firmware 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. #------------------------------------------------------------------------------
  2. # $File: firmware,v 1.13 2024/09/04 19:04:03 christos Exp $
  3. # firmware: file(1) magic for firmware files
  4. #
  5. # https://github.com/MatrixEditor/frontier-smart-api/blob/main/docs/firmware-2.0.md#11-header-structure
  6. # examples: https://github.com/cweiske/frontier-silicon-firmwares
  7. 0 lelong 0x00001176
  8. >4 lelong 0x7c Frontier Silicon firmware download
  9. >>8 lelong x \b, MeOS version %x
  10. >>12 string/32/T x \b, version %s
  11. >>40 string/64/T x \b, customization %s
  12. # HPE iLO firmware update image
  13. # From: Alexandre Iooss <erdnaxe@crans.org>
  14. # URL: https://www.sstic.org/2018/presentation/backdooring_your_server_through_its_bmc_the_hpe_ilo4_case/
  15. # iLO1 (ilo1*.bin) or iLO2 (ilo2_*.bin) images
  16. 0 string \x20\x36\xc1\xce\x60\x37\x62\xf0\x3f\x06\xde\x00\x00\x03\x7f\x00
  17. >16 ubeshort =0xCFDD HPE iLO2 firmware update image
  18. >16 ubeshort =0x6444 HPE iLO1 firmware update image
  19. # iLO3 images (ilo3_*.bin) start directly with image name
  20. 0 string iLO3\x20v\x20 HPE iLO3 firmware update image,
  21. >7 string x version %s
  22. # iLO4 images (ilo4_*.bin) start with a signature and a certificate
  23. 0 string --=</Begin\x20HP\x20Signed
  24. >75 string label_HPBBatch
  25. >>5828 string iLO\x204
  26. >>>5732 string HPIMAGE\x00 HPE iLO4 firmware update image,
  27. >>>6947 string x version %s
  28. # iLO5 images (ilo5_*.bin) start with a signature
  29. >75 string label_HPE-HPB-BMC-ILO5-4096
  30. >>880 string HPIMAGE\x00 HPE iLO5 firmware update image,
  31. >>944 string x version %s
  32. # IBM POWER Secure Boot Container
  33. # from https://github.com/open-power/skiboot/blob/master/libstb/container.h
  34. 0 belong 0x17082011 POWER Secure Boot Container,
  35. >4 beshort x version %u
  36. >6 bequad x container size %llu
  37. # These are always zero
  38. # >14 bequad x target HRMOR %llx
  39. # >22 bequad x stack pointer %llx
  40. >4096 ustring \xFD7zXZ\x00 XZ compressed
  41. 0 belong 0x1bad1bad POWER boot firmware
  42. >256 belong 0x48002030 (PHYP entry point)
  43. # ARM Cortex-M vector table
  44. # From: Alexandre Iooss <erdnaxe@crans.org>
  45. # URL: https://developer.arm.com/documentation/100701/0200/Exception-properties
  46. # Match stack MSB
  47. 3 byte 0x20
  48. # Function pointers must be in Thumb-mode and before 0x20000000 (4*5 bits match)
  49. >4 ulelong&0xE0000001 1
  50. >>8 ulelong&0xE0000001 1
  51. >>>12 ulelong&0xE0000001 1
  52. >>>>44 ulelong&0xE0000001 1
  53. >>>>>56 ulelong&0xE0000001 1
  54. # Match Cortex-M reserved sections (0x00000000 or 0xFFFFFFFF)
  55. >>>>>>28 ulelong+1 <2
  56. >>>>>>>32 ulelong+1 <2
  57. >>>>>>>>36 ulelong+1 <2
  58. >>>>>>>>>40 ulelong+1 <2
  59. >>>>>>>>>>52 ulelong+1 <2 ARM Cortex-M firmware
  60. >>>>>>>>>>>0 ulelong >0 \b, initial SP at 0x%08x
  61. >>>>>>>>>>>4 ulelong^1 x \b, reset at 0x%08x
  62. >>>>>>>>>>>8 ulelong^1 x \b, NMI at 0x%08x
  63. >>>>>>>>>>>12 ulelong^1 x \b, HardFault at 0x%08x
  64. >>>>>>>>>>>44 ulelong^1 x \b, SVCall at 0x%08x
  65. >>>>>>>>>>>56 ulelong^1 x \b, PendSV at 0x%08x
