Qualcom TZ QSEE 简介



The TrustZone (TZ) software was pioneered by ARM in their v6 architecture and significantly redesigned for v7. This hardware implementation of the TrustZone architecture provides a security framework that enables a device to counter many security threats from both a software and hardware level.


The hardware solution provided by ARM enables the design and implementation, in software, ofapplications or services that run in a secure environment. This secure environment is an isolatedexecution unit that establishes hardware separation from other nonsecure execution environments. TrustZone software is enabled on all MSM8960 and later chipsets.


QSEE software runs in a privilege mode of the TrustZone software. On cold boot, QSEE performs a security configuration of the SoC. QSEE also offers runtime services to the HLOS. Runtime services include power collapse, secure PIL, content protection, SSD, etc. QSEE also offers running secure applications in User mode of the TrustZone software. QSEE runs from OCIMEM on high tier MSM/APQ/MPQ chipsets and from DDR on MDMs and mid/low tier MSM/APQ/MPQ chipsets.


LLVM compiler
QSEE 4.0 is now compiled using the LLVM compiler. Previous TZ images were compiled using the ARM compiler, and there is no binary compatibility between these images. Therefore, all secure applications must be recompiled using the LLVM compiler to run on QSEE 4.0.


TZ logging
For QSEE 4.0, an OEM can no longer control whether to temporarily enable TrustZone logging on secure boot-enabled devices by customizing the tzbsp_oem_allow_logging() function. Instead, the recommended approach is to use a debug policy-based enabling process. Refer to 80-NU498-1 for relevant details.


BLSP QUP access driver
The BLSP QUP access driver is a TrustZone module that, at cold boot, assigns ownership of BLSP QUP and UART instances to execution environments (EE), as specified in the devcfg file QUPAC_<chip>_Access.xml.
OEMs should modify this XML file to specify which EE should manage which SPI/I2C/UART instance. Examples are provided in Section 5.1.2.


Location of the BLSP QUP access driver
For the MSM8996, the device configuration file that OEMs can modify is located at:
<TZ Build>\trustzone_images\core\buses\qup_accesscontrol\config\QUPAC_8996_Access.xml















要打开QSEE日志,您可以按照以下步骤进行操作: 1. 首先,确定您的系统中已经安装了QSEEQualcomm Secure Execution Environment)软件。如果您还没有安装,您需要从Qualcomm官方网站或其他可靠来源下载并安装QSEE。 2. 找到QSEE日志文件。通常,QSEE日志位于设备的系统目录中,具体位置可能因设备而异。您可以尝试在以下位置查找: - `/dev/log/qsee` 或 `/dev/qsee_log` - `/proc/qsee_log` - `/data/qsee_log` - `/mnt/vendor/persist/qsee_log` 如果您无法在这些位置找到日志文件,请参考您所使用设备的文档或联系设备制造商以获取更多帮助。 3. 一旦找到QSEE日志文件,您可以使用任何文本编辑器或日志查看器打开它。根据您的操作系统和个人偏好,您可以选择使用以下工具之一: - Windows:Notepad++、Sublime Text、Visual Studio Code等。 - macOS:TextEdit、Sublime Text、Visual Studio Code等。 - Linux:Gedit、Vim、Sublime Text、Visual Studio Code等。 请注意,QSEE日志文件可能是二进制格式,您可能需要使用适当的工具或阅读器来解析和查看日志内容。 4. 打开QSEE日志文件后,您将能够查看其中的日志信息。根据您的需求,您可以搜索特定关键字或按照时间顺序检查日志事件。 请注意,QSEE日志包含系统级别的安全执行环境信息,对于一般用户而言,可能不太容易理解其内容。如果您需要解释或分析QSEE日志的具体内容,建议咨询安全专业人士或相关技术支持。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值