", 0xe9000, 0x10000}, 1875 {"default-config", 0xf9000, 0x10000}, 1876 {"url-sig", 0x1e0000, 0x10000}, 1877 {"radio", 0x1f0000, 0x10000}, 1878 {"firmware", 0x200000, 0xe00000}, 1879 {NULL, 0, 0} 1880 }, 1881 .first_sysupgrade_partition = "os-image", 1882 .last_sysupgrade_partition = "file-system", 1883 }, 1884 1885 /** Firmware layout for the EAP120 */ 1886 { 1887 .id = "EAP120", 1888 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n", 1889 .support_list = 1890 "SupportList:\r\n" 1891 "EAP120(TP-LINK|UN|N300-2):1.0\r\n", 1892 .part_trail = 0xff, 1893 .soft_ver = SOFT_VER_DEFAULT, 1894 1895 .partitions = { 1896 {"fs-uboot", 0x00000, 0x20000}, 1897 {"partition-table", 0x20000, 0x02000}, 1898 {"default-mac", 0x30000, 0x00020}, 1899 {"support-list", 0x31000, 0x00100}, 1900 {"product-info", 0x31100, 0x00100}, 1901 {"soft-version", 0x32000, 0x00100}, 1902 {"os-image", 0x40000, 0x180000}, 1903 {"file-system", 0x1c0000, 0x600000}, 1904 {"user-config", 0x7c0000, 0x10000}, 1905 {"backup-config", 0x7d0000, 0x10000}, 1906 {"log", 0x7e0000, 0x10000}, 1907 {"radio", 0x7f0000, 0x10000}, 1908 {NULL, 0, 0} 1909 }, 1910 1911 .first_sysupgrade_partition = "os-image", 1912 .last_sysupgrade_partition = "file-system" 1913 }, 1914 1915 /** Firmware layout for the EAP225-Outdoor v1 */ 1916 { 1917 .id = "EAP225-OUTDOOR-V1", 1918 .support_list = 1919 "SupportList:\r\n" 1920 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n", 1921 .part_trail = PART_TRAIL_NONE, 1922 .soft_ver = SOFT_VER_DEFAULT, 1923 .soft_ver_compat_level = 1, 1924 1925 .partitions = { 1926 {"fs-uboot", 0x00000, 0x20000}, 1927 {"partition-table", 0x20000, 0x02000}, 1928 {"default-mac", 0x30000, 0x01000}, 1929 {"support-list", 0x31000, 0x00100}, 1930 {"product-info", 0x31100, 0x00400}, 1931 {"soft-version", 0x32000, 0x00100}, 1932 {"firmware", 0x40000, 0xd80000}, 1933 {"user-config", 0xdc0000, 0x30000}, 1934 {"mutil-log", 0xf30000, 0x80000}, 1935 {"oops", 0xfb0000, 0x40000}, 1936 {"radio", 0xff0000, 0x10000}, 1937 {NULL, 0, 0} 1938 }, 1939 1940 .first_sysupgrade_partition = "os-image", 1941 .last_sysupgrade_partition = "file-system" 1942 }, 1943 1944 /** Firmware layout for the EAP225 v1 */ 1945 { 1946 .id = "EAP225-V1", 1947 .support_list = 1948 "SupportList:\r\n" 1949 "EAP225(TP-LINK|UN|AC1200-D):1.0\r\n", 1950 .part_trail = PART_TRAIL_NONE, 1951 .soft_ver = SOFT_VER_DEFAULT, 1952 1953 .partitions = { 1954 {"fs-uboot", 0x00000, 0x20000}, 1955 {"partition-table", 0x20000, 0x02000}, 1956 {"default-mac", 0x30000, 0x01000}, 1957 {"support-list", 0x31000, 0x00100}, 1958 {"product-info", 0x31100, 0x00400}, 1959 {"soft-version", 0x32000, 0x00100}, 1960 {"firmware", 0x40000, 0xd80000}, 1961 {"user-config", 0xdc0000, 0x30000}, 1962 {"radio", 0xff0000, 0x10000}, 1963 {NULL, 0, 0} 1964 }, 1965 1966 .first_sysupgrade_partition = "os-image", 1967 .last_sysupgrade_partition = "file-system" 1968 }, 1969 1970 /** Firmware layout for the EAP225 v3 1971 * Also compatible with: 1972 * - EAP225 v3.20 1973 * - EAP225 v4 1974 * - EAP225-Outdoor v1 1975 * - EAP225-Outdoor v3 1976 * */ 1977 { 1978 .id = "EAP225-V3", 1979 .support_list = 1980 "SupportList:\r\n" 1981 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n" 1982 "EAP225(TP-Link|UN|AC1350-D):3.20\r\n" 1983 "EAP225(TP-Link|UN|AC1350-D):4.0 CA\r\n" 1984 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n" 1985 "EAP225-Outdoor(TP-Link|UN|AC1200-D):3.0 CA,JP\r\n", 1986 .part_trail = PART_TRAIL_NONE, 1987 .soft_ver = SOFT_VER_DEFAULT, 1988 .soft_ver_compat_level = 1, 1989 1990 .partitions = { 1991 {"fs-uboot", 0x00000, 0x20000}, 1992 {"partition-table", 0x20000, 0x02000}, 1993 {"default-mac", 0x30000, 0x01000}, 1994 {"support-list", 0x31000, 0x00100}, 1995 {"product-info", 0x31100, 0x00400}, 1996 {"soft-version", 0x32000, 0x00100}, 1997 {"firmware", 0x40000, 0xd80000}, 1998 {"user-config", 0xdc0000, 0x30000}, 1999 {"mutil-log", 0xf30000, 0x80000}, 2000 {"oops", 0xfb0000, 0x40000}, 2001 {"radio", 0xff0000, 0x10000}, 2002 {NULL, 0, 0} 2003 }, 2004 2005 .first_sysupgrade_partition = "os-image", 2006 .last_sysupgrade_partition = "file-system" 2007 }, 2008 2009 /** Firmware layout for the EAP225-Wall v2 */ 2010 { 2011 .id = "EAP225-WALL-V2", 2012 .support_list = 2013 "SupportList:\r\n" 2014 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n", 2015 .part_trail = PART_TRAIL_NONE, 2016 .soft_ver = SOFT_VER_DEFAULT, 2017 .soft_ver_compat_level = 1, 2018 2019 .partitions = { 2020 {"fs-uboot", 0x00000, 0x20000}, 2021 {"partition-table", 0x20000, 0x02000}, 2022 {"default-mac", 0x30000, 0x01000}, 2023 {"support-list", 0x31000, 0x00100}, 2024 {"product-info", 0x31100, 0x00400}, 2025 {"soft-version", 0x32000, 0x00100}, 2026 {"firmware", 0x40000, 0xd80000}, 2027 {"user-config", 0xdc0000, 0x30000}, 2028 {"mutil-log", 0xf30000, 0x80000}, 2029 {"oops", 0xfb0000, 0x40000}, 2030 {"radio", 0xff0000, 0x10000}, 2031 {NULL, 0, 0} 2032 }, 2033 2034 .first_sysupgrade_partition = "os-image", 2035 .last_sysupgrade_partition = "file-system" 2036 }, 2037 2038 /** Firmware layout for the EAP235-Wall v1 */ 2039 { 2040 .id = "EAP235-WALL-V1", 2041 .support_list = 2042 "SupportList:\r\n" 2043 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n", 2044 .part_trail = PART_TRAIL_NONE, 2045 .soft_ver = SOFT_VER_NUMERIC(3, 0, 0), 2046 .soft_ver_compat_level = 1, 2047 2048 .partitions = { 2049 {"fs-uboot", 0x00000, 0x80000}, 2050 {"partition-table", 0x80000, 0x02000}, 2051 {"default-mac", 0x90000, 0x01000}, 2052 {"support-list", 0x91000, 0x00100}, 2053 {"product-info", 0x91100, 0x00400}, 2054 {"soft-version", 0x92000, 0x00100}, 2055 {"firmware", 0xa0000, 0xd20000}, 2056 {"user-config", 0xdc0000, 0x30000}, 2057 {"mutil-log", 0xf30000, 0x80000}, 2058 {"oops", 0xfb0000, 0x40000}, 2059 {"radio", 0xff0000, 0x10000}, 2060 {NULL, 0, 0} 2061 }, 2062 2063 .first_sysupgrade_partition = "os-image", 2064 .last_sysupgrade_partition = "file-system" 2065 }, 2066 2067 /** Firmware layout for the EAP245 v1 */ 2068 { 2069 .id = "EAP245-V1", 2070 .support_list = 2071 "SupportList:\r\n" 2072 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n", 2073 .part_trail = PART_TRAIL_NONE, 2074 .soft_ver = SOFT_VER_DEFAULT, 2075 2076 .partitions = { 2077 {"fs-uboot", 0x00000, 0x20000}, 2078 {"partition-table", 0x20000, 0x02000}, 2079 {"default-mac", 0x30000, 0x01000}, 2080 {"support-list", 0x31000, 0x00100}, 2081 {"product-info", 0x31100, 0x00400}, 2082 {"soft-version", 0x32000, 0x00100}, 2083 {"firmware", 0x40000, 0xd80000}, 2084 {"user-config", 0xdc0000, 0x30000}, 2085 {"radio", 0xff0000, 0x10000}, 2086 {NULL, 0, 0} 2087 }, 2088 2089 .first_sysupgrade_partition = "os-image", 2090 .last_sysupgrade_partition = "file-system" 2091 }, 2092 2093 /** Firmware layout for the EAP245 v3 */ 2094 { 2095 .id = "EAP245-V3", 2096 .support_list = 2097 "SupportList:\r\n" 2098 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n" 2099 "EAP265 HD(TP-Link|UN|AC1750-D):1.0", 2100 .part_trail = PART_TRAIL_NONE, 2101 .soft_ver = SOFT_VER_DEFAULT, 2102 .soft_ver_compat_level = 1, 2103 2104 /** Firmware partition with dynamic kernel/rootfs split */ 2105 .partitions = { 2106 {"factroy-boot", 0x00000, 0x40000}, 2107 {"fs-uboot", 0x40000, 0x40000}, 2108 {"partition-table", 0x80000, 0x10000}, 2109 {"default-mac", 0x90000, 0x01000}, 2110 {"support-list", 0x91000, 0x00100}, 2111 {"product-info", 0x91100, 0x00400}, 2112 {"soft-version", 0x92000, 0x00100}, 2113 {"radio", 0xa0000, 0x10000}, 2114 {"extra-para", 0xb0000, 0x10000}, 2115 {"firmware", 0xc0000, 0xe40000}, 2116 {"config", 0xf00000, 0x30000}, 2117 {"mutil-log", 0xf30000, 0x80000}, 2118 {"oops", 0xfb0000, 0x40000}, 2119 {NULL, 0, 0} 2120 }, 2121 2122 .first_sysupgrade_partition = "os-image", 2123 .last_sysupgrade_partition = "file-system" 2124 }, 2125 2126 /** Firmware layout for the EAP610 v3/EAP613 v1 */ 2127 { 2128 .id = "EAP610-V3", 2129 .soft_ver = SOFT_VER_DEFAULT, 2130 .soft_ver_compat_level = 1, 2131 .support_list = 2132 "SupportList:\r\n" 2133 "EAP610(TP-Link|UN|AX1800-D):3.0\r\n" 2134 "EAP610(TP-Link|JP|AX1800-D):3.0\r\n" 2135 "EAP610(TP-Link|EG|AX1800-D):3.0\r\n" 2136 "EAP610(TP-Link|CA|AX1800-D):3.0\r\n" 2137 "EAP613(TP-Link|UN|AX1800-D):1.0 JP\r\n", 2138 .part_trail = PART_TRAIL_NONE, 2139 2140 .partitions = { 2141 {"fs-uboot", 0x00000, 0x80000}, 2142 {"partition-table", 0x80000, 0x02000}, 2143 {"default-mac", 0x90000, 0x01000}, 2144 {"support-list", 0x91000, 0x00100}, 2145 {"product-info", 0x91100, 0x00400}, 2146 {"soft-version", 0x92000, 0x00100}, 2147 {"firmware", 0xa0000, 0xcf0000}, 2148 {"user-config", 0xd90000, 0x60000}, 2149 {"mutil-log", 0xf30000, 0x80000}, 2150 {"oops", 0xfb0000, 0x40000}, 2151 {"radio", 0xff0000, 0x10000}, 2152 {NULL, 0, 0} 2153 }, 2154 2155 .first_sysupgrade_partition = "os-image", 2156 .last_sysupgrade_partition = "file-system" 2157 }, 2158 2159 /** Firmware layout for the EAP615-Wall v1 */ 2160 { 2161 .id = "EAP615-WALL-V1", 2162 .soft_ver = SOFT_VER_DEFAULT, 2163 .soft_ver_compat_level = 2, 2164 .support_list = 2165 "SupportList:\r\n" 2166 "EAP615-Wall(TP-Link|UN|AX1800-D):1.0\r\n" 2167 "EAP615-Wall(TP-Link|CA|AX1800-D):1.0\r\n" 2168 "EAP615-Wall(TP-Link|JP|AX1800-D):1.0\r\n", 2169 .part_trail = PART_TRAIL_NONE, 2170 2171 .partitions = { 2172 {"fs-uboot", 0x00000, 0x80000}, 2173 {"partition-table", 0x80000, 0x02000}, 2174 {"default-mac", 0x90000, 0x01000}, 2175 {"support-list", 0x91000, 0x00100}, 2176 {"product-info", 0x91100, 0x00400}, 2177 {"soft-version", 0x92000, 0x00100}, 2178 {"firmware", 0xa0000, 0xcf0000}, 2179 {"user-config", 0xd90000, 0x60000}, 2180 {"mutil-log", 0xf30000, 0x80000}, 2181 {"oops", 0xfb0000, 0x40000}, 2182 {"radio", 0xff0000, 0x10000}, 2183 {NULL, 0, 0} 2184 }, 2185 2186 .first_sysupgrade_partition = "os-image", 2187 .last_sysupgrade_partition = "file-system" 2188 }, 2189 2190 /** Firmware layout for the TL-WA1201 v2 */ 2191 { 2192 .id = "TL-WA1201-V2", 2193 .vendor = "", 2194 .support_list = 2195 "SupportList:\n" 2196 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:45550000}\n" 2197 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:55530000}\n", 2198 .part_trail = 0x00, 2199 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.1 Build 20200709 rel.66244\n"), 2200 2201 .partitions = { 2202 {"fs-uboot", 0x00000, 0x20000}, 2203 {"default-mac", 0x20000, 0x00200}, 2204 {"pin", 0x20200, 0x00100}, 2205 {"product-info", 0x20300, 0x00200}, 2206 {"device-id", 0x20500, 0x0fb00}, 2207 {"firmware", 0x30000, 0xce0000}, 2208 {"portal-logo", 0xd10000, 0x20000}, 2209 {"portal-back", 0xd30000, 0x200000}, 2210 {"soft-version", 0xf30000, 0x00200}, 2211 {"extra-para", 0xf30200, 0x00200}, 2212 {"support-list", 0xf30400, 0x00200}, 2213 {"profile", 0xf30600, 0x0fa00}, 2214 {"apdef-config", 0xf40000, 0x10000}, 2215 {"ap-config", 0xf50000, 0x10000}, 2216 {"redef-config", 0xf60000, 0x10000}, 2217 {"re-config", 0xf70000, 0x10000}, 2218 {"multidef-config", 0xf80000, 0x10000}, 2219 {"multi-config", 0xf90000, 0x10000}, 2220 {"clientdef-config", 0xfa0000, 0x10000}, 2221 {"client-config", 0xfb0000, 0x10000}, 2222 {"partition-table", 0xfc0000, 0x10000}, 2223 {"user-config", 0xfd0000, 0x10000}, 2224 {"certificate", 0xfe0000, 0x10000}, 2225 {"radio", 0xff0000, 0x10000}, 2226 {NULL, 0, 0} 2227 }, 2228 .first_sysupgrade_partition = "os-image", 2229 .last_sysupgrade_partition = "file-system", 2230 }, 2231 2232 /** Firmware layout for the TL-WA850RE v2 */ 2233 { 2234 .id = "TLWA850REV2", 2235 .vendor = "", 2236 .support_list = 2237 "SupportList:\n" 2238 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n" 2239 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n" 2240 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n" 2241 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n" 2242 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n" 2243 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n" 2244 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n" 2245 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n" 2246 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n" 2247 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n", 2248 .part_trail = 0x00, 2249 .soft_ver = SOFT_VER_DEFAULT, 2250 2251 /** 2252 576KB were moved from file-system to os-image 2253 in comparison to the stock image 2254 */ 2255 .partitions = { 2256 {"fs-uboot", 0x00000, 0x20000}, 2257 {"firmware", 0x20000, 0x390000}, 2258 {"partition-table", 0x3b0000, 0x02000}, 2259 {"default-mac", 0x3c0000, 0x00020}, 2260 {"pin", 0x3c0100, 0x00020}, 2261 {"product-info", 0x3c1000, 0x01000}, 2262 {"soft-version", 0x3c2000, 0x00100}, 2263 {"support-list", 0x3c3000, 0x01000}, 2264 {"profile", 0x3c4000, 0x08000}, 2265 {"user-config", 0x3d0000, 0x10000}, 2266 {"default-config", 0x3e0000, 0x10000}, 2267 {"radio", 0x3f0000, 0x10000}, 2268 {NULL, 0, 0} 2269 }, 2270 2271 .first_sysupgrade_partition = "os-image", 2272 .last_sysupgrade_partition = "file-system" 2273 }, 2274 2275 /** Firmware layout for the TL-WA855RE v1 */ 2276 { 2277 .id = "TLWA855REV1", 2278 .vendor = "", 2279 .support_list = 2280 "SupportList:\n" 2281 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n" 2282 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n" 2283 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n" 2284 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n" 2285 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n" 2286 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n" 2287 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n" 2288 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n" 2289 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n", 2290 .part_trail = 0x00, 2291 .soft_ver = SOFT_VER_DEFAULT, 2292 2293 .partitions = { 2294 {"fs-uboot", 0x00000, 0x20000}, 2295 {"os-image", 0x20000, 0x150000}, 2296 {"file-system", 0x170000, 0x240000}, 2297 {"partition-table", 0x3b0000, 0x02000}, 2298 {"default-mac", 0x3c0000, 0x00020}, 2299 {"pin", 0x3c0100, 0x00020}, 2300 {"product-info", 0x3c1000, 0x01000}, 2301 {"soft-version", 0x3c2000, 0x00100}, 2302 {"support-list", 0x3c3000, 0x01000}, 2303 {"profile", 0x3c4000, 0x08000}, 2304 {"user-config", 0x3d0000, 0x10000}, 2305 {"default-config", 0x3e0000, 0x10000}, 2306 {"radio", 0x3f0000, 0x10000}, 2307 {NULL, 0, 0} 2308 }, 2309 2310 .first_sysupgrade_partition = "os-image", 2311 .last_sysupgrade_partition = "file-system" 2312 }, 2313 2314 /** Firmware layout for the TL-WPA8630P v2 (EU)*/ 2315 { 2316 .id = "TL-WPA8630P-V2.0-EU", 2317 .vendor = "", 2318 .support_list = 2319 "SupportList:\n" 2320 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n", 2321 .part_trail = 0x00, 2322 .soft_ver = SOFT_VER_DEFAULT, 2323 2324 .partitions = { 2325 {"factory-uboot", 0x00000, 0x20000}, 2326 {"fs-uboot", 0x20000, 0x20000}, 2327 {"firmware", 0x40000, 0x5e0000}, 2328 {"partition-table", 0x620000, 0x02000}, 2329 {"default-mac", 0x630000, 0x00020}, 2330 {"pin", 0x630100, 0x00020}, 2331 {"device-id", 0x630200, 0x00030}, 2332 {"product-info", 0x631100, 0x01000}, 2333 {"extra-para", 0x632100, 0x01000}, 2334 {"soft-version", 0x640000, 0x01000}, 2335 {"support-list", 0x641000, 0x01000}, 2336 {"profile", 0x642000, 0x08000}, 2337 {"user-config", 0x650000, 0x10000}, 2338 {"default-config", 0x660000, 0x10000}, 2339 {"default-nvm", 0x670000, 0xc0000}, 2340 {"default-pib", 0x730000, 0x40000}, 2341 {"radio", 0x7f0000, 0x10000}, 2342 {NULL, 0, 0} 2343 }, 2344 2345 .first_sysupgrade_partition = "os-image", 2346 .last_sysupgrade_partition = "file-system" 2347 }, 2348 2349 /** Firmware layout for the TL-WPA8630P v2 (INT)*/ 2350 { 2351 .id = "TL-WPA8630P-V2-INT", 2352 .vendor = "", 2353 .support_list = 2354 "SupportList:\n" 2355 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n" 2356 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n" 2357 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n", 2358 .part_trail = 0x00, 2359 .soft_ver = SOFT_VER_DEFAULT, 2360 2361 .partitions = { 2362 {"factory-uboot", 0x00000, 0x20000}, 2363 {"fs-uboot", 0x20000, 0x20000}, 2364 {"firmware", 0x40000, 0x5e0000}, 2365 {"partition-table", 0x620000, 0x02000}, 2366 {"extra-para", 0x632100, 0x01000}, 2367 {"soft-version", 0x640000, 0x01000}, 2368 {"support-list", 0x641000, 0x01000}, 2369 {"profile", 0x642000, 0x08000}, 2370 {"user-config", 0x650000, 0x10000}, 2371 {"default-config", 0x660000, 0x10000}, 2372 {"default-nvm", 0x670000, 0xc0000}, 2373 {"default-pib", 0x730000, 0x40000}, 2374 {"default-mac", 0x7e0000, 0x00020}, 2375 {"pin", 0x7e0100, 0x00020}, 2376 {"device-id", 0x7e0200, 0x00030}, 2377 {"product-info", 0x7e1100, 0x01000}, 2378 {"radio", 0x7f0000, 0x10000}, 2379 {NULL, 0, 0} 2380 }, 2381 2382 .first_sysupgrade_partition = "os-image", 2383 .last_sysupgrade_partition = "file-system" 2384 }, 2385 2386 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/ 2387 { 2388 .id = "TL-WPA8630P-V2.1-EU", 2389 .vendor = "", 2390 .support_list = 2391 "SupportList:\n" 2392 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n", 2393 .part_trail = 0x00, 2394 .soft_ver = SOFT_VER_DEFAULT, 2395 2396 .partitions = { 2397 {"factory-uboot", 0x00000, 0x20000}, 2398 {"fs-uboot", 0x20000, 0x20000}, 2399 {"firmware", 0x40000, 0x5e0000}, 2400 {"extra-para", 0x680000, 0x01000}, 2401 {"product-info", 0x690000, 0x01000}, 2402 {"partition-table", 0x6a0000, 0x02000}, 2403 {"soft-version", 0x6b0000, 0x01000}, 2404 {"support-list", 0x6b1000, 0x01000}, 2405 {"profile", 0x6b2000, 0x08000}, 2406 {"user-config", 0x6c0000, 0x10000}, 2407 {"default-config", 0x6d0000, 0x10000}, 2408 {"default-nvm", 0x6e0000, 0xc0000}, 2409 {"default-pib", 0x7a0000, 0x40000}, 2410 {"default-mac", 0x7e0000, 0x00020}, 2411 {"pin", 0x7e0100, 0x00020}, 2412 {"device-id", 0x7e0200, 0x00030}, 2413 {"radio", 0x7f0000, 0x10000}, 2414 {NULL, 0, 0} 2415 }, 2416 2417 .first_sysupgrade_partition = "os-image", 2418 .last_sysupgrade_partition = "file-system" 2419 }, 2420 2421 /** Firmware layout for the TL-WPA8631P v3 */ 2422 { 2423 .id = "TL-WPA8631P-V3", 2424 .vendor = "", 2425 .support_list = 2426 "SupportList:\n" 2427 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:41550000}\n" 2428 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:45550000}\n" 2429 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:55530000}\n" 2430 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:41550000}\n" 2431 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:45550000}\n" 2432 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:55530000}\n" 2433 "{product_name:TL-WPA8635P,product_ver:3.0.0,special_id:46520000}\n", 2434 .part_trail = 0x00, 2435 .soft_ver = SOFT_VER_DEFAULT, 2436 2437 .partitions = { 2438 {"fs-uboot", 0x00000, 0x20000}, 2439 {"firmware", 0x20000, 0x710000}, 2440 {"partition-table", 0x730000, 0x02000}, 2441 {"default-mac", 0x732000, 0x00020}, 2442 {"pin", 0x732100, 0x00020}, 2443 {"device-id", 0x732200, 0x00030}, 2444 {"default-region", 0x732300, 0x00010}, 2445 {"product-info", 0x732400, 0x00200}, 2446 {"extra-para", 0x732600, 0x00200}, 2447 {"soft-version", 0x732800, 0x00100}, 2448 {"support-list", 0x732900, 0x00200}, 2449 {"profile", 0x732b00, 0x00100}, 2450 {"default-config", 0x732c00, 0x00800}, 2451 {"plc-type", 0x733400, 0x00020}, 2452 {"default-pib", 0x733500, 0x06000}, 2453 {"user-config", 0x740000, 0x10000}, 2454 {"plc-pib", 0x750000, 0x10000}, 2455 {"plc-nvm", 0x760000, 0x90000}, 2456 {"radio", 0x7f0000, 0x10000}, 2457 {NULL, 0, 0} 2458 }, 2459 2460 .first_sysupgrade_partition = "os-image", 2461 .last_sysupgrade_partition = "file-system" 2462 }, 2463 2464 /** Firmware layout for the TL-WR1043 v5 */ 2465 { 2466 .id = "TLWR1043NV5", 2467 .vendor = "", 2468 .support_list = 2469 "SupportList:\n" 2470 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n" 2471 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n", 2472 .part_trail = 0x00, 2473 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"), 2474 .partitions = { 2475 {"factory-boot", 0x00000, 0x20000}, 2476 {"fs-uboot", 0x20000, 0x20000}, 2477 {"firmware", 0x40000, 0xec0000}, 2478 {"default-mac", 0xf00000, 0x00200}, 2479 {"pin", 0xf00200, 0x00200}, 2480 {"device-id", 0xf00400, 0x00100}, 2481 {"product-info", 0xf00500, 0x0fb00}, 2482 {"soft-version", 0xf10000, 0x01000}, 2483 {"extra-para", 0xf11000, 0x01000}, 2484 {"support-list", 0xf12000, 0x0a000}, 2485 {"profile", 0xf1c000, 0x04000}, 2486 {"default-config", 0xf20000, 0x10000}, 2487 {"user-config", 0xf30000, 0x40000}, 2488 {"qos-db", 0xf70000, 0x40000}, 2489 {"certificate", 0xfb0000, 0x10000}, 2490 {"partition-table", 0xfc0000, 0x10000}, 2491 {"log", 0xfd0000, 0x20000}, 2492 {"radio", 0xff0000, 0x10000}, 2493 {NULL, 0, 0} 2494 }, 2495 .first_sysupgrade_partition = "os-image", 2496 .last_sysupgrade_partition = "file-system" 2497 }, 2498 2499 /** Firmware layout for the TL-WR1043 v4 */ 2500 { 2501 .id = "TLWR1043NDV4", 2502 .vendor = "", 2503 .support_list = 2504 "SupportList:\n" 2505 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n", 2506 .part_trail = 0x00, 2507 .soft_ver = SOFT_VER_DEFAULT, 2508 2509 /* We're using a dynamic kernel/rootfs split here */ 2510 .partitions = { 2511 {"fs-uboot", 0x00000, 0x20000}, 2512 {"firmware", 0x20000, 0xf30000}, 2513 {"default-mac", 0xf50000, 0x00200}, 2514 {"pin", 0xf50200, 0x00200}, 2515 {"product-info", 0xf50400, 0x0fc00}, 2516 {"soft-version", 0xf60000, 0x0b000}, 2517 {"support-list", 0xf6b000, 0x04000}, 2518 {"profile", 0xf70000, 0x04000}, 2519 {"default-config", 0xf74000, 0x0b000}, 2520 {"user-config", 0xf80000, 0x40000}, 2521 {"partition-table", 0xfc0000, 0x10000}, 2522 {"log", 0xfd0000, 0x20000}, 2523 {"radio", 0xff0000, 0x10000}, 2524 {NULL, 0, 0} 2525 }, 2526 2527 .first_sysupgrade_partition = "os-image", 2528 .last_sysupgrade_partition = "file-system" 2529 }, 2530 2531 /** Firmware layout for the TL-WR902AC v1 */ 2532 { 2533 .id = "TL-WR902AC-V1", 2534 .vendor = "", 2535 .support_list = 2536 "SupportList:\n" 2537 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n" 2538 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n", 2539 .part_trail = 0x00, 2540 .soft_ver = SOFT_VER_DEFAULT, 2541 2542 /** 2543 384KB were moved from file-system to os-image 2544 in comparison to the stock image 2545 */ 2546 .partitions = { 2547 {"fs-uboot", 0x00000, 0x20000}, 2548 {"firmware", 0x20000, 0x730000}, 2549 {"default-mac", 0x750000, 0x00200}, 2550 {"pin", 0x750200, 0x00200}, 2551 {"product-info", 0x750400, 0x0fc00}, 2552 {"soft-version", 0x760000, 0x0b000}, 2553 {"support-list", 0x76b000, 0x04000}, 2554 {"profile", 0x770000, 0x04000}, 2555 {"default-config", 0x774000, 0x0b000}, 2556 {"user-config", 0x780000, 0x40000}, 2557 {"partition-table", 0x7c0000, 0x10000}, 2558 {"log", 0x7d0000, 0x20000}, 2559 {"radio", 0x7f0000, 0x10000}, 2560 {NULL, 0, 0} 2561 }, 2562 2563 .first_sysupgrade_partition = "os-image", 2564 .last_sysupgrade_partition = "file-system", 2565 }, 2566 2567 /** Firmware layout for the TL-WR941HP v1 */ 2568 { 2569 .id = "TL-WR941HP-V1", 2570 .vendor = "", 2571 .support_list = 2572 "SupportList:\n" 2573 "{product_name:TL-WR941HP,product_ver:1.0.0,special_id:00000000}\n", 2574 .part_trail = 0x00, 2575 .soft_ver = SOFT_VER_DEFAULT, 2576 2577 .partitions = { 2578 {"fs-uboot", 0x00000, 0x20000}, 2579 {"firmware", 0x20000, 0x730000}, 2580 {"default-mac", 0x750000, 0x00200}, 2581 {"pin", 0x750200, 0x00200}, 2582 {"product-info", 0x750400, 0x0fc00}, 2583 {"soft-version", 0x760000, 0x0b000}, 2584 {"support-list", 0x76b000, 0x04000}, 2585 {"profile", 0x770000, 0x04000}, 2586 {"default-config", 0x774000, 0x0b000}, 2587 {"user-config", 0x780000, 0x40000}, 2588 {"partition-table", 0x7c0000, 0x10000}, 2589 {"log", 0x7d0000, 0x20000}, 2590 {"radio", 0x7f0000, 0x10000}, 2591 {NULL, 0, 0} 2592 }, 2593 2594 .first_sysupgrade_partition = "os-image", 2595 .last_sysupgrade_partition = "file-system", 2596 }, 2597 2598 /** Firmware layout for the TL-WR942N V1 */ 2599 { 2600 .id = "TLWR942NV1", 2601 .vendor = "", 2602 .support_list = 2603 "SupportList:\r\n" 2604 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n" 2605 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n", 2606 .part_trail = 0x00, 2607 .soft_ver = SOFT_VER_DEFAULT, 2608 2609 .partitions = { 2610 {"fs-uboot", 0x00000, 0x20000}, 2611 {"firmware", 0x20000, 0xe20000}, 2612 {"default-mac", 0xe40000, 0x00200}, 2613 {"pin", 0xe40200, 0x00200}, 2614 {"product-info", 0xe40400, 0x0fc00}, 2615 {"partition-table", 0xe50000, 0x10000}, 2616 {"soft-version", 0xe60000, 0x10000}, 2617 {"support-list", 0xe70000, 0x10000}, 2618 {"profile", 0xe80000, 0x10000}, 2619 {"default-config", 0xe90000, 0x10000}, 2620 {"user-config", 0xea0000, 0x40000}, 2621 {"qos-db", 0xee0000, 0x40000}, 2622 {"certificate", 0xf20000, 0x10000}, 2623 {"usb-config", 0xfb0000, 0x10000}, 2624 {"log", 0xfc0000, 0x20000}, 2625 {"radio-bk", 0xfe0000, 0x10000}, 2626 {"radio", 0xff0000, 0x10000}, 2627 {NULL, 0, 0} 2628 }, 2629 2630 .first_sysupgrade_partition = "os-image", 2631 .last_sysupgrade_partition = "file-system", 2632 }, 2633 2634 /** Firmware layout for the RE200 v2 */ 2635 { 2636 .id = "RE200-V2", 2637 .vendor = "", 2638 .support_list = 2639 "SupportList:\n" 2640 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n" 2641 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n" 2642 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n" 2643 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n" 2644 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n" 2645 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n" 2646 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n" 2647 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n" 2648 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n" 2649 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n" 2650 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n" 2651 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n" 2652 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n", 2653 .part_trail = 0x00, 2654 .soft_ver = SOFT_VER_DEFAULT, 2655 2656 .partitions = { 2657 {"fs-uboot", 0x00000, 0x20000}, 2658 {"firmware", 0x20000, 0x7a0000}, 2659 {"partition-table", 0x7c0000, 0x02000}, 2660 {"default-mac", 0x7c2000, 0x00020}, 2661 {"pin", 0x7c2100, 0x00020}, 2662 {"product-info", 0x7c3100, 0x01000}, 2663 {"soft-version", 0x7c4200, 0x01000}, 2664 {"support-list", 0x7c5200, 0x01000}, 2665 {"profile", 0x7c6200, 0x08000}, 2666 {"config-info", 0x7ce200, 0x00400}, 2667 {"user-config", 0x7d0000, 0x10000}, 2668 {"default-config", 0x7e0000, 0x10000}, 2669 {"radio", 0x7f0000, 0x10000}, 2670 {NULL, 0, 0} 2671 }, 2672 2673 .first_sysupgrade_partition = "os-image", 2674 .last_sysupgrade_partition = "file-system" 2675 }, 2676 2677 /** Firmware layout for the RE200 v3 */ 2678 { 2679 .id = "RE200-V3", 2680 .vendor = "", 2681 .support_list = 2682 "SupportList:\n" 2683 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n" 2684 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n" 2685 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n" 2686 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n" 2687 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n" 2688 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n" 2689 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n" 2690 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n" 2691 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n" 2692 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n" 2693 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n" 2694 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n" 2695 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n" 2696 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n", 2697 .part_trail = 0x00, 2698 .soft_ver = SOFT_VER_DEFAULT, 2699 2700 .partitions = { 2701 {"fs-uboot", 0x00000, 0x20000}, 2702 {"firmware", 0x20000, 0x7a0000}, 2703 {"partition-table", 0x7c0000, 0x02000}, 2704 {"default-mac", 0x7c2000, 0x00020}, 2705 {"pin", 0x7c2100, 0x00020}, 2706 {"product-info", 0x7c3100, 0x01000}, 2707 {"soft-version", 0x7c4200, 0x01000}, 2708 {"support-list", 0x7c5200, 0x01000}, 2709 {"profile", 0x7c6200, 0x08000}, 2710 {"config-info", 0x7ce200, 0x00400}, 2711 {"user-config", 0x7d0000, 0x10000}, 2712 {"default-config", 0x7e0000, 0x10000}, 2713 {"radio", 0x7f0000, 0x10000}, 2714 {NULL, 0, 0} 2715 }, 2716 2717 .first_sysupgrade_partition = "os-image", 2718 .last_sysupgrade_partition = "file-system" 2719 }, 2720 2721 /** Firmware layout for the RE200 v4 */ 2722 { 2723 .id = "RE200-V4", 2724 .vendor = "", 2725 .support_list = 2726 "SupportList:\n" 2727 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n" 2728 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n" 2729 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n" 2730 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n" 2731 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n" 2732 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n" 2733 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n" 2734 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n" 2735 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n" 2736 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n" 2737 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n" 2738 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n" 2739 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n" 2740 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n", 2741 .part_trail = 0x00, 2742 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"), 2743 2744 .partitions = { 2745 {"fs-uboot", 0x00000, 0x20000}, 2746 {"firmware", 0x20000, 0x7a0000}, 2747 {"partition-table", 0x7c0000, 0x02000}, 2748 {"default-mac", 0x7c2000, 0x00020}, 2749 {"pin", 0x7c2100, 0x00020}, 2750 {"product-info", 0x7c3100, 0x01000}, 2751 {"soft-version", 0x7c4200, 0x01000}, 2752 {"support-list", 0x7c5200, 0x01000}, 2753 {"profile", 0x7c6200, 0x08000}, 2754 {"config-info", 0x7ce200, 0x00400}, 2755 {"user-config", 0x7d0000, 0x10000}, 2756 {"default-config", 0x7e0000, 0x10000}, 2757 {"radio", 0x7f0000, 0x10000}, 2758 {NULL, 0, 0} 2759 }, 2760 2761 .first_sysupgrade_partition = "os-image", 2762 .last_sysupgrade_partition = "file-system" 2763 }, 2764 2765 /** Firmware layout for the RE220 v2 */ 2766 { 2767 .id = "RE220-V2", 2768 .vendor = "", 2769 .support_list = 2770 "SupportList:\n" 2771 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n" 2772 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n" 2773 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n" 2774 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n" 2775 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n" 2776 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n" 2777 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n" 2778 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n" 2779 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n" 2780 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n" 2781 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n" 2782 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n" 2783 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n", 2784 .part_trail = 0x00, 2785 .soft_ver = SOFT_VER_DEFAULT, 2786 2787 .partitions = { 2788 {"fs-uboot", 0x00000, 0x20000}, 2789 {"firmware", 0x20000, 0x7a0000}, 2790 {"partition-table", 0x7c0000, 0x02000}, 2791 {"default-mac", 0x7c2000, 0x00020}, 2792 {"pin", 0x7c2100, 0x00020}, 2793 {"product-info", 0x7c3100, 0x01000}, 2794 {"soft-version", 0x7c4200, 0x01000}, 2795 {"support-list", 0x7c5200, 0x01000}, 2796 {"profile", 0x7c6200, 0x08000}, 2797 {"config-info", 0x7ce200, 0x00400}, 2798 {"user-config", 0x7d0000, 0x10000}, 2799 {"default-config", 0x7e0000, 0x10000}, 2800 {"radio", 0x7f0000, 0x10000}, 2801 {NULL, 0, 0} 2802 }, 2803 2804 .first_sysupgrade_partition = "os-image", 2805 .last_sysupgrade_partition = "file-system" 2806 }, 2807 2808 /** Firmware layout for the RE305 v1 */ 2809 { 2810 .id = "RE305-V1", 2811 .vendor = "", 2812 .support_list = 2813 "SupportList:\n" 2814 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n" 2815 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n" 2816 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n" 2817 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n" 2818 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n" 2819 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n" 2820 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n", 2821 .part_trail = 0x00, 2822 .soft_ver = SOFT_VER_DEFAULT, 2823 2824 .partitions = { 2825 {"fs-uboot", 0x00000, 0x20000}, 2826 {"firmware", 