The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "S5L8930"
(→Bootrom: conventional wisdom-sauce says you don't find 2 separate bootrom exploits) |
m (looked weird without the X being hyperlinked) |
||
(63 intermediate revisions by 21 users not shown) | |||
Line 1: | Line 1: | ||
+ | [[Image:A4.jpg|right]] |
||
− | An SoC developed by Apple in-house chip design department. It is currently used in [[k48ap|iPad]], [[N90ap|iPhone 4]], and [[N81ap|iPod Touch 4G]]. Publicly, Apple refers to this chip as the '''A4'''. |
||
+ | A [[wikipedia:system on a chip|system on a chip]] ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the '''A4'''. Internally, this processor is also based on the [[S5L8920|S5L8920X]] family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable [[bootrom]] vulnerability until the title was taken by [[checkm8]]. |
||
− | == |
+ | == Used in == |
+ | * [[K66AP|Apple TV (2nd generation)]] |
||
+ | * [[K48AP|iPad]] |
||
+ | * [[iPhone 4]] |
||
+ | * [[N81AP|iPod touch (4th generation)]] |
||
− | + | == [[Bootrom]] Exploits == |
|
+ | * [[Limera1n Exploit|limera1n]] |
||
− | * [http://www.youtube.com/watch?v=0NValNoW5Rc Unreleased Untethered iBoot Exploit] |
||
+ | * [[SHA-1 Image Segment Overflow|SHAtter]] |
||
− | |||
− | === [[S5L8922 (Bootrom)|Bootrom]] === |
||
− | * Unreleased exploit (demonstrated by Geohot) |
||
− | * Unreleased exploit (pod2g) |
||
− | (These are most likely the same exploit.) |
||
− | |||
− | === [[Kernel]] === |
||
− | * [[BPF STX Kernel Write Exploit]] - Works up to [[iOS]] 3.2 |
||
− | * [[IOSurface Kernel Exploit]] - Works up to [[iOS]] 3.2.1 |
||
− | |||
− | === [[Userland]] === |
||
− | * [[MobileBackup Copy Exploit]] - Works up to [[iOS]] 3.2 |
||
− | * [[PDF CFF Font Stack Overflow]] - Works up to [[iOS]] 3.2.1 |
||
== Boot Chain == |
== Boot Chain == |
||
− | [[ |
+ | [[Bootrom 574.4|Bootrom]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[Firmware|System Software]] |
== Specifications == |
== Specifications == |
||
Line 26: | Line 19: | ||
* '''GPU''': PowerVR SGX 535 |
* '''GPU''': PowerVR SGX 535 |
||
* '''A/V Playback''': PowerVR VXD |
* '''A/V Playback''': PowerVR VXD |
||
+ | * '''RAM''': 256 MB ([[K66AP|Apple TV (2nd generation)]], [[K48AP|iPad]], and [[N81AP|iPod touch (4th generation)]]) or 512 MB ([[iPhone 4]]) |
||
+ | [[Category:Application Processors]] |
||
− | These are the same specifications as the [[S5L8920]] and [[S5L8922]], except this processor has a higher clock speed. |
||
+ | Aside from the [[iPhone 4]]'s additional RAM and an overall higher clock speed, these are the same specifications as the [[S5L8920]] and [[S5L8922]]. |
||
== See also == |
== See also == |
||
− | * [[ |
+ | * [[Bootrom 574.4]] |
== Links == |
== Links == |
Latest revision as of 12:19, 2 November 2020
A system on a chip ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the A4. Internally, this processor is also based on the S5L8920X family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable bootrom vulnerability until the title was taken by checkm8.
Used in
Bootrom Exploits
Boot Chain
Bootrom->LLB->iBoot->Kernel->System Software
Specifications
- CPU: ARM Cortex-A8
- GPU: PowerVR SGX 535
- A/V Playback: PowerVR VXD
- RAM: 256 MB (Apple TV (2nd generation), iPad, and iPod touch (4th generation)) or 512 MB (iPhone 4)
Aside from the iPhone 4's additional RAM and an overall higher clock speed, these are the same specifications as the S5L8920 and S5L8922.