[Qcom] What is each partition for?

Qcom platform, What is each parition for?

LabelPurpose of this partition
ModemPartition for modem
FscCookie partition to store Modem File System’s cookies
SsdPartition for ssd diag module. Stores the encrypted RSA keys
sbl1Partition for secondary boot loader
sbl1bakBackup Partition for secondary boot loader
RpmPartition for rpm image
RpmbakBackup Partition for rpm image
TzPartition for tz image
tzbakBackup Partition for tz image
HypPartition for hypervisor image
hypbakBackup Partition for hypervisor image
DspPartition for adsp dynamic loaders image
modemst1Copy of Modem File System (Encrypted)
modemst2Copy of Modem File System (Encrypted)
DDRPartition for DDR
FsgGolden copy or backup of Modem File System (Encrypted). Also used to pre-populate the file system
SecSec.dat contains fuse settings, mainly for secure boot and OEM setting
splashThe splash screen is displayed during the apps bootloader (also called the LK). The display driver in LK will read the splash image data from a separate eMMC partition named as splash
abootPartition for apps boot loader
abootbakBackup Partition for apps boot loader
bootThis is the boot partition of your Android device. It includes the android kernel and the ramdisk
recoveryThis is specially designed for backup. The recovery partition can be considered as an alternative boot partition
devinfoDevice information including: is_unlocked, is_tmpered, is_verified, charger_screen_enabled, display_panel, bootloader_version, radio_version. All these attributes are set based on some specific conditions and written on devinfo partition
systemThis partition contains the entire Android OS other than the kernel and the ramdisk. This includes the Android GUI and all the system applications that come pre-installed on the device
cacheThis is the partition where Android stores frequently accessed data and app components
persistPartition entry for persist image, which contains data that shouldn’t be changed after the device is shipped, for example: calibration data of chips (wifi, bt, camera, etc.), certificates, and other security-related files
miscThis partition contains miscellaneous system settings in the form of on/off switches. These settings may include CID (Carrier or Region ID), USB configuration, etc.
configCertain hardware settings, etc.
oemIt is meant for storing OEM specific info. Customers can decide whether to keep this partition or not. Typically reserved partitions are kept for future use
limitsPartition to store LMh params on 8976 and 8998 target. LMh (Limits management) driver in SBL writes the LMh HW trimmed data into a separate partition and uses the same data for later reboots
motaBackup partition for M ota upgrade
devcfgPartition needed by TZ for M upgrades. Partition needed for SafeSwitch, a feature designed to allow OEMs and carriers to address new smartphone theft bill issues. DIP (Device Integrity Partition) is for data used by MDTP
mdtpPartition needed for SafeSwitch, a feature designed to allow OEMs and carriers to address new smartphone theft bill issues. MDTP (Mobile Device Theft Prevention) partition accommodates mdtp.img and this file is used to display the recovery UI
mdtpsecappPartition for mdtpsecapp.mbn. mdtpsecapp is MDTP QSEE app which interacts with HLOS and bootloader (UEFI, on 8998). Partition is required to allow access for the QSEE app from the bootloader
mdtpsecappbakBackup partition for mdtpsecapp
userdataPartition for userdata image
keystoreKeystore partition was added to accommodate Google’s initial version of Verified Boot implementation. But, later when Google revised the Verified Boot specification, Google removed user keystore completely. So starting with Android M (post Android L), this partition is not used
cmnlibVerified boot feature introduced in M needs LK to load cmnlib corresponding partitions
cmnlibbakBackup partition for cmnlib
cmnlib6464-bit based cmnlib
cmnlib64bakBackup partition for cmnlib64
keymasterVerified boot feature introduced in M needs LK to load keymaster from corresponding partitions
keymasterbakBackup partition for keymaster
syscfgSyscfg is internal testing for Vmin and CPR characterization
mcfgAll MBNs placeholder in flash. Specific MBN would be loaded by mcfg image based on the SIM/Carrier
msadpUsed for modem debug policy
apdpUsed for persisting the debug policy. “Debug policy” is used to better support development and debug on secure/fuse-blown devices. One instance of the debug policy will be signed for the AP
dpoThis partition will store a policy override
frpPartition for Google’s Factory Reset Protection
bluetoothPartition to store BTFM.bin. BTFM.bin is like Non-Volatile settings. This is used for BT/FM of QCA solution
toolsfvToolsfv is used to mount QcomTestPkg and QcomToolsPkg. QcomTestPkg contains UEFI test applications. QcomToolsPkg contains tools that ease development – such as BDS menu, UEFI Shell, etc. This is for debug tools and should not be present in retail devices. Even if this is present, UEFI does not mount this in retail builds
logfslogfs is for debug purpose partition (To save UEFI log buffer to storage device). This should not be present in retail devices. Even if this is present, UEFI does not mount this in retail builds
stiSTI partition is for system test image. This is only for testing
xblPartition for xbl image
xblbakBackup partition for xbl image
pmicPartition for pmic image
pmicbakBackup partition for pmic image
ablPartition for Application Boot Loader
ablbakBackup partition for abl image
cdtPartition to store Configuration Data Table. A CDT provides platform/device-dependent data, such as Platform ID, DDR hardware parameters, etc.
