tplink-safeloader: add TL-WPA8635P v3
[project/firmware-utils.git] / src / tplink-safeloader.c
1 // SPDX-License-Identifier: BSD-2-Clause
2 /*
3 Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
4 All rights reserved.
5 */
6
7
8 /*
9 tplink-safeloader
10
11 Image generation tool for the TP-LINK SafeLoader as seen on
12 TP-LINK Pharos devices (CPE210/220/510/520)
13 */
14
15
16 #include <assert.h>
17 #include <ctype.h>
18 #include <errno.h>
19 #include <stdbool.h>
20 #include <stddef.h>
21 #include <stdio.h>
22 #include <stdint.h>
23 #include <stdlib.h>
24 #include <string.h>
25 #include <time.h>
26 #include <unistd.h>
27
28 #include <arpa/inet.h>
29
30 #include <sys/types.h>
31 #include <sys/stat.h>
32 #include <limits.h>
33
34 #include "md5.h"
35
36
37 #define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
38
39
40 #define MAX_PARTITIONS 32
41
42 /** An image partition table entry */
43 struct image_partition_entry {
44 const char *name;
45 size_t size;
46 uint8_t *data;
47 };
48
49 /** A flash partition table entry */
50 struct flash_partition_entry {
51 const char *name;
52 uint32_t base;
53 uint32_t size;
54 };
55
56 /** Flash partition names table entry */
57 struct factory_partition_names {
58 const char *partition_table;
59 const char *soft_ver;
60 const char *os_image;
61 const char *support_list;
62 const char *file_system;
63 const char *extra_para;
64 };
65
66 /** Partition trailing padding definitions
67 * Values 0x00 to 0xff are reserved to indicate the padding value
68 * Values from 0x100 are reserved to indicate other behaviour */
69 enum partition_trail_value {
70 PART_TRAIL_00 = 0x00,
71 PART_TRAIL_FF = 0xff,
72 PART_TRAIL_MAX = 0xff,
73 PART_TRAIL_NONE = 0x100
74 };
75
76 /** soft-version value overwrite types
77 * The default (for an uninitialised soft_ver field) is to use the numerical
78 * version number "0.0.0"
79 */
80 enum soft_ver_type {
81 SOFT_VER_TYPE_NUMERIC = 0,
82 SOFT_VER_TYPE_TEXT = 1,
83 };
84
85 /** Firmware layout description */
86 struct device_info {
87 const char *id;
88 const char *vendor;
89 const char *support_list;
90 enum partition_trail_value part_trail;
91 struct {
92 enum soft_ver_type type;
93 union {
94 const char *text;
95 uint8_t num[3];
96 };
97 } soft_ver;
98 uint32_t soft_ver_compat_level;
99 struct flash_partition_entry partitions[MAX_PARTITIONS+1];
100 const char *first_sysupgrade_partition;
101 const char *last_sysupgrade_partition;
102 struct factory_partition_names partition_names;
103 };
104
105 #define SOFT_VER_TEXT(_t) {.type = SOFT_VER_TYPE_TEXT, .text = _t}
106 #define SOFT_VER_NUMERIC(_maj, _min, _patch) { \
107 .type = SOFT_VER_TYPE_NUMERIC, \
108 .num = {_maj, _min, _patch}}
109 #define SOFT_VER_DEFAULT SOFT_VER_NUMERIC(0, 0, 0)
110
111 struct __attribute__((__packed__)) meta_header {
112 uint32_t length;
113 uint32_t zero;
114 };
115
116 /** The content of the soft-version structure */
117 struct __attribute__((__packed__)) soft_version {
118 uint8_t pad1;
119 uint8_t version_major;
120 uint8_t version_minor;
121 uint8_t version_patch;
122 uint8_t year_hi;
123 uint8_t year_lo;
124 uint8_t month;
125 uint8_t day;
126 uint32_t rev;
127 uint32_t compat_level;
128 };
129
130 /*
131 * Safeloader image type
132 * Safeloader images contain a 0x14 byte preamble with image size (big endian
133 * UINT32) and md5 checksum (16 bytes).
134 *
135 * SAFEFLOADER_TYPE_DEFAULT
136 * Standard preamble with size including preamble length, and checksum.
137 * Header of 0x1000 bytes, contents of which are not specified.
138 * Payload starts at offset 0x1014.
139 *
140 * SAFELOADER_TYPE_VENDOR
141 * Standard preamble with size including preamble length, and checksum.
142 * Header contains up to 0x1000 bytes of vendor data, starting with a big endian
143 * UINT32 size, followed by that number of bytes containing (text) data.
144 * Padded with 0xFF. Payload starts at offset 0x1014.
145 *
146 * SAFELOADER_TYPE_CLOUD
147 * Standard preamble with size including preamble length, and checksum.
148 * Followed by the 'fw-type:Cloud' string and some (unknown) data.
149 * Payload starts at offset 0x1014.
150 *
151 * SAFELOADER_TYPE_QNEW
152 * Reversed order preamble, with (apparent) md5 checksum before the image
153 * size. The size does not include the preamble length.
154 * Header starts with 0x3C bytes, starting with the string '?NEW' (format not
155 * understood). Then another 0x1000 bytes follow, with the data payload
156 * starting at 0x1050.
157 */
158 enum safeloader_image_type {
159 SAFELOADER_TYPE_DEFAULT,
160 SAFELOADER_TYPE_VENDOR,
161 SAFELOADER_TYPE_CLOUD,
162 SAFELOADER_TYPE_QNEW,
163 };
164
165 /* Internal representation of safeloader image data */
166 struct safeloader_image_info {
167 enum safeloader_image_type type;
168 size_t payload_offset;
169 struct flash_partition_entry entries[MAX_PARTITIONS];
170 };
171
172 #define SAFELOADER_PREAMBLE_SIZE 0x14
173 #define SAFELOADER_HEADER_SIZE 0x1000
174 #define SAFELOADER_PAYLOAD_OFFSET (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_HEADER_SIZE)
175
176 #define SAFELOADER_QNEW_HEADER_SIZE 0x3C
177 #define SAFELOADER_QNEW_PAYLOAD_OFFSET \
178 (SAFELOADER_PREAMBLE_SIZE + SAFELOADER_QNEW_HEADER_SIZE + SAFELOADER_HEADER_SIZE)
179
180 #define SAFELOADER_PAYLOAD_TABLE_SIZE 0x800
181
182 static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
183
184
185 /**
186 Salt for the MD5 hash
187
188 Fortunately, TP-LINK seems to use the same salt for most devices which use
189 the new image format.
190 */
191 static const uint8_t md5_salt[16] = {
192 0x7a, 0x2b, 0x15, 0xed,
193 0x9b, 0x98, 0x59, 0x6d,
194 0xe5, 0x04, 0xab, 0x44,
195 0xac, 0x2a, 0x9f, 0x4e,
196 };
197
198
199 /** Firmware layout table */
200 static struct device_info boards[] = {
201 /** Firmware layout for the CPE210/220 V1 */
202 {
203 .id = "CPE210",
204 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
205 .support_list =
206 "SupportList:\r\n"
207 "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
208 "CPE210(TP-LINK|UN|N300-2):1.1\r\n"
209 "CPE210(TP-LINK|US|N300-2):1.1\r\n"
210 "CPE210(TP-LINK|EU|N300-2):1.1\r\n"
211 "CPE220(TP-LINK|UN|N300-2):1.1\r\n"
212 "CPE220(TP-LINK|US|N300-2):1.1\r\n"
213 "CPE220(TP-LINK|EU|N300-2):1.1\r\n",
214 .part_trail = 0xff,
215 .soft_ver = SOFT_VER_DEFAULT,
216
217 .partitions = {
218 {"fs-uboot", 0x00000, 0x20000},
219 {"partition-table", 0x20000, 0x02000},
220 {"default-mac", 0x30000, 0x00020},
221 {"product-info", 0x31100, 0x00100},
222 {"signature", 0x32000, 0x00400},
223 {"firmware", 0x40000, 0x770000},
224 {"soft-version", 0x7b0000, 0x00100},
225 {"support-list", 0x7b1000, 0x00400},
226 {"user-config", 0x7c0000, 0x10000},
227 {"default-config", 0x7d0000, 0x10000},
228 {"log", 0x7e0000, 0x10000},
229 {"radio", 0x7f0000, 0x10000},
230 {NULL, 0, 0}
231 },
232
233 .first_sysupgrade_partition = "os-image",
234 .last_sysupgrade_partition = "support-list",
235 },
236
237 /** Firmware layout for the CPE210 V2 */
238 {
239 .id = "CPE210V2",
240 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n",
241 .support_list =
242 "SupportList:\r\n"
243 "CPE210(TP-LINK|EU|N300-2|00000000):2.0\r\n"
244 "CPE210(TP-LINK|EU|N300-2|45550000):2.0\r\n"
245 "CPE210(TP-LINK|EU|N300-2|55530000):2.0\r\n"
246 "CPE210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
247 "CPE210(TP-LINK|UN|N300-2|45550000):2.0\r\n"
248 "CPE210(TP-LINK|UN|N300-2|55530000):2.0\r\n"
249 "CPE210(TP-LINK|US|N300-2|55530000):2.0\r\n"
250 "CPE210(TP-LINK|UN|N300-2):2.0\r\n"
251 "CPE210(TP-LINK|EU|N300-2):2.0\r\n"
252 "CPE210(TP-LINK|US|N300-2):2.0\r\n",
253 .part_trail = 0xff,
254 .soft_ver = SOFT_VER_DEFAULT,
255
256 .partitions = {
257 {"fs-uboot", 0x00000, 0x20000},
258 {"partition-table", 0x20000, 0x02000},
259 {"default-mac", 0x30000, 0x00020},
260 {"product-info", 0x31100, 0x00100},
261 {"device-info", 0x31400, 0x00400},
262 {"signature", 0x32000, 0x00400},
263 {"device-id", 0x33000, 0x00100},
264 {"firmware", 0x40000, 0x770000},
265 {"soft-version", 0x7b0000, 0x00100},
266 {"support-list", 0x7b1000, 0x01000},
267 {"user-config", 0x7c0000, 0x10000},
268 {"default-config", 0x7d0000, 0x10000},
269 {"log", 0x7e0000, 0x10000},
270 {"radio", 0x7f0000, 0x10000},
271 {NULL, 0, 0}
272 },
273
274 .first_sysupgrade_partition = "os-image",
275 .last_sysupgrade_partition = "support-list",
276 },
277
278 /** Firmware layout for the CPE210 V3 */
279 {
280 .id = "CPE210V3",
281 .vendor = "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n",
282 .support_list =
283 "SupportList:\r\n"
284 "CPE210(TP-LINK|EU|N300-2|45550000):3.0\r\n"
285 "CPE210(TP-LINK|UN|N300-2|00000000):3.0\r\n"
286 "CPE210(TP-LINK|US|N300-2|55530000):3.0\r\n"
287 "CPE210(TP-LINK|UN|N300-2):3.0\r\n"
288 "CPE210(TP-LINK|EU|N300-2):3.0\r\n"
289 "CPE210(TP-LINK|EU|N300-2|45550000):3.1\r\n"
290 "CPE210(TP-LINK|UN|N300-2|00000000):3.1\r\n"
291 "CPE210(TP-LINK|US|N300-2|55530000):3.1\r\n"
292 "CPE210(TP-LINK|EU|N300-2|45550000):3.20\r\n"
293 "CPE210(TP-LINK|UN|N300-2|00000000):3.20\r\n"
294 "CPE210(TP-LINK|US|N300-2|55530000):3.20\r\n",
295 .part_trail = 0xff,
296 .soft_ver = SOFT_VER_DEFAULT,
297
298 .partitions = {
299 {"fs-uboot", 0x00000, 0x20000},
300 {"partition-table", 0x20000, 0x01000},
301 {"default-mac", 0x30000, 0x00020},
302 {"product-info", 0x31100, 0x00100},
303 {"device-info", 0x31400, 0x00400},
304 {"signature", 0x32000, 0x00400},
305 {"device-id", 0x33000, 0x00100},
306 {"firmware", 0x40000, 0x770000},
307 {"soft-version", 0x7b0000, 0x00100},
308 {"support-list", 0x7b1000, 0x01000},
309 {"user-config", 0x7c0000, 0x10000},
310 {"default-config", 0x7d0000, 0x10000},
311 {"log", 0x7e0000, 0x10000},
312 {"radio", 0x7f0000, 0x10000},
313 {NULL, 0, 0}
314 },
315
316 .first_sysupgrade_partition = "os-image",
317 .last_sysupgrade_partition = "support-list",
318 },
319
320 /** Firmware layout for the CPE220 V2 */
321 {
322 .id = "CPE220V2",
323 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
324 .support_list =
325 "SupportList:\r\n"
326 "CPE220(TP-LINK|EU|N300-2|00000000):2.0\r\n"
327 "CPE220(TP-LINK|EU|N300-2|45550000):2.0\r\n"
328 "CPE220(TP-LINK|EU|N300-2|55530000):2.0\r\n"
329 "CPE220(TP-LINK|UN|N300-2|00000000):2.0\r\n"
330 "CPE220(TP-LINK|UN|N300-2|45550000):2.0\r\n"
331 "CPE220(TP-LINK|UN|N300-2|55530000):2.0\r\n"
332 "CPE220(TP-LINK|US|N300-2|55530000):2.0\r\n"
333 "CPE220(TP-LINK|UN|N300-2):2.0\r\n"
334 "CPE220(TP-LINK|EU|N300-2):2.0\r\n"
335 "CPE220(TP-LINK|US|N300-2):2.0\r\n",
336 .part_trail = 0xff,
337 .soft_ver = SOFT_VER_DEFAULT,
338
339 .partitions = {
340 {"fs-uboot", 0x00000, 0x20000},
341 {"partition-table", 0x20000, 0x02000},
342 {"default-mac", 0x30000, 0x00020},
343 {"product-info", 0x31100, 0x00100},
344 {"signature", 0x32000, 0x00400},
345 {"firmware", 0x40000, 0x770000},
346 {"soft-version", 0x7b0000, 0x00100},
347 {"support-list", 0x7b1000, 0x00400},
348 {"user-config", 0x7c0000, 0x10000},
349 {"default-config", 0x7d0000, 0x10000},
350 {"log", 0x7e0000, 0x10000},
351 {"radio", 0x7f0000, 0x10000},
352 {NULL, 0, 0}
353 },
354
355 .first_sysupgrade_partition = "os-image",
356 .last_sysupgrade_partition = "support-list",
357 },
358
359 /** Firmware layout for the CPE220 V3 */
360 {
361 .id = "CPE220V3",
362 .vendor = "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n",
363 .support_list =
364 "SupportList:\r\n"
365 "CPE220(TP-LINK|EU|N300-2|00000000):3.0\r\n"
366 "CPE220(TP-LINK|EU|N300-2|45550000):3.0\r\n"
367 "CPE220(TP-LINK|EU|N300-2|55530000):3.0\r\n"
368 "CPE220(TP-LINK|UN|N300-2|00000000):3.0\r\n"
369 "CPE220(TP-LINK|UN|N300-2|45550000):3.0\r\n"
370 "CPE220(TP-LINK|UN|N300-2|55530000):3.0\r\n"
371 "CPE220(TP-LINK|US|N300-2|55530000):3.0\r\n"
372 "CPE220(TP-LINK|UN|N300-2):3.0\r\n"
373 "CPE220(TP-LINK|EU|N300-2):3.0\r\n"
374 "CPE220(TP-LINK|US|N300-2):3.0\r\n",
375 .part_trail = 0xff,
376 .soft_ver = SOFT_VER_DEFAULT,
377
378 .partitions = {
379 {"fs-uboot", 0x00000, 0x20000},
380 {"partition-table", 0x20000, 0x02000},
381 {"default-mac", 0x30000, 0x00020},
382 {"product-info", 0x31100, 0x00100},
383 {"device-info", 0x31400, 0x00400},
384 {"signature", 0x32000, 0x00400},
385 {"device-id", 0x33000, 0x00100},
386 {"firmware", 0x40000, 0x770000},
387 {"soft-version", 0x7b0000, 0x00100},
388 {"support-list", 0x7b1000, 0x01000},
389 {"user-config", 0x7c0000, 0x10000},
390 {"default-config", 0x7d0000, 0x10000},
391 {"log", 0x7e0000, 0x10000},
392 {"radio", 0x7f0000, 0x10000},
393 {NULL, 0, 0}
394 },
395
396 .first_sysupgrade_partition = "os-image",
397 .last_sysupgrade_partition = "support-list",
398 },
399
400 /** Firmware layout for the CPE510/520 V1 */
401 {
402 .id = "CPE510",
403 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
404 .support_list =
405 "SupportList:\r\n"
406 "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
407 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
408 "CPE510(TP-LINK|UN|N300-5):1.1\r\n"
409 "CPE510(TP-LINK|US|N300-5):1.1\r\n"
410 "CPE510(TP-LINK|EU|N300-5):1.1\r\n"
411 "CPE520(TP-LINK|UN|N300-5):1.1\r\n"
412 "CPE520(TP-LINK|US|N300-5):1.1\r\n"
413 "CPE520(TP-LINK|EU|N300-5):1.1\r\n",
414 .part_trail = 0xff,
415 .soft_ver = SOFT_VER_DEFAULT,
416
417 .partitions = {
418 {"fs-uboot", 0x00000, 0x20000},
419 {"partition-table", 0x20000, 0x02000},
420 {"default-mac", 0x30000, 0x00020},
421 {"product-info", 0x31100, 0x00100},
422 {"signature", 0x32000, 0x00400},
423 {"firmware", 0x40000, 0x770000},
424 {"soft-version", 0x7b0000, 0x00100},
425 {"support-list", 0x7b1000, 0x00400},
426 {"user-config", 0x7c0000, 0x10000},
427 {"default-config", 0x7d0000, 0x10000},
428 {"log", 0x7e0000, 0x10000},
429 {"radio", 0x7f0000, 0x10000},
430 {NULL, 0, 0}
431 },
432
433 .first_sysupgrade_partition = "os-image",
434 .last_sysupgrade_partition = "support-list",
435 },
436
437 /** Firmware layout for the CPE510 V2 */
438 {
439 .id = "CPE510V2",
440 .vendor = "CPE510(TP-LINK|UN|N300-5):2.0\r\n",
441 .support_list =
442 "SupportList:\r\n"
443 "CPE510(TP-LINK|EU|N300-5|00000000):2.0\r\n"
444 "CPE510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
445 "CPE510(TP-LINK|EU|N300-5|55530000):2.0\r\n"
446 "CPE510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
447 "CPE510(TP-LINK|UN|N300-5|45550000):2.0\r\n"
448 "CPE510(TP-LINK|UN|N300-5|55530000):2.0\r\n"
449 "CPE510(TP-LINK|US|N300-5|00000000):2.0\r\n"
450 "CPE510(TP-LINK|US|N300-5|45550000):2.0\r\n"
451 "CPE510(TP-LINK|US|N300-5|55530000):2.0\r\n"
452 "CPE510(TP-LINK|UN|N300-5):2.0\r\n"
453 "CPE510(TP-LINK|EU|N300-5):2.0\r\n"
454 "CPE510(TP-LINK|US|N300-5):2.0\r\n",
455 .part_trail = 0xff,
456 .soft_ver = SOFT_VER_DEFAULT,
457
458 .partitions = {
459 {"fs-uboot", 0x00000, 0x20000},
460 {"partition-table", 0x20000, 0x02000},
461 {"default-mac", 0x30000, 0x00020},
462 {"product-info", 0x31100, 0x00100},
463 {"signature", 0x32000, 0x00400},
464 {"firmware", 0x40000, 0x770000},
465 {"soft-version", 0x7b0000, 0x00100},
466 {"support-list", 0x7b1000, 0x00400},
467 {"user-config", 0x7c0000, 0x10000},
468 {"default-config", 0x7d0000, 0x10000},
469 {"log", 0x7e0000, 0x10000},
470 {"radio", 0x7f0000, 0x10000},
471 {NULL, 0, 0}
472 },
473
474 .first_sysupgrade_partition = "os-image",
475 .last_sysupgrade_partition = "support-list",
476 },
477
478 /** Firmware layout for the CPE510 V3 */
479 {
480 .id = "CPE510V3",
481 .vendor = "CPE510(TP-LINK|UN|N300-5):3.0\r\n",
482 .support_list =
483 "SupportList:\r\n"
484 "CPE510(TP-LINK|EU|N300-5|00000000):3.0\r\n"
485 "CPE510(TP-LINK|EU|N300-5|45550000):3.0\r\n"
486 "CPE510(TP-LINK|EU|N300-5|55530000):3.0\r\n"
487 "CPE510(TP-LINK|UN|N300-5|00000000):3.0\r\n"
488 "CPE510(TP-LINK|UN|N300-5|45550000):3.0\r\n"
489 "CPE510(TP-LINK|UN|N300-5|55530000):3.0\r\n"
490 "CPE510(TP-LINK|US|N300-5|00000000):3.0\r\n"
491 "CPE510(TP-LINK|US|N300-5|45550000):3.0\r\n"
492 "CPE510(TP-LINK|US|N300-5|55530000):3.0\r\n"
493 "CPE510(TP-LINK|UN|N300-5):3.0\r\n"
494 "CPE510(TP-LINK|EU|N300-5):3.0\r\n"
495 "CPE510(TP-LINK|US|N300-5):3.0\r\n"
496 "CPE510(TP-LINK|UN|N300-5|00000000):3.20\r\n"
497 "CPE510(TP-LINK|US|N300-5|55530000):3.20\r\n"
498 "CPE510(TP-LINK|EU|N300-5|45550000):3.20\r\n",
499 .part_trail = 0xff,
500 .soft_ver = SOFT_VER_DEFAULT,
501
502 .partitions = {
503 {"fs-uboot", 0x00000, 0x20000},
504 {"partition-table", 0x20000, 0x02000},
505 {"default-mac", 0x30000, 0x00020},
506 {"product-info", 0x31100, 0x00100},
507 {"signature", 0x32000, 0x00400},
508 {"firmware", 0x40000, 0x770000},
509 {"soft-version", 0x7b0000, 0x00100},
510 {"support-list", 0x7b1000, 0x00400},
511 {"user-config", 0x7c0000, 0x10000},
512 {"default-config", 0x7d0000, 0x10000},
513 {"log", 0x7e0000, 0x10000},
514 {"radio", 0x7f0000, 0x10000},
515 {NULL, 0, 0}
516 },
517
518 .first_sysupgrade_partition = "os-image",
519 .last_sysupgrade_partition = "support-list",
520 },
521
522 /** Firmware layout for the CPE605V1 */
523 {
524 .id = "CPE605V1",
525 .vendor = "CPE605(TP-LINK|UN|N150-5):1.0\r\n",
526 .support_list =
527 "SupportList:\r\n"
528 "CPE605(TP-LINK|UN|N150-5|00000000):1.0\r\n"
529 "CPE605(TP-LINK|EU|N150-5|45550000):1.0\r\n"
530 "CPE605(TP-LINK|US|N150-5|55530000):1.0\r\n",
531 .part_trail = 0x00,
532 .soft_ver = SOFT_VER_DEFAULT,
533
534 .partitions = {
535 {"fs-uboot", 0x00000, 0x20000},
536 {"partition-table", 0x20000, 0x02000},
537 {"default-mac", 0x30000, 0x00020},
538 {"serial-number", 0x30100, 0x00020},
539 {"product-info", 0x31100, 0x00100},
540 {"device-info", 0x31400, 0x00400},
541 {"signature", 0x32000, 0x00400},
542 {"device-id", 0x33000, 0x00100},
543 {"firmware", 0x40000, 0x770000},
544 {"soft-version", 0x7b0000, 0x00100},
545 {"support-list", 0x7b1000, 0x01000},
546 {"user-config", 0x7c0000, 0x10000},
547 {"default-config", 0x7d0000, 0x10000},
548 {"log", 0x7e0000, 0x10000},
549 {"radio", 0x7f0000, 0x10000},
550 {NULL, 0, 0}
551 },
552
553 .first_sysupgrade_partition = "os-image",
