tplink-safeloader: add RE365 v1
[project/firmware-utils.git] / src / tplink-safeloader.c
1 // SPDX-License-Identifier: BSD-2-Clause
2 /*
3 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
4 All rights reserved.
5 */
6
7
8 /*
9 tplink-safeloader
10
11 Image generation tool for the TP-LINK SafeLoader as seen on
12 TP-LINK Pharos devices (CPE210/220/510/520)
13 */
14
15
16 #include <assert.h>
17 #include <ctype.h>
18 #include <errno.h>
19 #include <stdbool.h>
20 #include <stddef.h>
21 #include <stdio.h>
22 #include <stdint.h>
23 #include <stdlib.h>
24 #include <string.h>
25 #include <time.h>
26 #include <unistd.h>
27
28 #include <arpa/inet.h>
29
30 #include <sys/types.h>
31 #include <sys/stat.h>
32 #include <limits.h>
33
34 #include "md5.h"
35
36
37 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
38
39
40 #define MAX_PARTITIONS 32
41
42 /** An image partition table entry */
43 struct image_partition_entry {
44 const char *name;
45 size_t size;
46 uint8_t *data;
47 };
48
49 /** A flash partition table entry */
50 struct flash_partition_entry {
51 const char *name;
52 uint32_t base;
53 uint32_t size;
54 };
55
56 /** Flash partition names table entry */
57 struct factory_partition_names {
58 const char *partition_table;
59 const char *soft_ver;
60 const char *os_image;
61 const char *support_list;
62 const char *file_system;
63 const char *extra_para;
64 };
65
66 /** Partition trailing padding definitions
67 * Values 0x00 to 0xff are reserved to indicate the padding value
68 * Values from 0x100 are reserved to indicate other behaviour */
69 enum partition_trail_value {
70 PART_TRAIL_00 = 0x00,
71 PART_TRAIL_FF = 0xff,
72 PART_TRAIL_MAX = 0xff,
73 PART_TRAIL_NONE = 0x100
74 };
75
76 /** soft-version value overwrite types
77 * The default (for an uninitialised soft_ver field) is to use the numerical
78 * version number "0.0.0"
79 */
80 enum soft_ver_type {
81 SOFT_VER_TYPE_NUMERIC = 0,
82 SOFT_VER_TYPE_TEXT = 1,
83 };
84
85 /** Firmware layout description */
86 struct device_info {
87 const char *id;
88 const char *vendor;
89 const char *support_list;
90 enum partition_trail_value part_trail;
91 struct {
92 enum soft_ver_type type;
93 union {
94 const char *text;
95 uint8_t num[3];
96 };
97 } soft_ver;
98 uint32_t soft_ver_compat_level;
99 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
100 const char *first_sysupgrade_partition;
101 const char *last_sysupgrade_partition;
102 struct factory_partition_names partition_names;
103 };
104
105 #define SOFT_VER_TEXT(_t) {.type = SOFT_VER_TYPE_TEXT, .text = _t}
106 #define SOFT_VER_NUMERIC(_maj, _min, _patch) { \
107 .type = SOFT_VER_TYPE_NUMERIC, \
108 .num = {_maj, _min, _patch}}
109 #define SOFT_VER_DEFAULT SOFT_VER_NUMERIC(0, 0, 0)
110
111 struct __attribute__((__packed__)) meta_header {
112 uint32_t length;
113 uint32_t zero;
114 };
115
116 /** The content of the soft-version structure */
117 struct __attribute__((__packed__)) soft_version {
118 uint8_t pad1;
119 uint8_t version_major;
120 uint8_t version_minor;
121 uint8_t version_patch;
122 uint8_t year_hi;
123 uint8_t year_lo;
124 uint8_t month;
125 uint8_t day;
126 uint32_t rev;
127 uint32_t compat_level;
128 };
129
130 /*
131 * Safeloader image type
132 * Safeloader images contain a 0x14 byte preamble with image size (big endian
133 * UINT32) and md5 checksum (16 bytes).
134 *
135 * SAFEFLOADER_TYPE_DEFAULT
136 * Standard preamble with size including preamble length, and checksum.
137 * Header of 0x1000 bytes, contents of which are not specified.
138 * Payload starts at offset 0x1014.
139 *
140 * SAFELOADER_TYPE_VENDOR
141 * Standard preamble with size including preamble length, and checksum.
142 * Header contains up to 0x1000 bytes of vendor data, starting with a big endian
143 * UINT32 size, followed by that number of bytes containing (text) data.
144 * Padded with 0xFF. Payload starts at offset 0x1014.
145 *
146 * SAFELOADER_TYPE_CLOUD
147 * Standard preamble with size including preamble length, and checksum.
148 * Followed by the 'fw-type:Cloud' string and some (unknown) data.
149 * Payload starts at offset 0x1014.
150 *
151 * SAFELOADER_TYPE_QNEW
152 * Reversed order preamble, with (apparent) md5 checksum before the image
153 * size. The size does not include the preamble length.
154 * Header starts with 0x3C bytes, starting with the string '?NEW' (format not
155 * understood). Then another 0x1000 bytes follow, with the data payload
156 * starting at 0x1050.
157 */
158 enum safeloader_image_type {
159 SAFELOADER_TYPE_DEFAULT,
160 SAFELOADER_TYPE_VENDOR,
161 SAFELOADER_TYPE_CLOUD,
162 SAFELOADER_TYPE_QNEW,
163 };
164
165 /* Internal representation of safeloader image data */
166 struct safeloader_image_info {
167 enum safeloader_image_type type;
168 size_t payload_offset;
169 struct flash_partition_entry entries[MAX_PARTITIONS];
170 };
171
172 #define SAFELOADER_PREAMBLE_SIZE 0x14
173 #define SAFELOADER_HEADER_SIZE 0x1000
174 #define SAFELOADER_PAYLOAD_OFFSET (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_HEADER_SIZE)
175
176 #define SAFELOADER_QNEW_HEADER_SIZE 0x3C
177 #define SAFELOADER_QNEW_PAYLOAD_OFFSET \
178 (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_QNEW_HEADER_SIZE + SAFELOADER_HEADER_SIZE)
179
180 #define SAFELOADER_PAYLOAD_TABLE_SIZE 0x800
181
182 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
183
184
185 /**
186 Salt for the MD5 hash
187
188 Fortunately, TP-LINK seems to use the same salt for most devices which use
189 the new image format.
190 */
191 static const uint8_t md5_salt[16] = {
192 0x7a, 0x2b, 0x15, 0xed,
193 0x9b, 0x98, 0x59, 0x6d,
194 0xe5, 0x04, 0xab, 0x44,
195 0xac, 0x2a, 0x9f, 0x4e,
196 };
197
198
199 /** Firmware layout table */
200 static struct device_info boards[] = {
201 /** Firmware layout for the CPE210/220 V1 */
202 {
203 .id = "CPE210",
204 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
205 .support_list =
206 "SupportList:\r\n"
207 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
209 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
210 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
211 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
212 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
213 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
214 .part_trail = 0xff,
215 .soft_ver = SOFT_VER_DEFAULT,
216
217 .partitions = {
218 {"fs-uboot", 0x00000, 0x20000},
219 {"partition-table", 0x20000, 0x02000},
220 {"default-mac", 0x30000, 0x00020},
221 {"product-info", 0x31100, 0x00100},
222 {"signature", 0x32000, 0x00400},
223 {"firmware", 0x40000, 0x770000},
224 {"soft-version", 0x7b0000, 0x00100},
225 {"support-list", 0x7b1000, 0x00400},
226 {"user-config", 0x7c0000, 0x10000},
227 {"default-config", 0x7d0000, 0x10000},
228 {"log", 0x7e0000, 0x10000},
229 {"radio", 0x7f0000, 0x10000},
230 {NULL, 0, 0}
231 },
232
233 .first_sysupgrade_partition = "os-image",
234 .last_sysupgrade_partition = "support-list",
235 },
236
237 /** Firmware layout for the CPE210 V2 */
238 {
239 .id = "CPE210V2",
240 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
241 .support_list =
242 "SupportList:\r\n"
243 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
244 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
245 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
246 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
247 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
248 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
249 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
250 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
251 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
252 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
253 .part_trail = 0xff,
254 .soft_ver = SOFT_VER_DEFAULT,
255
256 .partitions = {
257 {"fs-uboot", 0x00000, 0x20000},
258 {"partition-table", 0x20000, 0x02000},
259 {"default-mac", 0x30000, 0x00020},
260 {"product-info", 0x31100, 0x00100},
261 {"device-info", 0x31400, 0x00400},
262 {"signature", 0x32000, 0x00400},
263 {"device-id", 0x33000, 0x00100},
264 {"firmware", 0x40000, 0x770000},
265 {"soft-version", 0x7b0000, 0x00100},
266 {"support-list", 0x7b1000, 0x01000},
267 {"user-config", 0x7c0000, 0x10000},
268 {"default-config", 0x7d0000, 0x10000},
269 {"log", 0x7e0000, 0x10000},
270 {"radio", 0x7f0000, 0x10000},
271 {NULL, 0, 0}
272 },
273
274 .first_sysupgrade_partition = "os-image",
275 .last_sysupgrade_partition = "support-list",
276 },
277
278 /** Firmware layout for the CPE210 V3 */
279 {
280 .id = "CPE210V3",
281 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
282 .support_list =
283 "SupportList:\r\n"
284 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
285 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
286 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
287 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
288 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
289 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
290 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
291 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
292 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
293 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
294 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
295 .part_trail = 0xff,
296 .soft_ver = SOFT_VER_DEFAULT,
297
298 .partitions = {
299 {"fs-uboot", 0x00000, 0x20000},
300 {"partition-table", 0x20000, 0x01000},
301 {"default-mac", 0x30000, 0x00020},
302 {"product-info", 0x31100, 0x00100},
303 {"device-info", 0x31400, 0x00400},
304 {"signature", 0x32000, 0x00400},
305 {"device-id", 0x33000, 0x00100},
306 {"firmware", 0x40000, 0x770000},
307 {"soft-version", 0x7b0000, 0x00100},
308 {"support-list", 0x7b1000, 0x01000},
309 {"user-config", 0x7c0000, 0x10000},
310 {"default-config", 0x7d0000, 0x10000},
311 {"log", 0x7e0000, 0x10000},
312 {"radio", 0x7f0000, 0x10000},
313 {NULL, 0, 0}
314 },
315
316 .first_sysupgrade_partition = "os-image",
317 .last_sysupgrade_partition = "support-list",
318 },
319
320 /** Firmware layout for the CPE220 V2 */
321 {
322 .id = "CPE220V2",
323 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
324 .support_list =
325 "SupportList:\r\n"
326 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
327 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
328 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
329 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
330 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
331 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
332 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
333 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
334 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
335 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
336 .part_trail = 0xff,
337 .soft_ver = SOFT_VER_DEFAULT,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"firmware", 0x40000, 0x770000},
346 {"soft-version", 0x7b0000, 0x00100},
347 {"support-list", 0x7b1000, 0x00400},
348 {"user-config", 0x7c0000, 0x10000},
349 {"default-config", 0x7d0000, 0x10000},
350 {"log", 0x7e0000, 0x10000},
351 {"radio", 0x7f0000, 0x10000},
352 {NULL, 0, 0}
353 },
354
355 .first_sysupgrade_partition = "os-image",
356 .last_sysupgrade_partition = "support-list",
357 },
358
359 /** Firmware layout for the CPE220 V3 */
360 {
361 .id = "CPE220V3",
362 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
363 .support_list =
364 "SupportList:\r\n"
365 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
366 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
367 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
368 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
369 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
370 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
371 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
372 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
373 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
374 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
375 .part_trail = 0xff,
376 .soft_ver = SOFT_VER_DEFAULT,
377
378 .partitions = {
379 {"fs-uboot", 0x00000, 0x20000},
380 {"partition-table", 0x20000, 0x02000},
381 {"default-mac", 0x30000, 0x00020},
382 {"product-info", 0x31100, 0x00100},
383 {"device-info", 0x31400, 0x00400},
384 {"signature", 0x32000, 0x00400},
385 {"device-id", 0x33000, 0x00100},
386 {"firmware", 0x40000, 0x770000},
387 {"soft-version", 0x7b0000, 0x00100},
388 {"support-list", 0x7b1000, 0x01000},
389 {"user-config", 0x7c0000, 0x10000},
390 {"default-config", 0x7d0000, 0x10000},
391 {"log", 0x7e0000, 0x10000},
392 {"radio", 0x7f0000, 0x10000},
393 {NULL, 0, 0}
394 },
395
396 .first_sysupgrade_partition = "os-image",
397 .last_sysupgrade_partition = "support-list",
398 },
399
400 /** Firmware layout for the CPE510/520 V1 */
401 {
402 .id = "CPE510",
403 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
404 .support_list =
405 "SupportList:\r\n"
406 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
407 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
408 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
409 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
410 "CPE510(TP-LINK|CA|N300-5):1.1\r\n"
411 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
412 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
413 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
414 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
415 .part_trail = 0xff,
416 .soft_ver = SOFT_VER_DEFAULT,
417
418 .partitions = {
419 {"fs-uboot", 0x00000, 0x20000},
420 {"partition-table", 0x20000, 0x02000},
421 {"default-mac", 0x30000, 0x00020},
422 {"product-info", 0x31100, 0x00100},
423 {"signature", 0x32000, 0x00400},
424 {"firmware", 0x40000, 0x770000},
425 {"soft-version", 0x7b0000, 0x00100},
426 {"support-list", 0x7b1000, 0x00400},
427 {"user-config", 0x7c0000, 0x10000},
428 {"default-config", 0x7d0000, 0x10000},
429 {"log", 0x7e0000, 0x10000},
430 {"radio", 0x7f0000, 0x10000},
431 {NULL, 0, 0}
432 },
433
434 .first_sysupgrade_partition = "os-image",
435 .last_sysupgrade_partition = "support-list",
436 },
437
438 /** Firmware layout for the CPE510 V2 */
439 {
440 .id = "CPE510V2",
441 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
442 .support_list =
443 "SupportList:\r\n"
444 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
445 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
446 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
447 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
448 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
449 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
450 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
451 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
452 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
453 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
454 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
455 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
456 .part_trail = 0xff,
457 .soft_ver = SOFT_VER_DEFAULT,
458
459 .partitions = {
460 {"fs-uboot", 0x00000, 0x20000},
461 {"partition-table", 0x20000, 0x02000},
462 {"default-mac", 0x30000, 0x00020},
463 {"product-info", 0x31100, 0x00100},
464 {"signature", 0x32000, 0x00400},
465 {"firmware", 0x40000, 0x770000},
466 {"soft-version", 0x7b0000, 0x00100},
467 {"support-list", 0x7b1000, 0x00400},
468 {"user-config", 0x7c0000, 0x10000},
469 {"default-config", 0x7d0000, 0x10000},
470 {"log", 0x7e0000, 0x10000},
471 {"radio", 0x7f0000, 0x10000},
472 {NULL, 0, 0}
473 },
474
475 .first_sysupgrade_partition = "os-image",
476 .last_sysupgrade_partition = "support-list",
477 },
478
479 /** Firmware layout for the CPE510 V3 */
480 {
481 .id = "CPE510V3",
482 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
483 .support_list =
484 "SupportList:\r\n"
485 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
486 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
487 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
488 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
489 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
490 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
491 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
492 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
493 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
494 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
495 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
496 "CPE510(TP-LINK|US|N300-5):3.0\r\n"
497 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n"
498 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
499 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
500 .part_trail = 0xff,
501 .soft_ver = SOFT_VER_DEFAULT,
502
503 .partitions = {
504 {"fs-uboot", 0x00000, 0x20000},
505 {"partition-table", 0x20000, 0x02000},
506 {"default-mac", 0x30000, 0x00020},
507 {"product-info", 0x31100, 0x00100},
508 {"signature", 0x32000, 0x00400},
509 {"firmware", 0x40000, 0x770000},
510 {"soft-version", 0x7b0000, 0x00100},
511 {"support-list", 0x7b1000, 0x00400},
512 {"user-config", 0x7c0000, 0x10000},
513 {"default-config", 0x7d0000, 0x10000},
514 {"log", 0x7e0000, 0x10000},
515 {"radio", 0x7f0000, 0x10000},
516 {NULL, 0, 0}
517 },
518
519 .first_sysupgrade_partition = "os-image",
520 .last_sysupgrade_partition = "support-list",
521 },
522
523 /** Firmware layout for the CPE605V1 */
524 {
525 .id = "CPE605V1",
526 .vendor = "CPE605(TP-LINK|UN|N150-5):1.0\r\n",
527 .support_list =
528 "SupportList:\r\n"
529 "CPE605(TP-LINK|UN|N150-5|00000000):1.0\r\n"
530 "CPE605(TP-LINK|EU|N150-5|45550000):1.0\r\n"
531 "CPE605(TP-LINK|US|N150-5|55530000):1.0\r\n",
532 .part_trail = 0x00,
533 .soft_ver = SOFT_VER_DEFAULT,
534
535 .partitions = {
536 {"fs-uboot", 0x00000, 0x20000},
537 {"partition-table", 0x20000, 0x02000},
538 {"default-mac", 0x30000, 0x00020},
539 {"serial-number", 0x30100, 0x00020},
540 {"product-info", 0x31100, 0x00100},
541 {"device-info", 0x31400, 0x00400},
542 {"signature", 0x32000, 0x00400},
543 {"device-id", 0x33000, 0x00100},
544 {"firmware", 0x40000, 0x770000},
545 {"soft-version", 0x7b0000, 0x00100},
546 {"support-list", 0x7b1000, 0x01000},
547 {"user-config", 0x7c0000, 0x10000},
548 {"default-config", 0x7d0000, 0x10000},
549 {"log", 0x7e0000, 0x10000},
550 {"radio", 0x7f0000, 0x10000},
551 {NULL, 0, 0}
552 },
553