  66. # ESP-IDF partition table entry
  67. # From: Alexandre Iooss <erdnaxe@crans.org>
  68. # URL: https://github.com/espressif/esp-idf/blob/v5.0/components/esp_partition/include/esp_partition.h
  69. 0 string \xAA\x50
  70. >2 ubyte <2 ESP-IDF partition table entry
  71. >>12 string/16 x \b, label: "%s"
  72. >>2 ubyte 0
  73. >>>3 ubyte 0x00 \b, factory app
  74. >>>3 ubyte 0x10 \b, OTA_0 app
  75. >>>3 ubyte 0x11 \b, OTA_1 app
  76. >>>3 ubyte 0x12 \b, OTA_2 app
  77. >>>3 ubyte 0x13 \b, OTA_3 app
  78. >>>3 ubyte 0x14 \b, OTA_4 app
  79. >>>3 ubyte 0x15 \b, OTA_5 app
  80. >>>3 ubyte 0x16 \b, OTA_6 app
  81. >>>3 ubyte 0x17 \b, OTA_7 app
  82. >>>3 ubyte 0x18 \b, OTA_8 app
  83. >>>3 ubyte 0x19 \b, OTA_9 app
  84. >>>3 ubyte 0x1A \b, OTA_10 app
  85. >>>3 ubyte 0x1B \b, OTA_11 app
  86. >>>3 ubyte 0x1C \b, OTA_12 app
  87. >>>3 ubyte 0x1D \b, OTA_13 app
  88. >>>3 ubyte 0x1E \b, OTA_14 app
  89. >>>3 ubyte 0x1F \b, OTA_15 app
  90. >>>3 ubyte 0x20 \b, test app
  91. >>2 ubyte 1
  92. >>>3 ubyte 0x00 \b, OTA selection data
  93. >>>3 ubyte 0x01 \b, PHY init data
  94. >>>3 ubyte 0x02 \b, NVS data
  95. >>>3 ubyte 0x03 \b, coredump data
  96. >>>3 ubyte 0x04 \b, NVS keys
  97. >>>3 ubyte 0x05 \b, emulated eFuse data
  98. >>>3 ubyte 0x06 \b, undefined data
  99. >>>3 ubyte 0x80 \b, ESPHTTPD partition
  100. >>>3 ubyte 0x81 \b, FAT partition
  101. >>>3 ubyte 0x82 \b, SPIFFS partition
  102. >>>3 ubyte 0xFF \b, any data
  103. >>4 ulelong x \b, offset: 0x%X
  104. >>8 ulelong x \b, size: 0x%X
  105. >>28 ulelong&0x1 1 \b, encrypted
  106. # ESP-IDF application image
  107. # From: Alexandre Iooss <erdnaxe@crans.org>
  108. # Update: Joerg Jenderek
  109. # URL: https://github.com/espressif/esp-idf/blob/v5.0/components/bootloader_support/include/esp_app_format.h
  110. # Reference: https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/app_image_format.html
  111. # Note: Concatenation of esp_image_header_t, esp_image_segment_header_t and esp_app_desc_t
  112. # First segment contains esp_app_desc_t
  113. # ESP_IMAGE_HEADER_MAGIC at the beginning of esp_image_header_t structure
  114. 0 ubyte 0xE9
  115. # display ESP-IDF application image (strength=40=40+0) before DOS executable with 16bit JuMP (strength=40) handled by ./msdos
  116. #!:strength +0
  117. # ESP_APP_DESC_MAGIC_WORD; magic for the esp_app_desc_t structure
  118. >32 ulelong 0xABCD5432 ESP-IDF application image
  119. #!:mime application/octet-stream
  120. !:mime application/x-espressif-bin
  121. !:ext bin
  122. >>12 uleshort 0x0000 for ESP32
  123. >>12 uleshort 0x0002 for ESP32-S2
  124. >>12 uleshort 0x0005 for ESP32-C3
  125. >>12 uleshort 0x0009 for ESP32-S3
  126. >>12 uleshort 0x000A for ESP32-H2 Beta1
  127. >>12 uleshort 0x000C for ESP32-C2
  128. >>12 uleshort 0x000D for ESP32-C6
  129. >>12 uleshort 0x000E for ESP32-H2 Beta2
  130. >>12 uleshort 0x0010 for ESP32-H2
  131. >>80 string/32 x \b, project name: "%s"
  132. >>48 string/32 x \b, version %s
  133. >>128 string/16 x \b, compiled on %s
  134. >>>112 string/16 x %s
  135. >>144 string/32 x \b, IDF version: %s
  136. >>4 ulelong x \b, entry address: 0x%08X
  137. # AVR firmware
  138. # From: Alexandre Iooss <erdnaxe@crans.org>
  139. # URL: https://microchipdeveloper.com/8avr:int