554 .last_sysupgrade_partition = "support-list",
555 },
556
557 /** Firmware layout for the CPE610V1 */
558 {
559 .id = "CPE610V1",
560 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n",
561 .support_list =
562 "SupportList:\r\n"
563 "CPE610(TP-LINK|EU|N300-5|00000000):1.0\r\n"
564 "CPE610(TP-LINK|EU|N300-5|45550000):1.0\r\n"
565 "CPE610(TP-LINK|EU|N300-5|55530000):1.0\r\n"
566 "CPE610(TP-LINK|UN|N300-5|00000000):1.0\r\n"
567 "CPE610(TP-LINK|UN|N300-5|45550000):1.0\r\n"
568 "CPE610(TP-LINK|UN|N300-5|55530000):1.0\r\n"
569 "CPE610(TP-LINK|US|N300-5|55530000):1.0\r\n"
570 "CPE610(TP-LINK|UN|N300-5):1.0\r\n"
571 "CPE610(TP-LINK|EU|N300-5):1.0\r\n"
572 "CPE610(TP-LINK|US|N300-5):1.0\r\n",
573 .part_trail = 0xff,
574 .soft_ver = SOFT_VER_DEFAULT,
575
576 .partitions = {
577 {"fs-uboot", 0x00000, 0x20000},
578 {"partition-table", 0x20000, 0x02000},
579 {"default-mac", 0x30000, 0x00020},
580 {"product-info", 0x31100, 0x00100},
581 {"signature", 0x32000, 0x00400},
582 {"firmware", 0x40000, 0x770000},
583 {"soft-version", 0x7b0000, 0x00100},
584 {"support-list", 0x7b1000, 0x00400},
585 {"user-config", 0x7c0000, 0x10000},
586 {"default-config", 0x7d0000, 0x10000},
587 {"log", 0x7e0000, 0x10000},
588 {"radio", 0x7f0000, 0x10000},
589 {NULL, 0, 0}
590 },
591
592 .first_sysupgrade_partition = "os-image",
593 .last_sysupgrade_partition = "support-list",
594 },
595
596 /** Firmware layout for the CPE610V2 */
597 {
598 .id = "CPE610V2",
599 .vendor = "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n",
600 .support_list =
601 "SupportList:\r\n"
602 "CPE610(TP-LINK|EU|N300-5|00000000):2.0\r\n"
603 "CPE610(TP-LINK|EU|N300-5|45550000):2.0\r\n"
604 "CPE610(TP-LINK|EU|N300-5|55530000):2.0\r\n"
605 "CPE610(TP-LINK|UN|N300-5|00000000):2.0\r\n"
606 "CPE610(TP-LINK|UN|N300-5|45550000):2.0\r\n"
607 "CPE610(TP-LINK|UN|N300-5|55530000):2.0\r\n"
608 "CPE610(TP-LINK|US|N300-5|55530000):2.0\r\n"
609 "CPE610(TP-LINK|UN|N300-5):2.0\r\n"
610 "CPE610(TP-LINK|EU|N300-5):2.0\r\n"
611 "CPE610(TP-LINK|US|N300-5):2.0\r\n",
612 .part_trail = 0xff,
613 .soft_ver = SOFT_VER_DEFAULT,
614
615 .partitions = {
616 {"fs-uboot", 0x00000, 0x20000},
617 {"partition-table", 0x20000, 0x02000},
618 {"default-mac", 0x30000, 0x00020},
619 {"product-info", 0x31100, 0x00100},
620 {"signature", 0x32000, 0x00400},
621 {"firmware", 0x40000, 0x770000},
622 {"soft-version", 0x7b0000, 0x00100},
623 {"support-list", 0x7b1000, 0x00400},
624 {"user-config", 0x7c0000, 0x10000},
625 {"default-config", 0x7d0000, 0x10000},
626 {"log", 0x7e0000, 0x10000},
627 {"radio", 0x7f0000, 0x10000},
628 {NULL, 0, 0}
629 },
630
631 .first_sysupgrade_partition = "os-image",
632 .last_sysupgrade_partition = "support-list",
633 },
634 /** Firmware layout for the CPE710 V1 */
635 {
636 .id = "CPE710V1",
637 .vendor = "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n",
638 .support_list =
639 "SupportList:\r\n"
640 "CPE710(TP-LINK|UN|AC866-5|00000000):1.0\r\n"
641 "CPE710(TP-LINK|EU|AC866-5|45550000):1.0\r\n"
642 "CPE710(TP-LINK|US|AC866-5|55530000):1.0\r\n"
643 "CPE710(TP-LINK|UN|AC866-5):1.0\r\n"
644 "CPE710(TP-LINK|EU|AC866-5):1.0\r\n"
645 "CPE710(TP-LINK|US|AC866-5):1.0\r\n",
646 .part_trail = 0xff,
647 .soft_ver = SOFT_VER_DEFAULT,
648
649 .partitions = {
650 {"fs-uboot", 0x00000, 0x50000},
651 {"partition-table", 0x50000, 0x02000},
652 {"default-mac", 0x60000, 0x00020},
653 {"serial-number", 0x60100, 0x00020},
654 {"product-info", 0x61100, 0x00100},
655 {"device-info", 0x61400, 0x00400},
656 {"signature", 0x62000, 0x00400},
657 {"device-id", 0x63000, 0x00100},
658 {"firmware", 0x70000, 0xf40000},
659 {"soft-version", 0xfb0000, 0x00100},
660 {"support-list", 0xfb1000, 0x01000},
661 {"user-config", 0xfc0000, 0x10000},
662 {"default-config", 0xfd0000, 0x10000},
663 {"log", 0xfe0000, 0x10000},
664 {"radio", 0xff0000, 0x10000},
665 {NULL, 0, 0}
666 },
667
668 .first_sysupgrade_partition = "os-image",
669 .last_sysupgrade_partition = "support-list",
670 },
671
672 {
673 .id = "WBS210",
674 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
675 .support_list =
676 "SupportList:\r\n"
677 "WBS210(TP-LINK|UN|N300-2):1.20\r\n"
678 "WBS210(TP-LINK|US|N300-2):1.20\r\n"
679 "WBS210(TP-LINK|EU|N300-2):1.20\r\n",
680 .part_trail = 0xff,
681 .soft_ver = SOFT_VER_DEFAULT,
682
683 .partitions = {
684 {"fs-uboot", 0x00000, 0x20000},
685 {"partition-table", 0x20000, 0x02000},
686 {"default-mac", 0x30000, 0x00020},
687 {"product-info", 0x31100, 0x00100},
688 {"signature", 0x32000, 0x00400},
689 {"firmware", 0x40000, 0x770000},
690 {"soft-version", 0x7b0000, 0x00100},
691 {"support-list", 0x7b1000, 0x00400},
692 {"user-config", 0x7c0000, 0x10000},
693 {"default-config", 0x7d0000, 0x10000},
694 {"log", 0x7e0000, 0x10000},
695 {"radio", 0x7f0000, 0x10000},
696 {NULL, 0, 0}
697 },
698
699 .first_sysupgrade_partition = "os-image",
700 .last_sysupgrade_partition = "support-list",
701 },
702
703 {
704 .id = "WBS210V2",
705 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
706 .support_list =
707 "SupportList:\r\n"
708 "WBS210(TP-LINK|UN|N300-2|00000000):2.0\r\n"
709 "WBS210(TP-LINK|US|N300-2|55530000):2.0\r\n"
710 "WBS210(TP-LINK|EU|N300-2|45550000):2.0\r\n",
711 .part_trail = 0xff,
712 .soft_ver = SOFT_VER_DEFAULT,
713
714 .partitions = {
715 {"fs-uboot", 0x00000, 0x20000},
716 {"partition-table", 0x20000, 0x02000},
717 {"default-mac", 0x30000, 0x00020},
718 {"product-info", 0x31100, 0x00100},
719 {"signature", 0x32000, 0x00400},
720 {"firmware", 0x40000, 0x770000},
721 {"soft-version", 0x7b0000, 0x00100},
722 {"support-list", 0x7b1000, 0x00400},
723 {"user-config", 0x7c0000, 0x10000},
724 {"default-config", 0x7d0000, 0x10000},
725 {"log", 0x7e0000, 0x10000},
726 {"radio", 0x7f0000, 0x10000},
727 {NULL, 0, 0}
728 },
729
730 .first_sysupgrade_partition = "os-image",
731 .last_sysupgrade_partition = "support-list",
732 },
733
734 {
735 .id = "WBS510",
736 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
737 .support_list =
738 "SupportList:\r\n"
739 "WBS510(TP-LINK|UN|N300-5):1.20\r\n"
740 "WBS510(TP-LINK|US|N300-5):1.20\r\n"
741 "WBS510(TP-LINK|EU|N300-5):1.20\r\n"
742 "WBS510(TP-LINK|CA|N300-5):1.20\r\n",
743 .part_trail = 0xff,
744 .soft_ver = SOFT_VER_DEFAULT,
745
746 .partitions = {
747 {"fs-uboot", 0x00000, 0x20000},
748 {"partition-table", 0x20000, 0x02000},
749 {"default-mac", 0x30000, 0x00020},
750 {"product-info", 0x31100, 0x00100},
751 {"signature", 0x32000, 0x00400},
752 {"firmware", 0x40000, 0x770000},
753 {"soft-version", 0x7b0000, 0x00100},
754 {"support-list", 0x7b1000, 0x00400},
755 {"user-config", 0x7c0000, 0x10000},
756 {"default-config", 0x7d0000, 0x10000},
757 {"log", 0x7e0000, 0x10000},
758 {"radio", 0x7f0000, 0x10000},
759 {NULL, 0, 0}
760 },
761
762 .first_sysupgrade_partition = "os-image",
763 .last_sysupgrade_partition = "support-list",
764 },
765
766 {
767 .id = "WBS510V2",
768 .vendor = "CPE510(TP-LINK|UN|N300-5):1.0\r\n",
769 .support_list =
770 "SupportList:\r\n"
771 "WBS510(TP-LINK|UN|N300-5|00000000):2.0\r\n"
772 "WBS510(TP-LINK|US|N300-5|55530000):2.0\r\n"
773 "WBS510(TP-LINK|EU|N300-5|45550000):2.0\r\n"
774 "WBS510(TP-LINK|CA|N300-5|43410000):2.0\r\n",
775 .part_trail = 0xff,
776 .soft_ver = SOFT_VER_DEFAULT,
777
778 .partitions = {
779 {"fs-uboot", 0x00000, 0x20000},
780 {"partition-table", 0x20000, 0x02000},
781 {"default-mac", 0x30000, 0x00020},
782 {"product-info", 0x31100, 0x00100},
783 {"signature", 0x32000, 0x00400},
784 {"firmware", 0x40000, 0x770000},
785 {"soft-version", 0x7b0000, 0x00100},
786 {"support-list", 0x7b1000, 0x00400},
787 {"user-config", 0x7c0000, 0x10000},
788 {"default-config", 0x7d0000, 0x10000},
789 {"log", 0x7e0000, 0x10000},
790 {"radio", 0x7f0000, 0x10000},
791 {NULL, 0, 0}
792 },
793
794 .first_sysupgrade_partition = "os-image",
795 .last_sysupgrade_partition = "support-list",
796 },
797
798 /** Firmware layout for the AD7200 */
799 {
800 .id = "AD7200",
801 .vendor = "",
802 .support_list =
803 "SupportList:\r\n"
804 "{product_name:AD7200,product_ver:1.0.0,special_id:00000000}\r\n",
805 .part_trail = 0x00,
806 .soft_ver = SOFT_VER_DEFAULT,
807
808 .partitions = {
809 {"SBL1", 0x00000, 0x20000},
810 {"MIBIB", 0x20000, 0x20000},
811 {"SBL2", 0x40000, 0x20000},
812 {"SBL3", 0x60000, 0x30000},
813 {"DDRCONFIG", 0x90000, 0x10000},
814 {"SSD", 0xa0000, 0x10000},
815 {"TZ", 0xb0000, 0x30000},
816 {"RPM", 0xe0000, 0x20000},
817 {"fs-uboot", 0x100000, 0x70000},
818 {"uboot-env", 0x170000, 0x40000},
819 {"radio", 0x1b0000, 0x40000},
820 {"os-image", 0x1f0000, 0x400000},
821 {"file-system", 0x5f0000, 0x1900000},
822 {"default-mac", 0x1ef0000, 0x00200},
823 {"pin", 0x1ef0200, 0x00200},
824 {"device-id", 0x1ef0400, 0x00200},
825 {"product-info", 0x1ef0600, 0x0fa00},
826 {"partition-table", 0x1f00000, 0x10000},
827 {"soft-version", 0x1f10000, 0x10000},
828 {"support-list", 0x1f20000, 0x10000},
829 {"profile", 0x1f30000, 0x10000},
830 {"default-config", 0x1f40000, 0x10000},
831 {"user-config", 0x1f50000, 0x40000},
832 {"qos-db", 0x1f90000, 0x40000},
833 {"usb-config", 0x1fd0000, 0x10000},
834 {"log", 0x1fe0000, 0x20000},
835 {NULL, 0, 0}
836 },
837
838 .first_sysupgrade_partition = "os-image",
839 .last_sysupgrade_partition = "file-system"
840 },
841
842 /** Firmware layout for the C2600 */
843 {
844 .id = "C2600",
845 .vendor = "",
846 .support_list =
847 "SupportList:\r\n"
848 "{product_name:Archer C2600,product_ver:1.0.0,special_id:00000000}\r\n",
849 .part_trail = 0x00,
850 .soft_ver = SOFT_VER_DEFAULT,
851
852 /**
853 We use a bigger os-image partition than the stock images (and thus
854 smaller file-system), as our kernel doesn't fit in the stock firmware's
855 2 MB os-image since kernel 4.14.
856 */
857 .partitions = {
858 {"SBL1", 0x00000, 0x20000},
859 {"MIBIB", 0x20000, 0x20000},
860 {"SBL2", 0x40000, 0x20000},
861 {"SBL3", 0x60000, 0x30000},
862 {"DDRCONFIG", 0x90000, 0x10000},
863 {"SSD", 0xa0000, 0x10000},
864 {"TZ", 0xb0000, 0x30000},
865 {"RPM", 0xe0000, 0x20000},
866 {"fs-uboot", 0x100000, 0x70000},
867 {"uboot-env", 0x170000, 0x40000},
868 {"radio", 0x1b0000, 0x40000},
869 {"os-image", 0x1f0000, 0x400000}, /* Stock: base 0x1f0000 size 0x200000 */
870 {"file-system", 0x5f0000, 0x1900000}, /* Stock: base 0x3f0000 size 0x1b00000 */
871 {"default-mac", 0x1ef0000, 0x00200},
872 {"pin", 0x1ef0200, 0x00200},
873 {"product-info", 0x1ef0400, 0x0fc00},
874 {"partition-table", 0x1f00000, 0x10000},
875 {"soft-version", 0x1f10000, 0x10000},
876 {"support-list", 0x1f20000, 0x10000},
877 {"profile", 0x1f30000, 0x10000},
878 {"default-config", 0x1f40000, 0x10000},
879 {"user-config", 0x1f50000, 0x40000},
880 {"qos-db", 0x1f90000, 0x40000},
881 {"usb-config", 0x1fd0000, 0x10000},
882 {"log", 0x1fe0000, 0x20000},
883 {NULL, 0, 0}
884 },
885
886 .first_sysupgrade_partition = "os-image",
887 .last_sysupgrade_partition = "file-system"
888 },
889
890 /** Firmware layout for the A7-V5 */
891 {
892 .id = "ARCHER-A7-V5",
893 .support_list =
894 "SupportList:\n"
895 "{product_name:Archer A7,product_ver:5.0.0,special_id:45550000}\n"
896 "{product_name:Archer A7,product_ver:5.0.0,special_id:55530000}\n"
897 "{product_name:Archer A7,product_ver:5.0.0,special_id:43410000}\n"
898 "{product_name:Archer A7,product_ver:5.0.0,special_id:4A500000}\n"
899 "{product_name:Archer A7,product_ver:5.0.0,special_id:54570000}\n"
900 "{product_name:Archer A7,product_ver:5.0.0,special_id:52550000}\n",
901 .part_trail = 0x00,
902 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
903
904 /* We're using a dynamic kernel/rootfs split here */
905 .partitions = {
906 {"factory-boot", 0x00000, 0x20000},
907 {"fs-uboot", 0x20000, 0x20000},
908 {"firmware", 0x40000, 0xec0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
909 /* Stock: name file-system base 0x160000 size 0xda0000 */
910 {"default-mac", 0xf40000, 0x00200},
911 {"pin", 0xf40200, 0x00200},
912 {"device-id", 0xf40400, 0x00100},
913 {"product-info", 0xf40500, 0x0fb00},
914 {"soft-version", 0xf50000, 0x00100},
915 {"extra-para", 0xf51000, 0x01000},
916 {"support-list", 0xf52000, 0x0a000},
917 {"profile", 0xf5c000, 0x04000},
918 {"default-config", 0xf60000, 0x10000},
919 {"user-config", 0xf70000, 0x40000},
920 {"certificate", 0xfb0000, 0x10000},
921 {"partition-table", 0xfc0000, 0x10000},
922 {"log", 0xfd0000, 0x20000},
923 {"radio", 0xff0000, 0x10000},
924 {NULL, 0, 0}
925 },
926
927 .first_sysupgrade_partition = "os-image",
928 .last_sysupgrade_partition = "file-system",
929 },
930
931 /** Firmware layout for the Archer A9 v6 */
932 {
933 .id = "ARCHER-A9-V6",
934 .support_list =
935 "SupportList:\n"
936 "{product_name:Archer A9,product_ver:6.0,special_id:55530000}\n"
937 "{product_name:Archer A9,product_ver:6.0,special_id:45550000}\n"
938 "{product_name:Archer A9,product_ver:6.0,special_id:52550000}\n"
939 "{product_name:Archer A9,product_ver:6.0,special_id:4A500000}\n"
940 "{product_name:Archer C90,product_ver:6.0,special_id:55530000}\n",
941 .part_trail = 0x00,
942 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
943
944 /* We're using a dynamic kernel/rootfs split here */
945 .partitions = {
946 {"factory-boot", 0x00000, 0x20000},
947 {"fs-uboot", 0x20000, 0x20000},
948 {"partition-table", 0x40000, 0x10000},
949 {"radio", 0x50000, 0x10000},
950 {"default-mac", 0x60000, 0x00200},
951 {"pin", 0x60200, 0x00200},
952 {"device-id", 0x60400, 0x00100},
953 {"product-info", 0x60500, 0x0fb00},
954 {"soft-version", 0x70000, 0x01000},
955 {"extra-para", 0x71000, 0x01000},
956 {"support-list", 0x72000, 0x0a000},
957 {"profile", 0x7c000, 0x04000},
958 {"user-config", 0x80000, 0x10000},
959 {"ap-config", 0x90000, 0x10000},
960 {"apdef-config", 0xa0000, 0x10000},
961 {"router-config", 0xb0000, 0x10000},
962 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
963 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
964 {"log", 0xfc0000, 0x20000},
965 {"certificate", 0xfe0000, 0x10000},
966 {"default-config", 0xff0000, 0x10000},
967 {NULL, 0, 0}
968 },
969
970 .first_sysupgrade_partition = "os-image",
971 .last_sysupgrade_partition = "file-system",
972 },
973
974 /** Firmware layout for the Archer AX23 v1 */
975 {
976 .id = "ARCHER-AX23-V1",
977 .vendor = "",
978 .support_list =
979 "SupportList:\n"
980 "{product_name:Archer AX23,product_ver:1.0,special_id:45550000}\n"
981 "{product_name:Archer AX23,product_ver:1.0,special_id:4A500000}\n"
982 "{product_name:Archer AX23,product_ver:1.0,special_id:4B520000}\n"
983 "{product_name:Archer AX23,product_ver:1.0,special_id:52550000}\n"
984 "{product_name:Archer AX23,product_ver:1.0.0,special_id:43410000}\n"
985 "{product_name:Archer AX23,product_ver:1.0.0,special_id:54570000}\n"
986 "{product_name:Archer AX23,product_ver:1.0.0,special_id:55530000}\n"
987 "{product_name:Archer AX23,product_ver:1.20,special_id:45550000}\n"
988 "{product_name:Archer AX23,product_ver:1.20,special_id:4A500000}\n"
989 "{product_name:Archer AX23,product_ver:1.20,special_id:52550000}\n"
990 "{product_name:Archer AX23,product_ver:1.20,special_id:55530000}\n"
991 "{product_name:Archer AX1800,product_ver:1.20,special_id:45550000}\n"
992 "{product_name:Archer AX1800,product_ver:1.20,special_id:52550000}\n",
993 .part_trail = 0x00,
994 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.3\n"),
995
996 .partitions = {
997 {"fs-uboot", 0x00000, 0x40000},
998 {"firmware", 0x40000, 0xf60000},
999 {"default-mac", 0xfa0000, 0x00200},
1000 {"pin", 0xfa0200, 0x00100},
1001 {"device-id", 0xfa0300, 0x00100},
1002 {"product-info", 0xfa0400, 0x0fc00},
1003 {"default-config", 0xfb0000, 0x08000},
1004 {"ap-def-config", 0xfb8000, 0x08000},
1005 {"user-config", 0xfc0000, 0x0a000},
1006 {"ag-config", 0xfca000, 0x04000},
1007 {"certificate", 0xfce000, 0x02000},
1008 {"ap-config", 0xfd0000, 0x06000},
1009 {"router-config", 0xfd6000, 0x06000},
1010 {"favicon", 0xfdc000, 0x02000},
1011 {"logo", 0xfde000, 0x02000},
1012 {"partition-table", 0xfe0000, 0x00800},
1013 {"soft-version", 0xfe0800, 0x00100},
1014 {"support-list", 0xfe0900, 0x00400},
1015 {"profile", 0xfe0d00, 0x03000},
1016 {"extra-para", 0xfe3d00, 0x00100},
1017 {"radio", 0xff0000, 0x10000},
1018 {NULL, 0, 0}
1019 },
1020 .first_sysupgrade_partition = "os-image",
1021 .last_sysupgrade_partition = "file-system",
1022 },
1023 /** Firmware layout for the C2v3 */
1024 {
1025 .id = "ARCHER-C2-V3",
1026 .support_list =
1027 "SupportList:\n"
1028 "{product_name:ArcherC2,product_ver:3.0.0,special_id:00000000}\n"
1029 "{product_name:ArcherC2,product_ver:3.0.0,special_id:55530000}\n"
1030 "{product_name:ArcherC2,product_ver:3.0.0,special_id:45550000}\n",
1031 .part_trail = 0x00,
1032 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.1\n"),
1033
1034 /** We're using a dynamic kernel/rootfs split here */
1035
1036 .partitions = {
1037 {"factory-boot", 0x00000, 0x20000},
1038 {"fs-uboot", 0x20000, 0x10000},
1039 {"firmware", 0x30000, 0x7a0000},
1040 {"user-config", 0x7d0000, 0x04000},
1041 {"default-mac", 0x7e0000, 0x00100},
1042 {"device-id", 0x7e0100, 0x00100},
1043 {"extra-para", 0x7e0200, 0x00100},
1044 {"pin", 0x7e0300, 0x00100},
1045 {"support-list", 0x7e0400, 0x00400},
1046 {"soft-version", 0x7e0800, 0x00400},
1047 {"product-info", 0x7e0c00, 0x01400},
1048 {"partition-table", 0x7e2000, 0x01000},
1049 {"profile", 0x7e3000, 0x01000},
1050 {"default-config", 0x7e4000, 0x04000},
1051 {"merge-config", 0x7ec000, 0x02000},
1052 {"qos-db", 0x7ee000, 0x02000},
1053 {"radio", 0x7f0000, 0x10000},
1054 {NULL, 0, 0}
1055 },
1056
1057 .first_sysupgrade_partition = "os-image",
1058 .last_sysupgrade_partition = "file-system",
1059 },
1060
1061 /** Firmware layout for the C25v1 */
1062 {
1063 .id = "ARCHER-C25-V1",
1064 .support_list =
1065 "SupportList:\n"
1066 "{product_name:ArcherC25,product_ver:1.0.0,special_id:00000000}\n"
1067 "{product_name:ArcherC25,product_ver:1.0.0,special_id:55530000}\n"
