123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570 |
- From: Matthias Schiffer <mschiffer@universe-factory.net>
- Date: Wed, 26 Nov 2014 19:57:39 +0100
- Subject: firmware-utils: add new tool tplink-safeloader for the new TP-LINK Pharos devices (CPE210/220/510/520)
- The new TP-LINK Pharos series uses a new bootloader, the "TP-LINK Safeloader".
- It uses an advanced firmware image format, containing an image partition table
- and a flash partition table (and image partitions are mapped to the
- corresponding flash partitions). The exact image format is documented in the
- source code.
- Furthermore, the bootloader expects the kernel image as an ELF executable.
- Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
- diff --git a/tools/firmware-utils/Makefile b/tools/firmware-utils/Makefile
- index 4bb53cb..3f9eb56 100644
- --- a/tools/firmware-utils/Makefile
- +++ b/tools/firmware-utils/Makefile
- @@ -41,6 +41,7 @@ define Host/Compile
- $(call cc,mkplanexfw sha1)
- $(call cc,mktplinkfw md5)
- $(call cc,mktplinkfw2 md5)
- + $(call cc,tplink-safeloader md5, -Wall)
- $(call cc,pc1crypt)
- $(call cc,osbridge-crc)
- $(call cc,wrt400n cyg_crc32)
- diff --git a/tools/firmware-utils/src/tplink-safeloader.c b/tools/firmware-utils/src/tplink-safeloader.c
- new file mode 100644
- index 0000000..23d703f
- --- /dev/null
- +++ b/tools/firmware-utils/src/tplink-safeloader.c
- @@ -0,0 +1,538 @@
- +/*
- + Copyright (c) 2014, Matthias Schiffer <mschiffer@universe-factory.net>
- + All rights reserved.
- +
- + Redistribution and use in source and binary forms, with or without
- + modification, are permitted provided that the following conditions are met:
- +
- + 1. Redistributions of source code must retain the above copyright notice,
- + this list of conditions and the following disclaimer.
- + 2. Redistributions in binary form must reproduce the above copyright notice,
- + this list of conditions and the following disclaimer in the documentation
- + and/or other materials provided with the distribution.
- +
- + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
- + DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
- + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
- + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
- + CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- +*/
- +
- +
- +/*
- + tplink-safeloader
- +
- + Image generation tool for the TP-LINK SafeLoader as seen on
- + TP-LINK Pharos devices (CPE210/220/510/520)
- +*/
- +
- +
- +#include <assert.h>
- +#include <errno.h>
- +#include <error.h>
- +#include <stdbool.h>
- +#include <stdio.h>
- +#include <stdint.h>
- +#include <stdlib.h>
- +#include <string.h>
- +#include <time.h>
- +#include <unistd.h>
- +
- +#include <arpa/inet.h>
- +
- +#include <sys/types.h>
- +#include <sys/stat.h>
- +
- +#include "md5.h"
- +
- +
- +#define ALIGN(x,a) ({ typeof(a) __a = (a); (((x) + __a - 1) & ~(__a - 1)); })
- +
- +
- +/** An image partition table entry */
- +struct image_partition_entry {
- + const char *name;
- + size_t size;
- + uint8_t *data;
- +};
- +
- +/** A flash partition table entry */
- +struct flash_partition_entry {
- + const char *name;
- + uint32_t base;
- + uint32_t size;
- +};
- +
- +
- +/** The content of the soft-version structure */
- +struct __attribute__((__packed__)) soft_version {
- + uint32_t magic;
- + uint32_t zero;
- + uint8_t pad1;
- + uint8_t version_major;
- + uint8_t version_minor;
- + uint8_t version_patch;
- + uint8_t year_hi;
- + uint8_t year_lo;
- + uint8_t month;
- + uint8_t day;
- + uint32_t rev;
- + uint8_t pad2;
- +};
- +
- +
- +static const uint8_t jffs2_eof_mark[4] = {0xde, 0xad, 0xc0, 0xde};
- +
- +
- +/**
- + Salt for the MD5 hash
- +
- + Fortunately, TP-LINK seems to use the same salt for most devices which use
- + the new image format.