0x20000, 0x5e0000}, 2827 {"partition-table", 0x600000, 0x02000}, 2828 {"default-mac", 0x610000, 0x00020}, 2829 {"pin", 0x610100, 0x00020}, 2830 {"product-info", 0x611100, 0x01000}, 2831 {"soft-version", 0x620000, 0x01000}, 2832 {"support-list", 0x621000, 0x01000}, 2833 {"profile", 0x622000, 0x08000}, 2834 {"user-config", 0x630000, 0x10000}, 2835 {"default-config", 0x640000, 0x10000}, 2836 {"radio", 0x7f0000, 0x10000}, 2837 {NULL, 0, 0} 2838 }, 2839 2840 .first_sysupgrade_partition = "os-image", 2841 .last_sysupgrade_partition = "file-system" 2842 }, 2843 2844 /** Firmware layout for the RE305 v3 */ 2845 { 2846 .id = "RE305-V3", 2847 .vendor = "", 2848 .support_list = 2849 "SupportList:\n" 2850 "{product_name:RE305,product_ver:3.0.0,special_id:00000000}\n" 2851 "{product_name:RE305,product_ver:3.0.0,special_id:45550000}\n" 2852 "{product_name:RE305,product_ver:3.0.0,special_id:4A500000}\n" 2853 "{product_name:RE305,product_ver:3.0.0,special_id:4B520000}\n" 2854 "{product_name:RE305,product_ver:3.0.0,special_id:41550000}\n" 2855 "{product_name:RE305,product_ver:3.0.0,special_id:42520000}\n" 2856 "{product_name:RE305,product_ver:3.0.0,special_id:55530000}\n" 2857 "{product_name:RE305,product_ver:3.0.0,special_id:45530000}\n" 2858 "{product_name:RE305,product_ver:3.0.0,special_id:41530000}\n" 2859 "{product_name:RE305,product_ver:3.0.0,special_id:43410000}\n" 2860 "{product_name:RE305,product_ver:3.0.0,special_id:52550000}\n", 2861 .part_trail = 0x00, 2862 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"), 2863 2864 .partitions = { 2865 {"fs-uboot", 0x00000, 0x20000}, 2866 {"firmware", 0x20000, 0x7a0000}, 2867 {"partition-table", 0x7c0000, 0x02000}, 2868 {"default-mac", 0x7c2000, 0x00020}, 2869 {"pin", 0x7c2100, 0x00020}, 2870 {"product-info", 0x7c3100, 0x01000}, 2871 {"soft-version", 0x7c4200, 0x01000}, 2872 {"support-list", 0x7c5200, 0x01000}, 2873 {"profile", 0x7c6200, 0x08000}, 2874 {"config-info", 0x7ce200, 0x00400}, 2875 {"user-config", 0x7d0000, 0x10000}, 2876 {"default-config", 0x7e0000, 0x10000}, 2877 {"radio", 0x7f0000, 0x10000}, 2878 {NULL, 0, 0} 2879 }, 2880 2881 .first_sysupgrade_partition = "os-image", 2882 .last_sysupgrade_partition = "file-system" 2883 }, 2884 2885 /** Firmware layout for the RE350 v1 */ 2886 { 2887 .id = "RE350-V1", 2888 .vendor = "", 2889 .support_list = 2890 "SupportList:\n" 2891 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n" 2892 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n" 2893 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n" 2894 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n" 2895 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n" 2896 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n" 2897 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n", 2898 .part_trail = 0x00, 2899 .soft_ver = SOFT_VER_DEFAULT, 2900 2901 /** We're using a dynamic kernel/rootfs split here */ 2902 .partitions = { 2903 {"fs-uboot", 0x00000, 0x20000}, 2904 {"firmware", 0x20000, 0x5e0000}, 2905 {"partition-table", 0x600000, 0x02000}, 2906 {"default-mac", 0x610000, 0x00020}, 2907 {"pin", 0x610100, 0x00020}, 2908 {"product-info", 0x611100, 0x01000}, 2909 {"soft-version", 0x620000, 0x01000}, 2910 {"support-list", 0x621000, 0x01000}, 2911 {"profile", 0x622000, 0x08000}, 2912 {"user-config", 0x630000, 0x10000}, 2913 {"default-config", 0x640000, 0x10000}, 2914 {"radio", 0x7f0000, 0x10000}, 2915 {NULL, 0, 0} 2916 }, 2917 2918 .first_sysupgrade_partition = "os-image", 2919 .last_sysupgrade_partition = "file-system" 2920 }, 2921 2922 /** Firmware layout for the RE350K v1 */ 2923 { 2924 .id = "RE350K-V1", 2925 .vendor = "", 2926 .support_list = 2927 "SupportList:\n" 2928 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n", 2929 .part_trail = 0x00, 2930 .soft_ver = SOFT_VER_DEFAULT, 2931 2932 /** We're using a dynamic kernel/rootfs split here */ 2933 .partitions = { 2934 {"fs-uboot", 0x00000, 0x20000}, 2935 {"firmware", 0x20000, 0xd70000}, 2936 {"partition-table", 0xd90000, 0x02000}, 2937 {"default-mac", 0xda0000, 0x00020}, 2938 {"pin", 0xda0100, 0x00020}, 2939 {"product-info", 0xda1100, 0x01000}, 2940 {"soft-version", 0xdb0000, 0x01000}, 2941 {"support-list", 0xdb1000, 0x01000}, 2942 {"profile", 0xdb2000, 0x08000}, 2943 {"user-config", 0xdc0000, 0x10000}, 2944 {"default-config", 0xdd0000, 0x10000}, 2945 {"device-id", 0xde0000, 0x00108}, 2946 {"radio", 0xff0000, 0x10000}, 2947 {NULL, 0, 0} 2948 }, 2949 2950 .first_sysupgrade_partition = "os-image", 2951 .last_sysupgrade_partition = "file-system" 2952 }, 2953 2954 /** Firmware layout for the RE355 */ 2955 { 2956 .id = "RE355", 2957 .vendor = "", 2958 .support_list = 2959 "SupportList:\r\n" 2960 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n" 2961 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n" 2962 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n" 2963 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n" 2964 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n" 2965 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n" 2966 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n" 2967 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n", 2968 .part_trail = 0x00, 2969 .soft_ver = SOFT_VER_DEFAULT, 2970 2971 /* We're using a dynamic kernel/rootfs split here */ 2972 .partitions = { 2973 {"fs-uboot", 0x00000, 0x20000}, 2974 {"firmware", 0x20000, 0x5e0000}, 2975 {"partition-table", 0x600000, 0x02000}, 2976 {"default-mac", 0x610000, 0x00020}, 2977 {"pin", 0x610100, 0x00020}, 2978 {"product-info", 0x611100, 0x01000}, 2979 {"soft-version", 0x620000, 0x01000}, 2980 {"support-list", 0x621000, 0x01000}, 2981 {"profile", 0x622000, 0x08000}, 2982 {"user-config", 0x630000, 0x10000}, 2983 {"default-config", 0x640000, 0x10000}, 2984 {"radio", 0x7f0000, 0x10000}, 2985 {NULL, 0, 0} 2986 }, 2987 2988 .first_sysupgrade_partition = "os-image", 2989 .last_sysupgrade_partition = "file-system" 2990 }, 2991 2992 /** Firmware layout for the RE450 */ 2993 { 2994 .id = "RE450", 2995 .vendor = "", 2996 .support_list = 2997 "SupportList:\r\n" 2998 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n" 2999 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n" 3000 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n" 3001 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n" 3002 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n" 3003 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n" 3004 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n" 3005 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n", 3006 .part_trail = 0x00, 3007 .soft_ver = SOFT_VER_DEFAULT, 3008 3009 /** We're using a dynamic kernel/rootfs split here */ 3010 .partitions = { 3011 {"fs-uboot", 0x00000, 0x20000}, 3012 {"firmware", 0x20000, 0x5e0000}, 3013 {"partition-table", 0x600000, 0x02000}, 3014 {"default-mac", 0x610000, 0x00020}, 3015 {"pin", 0x610100, 0x00020}, 3016 {"product-info", 0x611100, 0x01000}, 3017 {"soft-version", 0x620000, 0x01000}, 3018 {"support-list", 0x621000, 0x01000}, 3019 {"profile", 0x622000, 0x08000}, 3020 {"user-config", 0x630000, 0x10000}, 3021 {"default-config", 0x640000, 0x10000}, 3022 {"radio", 0x7f0000, 0x10000}, 3023 {NULL, 0, 0} 3024 }, 3025 3026 .first_sysupgrade_partition = "os-image", 3027 .last_sysupgrade_partition = "file-system" 3028 }, 3029 3030 /** Firmware layout for the RE450 v2 */ 3031 { 3032 .id = "RE450-V2", 3033 .vendor = "", 3034 .support_list = 3035 "SupportList:\r\n" 3036 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n" 3037 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n" 3038 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n" 3039 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n" 3040 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n" 3041 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n" 3042 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n" 3043 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n" 3044 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n", 3045 .part_trail = 0x00, 3046 .soft_ver = SOFT_VER_DEFAULT, 3047 3048 /* We're using a dynamic kernel/rootfs split here */ 3049 .partitions = { 3050 {"fs-uboot", 0x00000, 0x20000}, 3051 {"firmware", 0x20000, 0x5e0000}, 3052 {"partition-table", 0x600000, 0x02000}, 3053 {"default-mac", 0x610000, 0x00020}, 3054 {"pin", 0x610100, 0x00020}, 3055 {"product-info", 0x611100, 0x01000}, 3056 {"soft-version", 0x620000, 0x01000}, 3057 {"support-list", 0x621000, 0x01000}, 3058 {"profile", 0x622000, 0x08000}, 3059 {"user-config", 0x630000, 0x10000}, 3060 {"default-config", 0x640000, 0x10000}, 3061 {"radio", 0x7f0000, 0x10000}, 3062 {NULL, 0, 0} 3063 }, 3064 3065 .first_sysupgrade_partition = "os-image", 3066 .last_sysupgrade_partition = "file-system" 3067 }, 3068 3069 /** Firmware layout for the RE450 v3 */ 3070 { 3071 .id = "RE450-V3", 3072 .vendor = "", 3073 .support_list = 3074 "SupportList:\r\n" 3075 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n" 3076 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n" 3077 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n" 3078 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n" 3079 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n" 3080 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n" 3081 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n" 3082 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n" 3083 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n", 3084 .part_trail = 0x00, 3085 .soft_ver = SOFT_VER_DEFAULT, 3086 3087 /* We're using a dynamic kernel/rootfs split here */ 3088 .partitions = { 3089 {"fs-uboot", 0x00000, 0x20000}, 3090 {"default-mac", 0x20000, 0x00020}, 3091 {"pin", 0x20020, 0x00020}, 3092 {"product-info", 0x21000, 0x01000}, 3093 {"partition-table", 0x22000, 0x02000}, 3094 {"soft-version", 0x24000, 0x01000}, 3095 {"support-list", 0x25000, 0x01000}, 3096 {"profile", 0x26000, 0x08000}, 3097 {"user-config", 0x2e000, 0x10000}, 3098 {"default-config", 0x3e000, 0x10000}, 3099 {"config-info", 0x4e000, 0x00400}, 3100 {"firmware", 0x50000, 0x7a0000}, 3101 {"radio", 0x7f0000, 0x10000}, 3102 {NULL, 0, 0} 3103 }, 3104 3105 .first_sysupgrade_partition = "os-image", 3106 .last_sysupgrade_partition = "file-system" 3107 }, 3108 3109 /** Firmware layout for the RE455 v1 */ 3110 { 3111 .id = "RE455-V1", 3112 .vendor = "", 3113 .support_list = 3114 "SupportList:\r\n" 3115 "{product_name:RE455,product_ver:1.0.0,special_id:00000000}\r\n" 3116 "{product_name:RE455,product_ver:1.0.0,special_id:55530000}\r\n" 3117 "{product_name:RE455,product_ver:1.0.0,special_id:45550000}\r\n" 3118 "{product_name:RE455,product_ver:1.0.0,special_id:4A500000}\r\n" 3119 "{product_name:RE455,product_ver:1.0.0,special_id:43410000}\r\n" 3120 "{product_name:RE455,product_ver:1.0.0,special_id:41550000}\r\n" 3121 "{product_name:RE455,product_ver:1.0.0,special_id:41530000}\r\n" 3122 "{product_name:RE455,product_ver:1.0.0,special_id:4B520000}\r\n" 3123 "{product_name:RE455,product_ver:1.0.0,special_id:42520000}\r\n", 3124 .part_trail = 0x00, 3125 .soft_ver = SOFT_VER_DEFAULT, 3126 3127 /* We're using a dynamic kernel/rootfs split here */ 3128 .partitions = { 3129 {"fs-uboot", 0x00000, 0x20000}, 3130 {"default-mac", 0x20000, 0x00020}, 3131 {"pin", 0x20020, 0x00020}, 3132 {"product-info", 0x21000, 0x01000}, 3133 {"partition-table", 0x22000, 0x02000}, 3134 {"soft-version", 0x24000, 0x01000}, 3135 {"support-list", 0x25000, 0x01000}, 3136 {"profile", 0x26000, 0x08000}, 3137 {"user-config", 0x2e000, 0x10000}, 3138 {"default-config", 0x3e000, 0x10000}, 3139 {"config-info", 0x4e000, 0x00400}, 3140 {"firmware", 0x50000, 0x7a0000}, 3141 {"radio", 0x7f0000, 0x10000}, 3142 {NULL, 0, 0} 3143 }, 3144 3145 .first_sysupgrade_partition = "os-image", 3146 .last_sysupgrade_partition = "file-system" 3147 }, 3148 3149 /** Firmware layout for the RE500 */ 3150 { 3151 .id = "RE500-V1", 3152 .vendor = "", 3153 .support_list = 3154 "SupportList:\r\n" 3155 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n" 3156 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n" 3157 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n" 3158 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n" 3159 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n" 3160 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n" 3161 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n", 3162 .part_trail = 0x00, 3163 .soft_ver = SOFT_VER_DEFAULT, 3164 3165 /* We're using a dynamic kernel/rootfs split here */ 3166 .partitions = { 3167 {"fs-uboot", 0x00000, 0x20000}, 3168 {"firmware", 0x20000, 0xde0000}, 3169 {"partition-table", 0xe00000, 0x02000}, 3170 {"default-mac", 0xe10000, 0x00020}, 3171 {"pin", 0xe10100, 0x00020}, 3172 {"product-info", 0xe11100, 0x01000}, 3173 {"soft-version", 0xe20000, 0x01000}, 3174 {"support-list", 0xe21000, 0x01000}, 3175 {"profile", 0xe22000, 0x08000}, 3176 {"user-config", 0xe30000, 0x10000}, 3177 {"default-config", 0xe40000, 0x10000}, 3178 {"radio", 0xff0000, 0x10000}, 3179 {NULL, 0, 0} 3180 }, 3181 3182 .first_sysupgrade_partition = "os-image", 3183 .last_sysupgrade_partition = "file-system" 3184 }, 3185 3186 /** Firmware layout for the RE650 */ 3187 { 3188 .id = "RE650-V1", 3189 .vendor = "", 3190 .support_list = 3191 "SupportList:\r\n" 3192 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n" 3193 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n" 3194 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n" 3195 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n" 3196 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n" 3197 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n" 3198 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n", 3199 .part_trail = 0x00, 3200 .soft_ver = SOFT_VER_DEFAULT, 3201 3202 /* We're using a dynamic kernel/rootfs split here */ 3203 .partitions = { 3204 {"fs-uboot", 0x00000, 0x20000}, 3205 {"firmware", 0x20000, 0xde0000}, 3206 {"partition-table", 0xe00000, 0x02000}, 3207 {"default-mac", 0xe10000, 0x00020}, 3208 {"pin", 0xe10100, 0x00020}, 3209 {"product-info", 0xe11100, 0x01000}, 3210 {"soft-version", 0xe20000, 0x01000}, 3211 {"support-list", 0xe21000, 0x01000}, 3212 {"profile", 0xe22000, 0x08000}, 3213 {"user-config", 0xe30000, 0x10000}, 3214 {"default-config", 0xe40000, 0x10000}, 3215 {"radio", 0xff0000, 0x10000}, 3216 {NULL, 0, 0} 3217 }, 3218 3219 .first_sysupgrade_partition = "os-image", 3220 .last_sysupgrade_partition = "file-system" 3221 }, 3222 /** Firmware layout for the RE650 V2 (8MB Flash)*/ 3223 { 3224 .id = "RE650-V2", 3225 .vendor = "", 3226 .support_list = 3227 "SupportList:\n" 3228 "{product_name:RE650,product_ver:2.0.0,special_id:00000000}\n" 3229 "{product_name:RE650,product_ver:2.0.0,special_id:45550000}\n" 3230 "{product_name:RE650,product_ver:2.0.0,special_id:4A500000}\n" 3231 "{product_name:RE650,product_ver:2.0.0,special_id:41550000}\n" 3232 "{product_name:RE650,product_ver:2.0.0,special_id:43410000}\n" 3233 "{product_name:RE650,product_ver:2.0.0,special_id:41530000}\n" 3234 "{product_name:RE650,product_ver:2.0.0,special_id:55530000}\n", 3235 .part_trail = 0x00, 3236 /* For RE650 v2, soft ver is required, otherwise OEM install doesn't work */ 3237 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"), 3238 3239 /* We're using a dynamic kernel/rootfs split here */ 3240 .partitions = { 3241 {"fs-uboot", 0x00000, 0x20000}, 3242 {"firmware", 0x20000, 0x7a0000}, 3243 {"partition-table", 0x7c0000, 0x02000}, 3244 {"default-mac", 0x7c2000, 0x00020}, 3245 {"pin", 0x7c2100, 0x00020}, 3246 {"product-info", 0x7c3100, 0x01000}, 3247 {"soft-version", 0x7c4200, 0x01000}, 3248 {"support-list", 0x7c5200, 0x01000}, 3249 {"profile", 0x7c6200, 0x08000}, 3250 {"config-info", 0x7ce200, 0x00400}, 3251 {"user-config", 0x7d0000, 0x10000}, 3252 {"default-config", 0x7e0000, 0x10000}, 3253 {"radio", 0x7f0000, 0x10000}, 3254 {NULL, 0, 0} 3255 }, 3256 3257 .first_sysupgrade_partition = "os-image", 3258 .last_sysupgrade_partition = "file-system" 3259 }, 3260 3261 /** Firmware layout for the Mercusys MR70X */ 3262 { 3263 .id = "MR70X", 3264 .vendor = "", 3265 .support_list = 3266 "SupportList:\n" 3267 "{product_name:MR70X,product_ver:1.0.0,special_id:45550000}\n" 3268 "{product_name:MR70X,product_ver:1.0.0,special_id:4A500000}\n" 3269 "{product_name:MR70X,product_ver:1.0.0,special_id:55530000}\n", 3270 .part_trail = 0x00, 3271 .soft_ver = SOFT_VER_DEFAULT, 3272 3273 .partitions = { 3274 {"fs-uboot", 0x00000, 0x40000}, 3275 {"firmware", 0x40000, 0xf60000}, 3276 {"default-mac", 0xfa0000, 0x00200}, 3277 {"pin", 0xfa0200, 0x00100}, 3278 {"device-id", 0xfa0300, 0x00100}, 3279 {"product-info", 0xfa0400, 0x0fc00}, 3280 {"default-config", 0xfb0000, 0x08000}, 3281 {"ap-def-config", 0xfb8000, 0x08000}, 3282 {"user-config", 0xfc0000, 0x0a000}, 3283 {"ag-config", 0xfca000, 0x04000}, 3284 {"certificate", 0xfce000, 0x02000}, 3285 {"ap-config", 0xfd0000, 0x06000}, 3286 {"router-config", 0xfd6000, 0x06000}, 3287 {"favicon", 0xfdc000, 0x02000}, 3288 {"logo", 0xfde000, 0x02000}, 3289 {"partition-table", 0xfe0000, 0x00800}, 3290 {"soft-version", 0xfe0800, 0x00100}, 3291 {"support-list", 0xfe0900, 0x00200}, 3292 {"profile", 0xfe0b00, 0x03000}, 3293 {"extra-para", 0xfe3b00, 0x00100}, 3294 {"radio", 0xff0000, 0x10000}, 3295 {NULL, 0, 0} 3296 }, 3297 3298 .first_sysupgrade_partition = "os-image", 3299 .last_sysupgrade_partition = "file-system" 3300 }, 3301 3302 {} 3303 }; 3304 3305 #define error(_ret, _errno, _str, ...) \ 3306 do { \ 3307 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \ 3308 strerror(_errno)); \ 3309 if (_ret) \ 3310 exit(_ret); \ 3311 } while (0) 3312 3313 3314 /** Stores a uint32 as big endian */ 3315 static inline void put32(uint8_t *buf, uint32_t val) { 3316 buf[0] = val >> 24; 3317 buf[1] = val >> 16; 3318 buf[2] = val >> 8; 3319 buf[3] = val; 3320 } 3321 3322 static inline bool meta_partition_should_pad(enum partition_trail_value pv) 3323 { 3324 return (pv >= 0) && (pv <= PART_TRAIL_MAX); 3325 } 3326 3327 /** Allocate a padded meta partition with a correctly initialised header 3328 * If the `data` pointer is NULL, then the required space is only allocated, 3329 * otherwise `data_len` bytes will be copied from `data` into the partition 3330 * entry. */ 3331 static struct image_partition_entry init_meta_partition_entry( 3332 const char *name, const void *data, uint32_t data_len, 3333 enum partition_trail_value pad_value) 3334 { 3335 uint32_t total_len = sizeof(struct meta_header) + data_len; 3336 if (meta_partition_should_pad(pad_value)) 3337 total_len += 1; 3338 3339 struct image_partition_entry entry = { 3340 .name = name, 3341 .size = total_len, 3342 .data = malloc(total_len) 3343 }; 3344 if (!entry.data) 3345 error(1, errno, "failed to allocate meta partition entry"); 3346 3347 struct meta_header *header = (struct meta_header *)entry.data; 3348 header->length = htonl(data_len); 3349 header->zero = 0; 3350 3351 if (data) 3352 memcpy(entry.data+sizeof(*header), data, data_len); 3353 3354 if (meta_partition_should_pad(pad_value)) 3355 entry.data[total_len - 1] = (uint8_t) pad_value; 3356 3357 return entry; 3358 } 3359 3360 /** Allocates a new image partition */ 3361 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) { 3362 struct image_partition_entry entry = {name, len, malloc(len)}; 3363 if (!entry.data) 3364 error(1, errno, "malloc"); 3365 3366 return entry; 3367 } 3368 3369 /** Sets up default partition names whenever custom names aren't specified */ 3370 static void set_partition_names(struct device_info *info) 3371 { 3372 if (!info->partition_names.partition_table) 3373 info->partition_names.partition_table = "partition-table"; 3374 if (!info->partition_names.soft_ver) 3375 info->partition_names.soft_ver = "soft-version"; 3376 if (!info->partition_names.os_image) 3377 info->partition_names.os_image = "os-image"; 3378 if (!info->partition_names.support_list) 3379 info->partition_names.support_list = "support-list"; 3380 if (!info->partition_names.file_system) 3381 info->partition_names.file_system = "file-system"; 3382 if (!info->partition_names.extra_para) 3383 info->partition_names.extra_para = "extra-para"; 3384 } 3385 3386 /** Frees an image partition */ 3387 static void free_image_partition(struct image_partition_entry *entry) 3388 { 3389 void *data = entry->data; 3390 3391 entry->name = NULL; 3392 entry->size = 0; 3393 entry->data = NULL; 3394 3395 free(data); 3396 } 3397 3398 static time_t source_date_epoch = -1; 3399 static void set_source_date_epoch() { 3400 char *env = getenv("SOURCE_DATE_EPOCH"); 3401 char *endptr = env; 3402 errno = 0; 3403 if (env && *env) { 3404 source_date_epoch = strtoull(env, &endptr, 10); 3405 if (errno || (endptr && *endptr != '\0')) { 3406 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH"); 3407 exit(1); 3408 } 3409 } 3410 } 3411 3412 /** Generates the partition-table partition */ 3413 static struct image_partition_entry make_partition_table(const struct device_info *p) 3414 { 3415 struct image_partition_entry entry = alloc_image_partition(p->partition_names.partition_table, SAFELOADER_PAYLOAD_TABLE_SIZE); 3416 3417 char *s = (char *)entry.data, *end = (char *)(s+entry.size); 3418 3419 *(s++) = 0x00; 3420 *(s++) = 0x04; 3421 *(s++) = 0x00; 3422 *(s++) = 0x00; 3423 3424 size_t i; 3425 for (i = 0; p->partitions[i].name; i++) { 3426 size_t len = end-s; 3427 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", 3428 p->partitions[i].name, p->partitions[i].base, p->partitions[i].size); 3429 3430 if (w > len-1) 3431 error(1, 0, "flash partition table overflow?"); 3432 3433 s += w; 3434 } 3435 3436 s++; 3437 3438 memset(s, 0xff, end-s); 3439 3440 