<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Morpheus</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Morpheus"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Morpheus"/>
	<updated>2026-04-29T20:37:00Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=74349</id>
		<title>Kernelcache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=74349"/>
		<updated>2019-06-06T18:25:19Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: new kernelcache format&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The kernelcache is basically the [[kernel]] itself as well as all of its extensions (AppleImage3NORAccess, IOAESAccelerator, IOPKEAccelerator, etc.) into one file, then packed/encrypted in an [[IMG3 File Format|IMG3]] (iPhone OS 2.0 and above) or [[S5L File Formats#8900|8900]] (iPhone OS 1.0 through 1.1.4) container.&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
&lt;br /&gt;
The joker tool, from http://newosxbook.com/ can be used to dump information from a decrypted kernelcache - including system call and Mach trap addresses (in the kernel) as well as a list of all the KEXTs contained therein and their load addresses. The output from a 6.1.3 kernelcache ([[N90AP|iPhone 4 (iPhone3,1)]]) using this tool, showing 153 kexts, is as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
KextCache begins at : 0x80396000 (File Offset: 3493888)&lt;br /&gt;
Kext: Libkern Pseudoextension @0x80396000 (File: 0xffffffff) (com.apple.kpi.libkern)&lt;br /&gt;
Kext: Mach Kernel Pseudoextension @0x8039e000 (File: 0x35d000) (com.apple.kpi.mach)&lt;br /&gt;
Kext: Unsupported Pseudoextension @0x8039f000 (File: 0x35e000) (com.apple.kpi.unsupported)&lt;br /&gt;
Kext: I/O Kit Pseudoextension @0x803a1000 (File: 0x360000) (com.apple.kpi.iokit)&lt;br /&gt;
Kext: Private Pseudoextension @0x803b8000 (File: 0x377000) (com.apple.kpi.private)&lt;br /&gt;
Kext: BSD Kernel Pseudoextension @0x803bd000 (File: 0x37c000) (com.apple.kpi.bsd)&lt;br /&gt;
Kext: AppleARMPlatform @0x803c3000 (File: 0x382000) (com.apple.driver.AppleARMPlatform)&lt;br /&gt;
Kext: AppleSamsungSPI @0x803fd000 (File: 0x3bc000) (com.apple.driver.AppleSamsungSPI)&lt;br /&gt;
Kext: MAC Framework Pseudoextension @0x80401000 (File: 0x3c0000) (com.apple.kpi.dsep)&lt;br /&gt;
Kext: IOCryptoAcceleratorFamily @0x80402000 (File: 0x3c1000) (com.apple.iokit.IOCryptoAcceleratorFamily)&lt;br /&gt;
Kext: AppleMobileFileIntegrity @0x80410000 (File: 0x3cf000) (com.apple.driver.AppleMobileFileIntegrity)&lt;br /&gt;
Kext: IOHIDFamily @0x80427000 (File: 0x3e6000) (com.apple.iokit.IOHIDFamily)&lt;br /&gt;
Kext: AppleEmbeddedLightSensor @0x80447000 (File: 0x406000) (com.apple.driver.AppleEmbeddedLightSensor)&lt;br /&gt;
Kext: I/O Kit USB Family @0x80453000 (File: 0x412000) (com.apple.iokit.IOUSBFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB User Clients @0x80483000 (File: 0x442000) (com.apple.iokit.IOUSBUserClient)&lt;br /&gt;
Kext: I/O Kit Driver for USB EHCI Controllers @0x80486000 (File: 0x445000) (com.apple.driver.AppleUSBEHCI)&lt;br /&gt;
Kext: I/O Kit Driver for USB OHCI Controllers @0x8049c000 (File: 0x45b000) (com.apple.driver.AppleUSBOHCI)&lt;br /&gt;
Kext: AppleD1815PMU @0x804a8000 (File: 0x467000) (com.apple.driver.AppleD1815PMU)&lt;br /&gt;
Kext: AppleARMPL080DMAC @0x804bf000 (File: 0x47e000) (com.apple.driver.AppleARMPL080DMAC)&lt;br /&gt;
Kext: AppleMultitouchSPI @0x804c3000 (File: 0x482000) (com.apple.driver.AppleMultitouchSPI)&lt;br /&gt;
Kext: AppleKernelStorage @0x804d7000 (File: 0x496000) (com.apple.platform.AppleKernelStorage)&lt;br /&gt;
Kext: I/O Kit Storage Family @0x804da000 (File: 0x499000) (com.apple.iokit.IOStorageFamily)&lt;br /&gt;
Kext: AppleDiskImageDriver @0x804f2000 (File: 0x4b1000) (com.apple.driver.DiskImages)&lt;br /&gt;
Kext: AppleDiskImagesKernelBacked @0x804fe000 (File: 0x4bd000) (com.apple.driver.DiskImages.KernelBacked)&lt;br /&gt;
Kext: AppleDiskImagesRAMBackingStore @0x8050a000 (File: 0x4c9000) (com.apple.driver.DiskImages.RAMBackingStore)&lt;br /&gt;
Kext: AppleJPEGDriver @0x8050d000 (File: 0x4cc000) (com.apple.driver.AppleJPEGDriver)&lt;br /&gt;
Kext: EncryptedBlockStorage @0x80517000 (File: 0x4d6000) (com.apple.iokit.EncryptedBlockStorage)&lt;br /&gt;
Kext: IOFlashStorage @0x8051f000 (File: 0x4de000) (com.apple.iokit.IOFlashStorage)&lt;br /&gt;
Kext: AppleTVOut @0x80538000 (File: 0x4f7000) (com.apple.driver.AppleTVOut)&lt;br /&gt;
Kext: AppleEmbeddedUSB @0x8053c000 (File: 0x4fb000) (com.apple.driver.AppleEmbeddedUSB)&lt;br /&gt;
Kext: I/O Kit Driver for USB Composite Devices @0x80545000 (File: 0x504000) (com.apple.driver.AppleUSBComposite)&lt;br /&gt;
Kext: I/O Kit Driver for USB Devices @0x8054a000 (File: 0x509000) (com.apple.driver.AppleUSBMergeNub)&lt;br /&gt;
Kext: AppleEmbeddedUSBHost @0x8054f000 (File: 0x50e000) (com.apple.driver.AppleEmbeddedUSBHost)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB OHCI Controllers @0x80554000 (File: 0x513000) (com.apple.driver.AppleUSBOHCIARM)&lt;br /&gt;
Kext: AppleHIDKeyboardEmbedded @0x80559000 (File: 0x518000) (com.apple.iokit.IOStreamFamily)&lt;br /&gt;
Kext: IOAudio2Family @0x8055e000 (File: 0x51d000) (com.apple.iokit.IOAudio2Family)&lt;br /&gt;
Kext: IOAVFamily @0x80568000 (File: 0x527000) (com.apple.iokit.IOAVFamily)&lt;br /&gt;
Kext: IODisplayPortFamily @0x8059d000 (File: 0x55c000) (com.apple.iokit.IODisplayPortFamily)&lt;br /&gt;
Kext: AppleSamsungDPTX @0x805b3000 (File: 0x572000) (com.apple.driver.AppleSamsungDPTX)&lt;br /&gt;
Kext: IODARTFamily @0x805d0000 (File: 0x58f000) (com.apple.driver.IODARTFamily)&lt;br /&gt;
Kext: Apple M2 Scaler and Color Space Converter Driver @0x805db000 (File: 0x59a000) (com.apple.driver.AppleM2ScalerCSCDriver)&lt;br /&gt;
Kext: IOSlaveProcessor @0x805ef000 (File: 0x5ae000) (com.apple.driver.IOSlaveProcessor)&lt;br /&gt;
Kext: AppleARM7M @0x805f4000 (File: 0x5b3000) (com.apple.driver.AppleARM7M)&lt;br /&gt;
Kext: AppleEffaceableStorage @0x805f8000 (File: 0x5b7000) (com.apple.driver.AppleEffaceableStorage)&lt;br /&gt;
Kext: LightweightVolumeManager @0x80602000 (File: 0x5c1000) (com.apple.driver.LightweightVolumeManager)&lt;br /&gt;
Kext: IOKit Serial Port Family @0x8060c000 (File: 0x5cb000) (com.apple.iokit.IOSerialFamily)&lt;br /&gt;
Kext: AppleOnboardSerial @0x80616000 (File: 0x5d5000) (com.apple.driver.AppleOnboardSerial)&lt;br /&gt;
Kext: AppleARMIISAudio @0x80624000 (File: 0x5e3000) (com.apple.iokit.AppleARMIISAudio)&lt;br /&gt;
Kext: HighlandParkAudioDevice @0x8062b000 (File: 0x5ea000) (com.apple.driver.HighlandParkAudioDevice)&lt;br /&gt;
Kext: AppleBasebandAudio @0x8065e000 (File: 0x61d000) (com.apple.driver.AppleBasebandAudio)&lt;br /&gt;
Kext: IOUSBDeviceFamily @0x80661000 (File: 0x620000) (com.apple.iokit.IOUSBDeviceFamily)&lt;br /&gt;
Kext: I/O Kit Networking Family @0x8066e000 (File: 0x62d000) (com.apple.iokit.IONetworkingFamily)&lt;br /&gt;
Kext: AppleUSBEthernetDevice @0x80688000 (File: 0x647000) (com.apple.driver.AppleUSBEthernetDevice)&lt;br /&gt;
Kext: AppleTCA6408GPIOIC @0x8068d000 (File: 0x64c000) (com.apple.driver.AppleTCA6408GPIOIC)&lt;br /&gt;
Kext: AppleNANDConfigAccess @0x80691000 (File: 0x650000) (com.apple.driver.AppleNANDConfigAccess)&lt;br /&gt;
Kext: AppleCDMA @0x80694000 (File: 0x653000) (com.apple.driver.AppleCDMA)&lt;br /&gt;
Kext: AppleNANDFTL @0x8069b000 (File: 0x65a000) (com.apple.driver.AppleNANDFTL)&lt;br /&gt;
Kext: IOAccessoryManager @0x806a4000 (File: 0x663000) (com.apple.iokit.IOAccessoryManager)&lt;br /&gt;
Kext: IOUserEthernet @0x806b8000 (File: 0x677000) (com.apple.iokit.IOUserEthernet)&lt;br /&gt;
Kext: AppleUSBAudio @0x806c0000 (File: 0x67f000) (com.apple.driver.AppleUSBAudio)&lt;br /&gt;
Kext: AppleDiskImagesUDIFDiskImage @0x806f0000 (File: 0x6af000) (com.apple.driver.DiskImages.UDIFDiskImage)&lt;br /&gt;
Kext: AppleS5L8930XUSB @0x806f7000 (File: 0x6b6000) (com.apple.driver.AppleS5L8930XUSB)&lt;br /&gt;
Kext: AppleEmbeddedGyro @0x806fb000 (File: 0x6ba000) (com.apple.driver.AppleEmbeddedGyro)&lt;br /&gt;
Kext: IOMobileGraphicsFamily @0x80704000 (File: 0x6c3000) (com.apple.iokit.IOMobileGraphicsFamily)&lt;br /&gt;
Kext: IOSurface @0x80713000 (File: 0x6d2000) (com.apple.iokit.IOSurface)&lt;br /&gt;
Kext: AppleDisplayPipe @0x80721000 (File: 0x6e0000) (com.apple.driver.AppleDisplayPipe)&lt;br /&gt;
Kext: AppleCLCD @0x80731000 (File: 0x6f0000) (com.apple.driver.AppleCLCD)&lt;br /&gt;
Kext: AppleS5L8930XDART @0x8073f000 (File: 0x6fe000) (com.apple.driver.AppleS5L8930XDART)&lt;br /&gt;
Kext: AppleEmbeddedGPS @0x80744000 (File: 0x703000) (com.apple.driver.AppleEmbeddedGPS)&lt;br /&gt;
Kext: AppleS5L8920X @0x8074a000 (File: 0x709000) (com.apple.driver.AppleS5L8920X)&lt;br /&gt;
Kext: PPP @0x80757000 (File: 0x716000) (com.apple.nke.ppp)&lt;br /&gt;
Kext: L2TP @0x80761000 (File: 0x720000) (com.apple.nke.l2tp)&lt;br /&gt;
Kext: AppleEmbeddedAccelerometer @0x80767000 (File: 0x726000) (com.apple.driver.AppleEmbeddedAccelerometer)&lt;br /&gt;
Kext: AppleSynopsysOTGDevice @0x8076d000 (File: 0x72c000) (com.apple.driver.AppleSynopsysOTGDevice)&lt;br /&gt;
Kext: FairPlayIOKit @0x80777000 (File: 0x736000) (com.apple.driver.FairPlayIOKit)&lt;br /&gt;
Kext: LSKDIOKit @0x807d7000 (File: 0x796000) (com.apple.driver.LSKDIOKit)&lt;br /&gt;
Kext: AppleAMC_r2 @0x807f5000 (File: 0x7b4000) (com.apple.driver.AppleAMC_r2)&lt;br /&gt;
Kext: AppleProfileFamily @0x8086e000 (File: 0x82d000) (com.apple.iokit.AppleProfileFamily)&lt;br /&gt;
Kext: AppleProfileTimestampAction @0x80899000 (File: 0x858000) (com.apple.driver.AppleProfileTimestampAction)&lt;br /&gt;
Kext: AppleAC3Passthrough @0x8089d000 (File: 0x85c000) (com.apple.driver.AppleAC3Passthrough)&lt;br /&gt;
Kext: IOTextEncryptionFamily @0x808a3000 (File: 0x862000) (com.apple.IOTextEncryptionFamily)&lt;br /&gt;
Kext: corecrypto @0x808a8000 (File: 0x867000) (com.apple.kec.corecrypto)&lt;br /&gt;
Kext: AppleUSBMike @0x808d3000 (File: 0x892000) (com.apple.driver.AppleUSBMike)&lt;br /&gt;
Kext: AppleProfileRegisterStateAction @0x808d7000 (File: 0x896000) (com.apple.driver.AppleProfileRegisterStateAction)&lt;br /&gt;
Kext: AppleDiskImagesFileBackingStore @0x808db000 (File: 0x89a000) (com.apple.driver.DiskImages.FileBackingStore)&lt;br /&gt;
Kext: AppleEmbeddedProx @0x808df000 (File: 0x89e000) (com.apple.driver.AppleEmbeddedProx)&lt;br /&gt;
Kext: AppleProfileReadCounterAction @0x808e7000 (File: 0x8a6000) (com.apple.driver.AppleProfileReadCounterAction)&lt;br /&gt;
Kext: BasebandSPI @0x808eb000 (File: 0x8aa000) (com.apple.driver.BasebandSPI)&lt;br /&gt;
Kext: AppleSerialMultiplexer @0x80905000 (File: 0x8c4000) (com.apple.driver.AppleSerialMultiplexer)&lt;br /&gt;
Kext: AppleNANDFirmware @0x80924000 (File: 0x8e3000) (com.apple.driver.AppleNANDFirmware)&lt;br /&gt;
Kext: AppleImage3NORAccess @0x80928000 (File: 0x8e7000) (com.apple.driver.AppleImage3NORAccess)&lt;br /&gt;
Kext: AppleSamsungSWI @0x80930000 (File: 0x8ef000) (com.apple.driver.AppleSamsungSWI)&lt;br /&gt;
Kext: AppleARMPL192VIC @0x80934000 (File: 0x8f3000) (com.apple.driver.AppleARMPL192VIC)&lt;br /&gt;
Kext: AppleIOPFMI @0x80937000 (File: 0x8f6000) (com.apple.driver.AppleIOPFMI)&lt;br /&gt;
Kext: IO80211Family @0x80947000 (File: 0x906000) (com.apple.iokit.IO80211Family)&lt;br /&gt;
Kext: Broadcom 802.11 Driver @0x80996000 (File: 0x955000) (com.apple.driver.AppleBCMWLANCore)&lt;br /&gt;
Kext: IOFlashNVRAM @0x80a04000 (File: 0x9c3000) (com.apple.driver.IOFlashNVRAM)&lt;br /&gt;
Kext: AppleSamsungSerial @0x80a0a000 (File: 0x9c9000) (com.apple.driver.AppleSamsungSerial)&lt;br /&gt;
Kext: AppleBasebandUSB @0x80a0e000 (File: 0x9cd000) (com.apple.driver.AppleBasebandUSB)&lt;br /&gt;
Kext: AppleRGBOUT @0x80a11000 (File: 0x9d0000) (com.apple.driver.AppleRGBOUT)&lt;br /&gt;
Kext: AppleBSDKextStarter @0x80a19000 (File: 0x9d8000) (com.apple.driver.AppleBSDKextStarter)&lt;br /&gt;
Kext: AppleSamsungMIPIDSI @0x80a1c000 (File: 0x9db000) (com.apple.driver.AppleSamsungMIPIDSI)&lt;br /&gt;
Kext: Regular Expression Matching Engine @0x80a21000 (File: 0x9e0000) (com.apple.kext.AppleMatch)&lt;br /&gt;
Kext: AppleLTC4099Charger @0x80a25000 (File: 0x9e4000) (com.apple.driver.AppleLTC4099Charger)&lt;br /&gt;
Kext: IOMikeyBusFamily @0x80a29000 (File: 0x9e8000) (com.apple.iokit.IOMikeyBusFamily)&lt;br /&gt;
Kext: AppleEmbeddedAudio @0x80a3b000 (File: 0x9fa000) (com.apple.driver.AppleEmbeddedAudio)&lt;br /&gt;
Kext: AppleCS42L61Audio @0x80a5c000 (File: 0xa1b000) (com.apple.driver.AppleCS42L61Audio)&lt;br /&gt;
Kext: IOP_s5l8930x_firmware @0x80a61000 (File: 0xa20000) (com.apple.driver.IOP_s5l8930x_firmware)&lt;br /&gt;
Kext: AppleBasebandN90 @0x80a8e000 (File: 0xa4d000) (com.apple.driver.AppleBasebandN90)&lt;br /&gt;
Kext: AppleMultitouchSPIN1F55 @0x80a97000 (File: 0xa56000) (com.apple.driver.AppleBluetooth)&lt;br /&gt;
Kext: AppleIntegratedProxALSSensor @0x80a9a000 (File: 0xa59000) (com.apple.driver.AppleIntegratedProxALSSensor)&lt;br /&gt;
Kext: AppleCDCSerialDevice @0x80aa4000 (File: 0xa63000) (com.apple.driver.AppleCDCSerialDevice)&lt;br /&gt;
Kext: H3 H264 Video Encoder @0x80aac000 (File: 0xa6b000) (com.apple.driver.H2H264VideoEncoderDriver)&lt;br /&gt;
Kext: AppleProfileKEventAction @0x80acd000 (File: 0xa8c000) (com.apple.driver.AppleProfileKEventAction)&lt;br /&gt;
Kext: AppleS5L8930XUSBPhy @0x80ad1000 (File: 0xa90000) (com.apple.driver.AppleS5L8930XUSBPhy)&lt;br /&gt;
Kext: IOKit SDIO Family @0x80ad5000 (File: 0xa94000) (com.apple.iokit.IOSDIOFamily)&lt;br /&gt;
Kext: AppleSamsungPKE @0x80ae5000 (File: 0xaa4000) (com.apple.driver.AppleSamsungPKE)&lt;br /&gt;
Kext: AppleIOPSDIO @0x80ae9000 (File: 0xaa8000) (com.apple.driver.AppleIOPSDIO)&lt;br /&gt;
Kext: Seatbelt sandbox policy @0x80af1000 (File: 0xab0000) (com.apple.security.sandbox)&lt;br /&gt;
Kext: AppleHIDKeyboard @0x80afc000 (File: 0xabb000) (com.apple.driver.AppleHIDKeyboard)&lt;br /&gt;
Kext: AppleKeyStore @0x80aff000 (File: 0xabe000) (com.apple.driver.AppleKeyStore)&lt;br /&gt;
Kext: AppleHDQGasGaugeControl @0x80b0c000 (File: 0xacb000) (com.apple.driver.AppleHDQGasGaugeControl)&lt;br /&gt;
Kext: Broadcom WLAN SDIO Bus Driver @0x80b10000 (File: 0xacf000) (com.apple.driver.AppleBCMWLANBusInterfaceSDIO)&lt;br /&gt;
Kext: I/O Kit HID Event Driver @0x80b21000 (File: 0xae0000) (com.apple.driver.AppleH3CameraInterface)&lt;br /&gt;
Kext: AppleDiskImagesReadWriteDiskImage @0x80b40000 (File: 0xaff000) (com.apple.driver.DiskImages.ReadWriteDiskImage)&lt;br /&gt;