- +*/
- +static const uint8_t md5_salt[16] = {
- + 0x7a, 0x2b, 0x15, 0xed,
- + 0x9b, 0x98, 0x59, 0x6d,
- + 0xe5, 0x04, 0xab, 0x44,
- + 0xac, 0x2a, 0x9f, 0x4e,
- +};
- +
- +
- +/** Vendor information for CPE210/220/510/520 */
- +static const unsigned char cpe510_vendor[] = "\x00\x00\x00\x1f""CPE510(TP-LINK|UN|N300-5):1.0\r\n";
- +
- +
- +/**
- + The flash partition table for CPE210/220/510/520;
- + it is the same as the one used by the stock images.
- +*/
- +static const struct flash_partition_entry cpe510_partitions[] = {
- + {"fs-uboot", 0x00000, 0x20000},
- + {"partition-table", 0x20000, 0x02000},
- + {"default-mac", 0x30000, 0x00020},
- + {"product-info", 0x31100, 0x00100},
- + {"signature", 0x32000, 0x00400},
- + {"os-image", 0x40000, 0x170000},
- + {"soft-version", 0x1b0000, 0x00100},
- + {"support-list", 0x1b1000, 0x00400},
- + {"file-system", 0x1c0000, 0x600000},
- + {"user-config", 0x7c0000, 0x10000},
- + {"default-config", 0x7d0000, 0x10000},
- + {"log", 0x7e0000, 0x10000},
- + {"radio", 0x7f0000, 0x10000},
- + {NULL, 0, 0}
- +};
- +
- +/**
- + The support list for CPE210/220/510/520
- +
- + The stock images also contain strings for two more devices: BS510 and BS210.
- + At the moment, there exists no public information about these devices.
- +*/
- +static const unsigned char cpe510_support_list[] =
- + "\x00\x00\x00\xc8\x00\x00\x00\x00"
- + "SupportList:\r\n"
- + "CPE510(TP-LINK|UN|N300-5):1.0\r\n"
- + "CPE520(TP-LINK|UN|N300-5):1.0\r\n"
- + "CPE210(TP-LINK|UN|N300-2):1.0\r\n"
- + "CPE220(TP-LINK|UN|N300-2):1.0\r\n"
- + "\r\n\xff";
- +
- +
- +/** Allocates a new image partition */
- +struct image_partition_entry alloc_image_partition(const char *name, size_t len) {
- + struct image_partition_entry entry = {name, len, malloc(len)};
- + if (!entry.data)
- + error(1, errno, "malloc");
- +
- + return entry;
- +}
- +
- +/** Frees an image partition */
- +void free_image_partition(struct image_partition_entry entry) {
- + free(entry.data);
- +}
- +
- +/** Generates the partition-table partition */
- +struct image_partition_entry make_partition_table(const struct flash_partition_entry *p) {
- + struct image_partition_entry entry = alloc_image_partition("partition-table", 0x800);
- +
- + char *s = (char *)entry.data, *end = (char *)(s+entry.size);
- +
- + *(s++) = 0x00;
- + *(s++) = 0x04;
- + *(s++) = 0x00;
- + *(s++) = 0x00;
- +
- + size_t i;
- + for (i = 0; p[i].name; i++) {
- + size_t len = end-s;
- + size_t w = snprintf(s, len, "partition %s base 0x%05x size 0x%05x\n", p[i].name, p[i].base, p[i].size);
- +
- + if (w > len-1)
- + error(1, 0, "flash partition table overflow?");
- +
- + s += w;
- + }
- +
- + s++;
- +
- + memset(s, 0xff, end-s);
- +
- + return entry;
- +}
- +
- +
- +/** Generates a binary-coded decimal representation of an integer in the range [0, 99] */
- +static inline uint8_t bcd(uint8_t v) {
- + return 0x10 * (v/10) + v%10;
- +}
- +
- +
- +/** Generates the soft-version partition */
- +struct image_partition_entry make_soft_version(uint32_t rev) {
- + struct image_partition_entry entry = alloc_image_partition("soft-version", sizeof(struct soft_version));
- + struct soft_version *s = (struct soft_version *)entry.data;