  140. # Match 4-byte JMP for Reset, Int0-2, PcInt0-3 and WDT
  141. 0 uleshort&0xFE0E 0x940C
  142. >4 uleshort&0xFE0E 0x940C
  143. >>8 uleshort&0XFE0E 0x940C
  144. >>>12 uleshort&0XFE0E 0x940C
  145. >>>>16 uleshort&0XFE0E 0x940C
  146. >>>>>20 uleshort&0XFE0E 0x940C
  147. >>>>>>24 uleshort&0XFE0E 0x940C
  148. >>>>>>>28 uleshort&0XFE0E 0x940C
  149. >>>>>>>>32 uleshort&0XFE0E 0x940C AVR firmware
  150. # Handle only 16-bit addressing
  151. >>>>>>>>>0 uleshort 0x940C
  152. >>>>>>>>>>2 uleshort x \b, reset at 0x%04x
  153. # Match 2-byte RJMP for Reset, Int0-2, PcInt0-3 and WDT for smaller AVR
  154. 1 byte&0xF0 0xC0
  155. >3 byte&0xF0 0xC0
  156. >>5 byte&0xF0 0xC0
  157. >>>7 byte&0xF0 0xC0
  158. >>>>9 byte&0xF0 0xC0
  159. >>>>>11 byte&0xF0 0xC0
  160. >>>>>>13 byte&0xF0 0xC0
  161. >>>>>>>15 byte&0xF0 0xC0
  162. >>>>>>>>17 byte&0xF0 0xC0 AVR firmware
  163. >>>>>>>>>0 uleshort&0x0FFF x \b, reset at 0x%04x
  164. # Summary: Intel HEXadecimal file format
  165. # URL: https://en.wikipedia.org/wiki/Intel_HEX
  166. # Reference: http://www.piclist.com/techref/fileext/hex/intel.htm
  167. # http://mark0.net/download/triddefs_xml.7z/defs/h/hex-intel.trid.xml
  168. # From: Joerg Jenderek
  169. # Note: called "Intel Hexadecimal object format" by TrID, "Intel® hexadecimal object file" on Linux
  170. # and "Intel HEX binary data" by Notepad++
  171. # look for start code; 1 character, an ASCII colon ':'; all characters preceding this symbol should be ignored
  172. 0 ubyte 0x3A
  173. # check for valid record type string with range 00 - 05 (3030h - 3035h)
  174. >&6 ubeshort&0xFFf8 =0x3030
  175. # check for valid record length string like: 02 04 08 10h 20h 03 (usbdload.hex usbdldv2.hex from Windows Vista)
  176. #>>1 string x LENGTH_STRING=%0.2s
  177. #>>1 ubeshort x LENGTH=%#4.4x
  178. >>&-8 ubeshort&0xFCf0 =0x3030
  179. >>>0 use intel-hex
  180. # display information (offset, record length and type) of Intel HEX
  181. 0 name intel-hex
  182. # RECORD MARK
  183. >0 ubyte x Intel hexadecimal object
  184. #!:mime text/plain
  185. !:mime text/x-hex
  186. !:ext hex
  187. # no samples with other suffix found
  188. # .hex .mcs .int .ihex .ihe .ihx .h80 .h86 .a43 .a90 .obj .obl .obh .rom .eep
  189. # .hxl-.hxh .h00-.h15 .p00-.pff
  190. # RECLEN; 2 hex digits for number of bytes in 1st data field; like 0x02 0x03 0x04 0x08 0x10 0x20; maximum 255
  191. >1 string x \b, 0x%2.2s record length
  192. # OFFSET; 4 hex digits for 1st 16-bit memory offset of data like: 0000 (often) 1C00h 1E00h 3800h 3E00h 76EDh 7800h 7E00h ...
  193. >3 string x \b, 0x%4.4s offset
  194. # RECTYP; 2 hex digits (00 - 05); meaning of 1st data field; 00~DataRecord (often) 0l~EndOfFileRecord 02~ExtendedSegmentAddressRecord 03~StartSegmentAddressRecord 04~ExtendedLinearAddressRecord 05~StartLinearAddressRecord
  195. >7 string x \b, '%2.2s' type
  196. # DATA; n bytes of 1st data represented by 2n hex digits followed by 1 byte checksum
  197. >9 string x \b, data+checksum %s
  198. # last record :00000001FF with RECLEN 0, OFFSET 0, record type 01 for EndOfFile and 1 checksum byte FF
  199. # samples with CarriageReturnLineFeed terminator
  200. >-2 ubeshort =0x0d0a
  201. # This should not happen!
