tplink-safeloader: add TL-WPA8631P v4
[project/firmware-utils.git] / src / tplink-safeloader.c
1 // SPDX-License-Identifier: BSD-2-Clause
2 /*
3 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
4 All rights reserved.
5 */
6
7
8 /*
9 tplink-safeloader
10
11 Image generation tool for the TP-LINK SafeLoader as seen on
12 TP-LINK Pharos devices (CPE210/220/510/520)
13 */
14
15
16 #include <assert.h>
17 #include <ctype.h>
18 #include <errno.h>
19 #include <stdbool.h>
20 #include <stddef.h>
21 #include <stdio.h>
22 #include <stdint.h>
23 #include <stdlib.h>
24 #include <string.h>
25 #include <time.h>
26 #include <unistd.h>
27
28 #include <arpa/inet.h>
29
30 #include <sys/types.h>
31 #include <sys/stat.h>
32 #include <limits.h>
33
34 #include "md5.h"
35
36
37 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
38
39
40 #define MAX_PARTITIONS 32
41
42 /** An image partition table entry */
43 struct image_partition_entry {
44 const char *name;
45 size_t size;
46 uint8_t *data;
47 };
48
49 /** A flash partition table entry */
50 struct flash_partition_entry {
51 const char *name;
52 uint32_t base;
53 uint32_t size;
54 };
55
56 /** Flash partition names table entry */
57 struct factory_partition_names {
58 const char *partition_table;
59 const char *soft_ver;
60 const char *os_image;
61 const char *support_list;
62 const char *file_system;
63 const char *extra_para;
64 };
65
66 /** Partition trailing padding definitions
67 * Values 0x00 to 0xff are reserved to indicate the padding value
68 * Values from 0x100 are reserved to indicate other behaviour */
69 enum partition_trail_value {
70 PART_TRAIL_00 = 0x00,
71 PART_TRAIL_FF = 0xff,
72 PART_TRAIL_MAX = 0xff,
73 PART_TRAIL_NONE = 0x100
74 };
75
76 /** soft-version value overwrite types
77 * The default (for an uninitialised soft_ver field) is to use the numerical
78 * version number "0.0.0"
79 */
80 enum soft_ver_type {
81 SOFT_VER_TYPE_NUMERIC = 0,
82 SOFT_VER_TYPE_TEXT = 1,
83 };
84
85 /** Firmware layout description */
86 struct device_info {
87 const char *id;
88 const char *vendor;
89 const char *support_list;
90 enum partition_trail_value part_trail;
91 struct {
92 enum soft_ver_type type;
93 union {
94 const char *text;
95 uint8_t num[3];
96 };
97 } soft_ver;
98 uint32_t soft_ver_compat_level;
99 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
100 const char *first_sysupgrade_partition;
101 const char *last_sysupgrade_partition;
102 struct factory_partition_names partition_names;
103 };
104
105 #define SOFT_VER_TEXT(_t) {.type = SOFT_VER_TYPE_TEXT, .text = _t}
106 #define SOFT_VER_NUMERIC(_maj, _min, _patch) { \
107 .type = SOFT_VER_TYPE_NUMERIC, \
108 .num = {_maj, _min, _patch}}
109 #define SOFT_VER_DEFAULT SOFT_VER_NUMERIC(0, 0, 0)
110
111 struct __attribute__((__packed__)) meta_header {
112 uint32_t length;
113 uint32_t zero;
114 };
115
116 /** The content of the soft-version structure */
117 struct __attribute__((__packed__)) soft_version {
118 uint8_t pad1;
119 uint8_t version_major;
120 uint8_t version_minor;
121 uint8_t version_patch;
122 uint8_t year_hi;
123 uint8_t year_lo;
124 uint8_t month;
125 uint8_t day;
126 uint32_t rev;
127 uint32_t compat_level;
128 };
129
130 /*
131 * Safeloader image type
132 * Safeloader images contain a 0x14 byte preamble with image size (big endian
133 * UINT32) and md5 checksum (16 bytes).
134 *
135 * SAFEFLOADER_TYPE_DEFAULT
136 * Standard preamble with size including preamble length, and checksum.
137 * Header of 0x1000 bytes, contents of which are not specified.
138 * Payload starts at offset 0x1014.
139 *
140 * SAFELOADER_TYPE_VENDOR
141 * Standard preamble with size including preamble length, and checksum.
142 * Header contains up to 0x1000 bytes of vendor data, starting with a big endian
143 * UINT32 size, followed by that number of bytes containing (text) data.
144 * Padded with 0xFF. Payload starts at offset 0x1014.
145 *
146 * SAFELOADER_TYPE_CLOUD
147 * Standard preamble with size including preamble length, and checksum.
148 * Followed by the 'fw-type:Cloud' string and some (unknown) data.
149 * Payload starts at offset 0x1014.
150 *
151 * SAFELOADER_TYPE_QNEW
152 * Reversed order preamble, with (apparent) md5 checksum before the image
153 * size. The size does not include the preamble length.
154 * Header starts with 0x3C bytes, starting with the string '?NEW' (format not
155 * understood). Then another 0x1000 bytes follow, with the data payload
156 * starting at 0x1050.
157 */
158 enum safeloader_image_type {
159 SAFELOADER_TYPE_DEFAULT,
160 SAFELOADER_TYPE_VENDOR,
161 SAFELOADER_TYPE_CLOUD,
162 SAFELOADER_TYPE_QNEW,
163 };
164
165 /* Internal representation of safeloader image data */
166 struct safeloader_image_info {
167 enum safeloader_image_type type;
168 size_t payload_offset;
169 struct flash_partition_entry entries[MAX_PARTITIONS];
170 };
171
172 #define SAFELOADER_PREAMBLE_SIZE 0x14
173 #define SAFELOADER_HEADER_SIZE 0x1000
174 #define SAFELOADER_PAYLOAD_OFFSET (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_HEADER_SIZE)
175
176 #define SAFELOADER_QNEW_HEADER_SIZE 0x3C
177 #define SAFELOADER_QNEW_PAYLOAD_OFFSET \
178 (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_QNEW_HEADER_SIZE + SAFELOADER_HEADER_SIZE)
179
180 #define SAFELOADER_PAYLOAD_TABLE_SIZE 0x800
181
182 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
183
184
185 /**
186 Salt for the MD5 hash
187
188 Fortunately, TP-LINK seems to use the same salt for most devices which use
189 the new image format.
190 */
191 static const uint8_t md5_salt[16] = {
192 0x7a, 0x2b, 0x15, 0xed,
193 0x9b, 0x98, 0x59, 0x6d,
194 0xe5, 0x04, 0xab, 0x44,
195 0xac, 0x2a, 0x9f, 0x4e,
196 };
197
198
199 /** Firmware layout table */
200 static struct device_info boards[] = {
201 /** Firmware layout for the CPE210/220 V1 */
202 {
203 .id = "CPE210",
204 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
205 .support_list =
206 "SupportList:\r\n"
207 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
209 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
210 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
211 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
212 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
213 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
214 .part_trail = 0xff,
215 .soft_ver = SOFT_VER_DEFAULT,
216
217 .partitions = {
218 {"fs-uboot", 0x00000, 0x20000},
219 {"partition-table", 0x20000, 0x02000},
220 {"default-mac", 0x30000, 0x00020},
221 {"product-info", 0x31100, 0x00100},
222 {"signature", 0x32000, 0x00400},
223 {"firmware", 0x40000, 0x770000},
224 {"soft-version", 0x7b0000, 0x00100},
225 {"support-list", 0x7b1000, 0x00400},
226 {"user-config", 0x7c0000, 0x10000},
227 {"default-config", 0x7d0000, 0x10000},
228 {"log", 0x7e0000, 0x10000},
229 {"radio", 0x7f0000, 0x10000},
230 {NULL, 0, 0}
231 },
232
233 .first_sysupgrade_partition = "os-image",
234 .last_sysupgrade_partition = "support-list",
235 },
236
237 /** Firmware layout for the CPE210 V2 */
238 {
239 .id = "CPE210V2",
240 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
241 .support_list =
242 "SupportList:\r\n"
243 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
244 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
245 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
246 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
247 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
248 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
249 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
250 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
251 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
252 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
253 .part_trail = 0xff,
254 .soft_ver = SOFT_VER_DEFAULT,
255
256 .partitions = {
257 {"fs-uboot", 0x00000, 0x20000},
258 {"partition-table", 0x20000, 0x02000},
259 {"default-mac", 0x30000, 0x00020},
260 {"product-info", 0x31100, 0x00100},
261 {"device-info", 0x31400, 0x00400},
262 {"signature", 0x32000, 0x00400},
263 {"device-id", 0x33000, 0x00100},
264 {"firmware", 0x40000, 0x770000},
265 {"soft-version", 0x7b0000, 0x00100},
266 {"support-list", 0x7b1000, 0x01000},
267 {"user-config", 0x7c0000, 0x10000},
268 {"default-config", 0x7d0000, 0x10000},
269 {"log", 0x7e0000, 0x10000},
270 {"radio", 0x7f0000, 0x10000},
271 {NULL, 0, 0}
272 },
273
274 .first_sysupgrade_partition = "os-image",
275 .last_sysupgrade_partition = "support-list",
276 },
277
278 /** Firmware layout for the CPE210 V3 */
279 {
280 .id = "CPE210V3",
281 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
282 .support_list =
283 "SupportList:\r\n"
284 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
285 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
286 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
287 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
288 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
289 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
290 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
291 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
292 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
293 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
294 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
295 .part_trail = 0xff,
296 .soft_ver = SOFT_VER_DEFAULT,
297
298 .partitions = {
299 {"fs-uboot", 0x00000, 0x20000},
300 {"partition-table", 0x20000, 0x01000},
301 {"default-mac", 0x30000, 0x00020},
302 {"product-info", 0x31100, 0x00100},
303 {"device-info", 0x31400, 0x00400},
304 {"signature", 0x32000, 0x00400},
305 {"device-id", 0x33000, 0x00100},
306 {"firmware", 0x40000, 0x770000},
307 {"soft-version", 0x7b0000, 0x00100},
308 {"support-list", 0x7b1000, 0x01000},
309 {"user-config", 0x7c0000, 0x10000},
310 {"default-config", 0x7d0000, 0x10000},
311 {"log", 0x7e0000, 0x10000},
312 {"radio", 0x7f0000, 0x10000},
313 {NULL, 0, 0}
314 },
315
316 .first_sysupgrade_partition = "os-image",
317 .last_sysupgrade_partition = "support-list",
318 },
319
320 /** Firmware layout for the CPE220 V2 */
321 {
322 .id = "CPE220V2",
323 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
324 .support_list =
325 "SupportList:\r\n"
326 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
327 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
328 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
329 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
330 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
331 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
332 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
333 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
334 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
335 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
336 .part_trail = 0xff,
337 .soft_ver = SOFT_VER_DEFAULT,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"firmware", 0x40000, 0x770000},
346 {"soft-version", 0x7b0000, 0x00100},
347 {"support-list", 0x7b1000, 0x00400},
348 {"user-config", 0x7c0000, 0x10000},
349 {"default-config", 0x7d0000, 0x10000},
350 {"log", 0x7e0000, 0x10000},
351 {"radio", 0x7f0000, 0x10000},
352 {NULL, 0, 0}
353 },
354
355 .first_sysupgrade_partition = "os-image",
356 .last_sysupgrade_partition = "support-list",
357 },
358
359 /** Firmware layout for the CPE220 V3 */
360 {
361 .id = "CPE220V3",
362 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
363 .support_list =
364 "SupportList:\r\n"
365 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
366 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
367 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
368 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
369 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
370 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
371 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
372 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
373 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
374 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
375 .part_trail = 0xff,
376 .soft_ver = SOFT_VER_DEFAULT,
377
378 .partitions = {
379 {"fs-uboot", 0x00000, 0x20000},
380 {"partition-table", 0x20000, 0x02000},
381 {"default-mac", 0x30000, 0x00020},
382 {"product-info", 0x31100, 0x00100},
383 {"device-info", 0x31400, 0x00400},
384 {"signature", 0x32000, 0x00400},
385 {"device-id", 0x33000, 0x00100},
386 {"firmware", 0x40000, 0x770000},
387 {"soft-version", 0x7b0000, 0x00100},
388 {"support-list", 0x7b1000, 0x01000},
389 {"user-config", 0x7c0000, 0x10000},
390 {"default-config", 0x7d0000, 0x10000},
391 {"log", 0x7e0000, 0x10000},
392 {"radio", 0x7f0000, 0x10000},
393 {NULL, 0, 0}
394 },
395
396 .first_sysupgrade_partition = "os-image",
397 .last_sysupgrade_partition = "support-list",
398 },
399
400 /** Firmware layout for the CPE510/520 V1 */
401 {
402 .id = "CPE510",
403 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
404 .support_list =
405 "SupportList:\r\n"
406 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
407 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
408 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
409 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
410 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
411 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
412 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
413 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
414 .part_trail = 0xff,
415 .soft_ver = SOFT_VER_DEFAULT,
416
417 .partitions = {
418 {"fs-uboot", 0x00000, 0x20000},
419 {"partition-table", 0x20000, 0x02000},
420 {"default-mac", 0x30000, 0x00020},
421 {"product-info", 0x31100, 0x00100},
422 {"signature", 0x32000, 0x00400},
423 {"firmware", 0x40000, 0x770000},
424 {"soft-version", 0x7b0000, 0x00100},
425 {"support-list", 0x7b1000, 0x00400},
426 {"user-config", 0x7c0000, 0x10000},
427 {"default-config", 0x7d0000, 0x10000},
428 {"log", 0x7e0000, 0x10000},
429 {"radio", 0x7f0000, 0x10000},
430 {NULL, 0, 0}
431 },
432
433 .first_sysupgrade_partition = "os-image",
434 .last_sysupgrade_partition = "support-list",
435 },
436
437 /** Firmware layout for the CPE510 V2 */
438 {
439 .id = "CPE510V2",
440 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
441 .support_list =
442 "SupportList:\r\n"
443 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
444 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
445 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
446 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
447 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
448 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
449 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
450 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
451 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
452 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
453 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
454 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
455 .part_trail = 0xff,
456 .soft_ver = SOFT_VER_DEFAULT,
457
458 .partitions = {
459 {"fs-uboot", 0x00000, 0x20000},
460 {"partition-table", 0x20000, 0x02000},
461 {"default-mac", 0x30000, 0x00020},
462 {"product-info", 0x31100, 0x00100},
463 {"signature", 0x32000, 0x00400},
464 {"firmware", 0x40000, 0x770000},
465 {"soft-version", 0x7b0000, 0x00100},
466 {"support-list", 0x7b1000, 0x00400},
467 {"user-config", 0x7c0000, 0x10000},
468 {"default-config", 0x7d0000, 0x10000},
469 {"log", 0x7e0000, 0x10000},
470 {"radio", 0x7f0000, 0x10000},
471 {NULL, 0, 0}
472 },
473
474 .first_sysupgrade_partition = "os-image",
475 .last_sysupgrade_partition = "support-list",
476 },
477
478 /** Firmware layout for the CPE510 V3 */
479 {
480 .id = "CPE510V3",
481 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
482 .support_list =
483 "SupportList:\r\n"
484 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
485 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
486 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
487 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
488 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
489 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
490 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
491 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
492 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
493 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
494 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
495 "CPE510(TP-LINK|US|N300-5):3.0\r\n"
496 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n"
497 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
498 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
499 .part_trail = 0xff,
500 .soft_ver = SOFT_VER_DEFAULT,
501
502 .partitions = {
503 {"fs-uboot", 0x00000, 0x20000},
504 {"partition-table", 0x20000, 0x02000},
505 {"default-mac", 0x30000, 0x00020},
506 {"product-info", 0x31100, 0x00100},
507 {"signature", 0x32000, 0x00400},
508 {"firmware", 0x40000, 0x770000},
509 {"soft-version", 0x7b0000, 0x00100},
510 {"support-list", 0x7b1000, 0x00400},
511 {"user-config", 0x7c0000, 0x10000},
512 {"default-config", 0x7d0000, 0x10000},
513 {"log", 0x7e0000, 0x10000},
514 {"radio", 0x7f0000, 0x10000},
515 {NULL, 0, 0}
516 },
517
518 .first_sysupgrade_partition = "os-image",
519 .last_sysupgrade_partition = "support-list",
520 },
521
522 /** Firmware layout for the CPE605V1 */
523 {
524 .id = "CPE605V1",
525 .vendor = "CPE605(TP-LINK|UN|N150-5):1.0\r\n",