return entry; 3441 } 3442 3443 3444 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */ 3445 static inline uint8_t bcd(uint8_t v) { 3446 return 0x10 * (v/10) + v%10; 3447 } 3448 3449 3450 /** Generates the soft-version partition */ 3451 static struct image_partition_entry make_soft_version(const struct device_info *info, uint32_t rev) 3452 { 3453 /** If an info string is provided, use this instead of 3454 * the structured data, and include the null-termination */ 3455 if (info->soft_ver.type == SOFT_VER_TYPE_TEXT) { 3456 uint32_t len = strlen(info->soft_ver.text) + 1; 3457 return init_meta_partition_entry(info->partition_names.soft_ver, 3458 info->soft_ver.text, len, info->part_trail); 3459 } 3460 3461 time_t t; 3462 3463 if (source_date_epoch != -1) 3464 t = source_date_epoch; 3465 else if (time(&t) == (time_t)(-1)) 3466 error(1, errno, "time"); 3467 3468 struct tm *tm = gmtime(&t); 3469 3470 struct soft_version s = { 3471 .pad1 = 0xff, 3472 3473 .version_major = info->soft_ver.num[0], 3474 .version_minor = info->soft_ver.num[1], 3475 .version_patch = info->soft_ver.num[2], 3476 3477 .year_hi = bcd((1900+tm->tm_year)/100), 3478 .year_lo = bcd(tm->tm_year%100), 3479 .month = bcd(tm->tm_mon+1), 3480 .day = bcd(tm->tm_mday), 3481 .rev = htonl(rev), 3482 3483 .compat_level = htonl(info->soft_ver_compat_level) 3484 }; 3485 3486 if (info->soft_ver_compat_level == 0) 3487 return init_meta_partition_entry(info->partition_names.soft_ver, &s, 3488 (uint8_t *)(&s.compat_level) - (uint8_t *)(&s), 3489 info->part_trail); 3490 else 3491 return init_meta_partition_entry(info->partition_names.soft_ver, &s, 3492 sizeof(s), info->part_trail); 3493 } 3494 3495 /** Generates the support-list partition */ 3496 static struct image_partition_entry make_support_list( 3497 const struct device_info *info) 3498 { 3499 uint32_t len = strlen(info->support_list); 3500 return init_meta_partition_entry(info->partition_names.support_list, info->support_list, 3501 len, info->part_trail); 3502 } 3503 3504 /** Partition with extra-para data */ 3505 static struct image_partition_entry make_extra_para( 3506 const struct device_info *info, const uint8_t *extra_para, size_t len) 3507 { 3508 return init_meta_partition_entry(info->partition_names.extra_para, extra_para, len, 3509 info->part_trail); 3510 } 3511 3512 /** Creates a new image partition with an arbitrary name from a file */ 3513 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) { 3514 struct stat statbuf; 3515 3516 if (stat(filename, &statbuf) < 0) 3517 error(1, errno, "unable to stat file `%s'", filename); 3518 3519 size_t len = statbuf.st_size; 3520 3521 if (add_jffs2_eof) { 3522 if (file_system_partition) 3523 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base; 3524 else 3525 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark); 3526 } 3527 3528 struct image_partition_entry entry = alloc_image_partition(part_name, len); 3529 3530 FILE *file = fopen(filename, "rb"); 3531 if (!file) 3532 error(1, errno, "unable to open file `%s'", filename); 3533 3534 if (fread(entry.data, statbuf.st_size, 1, file) != 1) 3535 error(1, errno, "unable to read file `%s'", filename); 3536 3537 if (add_jffs2_eof) { 3538 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size; 3539 3540 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark)); 3541 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark)); 3542 } 3543 3544 fclose(file); 3545 3546 return entry; 3547 } 3548 3549 /** 3550 Copies a list of image partitions into an image buffer and generates the image partition table while doing so 3551 3552 Example image partition table: 3553 3554 fwup-ptn partition-table base 0x00800 size 0x00800 3555 fwup-ptn os-image base 0x01000 size 0x113b45 3556 fwup-ptn file-system base 0x114b45 size 0x1d0004 3557 fwup-ptn support-list base 0x2e4b49 size 0x000d1 3558 3559 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"), 3560 the end of the partition table is marked with a zero byte. 3561 3562 The firmware image must contain at least the partition-table and support-list partitions 3563 to be accepted. There aren't any alignment constraints for the image partitions. 3564 3565 The partition-table partition contains the actual flash layout; partitions 3566 from the image partition table are mapped to the corresponding flash partitions during 3567 the firmware upgrade. The support-list partition contains a list of devices supported by 3568 the firmware image. 3569 3570 The base offsets in the firmware partition table are relative to the end 3571 of the vendor information block, so the partition-table partition will 3572 actually start at offset 0x1814 of the image. 3573 3574 I think partition-table must be the first partition in the firmware image. 3575 */ 3576 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) { 3577 size_t i, j; 3578 char *image_pt = (char *)buffer, *end = image_pt + SAFELOADER_PAYLOAD_TABLE_SIZE; 3579 3580 size_t base = SAFELOADER_PAYLOAD_TABLE_SIZE; 3581 for (i = 0; parts[i].name; i++) { 3582 for (j = 0; flash_parts[j].name; j++) { 3583 if (!strcmp(flash_parts[j].name, parts[i].name)) { 3584 if (parts[i].size > flash_parts[j].size) 3585 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size); 3586 break; 3587 } 3588 } 3589 3590 assert(flash_parts[j].name); 3591 3592 memcpy(buffer + base, parts[i].data, parts[i].size); 3593 3594 size_t len = end-image_pt; 3595 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size); 3596 3597 if (w > len-1) 3598 error(1, 0, "image partition table overflow?"); 3599 3600 image_pt += w; 3601 3602 base += parts[i].size; 3603 } 3604 } 3605 3606 /** Generates and writes the image MD5 checksum */ 3607 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) { 3608 MD5_CTX ctx; 3609 3610 MD5_Init(&ctx); 3611 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt)); 3612 MD5_Update(&ctx, buffer, len); 3613 MD5_Final(md5, &ctx); 3614 } 3615 3616 3617 /** 3618 Generates the firmware image in factory format 3619 3620 Image format: 3621 3622 Bytes (hex) Usage 3623 ----------- ----- 3624 0000-0003 Image size (4 bytes, big endian) 3625 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14) 3626 0014-0017 Vendor information length (without padding) (4 bytes, big endian) 3627 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older 3628 (VxWorks-based) TP-LINK devices which use a smaller vendor information block) 3629 1014-1813 Image partition table (2048 bytes, padded with 0xff) 3630 1814-xxxx Firmware partitions 3631 */ 3632 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) { 3633 *len = SAFELOADER_PAYLOAD_OFFSET + SAFELOADER_PAYLOAD_TABLE_SIZE; 3634 3635 size_t i; 3636 for (i = 0; parts[i].name; i++) 3637 *len += parts[i].size; 3638 3639 uint8_t *image = malloc(*len); 3640 if (!image) 3641 error(1, errno, "malloc"); 3642 3643 memset(image, 0xff, *len); 3644 put32(image, *len); 3645 3646 if (info->vendor) { 3647 size_t vendor_len = strlen(info->vendor); 3648 put32(image + SAFELOADER_PREAMBLE_SIZE, vendor_len); 3649 memcpy(image + SAFELOADER_PREAMBLE_SIZE + 0x4, info->vendor, vendor_len); 3650 } 3651 3652 put_partitions(image + SAFELOADER_PAYLOAD_OFFSET, info->partitions, parts); 3653 put_md5(image + 0x04, image + SAFELOADER_PREAMBLE_SIZE, *len - SAFELOADER_PREAMBLE_SIZE); 3654 3655 return image; 3656 } 3657 3658 /** 3659 Generates the firmware image in sysupgrade format 3660 3661 This makes some assumptions about the provided flash and image partition tables and 3662 should be generalized when TP-LINK starts building its safeloader into hardware with 3663 different flash layouts. 3664 */ 3665 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) { 3666 size_t i, j; 3667 size_t flash_first_partition_index = 0; 3668 size_t flash_last_partition_index = 0; 3669 const struct flash_partition_entry *flash_first_partition = NULL; 3670 const struct flash_partition_entry *flash_last_partition = NULL; 3671 const struct image_partition_entry *image_last_partition = NULL; 3672 3673 /** Find first and last partitions */ 3674 for (i = 0; info->partitions[i].name; i++) { 3675 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) { 3676 flash_first_partition = &info->partitions[i]; 3677 flash_first_partition_index = i; 3678 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) { 3679 flash_last_partition = &info->partitions[i]; 3680 flash_last_partition_index = i; 3681 } 3682 } 3683 3684 assert(flash_first_partition && flash_last_partition); 3685 assert(flash_first_partition_index < flash_last_partition_index); 3686 3687 /** Find last partition from image to calculate needed size */ 3688 for (i = 0; image_parts[i].name; i++) { 3689 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) { 3690 image_last_partition = &image_parts[i]; 3691 break; 3692 } 3693 } 3694 3695 assert(image_last_partition); 3696 3697 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size; 3698 3699 uint8_t *image = malloc(*len); 3700 if (!image) 3701 error(1, errno, "malloc"); 3702 3703 memset(image, 0xff, *len); 3704 3705 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) { 3706 for (j = 0; image_parts[j].name; j++) { 3707 if (!strcmp(info->partitions[i].name, image_parts[j].name)) { 3708 if (image_parts[j].size > info->partitions[i].size) 3709 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size); 3710 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size); 3711 break; 3712 } 3713 3714 assert(image_parts[j].name); 3715 } 3716 } 3717 3718 return image; 3719 } 3720 3721 /** Generates an image according to a given layout and writes it to a file */ 3722 static void build_image(const char *output, 3723 const char *kernel_image, 3724 const char *rootfs_image, 3725 uint32_t rev, 3726 bool add_jffs2_eof, 3727 bool sysupgrade, 3728 struct device_info *info) { 3729 3730 size_t i; 3731 3732 struct image_partition_entry parts[7] = {}; 3733 3734 struct flash_partition_entry *firmware_partition = NULL; 3735 struct flash_partition_entry *os_image_partition = NULL; 3736 struct flash_partition_entry *file_system_partition = NULL; 3737 size_t firmware_partition_index = 0; 3738 3739 set_partition_names(info); 3740 3741 for (i = 0; info->partitions[i].name; i++) { 3742 if (!strcmp(info->partitions[i].name, "firmware")) 3743 { 3744 firmware_partition = &info->partitions[i]; 3745 firmware_partition_index = i; 3746 } 3747 } 3748 3749 if (firmware_partition) 3750 { 3751 os_image_partition = &info->partitions[firmware_partition_index]; 3752 file_system_partition = &info->partitions[firmware_partition_index + 1]; 3753 3754 struct stat kernel; 3755 if (stat(kernel_image, &kernel) < 0) 3756 error(1, errno, "unable to stat file `%s'", kernel_image); 3757 3758 if (kernel.st_size > firmware_partition->size) 3759 error(1, 0, "kernel overflowed firmware partition\n"); 3760 3761 