554 .first_sysupgrade_partition = "os-image",
555 .last_sysupgrade_partition = "support-list",
556 },
557
558 /** Firmware layout for the CPE610V1 */
559 {
560 .id = "CPE610V1",
561 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
562 .support_list =
563 "SupportList:\r\n"
564 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
565 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
566 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
567 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
568 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
569 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
570 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
571 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
572 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
573 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
574 .part_trail = 0xff,
575 .soft_ver = SOFT_VER_DEFAULT,
576
577 .partitions = {
578 {"fs-uboot", 0x00000, 0x20000},
579 {"partition-table", 0x20000, 0x02000},
580 {"default-mac", 0x30000, 0x00020},
581 {"product-info", 0x31100, 0x00100},
582 {"signature", 0x32000, 0x00400},
583 {"firmware", 0x40000, 0x770000},
584 {"soft-version", 0x7b0000, 0x00100},
585 {"support-list", 0x7b1000, 0x00400},
586 {"user-config", 0x7c0000, 0x10000},
587 {"default-config", 0x7d0000, 0x10000},
588 {"log", 0x7e0000, 0x10000},
589 {"radio", 0x7f0000, 0x10000},
590 {NULL, 0, 0}
591 },
592
593 .first_sysupgrade_partition = "os-image",
594 .last_sysupgrade_partition = "support-list",
595 },
596
597 /** Firmware layout for the CPE610V2 */
598 {
599 .id = "CPE610V2",
600 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
601 .support_list =
602 "SupportList:\r\n"
603 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
604 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
605 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
606 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
607 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
608 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
609 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
610 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
611 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
612 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
613 .part_trail = 0xff,
614 .soft_ver = SOFT_VER_DEFAULT,
615
616 .partitions = {
617 {"fs-uboot", 0x00000, 0x20000},
618 {"partition-table", 0x20000, 0x02000},
619 {"default-mac", 0x30000, 0x00020},
620 {"product-info", 0x31100, 0x00100},
621 {"signature", 0x32000, 0x00400},
622 {"firmware", 0x40000, 0x770000},
623 {"soft-version", 0x7b0000, 0x00100},
624 {"support-list", 0x7b1000, 0x00400},
625 {"user-config", 0x7c0000, 0x10000},
626 {"default-config", 0x7d0000, 0x10000},
627 {"log", 0x7e0000, 0x10000},
628 {"radio", 0x7f0000, 0x10000},
629 {NULL, 0, 0}
630 },
631
632 .first_sysupgrade_partition = "os-image",
633 .last_sysupgrade_partition = "support-list",
634 },
635 /** Firmware layout for the CPE710 V1 */
636 {
637 .id = "CPE710V1",
638 .vendor = "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n",
639 .support_list =
640 "SupportList:\r\n"
641 "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n"
642 "CPE710(TP-LINK|EU|AC866-5|45550000):1.0\r\n"
643 "CPE710(TP-LINK|US|AC866-5|55530000):1.0\r\n"
644 "CPE710(TP-LINK|UN|AC866-5):1.0\r\n"
645 "CPE710(TP-LINK|EU|AC866-5):1.0\r\n"
646 "CPE710(TP-LINK|US|AC866-5):1.0\r\n",
647 .part_trail = 0xff,
648 .soft_ver = SOFT_VER_DEFAULT,
649
650 .partitions = {
651 {"fs-uboot", 0x00000, 0x50000},
652 {"partition-table", 0x50000, 0x02000},
653 {"default-mac", 0x60000, 0x00020},
654 {"serial-number", 0x60100, 0x00020},
655 {"product-info", 0x61100, 0x00100},
656 {"device-info", 0x61400, 0x00400},
657 {"signature", 0x62000, 0x00400},
658 {"device-id", 0x63000, 0x00100},
659 {"firmware", 0x70000, 0xf40000},
660 {"soft-version", 0xfb0000, 0x00100},
661 {"support-list", 0xfb1000, 0x01000},
662 {"user-config", 0xfc0000, 0x10000},
663 {"default-config", 0xfd0000, 0x10000},
664 {"log", 0xfe0000, 0x10000},
665 {"radio", 0xff0000, 0x10000},
666 {NULL, 0, 0}
667 },
668
669 .first_sysupgrade_partition = "os-image",
670 .last_sysupgrade_partition = "support-list",
671 },
672
673 {
674 .id = "WBS210",
675 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
676 .support_list =
677 "SupportList:\r\n"
678 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
679 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
680 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
681 .part_trail = 0xff,
682 .soft_ver = SOFT_VER_DEFAULT,
683
684 .partitions = {
685 {"fs-uboot", 0x00000, 0x20000},
686 {"partition-table", 0x20000, 0x02000},
687 {"default-mac", 0x30000, 0x00020},
688 {"product-info", 0x31100, 0x00100},
689 {"signature", 0x32000, 0x00400},
690 {"firmware", 0x40000, 0x770000},
691 {"soft-version", 0x7b0000, 0x00100},
692 {"support-list", 0x7b1000, 0x00400},
693 {"user-config", 0x7c0000, 0x10000},
694 {"default-config", 0x7d0000, 0x10000},
695 {"log", 0x7e0000, 0x10000},
696 {"radio", 0x7f0000, 0x10000},
697 {NULL, 0, 0}
698 },
699
700 .first_sysupgrade_partition = "os-image",
701 .last_sysupgrade_partition = "support-list",
702 },
703
704 {
705 .id = "WBS210V2",
706 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
707 .support_list =
708 "SupportList:\r\n"
709 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
710 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
711 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
712 .part_trail = 0xff,
713 .soft_ver = SOFT_VER_DEFAULT,
714
715 .partitions = {
716 {"fs-uboot", 0x00000, 0x20000},
717 {"partition-table", 0x20000, 0x02000},
718 {"default-mac", 0x30000, 0x00020},
719 {"product-info", 0x31100, 0x00100},
720 {"signature", 0x32000, 0x00400},
721 {"firmware", 0x40000, 0x770000},
722 {"soft-version", 0x7b0000, 0x00100},
723 {"support-list", 0x7b1000, 0x00400},
724 {"user-config", 0x7c0000, 0x10000},
725 {"default-config", 0x7d0000, 0x10000},
726 {"log", 0x7e0000, 0x10000},
727 {"radio", 0x7f0000, 0x10000},
728 {NULL, 0, 0}
729 },
730
731 .first_sysupgrade_partition = "os-image",
732 .last_sysupgrade_partition = "support-list",
733 },
734
735 {
736 .id = "WBS510",
737 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
738 .support_list =
739 "SupportList:\r\n"
740 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
741 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
742 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
743 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
744 .part_trail = 0xff,
745 .soft_ver = SOFT_VER_DEFAULT,
746
747 .partitions = {
748 {"fs-uboot", 0x00000, 0x20000},
749 {"partition-table", 0x20000, 0x02000},
750 {"default-mac", 0x30000, 0x00020},
751 {"product-info", 0x31100, 0x00100},
752 {"signature", 0x32000, 0x00400},
753 {"firmware", 0x40000, 0x770000},
754 {"soft-version", 0x7b0000, 0x00100},
755 {"support-list", 0x7b1000, 0x00400},
756 {"user-config", 0x7c0000, 0x10000},
757 {"default-config", 0x7d0000, 0x10000},
758 {"log", 0x7e0000, 0x10000},
759 {"radio", 0x7f0000, 0x10000},
760 {NULL, 0, 0}
761 },
762
763 .first_sysupgrade_partition = "os-image",
764 .last_sysupgrade_partition = "support-list",
765 },
766
767 {
768 .id = "WBS510V2",
769 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
770 .support_list =
771 "SupportList:\r\n"
772 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
773 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
774 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
775 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
776 .part_trail = 0xff,
777 .soft_ver = SOFT_VER_DEFAULT,
778
779 .partitions = {
780 {"fs-uboot", 0x00000, 0x20000},
781 {"partition-table", 0x20000, 0x02000},
782 {"default-mac", 0x30000, 0x00020},
783 {"product-info", 0x31100, 0x00100},
784 {"signature", 0x32000, 0x00400},
785 {"firmware", 0x40000, 0x770000},
786 {"soft-version", 0x7b0000, 0x00100},
787 {"support-list", 0x7b1000, 0x00400},
788 {"user-config", 0x7c0000, 0x10000},
789 {"default-config", 0x7d0000, 0x10000},
790 {"log", 0x7e0000, 0x10000},
791 {"radio", 0x7f0000, 0x10000},
792 {NULL, 0, 0}
793 },
794
795 .first_sysupgrade_partition = "os-image",
796 .last_sysupgrade_partition = "support-list",
797 },
798
799 /** Firmware layout for the AD7200 */
800 {
801 .id = "AD7200",
802 .vendor = "",
803 .support_list =
804 "SupportList:\r\n"
805 "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
806 .part_trail = 0x00,
807 .soft_ver = SOFT_VER_DEFAULT,
808
809 .partitions = {
810 {"SBL1", 0x00000, 0x20000},
811 {"MIBIB", 0x20000, 0x20000},
812 {"SBL2", 0x40000, 0x20000},
813 {"SBL3", 0x60000, 0x30000},
814 {"DDRCONFIG", 0x90000, 0x10000},
815 {"SSD", 0xa0000, 0x10000},
816 {"TZ", 0xb0000, 0x30000},
817 {"RPM", 0xe0000, 0x20000},
818 {"fs-uboot", 0x100000, 0x70000},
819 {"uboot-env", 0x170000, 0x40000},
820 {"radio", 0x1b0000, 0x40000},
821 {"os-image", 0x1f0000, 0x400000},
822 {"file-system", 0x5f0000, 0x1900000},
823 {"default-mac", 0x1ef0000, 0x00200},
824 {"pin", 0x1ef0200, 0x00200},
825 {"device-id", 0x1ef0400, 0x00200},
826 {"product-info", 0x1ef0600, 0x0fa00},
827 {"partition-table", 0x1f00000, 0x10000},
828 {"soft-version", 0x1f10000, 0x10000},
829 {"support-list", 0x1f20000, 0x10000},
830 {"profile", 0x1f30000, 0x10000},
831 {"default-config", 0x1f40000, 0x10000},
832 {"user-config", 0x1f50000, 0x40000},
833 {"qos-db", 0x1f90000, 0x40000},
834 {"usb-config", 0x1fd0000, 0x10000},
835 {"log", 0x1fe0000, 0x20000},
836 {NULL, 0, 0}
837 },
838
839 .first_sysupgrade_partition = "os-image",
840 .last_sysupgrade_partition = "file-system"
841 },
842
843 /** Firmware layout for the C2600 */
844 {
845 .id = "C2600",
846 .vendor = "",
847 .support_list =
848 "SupportList:\r\n"
849 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
850 .part_trail = 0x00,
851 .soft_ver = SOFT_VER_DEFAULT,
852
853 /**
854 We use a bigger os-image partition than the stock images (and thus
855 smaller file-system), as our kernel doesn't fit in the stock firmware's
856 2 MB os-image since kernel 4.14.
857 */
858 .partitions = {
859 {"SBL1", 0x00000, 0x20000},
860 {"MIBIB", 0x20000, 0x20000},
861 {"SBL2", 0x40000, 0x20000},
862 {"SBL3", 0x60000, 0x30000},
863 {"DDRCONFIG", 0x90000, 0x10000},
864 {"SSD", 0xa0000, 0x10000},
865 {"TZ", 0xb0000, 0x30000},
866 {"RPM", 0xe0000, 0x20000},
867 {"fs-uboot", 0x100000, 0x70000},
868 {"uboot-env", 0x170000, 0x40000},
869 {"radio", 0x1b0000, 0x40000},
870 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
871 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
872 {"default-mac", 0x1ef0000, 0x00200},
873 {"pin", 0x1ef0200, 0x00200},
874 {"product-info", 0x1ef0400, 0x0fc00},
875 {"partition-table", 0x1f00000, 0x10000},
876 {"soft-version", 0x1f10000, 0x10000},
877 {"support-list", 0x1f20000, 0x10000},
878 {"profile", 0x1f30000, 0x10000},
879 {"default-config", 0x1f40000, 0x10000},
880 {"user-config", 0x1f50000, 0x40000},
881 {"qos-db", 0x1f90000, 0x40000},
882 {"usb-config", 0x1fd0000, 0x10000},
883 {"log", 0x1fe0000, 0x20000},
884 {NULL, 0, 0}
885 },
886
887 .first_sysupgrade_partition = "os-image",
888 .last_sysupgrade_partition = "file-system"
889 },
890
891 /** Firmware layout for the A7-V5 */
892 {
893 .id = "ARCHER-A7-V5",
894 .support_list =
895 "SupportList:\n"
896 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
897 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
898 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
899 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
900 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
901 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
902 .part_trail = 0x00,
903 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
904
905 /* We're using a dynamic kernel/rootfs split here */
906 .partitions = {
907 {"factory-boot", 0x00000, 0x20000},
908 {"fs-uboot", 0x20000, 0x20000},
909 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
910 /* Stock: name file-system base 0x160000 size 0xda0000 */
911 {"default-mac", 0xf40000, 0x00200},
912 {"pin", 0xf40200, 0x00200},
913 {"device-id", 0xf40400, 0x00100},
914 {"product-info", 0xf40500, 0x0fb00},
915 {"soft-version", 0xf50000, 0x00100},
916 {"extra-para", 0xf51000, 0x01000},
917 {"support-list", 0xf52000, 0x0a000},
918 {"profile", 0xf5c000, 0x04000},
919 {"default-config", 0xf60000, 0x10000},
920 {"user-config", 0xf70000, 0x40000},
921 {"certificate", 0xfb0000, 0x10000},
922 {"partition-table", 0xfc0000, 0x10000},
923 {"log", 0xfd0000, 0x20000},
924 {"radio", 0xff0000, 0x10000},
925 {NULL, 0, 0}
926 },
927
928 .first_sysupgrade_partition = "os-image",
929 .last_sysupgrade_partition = "file-system",
930 },
931
932 /** Firmware layout for the Archer A9 v6 */
933 {
934 .id = "ARCHER-A9-V6",
935 .support_list =
936 "SupportList:\n"
937 "{product_name:Archer A9,product_ver:6.0,special_id:55530000}\n"
938 "{product_name:Archer A9,product_ver:6.0,special_id:45550000}\n"
939 "{product_name:Archer A9,product_ver:6.0,special_id:52550000}\n"
940 "{product_name:Archer A9,product_ver:6.0,special_id:4A500000}\n"
941 "{product_name:Archer C90,product_ver:6.0,special_id:55530000}\n",
942 .part_trail = 0x00,
943 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
944
945 /* We're using a dynamic kernel/rootfs split here */
946 .partitions = {
947 {"factory-boot", 0x00000, 0x20000},
948 {"fs-uboot", 0x20000, 0x20000},
949 {"partition-table", 0x40000, 0x10000},
950 {"radio", 0x50000, 0x10000},
951 {"default-mac", 0x60000, 0x00200},
952 {"pin", 0x60200, 0x00200},
953 {"device-id", 0x60400, 0x00100},
954 {"product-info", 0x60500, 0x0fb00},
955 {"soft-version", 0x70000, 0x01000},
956 {"extra-para", 0x71000, 0x01000},
957 {"support-list", 0x72000, 0x0a000},
958 {"profile", 0x7c000, 0x04000},
959 {"user-config", 0x80000, 0x10000},
960 {"ap-config", 0x90000, 0x10000},
961 {"apdef-config", 0xa0000, 0x10000},
962 {"router-config", 0xb0000, 0x10000},
963 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
964 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
965 {"log", 0xfc0000, 0x20000},
966 {"certificate", 0xfe0000, 0x10000},
967 {"default-config", 0xff0000, 0x10000},
968 {NULL, 0, 0}
969 },
970
971 .first_sysupgrade_partition = "os-image",
972 .last_sysupgrade_partition = "file-system",
973 },
974
975 /** Firmware layout for the Archer AX23 v1 */
976 {
977 .id = "ARCHER-AX23-V1",
978 .vendor = "",
979 .support_list =
980 "SupportList:\n"
981 "{product_name:Archer AX23,product_ver:1.0,special_id:45550000}\n"
982 "{product_name:Archer AX23,product_ver:1.0,special_id:4A500000}\n"
983 "{product_name:Archer AX23,product_ver:1.0,special_id:4B520000}\n"
984 "{product_name:Archer AX23,product_ver:1.0,special_id:52550000}\n"
985 "{product_name:Archer AX23,product_ver:1.0.0,special_id:43410000}\n"
986 "{product_name:Archer AX23,product_ver:1.0.0,special_id:54570000}\n"
987 "{product_name:Archer AX23,product_ver:1.0.0,special_id:55530000}\n"
988 "{product_name:Archer AX23,product_ver:1.20,special_id:45550000}\n"
989 "{product_name:Archer AX23,product_ver:1.20,special_id:4A500000}\n"
990 "{product_name:Archer AX23,product_ver:1.20,special_id:52550000}\n"
991 "{product_name:Archer AX23,product_ver:1.20,special_id:55530000}\n"
992 "{product_name:Archer AX1800,product_ver:1.20,special_id:45550000}\n"
993 "{product_name:Archer AX1800,product_ver:1.20,special_id:52550000}\n",
994 .part_trail = 0x00,
995 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.3\n"),
996
997 .partitions = {
998 {"fs-uboot", 0x00000, 0x40000},
999 {"firmware", 0x40000, 0xf60000},
1000 {"default-mac", 0xfa0000, 0x00200},
1001 {"pin", 0xfa0200, 0x00100},
1002 {"device-id", 0xfa0300, 0x00100},
1003 {"product-info", 0xfa0400, 0x0fc00},
1004 {"default-config", 0xfb0000, 0x08000},
1005 {"ap-def-config", 0xfb8000, 0x08000},
1006 {"user-config", 0xfc0000, 0x0a000},
1007 {"ag-config", 0xfca000, 0x04000},
1008 {"certificate", 0xfce000, 0x02000},
1009 {"ap-config", 0xfd0000, 0x06000},
1010 {"router-config", 0xfd6000, 0x06000},
1011 {"favicon", 0xfdc000, 0x02000},
1012 {"logo", 0xfde000, 0x02000},
1013 {"partition-table", 0xfe0000, 0x00800},
1014 {"soft-version", 0xfe0800, 0x00100},
1015 {"support-list", 0xfe0900, 0x00400},
1016 {"profile", 0xfe0d00, 0x03000},
1017 {"extra-para", 0xfe3d00, 0x00100},
1018 {"radio", 0xff0000, 0x10000},
1019 {NULL, 0, 0}
1020 },
1021 .first_sysupgrade_partition = "os-image",
1022 .last_sysupgrade_partition = "file-system",
1023 },
1024 /** Firmware layout for the C2v3 */
1025 {
1026 .id = "ARCHER-C2-V3",
1027 .support_list =
1028 "SupportList:\n"
1029 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
1030 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
1031 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
1032 .part_trail = 0x00,
1033 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.1\n"),
1034
1035 /** We're using a dynamic kernel/rootfs split here */
1036
1037 .partitions = {
1038 {"factory-boot", 0x00000, 0x20000},
1039 {"fs-uboot", 0x20000, 0x10000},
1040 {"firmware", 0x30000, 0x7a0000},
1041 {"user-config", 0x7d0000, 0x04000},
1042 {"default-mac", 0x7e0000, 0x00100},
1043 {"device-id", 0x7e0100, 0x00100},
1044 {"extra-para", 0x7e0200, 0x00100},
1045 {"pin", 0x7e0300, 0x00100},
1046 {"support-list", 0x7e0400, 0x00400},
1047 {"soft-version", 0x7e0800, 0x00400},
1048 {"product-info", 0x7e0c00, 0x01400},
1049 {"partition-table", 0x7e2000, 0x01000},
1050 {"profile", 0x7e3000, 0x01000},
1051 {"default-config", 0x7e4000, 0x04000},
1052 {"merge-config", 0x7ec000, 0x02000},
1053 {"qos-db", 0x7ee000, 0x02000},
1054 {"radio", 0x7f0000, 0x10000},
1055 {NULL, 0, 0}
1056 },
1057
1058 .first_sysupgrade_partition = "os-image",
1059 .last_sysupgrade_partition = "file-system",
1060 },
1061
1062 /** Firmware layout for the C25v1 */
1063 {
1064 .id = "ARCHER-C25-V1",
1065 .support_list =
1066 "SupportList:\n"
1067 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
1068 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
1069 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
1070 .part_trail = 0x00,
1071 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1072
1073 /* We're using a dynamic kernel/rootfs split here */
1074 .partitions = {
1075 {"factory-boot", 0x00000, 0x20000},
1076 {"fs-uboot", 0x20000, 0x10000},
1077 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
1078 /* Stock: name file-system base 0x130000 size 0x6a0000 */
1079 {"user-config", 0x7d0000, 0x04000},