526 .support_list =
527 "SupportList:\r\n"
528 "CPE605(TP-LINK|UN|N150-5|00000000):1.0\r\n"
529 "CPE605(TP-LINK|EU|N150-5|45550000):1.0\r\n"
530 "CPE605(TP-LINK|US|N150-5|55530000):1.0\r\n",
531 .part_trail = 0x00,
532 .soft_ver = SOFT_VER_DEFAULT,
533
534 .partitions = {
535 {"fs-uboot", 0x00000, 0x20000},
536 {"partition-table", 0x20000, 0x02000},
537 {"default-mac", 0x30000, 0x00020},
538 {"serial-number", 0x30100, 0x00020},
539 {"product-info", 0x31100, 0x00100},
540 {"device-info", 0x31400, 0x00400},
541 {"signature", 0x32000, 0x00400},
542 {"device-id", 0x33000, 0x00100},
543 {"firmware", 0x40000, 0x770000},
544 {"soft-version", 0x7b0000, 0x00100},
545 {"support-list", 0x7b1000, 0x01000},
546 {"user-config", 0x7c0000, 0x10000},
547 {"default-config", 0x7d0000, 0x10000},
548 {"log", 0x7e0000, 0x10000},
549 {"radio", 0x7f0000, 0x10000},
550 {NULL, 0, 0}
551 },
552
553 .first_sysupgrade_partition = "os-image",
554 .last_sysupgrade_partition = "support-list",
555 },
556
557 /** Firmware layout for the CPE610V1 */
558 {
559 .id = "CPE610V1",
560 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
561 .support_list =
562 "SupportList:\r\n"
563 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
564 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
565 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
566 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
567 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
568 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
569 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
570 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
571 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
572 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
573 .part_trail = 0xff,
574 .soft_ver = SOFT_VER_DEFAULT,
575
576 .partitions = {
577 {"fs-uboot", 0x00000, 0x20000},
578 {"partition-table", 0x20000, 0x02000},
579 {"default-mac", 0x30000, 0x00020},
580 {"product-info", 0x31100, 0x00100},
581 {"signature", 0x32000, 0x00400},
582 {"firmware", 0x40000, 0x770000},
583 {"soft-version", 0x7b0000, 0x00100},
584 {"support-list", 0x7b1000, 0x00400},
585 {"user-config", 0x7c0000, 0x10000},
586 {"default-config", 0x7d0000, 0x10000},
587 {"log", 0x7e0000, 0x10000},
588 {"radio", 0x7f0000, 0x10000},
589 {NULL, 0, 0}
590 },
591
592 .first_sysupgrade_partition = "os-image",
593 .last_sysupgrade_partition = "support-list",
594 },
595
596 /** Firmware layout for the CPE610V2 */
597 {
598 .id = "CPE610V2",
599 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
600 .support_list =
601 "SupportList:\r\n"
602 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
603 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
604 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
605 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
606 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
607 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
608 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
609 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
610 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
611 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
612 .part_trail = 0xff,
613 .soft_ver = SOFT_VER_DEFAULT,
614
615 .partitions = {
616 {"fs-uboot", 0x00000, 0x20000},
617 {"partition-table", 0x20000, 0x02000},
618 {"default-mac", 0x30000, 0x00020},
619 {"product-info", 0x31100, 0x00100},
620 {"signature", 0x32000, 0x00400},
621 {"firmware", 0x40000, 0x770000},
622 {"soft-version", 0x7b0000, 0x00100},
623 {"support-list", 0x7b1000, 0x00400},
624 {"user-config", 0x7c0000, 0x10000},
625 {"default-config", 0x7d0000, 0x10000},
626 {"log", 0x7e0000, 0x10000},
627 {"radio", 0x7f0000, 0x10000},
628 {NULL, 0, 0}
629 },
630
631 .first_sysupgrade_partition = "os-image",
632 .last_sysupgrade_partition = "support-list",
633 },
634 /** Firmware layout for the CPE710 V1 */
635 {
636 .id = "CPE710V1",
637 .vendor = "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n",
638 .support_list =
639 "SupportList:\r\n"
640 "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n"
641 "CPE710(TP-LINK|EU|AC866-5|45550000):1.0\r\n"
642 "CPE710(TP-LINK|US|AC866-5|55530000):1.0\r\n"
643 "CPE710(TP-LINK|UN|AC866-5):1.0\r\n"
644 "CPE710(TP-LINK|EU|AC866-5):1.0\r\n"
645 "CPE710(TP-LINK|US|AC866-5):1.0\r\n",
646 .part_trail = 0xff,
647 .soft_ver = SOFT_VER_DEFAULT,
648
649 .partitions = {
650 {"fs-uboot", 0x00000, 0x50000},
651 {"partition-table", 0x50000, 0x02000},
652 {"default-mac", 0x60000, 0x00020},
653 {"serial-number", 0x60100, 0x00020},
654 {"product-info", 0x61100, 0x00100},
655 {"device-info", 0x61400, 0x00400},
656 {"signature", 0x62000, 0x00400},
657 {"device-id", 0x63000, 0x00100},
658 {"firmware", 0x70000, 0xf40000},
659 {"soft-version", 0xfb0000, 0x00100},
660 {"support-list", 0xfb1000, 0x01000},
661 {"user-config", 0xfc0000, 0x10000},
662 {"default-config", 0xfd0000, 0x10000},
663 {"log", 0xfe0000, 0x10000},
664 {"radio", 0xff0000, 0x10000},
665 {NULL, 0, 0}
666 },
667
668 .first_sysupgrade_partition = "os-image",
669 .last_sysupgrade_partition = "support-list",
670 },
671
672 {
673 .id = "WBS210",
674 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
675 .support_list =
676 "SupportList:\r\n"
677 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
678 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
679 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
680 .part_trail = 0xff,
681 .soft_ver = SOFT_VER_DEFAULT,
682
683 .partitions = {
684 {"fs-uboot", 0x00000, 0x20000},
685 {"partition-table", 0x20000, 0x02000},
686 {"default-mac", 0x30000, 0x00020},
687 {"product-info", 0x31100, 0x00100},
688 {"signature", 0x32000, 0x00400},
689 {"firmware", 0x40000, 0x770000},
690 {"soft-version", 0x7b0000, 0x00100},
691 {"support-list", 0x7b1000, 0x00400},
692 {"user-config", 0x7c0000, 0x10000},
693 {"default-config", 0x7d0000, 0x10000},
694 {"log", 0x7e0000, 0x10000},
695 {"radio", 0x7f0000, 0x10000},
696 {NULL, 0, 0}
697 },
698
699 .first_sysupgrade_partition = "os-image",
700 .last_sysupgrade_partition = "support-list",
701 },
702
703 {
704 .id = "WBS210V2",
705 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
706 .support_list =
707 "SupportList:\r\n"
708 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
709 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
710 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
711 .part_trail = 0xff,
712 .soft_ver = SOFT_VER_DEFAULT,
713
714 .partitions = {
715 {"fs-uboot", 0x00000, 0x20000},
716 {"partition-table", 0x20000, 0x02000},
717 {"default-mac", 0x30000, 0x00020},
718 {"product-info", 0x31100, 0x00100},
719 {"signature", 0x32000, 0x00400},
720 {"firmware", 0x40000, 0x770000},
721 {"soft-version", 0x7b0000, 0x00100},
722 {"support-list", 0x7b1000, 0x00400},
723 {"user-config", 0x7c0000, 0x10000},
724 {"default-config", 0x7d0000, 0x10000},
725 {"log", 0x7e0000, 0x10000},
726 {"radio", 0x7f0000, 0x10000},
727 {NULL, 0, 0}
728 },
729
730 .first_sysupgrade_partition = "os-image",
731 .last_sysupgrade_partition = "support-list",
732 },
733
734 {
735 .id = "WBS510",
736 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
737 .support_list =
738 "SupportList:\r\n"
739 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
740 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
741 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
742 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
743 .part_trail = 0xff,
744 .soft_ver = SOFT_VER_DEFAULT,
745
746 .partitions = {
747 {"fs-uboot", 0x00000, 0x20000},
748 {"partition-table", 0x20000, 0x02000},
749 {"default-mac", 0x30000, 0x00020},
750 {"product-info", 0x31100, 0x00100},
751 {"signature", 0x32000, 0x00400},
752 {"firmware", 0x40000, 0x770000},
753 {"soft-version", 0x7b0000, 0x00100},
754 {"support-list", 0x7b1000, 0x00400},
755 {"user-config", 0x7c0000, 0x10000},
756 {"default-config", 0x7d0000, 0x10000},
757 {"log", 0x7e0000, 0x10000},
758 {"radio", 0x7f0000, 0x10000},
759 {NULL, 0, 0}
760 },
761
762 .first_sysupgrade_partition = "os-image",
763 .last_sysupgrade_partition = "support-list",
764 },
765
766 {
767 .id = "WBS510V2",
768 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
769 .support_list =
770 "SupportList:\r\n"
771 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
772 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
773 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
774 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
775 .part_trail = 0xff,
776 .soft_ver = SOFT_VER_DEFAULT,
777
778 .partitions = {
779 {"fs-uboot", 0x00000, 0x20000},
780 {"partition-table", 0x20000, 0x02000},
781 {"default-mac", 0x30000, 0x00020},
782 {"product-info", 0x31100, 0x00100},
783 {"signature", 0x32000, 0x00400},
784 {"firmware", 0x40000, 0x770000},
785 {"soft-version", 0x7b0000, 0x00100},
786 {"support-list", 0x7b1000, 0x00400},
787 {"user-config", 0x7c0000, 0x10000},
788 {"default-config", 0x7d0000, 0x10000},
789 {"log", 0x7e0000, 0x10000},
790 {"radio", 0x7f0000, 0x10000},
791 {NULL, 0, 0}
792 },
793
794 .first_sysupgrade_partition = "os-image",
795 .last_sysupgrade_partition = "support-list",
796 },
797
798 /** Firmware layout for the AD7200 */
799 {
800 .id = "AD7200",
801 .vendor = "",
802 .support_list =
803 "SupportList:\r\n"
804 "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
805 .part_trail = 0x00,
806 .soft_ver = SOFT_VER_DEFAULT,
807
808 .partitions = {
809 {"SBL1", 0x00000, 0x20000},
810 {"MIBIB", 0x20000, 0x20000},
811 {"SBL2", 0x40000, 0x20000},
812 {"SBL3", 0x60000, 0x30000},
813 {"DDRCONFIG", 0x90000, 0x10000},
814 {"SSD", 0xa0000, 0x10000},
815 {"TZ", 0xb0000, 0x30000},
816 {"RPM", 0xe0000, 0x20000},
817 {"fs-uboot", 0x100000, 0x70000},
818 {"uboot-env", 0x170000, 0x40000},
819 {"radio", 0x1b0000, 0x40000},
820 {"os-image", 0x1f0000, 0x400000},
821 {"file-system", 0x5f0000, 0x1900000},
822 {"default-mac", 0x1ef0000, 0x00200},
823 {"pin", 0x1ef0200, 0x00200},
824 {"device-id", 0x1ef0400, 0x00200},
825 {"product-info", 0x1ef0600, 0x0fa00},
826 {"partition-table", 0x1f00000, 0x10000},
827 {"soft-version", 0x1f10000, 0x10000},
828 {"support-list", 0x1f20000, 0x10000},
829 {"profile", 0x1f30000, 0x10000},
830 {"default-config", 0x1f40000, 0x10000},
831 {"user-config", 0x1f50000, 0x40000},
832 {"qos-db", 0x1f90000, 0x40000},
833 {"usb-config", 0x1fd0000, 0x10000},
834 {"log", 0x1fe0000, 0x20000},
835 {NULL, 0, 0}
836 },
837
838 .first_sysupgrade_partition = "os-image",
839 .last_sysupgrade_partition = "file-system"
840 },
841
842 /** Firmware layout for the C2600 */
843 {
844 .id = "C2600",
845 .vendor = "",
846 .support_list =
847 "SupportList:\r\n"
848 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
849 .part_trail = 0x00,
850 .soft_ver = SOFT_VER_DEFAULT,
851
852 /**
853 We use a bigger os-image partition than the stock images (and thus
854 smaller file-system), as our kernel doesn't fit in the stock firmware's
855 2 MB os-image since kernel 4.14.
856 */
857 .partitions = {
858 {"SBL1", 0x00000, 0x20000},
859 {"MIBIB", 0x20000, 0x20000},
860 {"SBL2", 0x40000, 0x20000},
861 {"SBL3", 0x60000, 0x30000},
862 {"DDRCONFIG", 0x90000, 0x10000},
863 {"SSD", 0xa0000, 0x10000},
864 {"TZ", 0xb0000, 0x30000},
865 {"RPM", 0xe0000, 0x20000},
866 {"fs-uboot", 0x100000, 0x70000},
867 {"uboot-env", 0x170000, 0x40000},
868 {"radio", 0x1b0000, 0x40000},
869 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
870 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
871 {"default-mac", 0x1ef0000, 0x00200},
872 {"pin", 0x1ef0200, 0x00200},
873 {"product-info", 0x1ef0400, 0x0fc00},
874 {"partition-table", 0x1f00000, 0x10000},
875 {"soft-version", 0x1f10000, 0x10000},
876 {"support-list", 0x1f20000, 0x10000},
877 {"profile", 0x1f30000, 0x10000},
878 {"default-config", 0x1f40000, 0x10000},
879 {"user-config", 0x1f50000, 0x40000},
880 {"qos-db", 0x1f90000, 0x40000},
881 {"usb-config", 0x1fd0000, 0x10000},
882 {"log", 0x1fe0000, 0x20000},
883 {NULL, 0, 0}
884 },
885
886 .first_sysupgrade_partition = "os-image",
887 .last_sysupgrade_partition = "file-system"
888 },
889
890 /** Firmware layout for the A7-V5 */
891 {
892 .id = "ARCHER-A7-V5",
893 .support_list =
894 "SupportList:\n"
895 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
896 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
897 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
898 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
899 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
900 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
901 .part_trail = 0x00,
902 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
903
904 /* We're using a dynamic kernel/rootfs split here */
905 .partitions = {
906 {"factory-boot", 0x00000, 0x20000},
907 {"fs-uboot", 0x20000, 0x20000},
908 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
909 /* Stock: name file-system base 0x160000 size 0xda0000 */
910 {"default-mac", 0xf40000, 0x00200},
911 {"pin", 0xf40200, 0x00200},
912 {"device-id", 0xf40400, 0x00100},
913 {"product-info", 0xf40500, 0x0fb00},
914 {"soft-version", 0xf50000, 0x00100},
915 {"extra-para", 0xf51000, 0x01000},
916 {"support-list", 0xf52000, 0x0a000},
917 {"profile", 0xf5c000, 0x04000},
918 {"default-config", 0xf60000, 0x10000},
919 {"user-config", 0xf70000, 0x40000},
920 {"certificate", 0xfb0000, 0x10000},
921 {"partition-table", 0xfc0000, 0x10000},
922 {"log", 0xfd0000, 0x20000},
923 {"radio", 0xff0000, 0x10000},
924 {NULL, 0, 0}
925 },
926
927 .first_sysupgrade_partition = "os-image",
928 .last_sysupgrade_partition = "file-system",
929 },
930
931 /** Firmware layout for the Archer A9 v6 */
932 {
933 .id = "ARCHER-A9-V6",
934 .support_list =
935 "SupportList:\n"
936 "{product_name:Archer A9,product_ver:6.0,special_id:55530000}\n"
937 "{product_name:Archer A9,product_ver:6.0,special_id:45550000}\n"
938 "{product_name:Archer A9,product_ver:6.0,special_id:52550000}\n"
939 "{product_name:Archer A9,product_ver:6.0,special_id:4A500000}\n"
940 "{product_name:Archer C90,product_ver:6.0,special_id:55530000}\n",
941 .part_trail = 0x00,
942 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
943
944 /* We're using a dynamic kernel/rootfs split here */
945 .partitions = {
946 {"factory-boot", 0x00000, 0x20000},
947 {"fs-uboot", 0x20000, 0x20000},
948 {"partition-table", 0x40000, 0x10000},
949 {"radio", 0x50000, 0x10000},
950 {"default-mac", 0x60000, 0x00200},
951 {"pin", 0x60200, 0x00200},
952 {"device-id", 0x60400, 0x00100},
953 {"product-info", 0x60500, 0x0fb00},
954 {"soft-version", 0x70000, 0x01000},
955 {"extra-para", 0x71000, 0x01000},
956 {"support-list", 0x72000, 0x0a000},
957 {"profile", 0x7c000, 0x04000},
958 {"user-config", 0x80000, 0x10000},
959 {"ap-config", 0x90000, 0x10000},
960 {"apdef-config", 0xa0000, 0x10000},
961 {"router-config", 0xb0000, 0x10000},
962 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
963 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
964 {"log", 0xfc0000, 0x20000},
965 {"certificate", 0xfe0000, 0x10000},
966 {"default-config", 0xff0000, 0x10000},
967 {NULL, 0, 0}
968 },
969
970 .first_sysupgrade_partition = "os-image",
971 .last_sysupgrade_partition = "file-system",
972 },
973
974 /** Firmware layout for the Archer AX23 v1 */
975 {
976 .id = "ARCHER-AX23-V1",
977 .vendor = "",
978 .support_list =
979 "SupportList:\n"
980 "{product_name:Archer AX23,product_ver:1.0,special_id:45550000}\n"
981 "{product_name:Archer AX23,product_ver:1.0,special_id:4A500000}\n"
982 "{product_name:Archer AX23,product_ver:1.0,special_id:4B520000}\n"
983 "{product_name:Archer AX23,product_ver:1.0,special_id:52550000}\n"
984 "{product_name:Archer AX23,product_ver:1.0.0,special_id:43410000}\n"
985 "{product_name:Archer AX23,product_ver:1.0.0,special_id:54570000}\n"
986 "{product_name:Archer AX23,product_ver:1.0.0,special_id:55530000}\n"
987 "{product_name:Archer AX23,product_ver:1.20,special_id:45550000}\n"
988 "{product_name:Archer AX23,product_ver:1.20,special_id:4A500000}\n"
989 "{product_name:Archer AX23,product_ver:1.20,special_id:52550000}\n"
990 "{product_name:Archer AX23,product_ver:1.20,special_id:55530000}\n"
991 "{product_name:Archer AX1800,product_ver:1.20,special_id:45550000}\n"
992 "{product_name:Archer AX1800,product_ver:1.20,special_id:52550000}\n",
993 .part_trail = 0x00,
994 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.3\n"),
995
996 .partitions = {
997 {"fs-uboot", 0x00000, 0x40000},
998 {"firmware", 0x40000, 0xf60000},
999 {"default-mac", 0xfa0000, 0x00200},
1000 {"pin", 0xfa0200, 0x00100},
1001 {"device-id", 0xfa0300, 0x00100},
1002 {"product-info", 0xfa0400, 0x0fc00},
1003 {"default-config", 0xfb0000, 0x08000},
1004 {"ap-def-config", 0xfb8000, 0x08000},
1005 {"user-config", 0xfc0000, 0x0a000},
1006 {"ag-config", 0xfca000, 0x04000},
1007 {"certificate", 0xfce000, 0x02000},
1008 {"ap-config", 0xfd0000, 0x06000},
1009 {"router-config", 0xfd6000, 0x06000},
1010 {"favicon", 0xfdc000, 0x02000},
1011 {"logo", 0xfde000, 0x02000},
1012 {"partition-table", 0xfe0000, 0x00800},
1013 {"soft-version", 0xfe0800, 0x00100},
1014 {"support-list", 0xfe0900, 0x00400},
1015 {"profile", 0xfe0d00, 0x03000},
1016 {"extra-para", 0xfe3d00, 0x00100},
1017 {"radio", 0xff0000, 0x10000},
1018 {NULL, 0, 0}
1019 },
1020 .first_sysupgrade_partition = "os-image",
1021 .last_sysupgrade_partition = "file-system",
1022 },
1023 /** Firmware layout for the C2v3 */
1024 {
1025 .id = "ARCHER-C2-V3",
1026 .support_list =
1027 "SupportList:\n"
1028 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
