The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "S5L8930"
m (looked weird without the X being hyperlinked) |
|||
(19 intermediate revisions by 10 users not shown) | |||
Line 1: | Line 1: | ||
[[Image:A4.jpg|right]] |
[[Image:A4.jpg|right]] |
||
− | A [[wikipedia:system on a chip|system on a chip]] ("SoC") developed by Apple's in-house chip design department |
+ | A [[wikipedia:system on a chip|system on a chip]] ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the '''A4'''. Internally, this processor is also based on the [[S5L8920|S5L8920X]] family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable [[bootrom]] vulnerability until the title was taken by [[checkm8]]. |
− | == |
+ | == Used in == |
+ | * [[K66AP|Apple TV (2nd generation)]] |
||
+ | * [[K48AP|iPad]] |
||
+ | * [[iPhone 4]] |
||
+ | * [[N81AP|iPod touch (4th generation)]] |
||
− | + | == [[Bootrom]] Exploits == |
|
− | * [[limera1n]] |
+ | * [[Limera1n Exploit|limera1n]] |
* [[SHA-1 Image Segment Overflow|SHAtter]] |
* [[SHA-1 Image Segment Overflow|SHAtter]] |
||
− | |||
− | === [[iBoot]] === |
||
− | * [http://www.youtube.com/watch?v=0NValNoW5Rc Unreleased Untethered iBoot Exploit] |
||
− | |||
− | === [[Kernel]] === |
||
− | * [[BPF STX Kernel Write Exploit]] - Works up to [[iOS]] 3.2 |
||
− | * [[IOSurface Kernel Exploit]] - Works up to [[iOS]] 4.0.1 (excluding iOS 3.2.2) |
||
− | * [[Packet Filter Kernel Exploit]] - Works up to [[iOS]] 4.1 |
||
− | * [[HFS Legacy Volume Name Stack Buffer Overflow]] - Works up to [[iOS]] 4.2.8 |
||
− | * [[ndrv_setspec() Integer Overflow]] - Works up to [[iOS]] 4.3.3 |
||
− | * [[Incomplete Codesign Exploit]]- Works up to iOS 4.3.3 (excluding iOS 4.2.9/4.2.10) |
||
− | * [[Racoon String Format Overflow Exploit]]- Works up to iOS 5.0.1 |
||
− | * [[HFS Heap Overflow]] - Works up to iOS 5.0.1 |
||
− | |||
− | === [[Userland]] === |
||
− | * [[MobileBackup Copy Exploit]] - Works up to [[iOS]] 3.2 |
||
− | * [[Malformed CFF Vulnerability]] - Works up to [[iOS]] 4.0.1 (excluding iOS 3.2.2) |
||
− | *[[T1 Font Integer Overflow]]- Works up to [[iOS]] 4.3.3 (excluding 4.2.9 and 4.2.10) |
||
== Boot Chain == |
== Boot Chain == |
||
Line 33: | Line 19: | ||
* '''GPU''': PowerVR SGX 535 |
* '''GPU''': PowerVR SGX 535 |
||
* '''A/V Playback''': PowerVR VXD |
* '''A/V Playback''': PowerVR VXD |
||
− | * '''RAM''': 256 MB ([[ |
+ | * '''RAM''': 256 MB ([[K66AP|Apple TV (2nd generation)]], [[K48AP|iPad]], and [[N81AP|iPod touch (4th generation)]]) or 512 MB ([[iPhone 4]]) |
+ | [[Category:Application Processors]] |
||
Aside from the [[iPhone 4]]'s additional RAM and an overall higher clock speed, these are the same specifications as the [[S5L8920]] and [[S5L8922]]. |
Aside from the [[iPhone 4]]'s additional RAM and an overall higher clock speed, these are the same specifications as the [[S5L8920]] and [[S5L8922]]. |
||
Latest revision as of 12:19, 2 November 2020
A system on a chip ("SoC") developed by Apple's in-house chip design department. Publicly, Apple refers to this chip as the A4. Internally, this processor is also based on the S5L8920X family, which can also be seen through the reuse of several MMIO devices and MMIO device registers (i.e: chipid). This was the last SoC revision on mobile devices manufactured for Apple that has a publicly known exploitable bootrom vulnerability until the title was taken by checkm8.
Used in
Bootrom Exploits
Boot Chain
Bootrom->LLB->iBoot->Kernel->System Software
Specifications
- CPU: ARM Cortex-A8
- GPU: PowerVR SGX 535
- A/V Playback: PowerVR VXD
- RAM: 256 MB (Apple TV (2nd generation), iPad, and iPod touch (4th generation)) or 512 MB (iPhone 4)
Aside from the iPhone 4's additional RAM and an overall higher clock speed, these are the same specifications as the S5L8920 and S5L8922.