The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "S5L8930"
m (typos and link) |
m (looked weird without the X being hyperlinked) |
||
(14 intermediate revisions by 8 users not shown) | |||
Line 1: | Line 1: | ||
[[Image:A4.jpg|right]] |
[[Image:A4.jpg|right]] |
||
− | A [[wikipedia:system on a chip|system on a chip]] ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the '''A4'''. Internally, this processor is also based on the S5L8920X family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This |
+ | A [[wikipedia:system on a chip|system on a chip]] ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the '''A4'''. Internally, this processor is also based on the [[S5L8920|S5L8920X]] family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable [[bootrom]] vulnerability until the title was taken by [[checkm8]]. |
== Used in == |
== Used in == |
||
+ | * [[K66AP|Apple TV (2nd generation)]] |
||
− | * [[K48ap|iPad]] |
||
− | * [[ |
+ | * [[K48AP|iPad]] |
− | * [[ |
+ | * [[iPhone 4]] |
− | * [[ |
+ | * [[N81AP|iPod touch (4th generation)]] |
− | * [[N92ap|iPhone 4 CDMA]] |
||
== [[Bootrom]] Exploits == |
== [[Bootrom]] Exploits == |
||
− | * [[limera1n]] |
+ | * [[Limera1n Exploit|limera1n]] |
* [[SHA-1 Image Segment Overflow|SHAtter]] |
* [[SHA-1 Image Segment Overflow|SHAtter]] |
||
Line 20: | Line 19: | ||
* '''GPU''': PowerVR SGX 535 |
* '''GPU''': PowerVR SGX 535 |
||
* '''A/V Playback''': PowerVR VXD |
* '''A/V Playback''': PowerVR VXD |
||
− | * '''RAM''': 256 MB ([[ |
+ | * '''RAM''': 256 MB ([[K66AP|Apple TV (2nd generation)]], [[K48AP|iPad]], and [[N81AP|iPod touch (4th generation)]]) or 512 MB ([[iPhone 4]]) |
+ | [[Category:Application Processors]] |
||
Aside from the [[iPhone 4]]'s additional RAM and an overall higher clock speed, these are the same specifications as the [[S5L8920]] and [[S5L8922]]. |
Aside from the [[iPhone 4]]'s additional RAM and an overall higher clock speed, these are the same specifications as the [[S5L8920]] and [[S5L8922]]. |
||
Latest revision as of 12:19, 2 November 2020
A system on a chip ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the A4. Internally, this processor is also based on the S5L8920X family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable bootrom vulnerability until the title was taken by checkm8.
Used in
Bootrom Exploits
Boot Chain
Bootrom->LLB->iBoot->Kernel->System Software
Specifications
- CPU: ARM Cortex-A8
- GPU: PowerVR SGX 535
- A/V Playback: PowerVR VXD
- RAM: 256 MB (Apple TV (2nd generation), iPad, and iPod touch (4th generation)) or 512 MB (iPhone 4)
Aside from the iPhone 4's additional RAM and an overall higher clock speed, these are the same specifications as the S5L8920 and S5L8922.