1080 {"default-mac", 0x7e0000, 0x00100},
1081 {"device-id", 0x7e0100, 0x00100},
1082 {"extra-para", 0x7e0200, 0x00100},
1083 {"pin", 0x7e0300, 0x00100},
1084 {"support-list", 0x7e0400, 0x00400},
1085 {"soft-version", 0x7e0800, 0x00400},
1086 {"product-info", 0x7e0c00, 0x01400},
1087 {"partition-table", 0x7e2000, 0x01000},
1088 {"profile", 0x7e3000, 0x01000},
1089 {"default-config", 0x7e4000, 0x04000},
1090 {"merge-config", 0x7ec000, 0x02000},
1091 {"qos-db", 0x7ee000, 0x02000},
1092 {"radio", 0x7f0000, 0x10000},
1093 {NULL, 0, 0}
1094 },
1095
1096 .first_sysupgrade_partition = "os-image",
1097 .last_sysupgrade_partition = "file-system",
1098 },
1099
1100 /** Firmware layout for the C58v1 */
1101 {
1102 .id = "ARCHER-C58-V1",
1103 .vendor = "",
1104 .support_list =
1105 "SupportList:\r\n"
1106 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
1107 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
1108 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
1109 .part_trail = 0x00,
1110 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1111
1112 .partitions = {
1113 {"fs-uboot", 0x00000, 0x10000},
1114 {"default-mac", 0x10000, 0x00200},
1115 {"pin", 0x10200, 0x00200},
1116 {"product-info", 0x10400, 0x00100},
1117 {"partition-table", 0x10500, 0x00800},
1118 {"soft-version", 0x11300, 0x00200},
1119 {"support-list", 0x11500, 0x00100},
1120 {"device-id", 0x11600, 0x00100},
1121 {"profile", 0x11700, 0x03900},
1122 {"default-config", 0x15000, 0x04000},
1123 {"user-config", 0x19000, 0x04000},
1124 {"firmware", 0x20000, 0x7c8000},
1125 {"certyficate", 0x7e8000, 0x08000},
1126 {"radio", 0x7f0000, 0x10000},
1127 {NULL, 0, 0}
1128 },
1129
1130 .first_sysupgrade_partition = "os-image",
1131 .last_sysupgrade_partition = "file-system",
1132 },
1133
1134 /** Firmware layout for the C59v1 */
1135 {
1136 .id = "ARCHER-C59-V1",
1137 .vendor = "",
1138 .support_list =
1139 "SupportList:\r\n"
1140 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
1141 "{product_name:Archer C59,product_ver:1.0.0,special_id:43410000}\r\n"
1142 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
1143 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
1144 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
1145 .part_trail = 0x00,
1146 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1147
1148 /* We're using a dynamic kernel/rootfs split here */
1149 .partitions = {
1150 {"fs-uboot", 0x00000, 0x10000},
1151 {"default-mac", 0x10000, 0x00200},
1152 {"pin", 0x10200, 0x00200},
1153 {"device-id", 0x10400, 0x00100},
1154 {"product-info", 0x10500, 0x0fb00},
1155 {"firmware", 0x20000, 0xe30000},
1156 {"partition-table", 0xe50000, 0x10000},
1157 {"soft-version", 0xe60000, 0x10000},
1158 {"support-list", 0xe70000, 0x10000},
1159 {"profile", 0xe80000, 0x10000},
1160 {"default-config", 0xe90000, 0x10000},
1161 {"user-config", 0xea0000, 0x40000},
1162 {"usb-config", 0xee0000, 0x10000},
1163 {"certificate", 0xef0000, 0x10000},
1164 {"qos-db", 0xf00000, 0x40000},
1165 {"log", 0xfe0000, 0x10000},
1166 {"radio", 0xff0000, 0x10000},
1167 {NULL, 0, 0}
1168 },
1169
1170 .first_sysupgrade_partition = "os-image",
1171 .last_sysupgrade_partition = "file-system",
1172 },
1173
1174 /** Firmware layout for the C59v2 */
1175 {
1176 .id = "ARCHER-C59-V2",
1177 .vendor = "",
1178 .support_list =
1179 "SupportList:\r\n"
1180 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
1181 "{product_name:Archer C59,product_ver:2.0.0,special_id:43410000}\r\n"
1182 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
1183 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
1184 .part_trail = 0x00,
1185 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0 Build 20161206 rel.7303\n"),
1186
1187 /** We're using a dynamic kernel/rootfs split here */
1188 .partitions = {
1189 {"factory-boot", 0x00000, 0x20000},
1190 {"fs-uboot", 0x20000, 0x10000},
1191 {"default-mac", 0x30000, 0x00200},
1192 {"pin", 0x30200, 0x00200},
1193 {"device-id", 0x30400, 0x00100},
1194 {"product-info", 0x30500, 0x0fb00},
1195 {"firmware", 0x40000, 0xe10000},
1196 {"partition-table", 0xe50000, 0x10000},
1197 {"soft-version", 0xe60000, 0x10000},
1198 {"support-list", 0xe70000, 0x10000},
1199 {"profile", 0xe80000, 0x10000},
1200 {"default-config", 0xe90000, 0x10000},
1201 {"user-config", 0xea0000, 0x40000},
1202 {"usb-config", 0xee0000, 0x10000},
1203 {"certificate", 0xef0000, 0x10000},
1204 {"extra-para", 0xf00000, 0x10000},
1205 {"qos-db", 0xf10000, 0x30000},
1206 {"log", 0xfe0000, 0x10000},
1207 {"radio", 0xff0000, 0x10000},
1208 {NULL, 0, 0}
1209 },
1210
1211 .first_sysupgrade_partition = "os-image",
1212 .last_sysupgrade_partition = "file-system",
1213 },
1214
1215 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
1216 {
1217 .id = "ARCHER-C6-V2",
1218 .vendor = "",
1219 .support_list =
1220 "SupportList:\r\n"
1221 "{product_name:Archer A6,product_ver:2.0.0,special_id:45550000}\r\n"
1222 "{product_name:Archer A6,product_ver:2.0.0,special_id:52550000}\r\n"
1223 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
1224 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
1225 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
1226 .part_trail = 0x00,
1227 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1228
1229 .partitions = {
1230 {"fs-uboot", 0x00000, 0x20000},
1231 {"default-mac", 0x20000, 0x00200},
1232 {"pin", 0x20200, 0x00100},
1233 {"product-info", 0x20300, 0x00200},
1234 {"device-id", 0x20500, 0x0fb00},
1235 {"firmware", 0x30000, 0x7a9400},
1236 {"soft-version", 0x7d9400, 0x00100},
1237 {"extra-para", 0x7d9500, 0x00100},
1238 {"support-list", 0x7d9600, 0x00200},
1239 {"profile", 0x7d9800, 0x03000},
1240 {"default-config", 0x7dc800, 0x03000},
1241 {"partition-table", 0x7df800, 0x00800},
1242 {"user-config", 0x7e0000, 0x0c000},
1243 {"certificate", 0x7ec000, 0x04000},
1244 {"radio", 0x7f0000, 0x10000},
1245 {NULL, 0, 0}
1246 },
1247
1248 .first_sysupgrade_partition = "os-image",
1249 .last_sysupgrade_partition = "file-system",
1250 },
1251
1252 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
1253 {
1254 .id = "ARCHER-C6-V2-US",
1255 .vendor = "",
1256 .support_list =
1257 "SupportList:\n"
1258 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
1259 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
1260 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
1261 .part_trail = 0x00,
1262 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1263
1264 .partitions = {
1265 {"factory-boot", 0x00000, 0x20000},
1266 {"default-mac", 0x20000, 0x00200},
1267 {"pin", 0x20200, 0x00100},
1268 {"product-info", 0x20300, 0x00200},
1269 {"device-id", 0x20500, 0x0fb00},
1270 {"fs-uboot", 0x30000, 0x20000},
1271 {"firmware", 0x50000, 0xf89400},
1272 {"soft-version", 0xfd9400, 0x00100},
1273 {"extra-para", 0xfd9500, 0x00100},
1274 {"support-list", 0xfd9600, 0x00200},
1275 {"profile", 0xfd9800, 0x03000},
1276 {"default-config", 0xfdc800, 0x03000},
1277 {"partition-table", 0xfdf800, 0x00800},
1278 {"user-config", 0xfe0000, 0x0c000},
1279 {"certificate", 0xfec000, 0x04000},
1280 {"radio", 0xff0000, 0x10000},
1281 {NULL, 0, 0}
1282 },
1283 .first_sysupgrade_partition = "os-image",
1284 .last_sysupgrade_partition = "file-system",
1285 },
1286 /** Firmware layout for the Archer C6 v3 */
1287 {
1288 .id = "ARCHER-C6-V3",
1289 .vendor = "",
1290 .support_list =
1291 "SupportList:\n"
1292 "{product_name:Archer C6,product_ver:3.20,special_id:55530000}"
1293 "{product_name:Archer C6,product_ver:3.20,special_id:45550000}"
1294 "{product_name:Archer C6,product_ver:3.20,special_id:52550000}"
1295 "{product_name:Archer C6,product_ver:3.20,special_id:4A500000}"
1296 "{product_name:Archer C6,product_ver:3.20,special_id:4B520000}"
1297 "{product_name:Archer C6,product_ver:3.0.0,special_id:42520000}",
1298 .part_trail = 0x00,
1299 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.9\n"),
1300
1301 .partitions = {
1302 {"fs-uboot", 0x00000, 0x40000},
1303 {"firmware", 0x40000, 0xf60000},
1304 {"default-mac", 0xfa0000, 0x00200},
1305 {"pin", 0xfa0200, 0x00100},
1306 {"device-id", 0xfa0300, 0x00100},
1307 {"product-info", 0xfa0400, 0x0fc00},
1308 {"default-config", 0xfb0000, 0x08000},
1309 {"ap-def-config", 0xfb8000, 0x08000},
1310 {"user-config", 0xfc0000, 0x0a000},
1311 {"ag-config", 0xfca000, 0x04000},
1312 {"certificate", 0xfce000, 0x02000},
1313 {"ap-config", 0xfd0000, 0x06000},
1314 {"router-config", 0xfd6000, 0x06000},
1315 {"favicon", 0xfdc000, 0x02000},
1316 {"logo", 0xfde000, 0x02000},
1317 {"partition-table", 0xfe0000, 0x00800},
1318 {"soft-version", 0xfe0800, 0x00100},
1319 {"support-list", 0xfe0900, 0x00200},
1320 {"profile", 0xfe0b00, 0x03000},
1321 {"extra-para", 0xfe3b00, 0x00100},
1322 {"radio", 0xff0000, 0x10000},
1323 {NULL, 0, 0}
1324 },
1325 .first_sysupgrade_partition = "os-image",
1326 .last_sysupgrade_partition = "file-system",
1327 },
1328 /** Firmware layout for the Archer A6 v3 */
1329 {
1330 .id = "ARCHER-A6-V3",
1331 .vendor = "",
1332 .support_list =
1333 "SupportList:\n"
1334 "{product_name:Archer A6,product_ver:3.0.0,special_id:43410000}\n"
1335 "{product_name:Archer A6,product_ver:3.0.0,special_id:55530000}\n"
1336 "{product_name:Archer A6,product_ver:3.0.0,special_id:54570000}\n"
1337 "{product_name:Archer A6,product_ver:3.0.0,special_id:4A500000}\n"
1338 "{product_name:Archer A6,product_ver:3.20,special_id:45550000}\n"
1339 "{product_name:Archer A6,product_ver:3.20,special_id:52550000}\n",
1340 .part_trail = 0x00,
1341 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.5\n"),
1342
1343 .partitions = {
1344 {"fs-uboot", 0x00000, 0x40000},
1345 {"firmware", 0x40000, 0xf60000},
1346 {"default-mac", 0xfa0000, 0x00200},
1347 {"pin", 0xfa0200, 0x00100},
1348 {"device-id", 0xfa0300, 0x00100},
1349 {"product-info", 0xfa0400, 0x0fc00},
1350 {"default-config", 0xfb0000, 0x08000},
1351 {"ap-def-config", 0xfb8000, 0x08000},
1352 {"user-config", 0xfc0000, 0x0a000},
1353 {"ag-config", 0xfca000, 0x04000},
1354 {"certificate", 0xfce000, 0x02000},
1355 {"ap-config", 0xfd0000, 0x06000},
1356 {"router-config", 0xfd6000, 0x06000},
1357 {"favicon", 0xfdc000, 0x02000},
1358 {"logo", 0xfde000, 0x02000},
1359 {"partition-table", 0xfe0000, 0x00800},
1360 {"soft-version", 0xfe0800, 0x00100},
1361 {"support-list", 0xfe0900, 0x00200},
1362 {"profile", 0xfe0b00, 0x03000},
1363 {"extra-para", 0xfe3b00, 0x00100},
1364 {"radio", 0xff0000, 0x10000},
1365 {NULL, 0, 0}
1366 },
1367 .first_sysupgrade_partition = "os-image",
1368 .last_sysupgrade_partition = "file-system",
1369 },
1370 /** Firmware layout for the Archer C6U v1 */
1371 {
1372 .id = "ARCHER-C6U-V1",
1373 .vendor = "",
1374 .support_list =
1375 "SupportList:\n"
1376 "{product_name:Archer C6U,product_ver:1.0.0,special_id:45550000}\n"
1377 "{product_name:Archer C6U,product_ver:1.0.0,special_id:52550000}\n",
1378 .part_trail = 0x00,
1379 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.2\n"),
1380
1381 .partitions = {
1382 {"fs-uboot", 0x00000, 0x40000},
1383 {"firmware", 0x40000, 0xf60000},
1384 {"default-mac", 0xfa0000, 0x00200},
1385 {"pin", 0xfa0200, 0x00100},
1386 {"device-id", 0xfa0300, 0x00100},
1387 {"product-info", 0xfa0400, 0x0fc00},
1388 {"default-config", 0xfb0000, 0x08000},
1389 {"ap-def-config", 0xfb8000, 0x08000},
1390 {"user-config", 0xfc0000, 0x0c000},
1391 {"certificate", 0xfcc000, 0x04000},
1392 {"ap-config", 0xfd0000, 0x08000},
1393 {"router-config", 0xfd8000, 0x08000},
1394 {"partition-table", 0xfe0000, 0x00800},
1395 {"soft-version", 0xfe0800, 0x00100},
1396 {"support-list", 0xfe0900, 0x00200},
1397 {"profile", 0xfe0b00, 0x03000},
1398 {"extra-para", 0xfe3b00, 0x00100},
1399 {"radio", 0xff0000, 0x10000},
1400 {NULL, 0, 0}
1401 },
1402 .first_sysupgrade_partition = "os-image",
1403 .last_sysupgrade_partition = "file-system",
1404 },
1405 /** Firmware layout for the C60v1 */
1406 {
1407 .id = "ARCHER-C60-V1",
1408 .vendor = "",
1409 .support_list =
1410 "SupportList:\r\n"
1411 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1412 "{product_name:Archer C60,product_ver:1.0.0,special_id:43410000}\r\n"
1413 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1414 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1415 .part_trail = 0x00,
1416 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1417
1418 .partitions = {
1419 {"fs-uboot", 0x00000, 0x10000},
1420 {"default-mac", 0x10000, 0x00200},
1421 {"pin", 0x10200, 0x00200},
1422 {"product-info", 0x10400, 0x00100},
1423 {"partition-table", 0x10500, 0x00800},
1424 {"soft-version", 0x11300, 0x00200},
1425 {"support-list", 0x11500, 0x00100},
1426 {"device-id", 0x11600, 0x00100},
1427 {"profile", 0x11700, 0x03900},
1428 {"default-config", 0x15000, 0x04000},
1429 {"user-config", 0x19000, 0x04000},
1430 {"firmware", 0x20000, 0x7c8000},
1431 {"certyficate", 0x7e8000, 0x08000},
1432 {"radio", 0x7f0000, 0x10000},
1433 {NULL, 0, 0}
1434 },
1435
1436 .first_sysupgrade_partition = "os-image",
1437 .last_sysupgrade_partition = "file-system",
1438 },
1439
1440 /** Firmware layout for the C60v2 */
1441 {
1442 .id = "ARCHER-C60-V2",
1443 .vendor = "",
1444 .support_list =
1445 "SupportList:\r\n"
1446 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1447 "{product_name:Archer C60,product_ver:2.0.0,special_id:43410000}\r\n"
1448 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1449 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1450 .part_trail = 0x00,
1451 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
1452
1453 .partitions = {
1454 {"factory-boot", 0x00000, 0x1fb00},
1455 {"default-mac", 0x1fb00, 0x00200},
1456 {"pin", 0x1fd00, 0x00100},
1457 {"product-info", 0x1fe00, 0x00100},
1458 {"device-id", 0x1ff00, 0x00100},
1459 {"fs-uboot", 0x20000, 0x10000},
1460 {"firmware", 0x30000, 0x7a0000},
1461 {"soft-version", 0x7d9500, 0x00100},
1462 {"support-list", 0x7d9600, 0x00100},
1463 {"extra-para", 0x7d9700, 0x00100},
1464 {"profile", 0x7d9800, 0x03000},
1465 {"default-config", 0x7dc800, 0x03000},
1466 {"partition-table", 0x7df800, 0x00800},
1467 {"user-config", 0x7e0000, 0x0c000},
1468 {"certificate", 0x7ec000, 0x04000},
1469 {"radio", 0x7f0000, 0x10000},
1470 {NULL, 0, 0}
1471 },
1472
1473 .first_sysupgrade_partition = "os-image",
1474 .last_sysupgrade_partition = "file-system",
1475 },
1476
1477 /** Firmware layout for the C60v3 */
1478 {
1479 .id = "ARCHER-C60-V3",
1480 .vendor = "",
1481 .support_list =
1482 "SupportList:\r\n"
1483 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1484 "{product_name:Archer C60,product_ver:3.0.0,special_id:43410000}\r\n"
1485 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1486 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1487 .part_trail = 0x00,
1488 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.0\n"),
1489
1490 .partitions = {
1491 {"factory-boot", 0x00000, 0x1fb00},
1492 {"default-mac", 0x1fb00, 0x00200},
1493 {"pin", 0x1fd00, 0x00100},
1494 {"product-info", 0x1fe00, 0x00100},
1495 {"device-id", 0x1ff00, 0x00100},
1496 {"fs-uboot", 0x20000, 0x10000},
1497 {"firmware", 0x30000, 0x7a0000},
1498 {"soft-version", 0x7d9500, 0x00100},
1499 {"support-list", 0x7d9600, 0x00100},
1500 {"extra-para", 0x7d9700, 0x00100},
1501 {"profile", 0x7d9800, 0x03000},
1502 {"default-config", 0x7dc800, 0x03000},
1503 {"partition-table", 0x7df800, 0x00800},
1504 {"user-config", 0x7e0000, 0x0c000},
1505 {"certificate", 0x7ec000, 0x04000},
1506 {"radio", 0x7f0000, 0x10000},
1507 {NULL, 0, 0}
1508 },
1509
1510 .first_sysupgrade_partition = "os-image",
1511 .last_sysupgrade_partition = "file-system",
1512 },
1513
1514 /** Firmware layout for the C5 */
1515 {
1516 .id = "ARCHER-C5-V2",
1517 .vendor = "",
1518 .support_list =
1519 "SupportList:\r\n"
1520 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1521 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1522 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1523 .part_trail = 0x00,
1524 .soft_ver = SOFT_VER_DEFAULT,
1525
1526 .partitions = {
1527 {"fs-uboot", 0x00000, 0x40000},
1528 {"os-image", 0x40000, 0x200000},
1529 {"file-system", 0x240000, 0xc00000},
1530 {"default-mac", 0xe40000, 0x00200},
1531 {"pin", 0xe40200, 0x00200},
1532 {"product-info", 0xe40400, 0x00200},
1533 {"partition-table", 0xe50000, 0x10000},
1534 {"soft-version", 0xe60000, 0x00200},
1535 {"support-list", 0xe61000, 0x0f000},
1536 {"profile", 0xe70000, 0x10000},
1537 {"default-config", 0xe80000, 0x10000},
1538 {"user-config", 0xe90000, 0x50000},
1539 {"log", 0xee0000, 0x100000},
1540 {"radio_bk", 0xfe0000, 0x10000},
1541 {"radio", 0xff0000, 0x10000},
1542 {NULL, 0, 0}
1543 },
1544
1545 .first_sysupgrade_partition = "os-image",
1546 .last_sysupgrade_partition = "file-system"
1547 },
1548
1549 /** Firmware layout for the C7 */
1550 {
1551 .id = "ARCHER-C7-V4",
1552 .support_list =
1553 "SupportList:\n"
1554 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1555 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1556 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1557 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1558 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1559 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1560 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1561 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1562 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1563 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1564 .part_trail = 0x00,
1565 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1566
1567 /* We're using a dynamic kernel/rootfs split here */
1568 .partitions = {
1569 {"factory-boot", 0x00000, 0x20000},
1570 {"fs-uboot", 0x20000, 0x20000},
1571 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1572 /* Stock: name file-system base 0x160000 size 0xda0000 */
1573 {"default-mac", 0xf00000, 0x00200},
1574 {"pin", 0xf00200, 0x00200},
1575 {"device-id", 0xf00400, 0x00100},
1576 {"product-info", 0xf00500, 0x0fb00},
1577 {"soft-version", 0xf10000, 0x00100},
1578 {"extra-para", 0xf11000, 0x01000},
1579 {"support-list", 0xf12000, 0x0a000},
1580 {"profile", 0xf1c000, 0x04000},
1581 {"default-config", 0xf20000, 0x10000},
1582 {"user-config", 0xf30000, 0x40000},
1583 {"qos-db", 0xf70000, 0x40000},
1584 {"certificate", 0xfb0000, 0x10000},
1585 {"partition-table", 0xfc0000, 0x10000},
1586 {"log", 0xfd0000, 0x20000},
1587 {"radio", 0xff0000, 0x10000},
1588 {NULL, 0, 0}
1589 },
1590
1591 .first_sysupgrade_partition = "os-image",
1592 .last_sysupgrade_partition = "file-system",
1593 },