Kext: AppleFSCompressionTypeZlib @0x80b43000 (File: 0xb02000) (com.apple.AppleFSCompression.AppleFSCompressionTypeZlib)&lt;br /&gt;
Kext: AppleUSBEthernet @0x80b48000 (File: 0xb07000) (com.apple.driver.AppleUSBEthernet)&lt;br /&gt;
Kext: EmbeddedIOP @0x80b51000 (File: 0xb10000) (com.apple.driver.EmbeddedIOP)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x80b59000 (File: 0xb18000) (com.apple.driver.AppleS5L8930X)&lt;br /&gt;
Kext: AppleSamsungI2S @0x80b63000 (File: 0xb22000) (com.apple.driver.AppleSamsungI2S)&lt;br /&gt;
Kext: AppleM68Buttons @0x80b67000 (File: 0xb26000) (com.apple.driver.AppleM68Buttons)&lt;br /&gt;
Kext: AppleVXD375 @0x80b6b000 (File: 0xb2a000) (com.apple.driver.AppleVXD375)&lt;br /&gt;
Kext: AppleUSBDeviceMux @0x80b87000 (File: 0xb46000) (com.apple.driver.AppleUSBDeviceMux)&lt;br /&gt;
Kext: PPTP @0x80b8f000 (File: 0xb4e000) (com.apple.nke.pptp)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x80b94000 (File: 0xb53000) (com.apple.iokit.IOUSBHIDDriver)&lt;br /&gt;
Kext: AppleMultitouchSPIZ2F13 @0x80b9a000 (File: 0xb59000) (com.apple.iokit.IOAcceleratorFamily)&lt;br /&gt;
Kext: IMGSGX535 Graphics Kernel Extension @0x80bb7000 (File: 0xb76000) (com.apple.IMGSGX535)&lt;br /&gt;
Kext: ApplePinotLCD @0x80be4000 (File: 0xba3000) (com.apple.driver.ApplePinotLCD)&lt;br /&gt;
Kext: I/O Kit Driver for USB Hubs @0x80be7000 (File: 0xba6000) (com.apple.driver.AppleUSBHub)&lt;br /&gt;
Kext: AppleEmbeddedCompass @0x80bf0000 (File: 0xbaf000) (com.apple.driver.AppleEmbeddedCompass)&lt;br /&gt;
Kext: AppleProfileThreadInfoAction @0x80bf8000 (File: 0xbb7000) (com.apple.driver.AppleProfileThreadInfoAction)&lt;br /&gt;
Kext: AppleBasebandCDC @0x80bfc000 (File: 0xbbb000) (com.apple.driver.AppleBasebandCDC)&lt;br /&gt;
Kext: AppleUSBEthernetHost @0x80c02000 (File: 0xbc1000) (com.apple.driver.AppleUSBEthernetHost)&lt;br /&gt;
Kext: AppleDPRepeater @0x80c07000 (File: 0xbc6000) (com.apple.driver.AppleDPRepeater)&lt;br /&gt;
Kext: I/O Kit HID Event Driver Safe Boot @0x80c36000 (File: 0xbf5000) (com.apple.driver.AppleCD3282Mikey)&lt;br /&gt;
Kext: tlsnke @0x80c3a000 (File: 0xbf9000) (com.apple.nke.tls)&lt;br /&gt;
Kext: AppleUSBHIDKeyboard @0x80c40000 (File: 0xbff000) (com.apple.driver.AppleUSBHIDKeyboard)&lt;br /&gt;
Kext: AppleProfileCallstackAction @0x80c43000 (File: 0xc02000) (com.apple.driver.AppleProfileCallstackAction)&lt;br /&gt;
Kext: AppleDiagnosticDataAccessReadOnly @0x80c47000 (File: 0xc06000) (com.apple.driver.AppleDiagnosticDataAccessReadOnly)&lt;br /&gt;
Kext: AppleNANDLegacyFTL @0x80c4a000 (File: 0xc09000) (com.apple.driver.AppleNANDLegacyFTL)&lt;br /&gt;
Kext: AppleTetheredDevice @0x80c78000 (File: 0xc37000) (com.apple.driver.AppleTetheredDevice)&lt;br /&gt;
Kext: AppleUSBHSIC @0x80c7b000 (File: 0xc3a000) (com.apple.driver.AppleUSBHSIC)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB EHCI Controllers @0x80c83000 (File: 0xc42000) (com.apple.driver.AppleUSBEHCIARM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As of the iPhone11 (iPhone XS/R) and iOS 12, Apple has moved to a new kernelcache format. This is recognizable by an LC_SOURCE_VERSION which is much Lower than that of XNU's (1469 for iOS12, 17xx for iOS13), likely an artifact of misconfiguration on Apple's side, since it matches the source version of the kernelcache builder.&lt;br /&gt;
&lt;br /&gt;
The new kernelcaches are monolithic and tightly linked, in that KEXT code is interspersed with the kernel's own. They are also fully stripped of all symbols. The joker tool's most useful feature, Kextraction (extracting kexts from the kernelcache) can therefore no longer be used (and, in fact, there is no straightforward way to extract kexts anymore from these caches). Joker has been superseded by jtool2's --analyze option, which can effectively symbolicate 1000s (3,000-8,000, depending on iOS version) of symbols.&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=YukonSeed_17A5492t_(iPhone11,2)&amp;diff=74348</id>
		<title>YukonSeed 17A5492t (iPhone11,2)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=YukonSeed_17A5492t_(iPhone11,2)&amp;diff=74348"/>
		<updated>2019-06-06T18:20:49Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Added key for 13b1 d321 - http://newosxbook.com/forum/viewtopic.php?f=7&amp;amp;t=19686&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iBoot.d321.RELEASE.im4p from iOS 13 beta 1 - &lt;br /&gt;
&lt;br /&gt;
Decrypted kbag for A12: 411934D668DAF37113BB49E0144174EF5E86E6A5FF42CACAA9DA9D728A3612965003A840FD65196FB17BFBA368E27F75&lt;br /&gt;
&lt;br /&gt;
(LLB/iBEC/iBSS are irrelevant - they're all the same image as iBoot)&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Up_to_Speed&amp;diff=67471</id>
		<title>Up to Speed</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Up_to_Speed&amp;diff=67471"/>
		<updated>2018-01-19T21:58:02Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;So, all of this sounds intimidating. [[Jailbreak]], sign, [[secpack]], [[unlock]], [[Baseband Device|baseband]], [[iBoot]], [[seczone]], [[JailbreakMe]], [[pwnage]] - there are lots of terms to learn, but most of them are defined here on the wiki. The basics:&lt;br /&gt;
&lt;br /&gt;
* [[Activation]] - to bypass the required [[iTunes]] signup.&lt;br /&gt;
* [[Jailbreak]] - to allow full write and execute privileges on any Apple TV, iPad, iPhone or iPod touch.&lt;br /&gt;
* [[Unlock]] - to allow the use of any mobile phone carrier's SIM.&lt;br /&gt;
&lt;br /&gt;
Think of iPhone as a little computer, even though Apple doesn't want you to. It has a [[S5L8900|processor]], RAM, a &amp;quot;[[NAND|hard drive]]&amp;quot;, an operating system, and a [[Baseband Device|cellular modem]] on the serial port.&lt;br /&gt;
&lt;br /&gt;
=== Ways to learn about how jailbreaks work ===&lt;br /&gt;
&lt;br /&gt;
''(If you're more interested in learning how to develop for jailbroken devices, such as extensions/tweaks, check out the [http://iphonedevwiki.net/index.php/Main_Page iPhoneDevWiki] instead.)''&lt;br /&gt;
&lt;br /&gt;
The basic idea here is that there are lots of ways to learn more about jailbreaking, for people of all experience levels and backgrounds. You might want to learn enough to actually find vulnerabilities in iOS (which is a huge undertaking), or you might just enjoy learning a little bit out of curiosity. Go through this list and pick something that looks fun to read!&lt;br /&gt;
&lt;br /&gt;
* You can read about general exploitation techniques on Wikipedia, starting with [https://en.wikipedia.org/wiki/Vulnerability_(computing)#Software_vulnerabilities software vulnerabilities] and [https://en.wikipedia.org/wiki/Privilege_escalation privilege escalation]. Learning about types of vulnerabilities can be fun even if you don't have any background yet in programming or security research - it's like learning about how puzzles work. To learn more about security research in general (useful for the beginner), try these links: [http://www.reddit.com/r/netsec/wiki/start Getting Started in Information Security by /r/netsec], [http://www.reddit.com/r/netsecstudents/wiki/resources /r/netsecstudents resources], and [http://pentest.cryptocity.net/ Application Security and Vulnerability Analysis].&lt;br /&gt;
&lt;br /&gt;
* To learn a bit about what a jailbreak actually does to an iOS device, [https://news.ycombinator.com/item?id=4127801 see this conversation with saurik] - it explains the main technical changes that a typical jailbreak accomplishes. Here's also another [http://www.reddit.com/r/jailbreak/comments/17q6tk/is_the_ios_jailbreak_scene_dumber_than_android_or/c87w1hg conversation with saurik with a bit about the history of iOS jailbreaking and comparing it to Android rooting] - &amp;quot;I often recommend that people who are interested in one day being able to hack something like iOS go spend some time cutting their teeth on simpler systems, such as Android&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
* Read [http://winocm.moe/research/2013/09/20/resources-for-getting-started/ winocm's recommendations for how to get started with iOS hacking]: learning ARM, understanding low-level parts of iOS, reading open source code in iOS and OS X, learning programming, learning about security/fuzzing, and then learning iOS-specific tools and tricks. She's also written a bunch of [http://winocm.moe/ other posts about iOS security research].&lt;br /&gt;
&lt;br /&gt;
* Read [http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123 ''iOS Hacker's Handbook''], published in May 2012: &amp;quot;The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* pod2g also [http://www.idownloadblog.com/2012/12/20/pod2g-interview/ recommends] these books: [http://www.amazon.com/gp/product/0470395362/ref=as_li_qf_sp_asin_il_tl ''Mac Hacker's Handbook''], [http://www.amazon.com/gp/product/0321278542/ref=as_li_qf_sp_asin_il_tl ''Mac OS X Internals: A Systems Approach''], and [http://www.amazon.com/gp/product/1597494860/ref=as_li_qf_sp_asin_il_tl ''A Guide to Kernel Exploitation: Attacking the Core'']. And here are even more that can be useful: [http://www.amazon.com/Mac-OS-iOS-Internals-Apples/dp/1118057651 ''Mac OS X and iOS Internals: To the Apple's Core''], [http://www.amazon.com/Hacking-Securing-iOS-Applications-Hijacking/dp/1449318746 ''Hacking and Securing iOS Applications''], [http://www.amazon.com/OS-X-iOS-Kernel-Programming/dp/1430235365 ''OS X and iOS Kernel Programming''], and [http://www.amazon.com/Professional-Cocoa-Application-Security-Graham/dp/0470525959 ''Professional Cocoa Application Security''].&lt;br /&gt;
&lt;br /&gt;
* Listen to the [[25C3 presentation &amp;quot;Hacking the iPhone&amp;quot;]]. This was in 2008, but it explains the basics in detail.&lt;br /&gt;
&lt;br /&gt;
* See [http://techchannel.att.com/play-video.cfm/2013/1/8/Conference-TV-CSAW-THREADS-2012-iOS-Jailbreak-Analysis the presentation &amp;quot;Strategic Analysis of the iOS Jailbreaking Development Community&amp;quot;] by Dino Dai Zovi in November 2012.&lt;br /&gt;
&lt;br /&gt;
* [[i0n1c]] has given several presentations on iOS jailbreaking techniques, and there are PDFs of his slides available online, including: [https://media.blackhat.com/bh-us-11/Esser/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf &amp;quot;iOS Kernel Exploitation&amp;quot;], [http://reverse.put.as/wp-content/uploads/2011/06/D2T1-Stefan-Esser-iPhone-Exploitation-One-ROPe-to-Bind-Them-All.pdf &amp;quot;iPhone Exploitation: One ROPe to bind them all?&amp;quot;], [http://antid0te.com/CSW2012_StefanEsser_iOS5_An_Exploitation_Nightmare_FINAL.pdf &amp;quot;iOS 5: An Exploitation Nightmare?&amp;quot;], and [http://www.slideshare.net/i0n1c/ruxcon-2014-stefan-esser-ios8-containers-sandboxes-and-entitlements &amp;quot;iOS8 Containers, Sandboxes and Entitlements&amp;quot;]. He has also recommended a couple of books: [http://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X ''The Shellcoder's Handbook''] and [http://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426 ''The Art of Software Security Assessment'']. You may also find it interesting to read [https://www.sektioneins.de/en/blog/13-07-03-trainingFrankfurt.html his outline for a workshop on developing kernel exploits] - note the requirements (knowing ARM assembly, ROP, buffer overflows, integer overflows; having access to IDA Pro, Hexrays, BinDiff).&lt;br /&gt;
&lt;br /&gt;
* Check out [http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit this analysis of JailbreakMe 3.0] ([[Saffron]]).&lt;br /&gt;
&lt;br /&gt;
* If you're interested in [[Baseband Device|baseband]] hacking and unofficial software unlocks, there are slides from a presentation by [[MuscleNerd]]: [http://conference.hitb.org/hitbsecconf2012ams/materials/D1T2%20-%20MuscleNerd%20-%20Evolution%20of%20iPhone%20Baseband%20and%20Unlocks.pdf &amp;quot;Evolution of the iPhone Baseband and Unlocks&amp;quot;] (PDF).&lt;br /&gt;
&lt;br /&gt;
* Members of the team that built [[Corona]] for iOS 5.0.1 gave presentations about it, and there are PDFs of their slides available here: [http://conference.hitb.org/hitbsecconf2012ams/materials/D2T2%20-%20Jailbreak%20Dream%20Team%20-%20Corona%20Jailbreak%20for%20iOS%205.0.1.pdf Corona for A4] and [http://conference.hitb.org/hitbsecconf2012ams/materials/D2T2%20-%20Jailbreak%20Dream%20Team%20-%20Absinthe%20Jailbreak%20for%20iOS%205.0.1.pdf Corona/Absinthe for A5].&lt;br /&gt;
&lt;br /&gt;
* Here's some analysis of [[evasi0n]] [http://blog.accuvant.com/bthomasaccuvant/evasi0n-jailbreaks-userland-component/ from Accuvant Labs] and [http://blog.azimuthsecurity.com/2013/02/from-usr-to-svc-dissecting-evasi0n.html from Azimuth Security], along with [http://www.forbes.com/sites/andygreenberg/2013/02/05/inside-evasi0n-the-most-elaborate-jailbreak-to-ever-hack-your-iphone/ a high-level explanation from planetbeing]. The evad3rs team gave [https://conference.hitb.org/hitbsecconf2013ams/materials/D2T1%20-%20Pod2g,%20Planetbeing,%20Musclenerd%20and%20Pimskeks%20aka%20Evad3rs%20-%20Swiping%20Through%20Modern%20Security%20Features.pdf a presentation about evasi0n with slides available]. geohot wrote a [http://geohot.com/e7writeup.html detailed analysis] of [[evasi0n7]].&lt;br /&gt;
&lt;br /&gt;
* Play with [http://damnvulnerableiosapp.com/ Damn Vulnerable iOS Application (DVIA)], &amp;quot;a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
* Study the available [[Open Source Jailbreaking Tools|open source jailbreaking tools]].&lt;br /&gt;
&lt;br /&gt;
* Read [[fuzzing]] for some explanation of how that technique has been used on iOS, and read [[how to reverse]] for some inspiration.&lt;br /&gt;
&lt;br /&gt;
* If you want to really get started, learn assembler for [[ARM]] processors. [http://opensecuritytraining.info/Training.html Open Security Training] has &amp;quot;Introduction to ARM&amp;quot; materials, for example.&lt;br /&gt;
&lt;br /&gt;
* [http://www.newosxbook.com/index.php?page=notes Jonathan Levin] posts interesting iOS reverse engineering research. His series of books on &amp;quot;*OS Internals&amp;quot; are a definitive reference. In particular, Volume III deals exclusively with security, insecurity, and dissects every modern jailbreak from evasi0n (6.0) through async_wake (11.1.2) in detail.&lt;br /&gt;
&lt;br /&gt;
===Now===&lt;br /&gt;
* Read the [[timeline]].&lt;br /&gt;
* Read the [[unsolved problems]] page to see where you can help.&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67470</id>