1068 "{product_name:ArcherC25,product_ver:1.0.0,special_id:45550000}\n",
1069 .part_trail = 0x00,
1070 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1071
1072 /* We're using a dynamic kernel/rootfs split here */
1073 .partitions = {
1074 {"factory-boot", 0x00000, 0x20000},
1075 {"fs-uboot", 0x20000, 0x10000},
1076 {"firmware", 0x30000, 0x7a0000}, /* Stock: name os-image base 0x30000 size 0x100000 */
1077 /* Stock: name file-system base 0x130000 size 0x6a0000 */
1078 {"user-config", 0x7d0000, 0x04000},
1079 {"default-mac", 0x7e0000, 0x00100},
1080 {"device-id", 0x7e0100, 0x00100},
1081 {"extra-para", 0x7e0200, 0x00100},
1082 {"pin", 0x7e0300, 0x00100},
1083 {"support-list", 0x7e0400, 0x00400},
1084 {"soft-version", 0x7e0800, 0x00400},
1085 {"product-info", 0x7e0c00, 0x01400},
1086 {"partition-table", 0x7e2000, 0x01000},
1087 {"profile", 0x7e3000, 0x01000},
1088 {"default-config", 0x7e4000, 0x04000},
1089 {"merge-config", 0x7ec000, 0x02000},
1090 {"qos-db", 0x7ee000, 0x02000},
1091 {"radio", 0x7f0000, 0x10000},
1092 {NULL, 0, 0}
1093 },
1094
1095 .first_sysupgrade_partition = "os-image",
1096 .last_sysupgrade_partition = "file-system",
1097 },
1098
1099 /** Firmware layout for the C58v1 */
1100 {
1101 .id = "ARCHER-C58-V1",
1102 .vendor = "",
1103 .support_list =
1104 "SupportList:\r\n"
1105 "{product_name:Archer C58,product_ver:1.0.0,special_id:00000000}\r\n"
1106 "{product_name:Archer C58,product_ver:1.0.0,special_id:45550000}\r\n"
1107 "{product_name:Archer C58,product_ver:1.0.0,special_id:55530000}\r\n",
1108 .part_trail = 0x00,
1109 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1110
1111 .partitions = {
1112 {"fs-uboot", 0x00000, 0x10000},
1113 {"default-mac", 0x10000, 0x00200},
1114 {"pin", 0x10200, 0x00200},
1115 {"product-info", 0x10400, 0x00100},
1116 {"partition-table", 0x10500, 0x00800},
1117 {"soft-version", 0x11300, 0x00200},
1118 {"support-list", 0x11500, 0x00100},
1119 {"device-id", 0x11600, 0x00100},
1120 {"profile", 0x11700, 0x03900},
1121 {"default-config", 0x15000, 0x04000},
1122 {"user-config", 0x19000, 0x04000},
1123 {"firmware", 0x20000, 0x7c8000},
1124 {"certyficate", 0x7e8000, 0x08000},
1125 {"radio", 0x7f0000, 0x10000},
1126 {NULL, 0, 0}
1127 },
1128
1129 .first_sysupgrade_partition = "os-image",
1130 .last_sysupgrade_partition = "file-system",
1131 },
1132
1133 /** Firmware layout for the C59v1 */
1134 {
1135 .id = "ARCHER-C59-V1",
1136 .vendor = "",
1137 .support_list =
1138 "SupportList:\r\n"
1139 "{product_name:Archer C59,product_ver:1.0.0,special_id:00000000}\r\n"
1140 "{product_name:Archer C59,product_ver:1.0.0,special_id:43410000}\r\n"
1141 "{product_name:Archer C59,product_ver:1.0.0,special_id:45550000}\r\n"
1142 "{product_name:Archer C59,product_ver:1.0.0,special_id:52550000}\r\n"
1143 "{product_name:Archer C59,product_ver:1.0.0,special_id:55530000}\r\n",
1144 .part_trail = 0x00,
1145 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1146
1147 /* We're using a dynamic kernel/rootfs split here */
1148 .partitions = {
1149 {"fs-uboot", 0x00000, 0x10000},
1150 {"default-mac", 0x10000, 0x00200},
1151 {"pin", 0x10200, 0x00200},
1152 {"device-id", 0x10400, 0x00100},
1153 {"product-info", 0x10500, 0x0fb00},
1154 {"firmware", 0x20000, 0xe30000},
1155 {"partition-table", 0xe50000, 0x10000},
1156 {"soft-version", 0xe60000, 0x10000},
1157 {"support-list", 0xe70000, 0x10000},
1158 {"profile", 0xe80000, 0x10000},
1159 {"default-config", 0xe90000, 0x10000},
1160 {"user-config", 0xea0000, 0x40000},
1161 {"usb-config", 0xee0000, 0x10000},
1162 {"certificate", 0xef0000, 0x10000},
1163 {"qos-db", 0xf00000, 0x40000},
1164 {"log", 0xfe0000, 0x10000},
1165 {"radio", 0xff0000, 0x10000},
1166 {NULL, 0, 0}
1167 },
1168
1169 .first_sysupgrade_partition = "os-image",
1170 .last_sysupgrade_partition = "file-system",
1171 },
1172
1173 /** Firmware layout for the C59v2 */
1174 {
1175 .id = "ARCHER-C59-V2",
1176 .vendor = "",
1177 .support_list =
1178 "SupportList:\r\n"
1179 "{product_name:Archer C59,product_ver:2.0.0,special_id:00000000}\r\n"
1180 "{product_name:Archer C59,product_ver:2.0.0,special_id:43410000}\r\n"
1181 "{product_name:Archer C59,product_ver:2.0.0,special_id:45550000}\r\n"
1182 "{product_name:Archer C59,product_ver:2.0.0,special_id:55530000}\r\n",
1183 .part_trail = 0x00,
1184 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0 Build 20161206 rel.7303\n"),
1185
1186 /** We're using a dynamic kernel/rootfs split here */
1187 .partitions = {
1188 {"factory-boot", 0x00000, 0x20000},
1189 {"fs-uboot", 0x20000, 0x10000},
1190 {"default-mac", 0x30000, 0x00200},
1191 {"pin", 0x30200, 0x00200},
1192 {"device-id", 0x30400, 0x00100},
1193 {"product-info", 0x30500, 0x0fb00},
1194 {"firmware", 0x40000, 0xe10000},
1195 {"partition-table", 0xe50000, 0x10000},
1196 {"soft-version", 0xe60000, 0x10000},
1197 {"support-list", 0xe70000, 0x10000},
1198 {"profile", 0xe80000, 0x10000},
1199 {"default-config", 0xe90000, 0x10000},
1200 {"user-config", 0xea0000, 0x40000},
1201 {"usb-config", 0xee0000, 0x10000},
1202 {"certificate", 0xef0000, 0x10000},
1203 {"extra-para", 0xf00000, 0x10000},
1204 {"qos-db", 0xf10000, 0x30000},
1205 {"log", 0xfe0000, 0x10000},
1206 {"radio", 0xff0000, 0x10000},
1207 {NULL, 0, 0}
1208 },
1209
1210 .first_sysupgrade_partition = "os-image",
1211 .last_sysupgrade_partition = "file-system",
1212 },
1213
1214 /** Firmware layout for the Archer C6 v2 (EU/RU/JP) */
1215 {
1216 .id = "ARCHER-C6-V2",
1217 .vendor = "",
1218 .support_list =
1219 "SupportList:\r\n"
1220 "{product_name:Archer A6,product_ver:2.0.0,special_id:45550000}\r\n"
1221 "{product_name:Archer C6,product_ver:2.0.0,special_id:45550000}\r\n"
1222 "{product_name:Archer C6,product_ver:2.0.0,special_id:52550000}\r\n"
1223 "{product_name:Archer C6,product_ver:2.0.0,special_id:4A500000}\r\n",
1224 .part_trail = 0x00,
1225 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1226
1227 .partitions = {
1228 {"fs-uboot", 0x00000, 0x20000},
1229 {"default-mac", 0x20000, 0x00200},
1230 {"pin", 0x20200, 0x00100},
1231 {"product-info", 0x20300, 0x00200},
1232 {"device-id", 0x20500, 0x0fb00},
1233 {"firmware", 0x30000, 0x7a9400},
1234 {"soft-version", 0x7d9400, 0x00100},
1235 {"extra-para", 0x7d9500, 0x00100},
1236 {"support-list", 0x7d9600, 0x00200},
1237 {"profile", 0x7d9800, 0x03000},
1238 {"default-config", 0x7dc800, 0x03000},
1239 {"partition-table", 0x7df800, 0x00800},
1240 {"user-config", 0x7e0000, 0x0c000},
1241 {"certificate", 0x7ec000, 0x04000},
1242 {"radio", 0x7f0000, 0x10000},
1243 {NULL, 0, 0}
1244 },
1245
1246 .first_sysupgrade_partition = "os-image",
1247 .last_sysupgrade_partition = "file-system",
1248 },
1249
1250 /** Firmware layout for the Archer C6 v2 (US) and A6 v2 (US/TW) */
1251 {
1252 .id = "ARCHER-C6-V2-US",
1253 .vendor = "",
1254 .support_list =
1255 "SupportList:\n"
1256 "{product_name:Archer A6,product_ver:2.0.0,special_id:55530000}\n"
1257 "{product_name:Archer A6,product_ver:2.0.0,special_id:54570000}\n"
1258 "{product_name:Archer C6,product_ver:2.0.0,special_id:55530000}\n",
1259 .part_trail = 0x00,
1260 .soft_ver = SOFT_VER_TEXT("soft_ver:1.9.1\n"),
1261
1262 .partitions = {
1263 {"factory-boot", 0x00000, 0x20000},
1264 {"default-mac", 0x20000, 0x00200},
1265 {"pin", 0x20200, 0x00100},
1266 {"product-info", 0x20300, 0x00200},
1267 {"device-id", 0x20500, 0x0fb00},
1268 {"fs-uboot", 0x30000, 0x20000},
1269 {"firmware", 0x50000, 0xf89400},
1270 {"soft-version", 0xfd9400, 0x00100},
1271 {"extra-para", 0xfd9500, 0x00100},
1272 {"support-list", 0xfd9600, 0x00200},
1273 {"profile", 0xfd9800, 0x03000},
1274 {"default-config", 0xfdc800, 0x03000},
1275 {"partition-table", 0xfdf800, 0x00800},
1276 {"user-config", 0xfe0000, 0x0c000},
1277 {"certificate", 0xfec000, 0x04000},
1278 {"radio", 0xff0000, 0x10000},
1279 {NULL, 0, 0}
1280 },
1281 .first_sysupgrade_partition = "os-image",
1282 .last_sysupgrade_partition = "file-system",
1283 },
1284 /** Firmware layout for the Archer C6 v3 */
1285 {
1286 .id = "ARCHER-C6-V3",
1287 .vendor = "",
1288 .support_list =
1289 "SupportList:\n"
1290 "{product_name:Archer C6,product_ver:3.20,special_id:55530000}"
1291 "{product_name:Archer C6,product_ver:3.20,special_id:45550000}"
1292 "{product_name:Archer C6,product_ver:3.20,special_id:52550000}"
1293 "{product_name:Archer C6,product_ver:3.20,special_id:4A500000}"
1294 "{product_name:Archer C6,product_ver:3.20,special_id:4B520000}"
1295 "{product_name:Archer C6,product_ver:3.0.0,special_id:42520000}",
1296 .part_trail = 0x00,
1297 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.9\n"),
1298
1299 .partitions = {
1300 {"fs-uboot", 0x00000, 0x40000},
1301 {"firmware", 0x40000, 0xf60000},
1302 {"default-mac", 0xfa0000, 0x00200},
1303 {"pin", 0xfa0200, 0x00100},
1304 {"device-id", 0xfa0300, 0x00100},
1305 {"product-info", 0xfa0400, 0x0fc00},
1306 {"default-config", 0xfb0000, 0x08000},
1307 {"ap-def-config", 0xfb8000, 0x08000},
1308 {"user-config", 0xfc0000, 0x0a000},
1309 {"ag-config", 0xfca000, 0x04000},
1310 {"certificate", 0xfce000, 0x02000},
1311 {"ap-config", 0xfd0000, 0x06000},
1312 {"router-config", 0xfd6000, 0x06000},
1313 {"favicon", 0xfdc000, 0x02000},
1314 {"logo", 0xfde000, 0x02000},
1315 {"partition-table", 0xfe0000, 0x00800},
1316 {"soft-version", 0xfe0800, 0x00100},
1317 {"support-list", 0xfe0900, 0x00200},
1318 {"profile", 0xfe0b00, 0x03000},
1319 {"extra-para", 0xfe3b00, 0x00100},
1320 {"radio", 0xff0000, 0x10000},
1321 {NULL, 0, 0}
1322 },
1323 .first_sysupgrade_partition = "os-image",
1324 .last_sysupgrade_partition = "file-system",
1325 },
1326 /** Firmware layout for the Archer A6 v3 */
1327 {
1328 .id = "ARCHER-A6-V3",
1329 .vendor = "",
1330 .support_list =
1331 "SupportList:\n"
1332 "{product_name:Archer A6,product_ver:3.0.0,special_id:43410000}\n"
1333 "{product_name:Archer A6,product_ver:3.0.0,special_id:55530000}\n"
1334 "{product_name:Archer A6,product_ver:3.0.0,special_id:54570000}\n"
1335 "{product_name:Archer A6,product_ver:3.0.0,special_id:4A500000}\n"
1336 "{product_name:Archer A6,product_ver:3.20,special_id:45550000}\n"
1337 "{product_name:Archer A6,product_ver:3.20,special_id:52550000}\n",
1338 .part_trail = 0x00,
1339 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.5\n"),
1340
1341 .partitions = {
1342 {"fs-uboot", 0x00000, 0x40000},
1343 {"firmware", 0x40000, 0xf60000},
1344 {"default-mac", 0xfa0000, 0x00200},
1345 {"pin", 0xfa0200, 0x00100},
1346 {"device-id", 0xfa0300, 0x00100},
1347 {"product-info", 0xfa0400, 0x0fc00},
1348 {"default-config", 0xfb0000, 0x08000},
1349 {"ap-def-config", 0xfb8000, 0x08000},
1350 {"user-config", 0xfc0000, 0x0a000},
1351 {"ag-config", 0xfca000, 0x04000},
1352 {"certificate", 0xfce000, 0x02000},
1353 {"ap-config", 0xfd0000, 0x06000},
1354 {"router-config", 0xfd6000, 0x06000},
1355 {"favicon", 0xfdc000, 0x02000},
1356 {"logo", 0xfde000, 0x02000},
1357 {"partition-table", 0xfe0000, 0x00800},
1358 {"soft-version", 0xfe0800, 0x00100},
1359 {"support-list", 0xfe0900, 0x00200},
1360 {"profile", 0xfe0b00, 0x03000},
1361 {"extra-para", 0xfe3b00, 0x00100},
1362 {"radio", 0xff0000, 0x10000},
1363 {NULL, 0, 0}
1364 },
1365 .first_sysupgrade_partition = "os-image",
1366 .last_sysupgrade_partition = "file-system",
1367 },
1368 /** Firmware layout for the Archer C6U v1 */
1369 {
1370 .id = "ARCHER-C6U-V1",
1371 .vendor = "",
1372 .support_list =
1373 "SupportList:\n"
1374 "{product_name:Archer C6U,product_ver:1.0.0,special_id:45550000}\n",
1375 .part_trail = 0x00,
1376 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.2\n"),
1377
1378 .partitions = {
1379 {"fs-uboot", 0x00000, 0x40000},
1380 {"firmware", 0x40000, 0xf60000},
1381 {"default-mac", 0xfa0000, 0x00200},
1382 {"pin", 0xfa0200, 0x00100},
1383 {"device-id", 0xfa0300, 0x00100},
1384 {"product-info", 0xfa0400, 0x0fc00},
1385 {"default-config", 0xfb0000, 0x08000},
1386 {"ap-def-config", 0xfb8000, 0x08000},
1387 {"user-config", 0xfc0000, 0x0c000},
1388 {"certificate", 0xfcc000, 0x04000},
1389 {"ap-config", 0xfd0000, 0x08000},
1390 {"router-config", 0xfd8000, 0x08000},
1391 {"partition-table", 0xfe0000, 0x00800},
1392 {"soft-version", 0xfe0800, 0x00100},
1393 {"support-list", 0xfe0900, 0x00200},
1394 {"profile", 0xfe0b00, 0x03000},
1395 {"extra-para", 0xfe3b00, 0x00100},
1396 {"radio", 0xff0000, 0x10000},
1397 {NULL, 0, 0}
1398 },
1399 .first_sysupgrade_partition = "os-image",
1400 .last_sysupgrade_partition = "file-system",
1401 },
1402 /** Firmware layout for the C60v1 */
1403 {
1404 .id = "ARCHER-C60-V1",
1405 .vendor = "",
1406 .support_list =
1407 "SupportList:\r\n"
1408 "{product_name:Archer C60,product_ver:1.0.0,special_id:00000000}\r\n"
1409 "{product_name:Archer C60,product_ver:1.0.0,special_id:43410000}\r\n"
1410 "{product_name:Archer C60,product_ver:1.0.0,special_id:45550000}\r\n"
1411 "{product_name:Archer C60,product_ver:1.0.0,special_id:55530000}\r\n",
1412 .part_trail = 0x00,
1413 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1414
1415 .partitions = {
1416 {"fs-uboot", 0x00000, 0x10000},
1417 {"default-mac", 0x10000, 0x00200},
1418 {"pin", 0x10200, 0x00200},
1419 {"product-info", 0x10400, 0x00100},
1420 {"partition-table", 0x10500, 0x00800},
1421 {"soft-version", 0x11300, 0x00200},
1422 {"support-list", 0x11500, 0x00100},
1423 {"device-id", 0x11600, 0x00100},
1424 {"profile", 0x11700, 0x03900},
1425 {"default-config", 0x15000, 0x04000},
1426 {"user-config", 0x19000, 0x04000},
1427 {"firmware", 0x20000, 0x7c8000},
1428 {"certyficate", 0x7e8000, 0x08000},
1429 {"radio", 0x7f0000, 0x10000},
1430 {NULL, 0, 0}
1431 },
1432
1433 .first_sysupgrade_partition = "os-image",
1434 .last_sysupgrade_partition = "file-system",
1435 },
1436
1437 /** Firmware layout for the C60v2 */
1438 {
1439 .id = "ARCHER-C60-V2",
1440 .vendor = "",
1441 .support_list =
1442 "SupportList:\r\n"
1443 "{product_name:Archer C60,product_ver:2.0.0,special_id:42520000}\r\n"
1444 "{product_name:Archer C60,product_ver:2.0.0,special_id:43410000}\r\n"
1445 "{product_name:Archer C60,product_ver:2.0.0,special_id:45550000}\r\n"
1446 "{product_name:Archer C60,product_ver:2.0.0,special_id:55530000}\r\n",
1447 .part_trail = 0x00,
1448 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
1449
1450 .partitions = {
1451 {"factory-boot", 0x00000, 0x1fb00},
1452 {"default-mac", 0x1fb00, 0x00200},
1453 {"pin", 0x1fd00, 0x00100},
1454 {"product-info", 0x1fe00, 0x00100},
1455 {"device-id", 0x1ff00, 0x00100},
1456 {"fs-uboot", 0x20000, 0x10000},
1457 {"firmware", 0x30000, 0x7a0000},
1458 {"soft-version", 0x7d9500, 0x00100},
1459 {"support-list", 0x7d9600, 0x00100},
1460 {"extra-para", 0x7d9700, 0x00100},
1461 {"profile", 0x7d9800, 0x03000},
1462 {"default-config", 0x7dc800, 0x03000},
1463 {"partition-table", 0x7df800, 0x00800},
1464 {"user-config", 0x7e0000, 0x0c000},
1465 {"certificate", 0x7ec000, 0x04000},
1466 {"radio", 0x7f0000, 0x10000},
1467 {NULL, 0, 0}
1468 },
1469
1470 .first_sysupgrade_partition = "os-image",
1471 .last_sysupgrade_partition = "file-system",
1472 },
1473
1474 /** Firmware layout for the C60v3 */
1475 {
1476 .id = "ARCHER-C60-V3",
1477 .vendor = "",
1478 .support_list =
1479 "SupportList:\r\n"
1480 "{product_name:Archer C60,product_ver:3.0.0,special_id:42520000}\r\n"
1481 "{product_name:Archer C60,product_ver:3.0.0,special_id:43410000}\r\n"
1482 "{product_name:Archer C60,product_ver:3.0.0,special_id:45550000}\r\n"
1483 "{product_name:Archer C60,product_ver:3.0.0,special_id:55530000}\r\n",
1484 .part_trail = 0x00,
1485 .soft_ver = SOFT_VER_TEXT("soft_ver:3.0.0\n"),
1486
1487 .partitions = {
1488 {"factory-boot", 0x00000, 0x1fb00},
1489 {"default-mac", 0x1fb00, 0x00200},
1490 {"pin", 0x1fd00, 0x00100},
1491 {"product-info", 0x1fe00, 0x00100},
1492 {"device-id", 0x1ff00, 0x00100},
1493 {"fs-uboot", 0x20000, 0x10000},
1494 {"firmware", 0x30000, 0x7a0000},
1495 {"soft-version", 0x7d9500, 0x00100},
1496 {"support-list", 0x7d9600, 0x00100},
1497 {"extra-para", 0x7d9700, 0x00100},
1498 {"profile", 0x7d9800, 0x03000},
1499 {"default-config", 0x7dc800, 0x03000},
1500 {"partition-table", 0x7df800, 0x00800},
1501 {"user-config", 0x7e0000, 0x0c000},
1502 {"certificate", 0x7ec000, 0x04000},
1503 {"radio", 0x7f0000, 0x10000},
1504 {NULL, 0, 0}
1505 },
1506
1507 .first_sysupgrade_partition = "os-image",
1508 .last_sysupgrade_partition = "file-system",
1509 },
1510
1511 /** Firmware layout for the C5 */
1512 {
1513 .id = "ARCHER-C5-V2",
1514 .vendor = "",
1515 .support_list =
1516 "SupportList:\r\n"
1517 "{product_name:ArcherC5,product_ver:2.0.0,special_id:00000000}\r\n"
1518 "{product_name:ArcherC5,product_ver:2.0.0,special_id:55530000}\r\n"
1519 "{product_name:ArcherC5,product_ver:2.0.0,special_id:4A500000}\r\n", /* JP version */
1520 .part_trail = 0x00,
1521 .soft_ver = SOFT_VER_DEFAULT,
1522
1523 .partitions = {
1524 {"fs-uboot", 0x00000, 0x40000},
1525 {"os-image", 0x40000, 0x200000},
1526 {"file-system", 0x240000, 0xc00000},
1527 {"default-mac", 0xe40000, 0x00200},
1528 {"pin", 0xe40200, 0x00200},
1529 {"product-info", 0xe40400, 0x00200},
1530 {"partition-table", 0xe50000, 0x10000},
1531 {"soft-version", 0xe60000, 0x00200},
1532 {"support-list", 0xe61000, 0x0f000},
1533 {"profile", 0xe70000, 0x10000},
1534 {"default-config", 0xe80000, 0x10000},
1535 {"user-config", 0xe90000, 0x50000},
1536 {"log", 0xee0000, 0x100000},
1537 {"radio_bk", 0xfe0000, 0x10000},
1538 {"radio", 0xff0000, 0x10000},
1539 {NULL, 0, 0}
1540 },
1541
1542 .first_sysupgrade_partition = "os-image",
1543 .last_sysupgrade_partition = "file-system"
1544 },
1545
1546 /** Firmware layout for the C7 */
1547 {
1548 .id = "ARCHER-C7-V4",
1549 .support_list =
1550 "SupportList:\n"
1551 "{product_name:Archer C7,product_ver:4.0.0,special_id:00000000}\n"
1552 "{product_name:Archer C7,product_ver:4.0.0,special_id:41550000}\n"
1553 "{product_name:Archer C7,product_ver:4.0.0,special_id:45550000}\n"