1594
1595 /** Firmware layout for the C7 v5*/
1596 {
1597 .id = "ARCHER-C7-V5",
1598 .support_list =
1599 "SupportList:\n"
1600 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1601 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1602 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1603 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1604 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1605 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1606 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1607 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1608
1609 .part_trail = 0x00,
1610 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
1611
1612 /* We're using a dynamic kernel/rootfs split here */
1613 .partitions = {
1614 {"factory-boot", 0x00000, 0x20000},
1615 {"fs-uboot", 0x20000, 0x20000},
1616 {"partition-table", 0x40000, 0x10000},
1617 {"radio", 0x50000, 0x10000},
1618 {"default-mac", 0x60000, 0x00200},
1619 {"pin", 0x60200, 0x00200},
1620 {"device-id", 0x60400, 0x00100},
1621 {"product-info", 0x60500, 0x0fb00},
1622 {"soft-version", 0x70000, 0x01000},
1623 {"extra-para", 0x71000, 0x01000},
1624 {"support-list", 0x72000, 0x0a000},
1625 {"profile", 0x7c000, 0x04000},
1626 {"user-config", 0x80000, 0x40000},
1627
1628
1629 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1630 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1631
1632 {"log", 0xfc0000, 0x20000},
1633 {"certificate", 0xfe0000, 0x10000},
1634 {"default-config", 0xff0000, 0x10000},
1635 {NULL, 0, 0}
1636
1637 },
1638
1639 .first_sysupgrade_partition = "os-image",
1640 .last_sysupgrade_partition = "file-system",
1641 },
1642
1643 /** Firmware layout for the C9 */
1644 {
1645 .id = "ARCHERC9",
1646 .vendor = "",
1647 .support_list =
1648 "SupportList:\n"
1649 "{product_name:ArcherC9,"
1650 "product_ver:1.0.0,"
1651 "special_id:00000000}\n",
1652 .part_trail = 0x00,
1653 .soft_ver = SOFT_VER_DEFAULT,
1654
1655 .partitions = {
1656 {"fs-uboot", 0x00000, 0x40000},
1657 {"os-image", 0x40000, 0x200000},
1658 {"file-system", 0x240000, 0xc00000},
1659 {"default-mac", 0xe40000, 0x00200},
1660 {"pin", 0xe40200, 0x00200},
1661 {"product-info", 0xe40400, 0x00200},
1662 {"partition-table", 0xe50000, 0x10000},
1663 {"soft-version", 0xe60000, 0x00200},
1664 {"support-list", 0xe61000, 0x0f000},
1665 {"profile", 0xe70000, 0x10000},
1666 {"default-config", 0xe80000, 0x10000},
1667 {"user-config", 0xe90000, 0x50000},
1668 {"log", 0xee0000, 0x100000},
1669 {"radio_bk", 0xfe0000, 0x10000},
1670 {"radio", 0xff0000, 0x10000},
1671 {NULL, 0, 0}
1672 },
1673
1674 .first_sysupgrade_partition = "os-image",
1675 .last_sysupgrade_partition = "file-system"
1676 },
1677
1678 /** Firmware layout for the Deco M4R v1 and v2 */
1679 {
1680 .id = "DECO-M4R-V1",
1681 .vendor = "",
1682 .support_list =
1683 "SupportList:\n"
1684 "{product_name:M4R,product_ver:1.0.0,special_id:55530000}\n"
1685 "{product_name:M4R,product_ver:1.0.0,special_id:45550000}\n"
1686 "{product_name:M4R,product_ver:1.0.0,special_id:43410000}\n"
1687 "{product_name:M4R,product_ver:1.0.0,special_id:4A500000}\n"
1688 "{product_name:M4R,product_ver:1.0.0,special_id:41550000}\n"
1689 "{product_name:M4R,product_ver:1.0.0,special_id:4B520000}\n"
1690 "{product_name:M4R,product_ver:1.0.0,special_id:49440000}\n"
1691 "{product_name:M4R,product_ver:2.0.0,special_id:55530000}\n"
1692 "{product_name:M4R,product_ver:2.0.0,special_id:45550000}\n"
1693 "{product_name:M4R,product_ver:2.0.0,special_id:43410000}\n"
1694 "{product_name:M4R,product_ver:2.0.0,special_id:4A500000}\n"
1695 "{product_name:M4R,product_ver:2.0.0,special_id:41550000}\n"
1696 "{product_name:M4R,product_ver:2.0.0,special_id:4B520000}\n"
1697 "{product_name:M4R,product_ver:2.0.0,special_id:54570000}\n"
1698 "{product_name:M4R,product_ver:2.0.0,special_id:42340000}\n"
1699 "{product_name:M4R,product_ver:2.0.0,special_id:49440000}\n",
1700 .part_trail = 0x00,
1701 .soft_ver = SOFT_VER_DEFAULT,
1702
1703 .partitions = {
1704 {"fs-uboot", 0x00000, 0x80000},
1705 {"firmware", 0x80000, 0xe00000},
1706 {"product-info", 0xe80000, 0x05000},
1707 {"default-mac", 0xe85000, 0x01000},
1708 {"device-id", 0xe86000, 0x01000},
1709 {"support-list", 0xe87000, 0x10000},
1710 {"user-config", 0xea7000, 0x10000},
1711 {"device-config", 0xeb7000, 0x10000},
1712 {"group-info", 0xec7000, 0x10000},
1713 {"partition-table", 0xed7000, 0x02000},
1714 {"soft-version", 0xed9000, 0x10000},
1715 {"profile", 0xee9000, 0x10000},
1716 {"default-config", 0xef9000, 0x10000},
1717 {"url-sig", 0xfe0000, 0x10000},
1718 {"radio", 0xff0000, 0x10000},
1719 {NULL, 0, 0}
1720 },
1721 .first_sysupgrade_partition = "os-image",
1722 .last_sysupgrade_partition = "file-system",
1723 },
1724
1725 /** Firmware layout for the Deco M4R v4 */
1726 {
1727 .id = "DECO-M4R-V4",
1728 .vendor = "",
1729 .support_list =
1730 "SupportList:\n"
1731 "{product_name:M4R,product_ver:4.0.0,special_id:55530000}\n"
1732 "{product_name:M4R,product_ver:4.0.0,special_id:45550000}\n"
1733 "{product_name:M4R,product_ver:4.0.0,special_id:4A500000}\n"
1734 "{product_name:M4R,product_ver:4.0.0,special_id:42340000}\n"
1735 "{product_name:M4R,product_ver:4.0.0,special_id:5A470000}\n",
1736 .part_trail = 0x00,
1737 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1738
1739 .partitions = {
1740 {"fs-uboot", 0x00000, 0x40000},
1741 {"firmware", 0x40000, 0xf60000},
1742 {"default-mac", 0xfa0000, 0x00300},
1743 {"device-id", 0xfa0300, 0x00100},
1744 {"product-info", 0xfa0400, 0x0fc00},
1745 {"group-info", 0xfb0000, 0x04000},
1746 {"user-config", 0xfb4000, 0x0c000},
1747 {"device-config", 0xfc0000, 0x10000},
1748 {"default-config", 0xfd0000, 0x10000},
1749 {"partition-table", 0xfe0000, 0x00800},
1750 {"soft-version", 0xfe0800, 0x00100},
1751 {"support-list", 0xfe0900, 0x00200},
1752 {"profile", 0xfe0b00, 0x03000},
1753 {"extra-para", 0xfe3b00, 0x00100},
1754 {"radio", 0xff0000, 0x10000},
1755 {NULL, 0, 0}
1756 },
1757 .first_sysupgrade_partition = "os-image",
1758 .last_sysupgrade_partition = "file-system",
1759 },
1760
1761 /** Firmware layout for the Deco M5 */
1762 {
1763 .id = "DECO-M5",
1764 .vendor = "",
1765 .support_list =
1766 "SupportList:\n"
1767 "{product_name:M5,product_ver:1.0.0,special_id:55530000}\n"
1768 "{product_name:M5,product_ver:1.0.0,special_id:45550000}\n"
1769 "{product_name:M5,product_ver:1.0.0,special_id:43410000}\n"
1770 "{product_name:M5,product_ver:1.0.0,special_id:4A500000}\n"
1771 "{product_name:M5,product_ver:1.0.0,special_id:41550000}\n"
1772 "{product_name:M5,product_ver:1.0.0,special_id:4B520000}\n"
1773 "{product_name:M5,product_ver:1.0.0,special_id:49440000}\n"
1774 "{product_name:M5,product_ver:3.0.0,special_id:55530000}\n"
1775 "{product_name:M5,product_ver:3.0.0,special_id:45550000}\n"
1776 "{product_name:M5,product_ver:3.0.0,special_id:43410000}\n"
1777 "{product_name:M5,product_ver:3.0.0,special_id:4A500000}\n"
1778 "{product_name:M5,product_ver:3.0.0,special_id:41550000}\n"
1779 "{product_name:M5,product_ver:3.0.0,special_id:4B520000}\n"
1780 "{product_name:M5,product_ver:3.0.0,special_id:49440000}\n"
1781 "{product_name:M5,product_ver:3.0.0,special_id:53570000}\n"
1782 "{product_name:M5,product_ver:3.0.0,special_id:42340000}\n"
1783 "{product_name:M5,product_ver:3.0.0,special_id:54570000}\n"
1784 "{product_name:M5,product_ver:3.2.0,special_id:55530000}\n"
1785 "{product_name:M5,product_ver:3.2.0,special_id:45550000}\n"
1786 "{product_name:M5,product_ver:3.2.0,special_id:43410000}\n"
1787 "{product_name:M5,product_ver:3.2.0,special_id:4A500000}\n"
1788 "{product_name:M5,product_ver:3.2.0,special_id:41550000}\n"
1789 "{product_name:M5,product_ver:3.2.0,special_id:4B520000}\n"
1790 "{product_name:M5,product_ver:3.2.0,special_id:49440000}\n"
1791 "{product_name:M5,product_ver:3.2.0,special_id:53570000}\n"
1792 "{product_name:M5,product_ver:3.2.0,special_id:42340000}\n"
1793 "{product_name:M5,product_ver:3.2.0,special_id:54570000}\n",
1794 .part_trail = 0x00,
1795 .soft_ver = SOFT_VER_DEFAULT,
1796
1797 .partitions = {
1798 {"SBL1", 0x00000, 0x30000},
1799 {"boot-config_0", 0x30000, 0x10000},
1800 {"MIBIB", 0x40000, 0x10000},
1801 {"boot-config_1", 0x50000, 0x10000},
1802 {"QSEE", 0x60000, 0x60000},
1803 {"CDT", 0xc0000, 0x10000},
1804 {"DDRPARAMS", 0xd0000, 0x10000},
1805 {"uboot-env", 0xe0000, 0x10000},
1806 {"fs-uboot@0", 0xf0000, 0x80000},
1807 {"radio", 0x170000, 0x0fff0},
1808 {"bluetooth-XTAL", 0x17fff0, 0x00010},
1809 {"default-mac", 0x180000, 0x01000},
1810 {"device-id", 0x182000, 0x01000},
1811 {"product-info", 0x183000, 0x05000},
1812 {"support-list", 0x190000, 0x10000},
1813 {"user-config", 0x200000, 0x10000},
1814 {"device-config", 0x210000, 0x10000},
1815 {"group-info", 0x220000, 0x10000},
1816 {"partition-table@0", 0x230000, 0x02000},
1817 {"os-image@0", 0x240000, 0x300000},
1818 {"file-system@0", 0x540000, 0x790000},
1819 {"soft-version@0", 0xcd0000, 0x10000},
1820 {"profile@0", 0xce0000, 0x10000},
1821 {"default-config@0", 0xcf0000, 0x10000},
1822 {"partition-table@1", 0xd00000, 0x02000},
1823 {"fs-uboot@1", 0xd10000, 0x80000},
1824 {"os-image@1", 0xd90000, 0x400000},
1825 {"file-system@1", 0x1190000, 0xc40000},
1826 {"soft-version@1", 0x1dd0000, 0x10000},
1827 {"profile@1", 0x1de0000, 0x10000},
1828 {"default-config@1", 0x1df0000, 0x10000},
1829 {"tm-sig", 0x1e00000, 0x200000},
1830 {NULL, 0, 0}
1831 },
1832
1833 .partition_names.partition_table = "partition-table@1",
1834 .partition_names.soft_ver = "soft-version@1",
1835 .partition_names.os_image = "os-image@1",
1836 .partition_names.file_system = "file-system@1",
1837
1838 .first_sysupgrade_partition = "os-image@1",
1839 .last_sysupgrade_partition = "file-system@1"
1840 },
1841
1842 /** Firmware layout for the Deco S4 v2 */
1843 {
1844 .id = "DECO-S4-V2",
1845 .vendor = "",
1846 .support_list =
1847 "SupportList:\n"
1848 "{product_name:S4,product_ver:1.0.0,special_id:55530000}\n"
1849 "{product_name:S4,product_ver:1.0.0,special_id:45550000}\n"
1850 "{product_name:S4,product_ver:1.0.0,special_id:43410000}\n"
1851 "{product_name:S4,product_ver:1.0.0,special_id:4A500000}\n"
1852 "{product_name:S4,product_ver:1.0.0,special_id:41550000}\n"
1853 "{product_name:S4,product_ver:1.0.0,special_id:4B520000}\n"
1854 "{product_name:S4,product_ver:2.0.0,special_id:55530000}\n"
1855 "{product_name:S4,product_ver:2.0.0,special_id:45550000}\n"
1856 "{product_name:S4,product_ver:2.0.0,special_id:43410000}\n"
1857 "{product_name:S4,product_ver:2.0.0,special_id:4A500000}\n"
1858 "{product_name:S4,product_ver:2.0.0,special_id:41550000}\n"
1859 "{product_name:S4,product_ver:2.0.0,special_id:4B520000}\n",
1860 .part_trail = 0x00,
1861 .soft_ver = SOFT_VER_DEFAULT,
1862
1863 .partitions = {
1864 {"fs-uboot", 0x00000, 0x80000},
1865 {"product-info", 0x80000, 0x05000},
1866 {"default-mac", 0x85000, 0x01000},
1867 {"device-id", 0x86000, 0x01000},
1868 {"support-list", 0x87000, 0x10000},
1869 {"user-config", 0xa7000, 0x10000},
1870 {"device-config", 0xb7000, 0x10000},
1871 {"group-info", 0xc7000, 0x10000},
1872 {"partition-table", 0xd7000, 0x02000},
1873 {"soft-version", 0xd9000, 0x10000},
1874 {"profile", 0xe9000, 0x10000},
1875 {"default-config", 0xf9000, 0x10000},
1876 {"url-sig", 0x1e0000, 0x10000},
1877 {"radio", 0x1f0000, 0x10000},
1878 {"firmware", 0x200000, 0xe00000},
1879 {NULL, 0, 0}
1880 },
1881 .first_sysupgrade_partition = "os-image",
1882 .last_sysupgrade_partition = "file-system",
1883 },
1884
1885 /** Firmware layout for the EAP120 */
1886 {
1887 .id = "EAP120",
1888 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1889 .support_list =
1890 "SupportList:\r\n"
1891 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1892 .part_trail = 0xff,
1893 .soft_ver = SOFT_VER_DEFAULT,
1894
1895 .partitions = {
1896 {"fs-uboot", 0x00000, 0x20000},
1897 {"partition-table", 0x20000, 0x02000},
1898 {"default-mac", 0x30000, 0x00020},
1899 {"support-list", 0x31000, 0x00100},
1900 {"product-info", 0x31100, 0x00100},
1901 {"soft-version", 0x32000, 0x00100},
1902 {"os-image", 0x40000, 0x180000},
1903 {"file-system", 0x1c0000, 0x600000},
1904 {"user-config", 0x7c0000, 0x10000},
1905 {"backup-config", 0x7d0000, 0x10000},
1906 {"log", 0x7e0000, 0x10000},
1907 {"radio", 0x7f0000, 0x10000},
1908 {NULL, 0, 0}
1909 },
1910
1911 .first_sysupgrade_partition = "os-image",
1912 .last_sysupgrade_partition = "file-system"
1913 },
1914
1915 /** Firmware layout for the EAP225-Outdoor v1 */
1916 {
1917 .id = "EAP225-OUTDOOR-V1",
1918 .support_list =
1919 "SupportList:\r\n"
1920 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1921 .part_trail = PART_TRAIL_NONE,
1922 .soft_ver = SOFT_VER_DEFAULT,
1923 .soft_ver_compat_level = 1,
1924
1925 .partitions = {
1926 {"fs-uboot", 0x00000, 0x20000},
1927 {"partition-table", 0x20000, 0x02000},
1928 {"default-mac", 0x30000, 0x01000},
1929 {"support-list", 0x31000, 0x00100},
1930 {"product-info", 0x31100, 0x00400},
1931 {"soft-version", 0x32000, 0x00100},
1932 {"firmware", 0x40000, 0xd80000},
1933 {"user-config", 0xdc0000, 0x30000},
1934 {"mutil-log", 0xf30000, 0x80000},
1935 {"oops", 0xfb0000, 0x40000},
1936 {"radio", 0xff0000, 0x10000},
1937 {NULL, 0, 0}
1938 },
1939
1940 .first_sysupgrade_partition = "os-image",
1941 .last_sysupgrade_partition = "file-system"
1942 },
1943
1944 /** Firmware layout for the EAP225 v1 */
1945 {
1946 .id = "EAP225-V1",
1947 .support_list =
1948 "SupportList:\r\n"
1949 "EAP225(TP-LINK|UN|AC1200-D):1.0\r\n",
1950 .part_trail = PART_TRAIL_NONE,
1951 .soft_ver = SOFT_VER_DEFAULT,
1952
1953 .partitions = {
1954 {"fs-uboot", 0x00000, 0x20000},
1955 {"partition-table", 0x20000, 0x02000},
1956 {"default-mac", 0x30000, 0x01000},
1957 {"support-list", 0x31000, 0x00100},
1958 {"product-info", 0x31100, 0x00400},
1959 {"soft-version", 0x32000, 0x00100},
1960 {"firmware", 0x40000, 0xd80000},
1961 {"user-config", 0xdc0000, 0x30000},
1962 {"radio", 0xff0000, 0x10000},
1963 {NULL, 0, 0}
1964 },
1965
1966 .first_sysupgrade_partition = "os-image",
1967 .last_sysupgrade_partition = "file-system"
1968 },
1969
1970 /** Firmware layout for the EAP225 v3
1971 * Also compatible with:
1972 * - EAP225 v3.20
1973 * - EAP225 v4
1974 * - EAP225-Outdoor v1
1975 * - EAP225-Outdoor v3
1976 * */
1977 {
1978 .id = "EAP225-V3",
1979 .support_list =
1980 "SupportList:\r\n"
1981 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n"
1982 "EAP225(TP-Link|UN|AC1350-D):3.20\r\n"
1983 "EAP225(TP-Link|UN|AC1350-D):4.0 CA\r\n"
1984 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n"
1985 "EAP225-Outdoor(TP-Link|UN|AC1200-D):3.0 CA,JP\r\n",
1986 .part_trail = PART_TRAIL_NONE,
1987 .soft_ver = SOFT_VER_DEFAULT,
1988 .soft_ver_compat_level = 1,
1989
1990 .partitions = {
1991 {"fs-uboot", 0x00000, 0x20000},
1992 {"partition-table", 0x20000, 0x02000},
1993 {"default-mac", 0x30000, 0x01000},
1994 {"support-list", 0x31000, 0x00100},
1995 {"product-info", 0x31100, 0x00400},
1996 {"soft-version", 0x32000, 0x00100},
1997 {"firmware", 0x40000, 0xd80000},
1998 {"user-config", 0xdc0000, 0x30000},
1999 {"mutil-log", 0xf30000, 0x80000},
2000 {"oops", 0xfb0000, 0x40000},
2001 {"radio", 0xff0000, 0x10000},
2002 {NULL, 0, 0}
2003 },
2004
2005 .first_sysupgrade_partition = "os-image",
2006 .last_sysupgrade_partition = "file-system"
2007 },
2008
2009 /** Firmware layout for the EAP225-Wall v2 */
2010 {
2011 .id = "EAP225-WALL-V2",
2012 .support_list =
2013 "SupportList:\r\n"
2014 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
2015 .part_trail = PART_TRAIL_NONE,
2016 .soft_ver = SOFT_VER_DEFAULT,
2017 .soft_ver_compat_level = 1,
2018
2019 .partitions = {
2020 {"fs-uboot", 0x00000, 0x20000},
2021 {"partition-table", 0x20000, 0x02000},
2022 {"default-mac", 0x30000, 0x01000},
2023 {"support-list", 0x31000, 0x00100},
2024 {"product-info", 0x31100, 0x00400},
2025 {"soft-version", 0x32000, 0x00100},
2026 {"firmware", 0x40000, 0xd80000},
2027 {"user-config", 0xdc0000, 0x30000},
2028 {"mutil-log", 0xf30000, 0x80000},
2029 {"oops", 0xfb0000, 0x40000},
2030 {"radio", 0xff0000, 0x10000},
2031 {NULL, 0, 0}
2032 },
2033
2034 .first_sysupgrade_partition = "os-image",
2035 .last_sysupgrade_partition = "file-system"
2036 },
2037
2038 /** Firmware layout for the EAP235-Wall v1 */
2039 {
2040 .id = "EAP235-WALL-V1",
2041 .support_list =
2042 "SupportList:\r\n"
2043 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
2044 .part_trail = PART_TRAIL_NONE,
2045 .soft_ver = SOFT_VER_NUMERIC(3, 0, 0),
2046 .soft_ver_compat_level = 1,
2047
2048 .partitions = {
2049 {"fs-uboot", 0x00000, 0x80000},
2050 {"partition-table", 0x80000, 0x02000},
2051 {"default-mac", 0x90000, 0x01000},
2052 {"support-list", 0x91000, 0x00100},
2053 {"product-info", 0x91100, 0x00400},
2054 {"soft-version", 0x92000, 0x00100},
2055 {"firmware", 0xa0000, 0xd20000},
2056 {"user-config", 0xdc0000, 0x30000},
2057 {"mutil-log", 0xf30000, 0x80000},
2058 {"oops", 0xfb0000, 0x40000},
2059 {"radio", 0xff0000, 0x10000},
2060 {NULL, 0, 0}
2061 },
2062
2063 .first_sysupgrade_partition = "os-image",
2064 .last_sysupgrade_partition = "file-system"
2065 },
2066
2067 /** Firmware layout for the EAP245 v1 */
2068 {
2069 .id = "EAP245-V1",
2070 .support_list =
2071 "SupportList:\r\n"
2072 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
2073 .part_trail = PART_TRAIL_NONE,
2074 .soft_ver = SOFT_VER_DEFAULT,
2075
2076 .partitions = {
2077 {"fs-uboot", 0x00000, 0x20000},
2078 {"partition-table", 0x20000, 0x02000},
2079 {"default-mac", 0x30000, 0x01000},
2080 {"support-list", 0x31000, 0x00100},
2081 {"product-info", 0x31100, 0x00400},
2082 {"soft-version", 0x32000, 0x00100},
2083 {"firmware", 0x40000, 0xd80000},
2084 {"user-config", 0xdc0000, 0x30000},
2085 {"radio", 0xff0000, 0x10000},
2086 {NULL, 0, 0}
2087 },
2088
2089 .first_sysupgrade_partition = "os-image",
2090 .last_sysupgrade_partition = "file-system"
2091 },
2092
2093 /** Firmware layout for the EAP245 v3 */
2094 {
2095 .id = "EAP245-V3",
2096 .support_list =
2097 "SupportList:\r\n"
2098 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n"
2099 "EAP265 HD(TP-Link|UN|AC1750-D):1.0",
2100 .part_trail = PART_TRAIL_NONE,
2101 .soft_ver = SOFT_VER_DEFAULT,
2102 .soft_ver_compat_level = 1,
2103
2104 /** Firmware partition with dynamic kernel/rootfs split */
2105 .partitions = {
2106 {"factroy-boot", 0x00000, 0x40000},
2107 {"fs-uboot", 0x40000, 0x40000},
2108 {"partition-table", 0x80000, 0x10000},
2109 {"default-mac", 0x90000, 0x01000},
2110 {"support-list", 0x91000, 0x00100},