1029 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
1030 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
1031 .part_trail = 0x00,
1032 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.1\n"),
1033
1034 /** We're using a dynamic kernel/rootfs split here */
1035
1036 .partitions = {
1037 {"factory-boot", 0x00000, 0x20000},
1038 {"fs-uboot", 0x20000, 0x10000},
1039 {"firmware", 0x30000, 0x7a0000},
1040 {"user-config", 0x7d0000, 0x04000},
1041 {"default-mac", 0x7e0000, 0x00100},
1042 {"device-id", 0x7e0100, 0x00100},
1043 {"extra-para", 0x7e0200, 0x00100},
1044 {"pin", 0x7e0300, 0x00100},
1045 {"support-list", 0x7e0400, 0x00400},
1046 {"soft-version", 0x7e0800, 0x00400},
1047 {"product-info", 0x7e0c00, 0x01400},
1048 {"partition-table", 0x7e2000, 0x01000},
1049 {"profile", 0x7e3000, 0x01000},
1050 {"default-config", 0x7e4000, 0x04000},
1051 {"merge-config", 0x7ec000, 0x02000},
1052 {"qos-db", 0x7ee000, 0x02000},
1053 {"radio", 0x7f0000, 0x10000},
1054 {NULL, 0, 0}
1055 },
1056
1057 .first_sysupgrade_partition = "os-image",
1058 .last_sysupgrade_partition = "file-system",
1059 },
1060
1061 /** Firmware layout for the C25v1 */
1062 {
1063 .id = "ARCHER-C25-V1",
1064 .support_list =
1065 "SupportList:\n"
1066 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
1067 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
1068 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
1069 .part_trail = 0x00,
1070 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1071
1072 /* We're using a dynamic kernel/rootfs split here */
1073 .partitions = {
1074 {"factory-boot", 0x00000, 0x20000},
1075 {"fs-uboot", 0x20000, 0x10000},
1076 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
1077 /* Stock: name file-system base 0x130000 size 0x6a0000 */
1078 {"user-config", 0x7d0000, 0x04000},
1079 {"default-mac", 0x7e0000, 0x00100},
1080 {"device-id", 0x7e0100, 0x00100},
1081 {"extra-para", 0x7e0200, 0x00100},
1082 {"pin", 0x7e0300, 0x00100},
1083 {"support-list", 0x7e0400, 0x00400},
1084 {"soft-version", 0x7e0800, 0x00400},
1085 {"product-info", 0x7e0c00, 0x01400},
1086 {"partition-table", 0x7e2000, 0x01000},
1087 {"profile", 0x7e3000, 0x01000},
1088 {"default-config", 0x7e4000, 0x04000},
1089 {"merge-config", 0x7ec000, 0x02000},
1090 {"qos-db", 0x7ee000, 0x02000},
1091 {"radio", 0x7f0000, 0x10000},
1092 {NULL, 0, 0}
1093 },
1094
1095 .first_sysupgrade_partition = "os-image",
1096 .last_sysupgrade_partition = "file-system",
1097 },
1098
1099 /** Firmware layout for the C58v1 */
1100 {
1101 .id = "ARCHER-C58-V1",
1102 .vendor = "",
1103 .support_list =
1104 "SupportList:\r\n"
1105 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
1106 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
1107 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
1108 .part_trail = 0x00,
1109 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1110
1111 .partitions = {
1112 {"fs-uboot", 0x00000, 0x10000},
1113 {"default-mac", 0x10000, 0x00200},
1114 {"pin", 0x10200, 0x00200},
1115 {"product-info", 0x10400, 0x00100},
1116 {"partition-table", 0x10500, 0x00800},
1117 {"soft-version", 0x11300, 0x00200},
1118 {"support-list", 0x11500, 0x00100},
1119 {"device-id", 0x11600, 0x00100},
1120 {"profile", 0x11700, 0x03900},
1121 {"default-config", 0x15000, 0x04000},
1122 {"user-config", 0x19000, 0x04000},
1123 {"firmware", 0x20000, 0x7c8000},
1124 {"certyficate", 0x7e8000, 0x08000},
1125 {"radio", 0x7f0000, 0x10000},
1126 {NULL, 0, 0}
1127 },
1128
1129 .first_sysupgrade_partition = "os-image",
1130 .last_sysupgrade_partition = "file-system",
1131 },
1132
1133 /** Firmware layout for the C59v1 */
1134 {
1135 .id = "ARCHER-C59-V1",
1136 .vendor = "",
1137 .support_list =
1138 "SupportList:\r\n"
1139 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
1140 "{product_name:Archer C59,product_ver:1.0.0,special_id:43410000}\r\n"
1141 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
1142 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
1143 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
1144 .part_trail = 0x00,
1145 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1146
1147 /* We're using a dynamic kernel/rootfs split here */
1148 .partitions = {
1149 {"fs-uboot", 0x00000, 0x10000},
1150 {"default-mac", 0x10000, 0x00200},
1151 {"pin", 0x10200, 0x00200},
1152 {"device-id", 0x10400, 0x00100},
1153 {"product-info", 0x10500, 0x0fb00},
1154 {"firmware", 0x20000, 0xe30000},
1155 {"partition-table", 0xe50000, 0x10000},
1156 {"soft-version", 0xe60000, 0x10000},
1157 {"support-list", 0xe70000, 0x10000},
1158 {"profile", 0xe80000, 0x10000},
1159 {"default-config", 0xe90000, 0x10000},
1160 {"user-config", 0xea0000, 0x40000},
1161 {"usb-config", 0xee0000, 0x10000},
1162 {"certificate", 0xef0000, 0x10000},
1163 {"qos-db", 0xf00000, 0x40000},
1164 {"log", 0xfe0000, 0x10000},
1165 {"radio", 0xff0000, 0x10000},
1166 {NULL, 0, 0}
1167 },
1168
1169 .first_sysupgrade_partition = "os-image",
1170 .last_sysupgrade_partition = "file-system",
1171 },
1172
1173 /** Firmware layout for the C59v2 */
1174 {
1175 .id = "ARCHER-C59-V2",
1176 .vendor = "",
1177 .support_list =
1178 "SupportList:\r\n"
1179 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
1180 "{product_name:Archer C59,product_ver:2.0.0,special_id:43410000}\r\n"
1181 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
1182 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
1183 .part_trail = 0x00,
1184 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0 Build 20161206 rel.7303\n"),
1185
1186 /** We're using a dynamic kernel/rootfs split here */
1187 .partitions = {
1188 {"factory-boot", 0x00000, 0x20000},
1189 {"fs-uboot", 0x20000, 0x10000},
1190 {"default-mac", 0x30000, 0x00200},
1191 {"pin", 0x30200, 0x00200},
1192 {"device-id", 0x30400, 0x00100},
1193 {"product-info", 0x30500, 0x0fb00},
1194 {"firmware", 0x40000, 0xe10000},
1195 {"partition-table", 0xe50000, 0x10000},
1196 {"soft-version", 0xe60000, 0x10000},
1197 {"support-list", 0xe70000, 0x10000},
1198 {"profile", 0xe80000, 0x10000},
1199 {"default-config", 0xe90000, 0x10000},
1200 {"user-config", 0xea0000, 0x40000},
1201 {"usb-config", 0xee0000, 0x10000},
1202 {"certificate", 0xef0000, 0x10000},
1203 {"extra-para", 0xf00000, 0x10000},
1204 {"qos-db", 0xf10000, 0x30000},
1205 {"log", 0xfe0000, 0x10000},
1206 {"radio", 0xff0000, 0x10000},
1207 {NULL, 0, 0}
1208 },
1209
1210 .first_sysupgrade_partition = "os-image",
1211 .last_sysupgrade_partition = "file-system",
1212 },
1213
1214 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
1215 {
1216 .id = "ARCHER-C6-V2",
1217 .vendor = "",
1218 .support_list =
1219 "SupportList:\r\n"
1220 "{product_name:Archer A6,product_ver:2.0.0,special_id:45550000}\r\n"
1221 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
1222 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
1223 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
1224 .part_trail = 0x00,
1225 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1226
1227 .partitions = {
1228 {"fs-uboot", 0x00000, 0x20000},
1229 {"default-mac", 0x20000, 0x00200},
1230 {"pin", 0x20200, 0x00100},
1231 {"product-info", 0x20300, 0x00200},
1232 {"device-id", 0x20500, 0x0fb00},
1233 {"firmware", 0x30000, 0x7a9400},
1234 {"soft-version", 0x7d9400, 0x00100},
1235 {"extra-para", 0x7d9500, 0x00100},
1236 {"support-list", 0x7d9600, 0x00200},
1237 {"profile", 0x7d9800, 0x03000},
1238 {"default-config", 0x7dc800, 0x03000},
1239 {"partition-table", 0x7df800, 0x00800},
1240 {"user-config", 0x7e0000, 0x0c000},
1241 {"certificate", 0x7ec000, 0x04000},
1242 {"radio", 0x7f0000, 0x10000},
1243 {NULL, 0, 0}
1244 },
1245
1246 .first_sysupgrade_partition = "os-image",
1247 .last_sysupgrade_partition = "file-system",
1248 },
1249
1250 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
1251 {
1252 .id = "ARCHER-C6-V2-US",
1253 .vendor = "",
1254 .support_list =
1255 "SupportList:\n"
1256 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
1257 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
1258 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
1259 .part_trail = 0x00,
1260 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1261
1262 .partitions = {
1263 {"factory-boot", 0x00000, 0x20000},
1264 {"default-mac", 0x20000, 0x00200},
1265 {"pin", 0x20200, 0x00100},
1266 {"product-info", 0x20300, 0x00200},
1267 {"device-id", 0x20500, 0x0fb00},
1268 {"fs-uboot", 0x30000, 0x20000},
1269 {"firmware", 0x50000, 0xf89400},
1270 {"soft-version", 0xfd9400, 0x00100},
1271 {"extra-para", 0xfd9500, 0x00100},
1272 {"support-list", 0xfd9600, 0x00200},
1273 {"profile", 0xfd9800, 0x03000},
1274 {"default-config", 0xfdc800, 0x03000},
1275 {"partition-table", 0xfdf800, 0x00800},
1276 {"user-config", 0xfe0000, 0x0c000},
1277 {"certificate", 0xfec000, 0x04000},
1278 {"radio", 0xff0000, 0x10000},
1279 {NULL, 0, 0}
1280 },
1281 .first_sysupgrade_partition = "os-image",
1282 .last_sysupgrade_partition = "file-system",
1283 },
1284 /** Firmware layout for the Archer C6 v3 */
1285 {
1286 .id = "ARCHER-C6-V3",
1287 .vendor = "",
1288 .support_list =
1289 "SupportList:\n"
1290 "{product_name:Archer C6,product_ver:3.20,special_id:55530000}"
1291 "{product_name:Archer C6,product_ver:3.20,special_id:45550000}"
1292 "{product_name:Archer C6,product_ver:3.20,special_id:52550000}"
1293 "{product_name:Archer C6,product_ver:3.20,special_id:4A500000}"
1294 "{product_name:Archer C6,product_ver:3.20,special_id:4B520000}"
1295 "{product_name:Archer C6,product_ver:3.0.0,special_id:42520000}",
1296 .part_trail = 0x00,
1297 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.9\n"),
1298
1299 .partitions = {
1300 {"fs-uboot", 0x00000, 0x40000},
1301 {"firmware", 0x40000, 0xf60000},
1302 {"default-mac", 0xfa0000, 0x00200},
1303 {"pin", 0xfa0200, 0x00100},
1304 {"device-id", 0xfa0300, 0x00100},
1305 {"product-info", 0xfa0400, 0x0fc00},
1306 {"default-config", 0xfb0000, 0x08000},
1307 {"ap-def-config", 0xfb8000, 0x08000},
1308 {"user-config", 0xfc0000, 0x0a000},
1309 {"ag-config", 0xfca000, 0x04000},
1310 {"certificate", 0xfce000, 0x02000},
1311 {"ap-config", 0xfd0000, 0x06000},
1312 {"router-config", 0xfd6000, 0x06000},
1313 {"favicon", 0xfdc000, 0x02000},
1314 {"logo", 0xfde000, 0x02000},
1315 {"partition-table", 0xfe0000, 0x00800},
1316 {"soft-version", 0xfe0800, 0x00100},
1317 {"support-list", 0xfe0900, 0x00200},
1318 {"profile", 0xfe0b00, 0x03000},
1319 {"extra-para", 0xfe3b00, 0x00100},
1320 {"radio", 0xff0000, 0x10000},
1321 {NULL, 0, 0}
1322 },
1323 .first_sysupgrade_partition = "os-image",
1324 .last_sysupgrade_partition = "file-system",
1325 },
1326 /** Firmware layout for the Archer A6 v3 */
1327 {
1328 .id = "ARCHER-A6-V3",
1329 .vendor = "",
1330 .support_list =
1331 "SupportList:\n"
1332 "{product_name:Archer A6,product_ver:3.0.0,special_id:43410000}\n"
1333 "{product_name:Archer A6,product_ver:3.0.0,special_id:55530000}\n"
1334 "{product_name:Archer A6,product_ver:3.0.0,special_id:54570000}\n"
1335 "{product_name:Archer A6,product_ver:3.0.0,special_id:4A500000}\n"
1336 "{product_name:Archer A6,product_ver:3.20,special_id:45550000}\n"
1337 "{product_name:Archer A6,product_ver:3.20,special_id:52550000}\n",
1338 .part_trail = 0x00,
1339 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.5\n"),
1340
1341 .partitions = {
1342 {"fs-uboot", 0x00000, 0x40000},
1343 {"firmware", 0x40000, 0xf60000},
1344 {"default-mac", 0xfa0000, 0x00200},
1345 {"pin", 0xfa0200, 0x00100},
1346 {"device-id", 0xfa0300, 0x00100},
1347 {"product-info", 0xfa0400, 0x0fc00},
1348 {"default-config", 0xfb0000, 0x08000},
1349 {"ap-def-config", 0xfb8000, 0x08000},
1350 {"user-config", 0xfc0000, 0x0a000},
1351 {"ag-config", 0xfca000, 0x04000},
1352 {"certificate", 0xfce000, 0x02000},
1353 {"ap-config", 0xfd0000, 0x06000},
1354 {"router-config", 0xfd6000, 0x06000},
1355 {"favicon", 0xfdc000, 0x02000},
1356 {"logo", 0xfde000, 0x02000},
1357 {"partition-table", 0xfe0000, 0x00800},
1358 {"soft-version", 0xfe0800, 0x00100},
1359 {"support-list", 0xfe0900, 0x00200},
1360 {"profile", 0xfe0b00, 0x03000},
1361 {"extra-para", 0xfe3b00, 0x00100},
1362 {"radio", 0xff0000, 0x10000},
1363 {NULL, 0, 0}
1364 },
1365 .first_sysupgrade_partition = "os-image",
1366 .last_sysupgrade_partition = "file-system",
1367 },
1368 /** Firmware layout for the Archer C6U v1 */
1369 {
1370 .id = "ARCHER-C6U-V1",
1371 .vendor = "",
1372 .support_list =
1373 "SupportList:\n"
1374 "{product_name:Archer C6U,product_ver:1.0.0,special_id:45550000}\n",
1375 .part_trail = 0x00,
1376 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.2\n"),
1377
1378 .partitions = {
1379 {"fs-uboot", 0x00000, 0x40000},
1380 {"firmware", 0x40000, 0xf60000},
1381 {"default-mac", 0xfa0000, 0x00200},
1382 {"pin", 0xfa0200, 0x00100},
1383 {"device-id", 0xfa0300, 0x00100},
1384 {"product-info", 0xfa0400, 0x0fc00},
1385 {"default-config", 0xfb0000, 0x08000},
1386 {"ap-def-config", 0xfb8000, 0x08000},
1387 {"user-config", 0xfc0000, 0x0c000},
1388 {"certificate", 0xfcc000, 0x04000},
1389 {"ap-config", 0xfd0000, 0x08000},
1390 {"router-config", 0xfd8000, 0x08000},
1391 {"partition-table", 0xfe0000, 0x00800},
1392 {"soft-version", 0xfe0800, 0x00100},
1393 {"support-list", 0xfe0900, 0x00200},
1394 {"profile", 0xfe0b00, 0x03000},
1395 {"extra-para", 0xfe3b00, 0x00100},
1396 {"radio", 0xff0000, 0x10000},
1397 {NULL, 0, 0}
1398 },
1399 .first_sysupgrade_partition = "os-image",
1400 .last_sysupgrade_partition = "file-system",
1401 },
1402 /** Firmware layout for the C60v1 */
1403 {
1404 .id = "ARCHER-C60-V1",
1405 .vendor = "",
1406 .support_list =
1407 "SupportList:\r\n"
1408 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1409 "{product_name:Archer C60,product_ver:1.0.0,special_id:43410000}\r\n"
1410 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1411 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1412 .part_trail = 0x00,
1413 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1414
1415 .partitions = {
1416 {"fs-uboot", 0x00000, 0x10000},
1417 {"default-mac", 0x10000, 0x00200},
1418 {"pin", 0x10200, 0x00200},
1419 {"product-info", 0x10400, 0x00100},
1420 {"partition-table", 0x10500, 0x00800},
1421 {"soft-version", 0x11300, 0x00200},
1422 {"support-list", 0x11500, 0x00100},
1423 {"device-id", 0x11600, 0x00100},
1424 {"profile", 0x11700, 0x03900},
1425 {"default-config", 0x15000, 0x04000},
1426 {"user-config", 0x19000, 0x04000},
1427 {"firmware", 0x20000, 0x7c8000},
1428 {"certyficate", 0x7e8000, 0x08000},
1429 {"radio", 0x7f0000, 0x10000},
1430 {NULL, 0, 0}
1431 },
1432
1433 .first_sysupgrade_partition = "os-image",
1434 .last_sysupgrade_partition = "file-system",
1435 },
1436
1437 /** Firmware layout for the C60v2 */
1438 {
1439 .id = "ARCHER-C60-V2",
1440 .vendor = "",
1441 .support_list =
1442 "SupportList:\r\n"
1443 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1444 "{product_name:Archer C60,product_ver:2.0.0,special_id:43410000}\r\n"
1445 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1446 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1447 .part_trail = 0x00,
1448 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
1449
1450 .partitions = {
1451 {"factory-boot", 0x00000, 0x1fb00},
1452 {"default-mac", 0x1fb00, 0x00200},
1453 {"pin", 0x1fd00, 0x00100},
1454 {"product-info", 0x1fe00, 0x00100},
1455 {"device-id", 0x1ff00, 0x00100},
1456 {"fs-uboot", 0x20000, 0x10000},
1457 {"firmware", 0x30000, 0x7a0000},
1458 {"soft-version", 0x7d9500, 0x00100},
1459 {"support-list", 0x7d9600, 0x00100},
1460 {"extra-para", 0x7d9700, 0x00100},
1461 {"profile", 0x7d9800, 0x03000},
1462 {"default-config", 0x7dc800, 0x03000},
1463 {"partition-table", 0x7df800, 0x00800},
1464 {"user-config", 0x7e0000, 0x0c000},
1465 {"certificate", 0x7ec000, 0x04000},
1466 {"radio", 0x7f0000, 0x10000},
1467 {NULL, 0, 0}
1468 },
1469
1470 .first_sysupgrade_partition = "os-image",
1471 .last_sysupgrade_partition = "file-system",
1472 },
1473
1474 /** Firmware layout for the C60v3 */
1475 {
1476 .id = "ARCHER-C60-V3",
1477 .vendor = "",
1478 .support_list =
1479 "SupportList:\r\n"
1480 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1481 "{product_name:Archer C60,product_ver:3.0.0,special_id:43410000}\r\n"
1482 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1483 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1484 .part_trail = 0x00,
1485 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.0\n"),
1486
1487 .partitions = {
1488 {"factory-boot", 0x00000, 0x1fb00},
1489 {"default-mac", 0x1fb00, 0x00200},
1490 {"pin", 0x1fd00, 0x00100},
1491 {"product-info", 0x1fe00, 0x00100},
1492 {"device-id", 0x1ff00, 0x00100},
1493 {"fs-uboot", 0x20000, 0x10000},
1494 {"firmware", 0x30000, 0x7a0000},
1495 {"soft-version", 0x7d9500, 0x00100},
1496 {"support-list", 0x7d9600, 0x00100},
1497 {"extra-para", 0x7d9700, 0x00100},
1498 {"profile", 0x7d9800, 0x03000},
1499 {"default-config", 0x7dc800, 0x03000},
1500 {"partition-table", 0x7df800, 0x00800},
1501 {"user-config", 0x7e0000, 0x0c000},
1502 {"certificate", 0x7ec000, 0x04000},
1503 {"radio", 0x7f0000, 0x10000},
1504 {NULL, 0, 0}
1505 },
1506
1507 .first_sysupgrade_partition = "os-image",
1508 .last_sysupgrade_partition = "file-system",
1509 },
1510
1511 /** Firmware layout for the C5 */
1512 {
1513 .id = "ARCHER-C5-V2",
1514 .vendor = "",
1515 .support_list =
1516 "SupportList:\r\n"
1517 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1518 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1519 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1520 .part_trail = 0x00,