		<title>LiberiOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67470"/>
		<updated>2018-01-19T21:55:45Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = LiberiOS&lt;br /&gt;
 | title                  = LiberiOS&lt;br /&gt;
 | developer              = [https://twitter.com/Morpheus______ Jonathan Levin (@Morpheus______)]&lt;br /&gt;
 | released               = {{Start date|2017|12|25|df=yes}}&lt;br /&gt;
 | latest release version = 11.0.3&lt;br /&gt;
 | latest release date    = {{Start date and age|2018|01|19|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [http://newosxbook.com/liberios/ LiberiOS]&lt;br /&gt;
}}&lt;br /&gt;
'''LiberiOS''' is a [[semi-untethered jailbreak]] for devices running iOS 11.0 - 11.1.2. It was released on December 25, 2017, just one day after the tvOS 11 jailbreak [[LiberTV]]. This jailbreak, like its sibling, makes use of his [[QiLin]] Toolkit.&lt;br /&gt;
&lt;br /&gt;
The very first version of the jailbreak included [[Cydia]] for the purposes of shsh blob saving only, because [[saurik]] had yet to update it for iOS 11. On January 19, 2018, Jonathan stated he would never add Cydia support to LiberiOS, owing to derogatory remarks and false statements made by [[saurik]] on reddit forums. Although a complete jailbreak, LiberiOS is classified as a &amp;quot;dev&amp;quot; or &amp;quot;pro&amp;quot; jailbreak, meant primarily for security researchers and less for the tweak-phile.&lt;br /&gt;
&lt;br /&gt;
The jailbreak drops a complete set of Jonathan Levin's compiled binary utilities (from opensource.apple.com) into /jb (so as to negate any potential for conflict with existing binaries). Jonathan's own toolset is installed in /jb/usr/local/bin. The user can either move the binaries from the shell environment to their respective locations, or use /jb/makeMeAtHome.sh to set up paths and drop into a ZSH environment which will make use of these paths, thereby leaving the root filesystem almost unaffected. &lt;br /&gt;
&lt;br /&gt;
The jailbreak also disables auto updates by redirecting mesu.apple.com to 127.0.0.1. This has the side effect of making stock apps uninstallable. That said, this is not a real issue since they can be installed prior to jailbreaking, or at any time the mesu.apple.com entry can be removed from /etc/hosts. Other App Store applications are unaffected.&lt;br /&gt;
&lt;br /&gt;
== Version Change Log ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 11.0&lt;br /&gt;
| 25 December, 2017&lt;br /&gt;
| Initial release&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.1&lt;br /&gt;
| 29 December, 2017&lt;br /&gt;
|&lt;br /&gt;
*Now with a proper GUI thanks to the talented @horatiohno&lt;br /&gt;
*Supports all i-Devices, thanks to @ARX8x&lt;br /&gt;
*Also even more stable due to proper cleanup in one special case. Shouldn't crash on you, but let me know if it does.&lt;br /&gt;
*AMFId can be killed, be reborn, but will be just as debilitated :-)&lt;br /&gt;
*Arbitrary Dylib loading works. NO, CYDIA SUBSTRATE WON'T. Not my problem - @Saurik owns this one&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.3&lt;br /&gt;
| 19 January, 2018&lt;br /&gt;
| fixes for odd use cases. Most notably FAT self-signed. Should be diamond solid. QiLin API improved&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Semi-untethered_jailbreak&amp;diff=67469</id>
		<title>Semi-untethered jailbreak</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Semi-untethered_jailbreak&amp;diff=67469"/>
		<updated>2018-01-19T21:51:47Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''semi-untethered jailbreak''' is similar to an [[untethered jailbreak]], but it gives the ability to start the device on its own. On each boot, the device startup sequence is unmodified and it boots into its original, non-jailbroken configuration. However, rather than having to run a tool from a computer to jailbreak, like a [[tethered jailbreak|tethered]] or [[semi-tethered jailbreak|semi-tethered]] cases, the user is able to re-jailbreak their device with the help of an app (usually sideloaded using [[Cydia Impactor]]) running on their device. In the case of the iOS 9.2-9.3.3 jailbreak, a Safari-based exploit was available, thereby meaning a website could be used to rejailbreak.&lt;br /&gt;
&lt;br /&gt;
Some semi-untethered jailbreaks can be completed entirely on the device using a sideloaded app (which still requires a computer). Others require a computer to be used first, and then an app or website can be used to rejailbreak after each reboot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Semi-Untethered jailbreaks have become the norm, as the last known code signing bypass - which is required for execution on boot - has been exploited by Pangu with iOS 9.0-9.1 and the shared cache malformation bug.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*[[Jailbreak]]&lt;br /&gt;
*[[Jailbreak Exploits]]&lt;br /&gt;
*[[Untethered jailbreak]]&lt;br /&gt;
*[[Tethered jailbreak]]&lt;br /&gt;
*[[Semi-tethered jailbreak]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67468</id>
		<title>LiberiOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67468"/>
		<updated>2018-01-19T21:48:00Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Version Change Log */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = LiberiOS&lt;br /&gt;
 | title                  = LiberiOS&lt;br /&gt;
 | developer              = [https://twitter.com/Morpheus______ Jonathan Levin (@Morpheus______)]&lt;br /&gt;
 | released               = {{Start date|2017|12|25|df=yes}}&lt;br /&gt;
 | latest release version = 11.0.3&lt;br /&gt;
 | latest release date    = {{Start date and age|2018|01|19|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [http://newosxbook.com/liberios/ LiberiOS]&lt;br /&gt;
}}&lt;br /&gt;
'''LiberiOS''' is a [[semi-untethered jailbreak]] for devices running iOS 11.0 - 11.1.2. It was released on December 25, 2017, just one day after the tvOS 11 jailbreak [[LiberTV]]. This jailbreak, like its sibling, makes use of his [[QiLin]] Toolkit.&lt;br /&gt;
&lt;br /&gt;
The very first version of the jailbreak included [[Cydia]] for the purposes of shsh blob saving only, because [[saurik]] had yet to update it for iOS 11. On January 19, 2018, Jonathan stated he would never add Cydia support to LiberiOS, owing to derogatory remarks and false statements made by [[saurik]] on reddit forums. Although a complete jailbreak, LiberiOS is classified as a &amp;quot;dev&amp;quot; or &amp;quot;pro&amp;quot; jailbreak, meant primarily for security researchers and less for the tweak-phile.&lt;br /&gt;
&lt;br /&gt;
== Version Change Log ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 11.0&lt;br /&gt;
| 25 December, 2017&lt;br /&gt;
| Initial release&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.1&lt;br /&gt;
| 29 December, 2017&lt;br /&gt;
|&lt;br /&gt;
*Now with a proper GUI thanks to the talented @horatiohno&lt;br /&gt;
*Supports all i-Devices, thanks to @ARX8x&lt;br /&gt;
*Also even more stable due to proper cleanup in one special case. Shouldn't crash on you, but let me know if it does.&lt;br /&gt;
*AMFId can be killed, be reborn, but will be just as debilitated :-)&lt;br /&gt;
*Arbitrary Dylib loading works. NO, CYDIA SUBSTRATE WON'T. Not my problem - @Saurik owns this one&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.3&lt;br /&gt;
| 19 January, 2018&lt;br /&gt;
| fixes for odd use cases. Most notably FAT self-signed. Should be diamond solid. QiLin API improved&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67467</id>
		<title>LiberiOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=LiberiOS&amp;diff=67467"/>
		<updated>2018-01-19T21:46:36Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
 | name                   = LiberiOS&lt;br /&gt;
 | title                  = LiberiOS&lt;br /&gt;
 | developer              = [https://twitter.com/Morpheus______ Jonathan Levin (@Morpheus______)]&lt;br /&gt;
 | released               = {{Start date|2017|12|25|df=yes}}&lt;br /&gt;
 | latest release version = 11.0.3&lt;br /&gt;
 | latest release date    = {{Start date and age|2018|01|19|df=yes}}&lt;br /&gt;
 | operating system       = iOS&lt;br /&gt;
 | language               = English&lt;br /&gt;
 | genre                  = Jailbreaking&lt;br /&gt;
 | website                = [http://newosxbook.com/liberios/ LiberiOS]&lt;br /&gt;
}}&lt;br /&gt;
'''LiberiOS''' is a [[semi-untethered jailbreak]] for devices running iOS 11.0 - 11.1.2. It was released on December 25, 2017, just one day after the tvOS 11 jailbreak [[LiberTV]]. This jailbreak, like its sibling, makes use of his [[QiLin]] Toolkit.&lt;br /&gt;
&lt;br /&gt;
The very first version of the jailbreak included [[Cydia]] for the purposes of shsh blob saving only, because [[saurik]] had yet to update it for iOS 11. On January 19, 2018, Jonathan stated he would never add Cydia support to LiberiOS, owing to derogatory remarks and false statements made by [[saurik]] on reddit forums. Although a complete jailbreak, LiberiOS is classified as a &amp;quot;dev&amp;quot; or &amp;quot;pro&amp;quot; jailbreak, meant primarily for security researchers and less for the tweak-phile.&lt;br /&gt;
&lt;br /&gt;
== Version Change Log ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Date&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 11.0&lt;br /&gt;
| 25 December, 2017&lt;br /&gt;
| Initial release&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.1&lt;br /&gt;
| 29 December, 2017&lt;br /&gt;
|&lt;br /&gt;
*Now with a proper GUI thanks to the talented @horatiohno&lt;br /&gt;
*Supports all i-Devices, thanks to @ARX8x&lt;br /&gt;
*Also even more stable due to proper cleanup in one special case. Shouldn't crash on you, but let me know if it does.&lt;br /&gt;
*AMFId can be killed, be reborn, but will be just as debilitated :-)&lt;br /&gt;
*Arbitrary Dylib loading works. NO, CYDIA SUBSTRATE WON'T. Not my problem - @Saurik owns this one&lt;br /&gt;
|-&lt;br /&gt;
| 11.0.3&lt;br /&gt;
| 19 January, 2018&lt;br /&gt;
| fixes for odd use cases I never run into.. most notably FAT self-signed. Should be diamond solid.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=LiberTV&amp;diff=67466</id>
		<title>LiberTV</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=LiberTV&amp;diff=67466"/>
		<updated>2018-01-19T21:44:25Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
| name                   = LiberTV&lt;br /&gt;
| title                  = LiberTV&lt;br /&gt;
| screenshot             = [[File:LiberTV.jpg|250px]]&lt;br /&gt;
| developer              = [https://twitter.com/Morpheus______ Jonathan Levin (@Morpheus______)]&lt;br /&gt;
| released               = {{Start date and age|2017|03|03|df=yes}}&lt;br /&gt;
| latest release version = 1.1&lt;br /&gt;
| latest release date    = {{Start date and age|2017|12|25|df=yes}}&lt;br /&gt;
| language               = [[wikipedia:English|English]]&lt;br /&gt;
| status                 = Current&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://newosxbook.com/forum/viewtopic.php?f=12&amp;amp;t=16823 Version 1.0 (tvOS 10)]&amp;lt;br&amp;gt;[http://newosxbook.com/libertv/ Version 1.1 (tvOS 11)]&lt;br /&gt;
}}&lt;br /&gt;
'''LiberTV''' is a [[semi-untethered jailbreak]] released for [[tvOS]]. Developed by Jonathan Levin (Morpheus), the original LiberTV was released on March 3, 2017, supporting tvOS 10.0-10.1. A new version was released on December 24, 2017, supporting tvOS 11.0-11.1.&lt;br /&gt;
&lt;br /&gt;
LiberTV works in the same way as [[yalu]] and the later versions of [[Pangu9]], by sideloading an IPA using [[saurik]]'s [[Cydia Impactor]].&lt;br /&gt;
&lt;br /&gt;
After Version 1.0 was released, Levin stated that LiberTV is also able to support tvOS 9.1-9.2.2, and support will come in a future update. However, this never happened. Levin also stated that support for tvOS 10.1.1 is possible, and that LiberTV would be updated for 9.1-10.1.1 once he has found a suitable bug. This update was never released as he instead opted to release an 11.0-11.1 version instead. &lt;br /&gt;
&lt;br /&gt;
Because the 11.x uses a bug that was introduced in XNU 4570 (proc_info list_uptrs) for its information leak, there are no plans to back port LiberTV to older versions, which are obsolete anyway. LiberTV 11 is the first jailbreak to make use of the [[QiLin]] toolkit&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=QiLin&amp;diff=67465</id>
		<title>QiLin</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=QiLin&amp;diff=67465"/>
		<updated>2018-01-19T21:43:49Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Created page with &amp;quot;The QiLin (麒麟) Toolkit was developed by Jonathan Levin to provide a standardized API for present and future jailbreaks. Having noticed that most PoC exploits end up provid...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The QiLin (麒麟) Toolkit was developed by Jonathan Levin to provide a standardized API for present and future jailbreaks. Having noticed that most PoC exploits end up providing the kernel_task send right, Jonathan Levin came up with the idea of providing a full post-exploitation toolkit with a simple API that could easily be compiled against and linked with.&lt;br /&gt;
&lt;br /&gt;
The QiLin homepage (http://www.NewOSXBook.com/QiLin/) contains the object file required (qilin.o) and the header file (qilin.h). Once these are dropped into an XCode project, QiLin can be used for numerous tasks, including:&lt;br /&gt;
&lt;br /&gt;
 - Unsandboxing a process&lt;br /&gt;
 - Entitling a process&lt;br /&gt;
 - Bestowing root privileges&lt;br /&gt;
 - Entitling a process&lt;br /&gt;
 - Unpacking binary utilities&lt;br /&gt;
 - Bestowing platform binary status&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A full writeup about how QiLin operates can be found in MacOS Internals, Volume III - Chapter 25, which is also available as a free download from http://NewOSXBook.com/QiLin/qilin.pdf&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=LiberTV&amp;diff=67464</id>
		<title>LiberTV</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=LiberTV&amp;diff=67464"/>
		<updated>2018-01-19T21:38:44Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
| name                   = LiberTV&lt;br /&gt;
| title                  = LiberTV&lt;br /&gt;
| screenshot             = [[File:LiberTV.jpg|250px]]&lt;br /&gt;