1554 "{product_name:Archer C7,product_ver:4.0.0,special_id:4B520000}\n"
1555 "{product_name:Archer C7,product_ver:4.0.0,special_id:42520000}\n"
1556 "{product_name:Archer C7,product_ver:4.0.0,special_id:4A500000}\n"
1557 "{product_name:Archer C7,product_ver:4.0.0,special_id:52550000}\n"
1558 "{product_name:Archer C7,product_ver:4.0.0,special_id:54570000}\n"
1559 "{product_name:Archer C7,product_ver:4.0.0,special_id:55530000}\n"
1560 "{product_name:Archer C7,product_ver:4.0.0,special_id:43410000}\n",
1561 .part_trail = 0x00,
1562 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1563
1564 /* We're using a dynamic kernel/rootfs split here */
1565 .partitions = {
1566 {"factory-boot", 0x00000, 0x20000},
1567 {"fs-uboot", 0x20000, 0x20000},
1568 {"firmware", 0x40000, 0xEC0000}, /* Stock: name os-image base 0x40000 size 0x120000 */
1569 /* Stock: name file-system base 0x160000 size 0xda0000 */
1570 {"default-mac", 0xf00000, 0x00200},
1571 {"pin", 0xf00200, 0x00200},
1572 {"device-id", 0xf00400, 0x00100},
1573 {"product-info", 0xf00500, 0x0fb00},
1574 {"soft-version", 0xf10000, 0x00100},
1575 {"extra-para", 0xf11000, 0x01000},
1576 {"support-list", 0xf12000, 0x0a000},
1577 {"profile", 0xf1c000, 0x04000},
1578 {"default-config", 0xf20000, 0x10000},
1579 {"user-config", 0xf30000, 0x40000},
1580 {"qos-db", 0xf70000, 0x40000},
1581 {"certificate", 0xfb0000, 0x10000},
1582 {"partition-table", 0xfc0000, 0x10000},
1583 {"log", 0xfd0000, 0x20000},
1584 {"radio", 0xff0000, 0x10000},
1585 {NULL, 0, 0}
1586 },
1587
1588 .first_sysupgrade_partition = "os-image",
1589 .last_sysupgrade_partition = "file-system",
1590 },
1591
1592 /** Firmware layout for the C7 v5*/
1593 {
1594 .id = "ARCHER-C7-V5",
1595 .support_list =
1596 "SupportList:\n"
1597 "{product_name:Archer C7,product_ver:5.0.0,special_id:00000000}\n"
1598 "{product_name:Archer C7,product_ver:5.0.0,special_id:45550000}\n"
1599 "{product_name:Archer C7,product_ver:5.0.0,special_id:55530000}\n"
1600 "{product_name:Archer C7,product_ver:5.0.0,special_id:43410000}\n"
1601 "{product_name:Archer C7,product_ver:5.0.0,special_id:4A500000}\n"
1602 "{product_name:Archer C7,product_ver:5.0.0,special_id:54570000}\n"
1603 "{product_name:Archer C7,product_ver:5.0.0,special_id:52550000}\n"
1604 "{product_name:Archer C7,product_ver:5.0.0,special_id:4B520000}\n",
1605
1606 .part_trail = 0x00,
1607 .soft_ver = SOFT_VER_TEXT("soft_ver:7.0.0\n"),
1608
1609 /* We're using a dynamic kernel/rootfs split here */
1610 .partitions = {
1611 {"factory-boot", 0x00000, 0x20000},
1612 {"fs-uboot", 0x20000, 0x20000},
1613 {"partition-table", 0x40000, 0x10000},
1614 {"radio", 0x50000, 0x10000},
1615 {"default-mac", 0x60000, 0x00200},
1616 {"pin", 0x60200, 0x00200},
1617 {"device-id", 0x60400, 0x00100},
1618 {"product-info", 0x60500, 0x0fb00},
1619 {"soft-version", 0x70000, 0x01000},
1620 {"extra-para", 0x71000, 0x01000},
1621 {"support-list", 0x72000, 0x0a000},
1622 {"profile", 0x7c000, 0x04000},
1623 {"user-config", 0x80000, 0x40000},
1624
1625
1626 {"firmware", 0xc0000, 0xf00000}, /* Stock: name os-image base 0xc0000 size 0x120000 */
1627 /* Stock: name file-system base 0x1e0000 size 0xde0000 */
1628
1629 {"log", 0xfc0000, 0x20000},
1630 {"certificate", 0xfe0000, 0x10000},
1631 {"default-config", 0xff0000, 0x10000},
1632 {NULL, 0, 0}
1633
1634 },
1635
1636 .first_sysupgrade_partition = "os-image",
1637 .last_sysupgrade_partition = "file-system",
1638 },
1639
1640 /** Firmware layout for the C9 */
1641 {
1642 .id = "ARCHERC9",
1643 .vendor = "",
1644 .support_list =
1645 "SupportList:\n"
1646 "{product_name:ArcherC9,"
1647 "product_ver:1.0.0,"
1648 "special_id:00000000}\n",
1649 .part_trail = 0x00,
1650 .soft_ver = SOFT_VER_DEFAULT,
1651
1652 .partitions = {
1653 {"fs-uboot", 0x00000, 0x40000},
1654 {"os-image", 0x40000, 0x200000},
1655 {"file-system", 0x240000, 0xc00000},
1656 {"default-mac", 0xe40000, 0x00200},
1657 {"pin", 0xe40200, 0x00200},
1658 {"product-info", 0xe40400, 0x00200},
1659 {"partition-table", 0xe50000, 0x10000},
1660 {"soft-version", 0xe60000, 0x00200},
1661 {"support-list", 0xe61000, 0x0f000},
1662 {"profile", 0xe70000, 0x10000},
1663 {"default-config", 0xe80000, 0x10000},
1664 {"user-config", 0xe90000, 0x50000},
1665 {"log", 0xee0000, 0x100000},
1666 {"radio_bk", 0xfe0000, 0x10000},
1667 {"radio", 0xff0000, 0x10000},
1668 {NULL, 0, 0}
1669 },
1670
1671 .first_sysupgrade_partition = "os-image",
1672 .last_sysupgrade_partition = "file-system"
1673 },
1674
1675 /** Firmware layout for the Deco M4R v1 and v2 */
1676 {
1677 .id = "DECO-M4R-V1",
1678 .vendor = "",
1679 .support_list =
1680 "SupportList:\n"
1681 "{product_name:M4R,product_ver:1.0.0,special_id:55530000}\n"
1682 "{product_name:M4R,product_ver:1.0.0,special_id:45550000}\n"
1683 "{product_name:M4R,product_ver:1.0.0,special_id:43410000}\n"
1684 "{product_name:M4R,product_ver:1.0.0,special_id:4A500000}\n"
1685 "{product_name:M4R,product_ver:1.0.0,special_id:41550000}\n"
1686 "{product_name:M4R,product_ver:1.0.0,special_id:4B520000}\n"
1687 "{product_name:M4R,product_ver:1.0.0,special_id:49440000}\n"
1688 "{product_name:M4R,product_ver:2.0.0,special_id:55530000}\n"
1689 "{product_name:M4R,product_ver:2.0.0,special_id:45550000}\n"
1690 "{product_name:M4R,product_ver:2.0.0,special_id:43410000}\n"
1691 "{product_name:M4R,product_ver:2.0.0,special_id:4A500000}\n"
1692 "{product_name:M4R,product_ver:2.0.0,special_id:41550000}\n"
1693 "{product_name:M4R,product_ver:2.0.0,special_id:4B520000}\n"
1694 "{product_name:M4R,product_ver:2.0.0,special_id:54570000}\n"
1695 "{product_name:M4R,product_ver:2.0.0,special_id:42340000}\n"
1696 "{product_name:M4R,product_ver:2.0.0,special_id:49440000}\n",
1697 .part_trail = 0x00,
1698 .soft_ver = SOFT_VER_DEFAULT,
1699
1700 .partitions = {
1701 {"fs-uboot", 0x00000, 0x80000},
1702 {"firmware", 0x80000, 0xe00000},
1703 {"product-info", 0xe80000, 0x05000},
1704 {"default-mac", 0xe85000, 0x01000},
1705 {"device-id", 0xe86000, 0x01000},
1706 {"support-list", 0xe87000, 0x10000},
1707 {"user-config", 0xea7000, 0x10000},
1708 {"device-config", 0xeb7000, 0x10000},
1709 {"group-info", 0xec7000, 0x10000},
1710 {"partition-table", 0xed7000, 0x02000},
1711 {"soft-version", 0xed9000, 0x10000},
1712 {"profile", 0xee9000, 0x10000},
1713 {"default-config", 0xef9000, 0x10000},
1714 {"url-sig", 0xfe0000, 0x10000},
1715 {"radio", 0xff0000, 0x10000},
1716 {NULL, 0, 0}
1717 },
1718 .first_sysupgrade_partition = "os-image",
1719 .last_sysupgrade_partition = "file-system",
1720 },
1721
1722 /** Firmware layout for the Deco M4R v4 */
1723 {
1724 .id = "DECO-M4R-V4",
1725 .vendor = "",
1726 .support_list =
1727 "SupportList:\n"
1728 "{product_name:M4R,product_ver:4.0.0,special_id:55530000}\n"
1729 "{product_name:M4R,product_ver:4.0.0,special_id:45550000}\n"
1730 "{product_name:M4R,product_ver:4.0.0,special_id:4A500000}\n"
1731 "{product_name:M4R,product_ver:4.0.0,special_id:42340000}\n"
1732 "{product_name:M4R,product_ver:4.0.0,special_id:5A470000}\n",
1733 .part_trail = 0x00,
1734 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
1735
1736 .partitions = {
1737 {"fs-uboot", 0x00000, 0x40000},
1738 {"firmware", 0x40000, 0xf60000},
1739 {"default-mac", 0xfa0000, 0x00300},
1740 {"device-id", 0xfa0300, 0x00100},
1741 {"product-info", 0xfa0400, 0x0fc00},
1742 {"group-info", 0xfb0000, 0x04000},
1743 {"user-config", 0xfb4000, 0x0c000},
1744 {"device-config", 0xfc0000, 0x10000},
1745 {"default-config", 0xfd0000, 0x10000},
1746 {"partition-table", 0xfe0000, 0x00800},
1747 {"soft-version", 0xfe0800, 0x00100},
1748 {"support-list", 0xfe0900, 0x00200},
1749 {"profile", 0xfe0b00, 0x03000},
1750 {"extra-para", 0xfe3b00, 0x00100},
1751 {"radio", 0xff0000, 0x10000},
1752 {NULL, 0, 0}
1753 },
1754 .first_sysupgrade_partition = "os-image",
1755 .last_sysupgrade_partition = "file-system",
1756 },
1757
1758 /** Firmware layout for the Deco S4 v2 */
1759 {
1760 .id = "DECO-S4-V2",
1761 .vendor = "",
1762 .support_list =
1763 "SupportList:\n"
1764 "{product_name:S4,product_ver:1.0.0,special_id:55530000}\n"
1765 "{product_name:S4,product_ver:1.0.0,special_id:45550000}\n"
1766 "{product_name:S4,product_ver:1.0.0,special_id:43410000}\n"
1767 "{product_name:S4,product_ver:1.0.0,special_id:4A500000}\n"
1768 "{product_name:S4,product_ver:1.0.0,special_id:41550000}\n"
1769 "{product_name:S4,product_ver:1.0.0,special_id:4B520000}\n"
1770 "{product_name:S4,product_ver:2.0.0,special_id:55530000}\n"
1771 "{product_name:S4,product_ver:2.0.0,special_id:45550000}\n"
1772 "{product_name:S4,product_ver:2.0.0,special_id:43410000}\n"
1773 "{product_name:S4,product_ver:2.0.0,special_id:4A500000}\n"
1774 "{product_name:S4,product_ver:2.0.0,special_id:41550000}\n"
1775 "{product_name:S4,product_ver:2.0.0,special_id:4B520000}\n",
1776 .part_trail = 0x00,
1777 .soft_ver = SOFT_VER_DEFAULT,
1778
1779 .partitions = {
1780 {"fs-uboot", 0x00000, 0x80000},
1781 {"product-info", 0x80000, 0x05000},
1782 {"default-mac", 0x85000, 0x01000},
1783 {"device-id", 0x86000, 0x01000},
1784 {"support-list", 0x87000, 0x10000},
1785 {"user-config", 0xa7000, 0x10000},
1786 {"device-config", 0xb7000, 0x10000},
1787 {"group-info", 0xc7000, 0x10000},
1788 {"partition-table", 0xd7000, 0x02000},
1789 {"soft-version", 0xd9000, 0x10000},
1790 {"profile", 0xe9000, 0x10000},
1791 {"default-config", 0xf9000, 0x10000},
1792 {"url-sig", 0x1e0000, 0x10000},
1793 {"radio", 0x1f0000, 0x10000},
1794 {"firmware", 0x200000, 0xe00000},
1795 {NULL, 0, 0}
1796 },
1797 .first_sysupgrade_partition = "os-image",
1798 .last_sysupgrade_partition = "file-system",
1799 },
1800
1801 /** Firmware layout for the EAP120 */
1802 {
1803 .id = "EAP120",
1804 .vendor = "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1805 .support_list =
1806 "SupportList:\r\n"
1807 "EAP120(TP-LINK|UN|N300-2):1.0\r\n",
1808 .part_trail = 0xff,
1809 .soft_ver = SOFT_VER_DEFAULT,
1810
1811 .partitions = {
1812 {"fs-uboot", 0x00000, 0x20000},
1813 {"partition-table", 0x20000, 0x02000},
1814 {"default-mac", 0x30000, 0x00020},
1815 {"support-list", 0x31000, 0x00100},
1816 {"product-info", 0x31100, 0x00100},
1817 {"soft-version", 0x32000, 0x00100},
1818 {"os-image", 0x40000, 0x180000},
1819 {"file-system", 0x1c0000, 0x600000},
1820 {"user-config", 0x7c0000, 0x10000},
1821 {"backup-config", 0x7d0000, 0x10000},
1822 {"log", 0x7e0000, 0x10000},
1823 {"radio", 0x7f0000, 0x10000},
1824 {NULL, 0, 0}
1825 },
1826
1827 .first_sysupgrade_partition = "os-image",
1828 .last_sysupgrade_partition = "file-system"
1829 },
1830
1831 /** Firmware layout for the EAP225-Outdoor v1 */
1832 {
1833 .id = "EAP225-OUTDOOR-V1",
1834 .support_list =
1835 "SupportList:\r\n"
1836 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n",
1837 .part_trail = PART_TRAIL_NONE,
1838 .soft_ver = SOFT_VER_DEFAULT,
1839 .soft_ver_compat_level = 1,
1840
1841 .partitions = {
1842 {"fs-uboot", 0x00000, 0x20000},
1843 {"partition-table", 0x20000, 0x02000},
1844 {"default-mac", 0x30000, 0x01000},
1845 {"support-list", 0x31000, 0x00100},
1846 {"product-info", 0x31100, 0x00400},
1847 {"soft-version", 0x32000, 0x00100},
1848 {"firmware", 0x40000, 0xd80000},
1849 {"user-config", 0xdc0000, 0x30000},
1850 {"mutil-log", 0xf30000, 0x80000},
1851 {"oops", 0xfb0000, 0x40000},
1852 {"radio", 0xff0000, 0x10000},
1853 {NULL, 0, 0}
1854 },
1855
1856 .first_sysupgrade_partition = "os-image",
1857 .last_sysupgrade_partition = "file-system"
1858 },
1859
1860 /** Firmware layout for the EAP225 v1 */
1861 {
1862 .id = "EAP225-V1",
1863 .support_list =
1864 "SupportList:\r\n"
1865 "EAP225(TP-LINK|UN|AC1200-D):1.0\r\n",
1866 .part_trail = PART_TRAIL_NONE,
1867 .soft_ver = SOFT_VER_DEFAULT,
1868
1869 .partitions = {
1870 {"fs-uboot", 0x00000, 0x20000},
1871 {"partition-table", 0x20000, 0x02000},
1872 {"default-mac", 0x30000, 0x01000},
1873 {"support-list", 0x31000, 0x00100},
1874 {"product-info", 0x31100, 0x00400},
1875 {"soft-version", 0x32000, 0x00100},
1876 {"firmware", 0x40000, 0xd80000},
1877 {"user-config", 0xdc0000, 0x30000},
1878 {"radio", 0xff0000, 0x10000},
1879 {NULL, 0, 0}
1880 },
1881
1882 .first_sysupgrade_partition = "os-image",
1883 .last_sysupgrade_partition = "file-system"
1884 },
1885
1886 /** Firmware layout for the EAP225 v3
1887 * Also compatible with:
1888 * - EAP225 v3.20
1889 * - EAP225 v4
1890 * - EAP225-Outdoor v1
1891 * - EAP225-Outdoor v3
1892 * */
1893 {
1894 .id = "EAP225-V3",
1895 .support_list =
1896 "SupportList:\r\n"
1897 "EAP225(TP-Link|UN|AC1350-D):3.0\r\n"
1898 "EAP225(TP-Link|UN|AC1350-D):3.20\r\n"
1899 "EAP225(TP-Link|UN|AC1350-D):4.0 CA\r\n"
1900 "EAP225-Outdoor(TP-Link|UN|AC1200-D):1.0\r\n"
1901 "EAP225-Outdoor(TP-Link|UN|AC1200-D):3.0 CA,JP\r\n",
1902 .part_trail = PART_TRAIL_NONE,
1903 .soft_ver = SOFT_VER_DEFAULT,
1904 .soft_ver_compat_level = 1,
1905
1906 .partitions = {
1907 {"fs-uboot", 0x00000, 0x20000},
1908 {"partition-table", 0x20000, 0x02000},
1909 {"default-mac", 0x30000, 0x01000},
1910 {"support-list", 0x31000, 0x00100},
1911 {"product-info", 0x31100, 0x00400},
1912 {"soft-version", 0x32000, 0x00100},
1913 {"firmware", 0x40000, 0xd80000},
1914 {"user-config", 0xdc0000, 0x30000},
1915 {"mutil-log", 0xf30000, 0x80000},
1916 {"oops", 0xfb0000, 0x40000},
1917 {"radio", 0xff0000, 0x10000},
1918 {NULL, 0, 0}
1919 },
1920
1921 .first_sysupgrade_partition = "os-image",
1922 .last_sysupgrade_partition = "file-system"
1923 },
1924
1925 /** Firmware layout for the EAP225-Wall v2 */
1926 {
1927 .id = "EAP225-WALL-V2",
1928 .support_list =
1929 "SupportList:\r\n"
1930 "EAP225-Wall(TP-Link|UN|AC1200-D):2.0\r\n",
1931 .part_trail = PART_TRAIL_NONE,
1932 .soft_ver = SOFT_VER_DEFAULT,
1933 .soft_ver_compat_level = 1,
1934
1935 .partitions = {
1936 {"fs-uboot", 0x00000, 0x20000},
1937 {"partition-table", 0x20000, 0x02000},
1938 {"default-mac", 0x30000, 0x01000},
1939 {"support-list", 0x31000, 0x00100},
1940 {"product-info", 0x31100, 0x00400},
1941 {"soft-version", 0x32000, 0x00100},
1942 {"firmware", 0x40000, 0xd80000},
1943 {"user-config", 0xdc0000, 0x30000},
1944 {"mutil-log", 0xf30000, 0x80000},
1945 {"oops", 0xfb0000, 0x40000},
1946 {"radio", 0xff0000, 0x10000},
1947 {NULL, 0, 0}
1948 },
1949
1950 .first_sysupgrade_partition = "os-image",
1951 .last_sysupgrade_partition = "file-system"
1952 },
1953
1954 /** Firmware layout for the EAP235-Wall v1 */
1955 {
1956 .id = "EAP235-WALL-V1",
1957 .support_list =
1958 "SupportList:\r\n"
1959 "EAP235-Wall(TP-Link|UN|AC1200-D):1.0\r\n",
1960 .part_trail = PART_TRAIL_NONE,
1961 .soft_ver = SOFT_VER_NUMERIC(3, 0, 0),
1962 .soft_ver_compat_level = 1,
1963
1964 .partitions = {
1965 {"fs-uboot", 0x00000, 0x80000},
1966 {"partition-table", 0x80000, 0x02000},
1967 {"default-mac", 0x90000, 0x01000},
1968 {"support-list", 0x91000, 0x00100},
1969 {"product-info", 0x91100, 0x00400},
1970 {"soft-version", 0x92000, 0x00100},
1971 {"firmware", 0xa0000, 0xd20000},
1972 {"user-config", 0xdc0000, 0x30000},
1973 {"mutil-log", 0xf30000, 0x80000},
1974 {"oops", 0xfb0000, 0x40000},
1975 {"radio", 0xff0000, 0x10000},
1976 {NULL, 0, 0}
1977 },
1978
1979 .first_sysupgrade_partition = "os-image",
1980 .last_sysupgrade_partition = "file-system"
1981 },
1982
1983 /** Firmware layout for the EAP245 v1 */
1984 {
1985 .id = "EAP245-V1",
1986 .support_list =
1987 "SupportList:\r\n"
1988 "EAP245(TP-LINK|UN|AC1750-D):1.0\r\n",
1989 .part_trail = PART_TRAIL_NONE,
1990 .soft_ver = SOFT_VER_DEFAULT,
1991
1992 .partitions = {
1993 {"fs-uboot", 0x00000, 0x20000},
1994 {"partition-table", 0x20000, 0x02000},
1995 {"default-mac", 0x30000, 0x01000},
1996 {"support-list", 0x31000, 0x00100},
1997 {"product-info", 0x31100, 0x00400},
1998 {"soft-version", 0x32000, 0x00100},
1999 {"firmware", 0x40000, 0xd80000},
2000 {"user-config", 0xdc0000, 0x30000},
2001 {"radio", 0xff0000, 0x10000},
2002 {NULL, 0, 0}
2003 },
2004
2005 .first_sysupgrade_partition = "os-image",
2006 .last_sysupgrade_partition = "file-system"
2007 },
2008
2009 /** Firmware layout for the EAP245 v3 */
2010 {
2011 .id = "EAP245-V3",
2012 .support_list =
2013 "SupportList:\r\n"
2014 "EAP245(TP-Link|UN|AC1750-D):3.0\r\n"
2015 "EAP265 HD(TP-Link|UN|AC1750-D):1.0",
2016 .part_trail = PART_TRAIL_NONE,
2017 .soft_ver = SOFT_VER_DEFAULT,
2018 .soft_ver_compat_level = 1,
2019
2020 /** Firmware partition with dynamic kernel/rootfs split */
2021 .partitions = {
2022 {"factroy-boot", 0x00000, 0x40000},
2023 {"fs-uboot", 0x40000, 0x40000},
2024 {"partition-table", 0x80000, 0x10000},
2025 {"default-mac", 0x90000, 0x01000},
2026 {"support-list", 0x91000, 0x00100},
2027 {"product-info", 0x91100, 0x00400},
2028 {"soft-version", 0x92000, 0x00100},
2029 {"radio", 0xa0000, 0x10000},
2030 {"extra-para", 0xb0000, 0x10000},
2031 {"firmware", 0xc0000, 0xe40000},
2032 {"config", 0xf00000, 0x30000},
2033 {"mutil-log", 0xf30000, 0x80000},
2034 {"oops", 0xfb0000, 0x40000},
2035 {NULL, 0, 0}
2036 },
2037
2038 .first_sysupgrade_partition = "os-image",
2039 .last_sysupgrade_partition = "file-system"
2040 },
2041
2042 /** Firmware layout for the EAP615-Wall v1 */
2043 {
2044 .id = "EAP615-WALL-V1",
2045 .soft_ver = SOFT_VER_DEFAULT,
2046 .soft_ver_compat_level = 1,
2047 .support_list =
2048 "SupportList:\r\n"
2049 "EAP615-Wall(TP-Link|UN|AX1800-D):1.0\r\n"
2050 "EAP615-Wall(TP-Link|CA|AX1800-D):1.0\r\n"
2051 "EAP615-Wall(TP-Link|JP|AX1800-D):1.0\r\n",
2052 .part_trail = PART_TRAIL_NONE,
2053
2054 .partitions = {
2055 {"fs-uboot", 0x00000, 0x80000},
2056 {"partition-table", 0x80000, 0x02000},
2057 {"default-mac", 0x90000, 0x01000},
2058 {"support-list", 0x91000, 0x00100},
2059 {"product-info", 0x91100, 0x00400},
2060 {"soft-version", 0x92000, 0x00100},
2061 {"firmware", 0xa0000, 0xcf0000},
2062 {"user-config", 0xd90000, 0x60000},
2063 {"mutil-log", 0xf30000, 0x80000},
2064 {"oops", 0xfb0000, 0x40000},
2065 {"radio", 0xff0000, 0x10000},
2066 {NULL, 0, 0}
