This tool communicates with USB devices of id 05c6:9008
to upload a flash
loader and use this to flash images.
sudo apt install libxml2 libusb
make
brew install libxml2 pkg-config libusb
make
First, install the MSYS2 environment. Then, run the
MSYS2 MinGW64 terminal (located at <msys2-installation-path>\mingw64.exe
) and
install additional packages needed for QDL compilation using the pacman
tool:
pacman -S mingw-w64-x86_64-gcc
pacman -S mingw-w64-x86_64-make
pacman -S mingw-w64-x86_64-pkg-config
pacman -S mingw-w64-x86_64-libusb
pacman -S mingw-w64-x86_64-libxml2
Then use the mingw32-make
tool to build QDL:
mingw32-make
The device intended for flashing must be booted into Emergency Download (EDL) mode. EDL is a special boot mode available on Qualcomm-based devices that provides low-level access for firmware flashing and recovery. It bypasses the standard boot process, allowing operations such as flashing firmware even on unresponsive devices or those with locked bootloaders.
Please consult your device’s documentation for instructions on how to enter EDL mode.
Run QDL with the --help
option to view detailed usage information.
Below is an example of how to invoke QDL to flash a FLAT build:
qdl --dry-run prog_firehose_ddr.elf rawprogram*.xml patch*.xml
If you have multiple boards connected the host, provide the serial number of
the board to flash through --serial
param:
qdl --serial=0AA94EFD prog_firehose_ddr.elf rawprogram*.xml patch*.xml
QDL now supports Validated Image Programming (VIP) mode , which is activated when Secure Boot is enabled on the target. VIP controls which packets are allowed to be issued to the target. Controlling the packets that can be sent to the target is done through hashing. The target applies a hashing function to all received data, comparing the resulting hash digest against an existing digest table in memory. If the calculated hash digest matches the next entry in the table, the packet (data or command) is accepted; otherwise, the packet is rejected,and the target halts.
To use VIP programming, a digest table must be generated prior to flashing the device.
To generate table of digests run QDL with --create-digests
param,
providing a path to store VIP tables. For example:
mkdir vip
qdl --create-digests=./vip prog_firehose_ddr.elf rawprogram*.xml patch*.xml
As a result 3 types of files are generated:
-
DIGEST_TABLE.bin
- contains the SHA256 table of digests for all firehose packets to be sent to the target. It is an intermediary table and is used only for the subsequent generation ofDigestsToSign.bin
andChainedTableOfDigests\<n\>.bin
files. It is not used by QDL for VIP programming. -
DigestsToSign.bin
- first 53 digests + digest ofChainedTableOfDigests.bin
. This file has to be converted to MBN format and then signed with sectools:sectools mbn-tool generate --data DigestsToSign.bin --mbn-version 6 --outfile DigestsToSign.bin.mbn sectools secure-image --sign DigestsToSign.bin.mbn --image-id=VIP
Please check the security profile for your SoC to determine which version of the MBN format should be used.
-
ChainedTableOfDigests\<n\>.bin
- contains left digests, split on multiple files with 255 digests + appended hash of next table.
To flash board using VIP mode provide a path where previously generated and signed
table of digests are stored using --vip-table-path
param:
qdl --vip-table-path=./vip prog_firehose_ddr.elf rawprogram*.xml patch*.xml