| developer              = [https://twitter.com/Morpheus______ Jonathan Levin (@Morpheus______)]&lt;br /&gt;
| released               = {{Start date and age|2017|03|03|df=yes}}&lt;br /&gt;
| latest release version = 1.1&lt;br /&gt;
| latest release date    = {{Start date and age|2017|12|25|df=yes}}&lt;br /&gt;
| language               = [[wikipedia:English|English]]&lt;br /&gt;
| status                 = Current&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://newosxbook.com/forum/viewtopic.php?f=12&amp;amp;t=16823 Version 1.0 (tvOS 10)]&amp;lt;br&amp;gt;[http://newosxbook.com/libertv/ Version 1.1 (tvOS 11)]&lt;br /&gt;
}}&lt;br /&gt;
'''LiberTV''' is a [[semi-untethered jailbreak]] released for [[tvOS]]. Developed by Jonathan Levin (Morpheus), the original LiberTV was released on March 3, 2017, supporting tvOS 10.0-10.1. A new version was released on December 24, 2017, supporting tvOS 11.0-11.1.&lt;br /&gt;
&lt;br /&gt;
LiberTV works in the same way as [[yalu]] and the later versions of [[Pangu9]], by sideloading an IPA using [[saurik]]'s [[Cydia Impactor]].&lt;br /&gt;
&lt;br /&gt;
After Version 1.0 was released, Levin stated that LiberTV is also able to support tvOS 9.1-9.2.2, and support will come in a future update. However, this never happened. Levin also stated that support for tvOS 10.1.1 is possible, and that LiberTV would be updated for 9.1-10.1.1 once he has found a suitable bug. This update was never released as he instead opted to release an 11.0-11.1 version instead. &lt;br /&gt;
&lt;br /&gt;
Because the 11.x uses a bug that was introduced in XNU 4570 (proc_info list_uptrs) for its information leak, there are no plans to back port LiberTV to older versions, which are obsolete anyway.&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=TvOS&amp;diff=55829</id>
		<title>TvOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=TvOS&amp;diff=55829"/>
		<updated>2017-02-28T00:57:58Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Research */ TvOS JB update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''tvOS''' is the operating system that is used on the [[Apple TV]], as of the [[J42dAP|Apple TV 4G]]. It's a forked version of [[iOS]]. The first version released was stylized and marketed as tvOS 9.0, which was based on iOS 9.1.&lt;br /&gt;
&lt;br /&gt;
== Research ==&lt;br /&gt;
Since the first public version of tvOS, Apple provides a complete filesystem image in the form of an OTA update. This allows people to reconstruct the entire system partition along with all binaries, in order to perform static analysis on them. &lt;br /&gt;
&lt;br /&gt;
Additionally, Apple has not actually fixed any bugs from Pangu's iOS 9.0.x jailbreak in iOS 9.1 aside from the kernel exploit (CVE-2015-6974). Because of this, Pangu9 could be modified (notably, exploiting a different kernel vulnerability) to jailbreak tvOS 9.0.&lt;br /&gt;
&lt;br /&gt;
An overview analysis of tvOS OTA updates can be found in http://newosxbook.com/articles/OTA3.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Yalu Jailbreak has been ported to support TvOS versions 10.0-10.1. q.v. http://newosxbook.com/forum/viewtopic.php?f=11&amp;amp;t=16820&amp;amp;p=18268#p18268&lt;br /&gt;
[[Category:Firmware]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Yalu&amp;diff=55828</id>
		<title>Yalu</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Yalu&amp;diff=55828"/>
		<updated>2017-02-28T00:56:22Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* yalu102 */  TvOS edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| name                   = yalu&lt;br /&gt;
| title                  = yalu&lt;br /&gt;
| author                 = [https://twitter.com/qwertyoruiop Luca Todesco (qwertyoruiop)]&lt;br /&gt;
| developer              = [https://twitter.com/qwertyoruiop Luca Todesco (qwertyoruiop)]&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest prerelease version = 102-beta 1&lt;br /&gt;
| language               = [[wikipedia:English|English]]&lt;br /&gt;
| status                 = Beta&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://yalu.qwertyoruiop.com yalu]&lt;br /&gt;
}}&lt;br /&gt;
''yalu'' is a series of [[untethered jailbreak]]s released for iOS. Developed by Luca Todesco (qwertyoruiop), yalu was initially released as an incomplete iOS 8.4.1 code sign and sandbox bypass, which has since been added to by others. Todesco then released a new version of yalu in beta, in the form of an IPA, supporting some devices running iOS 10.1-10.1.1.&lt;br /&gt;
&lt;br /&gt;
==The incomplete 8.4.1 yalu==&lt;br /&gt;
Released [https://github.com/kpwn/yalu on GitHub], yalu for 8.4.1 supports various unknown devices. Some users have managed to use the code released to achieve a fully untethered jailbreak, but nothing has been publicly released. &lt;br /&gt;
&lt;br /&gt;
==yalu for iOS 10.1-10.1.1==&lt;br /&gt;
Sometimes known as ''YaluX'' or ''yalu + mach_portal'', yalu for iOS 10.1 is currently in beta, and supports the iPad Pro, the iPhone 6s and 6s Plus, the iPhone SE and the iPhone 7 and 7 Plus. Issues have arisen with devices using TSMC manufactured chips.&lt;br /&gt;
&lt;br /&gt;
When initially released, the jailbreak was intended for developers only, and users are warned about the jailbreak being unstable and buggy. Substrate is deliberately broken in an attempt to deter users from using it. However, several fixes have been made available, many resulting in issues with tweaks and forcing some users to restore. &lt;br /&gt;
&lt;br /&gt;
The jailbreak utilizes several of Ian Beer's exploits discovered in the kernel of iOS 10.1. &lt;br /&gt;
&lt;br /&gt;
Several beta versions have been released, with the latest, beta 4 and beta 4-1 being retracted due to bugs and errors. Beta 3 is the latest 'stable' working version. &lt;br /&gt;
&lt;br /&gt;
The jailbreak is patched as of iOS 10.2, though Todesco has said he will update yalu to support iOS 10.2. &lt;br /&gt;
&lt;br /&gt;
yalu is downloaded as an IPA, and sideloaded onto the device using [[saurik]]'s [[Cydia Impactor]].&lt;br /&gt;
&lt;br /&gt;
==yalu102==&lt;br /&gt;
On January 25, 2017, Todesco released the incomplete source code to a new version of Yalu, one supporting every version from iOS 10.0 through 10.2, onto [https://github.com/kpwn/yalu102 GitHub].&lt;br /&gt;
On January 26, he formally released an &amp;quot;alpha, beta 1&amp;quot; version of this on his site in the form of an IPA. This jailbreak has support for Cydia Substrate, and works on the iPad Pro, iPhone 6s and iPhone SE.&lt;br /&gt;
&lt;br /&gt;
On January 29, yalu102 was officially updated to support all 64-bit devices on iOS 10.2, excluding the iPad Air 2, iPad mini 4, and all iPhone 7 models.&lt;br /&gt;
&lt;br /&gt;
On January 30, yalu102 was officially updated to support all 64-bit devices on iOS 10.2, excluding the iPhone 7 and iPhone 7 Plus.&lt;br /&gt;
&lt;br /&gt;
On February 26th, yalu102 was unofficially ported to support TvOS (up to and including 10.1) , marking the first Jailbreak for TVOS 10.x and demonstrating the universality of the Mach voucher bug, upon which it was based.&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=53577</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=53577"/>
		<updated>2016-07-24T11:15:25Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Undo revision 53576 by Morpheus (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Iptwiki.png|center]]&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Status ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size:1em; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | [[Models|Device]]&lt;br /&gt;
! [[Apple Watch]]&lt;br /&gt;
! [[Apple TV 3G]]&lt;br /&gt;
! [[J42dAP|Apple TV 4G]]&lt;br /&gt;
! [[iPad 2]] and up&lt;br /&gt;
! [[iPad mini]] and up&lt;br /&gt;
! [[iPhone 4S]] and up&lt;br /&gt;
! [[iPod touch 5G]] and up&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | Latest public [[firmware]]&lt;br /&gt;
| 2.2.2 &amp;lt;small&amp;gt;(13V604)&amp;lt;/small&amp;gt;&lt;br /&gt;
| 7.2.1/8.4.1 &amp;lt;small&amp;gt;(12H523)&amp;lt;/small&amp;gt;&lt;br /&gt;
| 9.2.2 &amp;lt;small&amp;gt;(13Y825)&amp;lt;/small&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; | 9.3.3 &amp;lt;small&amp;gt;(13G34)&amp;lt;/small&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | Jailbreak available?&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{no}}&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;small&amp;gt;For older devices and versions, see [[Jailbreak]].&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Software ==&lt;br /&gt;
* [[Apple Internal Apps]]&lt;br /&gt;
* [[:Category:File Formats|File formats]]&lt;br /&gt;
* [[/|Filesystem]]&lt;br /&gt;
* [[Firmware]]&lt;br /&gt;
** [[Beta Firmware]]&lt;br /&gt;
** [[Factory Firmware]]&lt;br /&gt;
** [[OTA Updates]]&lt;br /&gt;
* [[iTunes]]&lt;br /&gt;
** [[iTunes Errors]]&lt;br /&gt;
** [[iTunes Modes]]&lt;br /&gt;
** [[MobileDevice Library]]&lt;br /&gt;
* [[Keys]]&lt;br /&gt;
** [[AES Keys]]&lt;br /&gt;
** [[CERT|Apple Certificate]]&lt;br /&gt;
** [[Baseband RSA Keys|RSA Keys]]&lt;br /&gt;
** [[Baseband TEA Keys|TEA Keys]]&lt;br /&gt;
** [[Firmware Keys]]&lt;br /&gt;
*** [[Decrypting Firmwares]]&lt;br /&gt;
** [[GID Key]]&lt;br /&gt;
** [[NCK]]&lt;br /&gt;
* [[Protocols]]&lt;br /&gt;
** [[Baseband Bootrom Protocol]]&lt;br /&gt;
** [[DFU (Protocol)|DFU]]&lt;br /&gt;
** [[Interactive Mode|Baseband Bootloader Protocol]]&lt;br /&gt;
** [[Normal Mode]]&lt;br /&gt;
** [[Recovery Mode (Protocols)|Recovery Mode]]&lt;br /&gt;
** [[Restore Mode]]&lt;br /&gt;
* [[System Log|System Log (syslog)]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Jailbreaks|Jailbreak Software]] ====&lt;br /&gt;
* [[Absinthe]]&lt;br /&gt;
* [[blackra1n]]&lt;br /&gt;
* [[Corona]]&lt;br /&gt;
* [[evasi0n]]&lt;br /&gt;
* [[evasi0n7]]&lt;br /&gt;
* [[Geeksn0w]]&lt;br /&gt;
* [[Greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
* [[JailbreakMe]]&lt;br /&gt;
* [[limera1n]]&lt;br /&gt;
* [[p0sixspwn]]&lt;br /&gt;
* [[Pangu]]&lt;br /&gt;
* [[Pangu8]]&lt;br /&gt;
* [[Pangu9]]&lt;br /&gt;
* [[PPJailbreak]]&lt;br /&gt;
* [[purplera1n]]&lt;br /&gt;
* [[PwnageTool]]&lt;br /&gt;
* [[redsn0w]]&lt;br /&gt;
* [[Rocky Racoon]]&lt;br /&gt;
* [[Seas0nPass]]&lt;br /&gt;
* [[sn0wbreeze]]&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[TaiG]]&lt;br /&gt;
* [[unthredera1n]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Patches|Patches]] ====&lt;br /&gt;
* [[Kernel Patches|Kernel]]&lt;br /&gt;
** [[AMFI Binary Trust Cache Patch]]&lt;br /&gt;
** [[PE i can has debugger Patch]]&lt;br /&gt;
** [[Sandbox Patch]]&lt;br /&gt;
** [[Vm map enter Patch]]&lt;br /&gt;
** [[Vm map protect Patch]]&lt;br /&gt;
* [[:Category:Ramdisk Patches|Ramdisk]]: [[ASR]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Exploits|Vulnerabilities and Exploits]] ====&lt;br /&gt;
* [[0x24000 Segment Overflow]] (24kpwn)&lt;br /&gt;
* [[BPF STX Kernel Write Exploit]]&lt;br /&gt;
* [[CVE-2013-0964]]&lt;br /&gt;
* [[HFS Heap Overflow]]&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]] (feedface)&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]]&lt;br /&gt;
* [[Limera1n Exploit]]&lt;br /&gt;
* [[Malformed CFF Vulnerability]]&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]]&lt;br /&gt;
* [[SHA-1 Image Segment Overflow]] (SHAtter)&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]]&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (steaks4uce)&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
====Various Software====&lt;br /&gt;
* [[Cydia.app|Cydia]]&lt;br /&gt;
* [[EDA]]&lt;br /&gt;
* [[iFaith]]&lt;br /&gt;
* [[SemiRestore7]]&lt;br /&gt;
* [[SemiRestore8]]&lt;br /&gt;
* [[SemiRestore9]]&lt;br /&gt;
* [[Sund0wn]]&lt;br /&gt;
* [[TinyUmbrella]]&lt;br /&gt;
&lt;br /&gt;
====Bad stuff====&lt;br /&gt;
* [[Malware for iOS]]&lt;br /&gt;
* [[Misuse of enterprise and developer certificates]]&lt;br /&gt;
* [[Scam Jailbreaks and Unlocks]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Hardware ==&lt;br /&gt;
==== Devices ====&lt;br /&gt;
{{see also|Models|Prototypes}}&lt;br /&gt;
* [[List of Apple TVs|Apple TV]]&lt;br /&gt;
** Apple TV 2G ([[K66AP]])&lt;br /&gt;
** [[Apple TV 3G]] ([[J33AP]], [[J33IAP]])&lt;br /&gt;
** Apple TV 4G ([[J42dAP]])&lt;br /&gt;
* [[Apple Watch]]&lt;br /&gt;
** 38&amp;amp;nbsp;mm ([[N27aAP]])&lt;br /&gt;
** 42&amp;amp;nbsp;mm ([[N28aAP]])&lt;br /&gt;
* [[List of iPads|iPad]]&lt;br /&gt;
** iPad ([[K48AP]])&lt;br /&gt;
** [[iPad 2]] ([[K93AP]], [[K94AP]], [[K95AP]], [[K93AAP]])&lt;br /&gt;
** [[iPad 3]] ([[J1AP]], [[J2AP]], [[J2AAP]])&lt;br /&gt;
** [[iPad 4]] ([[P101AP]], [[P102AP]], [[P103AP]])&lt;br /&gt;
** [[iPad Air]] ([[J71AP]], [[J72AP]], [[J73AP]])&lt;br /&gt;
** [[iPad Air 2]] ([[J81AP]], [[J82AP]])&lt;br /&gt;
** [[iPad Pro (12.9 inch)]] ([[J98aAP]], [[J99aAP]])&lt;br /&gt;
** [[iPad Pro (9.7 inch)]] ([[J127AP]], [[J128AP]])&lt;br /&gt;
* [[List of iPad minis|iPad mini]]&lt;br /&gt;
** [[iPad mini]] ([[P105AP]], [[P106AP]], [[P107AP]])&lt;br /&gt;
** [[iPad mini 2]] ([[J85AP]], [[J86AP]], [[J87AP]])&lt;br /&gt;
** [[iPad mini 3]] ([[J85mAP]], [[J86mAP]], [[J87mAP]])&lt;br /&gt;
** [[iPad mini 4]] ([[J96AP]], [[J97AP]])&lt;br /&gt;
* [[List of iPhones|iPhone]]&lt;br /&gt;
** iPhone ([[M68AP]])&lt;br /&gt;
** iPhone 3G ([[N82AP]])&lt;br /&gt;
** iPhone 3GS ([[N88AP]])&lt;br /&gt;
** [[iPhone 4]] ([[N90AP]], [[N90BAP]], [[N92AP]])&lt;br /&gt;
** iPhone 4S ([[N94AP]])&lt;br /&gt;
** [[iPhone 5]] ([[N41AP]], [[N42AP]])&lt;br /&gt;
** [[iPhone 5c]] ([[N48AP]], [[N49AP]])&lt;br /&gt;
** [[iPhone 5s]] ([[N51AP]], [[N53AP]])&lt;br /&gt;
** iPhone 6 ([[N61AP]])&lt;br /&gt;
** iPhone 6 Plus ([[N56AP]])&lt;br /&gt;
** [[iPhone 6s]] ([[N71AP]], [[N71mAP]])&lt;br /&gt;
** [[iPhone 6s Plus]] ([[N66AP]], [[N66mAP]])&lt;br /&gt;
** [[iPhone SE]] ([[N69AP]], [[N69uAP]])&lt;br /&gt;
* [[List of iPod touches|iPod touch]]&lt;br /&gt;
** iPod touch ([[N45AP]])&lt;br /&gt;
** iPod touch 2G ([[N72AP]])&lt;br /&gt;
** iPod touch 3G ([[N18AP]])&lt;br /&gt;
** iPod touch 4G ([[N81AP]])&lt;br /&gt;
** [[iPod touch 5G]] ([[N78AP]], [[N78aAP]])&lt;br /&gt;
** iPod touch 6G ([[N102AP]])&lt;br /&gt;
&lt;br /&gt;
==== [[Application Processor]]s ====&lt;br /&gt;
* [[S5L8900]] ([[M68AP|iPhone]], [[N45AP|iPod touch]], [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[S5L8720]] ([[N72AP|iPod touch 2G]])&lt;br /&gt;
* [[S5L8920]] ([[N88AP|iPhone 3GS]])&lt;br /&gt;