1521 .soft_ver = SOFT_VER_DEFAULT,
1522
1523 .partitions = {
1524 {"fs-uboot", 0x00000, 0x40000},
1525 {"os-image", 0x40000, 0x200000},
1526 {"file-system", 0x240000, 0xc00000},
1527 {"default-mac", 0xe40000, 0x00200},
1528 {"pin", 0xe40200, 0x00200},
1529 {"product-info", 0xe40400, 0x00200},
1530 {"partition-table", 0xe50000, 0x10000},
1531 {"soft-version", 0xe60000, 0x00200},
1532 {"support-list", 0xe61000, 0x0f000},
1533 {"profile", 0xe70000, 0x10000},
1534 {"default-config", 0xe80000, 0x10000},
1535 {"user-config", 0xe90000, 0x50000},
1536 {"log", 0xee0000, 0x100000},
1537 {"radio_bk", 0xfe0000, 0x10000},
1538 {"radio", 0xff0000, 0x10000},
1539 {NULL, 0, 0}
1540 },
1541
1542 .first_sysupgrade_partition = "os-image",
1543 .last_sysupgrade_partition = "file-system"
1544 },
1545
1546 /** Firmware layout for the C7 */
1547 {
1548 .id = "ARCHER-C7-V4",
1549 .support_list =
1550 "SupportList:\n"
1551 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1552 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1553 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1554 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1555 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1556 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1557 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1558 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1559 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1560 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1561 .part_trail = 0x00,
1562 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1563
1564 /* We're using a dynamic kernel/rootfs split here */
1565 .partitions = {
1566 {"factory-boot", 0x00000, 0x20000},
1567 {"fs-uboot", 0x20000, 0x20000},
1568 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1569 /* Stock: name file-system base 0x160000 size 0xda0000 */
1570 {"default-mac", 0xf00000, 0x00200},
1571 {"pin", 0xf00200, 0x00200},
1572 {"device-id", 0xf00400, 0x00100},
1573 {"product-info", 0xf00500, 0x0fb00},
1574 {"soft-version", 0xf10000, 0x00100},
1575 {"extra-para", 0xf11000, 0x01000},
1576 {"support-list", 0xf12000, 0x0a000},
1577 {"profile", 0xf1c000, 0x04000},
1578 {"default-config", 0xf20000, 0x10000},
1579 {"user-config", 0xf30000, 0x40000},
1580 {"qos-db", 0xf70000, 0x40000},
1581 {"certificate", 0xfb0000, 0x10000},
1582 {"partition-table", 0xfc0000, 0x10000},
1583 {"log", 0xfd0000, 0x20000},
1584 {"radio", 0xff0000, 0x10000},
1585 {NULL, 0, 0}
1586 },
1587
1588 .first_sysupgrade_partition = "os-image",
1589 .last_sysupgrade_partition = "file-system",
1590 },
1591
1592 /** Firmware layout for the C7 v5*/
1593 {
1594 .id = "ARCHER-C7-V5",
1595 .support_list =
1596 "SupportList:\n"
1597 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1598 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1599 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1600 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1601 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1602 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1603 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1604 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1605
1606 .part_trail = 0x00,
1607 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
1608
1609 /* We're using a dynamic kernel/rootfs split here */
1610 .partitions = {
1611 {"factory-boot", 0x00000, 0x20000},
1612 {"fs-uboot", 0x20000, 0x20000},
1613 {"partition-table", 0x40000, 0x10000},
1614 {"radio", 0x50000, 0x10000},
1615 {"default-mac", 0x60000, 0x00200},
1616 {"pin", 0x60200, 0x00200},
1617 {"device-id", 0x60400, 0x00100},
1618 {"product-info", 0x60500, 0x0fb00},
1619 {"soft-version", 0x70000, 0x01000},
1620 {"extra-para", 0x71000, 0x01000},
1621 {"support-list", 0x72000, 0x0a000},
1622 {"profile", 0x7c000, 0x04000},
1623 {"user-config", 0x80000, 0x40000},
1624
1625
1626 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1627 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1628
1629 {"log", 0xfc0000, 0x20000},
1630 {"certificate", 0xfe0000, 0x10000},
1631 {"default-config", 0xff0000, 0x10000},
1632 {NULL, 0, 0}
1633
1634 },
1635
1636 .first_sysupgrade_partition = "os-image",
1637 .last_sysupgrade_partition = "file-system",
1638 },
1639
1640 /** Firmware layout for the C9 */
1641 {
1642 .id = "ARCHERC9",
1643 .vendor = "",
1644 .support_list =
1645 "SupportList:\n"
1646 "{product_name:ArcherC9,"
1647 "product_ver:1.0.0,"
1648 "special_id:00000000}\n",
1649 .part_trail = 0x00,
1650 .soft_ver = SOFT_VER_DEFAULT,
1651
1652 .partitions = {
1653 {"fs-uboot", 0x00000, 0x40000},
1654 {"os-image", 0x40000, 0x200000},
1655 {"file-system", 0x240000, 0xc00000},
1656 {"default-mac", 0xe40000, 0x00200},
1657 {"pin", 0xe40200, 0x00200},
1658 {"product-info", 0xe40400, 0x00200},
1659 {"partition-table", 0xe50000, 0x10000},
1660 {"soft-version", 0xe60000, 0x00200},
1661 {"support-list", 0xe61000, 0x0f000},
1662 {"profile", 0xe70000, 0x10000},
1663 {"default-config", 0xe80000, 0x10000},
1664 {"user-config", 0xe90000, 0x50000},
1665 {"log", 0xee0000, 0x100000},
1666 {"radio_bk", 0xfe0000, 0x10000},
1667 {"radio", 0xff0000, 0x10000},
1668 {NULL, 0, 0}
1669 },
1670
1671 .first_sysupgrade_partition = "os-image",
1672 .last_sysupgrade_partition = "file-system"
1673 },
1674
1675 /** Firmware layout for the Deco M4R v1 and v2 */
1676 {
1677 .id = "DECO-M4R-V1",
1678 .vendor = "",
1679 .support_list =
1680 "SupportList:\n"
1681 "{product_name:M4R,product_ver:1.0.0,special_id:55530000}\n"
1682 "{product_name:M4R,product_ver:1.0.0,special_id:45550000}\n"
1683 "{product_name:M4R,product_ver:1.0.0,special_id:43410000}\n"
1684 "{product_name:M4R,product_ver:1.0.0,special_id:4A500000}\n"
1685 "{product_name:M4R,product_ver:1.0.0,special_id:41550000}\n"
1686 "{product_name:M4R,product_ver:1.0.0,special_id:4B520000}\n"
1687 "{product_name:M4R,product_ver:1.0.0,special_id:49440000}\n"
1688 "{product_name:M4R,product_ver:2.0.0,special_id:55530000}\n"
1689 "{product_name:M4R,product_ver:2.0.0,special_id:45550000}\n"
1690 "{product_name:M4R,product_ver:2.0.0,special_id:43410000}\n"
1691 "{product_name:M4R,product_ver:2.0.0,special_id:4A500000}\n"
1692 "{product_name:M4R,product_ver:2.0.0,special_id:41550000}\n"
1693 "{product_name:M4R,product_ver:2.0.0,special_id:4B520000}\n"
1694 "{product_name:M4R,product_ver:2.0.0,special_id:54570000}\n"
1695 "{product_name:M4R,product_ver:2.0.0,special_id:42340000}\n"
1696 "{product_name:M4R,product_ver:2.0.0,special_id:49440000}\n",
1697 .part_trail = 0x00,
1698 .soft_ver = SOFT_VER_DEFAULT,
1699
1700 .partitions = {
1701 {"fs-uboot", 0x00000, 0x80000},
1702 {"firmware", 0x80000, 0xe00000},
1703 {"product-info", 0xe80000, 0x05000},
1704 {"default-mac", 0xe85000, 0x01000},
1705 {"device-id", 0xe86000, 0x01000},
1706 {"support-list", 0xe87000, 0x10000},
1707 {"user-config", 0xea7000, 0x10000},
1708 {"device-config", 0xeb7000, 0x10000},
1709 {"group-info", 0xec7000, 0x10000},
1710 {"partition-table", 0xed7000, 0x02000},
1711 {"soft-version", 0xed9000, 0x10000},
1712 {"profile", 0xee9000, 0x10000},
1713 {"default-config", 0xef9000, 0x10000},
1714 {"url-sig", 0xfe0000, 0x10000},
1715 {"radio", 0xff0000, 0x10000},
1716 {NULL, 0, 0}
1717 },
1718 .first_sysupgrade_partition = "os-image",
1719 .last_sysupgrade_partition = "file-system",
1720 },
1721
1722 /** Firmware layout for the Deco M4R v4 */
1723 {
1724 .id = "DECO-M4R-V4",
1725 .vendor = "",
1726 .support_list =
1727 "SupportList:\n"
1728 "{product_name:M4R,product_ver:4.0.0,special_id:55530000}\n"
1729 "{product_name:M4R,product_ver:4.0.0,special_id:45550000}\n"
1730 "{product_name:M4R,product_ver:4.0.0,special_id:4A500000}\n"
1731 "{product_name:M4R,product_ver:4.0.0,special_id:42340000}\n"
1732 "{product_name:M4R,product_ver:4.0.0,special_id:5A470000}\n",
1733 .part_trail = 0x00,
1734 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1735
1736 .partitions = {
1737 {"fs-uboot", 0x00000, 0x40000},
1738 {"firmware", 0x40000, 0xf60000},
1739 {"default-mac", 0xfa0000, 0x00300},
1740 {"device-id", 0xfa0300, 0x00100},
1741 {"product-info", 0xfa0400, 0x0fc00},
1742 {"group-info", 0xfb0000, 0x04000},
1743 {"user-config", 0xfb4000, 0x0c000},
1744 {"device-config", 0xfc0000, 0x10000},
1745 {"default-config", 0xfd0000, 0x10000},
1746 {"partition-table", 0xfe0000, 0x00800},
1747 {"soft-version", 0xfe0800, 0x00100},
1748 {"support-list", 0xfe0900, 0x00200},
1749 {"profile", 0xfe0b00, 0x03000},
1750 {"extra-para", 0xfe3b00, 0x00100},
1751 {"radio", 0xff0000, 0x10000},
1752 {NULL, 0, 0}
1753 },
1754 .first_sysupgrade_partition = "os-image",
1755 .last_sysupgrade_partition = "file-system",
1756 },
1757
1758 /** Firmware layout for the Deco S4 v2 */
1759 {
1760 .id = "DECO-S4-V2",
1761 .vendor = "",
1762 .support_list =
1763 "SupportList:\n"
1764 "{product_name:S4,product_ver:1.0.0,special_id:55530000}\n"
1765 "{product_name:S4,product_ver:1.0.0,special_id:45550000}\n"
1766 "{product_name:S4,product_ver:1.0.0,special_id:43410000}\n"
1767 "{product_name:S4,product_ver:1.0.0,special_id:4A500000}\n"
1768 "{product_name:S4,product_ver:1.0.0,special_id:41550000}\n"
1769 "{product_name:S4,product_ver:1.0.0,special_id:4B520000}\n"
1770 "{product_name:S4,product_ver:2.0.0,special_id:55530000}\n"
1771 "{product_name:S4,product_ver:2.0.0,special_id:45550000}\n"
1772 "{product_name:S4,product_ver:2.0.0,special_id:43410000}\n"
1773 "{product_name:S4,product_ver:2.0.0,special_id:4A500000}\n"
1774 "{product_name:S4,product_ver:2.0.0,special_id:41550000}\n"
1775 "{product_name:S4,product_ver:2.0.0,special_id:4B520000}\n",
1776 .part_trail = 0x00,
1777 .soft_ver = SOFT_VER_DEFAULT,
1778
1779 .partitions = {
1780 {"fs-uboot", 0x00000, 0x80000},
1781 {"product-info", 0x80000, 0x05000},
1782 {"default-mac", 0x85000, 0x01000},
1783 {"device-id", 0x86000, 0x01000},
1784 {"support-list", 0x87000, 0x10000},
1785 {"user-config", 0xa7000, 0x10000},
1786 {"device-config", 0xb7000, 0x10000},
1787 {"group-info", 0xc7000, 0x10000},
1788 {"partition-table", 0xd7000, 0x02000},
1789 {"soft-version", 0xd9000, 0x10000},
1790 {"profile", 0xe9000, 0x10000},
1791 {"default-config", 0xf9000, 0x10000},
1792 {"url-sig", 0x1e0000, 0x10000},
1793 {"radio", 0x1f0000, 0x10000},
1794 {"firmware", 0x200000, 0xe00000},
1795 {NULL, 0, 0}
1796 },
1797 .first_sysupgrade_partition = "os-image",
1798 .last_sysupgrade_partition = "file-system",
1799 },
1800
1801 /** Firmware layout for the EAP120 */
1802 {
1803 .id = "EAP120",
1804 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1805 .support_list =
1806 "SupportList:\r\n"
1807 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1808 .part_trail = 0xff,
1809 .soft_ver = SOFT_VER_DEFAULT,
1810
1811 .partitions = {
1812 {"fs-uboot", 0x00000, 0x20000},
1813 {"partition-table", 0x20000, 0x02000},
1814 {"default-mac", 0x30000, 0x00020},
1815 {"support-list", 0x31000, 0x00100},
1816 {"product-info", 0x31100, 0x00100},
1817 {"soft-version", 0x32000, 0x00100},
1818 {"os-image", 0x40000, 0x180000},
1819 {"file-system", 0x1c0000, 0x600000},
1820 {"user-config", 0x7c0000, 0x10000},
1821 {"backup-config", 0x7d0000, 0x10000},
1822 {"log", 0x7e0000, 0x10000},
1823 {"radio", 0x7f0000, 0x10000},
1824 {NULL, 0, 0}
1825 },
1826
1827 .first_sysupgrade_partition = "os-image",
1828 .last_sysupgrade_partition = "file-system"
1829 },
1830
1831 /** Firmware layout for the EAP225-Outdoor v1 */
1832 {
1833 .id = "EAP225-OUTDOOR-V1",
1834 .support_list =
1835 "SupportList:\r\n"
1836 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1837 .part_trail = PART_TRAIL_NONE,
1838 .soft_ver = SOFT_VER_DEFAULT,
1839 .soft_ver_compat_level = 1,
1840
1841 .partitions = {
1842 {"fs-uboot", 0x00000, 0x20000},
1843 {"partition-table", 0x20000, 0x02000},
1844 {"default-mac", 0x30000, 0x01000},
1845 {"support-list", 0x31000, 0x00100},
1846 {"product-info", 0x31100, 0x00400},
1847 {"soft-version", 0x32000, 0x00100},
1848 {"firmware", 0x40000, 0xd80000},
1849 {"user-config", 0xdc0000, 0x30000},
1850 {"mutil-log", 0xf30000, 0x80000},
1851 {"oops", 0xfb0000, 0x40000},
1852 {"radio", 0xff0000, 0x10000},
1853 {NULL, 0, 0}
1854 },
1855
1856 .first_sysupgrade_partition = "os-image",
1857 .last_sysupgrade_partition = "file-system"
1858 },
1859
1860 /** Firmware layout for the EAP225 v1 */
1861 {
1862 .id = "EAP225-V1",
1863 .support_list =
1864 "SupportList:\r\n"
1865 "EAP225(TP-LINK|UN|AC1200-D):1.0\r\n",
1866 .part_trail = PART_TRAIL_NONE,
1867 .soft_ver = SOFT_VER_DEFAULT,
1868
1869 .partitions = {
1870 {"fs-uboot", 0x00000, 0x20000},
1871 {"partition-table", 0x20000, 0x02000},
1872 {"default-mac", 0x30000, 0x01000},
1873 {"support-list", 0x31000, 0x00100},
1874 {"product-info", 0x31100, 0x00400},
1875 {"soft-version", 0x32000, 0x00100},
1876 {"firmware", 0x40000, 0xd80000},
1877 {"user-config", 0xdc0000, 0x30000},
1878 {"radio", 0xff0000, 0x10000},
1879 {NULL, 0, 0}
1880 },
1881
1882 .first_sysupgrade_partition = "os-image",
1883 .last_sysupgrade_partition = "file-system"
1884 },
1885
1886 /** Firmware layout for the EAP225 v3
1887 * Also compatible with:
1888 * - EAP225 v3.20
1889 * - EAP225 v4
1890 * - EAP225-Outdoor v1
1891 * - EAP225-Outdoor v3
1892 * */
1893 {
1894 .id = "EAP225-V3",
1895 .support_list =
1896 "SupportList:\r\n"
1897 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n"
1898 "EAP225(TP-Link|UN|AC1350-D):3.20\r\n"
1899 "EAP225(TP-Link|UN|AC1350-D):4.0 CA\r\n"
1900 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n"
1901 "EAP225-Outdoor(TP-Link|UN|AC1200-D):3.0 CA,JP\r\n",
1902 .part_trail = PART_TRAIL_NONE,
1903 .soft_ver = SOFT_VER_DEFAULT,
1904 .soft_ver_compat_level = 1,
1905
1906 .partitions = {
1907 {"fs-uboot", 0x00000, 0x20000},
1908 {"partition-table", 0x20000, 0x02000},
1909 {"default-mac", 0x30000, 0x01000},
1910 {"support-list", 0x31000, 0x00100},
1911 {"product-info", 0x31100, 0x00400},
1912 {"soft-version", 0x32000, 0x00100},
1913 {"firmware", 0x40000, 0xd80000},
1914 {"user-config", 0xdc0000, 0x30000},
1915 {"mutil-log", 0xf30000, 0x80000},
1916 {"oops", 0xfb0000, 0x40000},
1917 {"radio", 0xff0000, 0x10000},
1918 {NULL, 0, 0}
1919 },
1920
1921 .first_sysupgrade_partition = "os-image",
1922 .last_sysupgrade_partition = "file-system"
1923 },
1924
1925 /** Firmware layout for the EAP225-Wall v2 */
1926 {
1927 .id = "EAP225-WALL-V2",
1928 .support_list =
1929 "SupportList:\r\n"
1930 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1931 .part_trail = PART_TRAIL_NONE,
1932 .soft_ver = SOFT_VER_DEFAULT,
1933 .soft_ver_compat_level = 1,
1934
1935 .partitions = {
1936 {"fs-uboot", 0x00000, 0x20000},
1937 {"partition-table", 0x20000, 0x02000},
1938 {"default-mac", 0x30000, 0x01000},
1939 {"support-list", 0x31000, 0x00100},
1940 {"product-info", 0x31100, 0x00400},
1941 {"soft-version", 0x32000, 0x00100},
1942 {"firmware", 0x40000, 0xd80000},
1943 {"user-config", 0xdc0000, 0x30000},
1944 {"mutil-log", 0xf30000, 0x80000},
1945 {"oops", 0xfb0000, 0x40000},
1946 {"radio", 0xff0000, 0x10000},
1947 {NULL, 0, 0}
1948 },
1949
1950 .first_sysupgrade_partition = "os-image",
1951 .last_sysupgrade_partition = "file-system"
1952 },
1953
1954 /** Firmware layout for the EAP235-Wall v1 */
1955 {
1956 .id = "EAP235-WALL-V1",
1957 .support_list =
1958 "SupportList:\r\n"
1959 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
1960 .part_trail = PART_TRAIL_NONE,
1961 .soft_ver = SOFT_VER_NUMERIC(3, 0, 0),
1962 .soft_ver_compat_level = 1,
1963
1964 .partitions = {
1965 {"fs-uboot", 0x00000, 0x80000},
1966 {"partition-table", 0x80000, 0x02000},
1967 {"default-mac", 0x90000, 0x01000},
1968 {"support-list", 0x91000, 0x00100},
1969 {"product-info", 0x91100, 0x00400},
1970 {"soft-version", 0x92000, 0x00100},
1971 {"firmware", 0xa0000, 0xd20000},
1972 {"user-config", 0xdc0000, 0x30000},
1973 {"mutil-log", 0xf30000, 0x80000},
1974 {"oops", 0xfb0000, 0x40000},
1975 {"radio", 0xff0000, 0x10000},
1976 {NULL, 0, 0}
1977 },
1978
1979 .first_sysupgrade_partition = "os-image",
1980 .last_sysupgrade_partition = "file-system"
1981 },
1982
1983 /** Firmware layout for the EAP245 v1 */
1984 {
1985 .id = "EAP245-V1",
1986 .support_list =
1987 "SupportList:\r\n"
1988 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1989 .part_trail = PART_TRAIL_NONE,
1990 .soft_ver = SOFT_VER_DEFAULT,
1991
1992 .partitions = {
1993 {"fs-uboot", 0x00000, 0x20000},
1994 {"partition-table", 0x20000, 0x02000},
1995 {"default-mac", 0x30000, 0x01000},
1996 {"support-list", 0x31000, 0x00100},
1997 {"product-info", 0x31100, 0x00400},
1998 {"soft-version", 0x32000, 0x00100},
1999 {"firmware", 0x40000, 0xd80000},
2000 {"user-config", 0xdc0000, 0x30000},
2001 {"radio", 0xff0000, 0x10000},
2002 {NULL, 0, 0}
2003 },
2004
2005 .first_sysupgrade_partition = "os-image",
2006 .last_sysupgrade_partition = "file-system"
2007 },
2008
2009 /** Firmware layout for the EAP245 v3 */
2010 {
2011 .id = "EAP245-V3",
2012 .support_list =
2013 "SupportList:\r\n"
2014 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n"
2015 "EAP265 HD(TP-Link|UN|AC1750-D):1.0",
2016 .part_trail = PART_TRAIL_NONE,
2017 .soft_ver = SOFT_VER_DEFAULT,
2018 .soft_ver_compat_level = 1,
2019
2020 /** Firmware partition with dynamic kernel/rootfs split */
2021 .partitions = {
2022 {"factroy-boot", 0x00000, 0x40000},
2023 {"fs-uboot", 0x40000, 0x40000},
2024 {"partition-table", 0x80000, 0x10000},
2025 {"default-mac", 0x90000, 0x01000},
2026 {"support-list", 0x91000, 0x00100},
2027 {"product-info", 0x91100, 0x00400},
2028 {"soft-version", 0x92000, 0x00100},
2029 {"radio", 0xa0000, 0x10000},