storsec/storsecbakThis is for the storage secure application. The current use case is for secure write protect only, but it can be expanded for other storage use cases in the future
logdumpReclaim logdump partition, User Space Log Extraction from RAM Dump
vendor_a/bThis partition is added for Android O vendor partition
spunvmspunvm partition is used by SPU
ImageFvUsed to store UEFI image
mibibThe partition file of NAND flash
qdspModem image partition for NAND flash
efsEFS partition (Embedded File System)
tz_devcfgThe same as devcfg partition, contains config data of TZ apps
loader_stiThe same as STI (System Test Image)
multi_imageMulti image of OEM for MISC feature of secure-boot 3.0
multi_image_qtiMulti image of QTI for MISC feature of secure-boot 3.0
scrubThe SCRUB partition for NAND flash. The Flash Scrub feature is intended to enable the NAND Flash and the data stored in the NAND Flash in MDM targets to survive 15 years of use
secdataThe same as Sec partition for secure boot
cacheThe cache partition for FOTA
efs2appsThe EFS partition for APPS
metadataThe key file for FDE/FBE
qupfwThe firmware for QUP (I2C/SPI/UART)
QDSP_SWAPThis partition is used to save the swapped context between GPS & LTE at runtime in this partition as we only have a single antenna
QDSP_PagingQDSP_Paging image is for the external paging purposes to load specific tech-related code in DDR for memory saving
QDSP_TINYThis partition is used to load modem image during ideal state scenarios after PCM cycle to save power
mdcompressThis is for minidump compression feature. Customers not using minidump can ignore this partition
connsecThis is for the ability to OEMs to disable cellular countermeasures running in the Modem. This TA routes messages to the modem via the TZSC TA. Customers not wishing to disable countermeasures in modem nor enable the connection security suite can ignore this
tzscThis is for the general purpose secure channel between Trustzone and the modem. It enables Qualcomm and 3rd parties to communicate between the AP and Modem using encryption. On 8350, the TZSC image can be embedded inside of the TZ image.
qmcsIt is used for Demura functionality. Demura is a display feature to correct OLED panel non-uniform panel responses. Raise case to display team to know details.
qweslicstoreStore QWES license info.
QWES is Qualcomm® wireless edge services and it is a Set of Trusted Services rooted on hardware to securely connect & manage devices
CPUCPThe firmware of CPU coprocessor. Provides APPS CPU coprocessor firmware for
operating state managemen.
vendor_bootThat is for follow Android R’s GKI specification.
Some vendor specific services/modules that are used for boot, are split out of boot image.
shrmSHRM firmware partition
slpcSLPC firmware
SLPC is a hardware block which interfaces with the QDSP6v4 and the SAW to
manage interrupt and core isolation when entering SPM(SAW) managed low power
modes
“vm-
bootsys_a”,
“vm-data”
vm-bootsys partition would hold trusted VM boot and system image (packaged as one
vm-bootsys.img). This VM is for trusted UI use case.
And vm-data is a placeholder for any user-data.
xbl_configXBL configuration image, it is used by XBL for bring up option.
aopAOP firmware partition
rawdumpIt is used to save the full/mini dump into flash. Please ensure the size of this partition is big enough to contain the full/mini dump.
uefisecappuefisecapp is TZ application which is used by UEFI to access RPMB for some critical data access in secure world.
core_nhlosnon-hlos firmware image used by UEFI for subsystem image loading.
featenablerfeatenabler is TZ application used by display team for some display feature enablement.
uefivarstoreThis partition is used to save some variables by UEFI in non-secure world, for secure device it will store variables to RPMB.
catefvUsed internally, customer can remove it from partiton.xml
usb_qtiUsed for improving USB enumeration boot KPI, Linux kernel needs USB composition information. Since this information needs to be available during every boot up consistently, USB composition information needs to be saved in persistent storage. usb_qti is reserved for this USB composition information.
IPA_FWIPA_FW is a proprietary binary used in IPA HW, IPA_FW is built as part of apps images, mounted on apps after kernel drivers are loaded. This partition is to store IPA HW’s firmware.
IPA HW will help AP data package route to modem.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值