* [[S5L8922]] ([[N18AP|iPod touch 3G]])&lt;br /&gt;
* [[S5L8930]] A4 ([[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch 4G]], [[K66AP|Apple TV 2G]])&lt;br /&gt;
* [[S5L8940]] A5 ([[K93AP|iPad 2 (iPad2,1)]], [[K94AP|iPad 2 (iPad2,2)]], [[K95AP|iPad 2 (iPad2,3)]], [[N94AP|iPhone 4S]])&lt;br /&gt;
* [[S5L8942]] A5 Rev A ([[J33AP|Apple TV 3G (AppleTV3,1)]], [[K93AAP|iPad 2 (iPad2,4)]], [[iPod touch 5G]], [[iPad mini]])&lt;br /&gt;
* [[S5L8945]] A5X ([[iPad 3]])&lt;br /&gt;
* [[S5L8947]] A5 Rev B ([[J33IAP|Apple TV 3G (AppleTV3,2)]])&lt;br /&gt;
* [[S5L8950]] A6 ([[iPhone 5]], [[iPhone 5c]])&lt;br /&gt;
* [[S5L8955]] A6X ([[iPad 4]])&lt;br /&gt;
* [[S5L8960]] A7 ([[iPhone 5s]], [[iPad mini 2]], [[iPad mini 3]])&lt;br /&gt;
* [[S5L8965]] A7 Variant ([[iPad Air]])&lt;br /&gt;
* [[T7000]] A8 ([[J42dAP|Apple TV 4G]], [[iPad mini 4]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[N102AP|iPod touch 6G]])&lt;br /&gt;
* [[T7001]] A8X ([[iPad Air 2]])&lt;br /&gt;
* [[S7002]] S1 ([[Apple Watch]])&lt;br /&gt;
* [[S8000]] A9 ([[wikipedia:Samsung Electronics|Samsung]]) ([[N71AP|iPhone 6s]], [[N66AP|iPhone 6s Plus]], [[N69uAP|iPhone SE]])&lt;br /&gt;
* [[S8001]] A9X ([[iPad Pro]])&lt;br /&gt;
* [[S8003]] A9 ([[wikipedia:TSMC|TSMC]]) ([[N71mAP|iPhone 6s]], [[N66mAP|iPhone 6s Plus]], [[N69AP|iPhone SE]])&lt;br /&gt;
&lt;br /&gt;
==== [[Baseband Device]]s ====&lt;br /&gt;
* [[S-Gold 2|PMB8876 or S-Gold 2]] ([[M68AP|iPhone]])&lt;br /&gt;
* [[X-Gold 608|PMB8878 or X-Gold 608]] ([[N82AP|iPhone 3G]], [[N88AP|iPhone 3GS]], [[K48AP|iPad (3G model)]])&lt;br /&gt;
* [[XMM6180|XMM6180 or X-Gold 618]] ([[iPhone 4]] ([[N90AP|iPhone3,1]], [[N90BAP|iPhone3,2]]), [[K94AP|iPad 2 (iPad2,2)]])&lt;br /&gt;
* [[MDM6600]] ([[N92AP|iPhone 4 (iPhone3,3)]], [[K95AP|iPad 2 (iPad2,3)]])&lt;br /&gt;
* [[MDM6610]] ([[N94AP|iPhone 4S]])&lt;br /&gt;
* [[MDM9600]] ([[iPad 3]])&lt;br /&gt;
* [[MDM9615]] ([[iPad 4]], [[iPad Air]] , [[iPad mini]], [[iPad mini 2]], [[iPad mini 3]], [[iPhone 5]], [[iPhone 5c]], [[iPhone 5s]])&lt;br /&gt;
* [[MDM9625]] ([[iPad Air 2]], [[iPad Pro (12.9 inch)]], [[iPad mini 4]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[iPhone SE]])&lt;br /&gt;
* [[MDM9635]] ([[iPad Pro (9.7 inch)]], [[iPhone 6s]], [[iPhone 6s Plus]])&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Development ==&lt;br /&gt;
==== [[:Category:Hackers|iPhone Hackers]] ====&lt;br /&gt;
* [[User:chpwn|chpwn]]&lt;br /&gt;
* [[User:comex|comex]]&lt;br /&gt;
* [[User:geohot|geohot]]&lt;br /&gt;
* [[User:iH8sn0w|iH8sn0w]]&lt;br /&gt;
* [[User:MuscleNerd|MuscleNerd]]&lt;br /&gt;
* [[pimskeks]]&lt;br /&gt;
* [[User:planetbeing|planetbeing]]&lt;br /&gt;
* [[User:pod2g|pod2g]]&lt;br /&gt;
* [[User:posixninja|posixninja]]&lt;br /&gt;
* [[saurik]]&lt;br /&gt;
* [[User:winocm|winocm]]&lt;br /&gt;
&lt;br /&gt;
==== iPhone Hacker Teams ====&lt;br /&gt;
* [[Chronic Dev (team)|Chronic Dev]]&lt;br /&gt;
* [[iPhone Dev Team]]&lt;br /&gt;
* [[Dream Team]]&lt;br /&gt;
* [[Evad3rs|evad3rs]]&lt;br /&gt;
&lt;br /&gt;
==== Application Development ====&lt;br /&gt;
* [[Bypassing iPhone Code Signatures]]&lt;br /&gt;
* [[/System/Library/Frameworks|Frameworks]]&lt;br /&gt;
* [[Misuse of developer certificates]]&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Mobile Substrate]]&lt;br /&gt;
* [[Toolchain]] (Includes tutorials)&lt;br /&gt;
* [[Toolchain 2.0]] (Includes tutorials)&lt;br /&gt;
* [http://iphonedevwiki.net iPhoneDevWiki]&lt;br /&gt;
&lt;br /&gt;
==== Application Copy Protection ====&lt;br /&gt;
* [[Bugging Debuggers]]&lt;br /&gt;
* [[Copy Protection Overview]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Help ==&lt;br /&gt;
==== Guides ====&lt;br /&gt;
* [[Tutorials]]&lt;br /&gt;
* [[Useful Links]]&lt;br /&gt;
&lt;br /&gt;
==== Definitions ====&lt;br /&gt;
* [[Activation]] and [[Hacktivation]]&lt;br /&gt;
* [[ASLR]]&lt;br /&gt;
* [[Baseband Device|Baseband]]&lt;br /&gt;
* [[Baseband Bootloader|Bootloader]]&lt;br /&gt;
* [[Bootchain]]&lt;br /&gt;
* [[Bootrom]] / [[VROM]]&lt;br /&gt;
* [[Bricked]]&lt;br /&gt;
* [[CHIPID]]&lt;br /&gt;
* [[DFU Mode]]&lt;br /&gt;
* [[Failbreak]]&lt;br /&gt;
* [[iBoot (Bootloader)|iBoot]]&lt;br /&gt;
* [[IMG3 File Format|IMG3]] tags&lt;br /&gt;
** [[BORD]]&lt;br /&gt;
** [[CERT]]&lt;br /&gt;
** [[CHIP]]&lt;br /&gt;
** [[CPID]]&lt;br /&gt;
** [[ECID]]&lt;br /&gt;
** [[KBAG]]&lt;br /&gt;
** [[PROD]]&lt;br /&gt;
** [[SDOM]]&lt;br /&gt;
** [[SEPO]]&lt;br /&gt;
** [[SHSH]]&lt;br /&gt;
** [[TYPE]]&lt;br /&gt;
** [[VERS]]&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
** [[Tethered jailbreak]]&lt;br /&gt;
** [[Untethered jailbreak]]&lt;br /&gt;
* [[Firmware downgrading]]&lt;br /&gt;
** [[Tethered Downgrade]]&lt;br /&gt;
* [[Kernel]]&lt;br /&gt;
* [[launchd]]&lt;br /&gt;
* [[LLB]]&lt;br /&gt;
* [[NAND]]&lt;br /&gt;
* [[Unlock]]&lt;br /&gt;
* [[Userland]]&lt;br /&gt;
|}&lt;br /&gt;
__NOTOC____NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=53576</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Main_Page&amp;diff=53576"/>
		<updated>2016-07-24T11:11:45Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: 9.3.3 pangu jailbreaks 64-bit devices&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Iptwiki.png|center]]&lt;br /&gt;
{{:Main Page/Welcome}}&lt;br /&gt;
&lt;br /&gt;
== Jailbreak Status ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size:1em; width:100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | [[Models|Device]]&lt;br /&gt;
! [[Apple Watch]]&lt;br /&gt;
! [[Apple TV 3G]]&lt;br /&gt;
! [[J42dAP|Apple TV 4G]]&lt;br /&gt;
! [[iPad 2]] and up&lt;br /&gt;
! [[iPad mini]] and up&lt;br /&gt;
! [[iPhone 4S]] and up&lt;br /&gt;
! [[iPod touch 5G]] and up&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | Latest public [[firmware]]&lt;br /&gt;
| 2.2.2 &amp;lt;small&amp;gt;(13V604)&amp;lt;/small&amp;gt;&lt;br /&gt;
| 7.2.1/8.4.1 &amp;lt;small&amp;gt;(12H523)&amp;lt;/small&amp;gt;&lt;br /&gt;
| 9.2.2 &amp;lt;small&amp;gt;(13Y825)&amp;lt;/small&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; | 9.3.3 &amp;lt;small&amp;gt;(13G34)&amp;lt;/small&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;height:3em;&amp;quot; | Jailbreak available?&lt;br /&gt;
| colspan=&amp;quot;8&amp;quot; {{ yes (64-bit devices)}}&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;small&amp;gt;For older devices and versions, see [[Jailbreak]].&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Software ==&lt;br /&gt;
* [[Apple Internal Apps]]&lt;br /&gt;
* [[:Category:File Formats|File formats]]&lt;br /&gt;
* [[/|Filesystem]]&lt;br /&gt;
* [[Firmware]]&lt;br /&gt;
** [[Beta Firmware]]&lt;br /&gt;
** [[Factory Firmware]]&lt;br /&gt;
** [[OTA Updates]]&lt;br /&gt;
* [[iTunes]]&lt;br /&gt;
** [[iTunes Errors]]&lt;br /&gt;
** [[iTunes Modes]]&lt;br /&gt;
** [[MobileDevice Library]]&lt;br /&gt;
* [[Keys]]&lt;br /&gt;
** [[AES Keys]]&lt;br /&gt;
** [[CERT|Apple Certificate]]&lt;br /&gt;
** [[Baseband RSA Keys|RSA Keys]]&lt;br /&gt;
** [[Baseband TEA Keys|TEA Keys]]&lt;br /&gt;
** [[Firmware Keys]]&lt;br /&gt;
*** [[Decrypting Firmwares]]&lt;br /&gt;
** [[GID Key]]&lt;br /&gt;
** [[NCK]]&lt;br /&gt;
* [[Protocols]]&lt;br /&gt;
** [[Baseband Bootrom Protocol]]&lt;br /&gt;
** [[DFU (Protocol)|DFU]]&lt;br /&gt;
** [[Interactive Mode|Baseband Bootloader Protocol]]&lt;br /&gt;
** [[Normal Mode]]&lt;br /&gt;
** [[Recovery Mode (Protocols)|Recovery Mode]]&lt;br /&gt;
** [[Restore Mode]]&lt;br /&gt;
* [[System Log|System Log (syslog)]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Jailbreaks|Jailbreak Software]] ====&lt;br /&gt;
* [[Absinthe]]&lt;br /&gt;
* [[blackra1n]]&lt;br /&gt;
* [[Corona]]&lt;br /&gt;
* [[evasi0n]]&lt;br /&gt;
* [[evasi0n7]]&lt;br /&gt;
* [[Geeksn0w]]&lt;br /&gt;
* [[Greenpois0n (jailbreak)|greenpois0n]]&lt;br /&gt;
* [[JailbreakMe]]&lt;br /&gt;
* [[limera1n]]&lt;br /&gt;
* [[p0sixspwn]]&lt;br /&gt;
* [[Pangu]]&lt;br /&gt;
* [[Pangu8]]&lt;br /&gt;
* [[Pangu9]]&lt;br /&gt;
* [[PPJailbreak]]&lt;br /&gt;
* [[purplera1n]]&lt;br /&gt;
* [[PwnageTool]]&lt;br /&gt;
* [[redsn0w]]&lt;br /&gt;
* [[Rocky Racoon]]&lt;br /&gt;
* [[Seas0nPass]]&lt;br /&gt;
* [[sn0wbreeze]]&lt;br /&gt;
* [[Spirit]]&lt;br /&gt;
* [[TaiG]]&lt;br /&gt;
* [[unthredera1n]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Patches|Patches]] ====&lt;br /&gt;
* [[Kernel Patches|Kernel]]&lt;br /&gt;
** [[AMFI Binary Trust Cache Patch]]&lt;br /&gt;
** [[PE i can has debugger Patch]]&lt;br /&gt;
** [[Sandbox Patch]]&lt;br /&gt;
** [[Vm map enter Patch]]&lt;br /&gt;
** [[Vm map protect Patch]]&lt;br /&gt;
* [[:Category:Ramdisk Patches|Ramdisk]]: [[ASR]]&lt;br /&gt;
&lt;br /&gt;
==== [[:Category:Exploits|Vulnerabilities and Exploits]] ====&lt;br /&gt;
* [[0x24000 Segment Overflow]] (24kpwn)&lt;br /&gt;
* [[BPF STX Kernel Write Exploit]]&lt;br /&gt;
* [[CVE-2013-0964]]&lt;br /&gt;
* [[HFS Heap Overflow]]&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]] (feedface)&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]]&lt;br /&gt;
* [[Limera1n Exploit]]&lt;br /&gt;
* [[Malformed CFF Vulnerability]]&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]]&lt;br /&gt;
* [[SHA-1 Image Segment Overflow]] (SHAtter)&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]]&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (steaks4uce)&lt;br /&gt;
* [[Symbolic Link Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
====Various Software====&lt;br /&gt;
* [[Cydia.app|Cydia]]&lt;br /&gt;
* [[EDA]]&lt;br /&gt;
* [[iFaith]]&lt;br /&gt;
* [[SemiRestore7]]&lt;br /&gt;
* [[SemiRestore8]]&lt;br /&gt;
* [[SemiRestore9]]&lt;br /&gt;
* [[Sund0wn]]&lt;br /&gt;
* [[TinyUmbrella]]&lt;br /&gt;
&lt;br /&gt;
====Bad stuff====&lt;br /&gt;
* [[Malware for iOS]]&lt;br /&gt;
* [[Misuse of enterprise and developer certificates]]&lt;br /&gt;
* [[Scam Jailbreaks and Unlocks]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Hardware ==&lt;br /&gt;
==== Devices ====&lt;br /&gt;
{{see also|Models|Prototypes}}&lt;br /&gt;
* [[List of Apple TVs|Apple TV]]&lt;br /&gt;
** Apple TV 2G ([[K66AP]])&lt;br /&gt;
** [[Apple TV 3G]] ([[J33AP]], [[J33IAP]])&lt;br /&gt;
** Apple TV 4G ([[J42dAP]])&lt;br /&gt;
* [[Apple Watch]]&lt;br /&gt;
** 38&amp;amp;nbsp;mm ([[N27aAP]])&lt;br /&gt;
** 42&amp;amp;nbsp;mm ([[N28aAP]])&lt;br /&gt;
* [[List of iPads|iPad]]&lt;br /&gt;
** iPad ([[K48AP]])&lt;br /&gt;
** [[iPad 2]] ([[K93AP]], [[K94AP]], [[K95AP]], [[K93AAP]])&lt;br /&gt;
** [[iPad 3]] ([[J1AP]], [[J2AP]], [[J2AAP]])&lt;br /&gt;
** [[iPad 4]] ([[P101AP]], [[P102AP]], [[P103AP]])&lt;br /&gt;
** [[iPad Air]] ([[J71AP]], [[J72AP]], [[J73AP]])&lt;br /&gt;
** [[iPad Air 2]] ([[J81AP]], [[J82AP]])&lt;br /&gt;
** [[iPad Pro (12.9 inch)]] ([[J98aAP]], [[J99aAP]])&lt;br /&gt;
** [[iPad Pro (9.7 inch)]] ([[J127AP]], [[J128AP]])&lt;br /&gt;
* [[List of iPad minis|iPad mini]]&lt;br /&gt;
** [[iPad mini]] ([[P105AP]], [[P106AP]], [[P107AP]])&lt;br /&gt;
** [[iPad mini 2]] ([[J85AP]], [[J86AP]], [[J87AP]])&lt;br /&gt;
** [[iPad mini 3]] ([[J85mAP]], [[J86mAP]], [[J87mAP]])&lt;br /&gt;
** [[iPad mini 4]] ([[J96AP]], [[J97AP]])&lt;br /&gt;
* [[List of iPhones|iPhone]]&lt;br /&gt;
** iPhone ([[M68AP]])&lt;br /&gt;
** iPhone 3G ([[N82AP]])&lt;br /&gt;
** iPhone 3GS ([[N88AP]])&lt;br /&gt;
** [[iPhone 4]] ([[N90AP]], [[N90BAP]], [[N92AP]])&lt;br /&gt;
** iPhone 4S ([[N94AP]])&lt;br /&gt;
** [[iPhone 5]] ([[N41AP]], [[N42AP]])&lt;br /&gt;
** [[iPhone 5c]] ([[N48AP]], [[N49AP]])&lt;br /&gt;
** [[iPhone 5s]] ([[N51AP]], [[N53AP]])&lt;br /&gt;
** iPhone 6 ([[N61AP]])&lt;br /&gt;
** iPhone 6 Plus ([[N56AP]])&lt;br /&gt;
** [[iPhone 6s]] ([[N71AP]], [[N71mAP]])&lt;br /&gt;
** [[iPhone 6s Plus]] ([[N66AP]], [[N66mAP]])&lt;br /&gt;
** [[iPhone SE]] ([[N69AP]], [[N69uAP]])&lt;br /&gt;
* [[List of iPod touches|iPod touch]]&lt;br /&gt;
** iPod touch ([[N45AP]])&lt;br /&gt;
** iPod touch 2G ([[N72AP]])&lt;br /&gt;
** iPod touch 3G ([[N18AP]])&lt;br /&gt;
** iPod touch 4G ([[N81AP]])&lt;br /&gt;
** [[iPod touch 5G]] ([[N78AP]], [[N78aAP]])&lt;br /&gt;
** iPod touch 6G ([[N102AP]])&lt;br /&gt;
&lt;br /&gt;
==== [[Application Processor]]s ====&lt;br /&gt;
* [[S5L8900]] ([[M68AP|iPhone]], [[N45AP|iPod touch]], [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[S5L8720]] ([[N72AP|iPod touch 2G]])&lt;br /&gt;
* [[S5L8920]] ([[N88AP|iPhone 3GS]])&lt;br /&gt;
* [[S5L8922]] ([[N18AP|iPod touch 3G]])&lt;br /&gt;
* [[S5L8930]] A4 ([[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch 4G]], [[K66AP|Apple TV 2G]])&lt;br /&gt;
* [[S5L8940]] A5 ([[K93AP|iPad 2 (iPad2,1)]], [[K94AP|iPad 2 (iPad2,2)]], [[K95AP|iPad 2 (iPad2,3)]], [[N94AP|iPhone 4S]])&lt;br /&gt;
* [[S5L8942]] A5 Rev A ([[J33AP|Apple TV 3G (AppleTV3,1)]], [[K93AAP|iPad 2 (iPad2,4)]], [[iPod touch 5G]], [[iPad mini]])&lt;br /&gt;
* [[S5L8945]] A5X ([[iPad 3]])&lt;br /&gt;
* [[S5L8947]] A5 Rev B ([[J33IAP|Apple TV 3G (AppleTV3,2)]])&lt;br /&gt;
* [[S5L8950]] A6 ([[iPhone 5]], [[iPhone 5c]])&lt;br /&gt;
* [[S5L8955]] A6X ([[iPad 4]])&lt;br /&gt;
* [[S5L8960]] A7 ([[iPhone 5s]], [[iPad mini 2]], [[iPad mini 3]])&lt;br /&gt;
* [[S5L8965]] A7 Variant ([[iPad Air]])&lt;br /&gt;
* [[T7000]] A8 ([[J42dAP|Apple TV 4G]], [[iPad mini 4]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[N102AP|iPod touch 6G]])&lt;br /&gt;
* [[T7001]] A8X ([[iPad Air 2]])&lt;br /&gt;
* [[S7002]] S1 ([[Apple Watch]])&lt;br /&gt;
* [[S8000]] A9 ([[wikipedia:Samsung Electronics|Samsung]]) ([[N71AP|iPhone 6s]], [[N66AP|iPhone 6s Plus]], [[N69uAP|iPhone SE]])&lt;br /&gt;
* [[S8001]] A9X ([[iPad Pro]])&lt;br /&gt;
* [[S8003]] A9 ([[wikipedia:TSMC|TSMC]]) ([[N71mAP|iPhone 6s]], [[N66mAP|iPhone 6s Plus]], [[N69AP|iPhone SE]])&lt;br /&gt;
&lt;br /&gt;
==== [[Baseband Device]]s ====&lt;br /&gt;
* [[S-Gold 2|PMB8876 or S-Gold 2]] ([[M68AP|iPhone]])&lt;br /&gt;
* [[X-Gold 608|PMB8878 or X-Gold 608]] ([[N82AP|iPhone 3G]], [[N88AP|iPhone 3GS]], [[K48AP|iPad (3G model)]])&lt;br /&gt;
* [[XMM6180|XMM6180 or X-Gold 618]] ([[iPhone 4]] ([[N90AP|iPhone3,1]], [[N90BAP|iPhone3,2]]), [[K94AP|iPad 2 (iPad2,2)]])&lt;br /&gt;
* [[MDM6600]] ([[N92AP|iPhone 4 (iPhone3,3)]], [[K95AP|iPad 2 (iPad2,3)]])&lt;br /&gt;
* [[MDM6610]] ([[N94AP|iPhone 4S]])&lt;br /&gt;
* [[MDM9600]] ([[iPad 3]])&lt;br /&gt;
* [[MDM9615]] ([[iPad 4]], [[iPad Air]] , [[iPad mini]], [[iPad mini 2]], [[iPad mini 3]], [[iPhone 5]], [[iPhone 5c]], [[iPhone 5s]])&lt;br /&gt;
* [[MDM9625]] ([[iPad Air 2]], [[iPad Pro (12.9 inch)]], [[iPad mini 4]], [[N61AP|iPhone 6]], [[N56AP|iPhone 6 Plus]], [[iPhone SE]])&lt;br /&gt;