- +
- + time_t t;
- + if (time(&t) == (time_t)(-1))
- + error(1, errno, "time");
- +
- + struct tm *tm = localtime(&t);
- +
- + s->magic = htonl(0x0000000c);
- + s->zero = 0;
- + s->pad1 = 0xff;
- +
- + s->version_major = 0;
- + s->version_minor = 0;
- + s->version_patch = 0;
- +
- + s->year_hi = bcd((1900+tm->tm_year)/100);
- + s->year_lo = bcd(tm->tm_year%100);
- + s->month = bcd(tm->tm_mon+1);
- + s->day = bcd(tm->tm_mday);
- + s->rev = htonl(rev);
- +
- + s->pad2 = 0xff;
- +
- + return entry;
- +}
- +
- +/** Generates the support-list partition */
- +struct image_partition_entry make_support_list(const unsigned char *support_list, size_t len) {
- + struct image_partition_entry entry = alloc_image_partition("support-list", len);
- + memcpy(entry.data, support_list, len);
- + return entry;
- +}
- +
- +/** Creates a new image partition with an arbitrary name from a file */
- +struct image_partition_entry read_file(const char *part_name, const char *filename, bool add_jffs2_eof) {
- + struct stat statbuf;
- +
- + if (stat(filename, &statbuf) < 0)
- + error(1, errno, "unable to stat file `%s'", filename);
- +
- + size_t len = statbuf.st_size;
- +
- + if (add_jffs2_eof)
- + len = ALIGN(len, 0x10000) + sizeof(jffs2_eof_mark);
- +
- + struct image_partition_entry entry = alloc_image_partition(part_name, len);
- +
- + FILE *file = fopen(filename, "rb");
- + if (!file)
- + error(1, errno, "unable to open file `%s'", filename);
- +
- + if (fread(entry.data, statbuf.st_size, 1, file) != 1)
- + error(1, errno, "unable to read file `%s'", filename);
- +
- + if (add_jffs2_eof) {
- + uint8_t *eof = entry.data + statbuf.st_size, *end = entry.data+entry.size;
- +
- + memset(eof, 0xff, end - eof - sizeof(jffs2_eof_mark));
- + memcpy(end - sizeof(jffs2_eof_mark), jffs2_eof_mark, sizeof(jffs2_eof_mark));
- + }
- +
- + fclose(file);
- +
- + return entry;
- +}
- +
- +
- +/**
- + Copies a list of image partitions into an image buffer and generates the image partition table while doing so
- +
- + Example image partition table:
- +
- + fwup-ptn partition-table base 0x00800 size 0x00800
- + fwup-ptn os-image base 0x01000 size 0x113b45
- + fwup-ptn file-system base 0x114b45 size 0x1d0004
- + fwup-ptn support-list base 0x2e4b49 size 0x000d1
- +
- + Each line of the partition table is terminated with the bytes 09 0d 0a ("\t\r\n"),
- + the end of the partition table is marked with a zero byte.
- +
- + The firmware image must contain at least the partition-table and support-list partitions
- + to be accepted. There aren't any alignment constraints for the image partitions.
- +
- + The partition-table partition contains the actual flash layout; partitions
- + from the image partition table are mapped to the corresponding flash partitions during
- + the firmware upgrade. The support-list partition contains a list of devices supported by
- + the firmware image.
- +
- + The base offsets in the firmware partition table are relative to the end
- + of the vendor information block, so the partition-table partition will
- + actually start at offset 0x1814 of the image.
- +
- + I think partition-table must be the first partition in the firmware image.