2067 },
2068
2069 .first_sysupgrade_partition = "os-image",
2070 .last_sysupgrade_partition = "file-system"
2071 },
2072
2073 /** Firmware layout for the TL-WA1201 v2 */
2074 {
2075 .id = "TL-WA1201-V2",
2076 .vendor = "",
2077 .support_list =
2078 "SupportList:\n"
2079 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:45550000}\n"
2080 "{product_name:TL-WA1201,product_ver:2.0.0,special_id:55530000}\n",
2081 .part_trail = 0x00,
2082 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.1 Build 20200709 rel.66244\n"),
2083
2084 .partitions = {
2085 {"fs-uboot", 0x00000, 0x20000},
2086 {"default-mac", 0x20000, 0x00200},
2087 {"pin", 0x20200, 0x00100},
2088 {"product-info", 0x20300, 0x00200},
2089 {"device-id", 0x20500, 0x0fb00},
2090 {"firmware", 0x30000, 0xce0000},
2091 {"portal-logo", 0xd10000, 0x20000},
2092 {"portal-back", 0xd30000, 0x200000},
2093 {"soft-version", 0xf30000, 0x00200},
2094 {"extra-para", 0xf30200, 0x00200},
2095 {"support-list", 0xf30400, 0x00200},
2096 {"profile", 0xf30600, 0x0fa00},
2097 {"apdef-config", 0xf40000, 0x10000},
2098 {"ap-config", 0xf50000, 0x10000},
2099 {"redef-config", 0xf60000, 0x10000},
2100 {"re-config", 0xf70000, 0x10000},
2101 {"multidef-config", 0xf80000, 0x10000},
2102 {"multi-config", 0xf90000, 0x10000},
2103 {"clientdef-config", 0xfa0000, 0x10000},
2104 {"client-config", 0xfb0000, 0x10000},
2105 {"partition-table", 0xfc0000, 0x10000},
2106 {"user-config", 0xfd0000, 0x10000},
2107 {"certificate", 0xfe0000, 0x10000},
2108 {"radio", 0xff0000, 0x10000},
2109 {NULL, 0, 0}
2110 },
2111 .first_sysupgrade_partition = "os-image",
2112 .last_sysupgrade_partition = "file-system",
2113 },
2114
2115 /** Firmware layout for the TL-WA850RE v2 */
2116 {
2117 .id = "TLWA850REV2",
2118 .vendor = "",
2119 .support_list =
2120 "SupportList:\n"
2121 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55530000}\n"
2122 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:00000000}\n"
2123 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:55534100}\n"
2124 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:45550000}\n"
2125 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4B520000}\n"
2126 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:42520000}\n"
2127 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:4A500000}\n"
2128 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:43410000}\n"
2129 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:41550000}\n"
2130 "{product_name:TL-WA850RE,product_ver:2.0.0,special_id:52550000}\n",
2131 .part_trail = 0x00,
2132 .soft_ver = SOFT_VER_DEFAULT,
2133
2134 /**
2135 576KB were moved from file-system to os-image
2136 in comparison to the stock image
2137 */
2138 .partitions = {
2139 {"fs-uboot", 0x00000, 0x20000},
2140 {"firmware", 0x20000, 0x390000},
2141 {"partition-table", 0x3b0000, 0x02000},
2142 {"default-mac", 0x3c0000, 0x00020},
2143 {"pin", 0x3c0100, 0x00020},
2144 {"product-info", 0x3c1000, 0x01000},
2145 {"soft-version", 0x3c2000, 0x00100},
2146 {"support-list", 0x3c3000, 0x01000},
2147 {"profile", 0x3c4000, 0x08000},
2148 {"user-config", 0x3d0000, 0x10000},
2149 {"default-config", 0x3e0000, 0x10000},
2150 {"radio", 0x3f0000, 0x10000},
2151 {NULL, 0, 0}
2152 },
2153
2154 .first_sysupgrade_partition = "os-image",
2155 .last_sysupgrade_partition = "file-system"
2156 },
2157
2158 /** Firmware layout for the TL-WA855RE v1 */
2159 {
2160 .id = "TLWA855REV1",
2161 .vendor = "",
2162 .support_list =
2163 "SupportList:\n"
2164 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:00000000}\n"
2165 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:55530000}\n"
2166 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:45550000}\n"
2167 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4B520000}\n"
2168 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:42520000}\n"
2169 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:4A500000}\n"
2170 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:43410000}\n"
2171 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:41550000}\n"
2172 "{product_name:TL-WA855RE,product_ver:1.0.0,special_id:52550000}\n",
2173 .part_trail = 0x00,
2174 .soft_ver = SOFT_VER_DEFAULT,
2175
2176 .partitions = {
2177 {"fs-uboot", 0x00000, 0x20000},
2178 {"os-image", 0x20000, 0x150000},
2179 {"file-system", 0x170000, 0x240000},
2180 {"partition-table", 0x3b0000, 0x02000},
2181 {"default-mac", 0x3c0000, 0x00020},
2182 {"pin", 0x3c0100, 0x00020},
2183 {"product-info", 0x3c1000, 0x01000},
2184 {"soft-version", 0x3c2000, 0x00100},
2185 {"support-list", 0x3c3000, 0x01000},
2186 {"profile", 0x3c4000, 0x08000},
2187 {"user-config", 0x3d0000, 0x10000},
2188 {"default-config", 0x3e0000, 0x10000},
2189 {"radio", 0x3f0000, 0x10000},
2190 {NULL, 0, 0}
2191 },
2192
2193 .first_sysupgrade_partition = "os-image",
2194 .last_sysupgrade_partition = "file-system"
2195 },
2196
2197 /** Firmware layout for the TL-WPA8630P v2 (EU)*/
2198 {
2199 .id = "TL-WPA8630P-V2.0-EU",
2200 .vendor = "",
2201 .support_list =
2202 "SupportList:\n"
2203 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:45550000}\n",
2204 .part_trail = 0x00,
2205 .soft_ver = SOFT_VER_DEFAULT,
2206
2207 .partitions = {
2208 {"factory-uboot", 0x00000, 0x20000},
2209 {"fs-uboot", 0x20000, 0x20000},
2210 {"firmware", 0x40000, 0x5e0000},
2211 {"partition-table", 0x620000, 0x02000},
2212 {"default-mac", 0x630000, 0x00020},
2213 {"pin", 0x630100, 0x00020},
2214 {"device-id", 0x630200, 0x00030},
2215 {"product-info", 0x631100, 0x01000},
2216 {"extra-para", 0x632100, 0x01000},
2217 {"soft-version", 0x640000, 0x01000},
2218 {"support-list", 0x641000, 0x01000},
2219 {"profile", 0x642000, 0x08000},
2220 {"user-config", 0x650000, 0x10000},
2221 {"default-config", 0x660000, 0x10000},
2222 {"default-nvm", 0x670000, 0xc0000},
2223 {"default-pib", 0x730000, 0x40000},
2224 {"radio", 0x7f0000, 0x10000},
2225 {NULL, 0, 0}
2226 },
2227
2228 .first_sysupgrade_partition = "os-image",
2229 .last_sysupgrade_partition = "file-system"
2230 },
2231
2232 /** Firmware layout for the TL-WPA8630P v2 (INT)*/
2233 {
2234 .id = "TL-WPA8630P-V2-INT",
2235 .vendor = "",
2236 .support_list =
2237 "SupportList:\n"
2238 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:41550000}\n"
2239 "{product_name:TL-WPA8630P,product_ver:2.0.0,special_id:44450000}\n"
2240 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:41550000}\n",
2241 .part_trail = 0x00,
2242 .soft_ver = SOFT_VER_DEFAULT,
2243
2244 .partitions = {
2245 {"factory-uboot", 0x00000, 0x20000},
2246 {"fs-uboot", 0x20000, 0x20000},
2247 {"firmware", 0x40000, 0x5e0000},
2248 {"partition-table", 0x620000, 0x02000},
2249 {"extra-para", 0x632100, 0x01000},
2250 {"soft-version", 0x640000, 0x01000},
2251 {"support-list", 0x641000, 0x01000},
2252 {"profile", 0x642000, 0x08000},
2253 {"user-config", 0x650000, 0x10000},
2254 {"default-config", 0x660000, 0x10000},
2255 {"default-nvm", 0x670000, 0xc0000},
2256 {"default-pib", 0x730000, 0x40000},
2257 {"default-mac", 0x7e0000, 0x00020},
2258 {"pin", 0x7e0100, 0x00020},
2259 {"device-id", 0x7e0200, 0x00030},
2260 {"product-info", 0x7e1100, 0x01000},
2261 {"radio", 0x7f0000, 0x10000},
2262 {NULL, 0, 0}
2263 },
2264
2265 .first_sysupgrade_partition = "os-image",
2266 .last_sysupgrade_partition = "file-system"
2267 },
2268
2269 /** Firmware layout for the TL-WPA8630P v2.1 (EU)*/
2270 {
2271 .id = "TL-WPA8630P-V2.1-EU",
2272 .vendor = "",
2273 .support_list =
2274 "SupportList:\n"
2275 "{product_name:TL-WPA8630P,product_ver:2.1.0,special_id:45550000}\n",
2276 .part_trail = 0x00,
2277 .soft_ver = SOFT_VER_DEFAULT,
2278
2279 .partitions = {
2280 {"factory-uboot", 0x00000, 0x20000},
2281 {"fs-uboot", 0x20000, 0x20000},
2282 {"firmware", 0x40000, 0x5e0000},
2283 {"extra-para", 0x680000, 0x01000},
2284 {"product-info", 0x690000, 0x01000},
2285 {"partition-table", 0x6a0000, 0x02000},
2286 {"soft-version", 0x6b0000, 0x01000},
2287 {"support-list", 0x6b1000, 0x01000},
2288 {"profile", 0x6b2000, 0x08000},
2289 {"user-config", 0x6c0000, 0x10000},
2290 {"default-config", 0x6d0000, 0x10000},
2291 {"default-nvm", 0x6e0000, 0xc0000},
2292 {"default-pib", 0x7a0000, 0x40000},
2293 {"default-mac", 0x7e0000, 0x00020},
2294 {"pin", 0x7e0100, 0x00020},
2295 {"device-id", 0x7e0200, 0x00030},
2296 {"radio", 0x7f0000, 0x10000},
2297 {NULL, 0, 0}
2298 },
2299
2300 .first_sysupgrade_partition = "os-image",
2301 .last_sysupgrade_partition = "file-system"
2302 },
2303
2304 /** Firmware layout for the TL-WPA8631P v3 */
2305 {
2306 .id = "TL-WPA8631P-V3",
2307 .vendor = "",
2308 .support_list =
2309 "SupportList:\n"
2310 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:41550000}\n"
2311 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:45550000}\n"
2312 "{product_name:TL-WPA8631P,product_ver:3.0.0,special_id:55530000}\n"
2313 "{product_name:TL-WPA8635P,product_ver:3.0.0,special_id:46520000}\n",
2314 .part_trail = 0x00,
2315 .soft_ver = SOFT_VER_DEFAULT,
2316
2317 .partitions = {
2318 {"fs-uboot", 0x00000, 0x20000},
2319 {"firmware", 0x20000, 0x710000},
2320 {"partition-table", 0x730000, 0x02000},
2321 {"default-mac", 0x732000, 0x00020},
2322 {"pin", 0x732100, 0x00020},
2323 {"device-id", 0x732200, 0x00030},
2324 {"default-region", 0x732300, 0x00010},
2325 {"product-info", 0x732400, 0x00200},
2326 {"extra-para", 0x732600, 0x00200},
2327 {"soft-version", 0x732800, 0x00100},
2328 {"support-list", 0x732900, 0x00200},
2329 {"profile", 0x732b00, 0x00100},
2330 {"default-config", 0x732c00, 0x00800},
2331 {"plc-type", 0x733400, 0x00020},
2332 {"default-pib", 0x733500, 0x06000},
2333 {"user-config", 0x740000, 0x10000},
2334 {"plc-pib", 0x750000, 0x10000},
2335 {"plc-nvm", 0x760000, 0x90000},
2336 {"radio", 0x7f0000, 0x10000},
2337 {NULL, 0, 0}
2338 },
2339
2340 .first_sysupgrade_partition = "os-image",
2341 .last_sysupgrade_partition = "file-system"
2342 },
2343
2344 /** Firmware layout for the TL-WR1043 v5 */
2345 {
2346 .id = "TLWR1043NV5",
2347 .vendor = "",
2348 .support_list =
2349 "SupportList:\n"
2350 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:45550000}\n"
2351 "{product_name:TL-WR1043N,product_ver:5.0.0,special_id:55530000}\n",
2352 .part_trail = 0x00,
2353 .soft_ver = SOFT_VER_TEXT("soft_ver:1.0.0\n"),
2354 .partitions = {
2355 {"factory-boot", 0x00000, 0x20000},
2356 {"fs-uboot", 0x20000, 0x20000},
2357 {"firmware", 0x40000, 0xec0000},
2358 {"default-mac", 0xf00000, 0x00200},
2359 {"pin", 0xf00200, 0x00200},
2360 {"device-id", 0xf00400, 0x00100},
2361 {"product-info", 0xf00500, 0x0fb00},
2362 {"soft-version", 0xf10000, 0x01000},
2363 {"extra-para", 0xf11000, 0x01000},
2364 {"support-list", 0xf12000, 0x0a000},
2365 {"profile", 0xf1c000, 0x04000},
2366 {"default-config", 0xf20000, 0x10000},
2367 {"user-config", 0xf30000, 0x40000},
2368 {"qos-db", 0xf70000, 0x40000},
2369 {"certificate", 0xfb0000, 0x10000},
2370 {"partition-table", 0xfc0000, 0x10000},
2371 {"log", 0xfd0000, 0x20000},
2372 {"radio", 0xff0000, 0x10000},
2373 {NULL, 0, 0}
2374 },
2375 .first_sysupgrade_partition = "os-image",
2376 .last_sysupgrade_partition = "file-system"
2377 },
2378
2379 /** Firmware layout for the TL-WR1043 v4 */
2380 {
2381 .id = "TLWR1043NDV4",
2382 .vendor = "",
2383 .support_list =
2384 "SupportList:\n"
2385 "{product_name:TL-WR1043ND,product_ver:4.0.0,special_id:45550000}\n",
2386 .part_trail = 0x00,
2387 .soft_ver = SOFT_VER_DEFAULT,
2388
2389 /* We're using a dynamic kernel/rootfs split here */
2390 .partitions = {
2391 {"fs-uboot", 0x00000, 0x20000},
2392 {"firmware", 0x20000, 0xf30000},
2393 {"default-mac", 0xf50000, 0x00200},
2394 {"pin", 0xf50200, 0x00200},
2395 {"product-info", 0xf50400, 0x0fc00},
2396 {"soft-version", 0xf60000, 0x0b000},
2397 {"support-list", 0xf6b000, 0x04000},
2398 {"profile", 0xf70000, 0x04000},
2399 {"default-config", 0xf74000, 0x0b000},
2400 {"user-config", 0xf80000, 0x40000},
2401 {"partition-table", 0xfc0000, 0x10000},
2402 {"log", 0xfd0000, 0x20000},
2403 {"radio", 0xff0000, 0x10000},
2404 {NULL, 0, 0}
2405 },
2406
2407 .first_sysupgrade_partition = "os-image",
2408 .last_sysupgrade_partition = "file-system"
2409 },
2410
2411 /** Firmware layout for the TL-WR902AC v1 */
2412 {
2413 .id = "TL-WR902AC-V1",
2414 .vendor = "",
2415 .support_list =
2416 "SupportList:\n"
2417 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:45550000}\n"
2418 "{product_name:TL-WR902AC,product_ver:1.0.0,special_id:55530000}\n",
2419 .part_trail = 0x00,
2420 .soft_ver = SOFT_VER_DEFAULT,
2421
2422 /**
2423 384KB were moved from file-system to os-image
2424 in comparison to the stock image
2425 */
2426 .partitions = {
2427 {"fs-uboot", 0x00000, 0x20000},
2428 {"firmware", 0x20000, 0x730000},
2429 {"default-mac", 0x750000, 0x00200},
2430 {"pin", 0x750200, 0x00200},
2431 {"product-info", 0x750400, 0x0fc00},
2432 {"soft-version", 0x760000, 0x0b000},
2433 {"support-list", 0x76b000, 0x04000},
2434 {"profile", 0x770000, 0x04000},
2435 {"default-config", 0x774000, 0x0b000},
2436 {"user-config", 0x780000, 0x40000},
2437 {"partition-table", 0x7c0000, 0x10000},
2438 {"log", 0x7d0000, 0x20000},
2439 {"radio", 0x7f0000, 0x10000},
2440 {NULL, 0, 0}
2441 },
2442
2443 .first_sysupgrade_partition = "os-image",
2444 .last_sysupgrade_partition = "file-system",
2445 },
2446
2447 /** Firmware layout for the TL-WR941HP v1 */
2448 {
2449 .id = "TL-WR941HP-V1",
2450 .vendor = "",
2451 .support_list =
2452 "SupportList:\n"
2453 "{product_name:TL-WR941HP,product_ver:1.0.0,special_id:00000000}\n",
2454 .part_trail = 0x00,
2455 .soft_ver = SOFT_VER_DEFAULT,
2456
2457 .partitions = {
2458 {"fs-uboot", 0x00000, 0x20000},
2459 {"firmware", 0x20000, 0x730000},
2460 {"default-mac", 0x750000, 0x00200},
2461 {"pin", 0x750200, 0x00200},
2462 {"product-info", 0x750400, 0x0fc00},
2463 {"soft-version", 0x760000, 0x0b000},
2464 {"support-list", 0x76b000, 0x04000},
2465 {"profile", 0x770000, 0x04000},
2466 {"default-config", 0x774000, 0x0b000},
2467 {"user-config", 0x780000, 0x40000},
2468 {"partition-table", 0x7c0000, 0x10000},
2469 {"log", 0x7d0000, 0x20000},
2470 {"radio", 0x7f0000, 0x10000},
2471 {NULL, 0, 0}
2472 },
2473
2474 .first_sysupgrade_partition = "os-image",
2475 .last_sysupgrade_partition = "file-system",
2476 },
2477
2478 /** Firmware layout for the TL-WR942N V1 */
2479 {
2480 .id = "TLWR942NV1",
2481 .vendor = "",
2482 .support_list =
2483 "SupportList:\r\n"
2484 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:00000000}\r\n"
2485 "{product_name:TL-WR942N,product_ver:1.0.0,special_id:52550000}\r\n",
2486 .part_trail = 0x00,
2487 .soft_ver = SOFT_VER_DEFAULT,
2488
2489 .partitions = {
2490 {"fs-uboot", 0x00000, 0x20000},
2491 {"firmware", 0x20000, 0xe20000},
2492 {"default-mac", 0xe40000, 0x00200},
2493 {"pin", 0xe40200, 0x00200},
2494 {"product-info", 0xe40400, 0x0fc00},
2495 {"partition-table", 0xe50000, 0x10000},
2496 {"soft-version", 0xe60000, 0x10000},
2497 {"support-list", 0xe70000, 0x10000},
2498 {"profile", 0xe80000, 0x10000},
2499 {"default-config", 0xe90000, 0x10000},
2500 {"user-config", 0xea0000, 0x40000},
2501 {"qos-db", 0xee0000, 0x40000},
2502 {"certificate", 0xf20000, 0x10000},
2503 {"usb-config", 0xfb0000, 0x10000},
2504 {"log", 0xfc0000, 0x20000},
2505 {"radio-bk", 0xfe0000, 0x10000},
2506 {"radio", 0xff0000, 0x10000},
2507 {NULL, 0, 0}
2508 },
2509
2510 .first_sysupgrade_partition = "os-image",
2511 .last_sysupgrade_partition = "file-system",
2512 },
2513
2514 /** Firmware layout for the RE200 v2 */
2515 {
2516 .id = "RE200-V2",
2517 .vendor = "",
2518 .support_list =
2519 "SupportList:\n"
2520 "{product_name:RE200,product_ver:2.0.0,special_id:00000000}\n"
2521 "{product_name:RE200,product_ver:2.0.0,special_id:41520000}\n"
2522 "{product_name:RE200,product_ver:2.0.0,special_id:41550000}\n"
2523 "{product_name:RE200,product_ver:2.0.0,special_id:42520000}\n"
2524 "{product_name:RE200,product_ver:2.0.0,special_id:43410000}\n"
2525 "{product_name:RE200,product_ver:2.0.0,special_id:45530000}\n"
2526 "{product_name:RE200,product_ver:2.0.0,special_id:45550000}\n"
2527 "{product_name:RE200,product_ver:2.0.0,special_id:49440000}\n"
2528 "{product_name:RE200,product_ver:2.0.0,special_id:4a500000}\n"
2529 "{product_name:RE200,product_ver:2.0.0,special_id:4b520000}\n"
2530 "{product_name:RE200,product_ver:2.0.0,special_id:52550000}\n"
2531 "{product_name:RE200,product_ver:2.0.0,special_id:54570000}\n"
2532 "{product_name:RE200,product_ver:2.0.0,special_id:55530000}\n",
2533 .part_trail = 0x00,
2534 .soft_ver = SOFT_VER_DEFAULT,
2535
2536 .partitions = {
2537 {"fs-uboot", 0x00000, 0x20000},
2538 {"firmware", 0x20000, 0x7a0000},
2539 {"partition-table", 0x7c0000, 0x02000},
2540 {"default-mac", 0x7c2000, 0x00020},
2541 {"pin", 0x7c2100, 0x00020},
2542 {"product-info", 0x7c3100, 0x01000},
2543 {"soft-version", 0x7c4200, 0x01000},
2544 {"support-list", 0x7c5200, 0x01000},
2545 {"profile", 0x7c6200, 0x08000},
2546 {"config-info", 0x7ce200, 0x00400},
2547 {"user-config", 0x7d0000, 0x10000},
2548 {"default-config", 0x7e0000, 0x10000},
2549 {"radio", 0x7f0000, 0x10000},
2550 {NULL, 0, 0}
2551 },
2552
2553 .first_sysupgrade_partition = "os-image",
2554 .last_sysupgrade_partition = "file-system"
2555 },
2556
2557 /** Firmware layout for the RE200 v3 */
2558 {
2559 .id = "RE200-V3",
2560 .vendor = "",
2561 .support_list =
2562 "SupportList:\n"
2563 "{product_name:RE200,product_ver:3.0.0,special_id:00000000}\n"
2564 "{product_name:RE200,product_ver:3.0.0,special_id:41520000}\n"
2565 "{product_name:RE200,product_ver:3.0.0,special_id:41550000}\n"
2566 "{product_name:RE200,product_ver:3.0.0,special_id:42520000}\n"
2567 "{product_name:RE200,product_ver:3.0.0,special_id:43410000}\n"
2568 "{product_name:RE200,product_ver:3.0.0,special_id:45470000}\n"
2569 "{product_name:RE200,product_ver:3.0.0,special_id:45530000}\n"