* [[MDM9635]] ([[iPad Pro (9.7 inch)]], [[iPhone 6s]], [[iPhone 6s Plus]])&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Development ==&lt;br /&gt;
==== [[:Category:Hackers|iPhone Hackers]] ====&lt;br /&gt;
* [[User:chpwn|chpwn]]&lt;br /&gt;
* [[User:comex|comex]]&lt;br /&gt;
* [[User:geohot|geohot]]&lt;br /&gt;
* [[User:iH8sn0w|iH8sn0w]]&lt;br /&gt;
* [[User:MuscleNerd|MuscleNerd]]&lt;br /&gt;
* [[pimskeks]]&lt;br /&gt;
* [[User:planetbeing|planetbeing]]&lt;br /&gt;
* [[User:pod2g|pod2g]]&lt;br /&gt;
* [[User:posixninja|posixninja]]&lt;br /&gt;
* [[saurik]]&lt;br /&gt;
* [[User:winocm|winocm]]&lt;br /&gt;
&lt;br /&gt;
==== iPhone Hacker Teams ====&lt;br /&gt;
* [[Chronic Dev (team)|Chronic Dev]]&lt;br /&gt;
* [[iPhone Dev Team]]&lt;br /&gt;
* [[Dream Team]]&lt;br /&gt;
* [[Evad3rs|evad3rs]]&lt;br /&gt;
&lt;br /&gt;
==== Application Development ====&lt;br /&gt;
* [[Bypassing iPhone Code Signatures]]&lt;br /&gt;
* [[/System/Library/Frameworks|Frameworks]]&lt;br /&gt;
* [[Misuse of developer certificates]]&lt;br /&gt;
* [[MobileDevice Library]]&lt;br /&gt;
* [[Mobile Substrate]]&lt;br /&gt;
* [[Toolchain]] (Includes tutorials)&lt;br /&gt;
* [[Toolchain 2.0]] (Includes tutorials)&lt;br /&gt;
* [http://iphonedevwiki.net iPhoneDevWiki]&lt;br /&gt;
&lt;br /&gt;
==== Application Copy Protection ====&lt;br /&gt;
* [[Bugging Debuggers]]&lt;br /&gt;
* [[Copy Protection Overview]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:50%; text-align:left; vertical-align:text-top;&amp;quot; | &lt;br /&gt;
== Help ==&lt;br /&gt;
==== Guides ====&lt;br /&gt;
* [[Tutorials]]&lt;br /&gt;
* [[Useful Links]]&lt;br /&gt;
&lt;br /&gt;
==== Definitions ====&lt;br /&gt;
* [[Activation]] and [[Hacktivation]]&lt;br /&gt;
* [[ASLR]]&lt;br /&gt;
* [[Baseband Device|Baseband]]&lt;br /&gt;
* [[Baseband Bootloader|Bootloader]]&lt;br /&gt;
* [[Bootchain]]&lt;br /&gt;
* [[Bootrom]] / [[VROM]]&lt;br /&gt;
* [[Bricked]]&lt;br /&gt;
* [[CHIPID]]&lt;br /&gt;
* [[DFU Mode]]&lt;br /&gt;
* [[Failbreak]]&lt;br /&gt;
* [[iBoot (Bootloader)|iBoot]]&lt;br /&gt;
* [[IMG3 File Format|IMG3]] tags&lt;br /&gt;
** [[BORD]]&lt;br /&gt;
** [[CERT]]&lt;br /&gt;
** [[CHIP]]&lt;br /&gt;
** [[CPID]]&lt;br /&gt;
** [[ECID]]&lt;br /&gt;
** [[KBAG]]&lt;br /&gt;
** [[PROD]]&lt;br /&gt;
** [[SDOM]]&lt;br /&gt;
** [[SEPO]]&lt;br /&gt;
** [[SHSH]]&lt;br /&gt;
** [[TYPE]]&lt;br /&gt;
** [[VERS]]&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
** [[Tethered jailbreak]]&lt;br /&gt;
** [[Untethered jailbreak]]&lt;br /&gt;
* [[Firmware downgrading]]&lt;br /&gt;
** [[Tethered Downgrade]]&lt;br /&gt;
* [[Kernel]]&lt;br /&gt;
* [[launchd]]&lt;br /&gt;
* [[LLB]]&lt;br /&gt;
* [[NAND]]&lt;br /&gt;
* [[Unlock]]&lt;br /&gt;
* [[Userland]]&lt;br /&gt;
|}&lt;br /&gt;
__NOTOC____NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=53470</id>
		<title>Kernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=53470"/>
		<updated>2016-07-13T21:47:41Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Kernel Extensions */  added joker tool references.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''kernel''' of [[iOS]] is the [[wikipedia:XNU|XNU]] kernel. To learn about what &amp;quot;kernel&amp;quot; means in general, see [https://en.wikipedia.org/wiki/Kernel_(operating_system) the Wikipedia article].&lt;br /&gt;
&lt;br /&gt;
Pre-2.0, it was vulnerable to the [[Ramdisk Hack]] and may still be, but iBoot doesn't allow boot-args to be passed anymore. It is mapped to memory at 0x80000000, forcing a 2/2GB address separation, similar to Windows 32-bit model. On older iOS versions the separation was 3/1 (mapping the kernel at 0xC0000000), closer to the Linux model.&lt;br /&gt;
&lt;br /&gt;
Note, that this is NOT like 32-bit OS X, wherein the kernel resides in its own address space, but more like OS X 64-bit, wherein [[wikipedia:Control_Register#CR3|CR3]] is shared (albeit an address space larger by several orders of magnitude). See the appropriate [[#64-bit|section]].&lt;br /&gt;
&lt;br /&gt;
== [[ASLR]] ==&lt;br /&gt;
{{main|Kernel ASLR}}&lt;br /&gt;
As of [[iOS]] 6, the kernel is subject to ASLR, much akin to Mountain Lion (OS X 10.8). This makes exploitation harder as the location of kernel code cannot be known.&lt;br /&gt;
&lt;br /&gt;
On production and development devices, the kernel is always stored as a statically linked [[kernelcache|cache]] stored at [[/System/Library/Caches/com.apple.kernelcaches/kernelcache]] that is decompressed and run on startup.&lt;br /&gt;
&lt;br /&gt;
== Stack ==&lt;br /&gt;
The kernel maintains thread specific stacks by calling kernel_memory_allocate, this allocates stacks in the specified kalloc zone. The bootstrap thread has its own specific static kernel stack, which is specified by _intstack. IRQ and FIQ handlers will also have their own execution stack which is specified by _irqstack.&lt;br /&gt;
&lt;br /&gt;
== Boot-Args ==&lt;br /&gt;
Like its OS X counterpart, iOS's XNU accepts command line arguments (though the actual passing of arguments is done by iBoot, which as of late refuses to do so). Arguments may be directed at the kernel proper, or any one of the many KExts (discussed below). The arguments of the kernel are largely the same as those of OS X.&lt;br /&gt;
&lt;br /&gt;
Kexts use boot-args as well, as can be seen when disassembly by calls to PE_parse_boot_argn (usually exported, _PE_parse_boot_argn 8027A8EC on the iOS 6.1.3 kernel, discovered by [[User:Haifisch|Haifisch]]). Finding references (using IDA) reveals hundreds places in the code wherein arguments are parsed in modules, pertaining to Flash, HDMI, and [[AppleMobileFileIntegrity|AMFI]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The list of boot-args can be extracted from any kernel dump once the address of _PE_parse_boot_argn is determined (which is usually automatically). A list from iOS 8.4 is shown below:&lt;br /&gt;
&lt;br /&gt;
 # perform a full disassembly, isolate decompiled lines (^;) with PE_parse.. and isolate string between quotes, sorted uniquely:&lt;br /&gt;
 # morpheus@Zephyr (~)$ '''jtool -d __TEXT.__text kernel.8.4.dump | grep PE_parse |grep '^; '| cut -d\&amp;quot; -f2 | cut -d\&amp;quot; -f1 | sort -u'''&lt;br /&gt;
 -b&lt;br /&gt;
 -disable_atm&lt;br /&gt;
 -factory_debug&lt;br /&gt;
 -l&lt;br /&gt;
 -multiq-deep-drain&lt;br /&gt;
 -no-zp&lt;br /&gt;
 -no64exec&lt;br /&gt;
 -novfscache&lt;br /&gt;
 -oldmezname&lt;br /&gt;
 -panic_on_exception_triage&lt;br /&gt;
 -progress&lt;br /&gt;
 -qos-policy-allow&lt;br /&gt;
 -s&lt;br /&gt;
 -vm16k&lt;br /&gt;
 -vnode_cache_defeat&lt;br /&gt;
 -x&lt;br /&gt;
 -zc&lt;br /&gt;
 -zinfop&lt;br /&gt;
 -zp&lt;br /&gt;
 aks_default_class&lt;br /&gt;
 assert&lt;br /&gt;
 bg_preempt&lt;br /&gt;
 boot-uuid&lt;br /&gt;
 colors&lt;br /&gt;
 cpumon_ustackshots_trigger_pct&lt;br /&gt;
 darkwake&lt;br /&gt;
 dart&lt;br /&gt;
 dcc&lt;br /&gt;
 debug&lt;br /&gt;
 diag&lt;br /&gt;
 disable_exc_resource&lt;br /&gt;
 fill&lt;br /&gt;
 hwm_user_cores&lt;br /&gt;
 ifa_debug&lt;br /&gt;
 ifnet_debug&lt;br /&gt;
 imp_interactive_receiver &lt;br /&gt;
 inaddr_nhash&lt;br /&gt;
 initmcl&lt;br /&gt;
 interrupt_accounting&lt;br /&gt;
 io&lt;br /&gt;
 io_throttle_period_tier1&lt;br /&gt;
 io_throttle_period_tier2&lt;br /&gt;
 io_throttle_period_tier3&lt;br /&gt;
 io_throttle_window_tier1&lt;br /&gt;
 io_throttle_window_tier2&lt;br /&gt;
 io_throttle_window_tier3&lt;br /&gt;
 iosched&lt;br /&gt;
 iotrace&lt;br /&gt;
 jcon&lt;br /&gt;
 jtag&lt;br /&gt;
 keepsyms&lt;br /&gt;
 kernel_stack_pages&lt;br /&gt;
 kextlog&lt;br /&gt;
 kmapoff&lt;br /&gt;
 lcks&lt;br /&gt;
 lo_txstart&lt;br /&gt;
 longterm&lt;br /&gt;
 max_cpumon_interval&lt;br /&gt;
 max_cpumon_percentage&lt;br /&gt;
 max_task_pmem&lt;br /&gt;
 maxmem&lt;br /&gt;
 maxoffset&lt;br /&gt;
 mbuf_debug&lt;br /&gt;
 mbuf_pool&lt;br /&gt;
 mcache_flags&lt;br /&gt;
 mleak_sample_factor&lt;br /&gt;
 mseg&lt;br /&gt;
 msgbuf&lt;br /&gt;
 mtxspin&lt;br /&gt;
 multiq_drain_band_limit&lt;br /&gt;
 multiq_drain_depth_limit&lt;br /&gt;
 multiq_drain_urgent_first&lt;br /&gt;
 nbuf&lt;br /&gt;
 ncl&lt;br /&gt;
 net.inet.ip.scopedroute&lt;br /&gt;
 net.inet6.ip6.scopedroute&lt;br /&gt;
 net_affinity&lt;br /&gt;
 net_rtref&lt;br /&gt;
 net_rxpoll&lt;br /&gt;
 network-type&lt;br /&gt;
 panic_on_cs_killed&lt;br /&gt;
 preempt&lt;br /&gt;
 qos_override_mode&lt;br /&gt;
 rd&lt;br /&gt;
 rootdev&lt;br /&gt;
 rte_debug&lt;br /&gt;
 sched&lt;br /&gt;
 sched_decay_penalty&lt;br /&gt;
 sched_decay_usage_age_factor&lt;br /&gt;
 sched_pri_decay_limit&lt;br /&gt;
 sched_use_combined_fgbg_decay&lt;br /&gt;
 serial&lt;br /&gt;
 serverperfmode&lt;br /&gt;
 slto_us&lt;br /&gt;
 socket_debug&lt;br /&gt;
 task_policy_suppression_disable&lt;br /&gt;
 task_wakeups_monitor_interval&lt;br /&gt;
 task_wakeups_monitor_rate&lt;br /&gt;
 task_wakeups_monitor_ustackshots_trigger_pct&lt;br /&gt;
 tbi&lt;br /&gt;
 trace&lt;br /&gt;
 trace_panic&lt;br /&gt;
 trace_typefilter&lt;br /&gt;
 trace_wake&lt;br /&gt;
 unrestrict_coalition_syscalls&lt;br /&gt;
 vm_compression_limit&lt;br /&gt;
 vm_compressor&lt;br /&gt;
 vm_compressor_immediate&lt;br /&gt;
 vm_compressor_threads&lt;br /&gt;
 wfi&lt;br /&gt;
 wqsize &lt;br /&gt;
 zalloc_debug&lt;br /&gt;
 zlog&lt;br /&gt;
 zp-factor&lt;br /&gt;
 zp-scale&lt;br /&gt;
 zrecs&lt;br /&gt;
 zsize&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
In the beginning iOS had consistently maintained a fairly higher kernel version than the corresponding version of OS X, but over time iOS and OS X have &amp;quot;moved nearer&amp;quot; together. And now, OS X El Capitan's XNU is 3247.1.106~1 and iOS 9.0 is 3248.1.2~3. This is not surprising, considering that iOS introduced novel features (such as [[Kernel ASLR]], the default freezer, and various security hardening features) which are first incorporated in it, and later made it to OS X. It seems that Apple is gradually uniting the iOS and OS X kernels over time and with iOS 9 and OS X El Capitan the version numbers are nearer to each other then ever before. The following demonstrates the OS versions at present (via terminal '''uname -a''' command):&lt;br /&gt;
&lt;br /&gt;
OS X El Capitan 10.11.5:&lt;br /&gt;
 &lt;br /&gt;
 Darwin Kernel Version 15.5.0: Tue Apr 19 18:36:36 PDT 2016; root:xnu-3248.50.21~8/RELEASE_X86_64&lt;br /&gt;
	&lt;br /&gt;
iOS 9.3.2:&lt;br /&gt;
&lt;br /&gt;
 Darwin Kernel Version 15.5.0: Mon Apr 18 16:44:07 PDT 2016; root:xnu-3248.50.21~4\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
&lt;br /&gt;
tvOS 9.2:&lt;br /&gt;
 Darwin Kernel Version 15.4.0: Wed Feb 24 12:51:38 PST 2016; root:xnu-3248.41.4~47/RELEASE_ARM64_[[T7000]]&lt;br /&gt;
&lt;br /&gt;
Note: The RELEASE_ARM_xxxxxxxx file obviously differs on device / CPU and the time varies by a few minutes per device. &lt;br /&gt;
&lt;br /&gt;
=== Version List (iOS) ===&lt;br /&gt;
The compilation date for each version will vary slightly between processors. This is due to the fact that compilations are sequential.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| [[Alpine 1A420 (iPhone)|1A420]]&lt;br /&gt;
| Darwin Kernel Version 4.4.2-Purple-19: Thu Mar 8 01:43:04 PST 2007; root:xnu-933.0.14~46/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| from prototype - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Tue May 22 21:15:54 PDT 2007; root:xnu-933.0.178/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.0.0d1: Fri Jun 22 00:38:56 PDT 2007; root:xnu-933.1.178~1/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.2&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Sep 19 00:08:42 PDT 2007; root:xnu-933.0.203~21/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| First kernel that was [[8900_File_Format#8900|8900]] encrypted - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Oct 10 00:07:49 PDT 2007; root:xnu-933.0.204~7/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.0.0d1: Wed Dec 12 00:16:00 PST 2007; root:xnu-933.0.211~2/RELEASE_ARM_[[S5L8900]]XRB &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| iPod touch only&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.3.1: Sun Jun 15 21:37:01 PDT 2008; root:xnu-1228.6.76~45/RELEASE_ARM_[[S5L8900]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.4.1: Sun Aug 10 21:25:25 PDT 2008; root:xnu-1228.7.27~12/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Sat Nov  1 19:13:13 PDT 2008; root:xnu-1228.7.36~2/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Mon Dec  8 21:02:57 PST 2008; root:xnu-1228.7.37~4/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.0.0d3: Wed May 13 22:16:49 PDT 2009; root:xnu-1357.2.89~4/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Aug 14 13:23:32 PDT 2009; root:xnu-1357.5.30~2/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.2&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Sep 25 23:35:35 PDT 2009; root:xnu-1357.5.30~3/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.3&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Dec 18 01:34:28 PST 2009; root:xnu-1357.5.30~6/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Mon Mar 15 23:15:33 PDT 2010; root:xnu-1504.2.27~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | iPad Only &lt;br /&gt;
|-&lt;br /&gt;
| 3.2.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Fri May 28 16:46:17 PDT 2010; root:xnu-1504.2.50~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.2&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Wed Aug  4 19:08:04 PDT 2010; root:xnu-1504.2.60~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 4.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.3.1: Wed May 26 22:28:33 PDT 2010; root:xnu-1504.50.73~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 18:46:06 PDT 2010; root:xnu-1504.50.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.1&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 22:35:51 PDT 2010; root:xnu-1504.55.33~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.1&lt;br /&gt;