  202. >>-13 string !:00000001FF \b, last line %s
  203. >-2 ubeshort !0x0d0a
  204. # samples with LineFeed terminator
  205. >>-1 ubyte =0x0a
  206. # This should not happen!
  207. >>>-12 string !:00000001FF \b, last line %s
  208. # Raspberry Pi RP2040 firmware
  209. # From: Alexandre Iooss <erdnaxe@crans.org>
  210. # Note: RP2040 flash image starts with stage2 bootloader, then a vector table.
  211. # URL: https://github.com/raspberrypi/pico-sdk/tree/1.5.1/src/rp2_common/boot_stage2
  212. # boot2_*.S code (_stage2_boot)
  213. 0 ulelong 0x4B32B500
  214. >4 ulelong 0x60582021
  215. >>8 ulelong 0x21026898
  216. # exit_from_boot2.S code (check_return) `pop {r0}; cmp r0, #0`
  217. >>>148 ulelong 0x2800bc01
  218. # Cortex-M vector table with reserved section filled with a default interrupt address
  219. >>>>259 byte 0x20
  220. # make sure required vector table entries are ARM Thumb and in flash
  221. >>>>>260 ulelong&0xE0000001 1
  222. >>>>>>264 ulelong&0xE0000001 1
  223. >>>>>>>268 ulelong&0xE0000001 1
  224. >>>>>>>>300 ulelong&0xE0000001 1
  225. >>>>>>>>>312 ulelong&0xE0000001 1 Raspberry Pi RP2040 firmware
  226. >>>>>>>>>>256 ulelong >0 \b, initial SP at 0x%08x
  227. >>>>>>>>>>260 ulelong^1 x \b, reset at 0x%08x
  228. >>>>>>>>>>264 ulelong^1 x \b, NMI at 0x%08x
  229. >>>>>>>>>>268 ulelong^1 x \b, HardFault at 0x%08x
  230. >>>>>>>>>>300 ulelong^1 x \b, SVCall at 0x%08x
  231. >>>>>>>>>>312 ulelong^1 x \b, PendSV at 0x%08x
  232. # optional binary_info in the first 256 bytes, used by picotool
  233. # https://github.com/raspberrypi/pico-sdk/blob/master/src/common/pico_binary_info/include/pico/binary_info/defs.h
  234. >>>>>>>>>>256 search/256 \xf2\xeb\x88\x71 \b, with binary_info
  235. # Silicon Labs Gecko Bootloader update image
  236. # From: Alexandre Iooss <erdnaxe@crans.org>
  237. # Reference: https://github.com/raboof/gbl
  238. # https://github.com/dsyx/emberznet-doc
  239. # Note: TLV always starting with tag 0x03A617EB of length 8
  240. 0 ulelong 0x03A617EB
  241. >4 ulelong 8 Silicon Labs Gecko bootloader update image
  242. !:ext gbl
  243. >>12 byte 1 \b, encrypted (AES-CTR-128)
  244. >>13 byte 1 \b, signed (ECDSA-P256)
  245. # If not encrypted, indicate first image type
  246. >>16 ulelong 0xF40A0AF4 \b, application image
  247. >>16 ulelong 0xF50909F5 \b, bootloader image
  248. # Silicon Labs Gecko Bootloader OTA update with Zigbee EmberZNet SDK
  249. # URL: https://github.com/SiliconLabs/gecko_sdk
  250. 0 ulelong 0x0BEEF11E
  251. >6 ulelong 0x38 Silicon Labs Gecko EmberZNet OTA image
  252. !:ext ota/zigbee
  253. >>4 ubeshort x v%d
  254. # Device Firmware Upgrade with ST STMicroelectronics extensions
  255. # From: Alexandre Iooss <erdnaxe@crans.org>
  256. # Reference: STMicroelectronics note UM0391
  257. # Reference: https://dfu-util.sourceforge.net/dfuse.html
  258. # DFU prefix
  259. 0 string DfuSe\x01 DFU image (STM variant)
  260. !:ext dfu
  261. >6 ulelong x \b, size: %d bytes
  262. # DFU suffix, specification 0x011A
  263. >-10 string \x1A\x01UFD
  264. >>-12 uleshort x \b, for device %04X:
  265. >>-14 uleshort x \b%04X