2030 {"extra-para", 0xb0000, 0x10000},
2031 {"firmware", 0xc0000, 0xe40000},
2032 {"config", 0xf00000, 0x30000},
2033 {"mutil-log", 0xf30000, 0x80000},
2034 {"oops", 0xfb0000, 0x40000},
2035 {NULL, 0, 0}
2036 },
2037
2038 .first_sysupgrade_partition = "os-image",
2039 .last_sysupgrade_partition = "file-system"
2040 },
2041
2042 /** Firmware layout for the EAP615-Wall v1 */
2043 {
2044 .id = "EAP615-WALL-V1",
2045 .soft_ver = SOFT_VER_DEFAULT,
2046 .soft_ver_compat_level = 1,
2047 .support_list =
2048 "SupportList:\r\n"
2049 "EAP615-Wall(TP-Link|UN|AX1800-D):1.0\r\n"
2050 "EAP615-Wall(TP-Link|CA|AX1800-D):1.0\r\n"
2051 "EAP615-Wall(TP-Link|JP|AX1800-D):1.0\r\n",
2052 .part_trail = PART_TRAIL_NONE,
2053
2054 .partitions = {
2055 {"fs-uboot", 0x00000, 0x80000},
2056 {"partition-table", 0x80000, 0x02000},
2057 {"default-mac", 0x90000, 0x01000},
2058 {"support-list", 0x91000, 0x00100},
2059 {"product-info", 0x91100, 0x00400},
2060 {"soft-version", 0x92000, 0x00100},
2061 {"firmware", 0xa0000, 0xcf0000},
2062 {"user-config", 0xd90000, 0x60000},
2063 {"mutil-log", 0xf30000, 0x80000},
2064 {"oops", 0xfb0000, 0x40000},
2065 {"radio", 0xff0000, 0x10000},
2066 {NULL, 0, 0}
2067 },
2068
2069 .first_sysupgrade_partition = "os-image",
2070 .last_sysupgrade_partition = "file-system"
2071 },
2072
2073 /** Firmware layout for the TL-WA1201 v2 */
2074 {
2075 .id = "TL-WA1201-V2",
2076 .vendor = "",
2077 .support_list =
2078 "SupportList:\n"
2079 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:45550000}\n"
2080 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:55530000}\n",
2081 .part_trail = 0x00,
2082 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.1 Build 20200709 rel.66244\n"),
2083
2084 .partitions = {
2085 {"fs-uboot", 0x00000, 0x20000},
2086 {"default-mac", 0x20000, 0x00200},
2087 {"pin", 0x20200, 0x00100},
2088 {"product-info", 0x20300, 0x00200},
2089 {"device-id", 0x20500, 0x0fb00},
2090 {"firmware", 0x30000, 0xce0000},
2091 {"portal-logo", 0xd10000, 0x20000},
2092 {"portal-back", 0xd30000, 0x200000},
2093 {"soft-version", 0xf30000, 0x00200},
2094 {"extra-para", 0xf30200, 0x00200},
2095 {"support-list", 0xf30400, 0x00200},
2096 {"profile", 0xf30600, 0x0fa00},
2097 {"apdef-config", 0xf40000, 0x10000},
2098 {"ap-config", 0xf50000, 0x10000},
2099 {"redef-config", 0xf60000, 0x10000},
2100 {"re-config", 0xf70000, 0x10000},
2101 {"multidef-config", 0xf80000, 0x10000},
2102 {"multi-config", 0xf90000, 0x10000},
2103 {"clientdef-config", 0xfa0000, 0x10000},
2104 {"client-config", 0xfb0000, 0x10000},
2105 {"partition-table", 0xfc0000, 0x10000},
2106 {"user-config", 0xfd0000, 0x10000},
2107 {"certificate", 0xfe0000, 0x10000},
2108 {"radio", 0xff0000, 0x10000},
2109 {NULL, 0, 0}
2110 },
2111 .first_sysupgrade_partition = "os-image",
2112 .last_sysupgrade_partition = "file-system",
2113 },
2114
2115 /** Firmware layout for the TL-WA850RE v2 */
2116 {
2117 .id = "TLWA850REV2",
2118 .vendor = "",
2119 .support_list =
2120 "SupportList:\n"
2121 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
2122 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
2123 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
2124 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
2125 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
2126 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
2127 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
2128 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
2129 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
2130 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
2131 .part_trail = 0x00,
2132 .soft_ver = SOFT_VER_DEFAULT,
2133
2134 /**
2135 576KB were moved from file-system to os-image
2136 in comparison to the stock image
2137 */
2138 .partitions = {
2139 {"fs-uboot", 0x00000, 0x20000},
2140 {"firmware", 0x20000, 0x390000},
2141 {"partition-table", 0x3b0000, 0x02000},
2142 {"default-mac", 0x3c0000, 0x00020},
2143 {"pin", 0x3c0100, 0x00020},
2144 {"product-info", 0x3c1000, 0x01000},
2145 {"soft-version", 0x3c2000, 0x00100},
2146 {"support-list", 0x3c3000, 0x01000},
2147 {"profile", 0x3c4000, 0x08000},
2148 {"user-config", 0x3d0000, 0x10000},
2149 {"default-config", 0x3e0000, 0x10000},
2150 {"radio", 0x3f0000, 0x10000},
2151 {NULL, 0, 0}
2152 },
2153
2154 .first_sysupgrade_partition = "os-image",
2155 .last_sysupgrade_partition = "file-system"
2156 },
2157
2158 /** Firmware layout for the TL-WA855RE v1 */
2159 {
2160 .id = "TLWA855REV1",
2161 .vendor = "",
2162 .support_list =
2163 "SupportList:\n"
2164 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
2165 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
2166 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
2167 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
2168 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
2169 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
2170 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
2171 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
2172 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
2173 .part_trail = 0x00,
2174 .soft_ver = SOFT_VER_DEFAULT,
2175
2176 .partitions = {
2177 {"fs-uboot", 0x00000, 0x20000},
2178 {"os-image", 0x20000, 0x150000},
2179 {"file-system", 0x170000, 0x240000},
2180 {"partition-table", 0x3b0000, 0x02000},
2181 {"default-mac", 0x3c0000, 0x00020},
2182 {"pin", 0x3c0100, 0x00020},
2183 {"product-info", 0x3c1000, 0x01000},
2184 {"soft-version", 0x3c2000, 0x00100},
2185 {"support-list", 0x3c3000, 0x01000},
2186 {"profile", 0x3c4000, 0x08000},
2187 {"user-config", 0x3d0000, 0x10000},
2188 {"default-config", 0x3e0000, 0x10000},
2189 {"radio", 0x3f0000, 0x10000},
2190 {NULL, 0, 0}
2191 },
2192
2193 .first_sysupgrade_partition = "os-image",
2194 .last_sysupgrade_partition = "file-system"
2195 },
2196
2197 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
2198 {
2199 .id = "TL-WPA8630P-V2.0-EU",
2200 .vendor = "",
2201 .support_list =
2202 "SupportList:\n"
2203 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
2204 .part_trail = 0x00,
2205 .soft_ver = SOFT_VER_DEFAULT,
2206
2207 .partitions = {
2208 {"factory-uboot", 0x00000, 0x20000},
2209 {"fs-uboot", 0x20000, 0x20000},
2210 {"firmware", 0x40000, 0x5e0000},
2211 {"partition-table", 0x620000, 0x02000},
2212 {"default-mac", 0x630000, 0x00020},
2213 {"pin", 0x630100, 0x00020},
2214 {"device-id", 0x630200, 0x00030},
2215 {"product-info", 0x631100, 0x01000},
2216 {"extra-para", 0x632100, 0x01000},
2217 {"soft-version", 0x640000, 0x01000},
2218 {"support-list", 0x641000, 0x01000},
2219 {"profile", 0x642000, 0x08000},
2220 {"user-config", 0x650000, 0x10000},
2221 {"default-config", 0x660000, 0x10000},
2222 {"default-nvm", 0x670000, 0xc0000},
2223 {"default-pib", 0x730000, 0x40000},
2224 {"radio", 0x7f0000, 0x10000},
2225 {NULL, 0, 0}
2226 },
2227
2228 .first_sysupgrade_partition = "os-image",
2229 .last_sysupgrade_partition = "file-system"
2230 },
2231
2232 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
2233 {
2234 .id = "TL-WPA8630P-V2-INT",
2235 .vendor = "",
2236 .support_list =
2237 "SupportList:\n"
2238 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
2239 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
2240 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
2241 .part_trail = 0x00,
2242 .soft_ver = SOFT_VER_DEFAULT,
2243
2244 .partitions = {
2245 {"factory-uboot", 0x00000, 0x20000},
2246 {"fs-uboot", 0x20000, 0x20000},
2247 {"firmware", 0x40000, 0x5e0000},
2248 {"partition-table", 0x620000, 0x02000},
2249 {"extra-para", 0x632100, 0x01000},
2250 {"soft-version", 0x640000, 0x01000},
2251 {"support-list", 0x641000, 0x01000},
2252 {"profile", 0x642000, 0x08000},
2253 {"user-config", 0x650000, 0x10000},
2254 {"default-config", 0x660000, 0x10000},
2255 {"default-nvm", 0x670000, 0xc0000},
2256 {"default-pib", 0x730000, 0x40000},
2257 {"default-mac", 0x7e0000, 0x00020},
2258 {"pin", 0x7e0100, 0x00020},
2259 {"device-id", 0x7e0200, 0x00030},
2260 {"product-info", 0x7e1100, 0x01000},
2261 {"radio", 0x7f0000, 0x10000},
2262 {NULL, 0, 0}
2263 },
2264
2265 .first_sysupgrade_partition = "os-image",
2266 .last_sysupgrade_partition = "file-system"
2267 },
2268
2269 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
2270 {
2271 .id = "TL-WPA8630P-V2.1-EU",
2272 .vendor = "",
2273 .support_list =
2274 "SupportList:\n"
2275 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
2276 .part_trail = 0x00,
2277 .soft_ver = SOFT_VER_DEFAULT,
2278
2279 .partitions = {
2280 {"factory-uboot", 0x00000, 0x20000},
2281 {"fs-uboot", 0x20000, 0x20000},
2282 {"firmware", 0x40000, 0x5e0000},
2283 {"extra-para", 0x680000, 0x01000},
2284 {"product-info", 0x690000, 0x01000},
2285 {"partition-table", 0x6a0000, 0x02000},
2286 {"soft-version", 0x6b0000, 0x01000},
2287 {"support-list", 0x6b1000, 0x01000},
2288 {"profile", 0x6b2000, 0x08000},
2289 {"user-config", 0x6c0000, 0x10000},
2290 {"default-config", 0x6d0000, 0x10000},
2291 {"default-nvm", 0x6e0000, 0xc0000},
2292 {"default-pib", 0x7a0000, 0x40000},
2293 {"default-mac", 0x7e0000, 0x00020},
2294 {"pin", 0x7e0100, 0x00020},
2295 {"device-id", 0x7e0200, 0x00030},
2296 {"radio", 0x7f0000, 0x10000},
2297 {NULL, 0, 0}
2298 },
2299
2300 .first_sysupgrade_partition = "os-image",
2301 .last_sysupgrade_partition = "file-system"
2302 },
2303
2304 /** Firmware layout for the TL-WPA8631P v3 */
2305 {
2306 .id = "TL-WPA8631P-V3",
2307 .vendor = "",
2308 .support_list =
2309 "SupportList:\n"
2310 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:41550000}\n"
2311 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:45550000}\n"
2312 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:55530000}\n"
2313 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:45550000}\n"
2314 "{product_name:TL-WPA8635P,product_ver:3.0.0,special_id:46520000}\n",
2315 .part_trail = 0x00,
2316 .soft_ver = SOFT_VER_DEFAULT,
2317
2318 .partitions = {
2319 {"fs-uboot", 0x00000, 0x20000},
2320 {"firmware", 0x20000, 0x710000},
2321 {"partition-table", 0x730000, 0x02000},
2322 {"default-mac", 0x732000, 0x00020},
2323 {"pin", 0x732100, 0x00020},
2324 {"device-id", 0x732200, 0x00030},
2325 {"default-region", 0x732300, 0x00010},
2326 {"product-info", 0x732400, 0x00200},
2327 {"extra-para", 0x732600, 0x00200},
2328 {"soft-version", 0x732800, 0x00100},
2329 {"support-list", 0x732900, 0x00200},
2330 {"profile", 0x732b00, 0x00100},
2331 {"default-config", 0x732c00, 0x00800},
2332 {"plc-type", 0x733400, 0x00020},
2333 {"default-pib", 0x733500, 0x06000},
2334 {"user-config", 0x740000, 0x10000},
2335 {"plc-pib", 0x750000, 0x10000},
2336 {"plc-nvm", 0x760000, 0x90000},
2337 {"radio", 0x7f0000, 0x10000},
2338 {NULL, 0, 0}
2339 },
2340
2341 .first_sysupgrade_partition = "os-image",
2342 .last_sysupgrade_partition = "file-system"
2343 },
2344
2345 /** Firmware layout for the TL-WR1043 v5 */
2346 {
2347 .id = "TLWR1043NV5",
2348 .vendor = "",
2349 .support_list =
2350 "SupportList:\n"
2351 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
2352 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
2353 .part_trail = 0x00,
2354 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
2355 .partitions = {
2356 {"factory-boot", 0x00000, 0x20000},
2357 {"fs-uboot", 0x20000, 0x20000},
2358 {"firmware", 0x40000, 0xec0000},
2359 {"default-mac", 0xf00000, 0x00200},
2360 {"pin", 0xf00200, 0x00200},
2361 {"device-id", 0xf00400, 0x00100},
2362 {"product-info", 0xf00500, 0x0fb00},
2363 {"soft-version", 0xf10000, 0x01000},
2364 {"extra-para", 0xf11000, 0x01000},
2365 {"support-list", 0xf12000, 0x0a000},
2366 {"profile", 0xf1c000, 0x04000},
2367 {"default-config", 0xf20000, 0x10000},
2368 {"user-config", 0xf30000, 0x40000},
2369 {"qos-db", 0xf70000, 0x40000},
2370 {"certificate", 0xfb0000, 0x10000},
2371 {"partition-table", 0xfc0000, 0x10000},
2372 {"log", 0xfd0000, 0x20000},
2373 {"radio", 0xff0000, 0x10000},
2374 {NULL, 0, 0}
2375 },
2376 .first_sysupgrade_partition = "os-image",
2377 .last_sysupgrade_partition = "file-system"
2378 },
2379
2380 /** Firmware layout for the TL-WR1043 v4 */
2381 {
2382 .id = "TLWR1043NDV4",
2383 .vendor = "",
2384 .support_list =
2385 "SupportList:\n"
2386 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
2387 .part_trail = 0x00,
2388 .soft_ver = SOFT_VER_DEFAULT,
2389
2390 /* We're using a dynamic kernel/rootfs split here */
2391 .partitions = {
2392 {"fs-uboot", 0x00000, 0x20000},
2393 {"firmware", 0x20000, 0xf30000},
2394 {"default-mac", 0xf50000, 0x00200},
2395 {"pin", 0xf50200, 0x00200},
2396 {"product-info", 0xf50400, 0x0fc00},
2397 {"soft-version", 0xf60000, 0x0b000},
2398 {"support-list", 0xf6b000, 0x04000},
2399 {"profile", 0xf70000, 0x04000},
2400 {"default-config", 0xf74000, 0x0b000},
2401 {"user-config", 0xf80000, 0x40000},
2402 {"partition-table", 0xfc0000, 0x10000},
2403 {"log", 0xfd0000, 0x20000},
2404 {"radio", 0xff0000, 0x10000},
2405 {NULL, 0, 0}
2406 },
2407
2408 .first_sysupgrade_partition = "os-image",
2409 .last_sysupgrade_partition = "file-system"
2410 },
2411
2412 /** Firmware layout for the TL-WR902AC v1 */
2413 {
2414 .id = "TL-WR902AC-V1",
2415 .vendor = "",
2416 .support_list =
2417 "SupportList:\n"
2418 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
2419 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
2420 .part_trail = 0x00,
2421 .soft_ver = SOFT_VER_DEFAULT,
2422
2423 /**
2424 384KB were moved from file-system to os-image
2425 in comparison to the stock image
2426 */
2427 .partitions = {
2428 {"fs-uboot", 0x00000, 0x20000},
2429 {"firmware", 0x20000, 0x730000},
2430 {"default-mac", 0x750000, 0x00200},
2431 {"pin", 0x750200, 0x00200},
2432 {"product-info", 0x750400, 0x0fc00},
2433 {"soft-version", 0x760000, 0x0b000},
2434 {"support-list", 0x76b000, 0x04000},
2435 {"profile", 0x770000, 0x04000},
2436 {"default-config", 0x774000, 0x0b000},
2437 {"user-config", 0x780000, 0x40000},
2438 {"partition-table", 0x7c0000, 0x10000},
2439 {"log", 0x7d0000, 0x20000},
2440 {"radio", 0x7f0000, 0x10000},
2441 {NULL, 0, 0}
2442 },
2443
2444 .first_sysupgrade_partition = "os-image",
2445 .last_sysupgrade_partition = "file-system",
2446 },
2447
2448 /** Firmware layout for the TL-WR941HP v1 */
2449 {
2450 .id = "TL-WR941HP-V1",
2451 .vendor = "",
2452 .support_list =
2453 "SupportList:\n"
2454 "{product_name:TL-WR941HP,product_ver:1.0.0,special_id:00000000}\n",
2455 .part_trail = 0x00,
2456 .soft_ver = SOFT_VER_DEFAULT,
2457
2458 .partitions = {
2459 {"fs-uboot", 0x00000, 0x20000},
2460 {"firmware", 0x20000, 0x730000},
2461 {"default-mac", 0x750000, 0x00200},
2462 {"pin", 0x750200, 0x00200},
2463 {"product-info", 0x750400, 0x0fc00},
2464 {"soft-version", 0x760000, 0x0b000},
2465 {"support-list", 0x76b000, 0x04000},
2466 {"profile", 0x770000, 0x04000},
2467 {"default-config", 0x774000, 0x0b000},
2468 {"user-config", 0x780000, 0x40000},
2469 {"partition-table", 0x7c0000, 0x10000},
2470 {"log", 0x7d0000, 0x20000},
2471 {"radio", 0x7f0000, 0x10000},
2472 {NULL, 0, 0}
2473 },
2474
2475 .first_sysupgrade_partition = "os-image",
2476 .last_sysupgrade_partition = "file-system",
2477 },
2478
2479 /** Firmware layout for the TL-WR942N V1 */
2480 {
2481 .id = "TLWR942NV1",
2482 .vendor = "",
2483 .support_list =
2484 "SupportList:\r\n"
2485 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
2486 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
2487 .part_trail = 0x00,
2488 .soft_ver = SOFT_VER_DEFAULT,
2489
2490 .partitions = {
2491 {"fs-uboot", 0x00000, 0x20000},
2492 {"firmware", 0x20000, 0xe20000},
2493 {"default-mac", 0xe40000, 0x00200},
2494 {"pin", 0xe40200, 0x00200},
2495 {"product-info", 0xe40400, 0x0fc00},
2496 {"partition-table", 0xe50000, 0x10000},
2497 {"soft-version", 0xe60000, 0x10000},
2498 {"support-list", 0xe70000, 0x10000},
2499 {"profile", 0xe80000, 0x10000},
2500 {"default-config", 0xe90000, 0x10000},
2501 {"user-config", 0xea0000, 0x40000},
2502 {"qos-db", 0xee0000, 0x40000},
2503 {"certificate", 0xf20000, 0x10000},
2504 {"usb-config", 0xfb0000, 0x10000},
2505 {"log", 0xfc0000, 0x20000},
2506 {"radio-bk", 0xfe0000, 0x10000},
2507 {"radio", 0xff0000, 0x10000},
2508 {NULL, 0, 0}
2509 },
2510
2511 .first_sysupgrade_partition = "os-image",
2512 .last_sysupgrade_partition = "file-system",
2513 },
2514
2515 /** Firmware layout for the RE200 v2 */
2516 {
2517 .id = "RE200-V2",
2518 .vendor = "",
2519 .support_list =
2520 "SupportList:\n"
2521 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
2522 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
2523 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
2524 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
2525 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
2526 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
2527 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
2528 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
2529 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
2530 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
2531 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
2532 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
2533 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
2534 .part_trail = 0x00,
2535 .soft_ver = SOFT_VER_DEFAULT,
2536
2537 .partitions = {
2538 {"fs-uboot", 0x00000, 0x20000},
2539 {"firmware", 0x20000, 0x7a0000},
2540 {"partition-table", 0x7c0000, 0x02000},
2541 {"default-mac", 0x7c2000, 0x00020},
2542 {"pin", 0x7c2100, 0x00020},
2543 {"product-info", 0x7c3100, 0x01000},
2544 {"soft-version", 0x7c4200, 0x01000},