2111 {"product-info", 0x91100, 0x00400},
2112 {"soft-version", 0x92000, 0x00100},
2113 {"radio", 0xa0000, 0x10000},
2114 {"extra-para", 0xb0000, 0x10000},
2115 {"firmware", 0xc0000, 0xe40000},
2116 {"config", 0xf00000, 0x30000},
2117 {"mutil-log", 0xf30000, 0x80000},
2118 {"oops", 0xfb0000, 0x40000},
2119 {NULL, 0, 0}
2120 },
2121
2122 .first_sysupgrade_partition = "os-image",
2123 .last_sysupgrade_partition = "file-system"
2124 },
2125
2126 /** Firmware layout for the EAP610 v3/EAP613 v1 */
2127 {
2128 .id = "EAP610-V3",
2129 .soft_ver = SOFT_VER_DEFAULT,
2130 .soft_ver_compat_level = 1,
2131 .support_list =
2132 "SupportList:\r\n"
2133 "EAP610(TP-Link|UN|AX1800-D):3.0\r\n"
2134 "EAP610(TP-Link|JP|AX1800-D):3.0\r\n"
2135 "EAP610(TP-Link|EG|AX1800-D):3.0\r\n"
2136 "EAP610(TP-Link|CA|AX1800-D):3.0\r\n"
2137 "EAP613(TP-Link|UN|AX1800-D):1.0 JP\r\n",
2138 .part_trail = PART_TRAIL_NONE,
2139
2140 .partitions = {
2141 {"fs-uboot", 0x00000, 0x80000},
2142 {"partition-table", 0x80000, 0x02000},
2143 {"default-mac", 0x90000, 0x01000},
2144 {"support-list", 0x91000, 0x00100},
2145 {"product-info", 0x91100, 0x00400},
2146 {"soft-version", 0x92000, 0x00100},
2147 {"firmware", 0xa0000, 0xcf0000},
2148 {"user-config", 0xd90000, 0x60000},
2149 {"mutil-log", 0xf30000, 0x80000},
2150 {"oops", 0xfb0000, 0x40000},
2151 {"radio", 0xff0000, 0x10000},
2152 {NULL, 0, 0}
2153 },
2154
2155 .first_sysupgrade_partition = "os-image",
2156 .last_sysupgrade_partition = "file-system"
2157 },
2158
2159 /** Firmware layout for the EAP615-Wall v1 */
2160 {
2161 .id = "EAP615-WALL-V1",
2162 .soft_ver = SOFT_VER_DEFAULT,
2163 .soft_ver_compat_level = 2,
2164 .support_list =
2165 "SupportList:\r\n"
2166 "EAP615-Wall(TP-Link|UN|AX1800-D):1.0\r\n"
2167 "EAP615-Wall(TP-Link|CA|AX1800-D):1.0\r\n"
2168 "EAP615-Wall(TP-Link|JP|AX1800-D):1.0\r\n",
2169 .part_trail = PART_TRAIL_NONE,
2170
2171 .partitions = {
2172 {"fs-uboot", 0x00000, 0x80000},
2173 {"partition-table", 0x80000, 0x02000},
2174 {"default-mac", 0x90000, 0x01000},
2175 {"support-list", 0x91000, 0x00100},
2176 {"product-info", 0x91100, 0x00400},
2177 {"soft-version", 0x92000, 0x00100},
2178 {"firmware", 0xa0000, 0xcf0000},
2179 {"user-config", 0xd90000, 0x60000},
2180 {"mutil-log", 0xf30000, 0x80000},
2181 {"oops", 0xfb0000, 0x40000},
2182 {"radio", 0xff0000, 0x10000},
2183 {NULL, 0, 0}
2184 },
2185
2186 .first_sysupgrade_partition = "os-image",
2187 .last_sysupgrade_partition = "file-system"
2188 },
2189
2190 /** Firmware layout for the TL-WA1201 v2 */
2191 {
2192 .id = "TL-WA1201-V2",
2193 .vendor = "",
2194 .support_list =
2195 "SupportList:\n"
2196 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:45550000}\n"
2197 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:55530000}\n",
2198 .part_trail = 0x00,
2199 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.1 Build 20200709 rel.66244\n"),
2200
2201 .partitions = {
2202 {"fs-uboot", 0x00000, 0x20000},
2203 {"default-mac", 0x20000, 0x00200},
2204 {"pin", 0x20200, 0x00100},
2205 {"product-info", 0x20300, 0x00200},
2206 {"device-id", 0x20500, 0x0fb00},
2207 {"firmware", 0x30000, 0xce0000},
2208 {"portal-logo", 0xd10000, 0x20000},
2209 {"portal-back", 0xd30000, 0x200000},
2210 {"soft-version", 0xf30000, 0x00200},
2211 {"extra-para", 0xf30200, 0x00200},
2212 {"support-list", 0xf30400, 0x00200},
2213 {"profile", 0xf30600, 0x0fa00},
2214 {"apdef-config", 0xf40000, 0x10000},
2215 {"ap-config", 0xf50000, 0x10000},
2216 {"redef-config", 0xf60000, 0x10000},
2217 {"re-config", 0xf70000, 0x10000},
2218 {"multidef-config", 0xf80000, 0x10000},
2219 {"multi-config", 0xf90000, 0x10000},
2220 {"clientdef-config", 0xfa0000, 0x10000},
2221 {"client-config", 0xfb0000, 0x10000},
2222 {"partition-table", 0xfc0000, 0x10000},
2223 {"user-config", 0xfd0000, 0x10000},
2224 {"certificate", 0xfe0000, 0x10000},
2225 {"radio", 0xff0000, 0x10000},
2226 {NULL, 0, 0}
2227 },
2228 .first_sysupgrade_partition = "os-image",
2229 .last_sysupgrade_partition = "file-system",
2230 },
2231
2232 /** Firmware layout for the TL-WA850RE v2 */
2233 {
2234 .id = "TLWA850REV2",
2235 .vendor = "",
2236 .support_list =
2237 "SupportList:\n"
2238 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
2239 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
2240 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
2241 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
2242 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
2243 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
2244 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
2245 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
2246 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
2247 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
2248 .part_trail = 0x00,
2249 .soft_ver = SOFT_VER_DEFAULT,
2250
2251 /**
2252 576KB were moved from file-system to os-image
2253 in comparison to the stock image
2254 */
2255 .partitions = {
2256 {"fs-uboot", 0x00000, 0x20000},
2257 {"firmware", 0x20000, 0x390000},
2258 {"partition-table", 0x3b0000, 0x02000},
2259 {"default-mac", 0x3c0000, 0x00020},
2260 {"pin", 0x3c0100, 0x00020},
2261 {"product-info", 0x3c1000, 0x01000},
2262 {"soft-version", 0x3c2000, 0x00100},
2263 {"support-list", 0x3c3000, 0x01000},
2264 {"profile", 0x3c4000, 0x08000},
2265 {"user-config", 0x3d0000, 0x10000},
2266 {"default-config", 0x3e0000, 0x10000},
2267 {"radio", 0x3f0000, 0x10000},
2268 {NULL, 0, 0}
2269 },
2270
2271 .first_sysupgrade_partition = "os-image",
2272 .last_sysupgrade_partition = "file-system"
2273 },
2274
2275 /** Firmware layout for the TL-WA855RE v1 */
2276 {
2277 .id = "TLWA855REV1",
2278 .vendor = "",
2279 .support_list =
2280 "SupportList:\n"
2281 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
2282 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
2283 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
2284 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
2285 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
2286 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
2287 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
2288 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
2289 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
2290 .part_trail = 0x00,
2291 .soft_ver = SOFT_VER_DEFAULT,
2292
2293 .partitions = {
2294 {"fs-uboot", 0x00000, 0x20000},
2295 {"os-image", 0x20000, 0x150000},
2296 {"file-system", 0x170000, 0x240000},
2297 {"partition-table", 0x3b0000, 0x02000},
2298 {"default-mac", 0x3c0000, 0x00020},
2299 {"pin", 0x3c0100, 0x00020},
2300 {"product-info", 0x3c1000, 0x01000},
2301 {"soft-version", 0x3c2000, 0x00100},
2302 {"support-list", 0x3c3000, 0x01000},
2303 {"profile", 0x3c4000, 0x08000},
2304 {"user-config", 0x3d0000, 0x10000},
2305 {"default-config", 0x3e0000, 0x10000},
2306 {"radio", 0x3f0000, 0x10000},
2307 {NULL, 0, 0}
2308 },
2309
2310 .first_sysupgrade_partition = "os-image",
2311 .last_sysupgrade_partition = "file-system"
2312 },
2313
2314 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
2315 {
2316 .id = "TL-WPA8630P-V2.0-EU",
2317 .vendor = "",
2318 .support_list =
2319 "SupportList:\n"
2320 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
2321 .part_trail = 0x00,
2322 .soft_ver = SOFT_VER_DEFAULT,
2323
2324 .partitions = {
2325 {"factory-uboot", 0x00000, 0x20000},
2326 {"fs-uboot", 0x20000, 0x20000},
2327 {"firmware", 0x40000, 0x5e0000},
2328 {"partition-table", 0x620000, 0x02000},
2329 {"default-mac", 0x630000, 0x00020},
2330 {"pin", 0x630100, 0x00020},
2331 {"device-id", 0x630200, 0x00030},
2332 {"product-info", 0x631100, 0x01000},
2333 {"extra-para", 0x632100, 0x01000},
2334 {"soft-version", 0x640000, 0x01000},
2335 {"support-list", 0x641000, 0x01000},
2336 {"profile", 0x642000, 0x08000},
2337 {"user-config", 0x650000, 0x10000},
2338 {"default-config", 0x660000, 0x10000},
2339 {"default-nvm", 0x670000, 0xc0000},
2340 {"default-pib", 0x730000, 0x40000},
2341 {"radio", 0x7f0000, 0x10000},
2342 {NULL, 0, 0}
2343 },
2344
2345 .first_sysupgrade_partition = "os-image",
2346 .last_sysupgrade_partition = "file-system"
2347 },
2348
2349 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
2350 {
2351 .id = "TL-WPA8630P-V2-INT",
2352 .vendor = "",
2353 .support_list =
2354 "SupportList:\n"
2355 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
2356 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
2357 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
2358 .part_trail = 0x00,
2359 .soft_ver = SOFT_VER_DEFAULT,
2360
2361 .partitions = {
2362 {"factory-uboot", 0x00000, 0x20000},
2363 {"fs-uboot", 0x20000, 0x20000},
2364 {"firmware", 0x40000, 0x5e0000},
2365 {"partition-table", 0x620000, 0x02000},
2366 {"extra-para", 0x632100, 0x01000},
2367 {"soft-version", 0x640000, 0x01000},
2368 {"support-list", 0x641000, 0x01000},
2369 {"profile", 0x642000, 0x08000},
2370 {"user-config", 0x650000, 0x10000},
2371 {"default-config", 0x660000, 0x10000},
2372 {"default-nvm", 0x670000, 0xc0000},
2373 {"default-pib", 0x730000, 0x40000},
2374 {"default-mac", 0x7e0000, 0x00020},
2375 {"pin", 0x7e0100, 0x00020},
2376 {"device-id", 0x7e0200, 0x00030},
2377 {"product-info", 0x7e1100, 0x01000},
2378 {"radio", 0x7f0000, 0x10000},
2379 {NULL, 0, 0}
2380 },
2381
2382 .first_sysupgrade_partition = "os-image",
2383 .last_sysupgrade_partition = "file-system"
2384 },
2385
2386 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
2387 {
2388 .id = "TL-WPA8630P-V2.1-EU",
2389 .vendor = "",
2390 .support_list =
2391 "SupportList:\n"
2392 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
2393 .part_trail = 0x00,
2394 .soft_ver = SOFT_VER_DEFAULT,
2395
2396 .partitions = {
2397 {"factory-uboot", 0x00000, 0x20000},
2398 {"fs-uboot", 0x20000, 0x20000},
2399 {"firmware", 0x40000, 0x5e0000},
2400 {"extra-para", 0x680000, 0x01000},
2401 {"product-info", 0x690000, 0x01000},
2402 {"partition-table", 0x6a0000, 0x02000},
2403 {"soft-version", 0x6b0000, 0x01000},
2404 {"support-list", 0x6b1000, 0x01000},
2405 {"profile", 0x6b2000, 0x08000},
2406 {"user-config", 0x6c0000, 0x10000},
2407 {"default-config", 0x6d0000, 0x10000},
2408 {"default-nvm", 0x6e0000, 0xc0000},
2409 {"default-pib", 0x7a0000, 0x40000},
2410 {"default-mac", 0x7e0000, 0x00020},
2411 {"pin", 0x7e0100, 0x00020},
2412 {"device-id", 0x7e0200, 0x00030},
2413 {"radio", 0x7f0000, 0x10000},
2414 {NULL, 0, 0}
2415 },
2416
2417 .first_sysupgrade_partition = "os-image",
2418 .last_sysupgrade_partition = "file-system"
2419 },
2420
2421 /** Firmware layout for the TL-WPA8631P v3 */
2422 {
2423 .id = "TL-WPA8631P-V3",
2424 .vendor = "",
2425 .support_list =
2426 "SupportList:\n"
2427 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:41550000}\n"
2428 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:45550000}\n"
2429 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:55530000}\n"
2430 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:41550000}\n"
2431 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:45550000}\n"
2432 "{product_name:TL-WPA8631P,product_ver:4.0.0,special_id:55530000}\n"
2433 "{product_name:TL-WPA8635P,product_ver:3.0.0,special_id:46520000}\n",
2434 .part_trail = 0x00,
2435 .soft_ver = SOFT_VER_DEFAULT,
2436
2437 .partitions = {
2438 {"fs-uboot", 0x00000, 0x20000},
2439 {"firmware", 0x20000, 0x710000},
2440 {"partition-table", 0x730000, 0x02000},
2441 {"default-mac", 0x732000, 0x00020},
2442 {"pin", 0x732100, 0x00020},
2443 {"device-id", 0x732200, 0x00030},
2444 {"default-region", 0x732300, 0x00010},
2445 {"product-info", 0x732400, 0x00200},
2446 {"extra-para", 0x732600, 0x00200},
2447 {"soft-version", 0x732800, 0x00100},
2448 {"support-list", 0x732900, 0x00200},
2449 {"profile", 0x732b00, 0x00100},
2450 {"default-config", 0x732c00, 0x00800},
2451 {"plc-type", 0x733400, 0x00020},
2452 {"default-pib", 0x733500, 0x06000},
2453 {"user-config", 0x740000, 0x10000},
2454 {"plc-pib", 0x750000, 0x10000},
2455 {"plc-nvm", 0x760000, 0x90000},
2456 {"radio", 0x7f0000, 0x10000},
2457 {NULL, 0, 0}
2458 },
2459
2460 .first_sysupgrade_partition = "os-image",
2461 .last_sysupgrade_partition = "file-system"
2462 },
2463
2464 /** Firmware layout for the TL-WR1043 v5 */
2465 {
2466 .id = "TLWR1043NV5",
2467 .vendor = "",
2468 .support_list =
2469 "SupportList:\n"
2470 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
2471 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
2472 .part_trail = 0x00,
2473 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
2474 .partitions = {
2475 {"factory-boot", 0x00000, 0x20000},
2476 {"fs-uboot", 0x20000, 0x20000},
2477 {"firmware", 0x40000, 0xec0000},
2478 {"default-mac", 0xf00000, 0x00200},
2479 {"pin", 0xf00200, 0x00200},
2480 {"device-id", 0xf00400, 0x00100},
2481 {"product-info", 0xf00500, 0x0fb00},
2482 {"soft-version", 0xf10000, 0x01000},
2483 {"extra-para", 0xf11000, 0x01000},
2484 {"support-list", 0xf12000, 0x0a000},
2485 {"profile", 0xf1c000, 0x04000},
2486 {"default-config", 0xf20000, 0x10000},
2487 {"user-config", 0xf30000, 0x40000},
2488 {"qos-db", 0xf70000, 0x40000},
2489 {"certificate", 0xfb0000, 0x10000},
2490 {"partition-table", 0xfc0000, 0x10000},
2491 {"log", 0xfd0000, 0x20000},
2492 {"radio", 0xff0000, 0x10000},
2493 {NULL, 0, 0}
2494 },
2495 .first_sysupgrade_partition = "os-image",
2496 .last_sysupgrade_partition = "file-system"
2497 },
2498
2499 /** Firmware layout for the TL-WR1043 v4 */
2500 {
2501 .id = "TLWR1043NDV4",
2502 .vendor = "",
2503 .support_list =
2504 "SupportList:\n"
2505 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
2506 .part_trail = 0x00,
2507 .soft_ver = SOFT_VER_DEFAULT,
2508
2509 /* We're using a dynamic kernel/rootfs split here */
2510 .partitions = {
2511 {"fs-uboot", 0x00000, 0x20000},
2512 {"firmware", 0x20000, 0xf30000},
2513 {"default-mac", 0xf50000, 0x00200},
2514 {"pin", 0xf50200, 0x00200},
2515 {"product-info", 0xf50400, 0x0fc00},
2516 {"soft-version", 0xf60000, 0x0b000},
2517 {"support-list", 0xf6b000, 0x04000},
2518 {"profile", 0xf70000, 0x04000},
2519 {"default-config", 0xf74000, 0x0b000},
2520 {"user-config", 0xf80000, 0x40000},
2521 {"partition-table", 0xfc0000, 0x10000},
2522 {"log", 0xfd0000, 0x20000},
2523 {"radio", 0xff0000, 0x10000},
2524 {NULL, 0, 0}
2525 },
2526
2527 .first_sysupgrade_partition = "os-image",
2528 .last_sysupgrade_partition = "file-system"
2529 },
2530
2531 /** Firmware layout for the TL-WR902AC v1 */
2532 {
2533 .id = "TL-WR902AC-V1",
2534 .vendor = "",
2535 .support_list =
2536 "SupportList:\n"
2537 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
2538 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
2539 .part_trail = 0x00,
2540 .soft_ver = SOFT_VER_DEFAULT,
2541
2542 /**
2543 384KB were moved from file-system to os-image
2544 in comparison to the stock image
2545 */
2546 .partitions = {
2547 {"fs-uboot", 0x00000, 0x20000},
2548 {"firmware", 0x20000, 0x730000},
2549 {"default-mac", 0x750000, 0x00200},
2550 {"pin", 0x750200, 0x00200},
2551 {"product-info", 0x750400, 0x0fc00},
2552 {"soft-version", 0x760000, 0x0b000},
2553 {"support-list", 0x76b000, 0x04000},
2554 {"profile", 0x770000, 0x04000},
2555 {"default-config", 0x774000, 0x0b000},
2556 {"user-config", 0x780000, 0x40000},
2557 {"partition-table", 0x7c0000, 0x10000},
2558 {"log", 0x7d0000, 0x20000},
2559 {"radio", 0x7f0000, 0x10000},
2560 {NULL, 0, 0}
2561 },
2562
2563 .first_sysupgrade_partition = "os-image",
2564 .last_sysupgrade_partition = "file-system",
2565 },
2566
2567 /** Firmware layout for the TL-WR941HP v1 */
2568 {
2569 .id = "TL-WR941HP-V1",
2570 .vendor = "",
2571 .support_list =
2572 "SupportList:\n"
2573 "{product_name:TL-WR941HP,product_ver:1.0.0,special_id:00000000}\n",
2574 .part_trail = 0x00,
2575 .soft_ver = SOFT_VER_DEFAULT,
2576
2577 .partitions = {
2578 {"fs-uboot", 0x00000, 0x20000},
2579 {"firmware", 0x20000, 0x730000},
2580 {"default-mac", 0x750000, 0x00200},
2581 {"pin", 0x750200, 0x00200},
2582 {"product-info", 0x750400, 0x0fc00},
2583 {"soft-version", 0x760000, 0x0b000},
2584 {"support-list", 0x76b000, 0x04000},
2585 {"profile", 0x770000, 0x04000},
2586 {"default-config", 0x774000, 0x0b000},
2587 {"user-config", 0x780000, 0x40000},
2588 {"partition-table", 0x7c0000, 0x10000},
2589 {"log", 0x7d0000, 0x20000},
2590 {"radio", 0x7f0000, 0x10000},
2591 {NULL, 0, 0}
2592 },
2593
2594 .first_sysupgrade_partition = "os-image",
2595 .last_sysupgrade_partition = "file-system",
2596 },
2597
2598 /** Firmware layout for the TL-WR942N V1 */
2599 {
2600 .id = "TLWR942NV1",
2601 .vendor = "",
2602 .support_list =
2603 "SupportList:\r\n"
2604 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
2605 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
2606 .part_trail = 0x00,
2607 .soft_ver = SOFT_VER_DEFAULT,
2608
2609 .partitions = {
2610 {"fs-uboot", 0x00000, 0x20000},
2611 {"firmware", 0x20000, 0xe20000},
2612 {"default-mac", 0xe40000, 0x00200},
2613 {"pin", 0xe40200, 0x00200},
2614 {"product-info", 0xe40400, 0x0fc00},
2615 {"partition-table", 0xe50000, 0x10000},
2616 {"soft-version", 0xe60000, 0x10000},
2617 {"support-list", 0xe70000, 0x10000},
2618 {"profile", 0xe80000, 0x10000},
2619 {"default-config", 0xe90000, 0x10000},
2620 {"user-config", 0xea0000, 0x40000},
2621 {"qos-db", 0xee0000, 0x40000},
2622 {"certificate", 0xf20000, 0x10000},
2623 {"usb-config", 0xfb0000, 0x10000},
2624 {"log", 0xfc0000, 0x20000},
2625 {"radio-bk", 0xfe0000, 0x10000},
2626 {"radio", 0xff0000, 0x10000},
2627 {NULL, 0, 0}
2628 },
2629
2630 .first_sysupgrade_partition = "os-image",
2631 .last_sysupgrade_partition = "file-system",
2632 },
2633
2634 /** Firmware layout for the RE200 v2 */
2635 {
2636 .id = "RE200-V2",
2637 .vendor = "",
2638 .support_list =
2639 "SupportList:\n"
2640 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
2641 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
2642 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
2643 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
2644 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
2645 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
2646 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
2647 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
2648 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
2649 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
2650 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
2651 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
2652 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