2570 "{product_name:RE200,product_ver:3.0.0,special_id:45550000}\n"
2571 "{product_name:RE200,product_ver:3.0.0,special_id:49440000}\n"
2572 "{product_name:RE200,product_ver:3.0.0,special_id:4A500000}\n"
2573 "{product_name:RE200,product_ver:3.0.0,special_id:4B520000}\n"
2574 "{product_name:RE200,product_ver:3.0.0,special_id:52550000}\n"
2575 "{product_name:RE200,product_ver:3.0.0,special_id:54570000}\n"
2576 "{product_name:RE200,product_ver:3.0.0,special_id:55530000}\n",
2577 .part_trail = 0x00,
2578 .soft_ver = SOFT_VER_DEFAULT,
2579
2580 .partitions = {
2581 {"fs-uboot", 0x00000, 0x20000},
2582 {"firmware", 0x20000, 0x7a0000},
2583 {"partition-table", 0x7c0000, 0x02000},
2584 {"default-mac", 0x7c2000, 0x00020},
2585 {"pin", 0x7c2100, 0x00020},
2586 {"product-info", 0x7c3100, 0x01000},
2587 {"soft-version", 0x7c4200, 0x01000},
2588 {"support-list", 0x7c5200, 0x01000},
2589 {"profile", 0x7c6200, 0x08000},
2590 {"config-info", 0x7ce200, 0x00400},
2591 {"user-config", 0x7d0000, 0x10000},
2592 {"default-config", 0x7e0000, 0x10000},
2593 {"radio", 0x7f0000, 0x10000},
2594 {NULL, 0, 0}
2595 },
2596
2597 .first_sysupgrade_partition = "os-image",
2598 .last_sysupgrade_partition = "file-system"
2599 },
2600
2601 /** Firmware layout for the RE200 v4 */
2602 {
2603 .id = "RE200-V4",
2604 .vendor = "",
2605 .support_list =
2606 "SupportList:\n"
2607 "{product_name:RE200,product_ver:4.0.0,special_id:00000000}\n"
2608 "{product_name:RE200,product_ver:4.0.0,special_id:45550000}\n"
2609 "{product_name:RE200,product_ver:4.0.0,special_id:4A500000}\n"
2610 "{product_name:RE200,product_ver:4.0.0,special_id:4B520000}\n"
2611 "{product_name:RE200,product_ver:4.0.0,special_id:43410000}\n"
2612 "{product_name:RE200,product_ver:4.0.0,special_id:41550000}\n"
2613 "{product_name:RE200,product_ver:4.0.0,special_id:42520000}\n"
2614 "{product_name:RE200,product_ver:4.0.0,special_id:55530000}\n"
2615 "{product_name:RE200,product_ver:4.0.0,special_id:41520000}\n"
2616 "{product_name:RE200,product_ver:4.0.0,special_id:52550000}\n"
2617 "{product_name:RE200,product_ver:4.0.0,special_id:54570000}\n"
2618 "{product_name:RE200,product_ver:4.0.0,special_id:45530000}\n"
2619 "{product_name:RE200,product_ver:4.0.0,special_id:49440000}\n"
2620 "{product_name:RE200,product_ver:4.0.0,special_id:45470000}\n",
2621 .part_trail = 0x00,
2622 .soft_ver = SOFT_VER_TEXT("soft_ver:1.1.0\n"),
2623
2624 .partitions = {
2625 {"fs-uboot", 0x00000, 0x20000},
2626 {"firmware", 0x20000, 0x7a0000},
2627 {"partition-table", 0x7c0000, 0x02000},
2628 {"default-mac", 0x7c2000, 0x00020},
2629 {"pin", 0x7c2100, 0x00020},
2630 {"product-info", 0x7c3100, 0x01000},
2631 {"soft-version", 0x7c4200, 0x01000},
2632 {"support-list", 0x7c5200, 0x01000},
2633 {"profile", 0x7c6200, 0x08000},
2634 {"config-info", 0x7ce200, 0x00400},
2635 {"user-config", 0x7d0000, 0x10000},
2636 {"default-config", 0x7e0000, 0x10000},
2637 {"radio", 0x7f0000, 0x10000},
2638 {NULL, 0, 0}
2639 },
2640
2641 .first_sysupgrade_partition = "os-image",
2642 .last_sysupgrade_partition = "file-system"
2643 },
2644
2645 /** Firmware layout for the RE220 v2 */
2646 {
2647 .id = "RE220-V2",
2648 .vendor = "",
2649 .support_list =
2650 "SupportList:\n"
2651 "{product_name:RE220,product_ver:2.0.0,special_id:00000000}\n"
2652 "{product_name:RE220,product_ver:2.0.0,special_id:41520000}\n"
2653 "{product_name:RE220,product_ver:2.0.0,special_id:41550000}\n"
2654 "{product_name:RE220,product_ver:2.0.0,special_id:42520000}\n"
2655 "{product_name:RE220,product_ver:2.0.0,special_id:43410000}\n"
2656 "{product_name:RE220,product_ver:2.0.0,special_id:45530000}\n"
2657 "{product_name:RE220,product_ver:2.0.0,special_id:45550000}\n"
2658 "{product_name:RE220,product_ver:2.0.0,special_id:49440000}\n"
2659 "{product_name:RE220,product_ver:2.0.0,special_id:4a500000}\n"
2660 "{product_name:RE220,product_ver:2.0.0,special_id:4b520000}\n"
2661 "{product_name:RE220,product_ver:2.0.0,special_id:52550000}\n"
2662 "{product_name:RE220,product_ver:2.0.0,special_id:54570000}\n"
2663 "{product_name:RE220,product_ver:2.0.0,special_id:55530000}\n",
2664 .part_trail = 0x00,
2665 .soft_ver = SOFT_VER_DEFAULT,
2666
2667 .partitions = {
2668 {"fs-uboot", 0x00000, 0x20000},
2669 {"firmware", 0x20000, 0x7a0000},
2670 {"partition-table", 0x7c0000, 0x02000},
2671 {"default-mac", 0x7c2000, 0x00020},
2672 {"pin", 0x7c2100, 0x00020},
2673 {"product-info", 0x7c3100, 0x01000},
2674 {"soft-version", 0x7c4200, 0x01000},
2675 {"support-list", 0x7c5200, 0x01000},
2676 {"profile", 0x7c6200, 0x08000},
2677 {"config-info", 0x7ce200, 0x00400},
2678 {"user-config", 0x7d0000, 0x10000},
2679 {"default-config", 0x7e0000, 0x10000},
2680 {"radio", 0x7f0000, 0x10000},
2681 {NULL, 0, 0}
2682 },
2683
2684 .first_sysupgrade_partition = "os-image",
2685 .last_sysupgrade_partition = "file-system"
2686 },
2687
2688 /** Firmware layout for the RE305 v1 */
2689 {
2690 .id = "RE305-V1",
2691 .vendor = "",
2692 .support_list =
2693 "SupportList:\n"
2694 "{product_name:RE305,product_ver:1.0.0,special_id:45550000}\n"
2695 "{product_name:RE305,product_ver:1.0.0,special_id:55530000}\n"
2696 "{product_name:RE305,product_ver:1.0.0,special_id:4a500000}\n"
2697 "{product_name:RE305,product_ver:1.0.0,special_id:42520000}\n"
2698 "{product_name:RE305,product_ver:1.0.0,special_id:4b520000}\n"
2699 "{product_name:RE305,product_ver:1.0.0,special_id:41550000}\n"
2700 "{product_name:RE305,product_ver:1.0.0,special_id:43410000}\n",
2701 .part_trail = 0x00,
2702 .soft_ver = SOFT_VER_DEFAULT,
2703
2704 .partitions = {
2705 {"fs-uboot", 0x00000, 0x20000},
2706 {"firmware", 0x20000, 0x5e0000},
2707 {"partition-table", 0x600000, 0x02000},
2708 {"default-mac", 0x610000, 0x00020},
2709 {"pin", 0x610100, 0x00020},
2710 {"product-info", 0x611100, 0x01000},
2711 {"soft-version", 0x620000, 0x01000},
2712 {"support-list", 0x621000, 0x01000},
2713 {"profile", 0x622000, 0x08000},
2714 {"user-config", 0x630000, 0x10000},
2715 {"default-config", 0x640000, 0x10000},
2716 {"radio", 0x7f0000, 0x10000},
2717 {NULL, 0, 0}
2718 },
2719
2720 .first_sysupgrade_partition = "os-image",
2721 .last_sysupgrade_partition = "file-system"
2722 },
2723
2724 /** Firmware layout for the RE305 v3 */
2725 {
2726 .id = "RE305-V3",
2727 .vendor = "",
2728 .support_list =
2729 "SupportList:\n"
2730 "{product_name:RE305,product_ver:3.0.0,special_id:00000000}\n"
2731 "{product_name:RE305,product_ver:3.0.0,special_id:45550000}\n"
2732 "{product_name:RE305,product_ver:3.0.0,special_id:4A500000}\n"
2733 "{product_name:RE305,product_ver:3.0.0,special_id:4B520000}\n"
2734 "{product_name:RE305,product_ver:3.0.0,special_id:41550000}\n"
2735 "{product_name:RE305,product_ver:3.0.0,special_id:42520000}\n"
2736 "{product_name:RE305,product_ver:3.0.0,special_id:55530000}\n"
2737 "{product_name:RE305,product_ver:3.0.0,special_id:45530000}\n"
2738 "{product_name:RE305,product_ver:3.0.0,special_id:41530000}\n"
2739 "{product_name:RE305,product_ver:3.0.0,special_id:43410000}\n"
2740 "{product_name:RE305,product_ver:3.0.0,special_id:52550000}\n",
2741 .part_trail = 0x00,
2742 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
2743
2744 .partitions = {
2745 {"fs-uboot", 0x00000, 0x20000},
2746 {"firmware", 0x20000, 0x7a0000},
2747 {"partition-table", 0x7c0000, 0x02000},
2748 {"default-mac", 0x7c2000, 0x00020},
2749 {"pin", 0x7c2100, 0x00020},
2750 {"product-info", 0x7c3100, 0x01000},
2751 {"soft-version", 0x7c4200, 0x01000},
2752 {"support-list", 0x7c5200, 0x01000},
2753 {"profile", 0x7c6200, 0x08000},
2754 {"config-info", 0x7ce200, 0x00400},
2755 {"user-config", 0x7d0000, 0x10000},
2756 {"default-config", 0x7e0000, 0x10000},
2757 {"radio", 0x7f0000, 0x10000},
2758 {NULL, 0, 0}
2759 },
2760
2761 .first_sysupgrade_partition = "os-image",
2762 .last_sysupgrade_partition = "file-system"
2763 },
2764
2765 /** Firmware layout for the RE350 v1 */
2766 {
2767 .id = "RE350-V1",
2768 .vendor = "",
2769 .support_list =
2770 "SupportList:\n"
2771 "{product_name:RE350,product_ver:1.0.0,special_id:45550000}\n"
2772 "{product_name:RE350,product_ver:1.0.0,special_id:00000000}\n"
2773 "{product_name:RE350,product_ver:1.0.0,special_id:41550000}\n"
2774 "{product_name:RE350,product_ver:1.0.0,special_id:55530000}\n"
2775 "{product_name:RE350,product_ver:1.0.0,special_id:43410000}\n"
2776 "{product_name:RE350,product_ver:1.0.0,special_id:4b520000}\n"
2777 "{product_name:RE350,product_ver:1.0.0,special_id:4a500000}\n",
2778 .part_trail = 0x00,
2779 .soft_ver = SOFT_VER_DEFAULT,
2780
2781 /** We're using a dynamic kernel/rootfs split here */
2782 .partitions = {
2783 {"fs-uboot", 0x00000, 0x20000},
2784 {"firmware", 0x20000, 0x5e0000},
2785 {"partition-table", 0x600000, 0x02000},
2786 {"default-mac", 0x610000, 0x00020},
2787 {"pin", 0x610100, 0x00020},
2788 {"product-info", 0x611100, 0x01000},
2789 {"soft-version", 0x620000, 0x01000},
2790 {"support-list", 0x621000, 0x01000},
2791 {"profile", 0x622000, 0x08000},
2792 {"user-config", 0x630000, 0x10000},
2793 {"default-config", 0x640000, 0x10000},
2794 {"radio", 0x7f0000, 0x10000},
2795 {NULL, 0, 0}
2796 },
2797
2798 .first_sysupgrade_partition = "os-image",
2799 .last_sysupgrade_partition = "file-system"
2800 },
2801
2802 /** Firmware layout for the RE350K v1 */
2803 {
2804 .id = "RE350K-V1",
2805 .vendor = "",
2806 .support_list =
2807 "SupportList:\n"
2808 "{product_name:RE350K,product_ver:1.0.0,special_id:00000000,product_region:US}\n",
2809 .part_trail = 0x00,
2810 .soft_ver = SOFT_VER_DEFAULT,
2811
2812 /** We're using a dynamic kernel/rootfs split here */
2813 .partitions = {
2814 {"fs-uboot", 0x00000, 0x20000},
2815 {"firmware", 0x20000, 0xd70000},
2816 {"partition-table", 0xd90000, 0x02000},
2817 {"default-mac", 0xda0000, 0x00020},
2818 {"pin", 0xda0100, 0x00020},
2819 {"product-info", 0xda1100, 0x01000},
2820 {"soft-version", 0xdb0000, 0x01000},
2821 {"support-list", 0xdb1000, 0x01000},
2822 {"profile", 0xdb2000, 0x08000},
2823 {"user-config", 0xdc0000, 0x10000},
2824 {"default-config", 0xdd0000, 0x10000},
2825 {"device-id", 0xde0000, 0x00108},
2826 {"radio", 0xff0000, 0x10000},
2827 {NULL, 0, 0}
2828 },
2829
2830 .first_sysupgrade_partition = "os-image",
2831 .last_sysupgrade_partition = "file-system"
2832 },
2833
2834 /** Firmware layout for the RE355 */
2835 {
2836 .id = "RE355",
2837 .vendor = "",
2838 .support_list =
2839 "SupportList:\r\n"
2840 "{product_name:RE355,product_ver:1.0.0,special_id:00000000}\r\n"
2841 "{product_name:RE355,product_ver:1.0.0,special_id:55530000}\r\n"
2842 "{product_name:RE355,product_ver:1.0.0,special_id:45550000}\r\n"
2843 "{product_name:RE355,product_ver:1.0.0,special_id:4A500000}\r\n"
2844 "{product_name:RE355,product_ver:1.0.0,special_id:43410000}\r\n"
2845 "{product_name:RE355,product_ver:1.0.0,special_id:41550000}\r\n"
2846 "{product_name:RE355,product_ver:1.0.0,special_id:4B520000}\r\n"
2847 "{product_name:RE355,product_ver:1.0.0,special_id:55534100}\r\n",
2848 .part_trail = 0x00,
2849 .soft_ver = SOFT_VER_DEFAULT,
2850
2851 /* We're using a dynamic kernel/rootfs split here */
2852 .partitions = {
2853 {"fs-uboot", 0x00000, 0x20000},
2854 {"firmware", 0x20000, 0x5e0000},
2855 {"partition-table", 0x600000, 0x02000},
2856 {"default-mac", 0x610000, 0x00020},
2857 {"pin", 0x610100, 0x00020},
2858 {"product-info", 0x611100, 0x01000},
2859 {"soft-version", 0x620000, 0x01000},
2860 {"support-list", 0x621000, 0x01000},
2861 {"profile", 0x622000, 0x08000},
2862 {"user-config", 0x630000, 0x10000},
2863 {"default-config", 0x640000, 0x10000},
2864 {"radio", 0x7f0000, 0x10000},
2865 {NULL, 0, 0}
2866 },
2867
2868 .first_sysupgrade_partition = "os-image",
2869 .last_sysupgrade_partition = "file-system"
2870 },
2871
2872 /** Firmware layout for the RE450 */
2873 {
2874 .id = "RE450",
2875 .vendor = "",
2876 .support_list =
2877 "SupportList:\r\n"
2878 "{product_name:RE450,product_ver:1.0.0,special_id:00000000}\r\n"
2879 "{product_name:RE450,product_ver:1.0.0,special_id:55530000}\r\n"
2880 "{product_name:RE450,product_ver:1.0.0,special_id:45550000}\r\n"
2881 "{product_name:RE450,product_ver:1.0.0,special_id:4A500000}\r\n"
2882 "{product_name:RE450,product_ver:1.0.0,special_id:43410000}\r\n"
2883 "{product_name:RE450,product_ver:1.0.0,special_id:41550000}\r\n"
2884 "{product_name:RE450,product_ver:1.0.0,special_id:4B520000}\r\n"
2885 "{product_name:RE450,product_ver:1.0.0,special_id:55534100}\r\n",
2886 .part_trail = 0x00,
2887 .soft_ver = SOFT_VER_DEFAULT,
2888
2889 /** We're using a dynamic kernel/rootfs split here */
2890 .partitions = {
2891 {"fs-uboot", 0x00000, 0x20000},
2892 {"firmware", 0x20000, 0x5e0000},
2893 {"partition-table", 0x600000, 0x02000},
2894 {"default-mac", 0x610000, 0x00020},
2895 {"pin", 0x610100, 0x00020},
2896 {"product-info", 0x611100, 0x01000},
2897 {"soft-version", 0x620000, 0x01000},
2898 {"support-list", 0x621000, 0x01000},
2899 {"profile", 0x622000, 0x08000},
2900 {"user-config", 0x630000, 0x10000},
2901 {"default-config", 0x640000, 0x10000},
2902 {"radio", 0x7f0000, 0x10000},
2903 {NULL, 0, 0}
2904 },
2905
2906 .first_sysupgrade_partition = "os-image",
2907 .last_sysupgrade_partition = "file-system"
2908 },
2909
2910 /** Firmware layout for the RE450 v2 */
2911 {
2912 .id = "RE450-V2",
2913 .vendor = "",
2914 .support_list =
2915 "SupportList:\r\n"
2916 "{product_name:RE450,product_ver:2.0.0,special_id:00000000}\r\n"
2917 "{product_name:RE450,product_ver:2.0.0,special_id:55530000}\r\n"
2918 "{product_name:RE450,product_ver:2.0.0,special_id:45550000}\r\n"
2919 "{product_name:RE450,product_ver:2.0.0,special_id:4A500000}\r\n"
2920 "{product_name:RE450,product_ver:2.0.0,special_id:43410000}\r\n"
2921 "{product_name:RE450,product_ver:2.0.0,special_id:41550000}\r\n"
2922 "{product_name:RE450,product_ver:2.0.0,special_id:41530000}\r\n"
2923 "{product_name:RE450,product_ver:2.0.0,special_id:4B520000}\r\n"
2924 "{product_name:RE450,product_ver:2.0.0,special_id:42520000}\r\n",
2925 .part_trail = 0x00,
2926 .soft_ver = SOFT_VER_DEFAULT,
2927
2928 /* We're using a dynamic kernel/rootfs split here */
2929 .partitions = {
2930 {"fs-uboot", 0x00000, 0x20000},
2931 {"firmware", 0x20000, 0x5e0000},
2932 {"partition-table", 0x600000, 0x02000},
2933 {"default-mac", 0x610000, 0x00020},
2934 {"pin", 0x610100, 0x00020},
2935 {"product-info", 0x611100, 0x01000},
2936 {"soft-version", 0x620000, 0x01000},
2937 {"support-list", 0x621000, 0x01000},
2938 {"profile", 0x622000, 0x08000},
2939 {"user-config", 0x630000, 0x10000},
2940 {"default-config", 0x640000, 0x10000},
2941 {"radio", 0x7f0000, 0x10000},
2942 {NULL, 0, 0}
2943 },
2944
2945 .first_sysupgrade_partition = "os-image",
2946 .last_sysupgrade_partition = "file-system"
2947 },
2948
2949 /** Firmware layout for the RE450 v3 */
2950 {
2951 .id = "RE450-V3",
2952 .vendor = "",
2953 .support_list =
2954 "SupportList:\r\n"
2955 "{product_name:RE450,product_ver:3.0.0,special_id:00000000}\r\n"
2956 "{product_name:RE450,product_ver:3.0.0,special_id:55530000}\r\n"
2957 "{product_name:RE450,product_ver:3.0.0,special_id:45550000}\r\n"
2958 "{product_name:RE450,product_ver:3.0.0,special_id:4A500000}\r\n"
2959 "{product_name:RE450,product_ver:3.0.0,special_id:43410000}\r\n"
2960 "{product_name:RE450,product_ver:3.0.0,special_id:41550000}\r\n"
2961 "{product_name:RE450,product_ver:3.0.0,special_id:41530000}\r\n"
2962 "{product_name:RE450,product_ver:3.0.0,special_id:4B520000}\r\n"
2963 "{product_name:RE450,product_ver:3.0.0,special_id:42520000}\r\n",
2964 .part_trail = 0x00,
2965 .soft_ver = SOFT_VER_DEFAULT,
2966
2967 /* We're using a dynamic kernel/rootfs split here */
2968 .partitions = {
2969 {"fs-uboot", 0x00000, 0x20000},
2970 {"default-mac", 0x20000, 0x00020},
2971 {"pin", 0x20020, 0x00020},
2972 {"product-info", 0x21000, 0x01000},
2973 {"partition-table", 0x22000, 0x02000},
2974 {"soft-version", 0x24000, 0x01000},
2975 {"support-list", 0x25000, 0x01000},
2976 {"profile", 0x26000, 0x08000},
2977 {"user-config", 0x2e000, 0x10000},
2978 {"default-config", 0x3e000, 0x10000},
2979 {"config-info", 0x4e000, 0x00400},
2980 {"firmware", 0x50000, 0x7a0000},
2981 {"radio", 0x7f0000, 0x10000},
2982 {NULL, 0, 0}
2983 },
2984
2985 .first_sysupgrade_partition = "os-image",
2986 .last_sysupgrade_partition = "file-system"
2987 },
2988
2989 /** Firmware layout for the RE455 v1 */
2990 {
2991 .id = "RE455-V1",
2992 .vendor = "",
2993 .support_list =
2994 "SupportList:\r\n"
2995 "{product_name:RE455,product_ver:1.0.0,special_id:00000000}\r\n"
2996 "{product_name:RE455,product_ver:1.0.0,special_id:55530000}\r\n"
2997 "{product_name:RE455,product_ver:1.0.0,special_id:45550000}\r\n"
2998 "{product_name:RE455,product_ver:1.0.0,special_id:4A500000}\r\n"
2999 "{product_name:RE455,product_ver:1.0.0,special_id:43410000}\r\n"
3000 "{product_name:RE455,product_ver:1.0.0,special_id:41550000}\r\n"
3001 "{product_name:RE455,product_ver:1.0.0,special_id:41530000}\r\n"
3002 "{product_name:RE455,product_ver:1.0.0,special_id:4B520000}\r\n"
3003 "{product_name:RE455,product_ver:1.0.0,special_id:42520000}\r\n",
3004 .part_trail = 0x00,
3005 .soft_ver = SOFT_VER_DEFAULT,
3006
3007 /* We're using a dynamic kernel/rootfs split here */
3008 .partitions = {
3009 {"fs-uboot", 0x00000, 0x20000},
3010 {"default-mac", 0x20000, 0x00020},
3011 {"pin", 0x20020, 0x00020},
3012 {"product-info", 0x21000, 0x01000},
3013 {"partition-table", 0x22000, 0x02000},
3014 {"soft-version", 0x24000, 0x01000},
3015 {"support-list", 0x25000, 0x01000},
3016 {"profile", 0x26000, 0x08000},
3017 {"user-config", 0x2e000, 0x10000},
3018 {"default-config", 0x3e000, 0x10000},
3019 {"config-info", 0x4e000, 0x00400},
3020 {"firmware", 0x50000, 0x7a0000},
3021 {"radio", 0x7f0000, 0x10000},
3022 {NULL, 0, 0}
3023 },
3024
3025 .first_sysupgrade_partition = "os-image",
3026 .last_sysupgrade_partition = "file-system"
3027 },
3028
3029 /** Firmware layout for the RE500 */