- +*/
- +void put_partitions(uint8_t *buffer, const struct image_partition_entry *parts) {
- + size_t i;
- + char *image_pt = (char *)buffer, *end = image_pt + 0x800;
- +
- + size_t base = 0x800;
- + for (i = 0; parts[i].name; i++) {
- + memcpy(buffer + base, parts[i].data, parts[i].size);
- +
- + size_t len = end-image_pt;
- + size_t w = snprintf(image_pt, len, "fwup-ptn %s base 0x%05x size 0x%05x\t\r\n", parts[i].name, (unsigned)base, (unsigned)parts[i].size);
- +
- + if (w > len-1)
- + error(1, 0, "image partition table overflow?");
- +
- + image_pt += w;
- +
- + base += parts[i].size;
- + }
- +
- + image_pt++;
- +
- + memset(image_pt, 0xff, end-image_pt);
- +}
- +
- +/** Generates and writes the image MD5 checksum */
- +void put_md5(uint8_t *md5, uint8_t *buffer, unsigned int len) {
- + MD5_CTX ctx;
- +
- + MD5_Init(&ctx);
- + MD5_Update(&ctx, md5_salt, (unsigned int)sizeof(md5_salt));
- + MD5_Update(&ctx, buffer, len);
- + MD5_Final(md5, &ctx);
- +}
- +
- +
- +/**
- + Generates the firmware image in factory format
- +
- + Image format:
- +
- + Bytes (hex) Usage
- + ----------- -----
- + 0000-0003 Image size (4 bytes, big endian)
- + 0004-0013 MD5 hash (hash of a 16 byte salt and the image data starting with byte 0x14)
- + 0014-1013 Vendor information (4096 bytes, padded with 0xff; there seem to be older
- + (VxWorks-based) TP-LINK devices which use a smaller vendor information block)
- + 1014-1813 Image partition table (2048 bytes, padded with 0xff)
- + 1814-xxxx Firmware partitions
- +*/
- +void * generate_factory_image(const unsigned char *vendor, size_t vendor_len, const struct image_partition_entry *parts, size_t *len) {
- + *len = 0x1814;
- +
- + size_t i;
- + for (i = 0; parts[i].name; i++)
- + *len += parts[i].size;
- +
- + uint8_t *image = malloc(*len);
- + if (!image)
- + error(1, errno, "malloc");
- +
- + image[0] = *len >> 24;
- + image[1] = *len >> 16;
- + image[2] = *len >> 8;
- + image[3] = *len;
- +
- + memcpy(image+0x14, vendor, vendor_len);
- + memset(image+0x14+vendor_len, 0xff, 4096-vendor_len);
- +
- + put_partitions(image + 0x1014, parts);
- + put_md5(image+0x04, image+0x14, *len-0x14);
- +
- + return image;
- +}
- +
- +/**
- + Generates the firmware image in sysupgrade format
- +
- + This makes some assumptions about the provided flash and image partition tables and
- + should be generalized when TP-LINK starts building its safeloader into hardware with
- + different flash layouts.
- +*/
- +void * generate_sysupgrade_image(const struct flash_partition_entry *flash_parts, const struct image_partition_entry *image_parts, size_t *len) {
- + const struct flash_partition_entry *flash_os_image = &flash_parts[5];
- + const struct flash_partition_entry *flash_soft_version = &flash_parts[6];
- + const struct flash_partition_entry *flash_support_list = &flash_parts[7];
- + const struct flash_partition_entry *flash_file_system = &flash_parts[8];
- +
- + const struct image_partition_entry *image_os_image = &image_parts[3];
- + const struct image_partition_entry *image_soft_version = &image_parts[1];
- + const struct image_partition_entry *image_support_list = &image_parts[2];
- + const struct image_partition_entry *image_file_system = &image_parts[4];
- +
- + assert(strcmp(flash_os_image->name, "os-image") == 0);
- + assert(strcmp(flash_soft_version->name, "soft-version") == 0);
- + assert(strcmp(flash_support_list->name, "support-list") == 0);
- + assert(strcmp(flash_file_system->name, "file-system") == 0);
- +
- + assert(strcmp(image_os_image->name, "os-image") == 0);
- + assert(strcmp(image_soft_version->name, "soft-version") == 0);
- + assert(strcmp(image_support_list->name, "support-list") == 0);
- + assert(strcmp(image_file_system->name, "file-system") == 0);
- +
- + if (image_os_image->size > flash_os_image->size)
- + error(1, 0, "kernel image too big (more than %u bytes)", (unsigned)flash_os_image->size);