2653 .part_trail = 0x00,
2654 .soft_ver = SOFT_VER_DEFAULT,
2655
2656 .partitions = {
2657 {"fs-uboot", 0x00000, 0x20000},
2658 {"firmware", 0x20000, 0x7a0000},
2659 {"partition-table", 0x7c0000, 0x02000},
2660 {"default-mac", 0x7c2000, 0x00020},
2661 {"pin", 0x7c2100, 0x00020},
2662 {"product-info", 0x7c3100, 0x01000},
2663 {"soft-version", 0x7c4200, 0x01000},
2664 {"support-list", 0x7c5200, 0x01000},
2665 {"profile", 0x7c6200, 0x08000},
2666 {"config-info", 0x7ce200, 0x00400},
2667 {"user-config", 0x7d0000, 0x10000},
2668 {"default-config", 0x7e0000, 0x10000},
2669 {"radio", 0x7f0000, 0x10000},
2670 {NULL, 0, 0}
2671 },
2672
2673 .first_sysupgrade_partition = "os-image",
2674 .last_sysupgrade_partition = "file-system"
2675 },
2676
2677 /** Firmware layout for the RE200 v3 */
2678 {
2679 .id = "RE200-V3",
2680 .vendor = "",
2681 .support_list =
2682 "SupportList:\n"
2683 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
2684 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
2685 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
2686 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
2687 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
2688 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
2689 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
2690 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
2691 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
2692 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
2693 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
2694 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
2695 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
2696 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
2697 .part_trail = 0x00,
2698 .soft_ver = SOFT_VER_DEFAULT,
2699
2700 .partitions = {
2701 {"fs-uboot", 0x00000, 0x20000},
2702 {"firmware", 0x20000, 0x7a0000},
2703 {"partition-table", 0x7c0000, 0x02000},
2704 {"default-mac", 0x7c2000, 0x00020},
2705 {"pin", 0x7c2100, 0x00020},
2706 {"product-info", 0x7c3100, 0x01000},
2707 {"soft-version", 0x7c4200, 0x01000},
2708 {"support-list", 0x7c5200, 0x01000},
2709 {"profile", 0x7c6200, 0x08000},
2710 {"config-info", 0x7ce200, 0x00400},
2711 {"user-config", 0x7d0000, 0x10000},
2712 {"default-config", 0x7e0000, 0x10000},
2713 {"radio", 0x7f0000, 0x10000},
2714 {NULL, 0, 0}
2715 },
2716
2717 .first_sysupgrade_partition = "os-image",
2718 .last_sysupgrade_partition = "file-system"
2719 },
2720
2721 /** Firmware layout for the RE200 v4 */
2722 {
2723 .id = "RE200-V4",
2724 .vendor = "",
2725 .support_list =
2726 "SupportList:\n"
2727 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
2728 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
2729 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
2730 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
2731 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
2732 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
2733 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
2734 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
2735 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
2736 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
2737 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
2738 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
2739 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
2740 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
2741 .part_trail = 0x00,
2742 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
2743
2744 .partitions = {
2745 {"fs-uboot", 0x00000, 0x20000},
2746 {"firmware", 0x20000, 0x7a0000},
2747 {"partition-table", 0x7c0000, 0x02000},
2748 {"default-mac", 0x7c2000, 0x00020},
2749 {"pin", 0x7c2100, 0x00020},
2750 {"product-info", 0x7c3100, 0x01000},
2751 {"soft-version", 0x7c4200, 0x01000},
2752 {"support-list", 0x7c5200, 0x01000},
2753 {"profile", 0x7c6200, 0x08000},
2754 {"config-info", 0x7ce200, 0x00400},
2755 {"user-config", 0x7d0000, 0x10000},
2756 {"default-config", 0x7e0000, 0x10000},
2757 {"radio", 0x7f0000, 0x10000},
2758 {NULL, 0, 0}
2759 },
2760
2761 .first_sysupgrade_partition = "os-image",
2762 .last_sysupgrade_partition = "file-system"
2763 },
2764
2765 /** Firmware layout for the RE220 v2 */
2766 {
2767 .id = "RE220-V2",
2768 .vendor = "",
2769 .support_list =
2770 "SupportList:\n"
2771 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
2772 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
2773 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
2774 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
2775 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
2776 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
2777 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
2778 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
2779 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
2780 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
2781 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
2782 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
2783 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
2784 .part_trail = 0x00,
2785 .soft_ver = SOFT_VER_DEFAULT,
2786
2787 .partitions = {
2788 {"fs-uboot", 0x00000, 0x20000},
2789 {"firmware", 0x20000, 0x7a0000},
2790 {"partition-table", 0x7c0000, 0x02000},
2791 {"default-mac", 0x7c2000, 0x00020},
2792 {"pin", 0x7c2100, 0x00020},
2793 {"product-info", 0x7c3100, 0x01000},
2794 {"soft-version", 0x7c4200, 0x01000},
2795 {"support-list", 0x7c5200, 0x01000},
2796 {"profile", 0x7c6200, 0x08000},
2797 {"config-info", 0x7ce200, 0x00400},
2798 {"user-config", 0x7d0000, 0x10000},
2799 {"default-config", 0x7e0000, 0x10000},
2800 {"radio", 0x7f0000, 0x10000},
2801 {NULL, 0, 0}
2802 },
2803
2804 .first_sysupgrade_partition = "os-image",
2805 .last_sysupgrade_partition = "file-system"
2806 },
2807
2808 /** Firmware layout for the RE305 v1 */
2809 {
2810 .id = "RE305-V1",
2811 .vendor = "",
2812 .support_list =
2813 "SupportList:\n"
2814 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
2815 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
2816 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
2817 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
2818 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
2819 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
2820 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
2821 .part_trail = 0x00,
2822 .soft_ver = SOFT_VER_DEFAULT,
2823
2824 .partitions = {
2825 {"fs-uboot", 0x00000, 0x20000},
2826 {"firmware", 0x20000, 0x5e0000},
2827 {"partition-table", 0x600000, 0x02000},
2828 {"default-mac", 0x610000, 0x00020},
2829 {"pin", 0x610100, 0x00020},
2830 {"product-info", 0x611100, 0x01000},
2831 {"soft-version", 0x620000, 0x01000},
2832 {"support-list", 0x621000, 0x01000},
2833 {"profile", 0x622000, 0x08000},
2834 {"user-config", 0x630000, 0x10000},
2835 {"default-config", 0x640000, 0x10000},
2836 {"radio", 0x7f0000, 0x10000},
2837 {NULL, 0, 0}
2838 },
2839
2840 .first_sysupgrade_partition = "os-image",
2841 .last_sysupgrade_partition = "file-system"
2842 },
2843
2844 /** Firmware layout for the RE305 v3 */
2845 {
2846 .id = "RE305-V3",
2847 .vendor = "",
2848 .support_list =
2849 "SupportList:\n"
2850 "{product_name:RE305,product_ver:3.0.0,special_id:00000000}\n"
2851 "{product_name:RE305,product_ver:3.0.0,special_id:45550000}\n"
2852 "{product_name:RE305,product_ver:3.0.0,special_id:4A500000}\n"
2853 "{product_name:RE305,product_ver:3.0.0,special_id:4B520000}\n"
2854 "{product_name:RE305,product_ver:3.0.0,special_id:41550000}\n"
2855 "{product_name:RE305,product_ver:3.0.0,special_id:42520000}\n"
2856 "{product_name:RE305,product_ver:3.0.0,special_id:55530000}\n"
2857 "{product_name:RE305,product_ver:3.0.0,special_id:45530000}\n"
2858 "{product_name:RE305,product_ver:3.0.0,special_id:41530000}\n"
2859 "{product_name:RE305,product_ver:3.0.0,special_id:43410000}\n"
2860 "{product_name:RE305,product_ver:3.0.0,special_id:52550000}\n",
2861 .part_trail = 0x00,
2862 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
2863
2864 .partitions = {
2865 {"fs-uboot", 0x00000, 0x20000},
2866 {"firmware", 0x20000, 0x7a0000},
2867 {"partition-table", 0x7c0000, 0x02000},
2868 {"default-mac", 0x7c2000, 0x00020},
2869 {"pin", 0x7c2100, 0x00020},
2870 {"product-info", 0x7c3100, 0x01000},
2871 {"soft-version", 0x7c4200, 0x01000},
2872 {"support-list", 0x7c5200, 0x01000},
2873 {"profile", 0x7c6200, 0x08000},
2874 {"config-info", 0x7ce200, 0x00400},
2875 {"user-config", 0x7d0000, 0x10000},
2876 {"default-config", 0x7e0000, 0x10000},
2877 {"radio", 0x7f0000, 0x10000},
2878 {NULL, 0, 0}
2879 },
2880
2881 .first_sysupgrade_partition = "os-image",
2882 .last_sysupgrade_partition = "file-system"
2883 },
2884
2885 /** Firmware layout for the RE350 v1 */
2886 {
2887 .id = "RE350-V1",
2888 .vendor = "",
2889 .support_list =
2890 "SupportList:\n"
2891 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
2892 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
2893 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
2894 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
2895 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
2896 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
2897 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
2898 .part_trail = 0x00,
2899 .soft_ver = SOFT_VER_DEFAULT,
2900
2901 /** We're using a dynamic kernel/rootfs split here */
2902 .partitions = {
2903 {"fs-uboot", 0x00000, 0x20000},
2904 {"firmware", 0x20000, 0x5e0000},
2905 {"partition-table", 0x600000, 0x02000},
2906 {"default-mac", 0x610000, 0x00020},
2907 {"pin", 0x610100, 0x00020},
2908 {"product-info", 0x611100, 0x01000},
2909 {"soft-version", 0x620000, 0x01000},
2910 {"support-list", 0x621000, 0x01000},
2911 {"profile", 0x622000, 0x08000},
2912 {"user-config", 0x630000, 0x10000},
2913 {"default-config", 0x640000, 0x10000},
2914 {"radio", 0x7f0000, 0x10000},
2915 {NULL, 0, 0}
2916 },
2917
2918 .first_sysupgrade_partition = "os-image",
2919 .last_sysupgrade_partition = "file-system"
2920 },
2921
2922 /** Firmware layout for the RE350K v1 */
2923 {
2924 .id = "RE350K-V1",
2925 .vendor = "",
2926 .support_list =
2927 "SupportList:\n"
2928 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2929 .part_trail = 0x00,
2930 .soft_ver = SOFT_VER_DEFAULT,
2931
2932 /** We're using a dynamic kernel/rootfs split here */
2933 .partitions = {
2934 {"fs-uboot", 0x00000, 0x20000},
2935 {"firmware", 0x20000, 0xd70000},
2936 {"partition-table", 0xd90000, 0x02000},
2937 {"default-mac", 0xda0000, 0x00020},
2938 {"pin", 0xda0100, 0x00020},
2939 {"product-info", 0xda1100, 0x01000},
2940 {"soft-version", 0xdb0000, 0x01000},
2941 {"support-list", 0xdb1000, 0x01000},
2942 {"profile", 0xdb2000, 0x08000},
2943 {"user-config", 0xdc0000, 0x10000},
2944 {"default-config", 0xdd0000, 0x10000},
2945 {"device-id", 0xde0000, 0x00108},
2946 {"radio", 0xff0000, 0x10000},
2947 {NULL, 0, 0}
2948 },
2949
2950 .first_sysupgrade_partition = "os-image",
2951 .last_sysupgrade_partition = "file-system"
2952 },
2953
2954 /** Firmware layout for the RE355 */
2955 {
2956 .id = "RE355",
2957 .vendor = "",
2958 .support_list =
2959 "SupportList:\r\n"
2960 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2961 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2962 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2963 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2964 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2965 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2966 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2967 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2968 .part_trail = 0x00,
2969 .soft_ver = SOFT_VER_DEFAULT,
2970
2971 /* We're using a dynamic kernel/rootfs split here */
2972 .partitions = {
2973 {"fs-uboot", 0x00000, 0x20000},
2974 {"firmware", 0x20000, 0x5e0000},
2975 {"partition-table", 0x600000, 0x02000},
2976 {"default-mac", 0x610000, 0x00020},
2977 {"pin", 0x610100, 0x00020},
2978 {"product-info", 0x611100, 0x01000},
2979 {"soft-version", 0x620000, 0x01000},
2980 {"support-list", 0x621000, 0x01000},
2981 {"profile", 0x622000, 0x08000},
2982 {"user-config", 0x630000, 0x10000},
2983 {"default-config", 0x640000, 0x10000},
2984 {"radio", 0x7f0000, 0x10000},
2985 {NULL, 0, 0}
2986 },
2987
2988 .first_sysupgrade_partition = "os-image",
2989 .last_sysupgrade_partition = "file-system"
2990 },
2991
2992 /** Firmware layout for the RE365 v1 */
2993 {
2994 .id = "RE365",
2995 .vendor = "",
2996 .support_list =
2997 "SupportList:\r\n"
2998 "{product_name:RE365,product_ver:1.0.0,special_id:45550000}\r\n"
2999 "{product_name:RE365,product_ver:1.0.0,special_id:55530000}\r\n"
3000 "{product_name:RE365,product_ver:1.0.0,special_id:4a500000}\r\n"
3001 "{product_name:RE365,product_ver:1.0.0,special_id:42520000}\r\n"
3002 "{product_name:RE365,product_ver:1.0.0,special_id:4b520000}\r\n"
3003 "{product_name:RE365,product_ver:1.0.0,special_id:41550000}\r\n"
3004 "{product_name:RE365,product_ver:1.0.0,special_id:43410000}\r\n"
3005 "{product_name:RE365,product_ver:1.0.0,special_id:54570000}\r\n"
3006 "{product_name:RE365,product_ver:1.0.0,special_id:41530000}\r\n",
3007 .part_trail = 0x00,
3008 .soft_ver = SOFT_VER_DEFAULT,
3009
3010 .partitions = {
3011 {"fs-uboot", 0x00000, 0x20000},
3012 {"firmware", 0x20000, 0x5e0000},
3013 {"partition-table", 0x600000, 0x02000},
3014 {"default-mac", 0x610000, 0x00020},
3015 {"pin", 0x610100, 0x00020},
3016 {"product-info", 0x611100, 0x01000},
3017 {"soft-version", 0x620000, 0x01000},
3018 {"support-list", 0x621000, 0x01000},
3019 {"profile", 0x622000, 0x08000},
3020 {"user-config", 0x630000, 0x10000},
3021 {"default-config", 0x640000, 0x10000},
3022 {"radio", 0x7f0000, 0x10000},
3023 {NULL, 0, 0}
3024 },
3025
3026 .first_sysupgrade_partition = "os-image",
3027 .last_sysupgrade_partition = "file-system"
3028 },
3029
3030 /** Firmware layout for the RE450 */
3031 {
3032 .id = "RE450",
3033 .vendor = "",
3034 .support_list =
3035 "SupportList:\r\n"
3036 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
3037 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
3038 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
3039 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
3040 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
3041 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
3042 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
3043 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
3044 .part_trail = 0x00,
3045 .soft_ver = SOFT_VER_DEFAULT,
3046
3047 /** We're using a dynamic kernel/rootfs split here */
3048 .partitions = {
3049 {"fs-uboot", 0x00000, 0x20000},
3050 {"firmware", 0x20000, 0x5e0000},
3051 {"partition-table", 0x600000, 0x02000},
3052 {"default-mac", 0x610000, 0x00020},
3053 {"pin", 0x610100, 0x00020},
3054 {"product-info", 0x611100, 0x01000},
3055 {"soft-version", 0x620000, 0x01000},
3056 {"support-list", 0x621000, 0x01000},
3057 {"profile", 0x622000, 0x08000},
3058 {"user-config", 0x630000, 0x10000},
3059 {"default-config", 0x640000, 0x10000},
3060 {"radio", 0x7f0000, 0x10000},
3061 {NULL, 0, 0}
3062 },
3063
3064 .first_sysupgrade_partition = "os-image",
3065 .last_sysupgrade_partition = "file-system"
3066 },
3067
3068 /** Firmware layout for the RE450 v2 */
3069 {
3070 .id = "RE450-V2",
3071 .vendor = "",
3072 .support_list =
3073 "SupportList:\r\n"
3074 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
3075 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
3076 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
3077 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
3078 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
3079 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
3080 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
3081 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
3082 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
3083 .part_trail = 0x00,
3084 .soft_ver = SOFT_VER_DEFAULT,
3085
3086 /* We're using a dynamic kernel/rootfs split here */
3087 .partitions = {
3088 {"fs-uboot", 0x00000, 0x20000},
3089 {"firmware", 0x20000, 0x5e0000},
3090 {"partition-table", 0x600000, 0x02000},
3091 {"default-mac", 0x610000, 0x00020},
3092 {"pin", 0x610100, 0x00020},
3093 {"product-info", 0x611100, 0x01000},
3094 {"soft-version", 0x620000, 0x01000},
3095 {"support-list", 0x621000, 0x01000},
3096 {"profile", 0x622000, 0x08000},
3097 {"user-config", 0x630000, 0x10000},
3098 {"default-config", 0x640000, 0x10000},
3099 {"radio", 0x7f0000, 0x10000},
3100 {NULL, 0, 0}
3101 },
3102
3103 .first_sysupgrade_partition = "os-image",
3104 .last_sysupgrade_partition = "file-system"
3105 },
3106
3107 /** Firmware layout for the RE450 v3 */
3108 {
3109 .id = "RE450-V3",
3110 .vendor = "",
3111 .support_list =
3112 "SupportList:\r\n"
3113 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
3114 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
3115 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
3116 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
3117 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
3118 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
3119 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
3120 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
3121 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
3122 .part_trail = 0x00,
3123 .soft_ver = SOFT_VER_DEFAULT,
3124
3125 /* We're using a dynamic kernel/rootfs split here */
3126 .partitions = {
3127 {"fs-uboot", 0x00000, 0x20000},
3128 {"default-mac", 0x20000, 0x00020},
3129 {"pin", 0x20020, 0x00020},
3130 {"product-info", 0x21000, 0x01000},
3131 {"partition-table", 0x22000, 0x02000},
3132 {"soft-version", 0x24000, 0x01000},
3133 {"support-list", 0x25000, 0x01000},
3134 {"profile", 0x26000, 0x08000},
3135 {"user-config", 0x2e000, 0x10000},
3136 {"default-config", 0x3e000, 0x10000},
3137 {"config-info", 0x4e000, 0x00400},
3138 {"firmware", 0x50000, 0x7a0000},
3139 {"radio", 0x7f0000, 0x10000},
3140 {NULL, 0, 0}
3141 },
3142
3143 .first_sysupgrade_partition = "os-image",
3144 .last_sysupgrade_partition = "file-system"
3145 },
3146
3147 /** Firmware layout for the RE455 v1 */
3148 {
3149 .id = "RE455-V1",
3150 .vendor = "",
3151 .support_list =
3152 "SupportList:\r\n"
3153 "{product_name:RE455,product_ver:1.0.0,special_id:00000000}\r\n"
3154 "{product_name:RE455,product_ver:1.0.0,special_id:55530000}\r\n"