3030 {
3031 .id = "RE500-V1",
3032 .vendor = "",
3033 .support_list =
3034 "SupportList:\r\n"
3035 "{product_name:RE500,product_ver:1.0.0,special_id:00000000}\r\n"
3036 "{product_name:RE500,product_ver:1.0.0,special_id:55530000}\r\n"
3037 "{product_name:RE500,product_ver:1.0.0,special_id:45550000}\r\n"
3038 "{product_name:RE500,product_ver:1.0.0,special_id:4A500000}\r\n"
3039 "{product_name:RE500,product_ver:1.0.0,special_id:43410000}\r\n"
3040 "{product_name:RE500,product_ver:1.0.0,special_id:41550000}\r\n"
3041 "{product_name:RE500,product_ver:1.0.0,special_id:41530000}\r\n",
3042 .part_trail = 0x00,
3043 .soft_ver = SOFT_VER_DEFAULT,
3044
3045 /* We're using a dynamic kernel/rootfs split here */
3046 .partitions = {
3047 {"fs-uboot", 0x00000, 0x20000},
3048 {"firmware", 0x20000, 0xde0000},
3049 {"partition-table", 0xe00000, 0x02000},
3050 {"default-mac", 0xe10000, 0x00020},
3051 {"pin", 0xe10100, 0x00020},
3052 {"product-info", 0xe11100, 0x01000},
3053 {"soft-version", 0xe20000, 0x01000},
3054 {"support-list", 0xe21000, 0x01000},
3055 {"profile", 0xe22000, 0x08000},
3056 {"user-config", 0xe30000, 0x10000},
3057 {"default-config", 0xe40000, 0x10000},
3058 {"radio", 0xff0000, 0x10000},
3059 {NULL, 0, 0}
3060 },
3061
3062 .first_sysupgrade_partition = "os-image",
3063 .last_sysupgrade_partition = "file-system"
3064 },
3065
3066 /** Firmware layout for the RE650 */
3067 {
3068 .id = "RE650-V1",
3069 .vendor = "",
3070 .support_list =
3071 "SupportList:\r\n"
3072 "{product_name:RE650,product_ver:1.0.0,special_id:00000000}\r\n"
3073 "{product_name:RE650,product_ver:1.0.0,special_id:55530000}\r\n"
3074 "{product_name:RE650,product_ver:1.0.0,special_id:45550000}\r\n"
3075 "{product_name:RE650,product_ver:1.0.0,special_id:4A500000}\r\n"
3076 "{product_name:RE650,product_ver:1.0.0,special_id:43410000}\r\n"
3077 "{product_name:RE650,product_ver:1.0.0,special_id:41550000}\r\n"
3078 "{product_name:RE650,product_ver:1.0.0,special_id:41530000}\r\n",
3079 .part_trail = 0x00,
3080 .soft_ver = SOFT_VER_DEFAULT,
3081
3082 /* We're using a dynamic kernel/rootfs split here */
3083 .partitions = {
3084 {"fs-uboot", 0x00000, 0x20000},
3085 {"firmware", 0x20000, 0xde0000},
3086 {"partition-table", 0xe00000, 0x02000},
3087 {"default-mac", 0xe10000, 0x00020},
3088 {"pin", 0xe10100, 0x00020},
3089 {"product-info", 0xe11100, 0x01000},
3090 {"soft-version", 0xe20000, 0x01000},
3091 {"support-list", 0xe21000, 0x01000},
3092 {"profile", 0xe22000, 0x08000},
3093 {"user-config", 0xe30000, 0x10000},
3094 {"default-config", 0xe40000, 0x10000},
3095 {"radio", 0xff0000, 0x10000},
3096 {NULL, 0, 0}
3097 },
3098
3099 .first_sysupgrade_partition = "os-image",
3100 .last_sysupgrade_partition = "file-system"
3101 },
3102 /** Firmware layout for the RE650 V2 (8MB Flash)*/
3103 {
3104 .id = "RE650-V2",
3105 .vendor = "",
3106 .support_list =
3107 "SupportList:\n"
3108 "{product_name:RE650,product_ver:2.0.0,special_id:00000000}\n"
3109 "{product_name:RE650,product_ver:2.0.0,special_id:45550000}\n"
3110 "{product_name:RE650,product_ver:2.0.0,special_id:4A500000}\n"
3111 "{product_name:RE650,product_ver:2.0.0,special_id:41550000}\n"
3112 "{product_name:RE650,product_ver:2.0.0,special_id:43410000}\n"
3113 "{product_name:RE650,product_ver:2.0.0,special_id:41530000}\n"
3114 "{product_name:RE650,product_ver:2.0.0,special_id:55530000}\n",
3115 .part_trail = 0x00,
3116 /* For RE650 v2, soft ver is required, otherwise OEM install doesn't work */
3117 .soft_ver = SOFT_VER_TEXT("soft_ver:2.0.0\n"),
3118
3119 /* We're using a dynamic kernel/rootfs split here */
3120 .partitions = {
3121 {"fs-uboot", 0x00000, 0x20000},
3122 {"firmware", 0x20000, 0x7a0000},
3123 {"partition-table", 0x7c0000, 0x02000},
3124 {"default-mac", 0x7c2000, 0x00020},
3125 {"pin", 0x7c2100, 0x00020},
3126 {"product-info", 0x7c3100, 0x01000},
3127 {"soft-version", 0x7c4200, 0x01000},
3128 {"support-list", 0x7c5200, 0x01000},
3129 {"profile", 0x7c6200, 0x08000},
3130 {"config-info", 0x7ce200, 0x00400},
3131 {"user-config", 0x7d0000, 0x10000},
3132 {"default-config", 0x7e0000, 0x10000},
3133 {"radio", 0x7f0000, 0x10000},
3134 {NULL, 0, 0}
3135 },
3136
3137 .first_sysupgrade_partition = "os-image",
3138 .last_sysupgrade_partition = "file-system"
3139 },
3140
3141 /** Firmware layout for the Mercusys MR70X */
3142 {
3143 .id = "MR70X",
3144 .vendor = "",
3145 .support_list =
3146 "SupportList:\n"
3147 "{product_name:MR70X,product_ver:1.0.0,special_id:45550000}\n"
3148 "{product_name:MR70X,product_ver:1.0.0,special_id:4A500000}\n"
3149 "{product_name:MR70X,product_ver:1.0.0,special_id:55530000}\n",
3150 .part_trail = 0x00,
3151 .soft_ver = SOFT_VER_DEFAULT,
3152
3153 .partitions = {
3154 {"fs-uboot", 0x00000, 0x40000},
3155 {"firmware", 0x40000, 0xf60000},
3156 {"default-mac", 0xfa0000, 0x00200},
3157 {"pin", 0xfa0200, 0x00100},
3158 {"device-id", 0xfa0300, 0x00100},
3159 {"product-info", 0xfa0400, 0x0fc00},
3160 {"default-config", 0xfb0000, 0x08000},
3161 {"ap-def-config", 0xfb8000, 0x08000},
3162 {"user-config", 0xfc0000, 0x0a000},
3163 {"ag-config", 0xfca000, 0x04000},
3164 {"certificate", 0xfce000, 0x02000},
3165 {"ap-config", 0xfd0000, 0x06000},
3166 {"router-config", 0xfd6000, 0x06000},
3167 {"favicon", 0xfdc000, 0x02000},
3168 {"logo", 0xfde000, 0x02000},
3169 {"partition-table", 0xfe0000, 0x00800},
3170 {"soft-version", 0xfe0800, 0x00100},
3171 {"support-list", 0xfe0900, 0x00200},
3172 {"profile", 0xfe0b00, 0x03000},
3173 {"extra-para", 0xfe3b00, 0x00100},
3174 {"radio", 0xff0000, 0x10000},
3175 {NULL, 0, 0}
3176 },
3177
3178 .first_sysupgrade_partition = "os-image",
3179 .last_sysupgrade_partition = "file-system"
3180 },
3181
3182 {}
3183 };
3184
3185 #define error(_ret, _errno, _str, ...) \
3186 do { \
3187 fprintf(stderr, _str ": %s\n", ## __VA_ARGS__, \
3188 strerror(_errno)); \
3189 if (_ret) \
3190 exit(_ret); \
3191 } while (0)
3192
3193
3194 /** Stores a uint32 as big endian */
3195 static inline void put32(uint8_t *buf, uint32_t val) {
3196 buf[0] = val >> 24;
3197 buf[1] = val >> 16;
3198 buf[2] = val >> 8;
3199 buf[3] = val;
3200 }
3201
3202 static inline bool meta_partition_should_pad(enum partition_trail_value pv)
3203 {
3204 return (pv >= 0) && (pv <= PART_TRAIL_MAX);
3205 }
3206
3207 /** Allocate a padded meta partition with a correctly initialised header
3208 * If the `data` pointer is NULL, then the required space is only allocated,
3209 * otherwise `data_len` bytes will be copied from `data` into the partition
3210 * entry. */
3211 static struct image_partition_entry init_meta_partition_entry(
3212 const char *name, const void *data, uint32_t data_len,
3213 enum partition_trail_value pad_value)
3214 {
3215 uint32_t total_len = sizeof(struct meta_header) + data_len;
3216 if (meta_partition_should_pad(pad_value))
3217 total_len += 1;
3218
3219 struct image_partition_entry entry = {
3220 .name = name,
3221 .size = total_len,
3222 .data = malloc(total_len)
3223 };
3224 if (!entry.data)
3225 error(1, errno, "failed to allocate meta partition entry");
3226
3227 struct meta_header *header = (struct meta_header *)entry.data;
3228 header->length = htonl(data_len);
3229 header->zero = 0;
3230
3231 if (data)
3232 memcpy(entry.data+sizeof(*header), data, data_len);
3233
3234 if (meta_partition_should_pad(pad_value))
3235 entry.data[total_len - 1] = (uint8_t) pad_value;
3236
3237 return entry;
3238 }
3239
3240 /** Allocates a new image partition */
3241 static struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
3242 struct image_partition_entry entry = {name, len, malloc(len)};
3243 if (!entry.data)
3244 error(1, errno, "malloc");
3245
3246 return entry;
3247 }
3248
3249 /** Sets up default partition names whenever custom names aren't specified */
3250 static void set_partition_names(struct device_info *info)
3251 {
3252 if (!info->partition_names.partition_table)
3253 info->partition_names.partition_table = "partition-table";
3254 if (!info->partition_names.soft_ver)
3255 info->partition_names.soft_ver = "soft-version";
3256 if (!info->partition_names.os_image)
3257 info->partition_names.os_image = "os-image";
3258 if (!info->partition_names.support_list)
3259 info->partition_names.support_list = "support-list";
3260 if (!info->partition_names.file_system)
3261 info->partition_names.file_system = "file-system";
3262 if (!info->partition_names.extra_para)
3263 info->partition_names.extra_para = "extra-para";
3264 }
3265
3266 /** Frees an image partition */
3267 static void free_image_partition(struct image_partition_entry *entry)
3268 {
3269 void *data = entry->data;
3270
3271 entry->name = NULL;
3272 entry->size = 0;
3273 entry->data = NULL;
3274
3275 free(data);
3276 }
3277
3278 static time_t source_date_epoch = -1;
3279 static void set_source_date_epoch() {
3280 char *env = getenv("SOURCE_DATE_EPOCH");
3281 char *endptr = env;
3282 errno = 0;
3283 if (env && *env) {
3284 source_date_epoch = strtoull(env, &endptr, 10);
3285 if (errno || (endptr && *endptr != '\0')) {
3286 fprintf(stderr, "Invalid SOURCE_DATE_EPOCH");
3287 exit(1);
3288 }
3289 }
3290 }
3291
3292 /** Generates the partition-table partition */
3293 static struct image_partition_entry make_partition_table(const struct device_info *p)
3294 {
3295 struct image_partition_entry entry = alloc_image_partition(p->partition_names.partition_table, SAFELOADER_PAYLOAD_TABLE_SIZE);
3296
3297 char *s = (char *)entry.data, *end = (char *)(s+entry.size);
3298
3299 *(s++) = 0x00;
3300 *(s++) = 0x04;
3301 *(s++) = 0x00;
3302 *(s++) = 0x00;
3303
3304 size_t i;
3305 for (i = 0; p->partitions[i].name; i++) {
3306 size_t len = end-s;
3307 size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n",
3308 p->partitions[i].name, p->partitions[i].base, p->partitions[i].size);
3309
3310 if (w > len-1)
3311 error(1, 0, "flash partition table overflow?");
3312
3313 s += w;
3314 }
3315
3316 s++;
3317
3318 memset(s, 0xff, end-s);
3319
3320 return entry;
3321 }
3322
3323
3324 /** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
3325 static inline uint8_t bcd(uint8_t v) {
3326 return 0x10 * (v/10) + v%10;
3327 }
3328
3329
3330 /** Generates the soft-version partition */
3331 static struct image_partition_entry make_soft_version(const struct device_info *info, uint32_t rev)
3332 {
3333 /** If an info string is provided, use this instead of
3334 * the structured data, and include the null-termination */
3335 if (info->soft_ver.type == SOFT_VER_TYPE_TEXT) {
3336 uint32_t len = strlen(info->soft_ver.text) + 1;
3337 return init_meta_partition_entry(info->partition_names.soft_ver,
3338 info->soft_ver.text, len, info->part_trail);
3339 }
3340
3341 time_t t;
3342
3343 if (source_date_epoch != -1)
3344 t = source_date_epoch;
3345 else if (time(&t) == (time_t)(-1))
3346 error(1, errno, "time");
3347
3348 struct tm *tm = gmtime(&t);
3349
3350 struct soft_version s = {
3351 .pad1 = 0xff,
3352
3353 .version_major = info->soft_ver.num[0],
3354 .version_minor = info->soft_ver.num[1],
3355 .version_patch = info->soft_ver.num[2],
3356
3357 .year_hi = bcd((1900+tm->tm_year)/100),
3358 .year_lo = bcd(tm->tm_year%100),
3359 .month = bcd(tm->tm_mon+1),
3360 .day = bcd(tm->tm_mday),
3361 .rev = htonl(rev),
3362
3363 .compat_level = htonl(info->soft_ver_compat_level)
3364 };
3365
3366 if (info->soft_ver_compat_level == 0)
3367 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3368 (uint8_t *)(&s.compat_level) - (uint8_t *)(&s),
3369 info->part_trail);
3370 else
3371 return init_meta_partition_entry(info->partition_names.soft_ver, &s,
3372 sizeof(s), info->part_trail);
3373 }
3374
3375 /** Generates the support-list partition */
3376 static struct image_partition_entry make_support_list(
3377 const struct device_info *info)
3378 {
3379 uint32_t len = strlen(info->support_list);
3380 return init_meta_partition_entry(info->partition_names.support_list, info->support_list,
3381 len, info->part_trail);
3382 }
3383
3384 /** Partition with extra-para data */
3385 static struct image_partition_entry make_extra_para(
3386 const struct device_info *info, const uint8_t *extra_para, size_t len)
3387 {
3388 return init_meta_partition_entry(info->partition_names.extra_para, extra_para, len,
3389 info->part_trail);
3390 }
3391
3392 /** Creates a new image partition with an arbitrary name from a file */
3393 static struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof, struct flash_partition_entry *file_system_partition) {
3394 struct stat statbuf;
3395
3396 if (stat(filename, &statbuf) < 0)
3397 error(1, errno, "unable to stat file `%s'", filename);
3398
3399 size_t len = statbuf.st_size;
3400
3401 if (add_jffs2_eof) {
3402 if (file_system_partition)
3403 len = ALIGN(len + file_system_partition->base, 0x10000) + sizeof(jffs2_eof_mark) - file_system_partition->base;
3404 else
3405 len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
3406 }
3407
3408 struct image_partition_entry entry = alloc_image_partition(part_name, len);
3409
3410 FILE *file = fopen(filename, "rb");
3411 if (!file)
3412 error(1, errno, "unable to open file `%s'", filename);
3413
3414 if (fread(entry.data, statbuf.st_size, 1, file) != 1)
3415 error(1, errno, "unable to read file `%s'", filename);
3416
3417 if (add_jffs2_eof) {
3418 uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
3419
3420 memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
3421 memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
3422 }
3423
3424 fclose(file);
3425
3426 return entry;
3427 }
3428
3429 /**
3430 Copies a list of image partitions into an image buffer and generates the image partition table while doing so
3431
3432 Example image partition table:
3433
3434 fwup-ptn partition-table base 0x00800 size 0x00800
3435 fwup-ptn os-image base 0x01000 size 0x113b45
3436 fwup-ptn file-system base 0x114b45 size 0x1d0004
3437 fwup-ptn support-list base 0x2e4b49 size 0x000d1
3438
3439 Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
3440 the end of the partition table is marked with a zero byte.
3441
3442 The firmware image must contain at least the partition-table and support-list partitions
3443 to be accepted. There aren't any alignment constraints for the image partitions.
3444
3445 The partition-table partition contains the actual flash layout; partitions
3446 from the image partition table are mapped to the corresponding flash partitions during
3447 the firmware upgrade. The support-list partition contains a list of devices supported by
3448 the firmware image.
3449
3450 The base offsets in the firmware partition table are relative to the end
3451 of the vendor information block, so the partition-table partition will
3452 actually start at offset 0x1814 of the image.
3453
3454 I think partition-table must be the first partition in the firmware image.
3455 */
3456 static void put_partitions(uint8_t *buffer, const struct flash_partition_entry *flash_parts, const struct image_partition_entry *parts) {
3457 size_t i, j;
3458 char *image_pt = (char *)buffer, *end = image_pt + SAFELOADER_PAYLOAD_TABLE_SIZE;
3459
3460 size_t base = SAFELOADER_PAYLOAD_TABLE_SIZE;
3461 for (i = 0; parts[i].name; i++) {
3462 for (j = 0; flash_parts[j].name; j++) {
3463 if (!strcmp(flash_parts[j].name, parts[i].name)) {
3464 if (parts[i].size > flash_parts[j].size)
3465 error(1, 0, "%s partition too big (more than %u bytes)", flash_parts[j].name, (unsigned)flash_parts[j].size);
3466 break;
3467 }
3468 }
3469
3470 assert(flash_parts[j].name);
3471
3472 memcpy(buffer + base, parts[i].data, parts[i].size);
3473
3474 size_t len = end-image_pt;
3475 size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
3476
3477 if (w > len-1)
3478 error(1, 0, "image partition table overflow?");
3479
3480 image_pt += w;
3481
3482 base += parts[i].size;
3483 }
3484 }
3485
3486 /** Generates and writes the image MD5 checksum */
3487 static void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
3488 MD5_CTX ctx;
3489
3490 MD5_Init(&ctx);
3491 MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
3492 MD5_Update(&ctx, buffer, len);
3493 MD5_Final(md5, &ctx);
3494 }
3495
3496
3497 /**
3498 Generates the firmware image in factory format
3499
3500 Image format:
3501
3502 Bytes (hex) Usage
3503 ----------- -----
3504 0000-0003 Image size (4 bytes, big endian)
3505 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
3506 0014-0017 Vendor information length (without padding) (4 bytes, big endian)
3507 0018-1013 Vendor information (4092 bytes, padded with 0xff; there seem to be older
3508 (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
3509 1014-1813 Image partition table (2048 bytes, padded with 0xff)
3510 1814-xxxx Firmware partitions
3511 */
3512 static void * generate_factory_image(struct device_info *info, const struct image_partition_entry *parts, size_t *len) {
3513 *len = SAFELOADER_PAYLOAD_OFFSET + SAFELOADER_PAYLOAD_TABLE_SIZE;
3514
3515 size_t i;
3516 for (i = 0; parts[i].name; i++)
3517 *len += parts[i].size;
3518
3519 uint8_t *image = malloc(*len);
3520 if (!image)
3521 error(1, errno, "malloc");
3522
3523 memset(image, 0xff, *len);
3524 put32(image, *len);
3525
3526 if (info->vendor) {
3527 size_t vendor_len = strlen(info->vendor);
3528 put32(image + SAFELOADER_PREAMBLE_SIZE, vendor_len);
3529 memcpy(image + SAFELOADER_PREAMBLE_SIZE + 0x4, info->vendor, vendor_len);
3530 }
3531
3532 put_partitions(image + SAFELOADER_PAYLOAD_OFFSET, info->partitions, parts);
3533 put_md5(image + 0x04, image + SAFELOADER_PREAMBLE_SIZE, *len - SAFELOADER_PREAMBLE_SIZE);
3534
3535 return image;
3536 }
3537
3538 /**
3539 Generates the firmware image in sysupgrade format
3540
3541 This makes some assumptions about the provided flash and image partition tables and
3542 should be generalized when TP-LINK starts building its safeloader into hardware with
3543 different flash layouts.