2545 {"support-list", 0x7c5200, 0x01000},
2546 {"profile", 0x7c6200, 0x08000},
2547 {"config-info", 0x7ce200, 0x00400},
2548 {"user-config", 0x7d0000, 0x10000},
2549 {"default-config", 0x7e0000, 0x10000},
2550 {"radio", 0x7f0000, 0x10000},
2551 {NULL, 0, 0}
2552 },
2553
2554 .first_sysupgrade_partition = "os-image",
2555 .last_sysupgrade_partition = "file-system"
2556 },
2557
2558 /** Firmware layout for the RE200 v3 */
2559 {
2560 .id = "RE200-V3",
2561 .vendor = "",
2562 .support_list =
2563 "SupportList:\n"
2564 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
2565 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
2566 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
2567 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
2568 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
2569 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
2570 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
2571 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
2572 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
2573 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
2574 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
2575 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
2576 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
2577 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
2578 .part_trail = 0x00,
2579 .soft_ver = SOFT_VER_DEFAULT,
2580
2581 .partitions = {
2582 {"fs-uboot", 0x00000, 0x20000},
2583 {"firmware", 0x20000, 0x7a0000},
2584 {"partition-table", 0x7c0000, 0x02000},
2585 {"default-mac", 0x7c2000, 0x00020},
2586 {"pin", 0x7c2100, 0x00020},
2587 {"product-info", 0x7c3100, 0x01000},
2588 {"soft-version", 0x7c4200, 0x01000},
2589 {"support-list", 0x7c5200, 0x01000},
2590 {"profile", 0x7c6200, 0x08000},
2591 {"config-info", 0x7ce200, 0x00400},
2592 {"user-config", 0x7d0000, 0x10000},
2593 {"default-config", 0x7e0000, 0x10000},
2594 {"radio", 0x7f0000, 0x10000},
2595 {NULL, 0, 0}
2596 },
2597
2598 .first_sysupgrade_partition = "os-image",
2599 .last_sysupgrade_partition = "file-system"
2600 },
2601
2602 /** Firmware layout for the RE200 v4 */
2603 {
2604 .id = "RE200-V4",
2605 .vendor = "",
2606 .support_list =
2607 "SupportList:\n"
2608 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
2609 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
2610 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
2611 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
2612 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
2613 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
2614 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
2615 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
2616 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
2617 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
2618 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
2619 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
2620 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
2621 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
2622 .part_trail = 0x00,
2623 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
2624
2625 .partitions = {
2626 {"fs-uboot", 0x00000, 0x20000},
2627 {"firmware", 0x20000, 0x7a0000},
2628 {"partition-table", 0x7c0000, 0x02000},
2629 {"default-mac", 0x7c2000, 0x00020},
2630 {"pin", 0x7c2100, 0x00020},
2631 {"product-info", 0x7c3100, 0x01000},
2632 {"soft-version", 0x7c4200, 0x01000},
2633 {"support-list", 0x7c5200, 0x01000},
2634 {"profile", 0x7c6200, 0x08000},
2635 {"config-info", 0x7ce200, 0x00400},
2636 {"user-config", 0x7d0000, 0x10000},
2637 {"default-config", 0x7e0000, 0x10000},
2638 {"radio", 0x7f0000, 0x10000},
2639 {NULL, 0, 0}
2640 },
2641
2642 .first_sysupgrade_partition = "os-image",
2643 .last_sysupgrade_partition = "file-system"
2644 },
2645
2646 /** Firmware layout for the RE220 v2 */
2647 {
2648 .id = "RE220-V2",
2649 .vendor = "",
2650 .support_list =
2651 "SupportList:\n"
2652 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
2653 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
2654 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
2655 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
2656 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
2657 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
2658 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
2659 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
2660 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
2661 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
2662 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
2663 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
2664 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
2665 .part_trail = 0x00,
2666 .soft_ver = SOFT_VER_DEFAULT,
2667
2668 .partitions = {
2669 {"fs-uboot", 0x00000, 0x20000},
2670 {"firmware", 0x20000, 0x7a0000},
2671 {"partition-table", 0x7c0000, 0x02000},
2672 {"default-mac", 0x7c2000, 0x00020},
2673 {"pin", 0x7c2100, 0x00020},
2674 {"product-info", 0x7c3100, 0x01000},
2675 {"soft-version", 0x7c4200, 0x01000},
2676 {"support-list", 0x7c5200, 0x01000},
2677 {"profile", 0x7c6200, 0x08000},
2678 {"config-info", 0x7ce200, 0x00400},
2679 {"user-config", 0x7d0000, 0x10000},
2680 {"default-config", 0x7e0000, 0x10000},
2681 {"radio", 0x7f0000, 0x10000},
2682 {NULL, 0, 0}
2683 },
2684
2685 .first_sysupgrade_partition = "os-image",
2686 .last_sysupgrade_partition = "file-system"
2687 },
2688
2689 /** Firmware layout for the RE305 v1 */
2690 {
2691 .id = "RE305-V1",
2692 .vendor = "",
2693 .support_list =
2694 "SupportList:\n"
2695 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
2696 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
2697 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
2698 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
2699 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
2700 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
2701 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
2702 .part_trail = 0x00,
2703 .soft_ver = SOFT_VER_DEFAULT,
2704
2705 .partitions = {
2706 {"fs-uboot", 0x00000, 0x20000},
2707 {"firmware", 0x20000, 0x5e0000},
2708 {"partition-table", 0x600000, 0x02000},
2709 {"default-mac", 0x610000, 0x00020},
2710 {"pin", 0x610100, 0x00020},
2711 {"product-info", 0x611100, 0x01000},
2712 {"soft-version", 0x620000, 0x01000},
2713 {"support-list", 0x621000, 0x01000},
2714 {"profile", 0x622000, 0x08000},
2715 {"user-config", 0x630000, 0x10000},
2716 {"default-config", 0x640000, 0x10000},
2717 {"radio", 0x7f0000, 0x10000},
2718 {NULL, 0, 0}
2719 },
2720
2721 .first_sysupgrade_partition = "os-image",
2722 .last_sysupgrade_partition = "file-system"
2723 },
2724
2725 /** Firmware layout for the RE305 v3 */
2726 {
2727 .id = "RE305-V3",
2728 .vendor = "",
2729 .support_list =
2730 "SupportList:\n"
2731 "{product_name:RE305,product_ver:3.0.0,special_id:00000000}\n"
2732 "{product_name:RE305,product_ver:3.0.0,special_id:45550000}\n"
2733 "{product_name:RE305,product_ver:3.0.0,special_id:4A500000}\n"
2734 "{product_name:RE305,product_ver:3.0.0,special_id:4B520000}\n"
2735 "{product_name:RE305,product_ver:3.0.0,special_id:41550000}\n"
2736 "{product_name:RE305,product_ver:3.0.0,special_id:42520000}\n"
2737 "{product_name:RE305,product_ver:3.0.0,special_id:55530000}\n"
2738 "{product_name:RE305,product_ver:3.0.0,special_id:45530000}\n"
2739 "{product_name:RE305,product_ver:3.0.0,special_id:41530000}\n"
2740 "{product_name:RE305,product_ver:3.0.0,special_id:43410000}\n"
2741 "{product_name:RE305,product_ver:3.0.0,special_id:52550000}\n",
2742 .part_trail = 0x00,
2743 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
2744
2745 .partitions = {
2746 {"fs-uboot", 0x00000, 0x20000},
2747 {"firmware", 0x20000, 0x7a0000},
2748 {"partition-table", 0x7c0000, 0x02000},
2749 {"default-mac", 0x7c2000, 0x00020},
2750 {"pin", 0x7c2100, 0x00020},
2751 {"product-info", 0x7c3100, 0x01000},
2752 {"soft-version", 0x7c4200, 0x01000},
2753 {"support-list", 0x7c5200, 0x01000},
2754 {"profile", 0x7c6200, 0x08000},
2755 {"config-info", 0x7ce200, 0x00400},
2756 {"user-config", 0x7d0000, 0x10000},
2757 {"default-config", 0x7e0000, 0x10000},
2758 {"radio", 0x7f0000, 0x10000},
2759 {NULL, 0, 0}
2760 },
2761
2762 .first_sysupgrade_partition = "os-image",
2763 .last_sysupgrade_partition = "file-system"
2764 },
2765
2766 /** Firmware layout for the RE350 v1 */
2767 {
2768 .id = "RE350-V1",
2769 .vendor = "",
2770 .support_list =
2771 "SupportList:\n"
2772 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
2773 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
2774 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
2775 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
2776 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
2777 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
2778 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
2779 .part_trail = 0x00,
2780 .soft_ver = SOFT_VER_DEFAULT,
2781
2782 /** We're using a dynamic kernel/rootfs split here */
2783 .partitions = {
2784 {"fs-uboot", 0x00000, 0x20000},
2785 {"firmware", 0x20000, 0x5e0000},
2786 {"partition-table", 0x600000, 0x02000},
2787 {"default-mac", 0x610000, 0x00020},
2788 {"pin", 0x610100, 0x00020},
2789 {"product-info", 0x611100, 0x01000},
2790 {"soft-version", 0x620000, 0x01000},
2791 {"support-list", 0x621000, 0x01000},
2792 {"profile", 0x622000, 0x08000},
2793 {"user-config", 0x630000, 0x10000},
2794 {"default-config", 0x640000, 0x10000},
2795 {"radio", 0x7f0000, 0x10000},
2796 {NULL, 0, 0}
2797 },
2798
2799 .first_sysupgrade_partition = "os-image",
2800 .last_sysupgrade_partition = "file-system"
2801 },
2802
2803 /** Firmware layout for the RE350K v1 */
2804 {
2805 .id = "RE350K-V1",
2806 .vendor = "",
2807 .support_list =
2808 "SupportList:\n"
2809 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2810 .part_trail = 0x00,
2811 .soft_ver = SOFT_VER_DEFAULT,
2812
2813 /** We're using a dynamic kernel/rootfs split here */
2814 .partitions = {
2815 {"fs-uboot", 0x00000, 0x20000},
2816 {"firmware", 0x20000, 0xd70000},
2817 {"partition-table", 0xd90000, 0x02000},
2818 {"default-mac", 0xda0000, 0x00020},
2819 {"pin", 0xda0100, 0x00020},
2820 {"product-info", 0xda1100, 0x01000},
2821 {"soft-version", 0xdb0000, 0x01000},
2822 {"support-list", 0xdb1000, 0x01000},
2823 {"profile", 0xdb2000, 0x08000},
2824 {"user-config", 0xdc0000, 0x10000},
2825 {"default-config", 0xdd0000, 0x10000},
2826 {"device-id", 0xde0000, 0x00108},
2827 {"radio", 0xff0000, 0x10000},
2828 {NULL, 0, 0}
2829 },
2830
2831 .first_sysupgrade_partition = "os-image",
2832 .last_sysupgrade_partition = "file-system"
2833 },
2834
2835 /** Firmware layout for the RE355 */
2836 {
2837 .id = "RE355",
2838 .vendor = "",
2839 .support_list =
2840 "SupportList:\r\n"
2841 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2842 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2843 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2844 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2845 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2846 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2847 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2848 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2849 .part_trail = 0x00,
2850 .soft_ver = SOFT_VER_DEFAULT,
2851
2852 /* We're using a dynamic kernel/rootfs split here */
2853 .partitions = {
2854 {"fs-uboot", 0x00000, 0x20000},
2855 {"firmware", 0x20000, 0x5e0000},
2856 {"partition-table", 0x600000, 0x02000},
2857 {"default-mac", 0x610000, 0x00020},
2858 {"pin", 0x610100, 0x00020},
2859 {"product-info", 0x611100, 0x01000},
2860 {"soft-version", 0x620000, 0x01000},
2861 {"support-list", 0x621000, 0x01000},
2862 {"profile", 0x622000, 0x08000},
2863 {"user-config", 0x630000, 0x10000},
2864 {"default-config", 0x640000, 0x10000},
2865 {"radio", 0x7f0000, 0x10000},
2866 {NULL, 0, 0}
2867 },
2868
2869 .first_sysupgrade_partition = "os-image",
2870 .last_sysupgrade_partition = "file-system"
2871 },
2872
2873 /** Firmware layout for the RE450 */
2874 {
2875 .id = "RE450",
2876 .vendor = "",
2877 .support_list =
2878 "SupportList:\r\n"
2879 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2880 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2881 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2882 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2883 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2884 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2885 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2886 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2887 .part_trail = 0x00,
2888 .soft_ver = SOFT_VER_DEFAULT,
2889
2890 /** We're using a dynamic kernel/rootfs split here */
2891 .partitions = {
2892 {"fs-uboot", 0x00000, 0x20000},
2893 {"firmware", 0x20000, 0x5e0000},
2894 {"partition-table", 0x600000, 0x02000},
2895 {"default-mac", 0x610000, 0x00020},
2896 {"pin", 0x610100, 0x00020},
2897 {"product-info", 0x611100, 0x01000},
2898 {"soft-version", 0x620000, 0x01000},
2899 {"support-list", 0x621000, 0x01000},
2900 {"profile", 0x622000, 0x08000},
2901 {"user-config", 0x630000, 0x10000},
2902 {"default-config", 0x640000, 0x10000},
2903 {"radio", 0x7f0000, 0x10000},
2904 {NULL, 0, 0}
2905 },
2906
2907 .first_sysupgrade_partition = "os-image",
2908 .last_sysupgrade_partition = "file-system"
2909 },
2910
2911 /** Firmware layout for the RE450 v2 */
2912 {
2913 .id = "RE450-V2",
2914 .vendor = "",
2915 .support_list =
2916 "SupportList:\r\n"
2917 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2918 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2919 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2920 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2921 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2922 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2923 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2924 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2925 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2926 .part_trail = 0x00,
2927 .soft_ver = SOFT_VER_DEFAULT,
2928
2929 /* We're using a dynamic kernel/rootfs split here */
2930 .partitions = {
2931 {"fs-uboot", 0x00000, 0x20000},
2932 {"firmware", 0x20000, 0x5e0000},
2933 {"partition-table", 0x600000, 0x02000},
2934 {"default-mac", 0x610000, 0x00020},
2935 {"pin", 0x610100, 0x00020},
2936 {"product-info", 0x611100, 0x01000},
2937 {"soft-version", 0x620000, 0x01000},
2938 {"support-list", 0x621000, 0x01000},
2939 {"profile", 0x622000, 0x08000},
2940 {"user-config", 0x630000, 0x10000},
2941 {"default-config", 0x640000, 0x10000},
2942 {"radio", 0x7f0000, 0x10000},
2943 {NULL, 0, 0}
2944 },
2945
2946 .first_sysupgrade_partition = "os-image",
2947 .last_sysupgrade_partition = "file-system"
2948 },
2949
2950 /** Firmware layout for the RE450 v3 */
2951 {
2952 .id = "RE450-V3",
2953 .vendor = "",
2954 .support_list =
2955 "SupportList:\r\n"
2956 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2957 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2958 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2959 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2960 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2961 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2962 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2963 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2964 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2965 .part_trail = 0x00,
2966 .soft_ver = SOFT_VER_DEFAULT,
2967
2968 /* We're using a dynamic kernel/rootfs split here */
2969 .partitions = {
2970 {"fs-uboot", 0x00000, 0x20000},
2971 {"default-mac", 0x20000, 0x00020},
2972 {"pin", 0x20020, 0x00020},
2973 {"product-info", 0x21000, 0x01000},
2974 {"partition-table", 0x22000, 0x02000},
2975 {"soft-version", 0x24000, 0x01000},
2976 {"support-list", 0x25000, 0x01000},
2977 {"profile", 0x26000, 0x08000},
2978 {"user-config", 0x2e000, 0x10000},
2979 {"default-config", 0x3e000, 0x10000},
2980 {"config-info", 0x4e000, 0x00400},
2981 {"firmware", 0x50000, 0x7a0000},
2982 {"radio", 0x7f0000, 0x10000},
2983 {NULL, 0, 0}
2984 },
2985
2986 .first_sysupgrade_partition = "os-image",
2987 .last_sysupgrade_partition = "file-system"
2988 },
2989
2990 /** Firmware layout for the RE455 v1 */
2991 {
2992 .id = "RE455-V1",
2993 .vendor = "",
2994 .support_list =
2995 "SupportList:\r\n"
2996 "{product_name:RE455,product_ver:1.0.0,special_id:00000000}\r\n"
2997 "{product_name:RE455,product_ver:1.0.0,special_id:55530000}\r\n"
2998 "{product_name:RE455,product_ver:1.0.0,special_id:45550000}\r\n"
2999 "{product_name:RE455,product_ver:1.0.0,special_id:4A500000}\r\n"
3000 "{product_name:RE455,product_ver:1.0.0,special_id:43410000}\r\n"
3001 "{product_name:RE455,product_ver:1.0.0,special_id:41550000}\r\n"
3002 "{product_name:RE455,product_ver:1.0.0,special_id:41530000}\r\n"
3003 "{product_name:RE455,product_ver:1.0.0,special_id:4B520000}\r\n"
3004 "{product_name:RE455,product_ver:1.0.0,special_id:42520000}\r\n",
3005 .part_trail = 0x00,
3006 .soft_ver = SOFT_VER_DEFAULT,
3007
3008 /* We're using a dynamic kernel/rootfs split here */
3009 .partitions = {
3010 {"fs-uboot", 0x00000, 0x20000},
3011 {"default-mac", 0x20000, 0x00020},
3012 {"pin", 0x20020, 0x00020},
3013 {"product-info", 0x21000, 0x01000},
3014 {"partition-table", 0x22000, 0x02000},
3015 {"soft-version", 0x24000, 0x01000},
3016 {"support-list", 0x25000, 0x01000},
3017 {"profile", 0x26000, 0x08000},