3155 "{product_name:RE455,product_ver:1.0.0,special_id:45550000}\r\n"
3156 "{product_name:RE455,product_ver:1.0.0,special_id:4A500000}\r\n"
3157 "{product_name:RE455,product_ver:1.0.0,special_id:43410000}\r\n"
3158 "{product_name:RE455,product_ver:1.0.0,special_id:41550000}\r\n"
3159 "{product_name:RE455,product_ver:1.0.0,special_id:41530000}\r\n"
3160 "{product_name:RE455,product_ver:1.0.0,special_id:4B520000}\r\n"
3161 "{product_name:RE455,product_ver:1.0.0,special_id:42520000}\r\n",
3162 .part_trail = 0x00,
3163 .soft_ver = SOFT_VER_DEFAULT,
3164
3165 /* We're using a dynamic kernel/rootfs split here */
3166 .partitions = {
3167 {"fs-uboot", 0x00000, 0x20000},
3168 {"default-mac", 0x20000, 0x00020},
3169 {"pin", 0x20020, 0x00020},
3170 {"product-info", 0x21000, 0x01000},
3171 {"partition-table", 0x22000, 0x02000},
3172 {"soft-version", 0x24000, 0x01000},
3173 {"support-list", 0x25000, 0x01000},
3174 {"profile", 0x26000, 0x08000},
3175 {"user-config", 0x2e000, 0x10000},
3176 {"default-config", 0x3e000, 0x10000},
3177 {"config-info", 0x4e000, 0x00400},
3178 {"firmware", 0x50000, 0x7a0000},
3179 {"radio", 0x7f0000, 0x10000},
3180 {NULL, 0, 0}
3181 },
3182
3183 .first_sysupgrade_partition = "os-image",
3184 .last_sysupgrade_partition = "file-system"
3185 },
3186
3187 /** Firmware layout for the RE500 */
3188 {
3189 .id = "RE500-V1",
3190 .vendor = "",
3191 .support_list =
3192 "SupportList:\r\n"
3193 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
3194 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
3195 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
3196 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
3197 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
3198 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
3199 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
3200 .part_trail = 0x00,
3201 .soft_ver = SOFT_VER_DEFAULT,
3202
3203 /* We're using a dynamic kernel/rootfs split here */
3204 .partitions = {
3205 {"fs-uboot", 0x00000, 0x20000},
3206 {"firmware", 0x20000, 0xde0000},
3207 {"partition-table", 0xe00000, 0x02000},
3208 {"default-mac", 0xe10000, 0x00020},
3209 {"pin", 0xe10100, 0x00020},
3210 {"product-info", 0xe11100, 0x01000},
3211 {"soft-version", 0xe20000, 0x01000},
3212 {"support-list", 0xe21000, 0x01000},
3213 {"profile", 0xe22000, 0x08000},
3214 {"user-config", 0xe30000, 0x10000},
3215 {"default-config", 0xe40000, 0x10000},
3216 {"radio", 0xff0000, 0x10000},
3217 {NULL, 0, 0}
3218 },
3219
3220 .first_sysupgrade_partition = "os-image",
3221 .last_sysupgrade_partition = "file-system"
3222 },
3223
3224 /** Firmware layout for the RE650 */
3225 {
3226 .id = "RE650-V1",
3227 .vendor = "",
3228 .support_list =
3229 "SupportList:\r\n"
3230 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
3231 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
3232 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
3233 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
3234 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
3235 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
3236 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
3237 .part_trail = 0x00,
3238 .soft_ver = SOFT_VER_DEFAULT,
3239
3240 /* We're using a dynamic kernel/rootfs split here */
3241 .partitions = {
3242 {"fs-uboot", 0x00000, 0x20000},
3243 {"firmware", 0x20000, 0xde0000},
3244 {"partition-table", 0xe00000, 0x02000},
3245 {"default-mac", 0xe10000, 0x00020},
3246 {"pin", 0xe10100, 0x00020},
3247 {"product-info", 0xe11100, 0x01000},
3248 {"soft-version", 0xe20000, 0x01000},
3249 {"support-list", 0xe21000, 0x01000},
3250 {"profile", 0xe22000, 0x08000},
3251 {"user-config", 0xe30000, 0x10000},
3252 {"default-config", 0xe40000, 0x10000},
3253 {"radio", 0xff0000, 0x10000},
3254 {NULL, 0, 0}
3255 },
3256
3257 .first_sysupgrade_partition = "os-image",
3258 .last_sysupgrade_partition = "file-system"
3259 },
3260 /** Firmware layout for the RE650 V2 (8MB Flash)*/
3261 {
3262 .id = "RE650-V2",
3263 .vendor = "",
3264 .support_list =
3265 "SupportList:\n"
3266 "{product_name:RE650,product_ver:2.0.0,special_id:00000000}\n"
3267 "{product_name:RE650,product_ver:2.0.0,special_id:45550000}\n"
3268 "{product_name:RE650,product_ver:2.0.0,special_id:4A500000}\n"
3269 "{product_name:RE650,product_ver:2.0.0,special_id:41550000}\n"
3270 "{product_name:RE650,product_ver:2.0.0,special_id:43410000}\n"
3271 "{product_name:RE650,product_ver:2.0.0,special_id:41530000}\n"
3272 "{product_name:RE650,product_ver:2.0.0,special_id:55530000}\n",
3273 .part_trail = 0x00,
3274 /* For RE650 v2, soft ver is required, otherwise OEM install doesn't work */
3275 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
3276
3277 /* We're using a dynamic kernel/rootfs split here */
3278 .partitions = {
3279 {"fs-uboot", 0x00000, 0x20000},
3280 {"firmware", 0x20000, 0x7a0000},
3281 {"partition-table", 0x7c0000, 0x02000},
3282 {"default-mac", 0x7c2000, 0x00020},
3283 {"pin", 0x7c2100, 0x00020},
3284 {"product-info", 0x7c3100, 0x01000},
3285 {"soft-version", 0x7c4200, 0x01000},
3286 {"support-list", 0x7c5200, 0x01000},
3287 {"profile", 0x7c6200, 0x08000},
3288 {"config-info", 0x7ce200, 0x00400},
3289 {"user-config", 0x7d0000, 0x10000},
3290 {"default-config", 0x7e0000, 0x10000},
3291 {"radio", 0x7f0000, 0x10000},
3292 {NULL, 0, 0}
3293 },
3294
3295 .first_sysupgrade_partition = "os-image",
3296 .last_sysupgrade_partition = "file-system"
3297 },
3298
3299 /** Firmware layout for the Mercusys MR70X */
3300 {
3301 .id = "MR70X",
3302 .vendor = "",
3303 .support_list =
3304 "SupportList:\n"
3305 "{product_name:MR70X,product_ver:1.0.0,special_id:45550000}\n"
3306 "{product_name:MR70X,product_ver:1.0.0,special_id:4A500000}\n"
3307 "{product_name:MR70X,product_ver:1.0.0,special_id:55530000}\n",
3308 .part_trail = 0x00,
3309 .soft_ver = SOFT_VER_DEFAULT,
3310
3311 .partitions = {
3312 {"fs-uboot", 0x00000, 0x40000},
3313 {"firmware", 0x40000, 0xf60000},
3314 {"default-mac", 0xfa0000, 0x00200},
3315 {"pin", 0xfa0200, 0x00100},
3316 {"device-id", 0xfa0300, 0x00100},
3317 {"product-info", 0xfa0400, 0x0fc00},
3318 {"default-config", 0xfb0000, 0x08000},
3319 {"ap-def-config", 0xfb8000, 0x08000},
3320 {"user-config", 0xfc0000, 0x0a000},
3321 {"ag-config", 0xfca000, 0x04000},
3322 {"certificate", 0xfce000, 0x02000},
3323 {"ap-config", 0xfd0000, 0x06000},
3324 {"router-config", 0xfd6000, 0x06000},
3325 {"favicon", 0xfdc000, 0x02000},
3326 {"logo", 0xfde000, 0x02000},
3327 {"partition-table", 0xfe0000, 0x00800},
3328 {"soft-version", 0xfe0800, 0x00100},
3329 {"support-list", 0xfe0900, 0x00200},
3330 {"profile", 0xfe0b00, 0x03000},
3331 {"extra-para", 0xfe3b00, 0x00100},
3332 {"radio", 0xff0000, 0x10000},
3333 {NULL, 0, 0}
3334 },
3335
3336 .first_sysupgrade_partition = "os-image",
3337 .last_sysupgrade_partition = "file-system"
3338 },
3339
3340 {}
3341 };
3342
3343 #define error(_ret, _errno, _str, ...) \
3344 do { \
3345 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
3346 strerror(_errno)); \
3347 if (_ret) \
3348 exit(_ret); \
3349 } while (0)
3350
3351
3352 /** Stores a uint32 as big endian */
3353 static inline void put32(uint8_t *buf, uint32_t val) {
3354 buf[0] = val >> 24;
3355 buf[1] = val >> 16;
3356 buf[2] = val >> 8;
3357 buf[3] = val;
3358 }
3359
3360 static inline bool meta_partition_should_pad(enum partition_trail_value pv)
3361 {
3362 return (pv >= 0) && (pv <= PART_TRAIL_MAX);
3363 }
3364
3365 /** Allocate a padded meta partition with a correctly initialised header
3366 * If the `data` pointer is NULL, then the required space is only allocated,
3367 * otherwise `data_len` bytes will be copied from `data` into the partition
3368 * entry. */
3369 static struct image_partition_entry init_meta_partition_entry(
3370 const char *name, const void *data, uint32_t data_len,
3371 enum partition_trail_value pad_value)
3372 {
3373 uint32_t total_len = sizeof(struct meta_header) + data_len;
3374 if (meta_partition_should_pad(pad_value))
3375 total_len += 1;
3376
3377 struct image_partition_entry entry = {
3378 .name = name,
3379 .size = total_len,
3380 .data = malloc(total_len)
3381 };
3382 if (!entry.data)
3383 error(1, errno, "failed to allocate meta partition entry");
3384
3385 struct meta_header *header = (struct meta_header *)entry.data;
3386 header->length = htonl(data_len);
3387 header->zero = 0;
3388
3389 if (data)
3390 memcpy(entry.data+sizeof(*header), data, data_len);
3391
3392 if (meta_partition_should_pad(pad_value))
3393 entry.data[total_len - 1] = (uint8_t) pad_value;
3394
3395 return entry;
3396 }
3397
3398 /** Allocates a new image partition */
3399 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
3400 struct image_partition_entry entry = {name, len, malloc(len)};
3401 if (!entry.data)
3402 error(1, errno, "malloc");
3403
3404 return entry;
3405 }
3406
3407 /** Sets up default partition names whenever custom names aren't specified */
3408 static void set_partition_names(struct device_info *info)
3409 {
3410 if (!info->partition_names.partition_table)
3411 info->partition_names.partition_table = "partition-table";
3412 if (!info->partition_names.soft_ver)
3413 info->partition_names.soft_ver = "soft-version";
3414 if (!info->partition_names.os_image)
3415 info->partition_names.os_image = "os-image";
3416 if (!info->partition_names.support_list)
3417 info->partition_names.support_list = "support-list";
3418 if (!info->partition_names.file_system)
3419 info->partition_names.file_system = "file-system";
3420 if (!info->partition_names.extra_para)
3421 info->partition_names.extra_para = "extra-para";
3422 }
3423
3424 /** Frees an image partition */
3425 static void free_image_partition(struct image_partition_entry *entry)
3426 {
3427 void *data = entry->data;
3428
3429 entry->name = NULL;
3430 entry->size = 0;
3431 entry->data = NULL;
3432
3433 free(data);
3434 }
3435
3436 static time_t source_date_epoch = -1;
3437 static void set_source_date_epoch() {
3438 char *env = getenv("SOURCE_DATE_EPOCH");
3439 char *endptr = env;
3440 errno = 0;
3441 if (env && *env) {
3442 source_date_epoch = strtoull(env, &endptr, 10);
3443 if (errno || (endptr && *endptr != '\0')) {
3444 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
3445 exit(1);
3446 }
3447 }
3448 }
3449
3450 /** Generates the partition-table partition */
3451 static struct image_partition_entry make_partition_table(const struct device_info *p)
3452 {
3453 struct image_partition_entry entry = alloc_image_partition(p->partition_names.partition_table, SAFELOADER_PAYLOAD_TABLE_SIZE);
3454
3455 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
3456
3457 *(s++) = 0x00;
3458 *(s++) = 0x04;
3459 *(s++) = 0x00;
3460 *(s++) = 0x00;
3461
3462 size_t i;
3463 for (i = 0; p->partitions[i].name; i++) {
3464 size_t len = end-s;
3465 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n",
3466 p->partitions[i].name, p->partitions[i].base, p->partitions[i].size);
3467
3468 if (w > len-1)
3469 error(1, 0, "flash partition table overflow?");
3470
3471 s += w;
3472 }
3473
3474 s++;
3475
3476 memset(s, 0xff, end-s);
3477
3478 return entry;
3479 }
3480
3481
3482 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
3483 static inline uint8_t bcd(uint8_t v) {
3484 return 0x10 * (v/10) + v%10;
3485 }
3486
3487
3488 /** Generates the soft-version partition */
3489 static struct image_partition_entry make_soft_version(const struct device_info *info, uint32_t rev)
3490 {
3491 /** If an info string is provided, use this instead of
3492 * the structured data, and include the null-termination */
3493 if (info->soft_ver.type == SOFT_VER_TYPE_TEXT) {
3494 uint32_t len = strlen(info->soft_ver.text) + 1;
3495 return init_meta_partition_entry(info->partition_names.soft_ver,
3496 info->soft_ver.text, len, info->part_trail);
3497 }
3498
3499 time_t t;
3500
3501 if (source_date_epoch != -1)
3502 t = source_date_epoch;
3503 else if (time(&t) == (time_t)(-1))
3504 error(1, errno, "time");
3505
3506 struct tm *tm = gmtime(&t);
3507
3508 struct soft_version s = {
3509 .pad1 = 0xff,
3510
3511 .version_major = info->soft_ver.num[0],
3512 .version_minor = info->soft_ver.num[1],
3513 .version_patch = info->soft_ver.num[2],
3514
3515 .year_hi = bcd((1900+tm->tm_year)/100),
3516 .year_lo = bcd(tm->tm_year%100),
3517 .month = bcd(tm->tm_mon+1),
3518 .day = bcd(tm->tm_mday),
3519 .rev = htonl(rev),
3520
3521 .compat_level = htonl(info->soft_ver_compat_level)
3522 };
3523
3524 if (info->soft_ver_compat_level == 0)
3525 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3526 (uint8_t *)(&s.compat_level) - (uint8_t *)(&s),
3527 info->part_trail);
3528 else
3529 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3530 sizeof(s), info->part_trail);
3531 }
3532
3533 /** Generates the support-list partition */
3534 static struct image_partition_entry make_support_list(
3535 const struct device_info *info)
3536 {
3537 uint32_t len = strlen(info->support_list);
3538 return init_meta_partition_entry(info->partition_names.support_list, info->support_list,
3539 len, info->part_trail);
3540 }
3541
3542 /** Partition with extra-para data */
3543 static struct image_partition_entry make_extra_para(
3544 const struct device_info *info, const uint8_t *extra_para, size_t len)
3545 {
3546 return init_meta_partition_entry(info->partition_names.extra_para, extra_para, len,
3547 info->part_trail);
3548 }
3549
3550 /** Creates a new image partition with an arbitrary name from a file */
3551 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
3552 struct stat statbuf;
3553
3554 if (stat(filename, &statbuf) < 0)
3555 error(1, errno, "unable to stat file `%s'", filename);
3556
3557 size_t len = statbuf.st_size;
3558
3559 if (add_jffs2_eof) {
3560 if (file_system_partition)
3561 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
3562 else
3563 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
3564 }
3565
3566 struct image_partition_entry entry = alloc_image_partition(part_name, len);
3567
3568 FILE *file = fopen(filename, "rb");
3569 if (!file)
3570 error(1, errno, "unable to open file `%s'", filename);
3571
3572 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
3573 error(1, errno, "unable to read file `%s'", filename);
3574
3575 if (add_jffs2_eof) {
3576 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
3577
3578 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
3579 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
3580 }
3581
3582 fclose(file);
3583
3584 return entry;
3585 }
3586
3587 /**
3588 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
3589
3590 Example image partition table:
3591
3592 fwup-ptn partition-table base 0x00800 size 0x00800
3593 fwup-ptn os-image base 0x01000 size 0x113b45
3594 fwup-ptn file-system base 0x114b45 size 0x1d0004
3595 fwup-ptn support-list base 0x2e4b49 size 0x000d1
3596
3597 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
3598 the end of the partition table is marked with a zero byte.
3599
3600 The firmware image must contain at least the partition-table and support-list partitions
3601 to be accepted. There aren't any alignment constraints for the image partitions.
3602
3603 The partition-table partition contains the actual flash layout; partitions
3604 from the image partition table are mapped to the corresponding flash partitions during
3605 the firmware upgrade. The support-list partition contains a list of devices supported by
3606 the firmware image.
3607
3608 The base offsets in the firmware partition table are relative to the end
3609 of the vendor information block, so the partition-table partition will
3610 actually start at offset 0x1814 of the image.
3611
3612 I think partition-table must be the first partition in the firmware image.
3613 */
3614 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
3615 size_t i, j;
3616 char *image_pt = (char *)buffer, *end = image_pt + SAFELOADER_PAYLOAD_TABLE_SIZE;
3617
3618 size_t base = SAFELOADER_PAYLOAD_TABLE_SIZE;
3619 for (i = 0; parts[i].name; i++) {
3620 for (j = 0; flash_parts[j].name; j++) {
3621 if (!strcmp(flash_parts[j].name, parts[i].name)) {
3622 if (parts[i].size > flash_parts[j].size)
3623 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
3624 break;
3625 }
3626 }
3627
3628 assert(flash_parts[j].name);
3629
3630 memcpy(buffer + base, parts[i].data, parts[i].size);
3631
3632 size_t len = end-image_pt;
3633 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
3634
3635 if (w > len-1)
3636 error(1, 0, "image partition table overflow?");
3637
3638 image_pt += w;
3639
3640 base += parts[i].size;
3641 }
3642 }
3643
3644 /** Generates and writes the image MD5 checksum */
3645 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
3646 MD5_CTX ctx;
3647
3648 MD5_Init(&ctx);
3649 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
3650 MD5_Update(&ctx, buffer, len);
3651 MD5_Final(md5, &ctx);
3652 }
3653
3654
3655 /**
3656 Generates the firmware image in factory format
3657
3658 Image format:
3659
3660 Bytes (hex) Usage
3661 ----------- -----
3662 0000-0003 Image size (4 bytes, big endian)
3663 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
3664 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
3665 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
3666 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
3667 1014-1813 Image partition table (2048 bytes, padded with 0xff)
3668 1814-xxxx Firmware partitions
3669 */
3670 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
3671 *len = SAFELOADER_PAYLOAD_OFFSET + SAFELOADER_PAYLOAD_TABLE_SIZE;
3672
3673 size_t i;
3674 for (i = 0; parts[i].name; i++)
3675 *len += parts[i].size;
3676
3677 uint8_t *image = malloc(*len);
3678 if (!image)
3679 error(1, errno, "malloc");
3680
3681 memset(image, 0xff, *len);
3682 put32(image, *len);
3683
3684 if (info->vendor) {
3685 size_t vendor_len = strlen(info->vendor);
3686 put32(image + SAFELOADER_PREAMBLE_SIZE, vendor_len);
3687 memcpy(image + SAFELOADER_PREAMBLE_SIZE + 0x4, info->vendor, vendor_len);
3688 }
3689
3690 put_partitions(image + SAFELOADER_PAYLOAD_OFFSET, info->partitions, parts);
3691 put_md5(image + 0x04, image + SAFELOADER_PREAMBLE_SIZE, *len - SAFELOADER_PREAMBLE_SIZE);
3692
3693 return image;
3694 }
3695
3696 /**
3697 Generates the firmware image in sysupgrade format
3698
3699 This makes some assumptions about the provided flash and image partition tables and
3700 should be generalized when TP-LINK starts building its safeloader into hardware with
3701 different flash layouts.