3544 */
3545 static void * generate_sysupgrade_image(struct device_info *info, const struct image_partition_entry *image_parts, size_t *len) {
3546 size_t i, j;
3547 size_t flash_first_partition_index = 0;
3548 size_t flash_last_partition_index = 0;
3549 const struct flash_partition_entry *flash_first_partition = NULL;
3550 const struct flash_partition_entry *flash_last_partition = NULL;
3551 const struct image_partition_entry *image_last_partition = NULL;
3552
3553 /** Find first and last partitions */
3554 for (i = 0; info->partitions[i].name; i++) {
3555 if (!strcmp(info->partitions[i].name, info->first_sysupgrade_partition)) {
3556 flash_first_partition = &info->partitions[i];
3557 flash_first_partition_index = i;
3558 } else if (!strcmp(info->partitions[i].name, info->last_sysupgrade_partition)) {
3559 flash_last_partition = &info->partitions[i];
3560 flash_last_partition_index = i;
3561 }
3562 }
3563
3564 assert(flash_first_partition && flash_last_partition);
3565 assert(flash_first_partition_index < flash_last_partition_index);
3566
3567 /** Find last partition from image to calculate needed size */
3568 for (i = 0; image_parts[i].name; i++) {
3569 if (!strcmp(image_parts[i].name, info->last_sysupgrade_partition)) {
3570 image_last_partition = &image_parts[i];
3571 break;
3572 }
3573 }
3574
3575 assert(image_last_partition);
3576
3577 *len = flash_last_partition->base - flash_first_partition->base + image_last_partition->size;
3578
3579 uint8_t *image = malloc(*len);
3580 if (!image)
3581 error(1, errno, "malloc");
3582
3583 memset(image, 0xff, *len);
3584
3585 for (i = flash_first_partition_index; i <= flash_last_partition_index; i++) {
3586 for (j = 0; image_parts[j].name; j++) {
3587 if (!strcmp(info->partitions[i].name, image_parts[j].name)) {
3588 if (image_parts[j].size > info->partitions[i].size)
3589 error(1, 0, "%s partition too big (more than %u bytes)", info->partitions[i].name, (unsigned)info->partitions[i].size);
3590 memcpy(image + info->partitions[i].base - flash_first_partition->base, image_parts[j].data, image_parts[j].size);
3591 break;
3592 }
3593
3594 assert(image_parts[j].name);
3595 }
3596 }
3597
3598 return image;
3599 }
3600
3601 /** Generates an image according to a given layout and writes it to a file */
3602 static void build_image(const char *output,
3603 const char *kernel_image,
3604 const char *rootfs_image,
3605 uint32_t rev,
3606 bool add_jffs2_eof,
3607 bool sysupgrade,
3608 struct device_info *info) {
3609
3610 size_t i;
3611
3612 struct image_partition_entry parts[7] = {};
3613
3614 struct flash_partition_entry *firmware_partition = NULL;
3615 struct flash_partition_entry *os_image_partition = NULL;
3616 struct flash_partition_entry *file_system_partition = NULL;
3617 size_t firmware_partition_index = 0;
3618
3619 set_partition_names(info);
3620
3621 for (i = 0; info->partitions[i].name; i++) {
3622 if (!strcmp(info->partitions[i].name, "firmware"))
3623 {
3624 firmware_partition = &info->partitions[i];
3625 firmware_partition_index = i;
3626 }
3627 }
3628
3629 if (firmware_partition)
3630 {
3631 os_image_partition = &info->partitions[firmware_partition_index];
3632 file_system_partition = &info->partitions[firmware_partition_index + 1];
3633
3634 struct stat kernel;
3635 if (stat(kernel_image, &kernel) < 0)
3636 error(1, errno, "unable to stat file `%s'", kernel_image);
3637
3638 if (kernel.st_size > firmware_partition->size)
3639 error(1, 0, "kernel overflowed firmware partition\n");
3640
3641 for (i = MAX_PARTITIONS-1; i >= firmware_partition_index + 1; i--)
3642 info->partitions[i+1] = info->partitions[i];
3643
3644 file_system_partition->name = info->partition_names.file_system;
3645
3646 file_system_partition->base = firmware_partition->base + kernel.st_size;
3647
3648 /* Align partition start to erase blocks for factory images only */
3649 if (!sysupgrade)
3650 file_system_partition->base = ALIGN(firmware_partition->base + kernel.st_size, 0x10000);
3651
3652 file_system_partition->size = firmware_partition->size - file_system_partition->base;
3653
3654 os_image_partition->name = info->partition_names.os_image;
3655
3656 os_image_partition->size = kernel.st_size;
3657 }
3658
3659 parts[0] = make_partition_table(info);
3660 parts[1] = make_soft_version(info, rev);
3661 parts[2] = make_support_list(info);
3662 parts[3] = read_file(info->partition_names.os_image, kernel_image, false, NULL);
3663 parts[4] = read_file(info->partition_names.file_system, rootfs_image, add_jffs2_eof, file_system_partition);
3664
3665
3666 /* Some devices need the extra-para partition to accept the firmware */
3667 if (strcasecmp(info->id, "ARCHER-A6-V3") == 0 ||
3668 strcasecmp(info->id, "ARCHER-A7-V5") == 0 ||
3669 strcasecmp(info->id, "ARCHER-A9-V6") == 0 ||
3670 strcasecmp(info->id, "ARCHER-AX23-V1") == 0 ||
3671 strcasecmp(info->id, "ARCHER-C2-V3") == 0 ||
3672 strcasecmp(info->id, "ARCHER-C7-V4") == 0 ||
3673 strcasecmp(info->id, "ARCHER-C7-V5") == 0 ||
3674 strcasecmp(info->id, "ARCHER-C25-V1") == 0 ||
3675 strcasecmp(info->id, "ARCHER-C59-V2") == 0 ||
3676 strcasecmp(info->id, "ARCHER-C60-V2") == 0 ||
3677 strcasecmp(info->id, "ARCHER-C60-V3") == 0 ||
3678 strcasecmp(info->id, "ARCHER-C6U-V1") == 0 ||
3679 strcasecmp(info->id, "ARCHER-C6-V3") == 0 ||
3680 strcasecmp(info->id, "DECO-M4R-V4") == 0 ||
3681 strcasecmp(info->id, "MR70X") == 0 ||
3682 strcasecmp(info->id, "TLWR1043NV5") == 0) {
3683 const uint8_t extra_para[2] = {0x01, 0x00};
3684 parts[5] = make_extra_para(info, extra_para,
3685 sizeof(extra_para));
3686 } else if (strcasecmp(info->id, "ARCHER-C6-V2") == 0 ||
3687 strcasecmp(info->id, "TL-WA1201-V2") == 0) {
3688 const uint8_t extra_para[2] = {0x00, 0x01};
3689 parts[5] = make_extra_para(info, extra_para,
3690 sizeof(extra_para));
3691 } else if (strcasecmp(info->id, "ARCHER-C6-V2-US") == 0 ||
3692 strcasecmp(info->id, "EAP245-V3") == 0) {
3693 const uint8_t extra_para[2] = {0x01, 0x01};
3694 parts[5] = make_extra_para(info, extra_para,
3695 sizeof(extra_para));
3696 }
3697
3698 size_t len;
3699 void *image;
3700 if (sysupgrade)
3701 image = generate_sysupgrade_image(info, parts, &len);
3702 else
3703 image = generate_factory_image(info, parts, &len);
3704
3705 FILE *file = fopen(output, "wb");
3706 if (!file)
3707 error(1, errno, "unable to open output file");
3708
3709 if (fwrite(image, len, 1, file) != 1)
3710 error(1, 0, "unable to write output file");
3711
3712 fclose(file);
3713
3714 free(image);
3715
3716 for (i = 0; parts[i].name; i++)
3717 free_image_partition(&parts[i]);
3718 }
3719
3720 /** Usage output */
3721 static void usage(const char *argv0) {
3722 fprintf(stderr,
3723 "Usage: %s [OPTIONS...]\n"
3724 "\n"
3725 "Options:\n"
3726 " -h show this help\n"
3727 "\n"
3728 "Info about an image:\n"
3729 " -i <file> input file to read from\n"
3730 "Create a new image:\n"
3731 " -B <board> create image for the board specified with <board>\n"
3732 " -k <file> read kernel image from the file <file>\n"
3733 " -r <file> read rootfs image from the file <file>\n"
3734 " -o <file> write output to the file <file>\n"
3735 " -V <rev> sets the revision number to <rev>\n"
3736 " -j add jffs2 end-of-filesystem markers\n"
3737 " -S create sysupgrade instead of factory image\n"
3738 "Extract an old image:\n"
3739 " -x <file> extract all oem firmware partition\n"
3740 " -d <dir> destination to extract the firmware partition\n"
3741 " -z <file> convert an oem firmware into a sysupgade file. Use -o for output file\n",
3742 argv0
3743 );
3744 };
3745
3746
3747 static struct device_info *find_board(const char *id)
3748 {
3749 struct device_info *board = NULL;
3750
3751 for (board = boards; board->id != NULL; board++)
3752 if (strcasecmp(id, board->id) == 0)
3753 return board;
3754
3755 return NULL;
3756 }
3757
3758 static int add_flash_partition(
3759 struct flash_partition_entry *part_list,
3760 size_t max_entries,
3761 const char *name,
3762 unsigned long base,
3763 unsigned long size)
3764 {
3765 size_t ptr;
3766 /* check if the list has a free entry */
3767 for (ptr = 0; ptr < max_entries; ptr++, part_list++) {
3768 if (part_list->name == NULL &&
3769 part_list->base == 0 &&
3770 part_list->size == 0)
3771 break;
3772 }
3773
3774 if (ptr == max_entries) {
3775 error(1, 0, "No free flash part entry available.");
3776 }
3777
3778 part_list->name = calloc(1, strlen(name) + 1);
3779 if (!part_list->name) {
3780 error(1, 0, "Unable to allocate memory");
3781 }
3782
3783 memcpy((char *)part_list->name, name, strlen(name));
3784 part_list->base = base;
3785 part_list->size = size;
3786
3787 return 0;
3788 }
3789
3790 /** read the partition table into struct flash_partition_entry */
3791 enum PARTITION_TABLE_TYPE {
3792 PARTITION_TABLE_FWUP,
3793 PARTITION_TABLE_FLASH,
3794 };
3795
3796 static int read_partition_table(
3797 FILE *file, long offset,
3798 struct flash_partition_entry *entries, size_t max_entries,
3799 int type)
3800 {
3801 char buf[SAFELOADER_PAYLOAD_TABLE_SIZE];
3802 char *ptr, *end;
3803 const char *parthdr = NULL;
3804 const char *fwuphdr = "fwup-ptn";
3805 const char *flashhdr = "partition";
3806
3807 /* TODO: search for the partition table */
3808
3809 switch(type) {
3810 case PARTITION_TABLE_FWUP:
3811 parthdr = fwuphdr;
3812 break;
3813 case PARTITION_TABLE_FLASH:
3814 parthdr = flashhdr;
3815 break;
3816 default:
3817 error(1, 0, "Invalid partition table");
3818 }
3819
3820 if (fseek(file, offset, SEEK_SET) < 0)
3821 error(1, errno, "Can not seek in the firmware");
3822
3823 if (fread(buf, sizeof(buf), 1, file) != 1)
3824 error(1, errno, "Can not read fwup-ptn from the firmware");
3825
3826 buf[sizeof(buf) - 1] = '\0';
3827
3828 /* look for the partition header */
3829 if (memcmp(buf, parthdr, strlen(parthdr)) != 0) {
3830 fprintf(stderr, "DEBUG: can not find fwuphdr\n");
3831 return 1;
3832 }
3833
3834 ptr = buf;
3835 end = buf + sizeof(buf);
3836 while ((ptr + strlen(parthdr)) < end &&
3837 memcmp(ptr, parthdr, strlen(parthdr)) == 0) {
3838 char *end_part;
3839 char *end_element;
3840
3841 char name[32] = { 0 };
3842 int name_len = 0;
3843 unsigned long base = 0;
3844 unsigned long size = 0;
3845
3846 end_part = memchr(ptr, '\n', (end - ptr));
3847 if (end_part == NULL) {
3848 /* in theory this should never happen, because a partition always ends with 0x09, 0x0D, 0x0A */
3849 break;
3850 }
3851
3852 for (int i = 0; i <= 4; i++) {
3853 if (end_part <= ptr)
3854 break;
3855
3856 end_element = memchr(ptr, 0x20, (end_part - ptr));
3857 if (end_element == NULL) {
3858 error(1, errno, "Ignoring the rest of the partition entries.");
3859 break;
3860 }
3861
3862 switch (i) {
3863 /* partition header */
3864 case 0:
3865 ptr = end_element + 1;
3866 continue;
3867 /* name */
3868 case 1:
3869 name_len = (end_element - ptr) > 31 ? 31 : (end_element - ptr);
3870 strncpy(name, ptr, name_len);
3871 name[name_len] = '\0';
3872 ptr = end_element + 1;
3873 continue;
3874
3875 /* string "base" */
3876 case 2:
3877 ptr = end_element + 1;
3878 continue;
3879
3880 /* actual base */
3881 case 3:
3882 base = strtoul(ptr, NULL, 16);
3883 ptr = end_element + 1;
3884 continue;
3885
3886 /* string "size" */
3887 case 4:
3888 ptr = end_element + 1;
3889 /* actual size. The last element doesn't have a sepeartor */
3890 size = strtoul(ptr, NULL, 16);
3891 /* the part ends with 0x09, 0x0d, 0x0a */
3892 ptr = end_part + 1;
3893 add_flash_partition(entries, max_entries, name, base, size);
3894 continue;
3895 }
3896 }
3897 }
3898
3899 return 0;
3900 }
3901
3902 static void safeloader_read_partition(FILE *input_file, size_t payload_offset,
3903 struct flash_partition_entry *entry,
3904 struct image_partition_entry *part)
3905 {
3906 size_t part_size = entry->size;
3907 void *part_data = malloc(part_size);
3908
3909 if (fseek(input_file, payload_offset, SEEK_SET))
3910 error(1, errno, "Failed to seek to partition data");
3911
3912 if (!part_data)
3913 error(1, ENOMEM, "Failed to allocate partition data");
3914
3915 if (fread(part_data, 1, part_size, input_file) < part_size)
3916 error(1, errno, "Failed to read partition data");
3917
3918 part->data = part_data;
3919 part->size = part_size;
3920 part->name = entry->name;
3921 }
3922
3923 static void safeloader_parse_image(FILE *input_file, struct safeloader_image_info *image)
3924 {
3925 static const char *HEADER_ID_CLOUD = "fw-type:Cloud";
3926 static const char *HEADER_ID_QNEW = "?NEW";
3927
3928 char buf[64];
3929
3930 if (!input_file)
3931 return;
3932
3933 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
3934
3935 if (fread(buf, sizeof(buf), 1, input_file) != 1)
3936 error(1, errno, "Can not read image header");
3937
3938 if (memcmp(HEADER_ID_QNEW, &buf[0], strlen(HEADER_ID_QNEW)) == 0)
3939 image->type = SAFELOADER_TYPE_QNEW;
3940 else if (memcmp(HEADER_ID_CLOUD, &buf[0], strlen(HEADER_ID_CLOUD)) == 0)
3941 image->type = SAFELOADER_TYPE_CLOUD;
3942 else if (ntohl(*((uint32_t *) &buf[0])) <= SAFELOADER_HEADER_SIZE)
3943 image->type = SAFELOADER_TYPE_VENDOR;
3944 else
3945 image->type = SAFELOADER_TYPE_DEFAULT;
3946
3947 switch (image->type) {
3948 case SAFELOADER_TYPE_DEFAULT:
3949 case SAFELOADER_TYPE_VENDOR:
3950 case SAFELOADER_TYPE_CLOUD:
3951 image->payload_offset = SAFELOADER_PAYLOAD_OFFSET;
3952 break;
3953 case SAFELOADER_TYPE_QNEW:
3954 image->payload_offset = SAFELOADER_QNEW_PAYLOAD_OFFSET;
3955 break;
3956 }
3957
3958 /* Parse image partition table */
3959 read_partition_table(input_file, image->payload_offset, &image->entries[0],
3960 MAX_PARTITIONS, PARTITION_TABLE_FWUP);
3961 }
3962
3963 static void write_partition(
3964 FILE *input_file,
3965 size_t firmware_offset,
3966 struct flash_partition_entry *entry,
3967 FILE *output_file)
3968 {
3969 char buf[4096];
3970 size_t offset;
3971
3972 fseek(input_file, entry->base + firmware_offset, SEEK_SET);
3973
3974 for (offset = 0; sizeof(buf) + offset <= entry->size; offset += sizeof(buf)) {
3975 if (fread(buf, sizeof(buf), 1, input_file) != 1)
3976 error(1, errno, "Can not read partition from input_file");
3977
3978 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
3979 error(1, errno, "Can not write partition to output_file");
3980 }
3981 /* write last chunk smaller than buffer */
3982 if (offset < entry->size) {
3983 offset = entry->size - offset;
3984 if (fread(buf, offset, 1, input_file) != 1)
3985 error(1, errno, "Can not read partition from input_file");
3986 if (fwrite(buf, offset, 1, output_file) != 1)
3987 error(1, errno, "Can not write partition to output_file");
3988 }
3989 }
3990
3991 static int extract_firmware_partition(FILE *input_file, size_t firmware_offset, struct flash_partition_entry *entry, const char *output_directory)
3992 {
3993 FILE *output_file;
3994 char output[PATH_MAX];
3995
3996 snprintf(output, PATH_MAX, "%s/%s", output_directory, entry->name);
3997 output_file = fopen(output, "wb+");
3998 if (output_file == NULL) {
3999 error(1, errno, "Can not open output file %s", output);
4000 }
4001
4002 write_partition(input_file, firmware_offset, entry, output_file);
4003
4004 fclose(output_file);
4005
4006 return 0;
4007 }
4008
4009 /** extract all partitions from the firmware file */
4010 static int extract_firmware(const char *input, const char *output_directory)
4011 {
4012 struct safeloader_image_info info = {};
4013 struct stat statbuf;
4014 FILE *input_file;
4015
4016 /* check input file */
4017 if (stat(input, &statbuf)) {
4018 error(1, errno, "Can not read input firmware %s", input);
4019 }
4020
4021 /* check if output directory exists */
4022 if (stat(output_directory, &statbuf)) {
4023 error(1, errno, "Failed to stat output directory %s", output_directory);
4024 }
4025
4026 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
4027 error(1, errno, "Given output directory is not a directory %s", output_directory);
4028 }
4029
4030 input_file = fopen(input, "rb");
4031 safeloader_parse_image(input_file, &info);
4032
4033 for (size_t i = 0; i < MAX_PARTITIONS && info.entries[i].name; i++)
4034 extract_firmware_partition(input_file, info.payload_offset, &info.entries[i], output_directory);
4035
4036 return 0;
4037 }
4038
4039 static struct flash_partition_entry *find_partition(
4040 struct flash_partition_entry *entries, size_t max_entries,
4041 const char *name, const char *error_msg)
4042 {
4043 for (size_t i = 0; i < max_entries; i++, entries++) {
4044 if (strcmp(entries->name, name) == 0)
4045 return entries;
4046 }
4047
4048 if (error_msg) {
4049 error(1, 0, "%s", error_msg);
4050 }
4051
4052 return NULL;
4053 }
4054
4055 static int firmware_info(const char *input)
4056 {
4057 struct safeloader_image_info info = {};
4058 struct image_partition_entry part = {};
4059 struct flash_partition_entry *e;
4060 FILE *input_file;
4061
4062 input_file = fopen(input, "rb");
4063
4064 safeloader_parse_image(input_file, &info);
4065
4066 if (info.type == SAFELOADER_TYPE_VENDOR) {
4067 char buf[SAFELOADER_HEADER_SIZE] = {};
4068 uint32_t vendor_size;
4069
4070 fseek(input_file, SAFELOADER_PREAMBLE_SIZE, SEEK_SET);
4071 fread(&vendor_size, sizeof(uint32_t), 1, input_file);
4072
4073 vendor_size = ntohl(vendor_size);
4074 fread(buf, vendor_size, 1, input_file);
4075
4076 printf("Firmware vendor string:\n");
4077 fwrite(buf, strnlen(buf, vendor_size), 1, stdout);
4078 printf("\n");
4079 }
4080
4081 printf("Firmware image partitions:\n");
4082 printf("%-8s %-8s %s\n", "base", "size", "name");
4083
4084 e = &info.entries[0];
4085 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4086 printf("%08x %08x %s\n", e->base, e->size, e->name);
4087
4088 e = find_partition(&info.entries[0], MAX_PARTITIONS, "soft-version", NULL);
4089 if (e) {
4090 struct soft_version *s;
4091 unsigned int ascii_len;
4092 const uint8_t *buf;
4093 size_t data_len;
4094 bool isstr;
4095
4096 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4097 data_len = ntohl(((struct meta_header *) part.data)->length);
4098 buf = part.data + sizeof(struct meta_header);
4099
4100 /* Check for (null-terminated) string */
4101 ascii_len = 0;
4102 while (ascii_len < data_len && isascii(buf[ascii_len]))
4103 ascii_len++;
4104
4105 isstr = ascii_len == data_len;
4106
4107 printf("\n[Software version]\n");
4108 if (isstr) {
4109 fwrite(buf, strnlen((const char *) buf, data_len), 1, stdout);
4110 putchar('\n');
4111 } else if (data_len >= offsetof(struct soft_version, rev)) {
4112 s = (struct soft_version *) buf;
4113
4114 printf("Version: %d.%d.%d\n", s->version_major, s->version_minor, s->version_patch);
4115 printf("Date: %02x%02x-%02x-%02x\n", s->year_hi, s->year_lo, s->month, s->day);
4116 printf("Revision: %d\n", ntohl(s->rev));
4117 } else {
4118 printf("Failed to parse data\n");
4119 }
4120
4121 free_image_partition(&part);
4122 }
4123
4124 e = find_partition(&info.entries[0], MAX_PARTITIONS, "support-list", NULL);
4125 if (e) {
4126 size_t data_len;
4127
4128 safeloader_read_partition(input_file, info.payload_offset + e->base, e, &part);
4129 data_len = ntohl(((struct meta_header *) part.data)->length);
4130
4131 printf("\n[Support list]\n");
4132 fwrite(part.data + sizeof(struct meta_header), data_len, 1, stdout);
4133 printf("\n");
4134
4135 free_image_partition(&part);
4136 }
4137
4138 e = find_partition(&info.entries[0], MAX_PARTITIONS, "partition-table", NULL);
4139 if (e) {
4140 size_t flash_table_offset = info.payload_offset + e->base + 4;
4141 struct flash_partition_entry parts[MAX_PARTITIONS] = {};
4142
4143 if (read_partition_table(input_file, flash_table_offset, parts, MAX_PARTITIONS, PARTITION_TABLE_FLASH))
4144 error(1, 0, "Error can not read the partition table (partition)");
4145
4146 printf("\n[Partition table]\n");
4147 printf("%-8s %-8s %s\n", "base", "size", "name");
4148
4149 e = &parts[0];
4150 for (unsigned int i = 0; i < MAX_PARTITIONS && e->name; i++, e++)
4151 printf("%08x %08x %s\n", e->base, e->size, e->name);
4152 }
4153
4154 fclose(input_file);
4155
4156 return 0;
4157 }
4158
4159 static void write_ff(FILE *output_file, size_t size)
4160 {
4161 char buf[4096];
4162 size_t offset;
4163
4164 memset(buf, 0xff, sizeof(buf));
4165
4166 for (offset = 0; offset + sizeof(buf) < size ; offset += sizeof(buf)) {
4167 if (fwrite(buf, sizeof(buf), 1, output_file) != 1)
4168 error(1, errno, "Can not write 0xff to output_file");
4169 }
4170
4171 /* write last chunk smaller than buffer */
4172 if (offset < size) {
4173 offset = size - offset;
4174 if (fwrite(buf, offset, 1, output_file) != 1)
4175 error(1, errno, "Can not write partition to output_file");
4176 }
4177 }
4178
4179 static void convert_firmware(const char *input, const char *output)
4180 {
4181 struct flash_partition_entry flash[MAX_PARTITIONS] = {};
4182 struct flash_partition_entry *fwup_partition_table;
4183 struct flash_partition_entry *flash_file_system;
4184 struct flash_partition_entry *fwup_file_system;
4185 struct flash_partition_entry *flash_os_image;
4186 struct flash_partition_entry *fwup_os_image;
4187 struct safeloader_image_info info = {};
4188 size_t flash_table_offset;
4189 struct stat statbuf;
4190 FILE *output_file;
4191 FILE *input_file;
4192
4193 /* check input file */
4194 if (stat(input, &statbuf)) {
4195 error(1, errno, "Can not read input firmware %s", input);
4196 }
4197
4198 input_file = fopen(input, "rb");
4199 if (!input_file)
4200 error(1, 0, "Can not open input firmware %s", input);
4201
4202 output_file = fopen(output, "wb");
4203 if (!output_file)
4204 error(1, 0, "Can not open output firmware %s", output);
4205
4206 input_file = fopen(input, "rb");
4207 safeloader_parse_image(input_file, &info);
4208
4209 fwup_os_image = find_partition(info.entries, MAX_PARTITIONS,
4210 "os-image", "Error can not find os-image partition (fwup)");
4211 fwup_file_system = find_partition(info.entries, MAX_PARTITIONS,
4212 "file-system", "Error can not find file-system partition (fwup)");
4213 fwup_partition_table = find_partition(info.entries, MAX_PARTITIONS,
4214 "partition-table", "Error can not find partition-table partition");
4215
4216 /* the flash partition table has a 0x00000004 magic haeder */
4217 flash_table_offset = info.payload_offset + fwup_partition_table->base + 4;
4218 if (read_partition_table(input_file, flash_table_offset, flash, MAX_PARTITIONS, PARTITION_TABLE_FLASH) != 0)
4219 error(1, 0, "Error can not read the partition table (flash)");
4220
4221 flash_os_image = find_partition(flash, MAX_PARTITIONS,
4222 "os-image", "Error can not find os-image partition (flash)");
4223 flash_file_system = find_partition(flash, MAX_PARTITIONS,
4224 "file-system", "Error can not find file-system partition (flash)");
4225
4226 /* write os_image to 0x0 */
4227 write_partition(input_file, info.payload_offset, fwup_os_image, output_file);
4228 write_ff(output_file, flash_os_image->size - fwup_os_image->size);
4229
4230 /* write file-system behind os_image */
4231 fseek(output_file, flash_file_system->base - flash_os_image->base, SEEK_SET);
4232 write_partition(input_file, info.payload_offset, fwup_file_system, output_file);
4233
4234 fclose(output_file);
4235 fclose(input_file);
4236 }
4237
4238 int main(int argc, char *argv[]) {
4239 const char *info_image = NULL, *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
4240 const char *extract_image = NULL, *output_directory = NULL, *convert_image = NULL;
4241 bool add_jffs2_eof = false, sysupgrade = false;
4242 unsigned rev = 0;
4243 struct device_info *info;
4244 set_source_date_epoch();
4245
4246 while (true) {
4247 int c;
4248
4249 c = getopt(argc, argv, "i:B:k:r:o:V:jSh:x:d:z:");
4250 if (c == -1)
4251 break;
4252
4253 switch (c) {
4254 case 'i':
4255 info_image = optarg;
4256 break;
4257
4258 case 'B':
4259 board = optarg;
4260 break;
4261
4262 case 'k':
4263 kernel_image = optarg;
4264 break;
4265
4266 case 'r':
4267 rootfs_image = optarg;
4268 break;
4269
4270 case 'o':
4271 output = optarg;
4272 break;
4273
4274 case 'V':
4275 sscanf(optarg, "r%u", &rev);
4276 break;
4277
4278 case 'j':
4279 add_jffs2_eof = true;
4280 break;
4281
4282 case 'S':
4283 sysupgrade = true;
4284 break;
4285
4286 case 'h':
4287 usage(argv[0]);
4288 return 0;
4289
4290 case 'd':
4291 output_directory = optarg;
4292 break;
4293
4294 case 'x':
4295 extract_image = optarg;
4296 break;
4297
4298 case 'z':
4299 convert_image = optarg;
4300 break;
4301
4302 default:
4303 usage(argv[0]);
4304 return 1;
4305 }
4306 }
4307
4308 if (info_image) {
4309 firmware_info(info_image);
4310 } else if (extract_image || output_directory) {
4311 if (!extract_image)
4312 error(1, 0, "No factory/oem image given via -x <file>. Output directory is only valid with -x");
4313 if (!output_directory)
4314 error(1, 0, "Can not extract an image without output directory. Use -d <dir>");
4315 extract_firmware(extract_image, output_directory);
4316 } else if (convert_image) {
4317 if (!output)
4318 error(1, 0, "Can not convert a factory/oem image into sysupgrade image without output file. Use -o <file>");
4319 convert_firmware(convert_image, output);
4320 } else {
4321 if (!board)
4322 error(1, 0, "no board has been specified");
4323 if (!kernel_image)
4324 error(1, 0, "no kernel image has been specified");
4325 if (!rootfs_image)
4326 error(1, 0, "no rootfs image has been specified");
4327 if (!output)
4328 error(1, 0, "no output filename has been specified");
4329
4330 info = find_board(board);
4331
4332 if (info == NULL)
4333 error(1, 0, "unsupported board %s", board);
4334
4335 build_image(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade, info);
4336 }
4337
4338 return 0;
4339 }