3018 {"user-config", 0x2e000, 0x10000},
3019 {"default-config", 0x3e000, 0x10000},
3020 {"config-info", 0x4e000, 0x00400},
3021 {"firmware", 0x50000, 0x7a0000},
3022 {"radio", 0x7f0000, 0x10000},
3023 {NULL, 0, 0}
3024 },
3025
3026 .first_sysupgrade_partition = "os-image",
3027 .last_sysupgrade_partition = "file-system"
3028 },
3029
3030 /** Firmware layout for the RE500 */
3031 {
3032 .id = "RE500-V1",
3033 .vendor = "",
3034 .support_list =
3035 "SupportList:\r\n"
3036 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
3037 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
3038 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
3039 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
3040 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
3041 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
3042 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
3043 .part_trail = 0x00,
3044 .soft_ver = SOFT_VER_DEFAULT,
3045
3046 /* We're using a dynamic kernel/rootfs split here */
3047 .partitions = {
3048 {"fs-uboot", 0x00000, 0x20000},
3049 {"firmware", 0x20000, 0xde0000},
3050 {"partition-table", 0xe00000, 0x02000},
3051 {"default-mac", 0xe10000, 0x00020},
3052 {"pin", 0xe10100, 0x00020},
3053 {"product-info", 0xe11100, 0x01000},
3054 {"soft-version", 0xe20000, 0x01000},
3055 {"support-list", 0xe21000, 0x01000},
3056 {"profile", 0xe22000, 0x08000},
3057 {"user-config", 0xe30000, 0x10000},
3058 {"default-config", 0xe40000, 0x10000},
3059 {"radio", 0xff0000, 0x10000},
3060 {NULL, 0, 0}
3061 },
3062
3063 .first_sysupgrade_partition = "os-image",
3064 .last_sysupgrade_partition = "file-system"
3065 },
3066
3067 /** Firmware layout for the RE650 */
3068 {
3069 .id = "RE650-V1",
3070 .vendor = "",
3071 .support_list =
3072 "SupportList:\r\n"
3073 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
3074 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
3075 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
3076 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
3077 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
3078 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
3079 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
3080 .part_trail = 0x00,
3081 .soft_ver = SOFT_VER_DEFAULT,
3082
3083 /* We're using a dynamic kernel/rootfs split here */
3084 .partitions = {
3085 {"fs-uboot", 0x00000, 0x20000},
3086 {"firmware", 0x20000, 0xde0000},
3087 {"partition-table", 0xe00000, 0x02000},
3088 {"default-mac", 0xe10000, 0x00020},
3089 {"pin", 0xe10100, 0x00020},
3090 {"product-info", 0xe11100, 0x01000},
3091 {"soft-version", 0xe20000, 0x01000},
3092 {"support-list", 0xe21000, 0x01000},
3093 {"profile", 0xe22000, 0x08000},
3094 {"user-config", 0xe30000, 0x10000},
3095 {"default-config", 0xe40000, 0x10000},
3096 {"radio", 0xff0000, 0x10000},
3097 {NULL, 0, 0}
3098 },
3099
3100 .first_sysupgrade_partition = "os-image",
3101 .last_sysupgrade_partition = "file-system"
3102 },
3103 /** Firmware layout for the RE650 V2 (8MB Flash)*/
3104 {
3105 .id = "RE650-V2",
3106 .vendor = "",
3107 .support_list =
3108 "SupportList:\n"
3109 "{product_name:RE650,product_ver:2.0.0,special_id:00000000}\n"
3110 "{product_name:RE650,product_ver:2.0.0,special_id:45550000}\n"
3111 "{product_name:RE650,product_ver:2.0.0,special_id:4A500000}\n"
3112 "{product_name:RE650,product_ver:2.0.0,special_id:41550000}\n"
3113 "{product_name:RE650,product_ver:2.0.0,special_id:43410000}\n"
3114 "{product_name:RE650,product_ver:2.0.0,special_id:41530000}\n"
3115 "{product_name:RE650,product_ver:2.0.0,special_id:55530000}\n",
3116 .part_trail = 0x00,
3117 /* For RE650 v2, soft ver is required, otherwise OEM install doesn't work */
3118 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
3119
3120 /* We're using a dynamic kernel/rootfs split here */
3121 .partitions = {
3122 {"fs-uboot", 0x00000, 0x20000},
3123 {"firmware", 0x20000, 0x7a0000},
3124 {"partition-table", 0x7c0000, 0x02000},
3125 {"default-mac", 0x7c2000, 0x00020},
3126 {"pin", 0x7c2100, 0x00020},
3127 {"product-info", 0x7c3100, 0x01000},
3128 {"soft-version", 0x7c4200, 0x01000},
3129 {"support-list", 0x7c5200, 0x01000},
3130 {"profile", 0x7c6200, 0x08000},
3131 {"config-info", 0x7ce200, 0x00400},
3132 {"user-config", 0x7d0000, 0x10000},
3133 {"default-config", 0x7e0000, 0x10000},
3134 {"radio", 0x7f0000, 0x10000},
3135 {NULL, 0, 0}
3136 },
3137
3138 .first_sysupgrade_partition = "os-image",
3139 .last_sysupgrade_partition = "file-system"
3140 },
3141
3142 /** Firmware layout for the Mercusys MR70X */
3143 {
3144 .id = "MR70X",
3145 .vendor = "",
3146 .support_list =
3147 "SupportList:\n"
3148 "{product_name:MR70X,product_ver:1.0.0,special_id:45550000}\n"
3149 "{product_name:MR70X,product_ver:1.0.0,special_id:4A500000}\n"
3150 "{product_name:MR70X,product_ver:1.0.0,special_id:55530000}\n",
3151 .part_trail = 0x00,
3152 .soft_ver = SOFT_VER_DEFAULT,
3153
3154 .partitions = {
3155 {"fs-uboot", 0x00000, 0x40000},
3156 {"firmware", 0x40000, 0xf60000},
3157 {"default-mac", 0xfa0000, 0x00200},
3158 {"pin", 0xfa0200, 0x00100},
3159 {"device-id", 0xfa0300, 0x00100},
3160 {"product-info", 0xfa0400, 0x0fc00},
3161 {"default-config", 0xfb0000, 0x08000},
3162 {"ap-def-config", 0xfb8000, 0x08000},
3163 {"user-config", 0xfc0000, 0x0a000},
3164 {"ag-config", 0xfca000, 0x04000},
3165 {"certificate", 0xfce000, 0x02000},
3166 {"ap-config", 0xfd0000, 0x06000},
3167 {"router-config", 0xfd6000, 0x06000},
3168 {"favicon", 0xfdc000, 0x02000},
3169 {"logo", 0xfde000, 0x02000},
3170 {"partition-table", 0xfe0000, 0x00800},
3171 {"soft-version", 0xfe0800, 0x00100},
3172 {"support-list", 0xfe0900, 0x00200},
3173 {"profile", 0xfe0b00, 0x03000},
3174 {"extra-para", 0xfe3b00, 0x00100},
3175 {"radio", 0xff0000, 0x10000},
3176 {NULL, 0, 0}
3177 },
3178
3179 .first_sysupgrade_partition = "os-image",
3180 .last_sysupgrade_partition = "file-system"
3181 },
3182
3183 {}
3184 };
3185
3186 #define error(_ret, _errno, _str, ...) \
3187 do { \
3188 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
3189 strerror(_errno)); \
3190 if (_ret) \
3191 exit(_ret); \
3192 } while (0)
3193
3194
3195 /** Stores a uint32 as big endian */
3196 static inline void put32(uint8_t *buf, uint32_t val) {
3197 buf[0] = val >> 24;
3198 buf[1] = val >> 16;
3199 buf[2] = val >> 8;
3200 buf[3] = val;
3201 }
3202
3203 static inline bool meta_partition_should_pad(enum partition_trail_value pv)
3204 {
3205 return (pv >= 0) && (pv <= PART_TRAIL_MAX);
3206 }
3207
3208 /** Allocate a padded meta partition with a correctly initialised header
3209 * If the `data` pointer is NULL, then the required space is only allocated,
3210 * otherwise `data_len` bytes will be copied from `data` into the partition
3211 * entry. */
3212 static struct image_partition_entry init_meta_partition_entry(
3213 const char *name, const void *data, uint32_t data_len,
3214 enum partition_trail_value pad_value)
3215 {
3216 uint32_t total_len = sizeof(struct meta_header) + data_len;
3217 if (meta_partition_should_pad(pad_value))
3218 total_len += 1;
3219
3220 struct image_partition_entry entry = {
3221 .name = name,
3222 .size = total_len,
3223 .data = malloc(total_len)
3224 };
3225 if (!entry.data)
3226 error(1, errno, "failed to allocate meta partition entry");
3227
3228 struct meta_header *header = (struct meta_header *)entry.data;
3229 header->length = htonl(data_len);
3230 header->zero = 0;
3231
3232 if (data)
3233 memcpy(entry.data+sizeof(*header), data, data_len);
3234
3235 if (meta_partition_should_pad(pad_value))
3236 entry.data[total_len - 1] = (uint8_t) pad_value;
3237
3238 return entry;
3239 }
3240
3241 /** Allocates a new image partition */
3242 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
3243 struct image_partition_entry entry = {name, len, malloc(len)};
3244 if (!entry.data)
3245 error(1, errno, "malloc");
3246
3247 return entry;
3248 }
3249
3250 /** Sets up default partition names whenever custom names aren't specified */
3251 static void set_partition_names(struct device_info *info)
3252 {
3253 if (!info->partition_names.partition_table)
3254 info->partition_names.partition_table = "partition-table";
3255 if (!info->partition_names.soft_ver)
3256 info->partition_names.soft_ver = "soft-version";
3257 if (!info->partition_names.os_image)
3258 info->partition_names.os_image = "os-image";
3259 if (!info->partition_names.support_list)
3260 info->partition_names.support_list = "support-list";
3261 if (!info->partition_names.file_system)
3262 info->partition_names.file_system = "file-system";
3263 if (!info->partition_names.extra_para)
3264 info->partition_names.extra_para = "extra-para";
3265 }
3266
3267 /** Frees an image partition */
3268 static void free_image_partition(struct image_partition_entry *entry)
3269 {
3270 void *data = entry->data;
3271
3272 entry->name = NULL;
3273 entry->size = 0;
3274 entry->data = NULL;
3275
3276 free(data);
3277 }
3278
3279 static time_t source_date_epoch = -1;
3280 static void set_source_date_epoch() {
3281 char *env = getenv("SOURCE_DATE_EPOCH");
3282 char *endptr = env;
3283 errno = 0;
3284 if (env && *env) {
3285 source_date_epoch = strtoull(env, &endptr, 10);
3286 if (errno || (endptr && *endptr != '\0')) {
3287 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
3288 exit(1);
3289 }
3290 }
3291 }
3292
3293 /** Generates the partition-table partition */
3294 static struct image_partition_entry make_partition_table(const struct device_info *p)
3295 {
3296 struct image_partition_entry entry = alloc_image_partition(p->partition_names.partition_table, SAFELOADER_PAYLOAD_TABLE_SIZE);
3297
3298 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
3299
3300 *(s++) = 0x00;
3301 *(s++) = 0x04;
3302 *(s++) = 0x00;
3303 *(s++) = 0x00;
3304
3305 size_t i;
3306 for (i = 0; p->partitions[i].name; i++) {
3307 size_t len = end-s;
3308 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n",
3309 p->partitions[i].name, p->partitions[i].base, p->partitions[i].size);
3310
3311 if (w > len-1)
3312 error(1, 0, "flash partition table overflow?");
3313
3314 s += w;
3315 }
3316
3317 s++;
3318
3319 memset(s, 0xff, end-s);
3320
3321 return entry;
3322 }
3323
3324
3325 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
3326 static inline uint8_t bcd(uint8_t v) {
3327 return 0x10 * (v/10) + v%10;
3328 }
3329
3330
3331 /** Generates the soft-version partition */
3332 static struct image_partition_entry make_soft_version(const struct device_info *info, uint32_t rev)
3333 {
3334 /** If an info string is provided, use this instead of
3335 * the structured data, and include the null-termination */
3336 if (info->soft_ver.type == SOFT_VER_TYPE_TEXT) {
3337 uint32_t len = strlen(info->soft_ver.text) + 1;
3338 return init_meta_partition_entry(info->partition_names.soft_ver,
3339 info->soft_ver.text, len, info->part_trail);
3340 }
3341
3342 time_t t;
3343
3344 if (source_date_epoch != -1)
3345 t = source_date_epoch;
3346 else if (time(&t) == (time_t)(-1))
3347 error(1, errno, "time");
3348
3349 struct tm *tm = gmtime(&t);
3350
3351 struct soft_version s = {
3352 .pad1 = 0xff,
3353
3354 .version_major = info->soft_ver.num[0],
3355 .version_minor = info->soft_ver.num[1],
3356 .version_patch = info->soft_ver.num[2],
3357
3358 .year_hi = bcd((1900+tm->tm_year)/100),
3359 .year_lo = bcd(tm->tm_year%100),
3360 .month = bcd(tm->tm_mon+1),
3361 .day = bcd(tm->tm_mday),
3362 .rev = htonl(rev),
3363
3364 .compat_level = htonl(info->soft_ver_compat_level)
3365 };
3366
3367 if (info->soft_ver_compat_level == 0)
3368 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3369 (uint8_t *)(&s.compat_level) - (uint8_t *)(&s),
3370 info->part_trail);
3371 else
3372 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3373 sizeof(s), info->part_trail);
3374 }
3375
3376 /** Generates the support-list partition */
3377 static struct image_partition_entry make_support_list(
3378 const struct device_info *info)
3379 {
3380 uint32_t len = strlen(info->support_list);
3381 return init_meta_partition_entry(info->partition_names.support_list, info->support_list,
3382 len, info->part_trail);
3383 }
3384
3385 /** Partition with extra-para data */
3386 static struct image_partition_entry make_extra_para(
3387 const struct device_info *info, const uint8_t *extra_para, size_t len)
3388 {
3389 return init_meta_partition_entry(info->partition_names.extra_para, extra_para, len,
3390 info->part_trail);
3391 }
3392
3393 /** Creates a new image partition with an arbitrary name from a file */
3394 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
3395 struct stat statbuf;
3396
3397 if (stat(filename, &statbuf) < 0)
3398 error(1, errno, "unable to stat file `%s'", filename);
3399
3400 size_t len = statbuf.st_size;
3401
3402 if (add_jffs2_eof) {
3403 if (file_system_partition)
3404 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
3405 else
3406 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
3407 }
3408
3409 struct image_partition_entry entry = alloc_image_partition(part_name, len);
3410
3411 FILE *file = fopen(filename, "rb");
3412 if (!file)
3413 error(1, errno, "unable to open file `%s'", filename);
3414
3415 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
3416 error(1, errno, "unable to read file `%s'", filename);
3417
3418 if (add_jffs2_eof) {
3419 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
3420
3421 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
3422 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
3423 }
3424
3425 fclose(file);
3426
3427 return entry;
3428 }
3429
3430 /**
3431 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
3432
3433 Example image partition table:
3434
3435 fwup-ptn partition-table base 0x00800 size 0x00800
3436 fwup-ptn os-image base 0x01000 size 0x113b45
3437 fwup-ptn file-system base 0x114b45 size 0x1d0004
3438 fwup-ptn support-list base 0x2e4b49 size 0x000d1
3439
3440 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
3441 the end of the partition table is marked with a zero byte.
3442
3443 The firmware image must contain at least the partition-table and support-list partitions
3444 to be accepted. There aren't any alignment constraints for the image partitions.
3445
3446 The partition-table partition contains the actual flash layout; partitions
3447 from the image partition table are mapped to the corresponding flash partitions during
3448 the firmware upgrade. The support-list partition contains a list of devices supported by
3449 the firmware image.
3450
3451 The base offsets in the firmware partition table are relative to the end
3452 of the vendor information block, so the partition-table partition will
3453 actually start at offset 0x1814 of the image.
3454
3455 I think partition-table must be the first partition in the firmware image.
3456 */
3457 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
3458 size_t i, j;
3459 char *image_pt = (char *)buffer, *end = image_pt + SAFELOADER_PAYLOAD_TABLE_SIZE;
3460
3461 size_t base = SAFELOADER_PAYLOAD_TABLE_SIZE;
3462 for (i = 0; parts[i].name; i++) {
3463 for (j = 0; flash_parts[j].name; j++) {
3464 if (!strcmp(flash_parts[j].name, parts[i].name)) {
3465 if (parts[i].size > flash_parts[j].size)
3466 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
3467 break;
3468 }
3469 }
3470
3471 assert(flash_parts[j].name);
3472
3473 memcpy(buffer + base, parts[i].data, parts[i].size);
3474
3475 size_t len = end-image_pt;
3476 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
3477
3478 if (w > len-1)
3479 error(1, 0, "image partition table overflow?");
3480
3481 image_pt += w;
3482
3483 base += parts[i].size;
3484 }
3485 }
3486
3487 /** Generates and writes the image MD5 checksum */
3488 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
3489 MD5_CTX ctx;
3490
3491 MD5_Init(&ctx);
3492 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
3493 MD5_Update(&ctx, buffer, len);
3494 MD5_Final(md5, &ctx);
3495 }
3496
3497
3498 /**
3499 Generates the firmware image in factory format
3500
3501 Image format:
3502
3503 Bytes (hex) Usage
3504 ----------- -----
3505 0000-0003 Image size (4 bytes, big endian)
3506 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
3507 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
3508 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
3509 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
3510 1014-1813 Image partition table (2048 bytes, padded with 0xff)
3511 1814-xxxx Firmware partitions
3512 */
3513 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
3514 *len = SAFELOADER_PAYLOAD_OFFSET + SAFELOADER_PAYLOAD_TABLE_SIZE;
3515
3516 size_t i;
3517 for (i = 0; parts[i].name; i++)
3518 *len += parts[i].size;
3519
3520 uint8_t *image = malloc(*len);
3521 if (!image)
3522 error(1, errno, "malloc");
3523
3524 memset(image, 0xff, *len);
3525 put32(image, *len);
3526
3527 if (info->vendor) {
3528 size_t vendor_len = strlen(info->vendor);
3529 put32(image + SAFELOADER_PREAMBLE_SIZE, vendor_len);
3530 memcpy(image + SAFELOADER_PREAMBLE_SIZE + 0x4, info->vendor, vendor_len);
3531 }
3532
3533 put_partitions(image + SAFELOADER_PAYLOAD_OFFSET, info->partitions, parts);
3534 put_md5(image + 0x04, image + SAFELOADER_PREAMBLE_SIZE, *len - SAFELOADER_PREAMBLE_SIZE);
3535
3536 return image;
3537 }
3538
3539 /**
3540 Generates the firmware image in sysupgrade format
3541
3542 This makes some assumptions about the provided flash and image partition tables and
3543 should be generalized when TP-LINK starts building its safeloader into hardware with
3544 different flash layouts.