3702 */
3703 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
3704 size_t i, j;
3705 size_t flash_first_partition_index = 0;
3706 size_t flash_last_partition_index = 0;
3707 const struct flash_partition_entry *flash_first_partition = NULL;
3708 const struct flash_partition_entry *flash_last_partition = NULL;
3709 const struct image_partition_entry *image_last_partition = NULL;
3710
3711 /** Find first and last partitions */
3712 for (i = 0; info->partitions[i].name; i++) {
3713 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
3714 flash_first_partition = &info->partitions[i];
3715 flash_first_partition_index = i;
3716 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
3717 flash_last_partition = &info->partitions[i];
3718 flash_last_partition_index = i;
3719 }
3720 }
3721
3722 assert(flash_first_partition && flash_last_partition);
3723 assert(flash_first_partition_index < flash_last_partition_index);
3724
3725 /** Find last partition from image to calculate needed size */
3726 for (i = 0; image_parts[i].name; i++) {
3727 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
3728 image_last_partition = &image_parts[i];
3729 break;
3730 }
3731 }
3732
3733 assert(image_last_partition);
3734
3735 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
3736
3737 uint8_t *image = malloc(*len);
3738 if (!image)
3739 error(1, errno, "malloc");
3740
3741 memset(image, 0xff, *len);
3742
3743 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
3744 for (j = 0; image_parts[j].name; j++) {
3745 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
3746 if (image_parts[j].size > info->partitions[i].size)
3747 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
3748 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
3749 break;
3750 }
3751
3752 assert(image_parts[j].name);
3753 }
3754 }
3755
3756 return image;
3757 }
3758
3759 /** Generates an image according to a given layout and writes it to a file */
3760 static void build_image(const char *output,
3761 const char *kernel_image,
3762 const char *rootfs_image,
3763 uint32_t rev,
3764 bool add_jffs2_eof,
3765 bool sysupgrade,
3766 struct device_info *info) {
3767
3768 size_t i;
3769
3770 struct image_partition_entry parts[7] = {};
3771
3772 struct flash_partition_entry *firmware_partition = NULL;
3773 struct flash_partition_entry *os_image_partition = NULL;
3774 struct flash_partition_entry *file_system_partition = NULL;
3775 size_t firmware_partition_index = 0;
3776
3777 set_partition_names(info);
3778
3779 for (i = 0; info->partitions[i].name; i++) {
3780 if (!strcmp(info->partitions[i].name, "firmware"))
3781 {
3782 firmware_partition = &info->partitions[i];
3783 firmware_partition_index = i;
3784 }
3785 }
3786
3787 if (firmware_partition)
3788 {
3789 os_image_partition = &info->partitions[firmware_partition_index];
3790 file_system_partition = &info->partitions[firmware_partition_index + 1];
3791
3792 struct stat kernel;
3793 if (stat(kernel_image, &kernel) < 0)
3794 error(1, errno, "unable to stat file `%s'", kernel_image);
3795
3796 if (kernel.st_size > firmware_partition->size)
3797 error(1, 0, "kernel overflowed firmware partition\n");
3798
3799 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
3800 info->partitions[i+1] = info->partitions[i];
3801
3802 file_system_partition->name = info->partition_names.file_system;
3803
3804 file_system_partition->base = firmware_partition->base + kernel.st_size;
3805
3806 /* Align partition start to erase blocks for factory images only */
3807 if (!sysupgrade)
3808 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
3809
3810 file_system_partition->size = firmware_partition->size - file_system_partition->base;
3811
3812 os_image_partition->name = info->partition_names.os_image;
3813
3814 os_image_partition->size = kernel.st_size;
3815 }
3816
3817 parts[0] = make_partition_table(info);
3818 parts[1] = make_soft_version(info, rev);
3819 parts[2] = make_support_list(info);
3820 parts[3] = read_file(info->partition_names.os_image, kernel_image, false, NULL);
3821 parts[4] = read_file(info->partition_names.file_system, rootfs_image, add_jffs2_eof, file_system_partition);
3822
3823
3824 /* Some devices need the extra-para partition to accept the firmware */
3825 if (strcasecmp(info->id, "ARCHER-A6-V3") == 0 ||
3826 strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
3827 strcasecmp(info->id, "ARCHER-A9-V6") == 0 ||
3828 strcasecmp(info->id, "ARCHER-AX23-V1") == 0 ||
3829 strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
3830 strcasecmp(info->id, "ARCHER-C7-V4") == 0 ||
3831 strcasecmp(info->id, "ARCHER-C7-V5") == 0 ||
3832 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
3833 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
3834 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
3835 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
3836 strcasecmp(info->id, "ARCHER-C6U-V1") == 0 ||
3837 strcasecmp(info->id, "ARCHER-C6-V3") == 0 ||
3838 strcasecmp(info->id, "DECO-M4R-V4") == 0 ||
3839 strcasecmp(info->id, "MR70X") == 0 ||
3840 strcasecmp(info->id, "TLWR1043NV5") == 0) {
3841 const uint8_t extra_para[2] = {0x01, 0x00};
3842 parts[5] = make_extra_para(info, extra_para,
3843 sizeof(extra_para));
3844 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0 ||
3845 strcasecmp(info->id, "TL-WA1201-V2") == 0) {
3846 const uint8_t extra_para[2] = {0x00, 0x01};
3847 parts[5] = make_extra_para(info, extra_para,
3848 sizeof(extra_para));
3849 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0 ||
3850 strcasecmp(info->id, "EAP245-V3") == 0) {
3851 const uint8_t extra_para[2] = {0x01, 0x01};
3852 parts[5] = make_extra_para(info, extra_para,
3853 sizeof(extra_para));
3854 }
3855
3856 size_t len;
3857 void *image;
3858 if (sysupgrade)
3859 image = generate_sysupgrade_image(info, parts, &len);
3860 else
3861 image = generate_factory_image(info, parts, &len);
3862
3863 FILE *file = fopen(output, "wb");
3864 if (!file)
3865 error(1, errno, "unable to open output file");
3866
3867 if (fwrite(image, len, 1, file) != 1)
3868 error(1, 0, "unable to write output file");
3869
3870 fclose(file);
3871
3872 free(image);
3873
3874 for (i = 0; parts[i].name; i++)
3875 free_image_partition(&parts[i]);
3876 }
3877
3878 /** Usage output */
3879 static void usage(const char *argv0) {
3880 fprintf(stderr,
3881 "Usage: %s [OPTIONS...]\n"
3882 "\n"
3883 "Options:\n"
3884 " -h show this help\n"
3885 "\n"
3886 "Info about an image:\n"
3887 " -i <file> input file to read from\n"
3888 "Create a new image:\n"
3889 " -B <board> create image for the board specified with <board>\n"
3890 " -k <file> read kernel image from the file <file>\n"
3891 " -r <file> read rootfs image from the file <file>\n"
3892 " -o <file> write output to the file <file>\n"
3893 " -V <rev> sets the revision number to <rev>\n"
3894 " -j add jffs2 end-of-filesystem markers\n"
3895 " -S create sysupgrade instead of factory image\n"
3896 "Extract an old image:\n"
3897 " -x <file> extract all oem firmware partition\n"
3898 " -d <dir> destination to extract the firmware partition\n"
3899 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
3900 argv0
3901 );
3902 };
3903
3904
3905 static struct device_info *find_board(const char *id)
3906 {
3907 struct device_info *board = NULL;
3908
3909 for (board = boards; board->id != NULL; board++)
3910 if (strcasecmp(id, board->id) == 0)
3911 return board;
3912
3913 return NULL;
3914 }
3915
3916 static int add_flash_partition(
3917 struct flash_partition_entry *part_list,
3918 size_t max_entries,
3919 const char *name,
3920 unsigned long base,
3921 unsigned long size)
3922 {
3923 size_t ptr;
3924 /* check if the list has a free entry */
3925 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
3926 if (part_list->name == NULL &&
3927 part_list->base == 0 &&
3928 part_list->size == 0)
3929 break;
3930 }
3931
3932 if (ptr == max_entries) {
3933 error(1, 0, "No free flash part entry available.");
3934 }
3935
3936 part_list->name = calloc(1, strlen(name) + 1);
3937 if (!part_list->name) {
3938 error(1, 0, "Unable to allocate memory");
3939 }
3940
3941 memcpy((char *)part_list->name, name, strlen(name));
3942 part_list->base = base;
3943 part_list->size = size;
3944
3945 return 0;
3946 }
3947
3948 /** read the partition table into struct flash_partition_entry */
3949 enum PARTITION_TABLE_TYPE {
3950 PARTITION_TABLE_FWUP,
3951 PARTITION_TABLE_FLASH,
3952 };
3953
3954 static int read_partition_table(
3955 FILE *file, long offset,
3956 struct flash_partition_entry *entries, size_t max_entries,
3957 int type)
3958 {
3959 char buf[SAFELOADER_PAYLOAD_TABLE_SIZE];
3960 char *ptr, *end;
3961 const char *parthdr = NULL;
3962 const char *fwuphdr = "fwup-ptn";
3963 const char *flashhdr = "partition";
3964
3965 /* TODO: search for the partition table */
3966
3967 switch(type) {
3968 case PARTITION_TABLE_FWUP:
3969 parthdr = fwuphdr;
3970 break;
3971 case PARTITION_TABLE_FLASH:
3972 parthdr = flashhdr;
3973 break;
3974 default:
3975 error(1, 0, "Invalid partition table");
3976 }
3977
3978 if (fseek(file, offset, SEEK_SET) < 0)
3979 error(1, errno, "Can not seek in the firmware");
3980
3981 if (fread(buf, sizeof(buf), 1, file) != 1)
3982 error(1, errno, "Can not read fwup-ptn from the firmware");
3983
3984 buf[sizeof(buf) - 1] = '\0';
3985
3986 /* look for the partition header */
3987 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
3988 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
3989 return 1;
3990 }
3991
3992 ptr = buf;
3993 end = buf + sizeof(buf);
3994 while ((ptr + strlen(parthdr)) < end &&
3995 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
3996 char *end_part;
3997 char *end_element;
3998
3999 char name[32] = { 0 };
4000 int name_len = 0;
4001 unsigned long base = 0;
4002 unsigned long size = 0;
4003
4004 end_part = memchr(ptr, '\n', (end - ptr));
4005 if (end_part == NULL) {
4006 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
4007 break;
4008 }
4009
4010 for (int i = 0; i <= 4; i++) {
4011 if (end_part <= ptr)
4012 break;
4013
4014 end_element = memchr(ptr, 0x20, (end_part - ptr));
4015 if (end_element == NULL) {
4016 error(1, errno, "Ignoring the rest of the partition entries.");
4017 break;
4018 }
4019
4020 switch (i) {
4021 /* partition header */
4022 case 0:
4023 ptr = end_element + 1;
4024 continue;
4025 /* name */
4026 case 1:
4027 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
4028 strncpy(name, ptr, name_len);
4029 name[name_len] = '\0';
4030 ptr = end_element + 1;
4031 continue;
4032
4033 /* string "base" */
4034 case 2:
4035 ptr = end_element + 1;
4036 continue;
4037
4038 /* actual base */
4039 case 3:
4040 base = strtoul(ptr, NULL, 16);
4041 ptr = end_element + 1;
4042 continue;
4043
4044 /* string "size" */
4045 case 4:
4046 ptr = end_element + 1;
4047 /* actual size. The last element doesn't have a sepeartor */
4048 size = strtoul(ptr, NULL, 16);
4049 /* the part ends with 0x09, 0x0d, 0x0a */
4050 ptr = end_part + 1;
4051 add_flash_partition(entries, max_entries, name, base, size);
4052 continue;
4053 }
4054 }
4055 }
4056
4057 return 0;
4058 }
4059
4060 static void safeloader_read_partition(FILE *input_file, size_t payload_offset,
4061 struct flash_partition_entry *entry,
4062 struct image_partition_entry *part)
4063 {
4064 size_t part_size = entry->size;
4065 void *part_data = malloc(part_size);
4066
4067 if (fseek(input_file, payload_offset, SEEK_SET))
4068 error(1, errno, "Failed to seek to partition data");
4069
4070 if (!part_data)
4071 error(1, ENOMEM, "Failed to allocate partition data");
4072
4073 if (fread(part_data, 1, part_size, input_file) < part_size)
4074 error(1, errno, "Failed to read partition data");
4075
4076 part->data = part_data;
4077 part->size = part_size;
4078 part->name = entry->name;
4079 }
4080
4081 static void safeloader_parse_image(FILE *input_file, struct safeloader_image_info *image)
4082 {
4083 static const char *HEADER_ID_CLOUD = "fw-type:Cloud";
4084 static const char *HEADER_ID_QNEW = "?NEW";
4085
4086 char buf[64];
4087
4088 if (!input_file)
4089 return;
4090
4091 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
4092
4093 if (fread(buf, sizeof(buf), 1, input_file) != 1)
4094 error(1, errno, "Can not read image header");
4095
4096 if (memcmp(HEADER_ID_QNEW, &buf[0], strlen(HEADER_ID_QNEW)) == 0)
4097 image->type = SAFELOADER_TYPE_QNEW;
4098 else if (memcmp(HEADER_ID_CLOUD, &buf[0], strlen(HEADER_ID_CLOUD)) == 0)
4099 image->type = SAFELOADER_TYPE_CLOUD;
4100 else if (ntohl(*((uint32_t *) &buf[0])) <= SAFELOADER_HEADER_SIZE)
4101 image->type = SAFELOADER_TYPE_VENDOR;
4102 else
4103 image->type = SAFELOADER_TYPE_DEFAULT;
4104
4105 switch (image->type) {
4106 case SAFELOADER_TYPE_DEFAULT:
4107 case SAFELOADER_TYPE_VENDOR:
4108 case SAFELOADER_TYPE_CLOUD:
4109 image->payload_offset = SAFELOADER_PAYLOAD_OFFSET;
4110 break;
4111 case SAFELOADER_TYPE_QNEW:
4112 image->payload_offset = SAFELOADER_QNEW_PAYLOAD_OFFSET;
4113 break;
4114 }
4115
4116 /* Parse image partition table */
4117 read_partition_table(input_file, image->payload_offset, &image->entries[0],
4118 MAX_PARTITIONS, PARTITION_TABLE_FWUP);
4119 }
4120
4121 static void write_partition(
4122 FILE *input_file,
4123 size_t firmware_offset,
4124 struct flash_partition_entry *entry,
4125 FILE *output_file)
4126 {
4127 char buf[4096];
4128 size_t offset;
4129
4130 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
4131
4132 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
4133 if (fread(buf, sizeof(buf), 1, input_file) != 1)
4134 error(1, errno, "Can not read partition from input_file");
4135
4136 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
4137 error(1, errno, "Can not write partition to output_file");
4138 }
4139 /* write last chunk smaller than buffer */
4140 if (offset < entry->size) {
4141 offset = entry->size - offset;
4142 if (fread(buf, offset, 1, input_file) != 1)
4143 error(1, errno, "Can not read partition from input_file");
4144 if (fwrite(buf, offset, 1, output_file) != 1)
4145 error(1, errno, "Can not write partition to output_file");
4146 }
4147 }
4148
4149 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
4150 {
4151 FILE *output_file;
4152 char output[PATH_MAX];
4153
4154 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
4155 output_file = fopen(output, "wb+");
4156 if (output_file == NULL) {
4157 error(1, errno, "Can not open output file %s", output);
4158 }
4159
4160 write_partition(input_file, firmware_offset, entry, output_file);
4161
4162 fclose(output_file);
4163
4164 return 0;
4165 }
4166
4167 /** extract all partitions from the firmware file */
4168 static int extract_firmware(const char *input, const char *output_directory)
4169 {
4170 struct safeloader_image_info info = {};
4171 struct stat statbuf;
4172 FILE *input_file;
4173
4174 /* check input file */
4175 if (stat(input, &statbuf)) {
4176 error(1, errno, "Can not read input firmware %s", input);
4177 }
4178
4179 /* check if output directory exists */
4180 if (stat(output_directory, &statbuf)) {
4181 error(1, errno, "Failed to stat output directory %s", output_directory);
4182 }
4183
4184 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
4185 error(1, errno, "Given output directory is not a directory %s", output_directory);
4186 }
4187
4188 input_file = fopen(input, "rb");
4189 safeloader_parse_image(input_file, &info);
4190
4191 for (size_t i = 0; i < MAX_PARTITIONS && info.entries[i].name; i++)
4192 extract_firmware_partition(input_file, info.payload_offset, &info.entries[i], output_directory);
4193
4194 return 0;
4195 }
4196
4197 static struct flash_partition_entry *find_partition(
4198 struct flash_partition_entry *entries, size_t max_entries,
4199 const char *name, const char *error_msg)
4200 {
4201 for (size_t i = 0; i < max_entries; i++, entries++) {
4202 if (strcmp(entries->name, name) == 0)
4203 return entries;
4204 }
4205
4206 if (error_msg) {
4207 error(1, 0, "%s", error_msg);
4208 }
4209
4210 return NULL;
4211 }
4212
4213 static int firmware_info(const char *input)
4214 {
4215 struct safeloader_image_info info = {};
4216 struct image_partition_entry part = {};
4217 struct flash_partition_entry *e;
4218 FILE *input_file;
4219
4220 input_file = fopen(input, "rb");
4221
4222 safeloader_parse_image(input_file, &info);
4223
4224 if (info.type == SAFELOADER_TYPE_VENDOR) {
4225 char buf[SAFELOADER_HEADER_SIZE] = {};
4226 uint32_t vendor_size;
4227
4228 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
4229 fread(&vendor_size, sizeof(uint32_t), 1, input_file);
4230
4231 vendor_size = ntohl(vendor_size);
4232 fread(buf, vendor_size, 1, input_file);
4233
4234 printf("Firmware vendor string:\n");
4235 fwrite(buf, strnlen(buf, vendor_size), 1, stdout);
4236 printf("\n");
4237 }
4238
4239 printf("Firmware image partitions:\n");
4240 printf("%-8s %-8s %s\n", "base", "size", "name");
4241
4242 e = &info.entries[0];
4243 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4244 printf("%08x %08x %s\n", e->base, e->size, e->name);
4245
4246 e = find_partition(&info.entries[0], MAX_PARTITIONS, "soft-version", NULL);
4247 if (e) {
4248 struct soft_version *s;
4249 unsigned int ascii_len;
4250 const uint8_t *buf;
4251 size_t data_len;
4252 bool isstr;
4253
4254 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4255 data_len = ntohl(((struct meta_header *) part.data)->length);
4256 buf = part.data + sizeof(struct meta_header);
4257
4258 /* Check for (null-terminated) string */
4259 ascii_len = 0;
4260 while (ascii_len < data_len && isascii(buf[ascii_len]))
4261 ascii_len++;
4262
4263 isstr = ascii_len == data_len;
4264
4265 printf("\n[Software version]\n");
4266 if (isstr) {
4267 fwrite(buf, strnlen((const char *) buf, data_len), 1, stdout);
4268 putchar('\n');
4269 } else if (data_len >= offsetof(struct soft_version, rev)) {
4270 s = (struct soft_version *) buf;
4271
4272 printf("Version: %d.%d.%d\n", s->version_major, s->version_minor, s->version_patch);
4273 printf("Date: %02x%02x-%02x-%02x\n", s->year_hi, s->year_lo, s->month, s->day);
4274 printf("Revision: %d\n", ntohl(s->rev));
4275 } else {
4276 printf("Failed to parse data\n");
4277 }
4278
4279 free_image_partition(&part);
4280 }
4281
4282 e = find_partition(&info.entries[0], MAX_PARTITIONS, "support-list", NULL);
4283 if (e) {
4284 size_t data_len;
4285
4286 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4287 data_len = ntohl(((struct meta_header *) part.data)->length);
4288
4289 printf("\n[Support list]\n");
4290 fwrite(part.data + sizeof(struct meta_header), data_len, 1, stdout);
4291 printf("\n");
4292
4293 free_image_partition(&part);
4294 }
4295
4296 e = find_partition(&info.entries[0], MAX_PARTITIONS, "partition-table", NULL);
4297 if (e) {
4298 size_t flash_table_offset = info.payload_offset + e->base + 4;
4299 struct flash_partition_entry parts[MAX_PARTITIONS] = {};
4300
4301 if (read_partition_table(input_file, flash_table_offset, parts, MAX_PARTITIONS, PARTITION_TABLE_FLASH))
4302 error(1, 0, "Error can not read the partition table (partition)");
4303
4304 printf("\n[Partition table]\n");
4305 printf("%-8s %-8s %s\n", "base", "size", "name");
4306
4307 e = &parts[0];
4308 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4309 printf("%08x %08x %s\n", e->base, e->size, e->name);
4310 }
4311
4312 fclose(input_file);
4313
4314 return 0;
4315 }
4316
4317 static void write_ff(FILE *output_file, size_t size)
4318 {
4319 char buf[4096];
4320 size_t offset;
4321
4322 memset(buf, 0xff, sizeof(buf));
4323
4324 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
4325 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
4326 error(1, errno, "Can not write 0xff to output_file");
4327 }
4328
4329 /* write last chunk smaller than buffer */
4330 if (offset < size) {
4331 offset = size - offset;
4332 if (fwrite(buf, offset, 1, output_file) != 1)
4333 error(1, errno, "Can not write partition to output_file");
4334 }
4335 }
4336
4337 static void convert_firmware(const char *input, const char *output)
4338 {
4339 struct flash_partition_entry flash[MAX_PARTITIONS] = {};
4340 struct flash_partition_entry *fwup_partition_table;
4341 struct flash_partition_entry *flash_file_system;
4342 struct flash_partition_entry *fwup_file_system;
4343 struct flash_partition_entry *flash_os_image;
4344 struct flash_partition_entry *fwup_os_image;
4345 struct safeloader_image_info info = {};
4346 size_t flash_table_offset;
4347 struct stat statbuf;
4348 FILE *output_file;
4349 FILE *input_file;
4350
4351 /* check input file */
4352 if (stat(input, &statbuf)) {
4353 error(1, errno, "Can not read input firmware %s", input);
4354 }
4355
4356 input_file = fopen(input, "rb");
4357 if (!input_file)
4358 error(1, 0, "Can not open input firmware %s", input);
4359
4360 output_file = fopen(output, "wb");
4361 if (!output_file)
4362 error(1, 0, "Can not open output firmware %s", output);
4363
4364 input_file = fopen(input, "rb");
4365 safeloader_parse_image(input_file, &info);
4366
4367 fwup_os_image = find_partition(info.entries, MAX_PARTITIONS,
4368 "os-image", "Error can not find os-image partition (fwup)");
4369 fwup_file_system = find_partition(info.entries, MAX_PARTITIONS,
4370 "file-system", "Error can not find file-system partition (fwup)");
4371 fwup_partition_table = find_partition(info.entries, MAX_PARTITIONS,
4372 "partition-table", "Error can not find partition-table partition");
4373
4374 /* the flash partition table has a 0x00000004 magic haeder */
4375 flash_table_offset = info.payload_offset + fwup_partition_table->base + 4;
4376 if (read_partition_table(input_file, flash_table_offset, flash, MAX_PARTITIONS, PARTITION_TABLE_FLASH) != 0)
4377 error(1, 0, "Error can not read the partition table (flash)");
4378
4379 flash_os_image = find_partition(flash, MAX_PARTITIONS,
4380 "os-image", "Error can not find os-image partition (flash)");
4381 flash_file_system = find_partition(flash, MAX_PARTITIONS,
4382 "file-system", "Error can not find file-system partition (flash)");
4383
4384 /* write os_image to 0x0 */
4385 write_partition(input_file, info.payload_offset, fwup_os_image, output_file);
4386 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
4387
4388 /* write file-system behind os_image */
4389 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
4390 write_partition(input_file, info.payload_offset, fwup_file_system, output_file);
4391
4392 fclose(output_file);
4393 fclose(input_file);
4394 }
4395
4396 int main(int argc, char *argv[]) {
4397 const char *info_image = NULL, *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
4398 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
4399 bool add_jffs2_eof = false, sysupgrade = false;
4400 unsigned rev = 0;
4401 struct device_info *info;
4402 set_source_date_epoch();
4403
4404 while (true) {
4405 int c;
4406
4407 c = getopt(argc, argv, "i:B:k:r:o:V:jSh:x:d:z:");
4408 if (c == -1)
4409 break;
4410
4411 switch (c) {
4412 case 'i':
4413 info_image = optarg;
4414 break;
4415
4416 case 'B':
4417 board = optarg;
4418 break;
4419
4420 case 'k':
4421 kernel_image = optarg;
4422 break;
4423
4424 case 'r':
4425 rootfs_image = optarg;
4426 break;
4427
4428 case 'o':
4429 output = optarg;
4430 break;
4431
4432 case 'V':
4433 sscanf(optarg, "r%u", &rev);
4434 break;
4435
4436 case 'j':
4437 add_jffs2_eof = true;
4438 break;
4439
4440 case 'S':
4441 sysupgrade = true;
4442 break;
4443
4444 case 'h':
4445 usage(argv[0]);
4446 return 0;
4447
4448 case 'd':
4449 output_directory = optarg;
4450 break;
4451
4452 case 'x':
4453 extract_image = optarg;
4454 break;
4455
4456 case 'z':
4457 convert_image = optarg;
4458 break;
4459
4460 default:
4461 usage(argv[0]);
4462 return 1;
4463 }
4464 }
4465
4466 if (info_image) {
4467 firmware_info(info_image);
4468 } else if (extract_image || output_directory) {
4469 if (!extract_image)
4470 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
4471 if (!output_directory)
4472 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
4473 extract_firmware(extract_image, output_directory);
4474 } else if (convert_image) {
4475 if (!output)
4476 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
4477 convert_firmware(convert_image, output);
4478 } else {
4479 if (!board)
4480 error(1, 0, "no board has been specified");
4481 if (!kernel_image)
4482 error(1, 0, "no kernel image has been specified");
4483 if (!rootfs_image)
4484 error(1, 0, "no rootfs image has been specified");
4485 if (!output)
4486 error(1, 0, "no output filename has been specified");
4487
4488 info = find_board(board);
4489
4490 if (info == NULL)
4491 error(1, 0, "unsupported board %s", board);
4492
4493 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
4494 }
4495
4496 return 0;
4497 }