| Darwin Kernel Version 10.4.0: Wed Oct 20 20:14:45 PDT 2010; root:xnu-1504.58.28~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Thu Feb 10 21:46:56 PST 2011; root:xnu-1735.46~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Wed Mar 30 18:51:10 PDT 2011; root:xnu-1735.46~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.3&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Sat Jul  9 00:59:43 PDT 2011; root:xnu-1735.47~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.5&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0b5&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Tue Aug  2 22:31:30 PDT 2011; root:xnu-1878.4.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Thu Sep 15 23:34:43 PDT 2011; root:xnu-1878.4.43~2/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1 beta&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Oct 19 19:05:07 PDT 2011; root:xnu-1878.4.45~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1 beta 2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Tue Nov 1 20:34:16 PDT 2011; root:xnu-1878.4.46~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Nov 13 19:10:13 PST 2011; root:xnu-1878.10.61~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Dec  4 18:57:33 PST 2011; root:xnu-1878.10.68~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Mon Jan  2 18:46:01 PST 2012; root:xnu-1878.10.74~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Feb 1 23:18:07 PST 2012; root:xnu-1878.11.8~1/RELEASE_ARM_[[S5L8945]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Apr 8 21:51:26 PDT 2012; root:xnu-1878.11.10~1/RELEASE_ARM_[[S5L8930]]X &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed May 30 19:23:03 PDT 2012; root:xnu-2107.1.78~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jun 17 19:47:47 PDT 2012; root:xnu-2107.1.61~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul  8 20:15:17 PDT 2012; root:xnu-2107.2.9~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul 29 20:15:28 PDT 2012; root:xnu-2107.2.26~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Aug 19 00:31:06 PDT 2012; root:xnu-2107.2.33~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 13.0.0: Wed Oct 10 23:32:19 PDT 2012; root:xnu-2107.2.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.2&lt;br /&gt;
| iPhone 5 only. &lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Oct 21 19:28:43 PDT 2012; root:xnu-2107.7.51~17/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Nov  4 19:02:54 PST 2012; root:xnu-2107.7.53~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Mon Nov 26 21:17:13 PST 2012; root:xnu-2107.7.53~27/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec  9 19:22:45 PST 2012; root:xnu-2107.7.55~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 5&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Sun Dec 16 20:01:39 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1 beta&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.1&lt;br /&gt;
| iPhone 4S only&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.3 beta 2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Wed Feb 13 21:35:42 PST 2013; root:xnu-2107.7.55.2.2~1/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.3&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.4&lt;br /&gt;
| iPhone 5 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.5&lt;br /&gt;
| iPod touch 4 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.6&lt;br /&gt;
| iPod touch 4 and iPhone 3GS only.&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed May 29 23:53:59 PDT 2013; root:xnu-2423.1.1.1.2~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jun 17 00:51:51 PDT 2013; root:xnu-2423.1.28~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul  1 04:25:28 PDT 2013; root:xnu-2423.1.40~11/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul 22 02:12:11 PDT 2013; root:xnu-2423.1.55~8/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Sun Aug  4 22:40:14 PDT 2013; root:xnu-2423.1.70~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0 beta 6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 13 21:39:05 PDT 2013; root:xnu-2423.1.73~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Sep 9 20:56:02 PDT 2013; root:xnu-2423.1.74~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| [[iPhone 5c]] and [[iPhone 5s|5s]] only&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | Darwin Kernel Version 14.0.0: Fri Sep 27 23:08:32 PDT 2013; root:xnu-2423.3.12~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.5&lt;br /&gt;
| iPhone 5c (iPhone5,4) and iPhone 5s (iPhone6,2) only.&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Nov 11 04:18:01 PST 2013; root:xnu-2423.10.33~9/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Dec 10 21:25:34 PST 2013; root:xnu-2423.10.38.1.1~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Jan  2 01:55:45 PST 2014; root:xnu-2423.10.45~5/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 13 03:33:00 PST 2014; root:xnu-2423.10.49.0.1~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 27 23:55:13 PST 2014; root:xnu-2423.10.58~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Feb 21 19:41:10 PST 2014; root:xnu-2423.10.67~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Mar 28 21:22:10 PDT 2014; root:xnu-2423.10.70~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu May 15 23:17:54 PDT 2014; root:xnu-2423.10.71~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon May 26 22:09:06 PDT 2014; root:xnu-2729.0.0.0.9~2/RELEASE_ARM_[[S5L8942]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Jun 14 16:36:40 PDT 2014; root:xnu-2775.0.0.1.1~3/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul  2 18:51:34 PDT 2014; root:xnu-2783.1.21~19/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 16 21:55:26 PDT 2014; root:xnu-2783.1.40.0.3~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 30 23:04:17 PDT 2014; root:xnu-2783.1.62~20/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 19 15:09:47 PDT 2014; root:xnu-2783.1.72~8/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Thu Sep 18 21:52:21 PDT 2014; root:xnu-2783.1.72~23/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Sep 27 18:49:49 PDT 2014; root:xnu-2783.3.12~18/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 3 21:52:09 PDT 2014; root:xnu-2783.3.13~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 7 00:04:37 PDT 2014; root:xnu-2783.3.13~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Nov 2 20:21:29 PDT 2014; root:xnu-2783.3.21~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Nov 3 22:54:30 PDT 2014; root:xnu-2783.3.22~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 2 21:29:20 PST 2015; root:xnu-2783.3.26~3/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Dec 14 20:59:15 PST 2014; root:xnu-2783.5.29.0.1~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Jan  6 21:02:10 PST 2015; root:xnu-2783.5.32~9/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 26 22:16:17 PST 2015; root:xnu-2783.5.37~11/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Feb 9 22:07:57 PST 2015; root:xnu-2783.5.38~5/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Mar 4 20:55:58 PST 2015; root:xnu-2784.20.25~26/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Mar 19 00:16:36 PST 2015; root:xnu-2784.20.31~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Mar 29 19:44:04 PDT 2015; root:xnu-2784.20.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 8 21:26:37 PDT 2015; root:xnu-2784.30.1~29/RELEASE_ARM64_[[T7000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 21 21:49:05 PDT 2015; root:xnu-2784.30.2~9/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue May 5 23:09:22 PDT 2015; root:xnu-2784.30.5~7/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Wed 3 23:19:49 PDT 2015; root:xnu-2784.30.7~13/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4&lt;br /&gt;
|  Darwin Kernel Version 14.0.0: Wed Jun 24 00:50:15 PDT 2015; root:xnu-2784.30.7~30/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4.1&lt;br /&gt;
|  Darwin Kernel Version 14.0.0: Wed Aug 5 19:24:44 PDT 2015; root:xnu-2784.40.6~18/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri May 29 22:14:48 PDT 2015; root:xnu-3216.0.0.1.15~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Jun 15 21:51:54 PDT 2015; root:xnu-3247.1.6.1.1~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sat Jul 11 20:01:45 PDT 2015; root:xnu-3247.1.56~13\/RELEASE_ARM64_[[T7001]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 5&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Aug  3 19:58:41 PDT 2015; root:xnu-3247.1.88.1.1~1\/RELEASE_ARM64_[[T7001]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0[[Golden Master|GM]]&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Thu Aug  6 22:27:22 PDT 2015; root:xnu-3248.1.2~3\/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Thu Aug  20 13:11:13 PDT 2015; root:xnu-3248.1.3~1\/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sat Aug 29 17:41:04 PDT 2015; root:xnu-3248.10.27~10\/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Sep 14 01:24:55 PDT 2015; root:xnu-3248.10.38~3\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri Sep 25 17:14:21 PDT 2015; root:xnu-3248.10.41~11\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 4&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Fri Oct 2 14:07:07 PDT 2015; root:xnu-3248.10.42~4\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 5&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sun Oct 18 23:34:30 PDT 2015; root:xnu-3248.20.33.0.1~7\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 2&lt;br /&gt;
| ?&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri Nov  6 22:12:13 PST 2015; root:xnu-3248.21.1~2\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.0.0: Fri Nov 13 16:08:07 PST 2015; root:xnu-3248.21.2~1\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1 beta&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Wed Dec  9 22:19:38 PST 2015; root:xnu-3248.31.3~2\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1 beta 2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.4.0: Tue Jan  5 21:24:25 PST 2016; root:xnu-3248.40.155.1.1~3\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Tue Jan  19 00:18:39 PST 2016; root:xnu-3248.40.166.0.1~10\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Sun Jan  31 22:48:58 PST 2016; root:xnu-3248.40.173.0.1~13\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 4&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Sun Feb 14 23:17:56 PST 2016; root:xnu-3248.41.3~16\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.4.0: Sun Feb 22 01:48:23 PST 2016; root:xnu-3248.41.4~36\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 7&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.4.0: Fri Feb 19 13:54:52 PST 2016; root:xnu-3248.41.4~28\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta&lt;br /&gt;
| Darwin Kernel Version 15.5.0: Thu Mar 31 17:49:02 PDT 2016; root:xnu-3248.50.18~19\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.5.0: Tue Apr 5 15:12:03 PDT 2016; root:xnu-3248.50.20~12\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta 3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.5.0: Mon Apr 18 16:44:07 PDT 2016; root:xnu-3248.50.21~4\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta 4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.3 beta&lt;br /&gt;
| Darwin Kernel Version 15.6.0: Tue May 17 19:53:27 PDT 2016; root:xnu-3248.60.3~3\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.3 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.6.0: Tue May 31 19:52:45 PDT 2016; root:xnu-3248.60.4~1\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10.0 beta&lt;br /&gt;
| Darwin Kernel Version 16.0.0: Wed May 25 21:19:24 PDT 2016; root:xnu-3705.0.0.2.3~1\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 16.0.0: Tue Jun 28 21:38:14 PDT 2016; root:xnu-3757~291\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Version List (tvOS)===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| 9.2&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Wed Feb 24 12:51:38 PST 2016; root:xnu-3248.41.4~47/RELEASE_ARM64_[[T7000]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
== Source Code ==&lt;br /&gt;
As XNU is based off of the [[wikipedia:Berkeley Software Distribution|BSD kernel]], it is [http://opensource.apple.com/source/xnu open source]. The source is under a [http://opensource.apple.com/license/bsd/ 3-clause BSD License] for the original BSD portions with the portions added by Apple under the [http://opensource.apple.com/license/apsl/ Apple Public Source License]. The [[#Versions|versions contained in iOS]] are not available, instead only versions used in ''OS X'' are available. This does not appear to be legal as per &amp;amp;#x00A7;2.3 in the APSL:&lt;br /&gt;
 2.3     Distribution of Executable Versions.  In addition, if You Externally Deploy Covered&lt;br /&gt;
 Code (Original Code and/or Modifications) in object code, executable form only, '''You must'''&lt;br /&gt;
 '''include a prominent notice''', in the code itself as well as in related documentation, '''stating'''&lt;br /&gt;
 '''that Source Code of the Covered Code is available''' under the terms of this License '''with'''&lt;br /&gt;
 '''information on how and where to obtain such Source Code'''.&lt;br /&gt;
with ''Source Code'' defined in &amp;amp;#x00A7;1.8:&lt;br /&gt;
 1.8     &amp;quot;Source Code&amp;quot; means the human readable form of a program or other work that is&lt;br /&gt;
 suitable for making modifications to it, including all modules it contains, plus any&lt;br /&gt;
 associated interface definition files, scripts used to control compilation and installation&lt;br /&gt;
 of an executable (object code).&lt;br /&gt;
&lt;br /&gt;
It is worth noting that Apple does ''not'' list XNU as being an open source component of [[iOS]]. This can be seen by viewing [http://opensource.apple.com/ opensource.apple.com] and selecting ''any'' iOS version. As far as can be told, ''none'' of the versions of XNU are available in source version.&lt;br /&gt;
&lt;br /&gt;
There are many other open souce components that iOS uses that are ''not'' listed, such as:&lt;br /&gt;
* [http://opensource.apple.com/source/CF/ CF] ([https://developer.apple.com/library/mac/#documentation/CoreFoundation/Reference/CoreFoundation_Collection/_index.html CoreFoundation] - Cocoa)&lt;br /&gt;
* [http://opensource.apple.com/source/SQLite/ SQLite] ([http://www.sqlite.org/ SQLite] - database utility)&lt;br /&gt;
* [http://opensource.apple.com/source/TimeZoneData/ TimeZoneData] ([[wikipedia:tz database|tz database]] - [[/usr/share/zoneinfo]])&lt;br /&gt;
* [http://opensource.apple.com/source/curl/ curl](?) ([http://curl.haxx.se/ libcurl] - various HTTP operations)&lt;br /&gt;