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--) 3762 info->partitions[i+1] = info->partitions[i]; 3763 3764 file_system_partition->name = info->partition_names.file_system; 3765 3766 file_system_partition->base = firmware_partition->base + kernel.st_size; 3767 3768 /* Align partition start to erase blocks for factory images only */ 3769 if (!sysupgrade) 3770 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000); 3771 3772 file_system_partition->size = firmware_partition->size - file_system_partition->base; 3773 3774 os_image_partition->name = info->partition_names.os_image; 3775 3776 os_image_partition->size = kernel.st_size; 3777 } 3778 3779 parts[0] = make_partition_table(info); 3780 parts[1] = make_soft_version(info, rev); 3781 parts[2] = make_support_list(info); 3782 parts[3] = read_file(info->partition_names.os_image, kernel_image, false, NULL); 3783 parts[4] = read_file(info->partition_names.file_system, rootfs_image, add_jffs2_eof, file_system_partition); 3784 3785 3786 /* Some devices need the extra-para partition to accept the firmware */ 3787 if (strcasecmp(info->id, "ARCHER-A6-V3") == 0 || 3788 strcasecmp(info->id, "ARCHER-A7-V5") == 0 || 3789 strcasecmp(info->id, "ARCHER-A9-V6") == 0 || 3790 strcasecmp(info->id, "ARCHER-AX23-V1") == 0 || 3791 strcasecmp(info->id, "ARCHER-C2-V3") == 0 || 3792 strcasecmp(info->id, "ARCHER-C7-V4") == 0 || 3793 strcasecmp(info->id, "ARCHER-C7-V5") == 0 || 3794 strcasecmp(info->id, "ARCHER-C25-V1") == 0 || 3795 strcasecmp(info->id, "ARCHER-C59-V2") == 0 || 3796 strcasecmp(info->id, "ARCHER-C60-V2") == 0 || 3797 strcasecmp(info->id, "ARCHER-C60-V3") == 0 || 3798 strcasecmp(info->id, "ARCHER-C6U-V1") == 0 || 3799 strcasecmp(info->id, "ARCHER-C6-V3") == 0 || 3800 strcasecmp(info->id, "DECO-M4R-V4") == 0 || 3801 strcasecmp(info->id, "MR70X") == 0 || 3802 strcasecmp(info->id, "TLWR1043NV5") == 0) { 3803 const uint8_t extra_para[2] = {0x01, 0x00}; 3804 parts[5] = make_extra_para(info, extra_para, 3805 sizeof(extra_para)); 3806 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0 || 3807 strcasecmp(info->id, "TL-WA1201-V2") == 0) { 3808 const uint8_t extra_para[2] = {0x00, 0x01}; 3809 parts[5] = make_extra_para(info, extra_para, 3810 sizeof(extra_para)); 3811 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0 || 3812 strcasecmp(info->id, "EAP245-V3") == 0) { 3813 const uint8_t extra_para[2] = {0x01, 0x01}; 3814 parts[5] = make_extra_para(info, extra_para, 3815 sizeof(extra_para)); 3816 } 3817 3818 size_t len; 3819 void *image; 3820 if (sysupgrade) 3821 image = generate_sysupgrade_image(info, parts, &len); 3822 else 3823 image = generate_factory_image(info, parts, &len); 3824 3825 FILE *file = fopen(output, "wb"); 3826 if (!file) 3827 error(1, errno, "unable to open output file"); 3828 3829 if (fwrite(image, len, 1, file) != 1) 3830 error(1, 0, "unable to write output file"); 3831 3832 fclose(file); 3833 3834 free(image); 3835 3836 for (i = 0; parts[i].name; i++) 3837 free_image_partition(&parts[i]); 3838 } 3839 3840 /** Usage output */ 3841 static void usage(const char *argv0) { 3842 fprintf(stderr, 3843 "Usage: %s [OPTIONS...]\n" 3844 "\n" 3845 "Options:\n" 3846 " -h show this help\n" 3847 "\n" 3848 "Info about an image:\n" 3849 " -i <file> input file to read from\n" 3850 "Create a new image:\n" 3851 " -B <board> create image for the board specified with <board>\n" 3852 " -k <file> read kernel image from the file <file>\n" 3853 " -r <file> read rootfs image from the file <file>\n" 3854 " -o <file> write output to the file <file>\n" 3855 " -V <rev> sets the revision number to <rev>\n" 3856 " -j add jffs2 end-of-filesystem markers\n" 3857 " -S create sysupgrade instead of factory image\n" 3858 "Extract an old image:\n" 3859 " -x <file> extract all oem firmware partition\n" 3860 " -d <dir> destination to extract the firmware partition\n" 3861 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n", 3862 argv0 3863 ); 3864 }; 3865 3866 3867 static struct device_info *find_board(const char *id) 3868 { 3869 struct device_info *board = NULL; 3870 3871 for (board = boards; board->id != NULL; board++) 3872 if (strcasecmp(id, board->id) == 0) 3873 return board; 3874 3875 return NULL; 3876 } 3877 3878 static int add_flash_partition( 3879 struct flash_partition_entry *part_list, 3880 size_t max_entries, 3881 const char *name, 3882 unsigned long base, 3883 unsigned long size) 3884 { 3885 size_t ptr; 3886 /* check if the list has a free entry */ 3887 for (ptr = 0; ptr < max_entries; ptr++, part_list++) { 3888 if (part_list->name == NULL && 3889 part_list->base == 0 && 3890 part_list->size == 0) 3891 break; 3892 } 3893 3894 if (ptr == max_entries) { 3895 error(1, 0, "No free flash part entry available."); 3896 } 3897 3898 part_list->name = calloc(1, strlen(name) + 1); 3899 if (!part_list->name) { 3900 error(1, 0, "Unable to allocate memory"); 3901 } 3902 3903 memcpy((char *)part_list->name, name, strlen(name)); 3904 part_list->base = base; 3905 part_list->size = size; 3906 3907 return 0; 3908 } 3909 3910 /** read the partition table into struct flash_partition_entry */ 3911 enum PARTITION_TABLE_TYPE { 3912 PARTITION_TABLE_FWUP, 3913 PARTITION_TABLE_FLASH, 3914 }; 3915 3916 static int read_partition_table( 3917 FILE *file, long offset, 3918 struct flash_partition_entry *entries, size_t max_entries, 3919 int type) 3920 { 3921 char buf[SAFELOADER_PAYLOAD_TABLE_SIZE]; 3922 char *ptr, *end; 3923 const char *parthdr = NULL; 3924 const char *fwuphdr = "fwup-ptn"; 3925 const char *flashhdr = "partition"; 3926 3927 /* TODO: search for the partition table */ 3928 3929 switch(type) { 3930 case PARTITION_TABLE_FWUP: 3931 parthdr = fwuphdr; 3932 break; 3933 case PARTITION_TABLE_FLASH: 3934 parthdr = flashhdr; 3935 break; 3936 default: 3937 error(1, 0, "Invalid partition table"); 3938 } 3939 3940 if (fseek(file, offset, SEEK_SET) < 0) 3941 error(1, errno, "Can not seek in the firmware"); 3942 3943 if (fread(buf, sizeof(buf), 1, file) != 1) 3944 error(1, errno, "Can not read fwup-ptn from the firmware"); 3945 3946 buf[sizeof(buf) - 1] = '\0'; 3947 3948 /* look for the partition header */ 3949 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) { 3950 fprintf(stderr, "DEBUG: can not find fwuphdr\n"); 3951 return 1; 3952 } 3953 3954 ptr = buf; 3955 end = buf + sizeof(buf); 3956 while ((ptr + strlen(parthdr)) < end && 3957 memcmp(ptr, parthdr, strlen(parthdr)) == 0) { 3958 char *end_part; 3959 char *end_element; 3960 3961 char name[32] = { 0 }; 3962 int name_len = 0; 3963 unsigned long base = 0; 3964 unsigned long size = 0; 3965 3966 end_part = memchr(ptr, '\n', (end - ptr)); 3967 if (end_part == NULL) { 3968 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */ 3969 break; 3970 } 3971 3972 for (int i = 0; i <= 4; i++) { 3973 if (end_part <= ptr) 3974 break; 3975 3976 end_element = memchr(ptr, 0x20, (end_part - ptr)); 3977 if (end_element == NULL) { 3978 error(1, errno, "Ignoring the rest of the partition entries."); 3979 break; 3980 } 3981 3982 switch (i) { 3983 /* partition header */ 3984 case 0: 3985 ptr = end_element + 1; 3986 continue; 3987 /* name */ 3988 case 1: 3989 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr); 3990 strncpy(name, ptr, name_len); 3991 name[name_len] = '\0'; 3992 ptr = end_element + 1; 3993 continue; 3994 3995 /* string "base" */ 3996 case 2: 3997 ptr = end_element + 1; 3998 continue; 3999 4000 /* actual base */ 4001 case 3: 4002 base = strtoul(ptr, NULL, 16); 4003 ptr = end_element + 1; 4004 continue; 4005 4006 /* string "size" */ 4007 case 4: 4008 ptr = end_element + 1; 4009 /* actual size. The last element doesn't have a sepeartor */ 4010 size = strtoul(ptr, NULL, 16); 4011 /* the part ends with 0x09, 0x0d, 0x0a */ 4012 ptr = end_part + 1; 4013 add_flash_partition(entries, max_entries, name, base, size); 4014 continue; 4015 } 4016 } 4017 } 4018 4019 return 0; 4020 } 4021 4022 static void safeloader_read_partition(FILE *input_file, size_t payload_offset, 4023 struct flash_partition_entry *entry, 4024 struct image_partition_entry *part) 4025 { 4026 size_t part_size = entry->size; 4027 void *part_data = malloc(part_size); 4028 4029 if (fseek(input_file, payload_offset, SEEK_SET)) 4030 error(1, errno, "Failed to seek to partition data"); 4031 4032 if (!part_data) 4033 error(1, ENOMEM, "Failed to allocate partition data"); 4034 4035 if (fread(part_data, 1, part_size, input_file) < part_size) 4036 error(1, errno, "Failed to read partition data"); 4037 4038 part->data = part_data; 4039 part->size = part_size; 4040 part->name = entry->name; 4041 } 4042 4043 static void safeloader_parse_image(FILE *input_file, struct safeloader_image_info *image) 4044 { 4045 static const char *HEADER_ID_CLOUD = "fw-type:Cloud"; 4046 static const char *HEADER_ID_QNEW = "?NEW"; 4047 4048 char buf[64]; 4049 4050 if (!input_file) 4051 return; 4052 4053 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET); 4054 4055 if (fread(buf, sizeof(buf), 1, input_file) != 1) 4056 error(1, errno, "Can not read image header"); 4057 4058 if (memcmp(HEADER_ID_QNEW, &buf[0], strlen(HEADER_ID_QNEW)) == 0) 4059 image->type = SAFELOADER_TYPE_QNEW; 4060 else if (memcmp(HEADER_ID_CLOUD, &buf[0], strlen(HEADER_ID_CLOUD)) == 0) 4061 image->type = SAFELOADER_TYPE_CLOUD; 4062 else if (ntohl(*((uint32_t *) &buf[0])) <= SAFELOADER_HEADER_SIZE) 4063 image->type = SAFELOADER_TYPE_VENDOR; 4064 else 4065 image->type = SAFELOADER_TYPE_DEFAULT; 4066 4067 switch (image->type) { 4068 case SAFELOADER_TYPE_DEFAULT: 4069 case SAFELOADER_TYPE_VENDOR: 4070 case SAFELOADER_TYPE_CLOUD: 4071 image->payload_offset = SAFELOADER_PAYLOAD_OFFSET; 4072 break; 4073 case SAFELOADER_TYPE_QNEW: 4074 image->payload_offset = SAFELOADER_QNEW_PAYLOAD_OFFSET; 4075 break; 4076 } 4077 4078 /* Parse image partition table */ 4079 read_partition_table(input_file, image->payload_offset, &image->entries[0], 4080 MAX_PARTITIONS, PARTITION_TABLE_FWUP); 4081 } 4082 4083 static void write_partition( 4084 FILE *input_file, 4085 size_t firmware_offset, 4086 struct flash_partition_entry *entry, 4087 FILE *output_file) 4088 { 4089 char buf[4096]; 4090 size_t offset; 4091 4092 fseek(input_file, entry->base + firmware_offset, SEEK_SET); 4093 4094 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) { 4095 if (fread(buf, sizeof(buf), 1, input_file) != 1) 4096 error(1, errno, "Can not read partition from input_file"); 4097 4098 if (fwrite(buf, sizeof(buf), 1, output_file) != 1) 4099 error(1, errno, "Can not write partition to output_file"); 4100 } 4101 /* write last chunk smaller than buffer */ 4102 if (offset < entry->size) { 4103 offset = entry->size - offset; 4104 if (fread(buf, offset, 1, input_file) != 1) 4105 error(1, errno, "Can not read partition from input_file"); 4106 if (fwrite(buf, offset, 1, output_file) != 1) 4107 error(1, errno, "Can not write partition