3545 */
3546 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
3547 size_t i, j;
3548 size_t flash_first_partition_index = 0;
3549 size_t flash_last_partition_index = 0;
3550 const struct flash_partition_entry *flash_first_partition = NULL;
3551 const struct flash_partition_entry *flash_last_partition = NULL;
3552 const struct image_partition_entry *image_last_partition = NULL;
3553
3554 /** Find first and last partitions */
3555 for (i = 0; info->partitions[i].name; i++) {
3556 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
3557 flash_first_partition = &info->partitions[i];
3558 flash_first_partition_index = i;
3559 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
3560 flash_last_partition = &info->partitions[i];
3561 flash_last_partition_index = i;
3562 }
3563 }
3564
3565 assert(flash_first_partition && flash_last_partition);
3566 assert(flash_first_partition_index < flash_last_partition_index);
3567
3568 /** Find last partition from image to calculate needed size */
3569 for (i = 0; image_parts[i].name; i++) {
3570 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
3571 image_last_partition = &image_parts[i];
3572 break;
3573 }
3574 }
3575
3576 assert(image_last_partition);
3577
3578 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
3579
3580 uint8_t *image = malloc(*len);
3581 if (!image)
3582 error(1, errno, "malloc");
3583
3584 memset(image, 0xff, *len);
3585
3586 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
3587 for (j = 0; image_parts[j].name; j++) {
3588 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
3589 if (image_parts[j].size > info->partitions[i].size)
3590 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
3591 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
3592 break;
3593 }
3594
3595 assert(image_parts[j].name);
3596 }
3597 }
3598
3599 return image;
3600 }
3601
3602 /** Generates an image according to a given layout and writes it to a file */
3603 static void build_image(const char *output,
3604 const char *kernel_image,
3605 const char *rootfs_image,
3606 uint32_t rev,
3607 bool add_jffs2_eof,
3608 bool sysupgrade,
3609 struct device_info *info) {
3610
3611 size_t i;
3612
3613 struct image_partition_entry parts[7] = {};
3614
3615 struct flash_partition_entry *firmware_partition = NULL;
3616 struct flash_partition_entry *os_image_partition = NULL;
3617 struct flash_partition_entry *file_system_partition = NULL;
3618 size_t firmware_partition_index = 0;
3619
3620 set_partition_names(info);
3621
3622 for (i = 0; info->partitions[i].name; i++) {
3623 if (!strcmp(info->partitions[i].name, "firmware"))
3624 {
3625 firmware_partition = &info->partitions[i];
3626 firmware_partition_index = i;
3627 }
3628 }
3629
3630 if (firmware_partition)
3631 {
3632 os_image_partition = &info->partitions[firmware_partition_index];
3633 file_system_partition = &info->partitions[firmware_partition_index + 1];
3634
3635 struct stat kernel;
3636 if (stat(kernel_image, &kernel) < 0)
3637 error(1, errno, "unable to stat file `%s'", kernel_image);
3638
3639 if (kernel.st_size > firmware_partition->size)
3640 error(1, 0, "kernel overflowed firmware partition\n");
3641
3642 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
3643 info->partitions[i+1] = info->partitions[i];
3644
3645 file_system_partition->name = info->partition_names.file_system;
3646
3647 file_system_partition->base = firmware_partition->base + kernel.st_size;
3648
3649 /* Align partition start to erase blocks for factory images only */
3650 if (!sysupgrade)
3651 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
3652
3653 file_system_partition->size = firmware_partition->size - file_system_partition->base;
3654
3655 os_image_partition->name = info->partition_names.os_image;
3656
3657 os_image_partition->size = kernel.st_size;
3658 }
3659
3660 parts[0] = make_partition_table(info);
3661 parts[1] = make_soft_version(info, rev);
3662 parts[2] = make_support_list(info);
3663 parts[3] = read_file(info->partition_names.os_image, kernel_image, false, NULL);
3664 parts[4] = read_file(info->partition_names.file_system, rootfs_image, add_jffs2_eof, file_system_partition);
3665
3666
3667 /* Some devices need the extra-para partition to accept the firmware */
3668 if (strcasecmp(info->id, "ARCHER-A6-V3") == 0 ||
3669 strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
3670 strcasecmp(info->id, "ARCHER-A9-V6") == 0 ||
3671 strcasecmp(info->id, "ARCHER-AX23-V1") == 0 ||
3672 strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
3673 strcasecmp(info->id, "ARCHER-C7-V4") == 0 ||
3674 strcasecmp(info->id, "ARCHER-C7-V5") == 0 ||
3675 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
3676 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
3677 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
3678 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
3679 strcasecmp(info->id, "ARCHER-C6U-V1") == 0 ||
3680 strcasecmp(info->id, "ARCHER-C6-V3") == 0 ||
3681 strcasecmp(info->id, "DECO-M4R-V4") == 0 ||
3682 strcasecmp(info->id, "MR70X") == 0 ||
3683 strcasecmp(info->id, "TLWR1043NV5") == 0) {
3684 const uint8_t extra_para[2] = {0x01, 0x00};
3685 parts[5] = make_extra_para(info, extra_para,
3686 sizeof(extra_para));
3687 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0 ||
3688 strcasecmp(info->id, "TL-WA1201-V2") == 0) {
3689 const uint8_t extra_para[2] = {0x00, 0x01};
3690 parts[5] = make_extra_para(info, extra_para,
3691 sizeof(extra_para));
3692 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0 ||
3693 strcasecmp(info->id, "EAP245-V3") == 0) {
3694 const uint8_t extra_para[2] = {0x01, 0x01};
3695 parts[5] = make_extra_para(info, extra_para,
3696 sizeof(extra_para));
3697 }
3698
3699 size_t len;
3700 void *image;
3701 if (sysupgrade)
3702 image = generate_sysupgrade_image(info, parts, &len);
3703 else
3704 image = generate_factory_image(info, parts, &len);
3705
3706 FILE *file = fopen(output, "wb");
3707 if (!file)
3708 error(1, errno, "unable to open output file");
3709
3710 if (fwrite(image, len, 1, file) != 1)
3711 error(1, 0, "unable to write output file");
3712
3713 fclose(file);
3714
3715 free(image);
3716
3717 for (i = 0; parts[i].name; i++)
3718 free_image_partition(&parts[i]);
3719 }
3720
3721 /** Usage output */
3722 static void usage(const char *argv0) {
3723 fprintf(stderr,
3724 "Usage: %s [OPTIONS...]\n"
3725 "\n"
3726 "Options:\n"
3727 " -h show this help\n"
3728 "\n"
3729 "Info about an image:\n"
3730 " -i <file> input file to read from\n"
3731 "Create a new image:\n"
3732 " -B <board> create image for the board specified with <board>\n"
3733 " -k <file> read kernel image from the file <file>\n"
3734 " -r <file> read rootfs image from the file <file>\n"
3735 " -o <file> write output to the file <file>\n"
3736 " -V <rev> sets the revision number to <rev>\n"
3737 " -j add jffs2 end-of-filesystem markers\n"
3738 " -S create sysupgrade instead of factory image\n"
3739 "Extract an old image:\n"
3740 " -x <file> extract all oem firmware partition\n"
3741 " -d <dir> destination to extract the firmware partition\n"
3742 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
3743 argv0
3744 );
3745 };
3746
3747
3748 static struct device_info *find_board(const char *id)
3749 {
3750 struct device_info *board = NULL;
3751
3752 for (board = boards; board->id != NULL; board++)
3753 if (strcasecmp(id, board->id) == 0)
3754 return board;
3755
3756 return NULL;
3757 }
3758
3759 static int add_flash_partition(
3760 struct flash_partition_entry *part_list,
3761 size_t max_entries,
3762 const char *name,
3763 unsigned long base,
3764 unsigned long size)
3765 {
3766 size_t ptr;
3767 /* check if the list has a free entry */
3768 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
3769 if (part_list->name == NULL &&
3770 part_list->base == 0 &&
3771 part_list->size == 0)
3772 break;
3773 }
3774
3775 if (ptr == max_entries) {
3776 error(1, 0, "No free flash part entry available.");
3777 }
3778
3779 part_list->name = calloc(1, strlen(name) + 1);
3780 if (!part_list->name) {
3781 error(1, 0, "Unable to allocate memory");
3782 }
3783
3784 memcpy((char *)part_list->name, name, strlen(name));
3785 part_list->base = base;
3786 part_list->size = size;
3787
3788 return 0;
3789 }
3790
3791 /** read the partition table into struct flash_partition_entry */
3792 enum PARTITION_TABLE_TYPE {
3793 PARTITION_TABLE_FWUP,
3794 PARTITION_TABLE_FLASH,
3795 };
3796
3797 static int read_partition_table(
3798 FILE *file, long offset,
3799 struct flash_partition_entry *entries, size_t max_entries,
3800 int type)
3801 {
3802 char buf[SAFELOADER_PAYLOAD_TABLE_SIZE];
3803 char *ptr, *end;
3804 const char *parthdr = NULL;
3805 const char *fwuphdr = "fwup-ptn";
3806 const char *flashhdr = "partition";
3807
3808 /* TODO: search for the partition table */
3809
3810 switch(type) {
3811 case PARTITION_TABLE_FWUP:
3812 parthdr = fwuphdr;
3813 break;
3814 case PARTITION_TABLE_FLASH:
3815 parthdr = flashhdr;
3816 break;
3817 default:
3818 error(1, 0, "Invalid partition table");
3819 }
3820
3821 if (fseek(file, offset, SEEK_SET) < 0)
3822 error(1, errno, "Can not seek in the firmware");
3823
3824 if (fread(buf, sizeof(buf), 1, file) != 1)
3825 error(1, errno, "Can not read fwup-ptn from the firmware");
3826
3827 buf[sizeof(buf) - 1] = '\0';
3828
3829 /* look for the partition header */
3830 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
3831 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
3832 return 1;
3833 }
3834
3835 ptr = buf;
3836 end = buf + sizeof(buf);
3837 while ((ptr + strlen(parthdr)) < end &&
3838 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
3839 char *end_part;
3840 char *end_element;
3841
3842 char name[32] = { 0 };
3843 int name_len = 0;
3844 unsigned long base = 0;
3845 unsigned long size = 0;
3846
3847 end_part = memchr(ptr, '\n', (end - ptr));
3848 if (end_part == NULL) {
3849 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
3850 break;
3851 }
3852
3853 for (int i = 0; i <= 4; i++) {
3854 if (end_part <= ptr)
3855 break;
3856
3857 end_element = memchr(ptr, 0x20, (end_part - ptr));
3858 if (end_element == NULL) {
3859 error(1, errno, "Ignoring the rest of the partition entries.");
3860 break;
3861 }
3862
3863 switch (i) {
3864 /* partition header */
3865 case 0:
3866 ptr = end_element + 1;
3867 continue;
3868 /* name */
3869 case 1:
3870 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
3871 strncpy(name, ptr, name_len);
3872 name[name_len] = '\0';
3873 ptr = end_element + 1;
3874 continue;
3875
3876 /* string "base" */
3877 case 2:
3878 ptr = end_element + 1;
3879 continue;
3880
3881 /* actual base */
3882 case 3:
3883 base = strtoul(ptr, NULL, 16);
3884 ptr = end_element + 1;
3885 continue;
3886
3887 /* string "size" */
3888 case 4:
3889 ptr = end_element + 1;
3890 /* actual size. The last element doesn't have a sepeartor */
3891 size = strtoul(ptr, NULL, 16);
3892 /* the part ends with 0x09, 0x0d, 0x0a */
3893 ptr = end_part + 1;
3894 add_flash_partition(entries, max_entries, name, base, size);
3895 continue;
3896 }
3897 }
3898 }
3899
3900 return 0;
3901 }
3902
3903 static void safeloader_read_partition(FILE *input_file, size_t payload_offset,
3904 struct flash_partition_entry *entry,
3905 struct image_partition_entry *part)
3906 {
3907 size_t part_size = entry->size;
3908 void *part_data = malloc(part_size);
3909
3910 if (fseek(input_file, payload_offset, SEEK_SET))
3911 error(1, errno, "Failed to seek to partition data");
3912
3913 if (!part_data)
3914 error(1, ENOMEM, "Failed to allocate partition data");
3915
3916 if (fread(part_data, 1, part_size, input_file) < part_size)
3917 error(1, errno, "Failed to read partition data");
3918
3919 part->data = part_data;
3920 part->size = part_size;
3921 part->name = entry->name;
3922 }
3923
3924 static void safeloader_parse_image(FILE *input_file, struct safeloader_image_info *image)
3925 {
3926 static const char *HEADER_ID_CLOUD = "fw-type:Cloud";
3927 static const char *HEADER_ID_QNEW = "?NEW";
3928
3929 char buf[64];
3930
3931 if (!input_file)
3932 return;
3933
3934 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
3935
3936 if (fread(buf, sizeof(buf), 1, input_file) != 1)
3937 error(1, errno, "Can not read image header");
3938
3939 if (memcmp(HEADER_ID_QNEW, &buf[0], strlen(HEADER_ID_QNEW)) == 0)
3940 image->type = SAFELOADER_TYPE_QNEW;
3941 else if (memcmp(HEADER_ID_CLOUD, &buf[0], strlen(HEADER_ID_CLOUD)) == 0)
3942 image->type = SAFELOADER_TYPE_CLOUD;
3943 else if (ntohl(*((uint32_t *) &buf[0])) <= SAFELOADER_HEADER_SIZE)
3944 image->type = SAFELOADER_TYPE_VENDOR;
3945 else
3946 image->type = SAFELOADER_TYPE_DEFAULT;
3947
3948 switch (image->type) {
3949 case SAFELOADER_TYPE_DEFAULT:
3950 case SAFELOADER_TYPE_VENDOR:
3951 case SAFELOADER_TYPE_CLOUD:
3952 image->payload_offset = SAFELOADER_PAYLOAD_OFFSET;
3953 break;
3954 case SAFELOADER_TYPE_QNEW:
3955 image->payload_offset = SAFELOADER_QNEW_PAYLOAD_OFFSET;
3956 break;
3957 }
3958
3959 /* Parse image partition table */
3960 read_partition_table(input_file, image->payload_offset, &image->entries[0],
3961 MAX_PARTITIONS, PARTITION_TABLE_FWUP);
3962 }
3963
3964 static void write_partition(
3965 FILE *input_file,
3966 size_t firmware_offset,
3967 struct flash_partition_entry *entry,
3968 FILE *output_file)
3969 {
3970 char buf[4096];
3971 size_t offset;
3972
3973 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
3974
3975 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
3976 if (fread(buf, sizeof(buf), 1, input_file) != 1)
3977 error(1, errno, "Can not read partition from input_file");
3978
3979 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3980 error(1, errno, "Can not write partition to output_file");
3981 }
3982 /* write last chunk smaller than buffer */
3983 if (offset < entry->size) {
3984 offset = entry->size - offset;
3985 if (fread(buf, offset, 1, input_file) != 1)
3986 error(1, errno, "Can not read partition from input_file");
3987 if (fwrite(buf, offset, 1, output_file) != 1)
3988 error(1, errno, "Can not write partition to output_file");
3989 }
3990 }
3991
3992 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
3993 {
3994 FILE *output_file;
3995 char output[PATH_MAX];
3996
3997 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
3998 output_file = fopen(output, "wb+");
3999 if (output_file == NULL) {
4000 error(1, errno, "Can not open output file %s", output);
4001 }
4002
4003 write_partition(input_file, firmware_offset, entry, output_file);
4004
4005 fclose(output_file);
4006
4007 return 0;
4008 }
4009
4010 /** extract all partitions from the firmware file */
4011 static int extract_firmware(const char *input, const char *output_directory)
4012 {
4013 struct safeloader_image_info info = {};
4014 struct stat statbuf;
4015 FILE *input_file;
4016
4017 /* check input file */
4018 if (stat(input, &statbuf)) {
4019 error(1, errno, "Can not read input firmware %s", input);
4020 }
4021
4022 /* check if output directory exists */
4023 if (stat(output_directory, &statbuf)) {
4024 error(1, errno, "Failed to stat output directory %s", output_directory);
4025 }
4026
4027 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
4028 error(1, errno, "Given output directory is not a directory %s", output_directory);
4029 }
4030
4031 input_file = fopen(input, "rb");
4032 safeloader_parse_image(input_file, &info);
4033
4034 for (size_t i = 0; i < MAX_PARTITIONS && info.entries[i].name; i++)
4035 extract_firmware_partition(input_file, info.payload_offset, &info.entries[i], output_directory);
4036
4037 return 0;
4038 }
4039
4040 static struct flash_partition_entry *find_partition(
4041 struct flash_partition_entry *entries, size_t max_entries,
4042 const char *name, const char *error_msg)
4043 {
4044 for (size_t i = 0; i < max_entries; i++, entries++) {
4045 if (strcmp(entries->name, name) == 0)
4046 return entries;
4047 }
4048
4049 if (error_msg) {
4050 error(1, 0, "%s", error_msg);
4051 }
4052
4053 return NULL;
4054 }
4055
4056 static int firmware_info(const char *input)
4057 {
4058 struct safeloader_image_info info = {};
4059 struct image_partition_entry part = {};
4060 struct flash_partition_entry *e;
4061 FILE *input_file;
4062
4063 input_file = fopen(input, "rb");
4064
4065 safeloader_parse_image(input_file, &info);
4066
4067 if (info.type == SAFELOADER_TYPE_VENDOR) {
4068 char buf[SAFELOADER_HEADER_SIZE] = {};
4069 uint32_t vendor_size;
4070
4071 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
4072 fread(&vendor_size, sizeof(uint32_t), 1, input_file);
4073
4074 vendor_size = ntohl(vendor_size);
4075 fread(buf, vendor_size, 1, input_file);
4076
4077 printf("Firmware vendor string:\n");
4078 fwrite(buf, strnlen(buf, vendor_size), 1, stdout);
4079 printf("\n");
4080 }
4081
4082 printf("Firmware image partitions:\n");
4083 printf("%-8s %-8s %s\n", "base", "size", "name");
4084
4085 e = &info.entries[0];
4086 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4087 printf("%08x %08x %s\n", e->base, e->size, e->name);
4088
4089 e = find_partition(&info.entries[0], MAX_PARTITIONS, "soft-version", NULL);
4090 if (e) {
4091 struct soft_version *s;
4092 unsigned int ascii_len;
4093 const uint8_t *buf;
4094 size_t data_len;
4095 bool isstr;
4096
4097 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4098 data_len = ntohl(((struct meta_header *) part.data)->length);
4099 buf = part.data + sizeof(struct meta_header);
4100
4101 /* Check for (null-terminated) string */
4102 ascii_len = 0;
4103 while (ascii_len < data_len && isascii(buf[ascii_len]))
4104 ascii_len++;
4105
4106 isstr = ascii_len == data_len;
4107
4108 printf("\n[Software version]\n");
4109 if (isstr) {
4110 fwrite(buf, strnlen((const char *) buf, data_len), 1, stdout);
4111 putchar('\n');
4112 } else if (data_len >= offsetof(struct soft_version, rev)) {
4113 s = (struct soft_version *) buf;
4114
4115 printf("Version: %d.%d.%d\n", s->version_major, s->version_minor, s->version_patch);
4116 printf("Date: %02x%02x-%02x-%02x\n", s->year_hi, s->year_lo, s->month, s->day);
4117 printf("Revision: %d\n", ntohl(s->rev));
4118 } else {
4119 printf("Failed to parse data\n");
4120 }
4121
4122 free_image_partition(&part);
4123 }
4124
4125 e = find_partition(&info.entries[0], MAX_PARTITIONS, "support-list", NULL);
4126 if (e) {
4127 size_t data_len;
4128
4129 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4130 data_len = ntohl(((struct meta_header *) part.data)->length);
4131
4132 printf("\n[Support list]\n");
4133 fwrite(part.data + sizeof(struct meta_header), data_len, 1, stdout);
4134 printf("\n");
4135
4136 free_image_partition(&part);
4137 }
4138
4139 e = find_partition(&info.entries[0], MAX_PARTITIONS, "partition-table", NULL);
4140 if (e) {
4141 size_t flash_table_offset = info.payload_offset + e->base + 4;
4142 struct flash_partition_entry parts[MAX_PARTITIONS] = {};
4143
4144 if (read_partition_table(input_file, flash_table_offset, parts, MAX_PARTITIONS, PARTITION_TABLE_FLASH))
4145 error(1, 0, "Error can not read the partition table (partition)");
4146
4147 printf("\n[Partition table]\n");
4148 printf("%-8s %-8s %s\n", "base", "size", "name");
4149
4150 e = &parts[0];
4151 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4152 printf("%08x %08x %s\n", e->base, e->size, e->name);
4153 }
4154
4155 fclose(input_file);
4156
4157 return 0;
4158 }
4159
4160 static void write_ff(FILE *output_file, size_t size)
4161 {
4162 char buf[4096];
4163 size_t offset;
4164
4165 memset(buf, 0xff, sizeof(buf));
4166
4167 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
4168 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
4169 error(1, errno, "Can not write 0xff to output_file");
4170 }
4171
4172 /* write last chunk smaller than buffer */
4173 if (offset < size) {
4174 offset = size - offset;
4175 if (fwrite(buf, offset, 1, output_file) != 1)
4176 error(1, errno, "Can not write partition to output_file");
4177 }
4178 }
4179
4180 static void convert_firmware(const char *input, const char *output)
4181 {
4182 struct flash_partition_entry flash[MAX_PARTITIONS] = {};
4183 struct flash_partition_entry *fwup_partition_table;
4184 struct flash_partition_entry *flash_file_system;
4185 struct flash_partition_entry *fwup_file_system;
4186 struct flash_partition_entry *flash_os_image;
4187 struct flash_partition_entry *fwup_os_image;
4188 struct safeloader_image_info info = {};
4189 size_t flash_table_offset;
4190 struct stat statbuf;
4191 FILE *output_file;
4192 FILE *input_file;
4193
4194 /* check input file */
4195 if (stat(input, &statbuf)) {
4196 error(1, errno, "Can not read input firmware %s", input);
4197 }
4198
4199 input_file = fopen(input, "rb");
4200 if (!input_file)
4201 error(1, 0, "Can not open input firmware %s", input);
4202
4203 output_file = fopen(output, "wb");
4204 if (!output_file)
4205 error(1, 0, "Can not open output firmware %s", output);
4206
4207 input_file = fopen(input, "rb");
4208 safeloader_parse_image(input_file, &info);
4209
4210 fwup_os_image = find_partition(info.entries, MAX_PARTITIONS,
4211 "os-image", "Error can not find os-image partition (fwup)");
4212 fwup_file_system = find_partition(info.entries, MAX_PARTITIONS,
4213 "file-system", "Error can not find file-system partition (fwup)");
4214 fwup_partition_table = find_partition(info.entries, MAX_PARTITIONS,
4215 "partition-table", "Error can not find partition-table partition");
4216
4217 /* the flash partition table has a 0x00000004 magic haeder */
4218 flash_table_offset = info.payload_offset + fwup_partition_table->base + 4;
4219 if (read_partition_table(input_file, flash_table_offset, flash, MAX_PARTITIONS, PARTITION_TABLE_FLASH) != 0)
4220 error(1, 0, "Error can not read the partition table (flash)");
4221
4222 flash_os_image = find_partition(flash, MAX_PARTITIONS,
4223 "os-image", "Error can not find os-image partition (flash)");
4224 flash_file_system = find_partition(flash, MAX_PARTITIONS,
4225 "file-system", "Error can not find file-system partition (flash)");
4226
4227 /* write os_image to 0x0 */
4228 write_partition(input_file, info.payload_offset, fwup_os_image, output_file);
4229 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
4230
4231 /* write file-system behind os_image */
4232 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
4233 write_partition(input_file, info.payload_offset, fwup_file_system, output_file);
4234
4235 fclose(output_file);
4236 fclose(input_file);
4237 }
4238
4239 int main(int argc, char *argv[]) {
4240 const char *info_image = NULL, *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
4241 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
4242 bool add_jffs2_eof = false, sysupgrade = false;
4243 unsigned rev = 0;
4244 struct device_info *info;
4245 set_source_date_epoch();
4246
4247 while (true) {
4248 int c;
4249
4250 c = getopt(argc, argv, "i:B:k:r:o:V:jSh:x:d:z:");
4251 if (c == -1)
4252 break;
4253
4254 switch (c) {
4255 case 'i':
4256 info_image = optarg;
4257 break;
4258
4259 case 'B':
4260 board = optarg;
4261 break;
4262
4263 case 'k':
4264 kernel_image = optarg;
4265 break;
4266
4267 case 'r':
4268 rootfs_image = optarg;
4269 break;
4270
4271 case 'o':
4272 output = optarg;
4273 break;
4274
4275 case 'V':
4276 sscanf(optarg, "r%u", &rev);
4277 break;
4278
4279 case 'j':
4280 add_jffs2_eof = true;
4281 break;
4282
4283 case 'S':
4284 sysupgrade = true;
4285 break;
4286
4287 case 'h':
4288 usage(argv[0]);
4289 return 0;
4290
4291 case 'd':
4292 output_directory = optarg;
4293 break;
4294
4295 case 'x':
4296 extract_image = optarg;
4297 break;
4298
4299 case 'z':
4300 convert_image = optarg;
4301 break;
4302
4303 default:
4304 usage(argv[0]);
4305 return 1;
4306 }
4307 }
4308
4309 if (info_image) {
4310 firmware_info(info_image);
4311 } else if (extract_image || output_directory) {
4312 if (!extract_image)
4313 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
4314 if (!output_directory)
4315 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
4316 extract_firmware(extract_image, output_directory);
4317 } else if (convert_image) {
4318 if (!output)
4319 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
4320 convert_firmware(convert_image, output);
4321 } else {
4322 if (!board)
4323 error(1, 0, "no board has been specified");
4324 if (!kernel_image)
4325 error(1, 0, "no kernel image has been specified");
4326 if (!rootfs_image)
4327 error(1, 0, "no rootfs image has been specified");
4328 if (!output)
4329 error(1, 0, "no output filename has been specified");
4330
4331 info = find_board(board);
4332
4333 if (info == NULL)
4334 error(1, 0, "unsupported board %s", board);
4335
4336 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
4337 }
4338
4339 return 0;
4340 }