- + if (image_file_system->size > flash_file_system->size)
- + error(1, 0, "rootfs image too big (more than %u bytes)", (unsigned)flash_file_system->size);
- +
- + *len = flash_file_system->base - flash_os_image->base + image_file_system->size;
- +
- + uint8_t *image = malloc(*len);
- + if (!image)
- + error(1, errno, "malloc");
- +
- + memset(image, 0xff, *len);
- +
- + memcpy(image, image_os_image->data, image_os_image->size);
- + memcpy(image + flash_soft_version->base - flash_os_image->base, image_soft_version->data, image_soft_version->size);
- + memcpy(image + flash_support_list->base - flash_os_image->base, image_support_list->data, image_support_list->size);
- + memcpy(image + flash_file_system->base - flash_os_image->base, image_file_system->data, image_file_system->size);
- +
- + return image;
- +}
- +
- +
- +/** Generates an image for CPE210/220/510/520 and writes it to a file */
- +static void do_cpe510(const char *output, const char *kernel_image, const char *rootfs_image, uint32_t rev, bool add_jffs2_eof, bool sysupgrade) {
- + struct image_partition_entry parts[6] = {};
- +
- + parts[0] = make_partition_table(cpe510_partitions);
- + parts[1] = make_soft_version(rev);
- + parts[2] = make_support_list(cpe510_support_list, sizeof(cpe510_support_list)-1);
- + parts[3] = read_file("os-image", kernel_image, false);
- + parts[4] = read_file("file-system", rootfs_image, add_jffs2_eof);
- +
- + size_t len;
- + void *image;
- + if (sysupgrade)
- + image = generate_sysupgrade_image(cpe510_partitions, parts, &len);
- + else
- + image = generate_factory_image(cpe510_vendor, sizeof(cpe510_vendor)-1, parts, &len);
- +
- + FILE *file = fopen(output, "wb");
- + if (!file)
- + error(1, errno, "unable to open output file");
- +
- + if (fwrite(image, len, 1, file) != 1)
- + error(1, 0, "unable to write output file");
- +
- + fclose(file);
- +
- + free(image);
- +
- + size_t i;
- + for (i = 0; parts[i].name; i++)
- + free_image_partition(parts[i]);
- +}
- +
- +
- +/** Usage output */
- +void usage(const char *argv0) {
- + fprintf(stderr,
- + "Usage: %s [OPTIONS...]\n"
- + "\n"
- + "Options:\n"
- + " -B <board> create image for the board specified with <board>\n"
- + " -k <file> read kernel image from the file <file>\n"
- + " -r <file> read rootfs image from the file <file>\n"
- + " -o <file> write output to the file <file>\n"
- + " -V <rev> sets the revision number to <rev>\n"
- + " -j add jffs2 end-of-filesystem markers\n"
- + " -S create sysupgrade instead of factory image\n"
- + " -h show this help\n",
- + argv0
- + );
- +};
- +
- +
- +int main(int argc, char *argv[]) {
- + const char *board = NULL, *kernel_image = NULL, *rootfs_image = NULL, *output = NULL;
- + bool add_jffs2_eof = false, sysupgrade = false;
- + unsigned rev = 0;
- +
- + while (true) {
- + int c;
- +
- + c = getopt(argc, argv, "B:k:r:o:V:jSh");
- + if (c == -1)
- + break;
- +
- + switch (c) {
- + case 'B':
- + board = optarg;
- + break;
- +
- + case 'k':
- + kernel_image = optarg;
- + break;
- +
- + case 'r':
- + rootfs_image = optarg;
- + break;
- +
- + case 'o':
- + output = optarg;
- + break;
- +
- + case 'V':
- + sscanf(optarg, "r%u", &rev);
- + break;
- +
- + case 'j':
- + add_jffs2_eof = true;
- + break;
- +
- + case 'S':
- + sysupgrade = true;
- + break;
- +
- + case 'h':
- + usage(argv[0]);
- + return 0;
- +
- + default:
- + usage(argv[0]);
- + return 1;
- + }
- + }
- +
- + if (!board)
- + error(1, 0, "no board has been specified");
- + if (!kernel_image)
- + error(1, 0, "no kernel image has been specified");
- + if (!rootfs_image)
- + error(1, 0, "no rootfs image has been specified");
- + if (!output)
- + error(1, 0, "no output filename has been specified");
- +
- + if (strcmp(board, "CPE510") == 0)
- + do_cpe510(output, kernel_image, rootfs_image, rev, add_jffs2_eof, sysupgrade);
- + else
- + error(1, 0, "unsupported board %s", board);
- +
- + return 0;
- +}
|