to output_file"); 4108 } 4109 } 4110 4111 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory) 4112 { 4113 FILE *output_file; 4114 char output[PATH_MAX]; 4115 4116 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name); 4117 output_file = fopen(output, "wb+"); 4118 if (output_file == NULL) { 4119 error(1, errno, "Can not open output file %s", output); 4120 } 4121 4122 write_partition(input_file, firmware_offset, entry, output_file); 4123 4124 fclose(output_file); 4125 4126 return 0; 4127 } 4128 4129 /** extract all partitions from the firmware file */ 4130 static int extract_firmware(const char *input, const char *output_directory) 4131 { 4132 struct safeloader_image_info info = {}; 4133 struct stat statbuf; 4134 FILE *input_file; 4135 4136 /* check input file */ 4137 if (stat(input, &statbuf)) { 4138 error(1, errno, "Can not read input firmware %s", input); 4139 } 4140 4141 /* check if output directory exists */ 4142 if (stat(output_directory, &statbuf)) { 4143 error(1, errno, "Failed to stat output directory %s", output_directory); 4144 } 4145 4146 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) { 4147 error(1, errno, "Given output directory is not a directory %s", output_directory); 4148 } 4149 4150 input_file = fopen(input, "rb"); 4151 safeloader_parse_image(input_file, &info); 4152 4153 for (size_t i = 0; i < MAX_PARTITIONS && info.entries[i].name; i++) 4154 extract_firmware_partition(input_file, info.payload_offset, &info.entries[i], output_directory); 4155 4156 return 0; 4157 } 4158 4159 static struct flash_partition_entry *find_partition( 4160 struct flash_partition_entry *entries, size_t max_entries, 4161 const char *name, const char *error_msg) 4162 { 4163 for (size_t i = 0; i < max_entries; i++, entries++) { 4164 if (strcmp(entries->name, name) == 0) 4165 return entries; 4166 } 4167 4168 if (error_msg) { 4169 error(1, 0, "%s", error_msg); 4170 } 4171 4172 return NULL; 4173 } 4174 4175 static int firmware_info(const char *input) 4176 { 4177 struct safeloader_image_info info = {}; 4178 struct image_partition_entry part = {}; 4179 struct flash_partition_entry *e; 4180 FILE *input_file; 4181 4182 input_file = fopen(input, "rb"); 4183 4184 safeloader_parse_image(input_file, &info); 4185 4186 if (info.type == SAFELOADER_TYPE_VENDOR) { 4187 char buf[SAFELOADER_HEADER_SIZE] = {}; 4188 uint32_t vendor_size; 4189 4190 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET); 4191 fread(&vendor_size, sizeof(uint32_t), 1, input_file); 4192 4193 vendor_size = ntohl(vendor_size); 4194 fread(buf, vendor_size, 1, input_file); 4195 4196 printf("Firmware vendor string:\n"); 4197 fwrite(buf, strnlen(buf, vendor_size), 1, stdout); 4198 printf("\n"); 4199 } 4200 4201 printf("Firmware image partitions:\n"); 4202 printf("%-8s %-8s %s\n", "base", "size", "name"); 4203 4204 e = &info.entries[0]; 4205 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++) 4206 printf("%08x %08x %s\n", e->base, e->size, e->name); 4207 4208 e = find_partition(&info.entries[0], MAX_PARTITIONS, "soft-version", NULL); 4209 if (e) { 4210 struct soft_version *s; 4211 unsigned int ascii_len; 4212 const uint8_t *buf; 4213 size_t data_len; 4214 bool isstr; 4215 4216 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part); 4217 data_len = ntohl(((struct meta_header *) part.data)->length); 4218 buf = part.data + sizeof(struct meta_header); 4219 4220 /* Check for (null-terminated) string */ 4221 ascii_len = 0; 4222 while (ascii_len < data_len && isascii(buf[ascii_len])) 4223 ascii_len++; 4224 4225 isstr = ascii_len == data_len; 4226 4227 printf("\n[Software version]\n"); 4228 if (isstr) { 4229 fwrite(buf, strnlen((const char *) buf, data_len), 1, stdout); 4230 putchar('\n'); 4231 } else if (data_len >= offsetof(struct soft_version, rev)) { 4232 s = (struct soft_version *) buf; 4233 4234 printf("Version: %d.%d.%d\n", s->version_major, s->version_minor, s->version_patch); 4235 printf("Date: %02x%02x-%02x-%02x\n", s->year_hi, s->year_lo, s->month, s->day); 4236 printf("Revision: %d\n", ntohl(s->rev)); 4237 } else { 4238 printf("Failed to parse data\n"); 4239 } 4240 4241 free_image_partition(&part); 4242 } 4243 4244 e = find_partition(&info.entries[0], MAX_PARTITIONS, "support-list", NULL); 4245 if (e) { 4246 size_t data_len; 4247 4248 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part); 4249 data_len = ntohl(((struct meta_header *) part.data)->length); 4250 4251 printf("\n[Support list]\n"); 4252 fwrite(part.data + sizeof(struct meta_header), data_len, 1, stdout); 4253 printf("\n"); 4254 4255 free_image_partition(&part); 4256 } 4257 4258 e = find_partition(&info.entries[0], MAX_PARTITIONS, "partition-table", NULL); 4259 if (e) { 4260 size_t flash_table_offset = info.payload_offset + e->base + 4; 4261 struct flash_partition_entry parts[MAX_PARTITIONS] = {}; 4262 4263 if (read_partition_table(input_file, flash_table_offset, parts, MAX_PARTITIONS, PARTITION_TABLE_FLASH)) 4264 error(1, 0, "Error can not read the partition table (partition)"); 4265 4266 printf("\n[Partition table]\n"); 4267 printf("%-8s %-8s %s\n", "base", "size", "name"); 4268 4269 e = &parts[0]; 4270 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++) 4271 printf("%08x %08x %s\n", e->base, e->size, e->name); 4272 } 4273 4274 fclose(input_file); 4275 4276 return 0; 4277 } 4278 4279 static void write_ff(FILE *output_file, size_t size) 4280 { 4281 char buf[4096]; 4282 size_t offset; 4283 4284 memset(buf, 0xff, sizeof(buf)); 4285 4286 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) { 4287 if (fwrite(buf, sizeof(buf), 1, output_file) != 1) 4288 error(1, errno, "Can not write 0xff to output_file"); 4289 } 4290 4291 /* write last chunk smaller than buffer */ 4292 if (offset < size) { 4293 offset = size - offset; 4294 if (fwrite(buf, offset, 1, output_file) != 1) 4295 error(1, errno, "Can not write partition to output_file"); 4296 } 4297 } 4298 4299 static void convert_firmware(const char *input, const char *output) 4300 { 4301 struct flash_partition_entry flash[MAX_PARTITIONS] = {}; 4302 struct flash_partition_entry *fwup_partition_table; 4303 struct flash_partition_entry *flash_file_system; 4304 struct flash_partition_entry *fwup_file_system; 4305 struct flash_partition_entry *flash_os_image; 4306 struct flash_partition_entry *fwup_os_image; 4307 struct safeloader_image_info info = {}; 4308 size_t flash_table_offset; 4309 struct stat statbuf; 4310 FILE *output_file; 4311 FILE *input_file; 4312 4313 /* check input file */ 4314 if (stat(input, &statbuf)) { 4315 error(1, errno, "Can not read input firmware %s", input); 4316 } 4317 4318 input_file = fopen(input, "rb"); 4319 if (!input_file) 4320 error(1, 0, "Can not open input firmware %s", input); 4321 4322 output_file = fopen(output, "wb"); 4323 if (!output_file) 4324 error(1, 0, "Can not open output firmware %s", output); 4325 4326 input_file = fopen(input, "rb"); 4327 safeloader_parse_image(input_file, &info); 4328 4329 fwup_os_image = find_partition(info.entries, MAX_PARTITIONS, 4330 "os-image", "Error can not find os-image partition (fwup)"); 4331 fwup_file_system = find_partition(info.entries, MAX_PARTITIONS, 4332 "file-system", "Error can not find file-system partition (fwup)"); 4333 fwup_partition_table = find_partition(info.entries, MAX_PARTITIONS, 4334 "partition-table", "Error can not find partition-table partition"); 4335 4336 /* the flash partition table has a 0x00000004 magic haeder */ 4337 flash_table_offset = info.payload_offset + fwup_partition_table->base + 4; 4338 if (read_partition_table(input_file, flash_table_offset, flash, MAX_PARTITIONS, PARTITION_TABLE_FLASH) != 0) 4339 error(1, 0, "Error can not read the partition table (flash)"); 4340 4341 flash_os_image = find_partition(flash, MAX_PARTITIONS, 4342 "os-image", "Error can not find os-image partition (flash)"); 4343 flash_file_system = find_partition(flash, MAX_PARTITIONS, 4344 "file-system", "Error can not find file-system partition (flash)"); 4345 4346 /* write os_image to 0x0 */ 4347 write_partition(input_file, info.payload_offset, fwup_os_image, output_file); 4348 write_ff(output_file, flash_os_image->size - fwup_os_image->size); 4349 4350 /* write file-system behind os_image */ 4351 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET); 4352 write_partition(input_file, info.payload_offset, fwup_file_system, output_file); 4353 4354 fclose(output_file); 4355 fclose(input_file); 4356 } 4357 4358 int main(int argc, char *argv[]) { 4359 const char *info_image = NULL, *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL; 4360 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL; 4361 bool add_jffs2_eof = false, sysupgrade = false; 4362 unsigned rev = 0; 4363 struct device_info *info; 4364 set_source_date_epoch(); 4365 4366 while (true) { 4367 int c; 4368 4369 c = getopt(argc, argv, "i:B:k:r:o:V:jSh:x:d:z:"); 4370 if (c == -1) 4371 break; 4372 4373 switch (c) { 4374 case 'i': 4375 info_image = optarg; 4376 break; 4377 4378 case 'B': 4379 board = optarg; 4380 break; 4381 4382 case 'k': 4383 kernel_image = optarg; 4384 break; 4385 4386 case 'r': 4387 rootfs_image = optarg; 4388 break; 4389 4390 case 'o': 4391 output = optarg; 4392 break; 4393 4394 case 'V': 4395 sscanf(optarg, "r%u", &rev); 4396 break; 4397 4398 case 'j': 4399 add_jffs2_eof = true; 4400 break; 4401 4402 case 'S': 4403 sysupgrade = true; 4404 break; 4405 4406 case 'h': 4407 usage(argv[0]); 4408 return 0; 4409 4410 case 'd': 4411 output_directory = optarg; 4412 break; 4413 4414 case 'x': 4415 extract_image = optarg; 4416 break; 4417 4418 case 'z': 4419 convert_image = optarg; 4420 break; 4421 4422 default: 4423 usage(argv[0]); 4424 return 1; 4425 } 4426 } 4427 4428 if (info_image) { 4429 firmware_info(info_image); 4430 } else if (extract_image || output_directory) { 4431 if (!extract_image) 4432 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x"); 4433 if (!output_directory) 4434 error(1, 0, "Can not extract an image without output directory. Use -d <dir>"); 4435 extract_firmware(extract_image, output_directory); 4436 } else if (convert_image) { 4437 if (!output) 4438 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>"); 4439 convert_firmware(convert_image, output); 4440 } else { 4441 if (!board) 4442 error(1, 0, "no board has been specified"); 4443 if (!kernel_image) 4444 error(1, 0, "no kernel image has been specified"); 4445 if (!rootfs_image) 4446 error(1, 0, "no rootfs image has been specified"); 4447 if (!output) 4448 error(1, 0, "no output filename has been specified"); 4449 4450 info = find_board(board); 4451 4452 if (info == NULL) 4453 error(1, 0, "unsupported board %s", board); 4454 4455 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info); 4456 } 4457 4458 return 0; 4459 } 4460
This page was automatically generated by LXR 0.3.1. • OpenWrt