* [http://opensource.apple.com/source/hfs/ hfs] (hfs - [[wikipedia:Hierarchical File System|HFS]] driver)&lt;br /&gt;
* [http://opensource.apple.com/source/launchd/ launchd] ([[launchd]] - launch daemon)&lt;br /&gt;
* [http://opensource.apple.com/source/libxml2/ libxml2](?) ([http://www.xmlsoft.org/ libxml2] - parser for [[wikipedia:XML|XML]] [[PList File Format|plist]]s)&amp;lt;!-- or does CF handle the parsing? --&amp;gt;&lt;br /&gt;
* [http://opensource.apple.com/source/xnu/ xnu] (XNU - Kernel)&lt;br /&gt;
* [http://opensource.apple.com/source/zip/ zip] (zip - extraction of various files)&lt;br /&gt;
It does ''not'' appear that Apple assumes what you see in the ''OS X'' pages are also on ''iOS''&amp;lt;!-- reword needed --&amp;gt; as [http://opensource.apple.com/source/JavaScriptCore/ JavaScriptCore], [http://opensource.apple.com/source/WebCore/ WebCore], among others are listed on both [http://opensource.apple.com/release/mac-os-x-108/ OS X] (10.8) and [http://opensource.apple.com/release/ios-60/ iOS] (6.0), albeit different versions.&lt;br /&gt;
&lt;br /&gt;
It is also worth noting that [http://opensource.apple.com/source/gdb/ gdb] ([[wikipedia:GNU Compiler Collection|GCC]] debugger) and [http://opensource.apple.com/source/ld64/ ld64] are listed as components in [http://opensource.apple.com/release/ios-60/ iOS 6.0]. Why there are present is a mystery as they are not present on unaltered devices, but only through [[Cydia.app|Cydia]] or [[Xcode]]'s &amp;lt;code&amp;gt;DeveloperImage.dmg&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Kernel Extensions ==&lt;br /&gt;
iOS, sadly, does ''not'' have [[Kernel Extension|kext]]s floating around the [[/|file system]], but they are indeed present. The [[kernelcache]] can be unpacked to show the kernel proper, along with the kexts (all packed in the __PRELINK_TEXT section) and their [[PList File Format|plist]]s (in the __PRELINK_INFO section).&lt;br /&gt;
&lt;br /&gt;
The kernelcache can also be directly unpacked (if decrypted) using the Jonathan Levin's joker tool from http://NewOSXBook.com/tools/joker.html. With the advent of iOS 10 betas and out-of-box plaintext kernelcaches, this tool can be used after unpacking and applying lzssdec to decompress the kernelcache to its full size.&lt;br /&gt;
&lt;br /&gt;
The Cydia supplied [[kextstat]] does not work on [[iOS]]. Sadly, the reason is that kextstat relies on &amp;lt;code&amp;gt;kmod_get_info(...)&amp;lt;/code&amp;gt;, which is a deprecated (and recently removed) API in  iOS 4.x and OS X 10.6. With that said, the [[Kernel Extension|kext]]s ''do'' exist. As an alternative, consider using kextstat from the iOS BinUtils package (http://NewOSXBook.com/tool/iOSBinaries.html) or the open source modified version &amp;quot;JKextstat&amp;quot; (http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c), which can also dump the raw XML data.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For a specific extension, e.g. SandBox, the full information (including the handy load address) is also accessible:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;root# ./jkextstat -b sandbox  -x&amp;lt;/code&amp;gt;:&lt;br /&gt;
 &amp;lt;plist&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleIdentifier&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;com.apple.security.sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleVersion&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;154.7&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUSubtype&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;9&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUType&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;12&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleDependencies&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;array&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;6&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;7&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;5&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;3&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;28&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;1&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;4&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;16&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;2&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;/array&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleExecutablePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext/Sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleIsInterface&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadAddress&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;2153734144&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadTag&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;29&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleMachOHeaders&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         zvrt/gwAAAAJAAAACwAAAAMAAAAgAgAAAQAAAAEAAAAEAQAAX19URVhUAAAAAAAAAAAA&lt;br /&gt;
         AABgX4AAgAAAAAAAAACAAAAHAAAABwAAAAMAAAAAAAAAX190ZXh0AAAAAAAAAAAAAF9f&lt;br /&gt;
         VEVYVAAAAAAAAAAAAADMbV+AKGEAAMwNAAACAAAAAAAAAAAAAAAABwCAAAAAAAAAAABf&lt;br /&gt;
         X2NzdHJpbmcAAAAAAAAAX19URVhUAAAAAAAAAAAAAPTOX4DLDQAA9G4AAAAAAAAAAAAA&lt;br /&gt;
         AAAAAAIAAAAAAAAAAAAAAF9fY29uc3QAAAAAAAAAAABfX1RFWFQAAAAAAAAAAAAAwNxf&lt;br /&gt;
         gDEDAADAfAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAQBAABfX0RBVEEAAAAA&lt;br /&gt;
         AAAAAAAAAOBfgAAQAAAAgAAAABAAAAcAAAAHAAAAAwAAAAAAAABfX2RhdGEAAAAAAAAA&lt;br /&gt;
         AAAAX19EQVRBAAAAAAAAAAAAAADgX4C0BgAAAIAAAAQAAAAAAAAAAAAAAAAAAAAAAAAA&lt;br /&gt;
         AAAAAF9fYnNzAAAAAAAAAAAAAABfX0RBVEEAAAAAAAAAAAAAwOZfgHgAAAAAAAAABAAA&lt;br /&gt;
         AAAAAAAAAAAAAQAAAAAAAAAAAAAAX19jb21tb24AAAAAAAAAAF9fREFUQQAAAAAAAAAA&lt;br /&gt;
         AAA451+AGAAAAAAAAAACAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAbAAAAGAAAABasg7Y2&lt;br /&gt;
         TzkVrtqsgOViBQ0=&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePrelinked&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleRetainCount&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;0&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleStarted&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleUUID&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         FqyDtjZPORWu2qyA5WIFDQ==&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleWiredSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSKernelResource&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's also worth mentioning that, in the above listing, the OSBundleMachOHeaders (base-64 encoded binary headers) leak kernel addresses in iOS 6.0, defeating [[Kernel ASLR]]. This has been quickly fixed in iOS 6.0.1, effectively locking down iOS for the foreseeable future, thanks to security researcher [[mdowd]].&lt;br /&gt;
&lt;br /&gt;
==[[User:Winocm|Winocm's]] custom kernel==&lt;br /&gt;
[[User:Winocm|Winocm]] uses a custom kernel which the version can be found below.&lt;br /&gt;
 Darwin Kernel Version 13.0.0: Fri Nov 22 18:19:54 CST 2013; root:xnu-2050.48.13~7/DEVELOPMENT_ARM_[[S5L8930]]X&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Kernel Syscalls]]&lt;br /&gt;
* [[Kernel Sysctls]]&lt;br /&gt;
* [[Kernel Task]]&lt;br /&gt;
* [[Kernel Symbols]]&lt;br /&gt;
* [[kdebug]]&lt;br /&gt;
* [[kernelcache]]&lt;br /&gt;
* [[Tutorial:Booting XNU on A4 Devices]]&lt;br /&gt;
* [[History:_Kernel_Manipulation| History:Kernel Manipulation]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://opensource.apple.com/source/xnu XNU Source] (up to latest **OS X** version)&lt;br /&gt;
* [[i0n1c]] on [https://media.blackhat.com/bh-us-11/Esser/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf exploiting the kernel]&lt;br /&gt;
* [[User:Haifisch|Haifisch]] on [http://dylanlaws.com/Kernel101 Decrypting the iOS kernel for disassembly]&lt;br /&gt;
* [http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c jkextstat.c]&lt;br /&gt;
* [http://www.amazon.com/gp/product/1118057651 OSX/iOS internals book]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=52521</id>
		<title>Kernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=52521"/>
		<updated>2016-05-02T18:40:31Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Kernel Extensions */  who wrote that g++ bullshit?! Anyway, fixed to both my binpack and the open source link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''kernel''' of [[iOS]] is the [[wikipedia:XNU|XNU]] kernel. To learn about what &amp;quot;kernel&amp;quot; means in general, see [https://en.wikipedia.org/wiki/Kernel_(operating_system) the Wikipedia article].&lt;br /&gt;
&lt;br /&gt;
Pre-2.0, it was vulnerable to the [[Ramdisk Hack]] and may still be, but iBoot doesn't allow boot-args to be passed anymore. It is mapped to memory at 0x80000000, forcing a 2/2GB address separation, similar to Windows 32-bit model. On older iOS versions the separation was 3/1 (mapping the kernel at 0xC0000000), closer to the Linux model.&lt;br /&gt;
&lt;br /&gt;
Note, that this is NOT like 32-bit OS X, wherein the kernel resides in its own address space, but more like OS X 64-bit, wherein [[wikipedia:Control_Register#CR3|CR3]] is shared (albeit an address space larger by several orders of magnitude). See the appropriate [[#64-bit|section]].&lt;br /&gt;
&lt;br /&gt;
== [[ASLR]] ==&lt;br /&gt;
{{main|Kernel ASLR}}&lt;br /&gt;
As of [[iOS]] 6, the kernel is subject to ASLR, much akin to Mountain Lion (OS X 10.8). This makes exploitation harder as the location of kernel code cannot be known.&lt;br /&gt;
&lt;br /&gt;
On production and development devices, the kernel is always stored as a statically linked [[kernelcache|cache]] stored at [[/System/Library/Caches/com.apple.kernelcaches/kernelcache]] that is decompressed and run on startup.&lt;br /&gt;
&lt;br /&gt;
== Stack ==&lt;br /&gt;
The kernel maintains thread specific stacks by calling kernel_memory_allocate, this allocates stacks in the specified kalloc zone. The bootstrap thread has its own specific static kernel stack, which is specified by _intstack. IRQ and FIQ handlers will also have their own execution stack which is specified by _irqstack.&lt;br /&gt;
&lt;br /&gt;
== Boot-Args ==&lt;br /&gt;
Like its OS X counterpart, iOS's XNU accepts command line arguments (though the actual passing of arguments is done by iBoot, which as of late refuses to do so). Arguments may be directed at the kernel proper, or any one of the many KExts (discussed below). The arguments of the kernel are largely the same as those of OS X.&lt;br /&gt;
&lt;br /&gt;
Kexts use boot-args as well, as can be seen when disassembly by calls to PE_parse_boot_argn (usually exported, _PE_parse_boot_argn 8027A8EC on the iOS 6.1.3 kernel, discovered by [[User:Haifisch|Haifisch]]). Finding references (using IDA) reveals hundreds places in the code wherein arguments are parsed in modules, pertaining to Flash, HDMI, and [[AppleMobileFileIntegrity|AMFI]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The list of boot-args can be extracted from any kernel dump once the address of _PE_parse_boot_argn is determined (which is usually automatically). A list from iOS 8.4 is shown below:&lt;br /&gt;
&lt;br /&gt;
 # perform a full disassembly, isolate decompiled lines (^;) with PE_parse.. and isolate string between quotes, sorted uniquely:&lt;br /&gt;
 # morpheus@Zephyr (~)$ '''jtool -d __TEXT.__text kernel.8.4.dump | grep PE_parse |grep '^; '| cut -d\&amp;quot; -f2 | cut -d\&amp;quot; -f1 | sort -u'''&lt;br /&gt;
 -b&lt;br /&gt;
 -disable_atm&lt;br /&gt;
 -factory_debug&lt;br /&gt;
 -l&lt;br /&gt;
 -multiq-deep-drain&lt;br /&gt;
 -no-zp&lt;br /&gt;
 -no64exec&lt;br /&gt;
 -novfscache&lt;br /&gt;
 -oldmezname&lt;br /&gt;
 -panic_on_exception_triage&lt;br /&gt;
 -progress&lt;br /&gt;
 -qos-policy-allow&lt;br /&gt;
 -s&lt;br /&gt;
 -vm16k&lt;br /&gt;
 -vnode_cache_defeat&lt;br /&gt;
 -x&lt;br /&gt;
 -zc&lt;br /&gt;
 -zinfop&lt;br /&gt;
 -zp&lt;br /&gt;
 aks_default_class&lt;br /&gt;
 assert&lt;br /&gt;
 bg_preempt&lt;br /&gt;
 boot-uuid&lt;br /&gt;
 colors&lt;br /&gt;
 cpumon_ustackshots_trigger_pct&lt;br /&gt;
 darkwake&lt;br /&gt;
 dart&lt;br /&gt;
 dcc&lt;br /&gt;
 debug&lt;br /&gt;
 diag&lt;br /&gt;
 disable_exc_resource&lt;br /&gt;
 fill&lt;br /&gt;
 hwm_user_cores&lt;br /&gt;
 ifa_debug&lt;br /&gt;
 ifnet_debug&lt;br /&gt;
 imp_interactive_receiver &lt;br /&gt;
 inaddr_nhash&lt;br /&gt;
 initmcl&lt;br /&gt;
 interrupt_accounting&lt;br /&gt;
 io&lt;br /&gt;
 io_throttle_period_tier1&lt;br /&gt;
 io_throttle_period_tier2&lt;br /&gt;
 io_throttle_period_tier3&lt;br /&gt;
 io_throttle_window_tier1&lt;br /&gt;
 io_throttle_window_tier2&lt;br /&gt;
 io_throttle_window_tier3&lt;br /&gt;
 iosched&lt;br /&gt;
 iotrace&lt;br /&gt;
 jcon&lt;br /&gt;
 jtag&lt;br /&gt;
 keepsyms&lt;br /&gt;
 kernel_stack_pages&lt;br /&gt;
 kextlog&lt;br /&gt;
 kmapoff&lt;br /&gt;
 lcks&lt;br /&gt;
 lo_txstart&lt;br /&gt;
 longterm&lt;br /&gt;
 max_cpumon_interval&lt;br /&gt;
 max_cpumon_percentage&lt;br /&gt;
 max_task_pmem&lt;br /&gt;
 maxmem&lt;br /&gt;
 maxoffset&lt;br /&gt;
 mbuf_debug&lt;br /&gt;
 mbuf_pool&lt;br /&gt;
 mcache_flags&lt;br /&gt;
 mleak_sample_factor&lt;br /&gt;
 mseg&lt;br /&gt;
 msgbuf&lt;br /&gt;
 mtxspin&lt;br /&gt;
 multiq_drain_band_limit&lt;br /&gt;
 multiq_drain_depth_limit&lt;br /&gt;
 multiq_drain_urgent_first&lt;br /&gt;
 nbuf&lt;br /&gt;
 ncl&lt;br /&gt;
 net.inet.ip.scopedroute&lt;br /&gt;
 net.inet6.ip6.scopedroute&lt;br /&gt;
 net_affinity&lt;br /&gt;
 net_rtref&lt;br /&gt;
 net_rxpoll&lt;br /&gt;
 network-type&lt;br /&gt;
 panic_on_cs_killed&lt;br /&gt;
 preempt&lt;br /&gt;
 qos_override_mode&lt;br /&gt;
 rd&lt;br /&gt;
 rootdev&lt;br /&gt;
 rte_debug&lt;br /&gt;
 sched&lt;br /&gt;
 sched_decay_penalty&lt;br /&gt;
 sched_decay_usage_age_factor&lt;br /&gt;
 sched_pri_decay_limit&lt;br /&gt;
 sched_use_combined_fgbg_decay&lt;br /&gt;
 serial&lt;br /&gt;
 serverperfmode&lt;br /&gt;
 slto_us&lt;br /&gt;
 socket_debug&lt;br /&gt;
 task_policy_suppression_disable&lt;br /&gt;
 task_wakeups_monitor_interval&lt;br /&gt;
 task_wakeups_monitor_rate&lt;br /&gt;
 task_wakeups_monitor_ustackshots_trigger_pct&lt;br /&gt;
 tbi&lt;br /&gt;
 trace&lt;br /&gt;
 trace_panic&lt;br /&gt;
 trace_typefilter&lt;br /&gt;
 trace_wake&lt;br /&gt;
 unrestrict_coalition_syscalls&lt;br /&gt;
 vm_compression_limit&lt;br /&gt;
 vm_compressor&lt;br /&gt;
 vm_compressor_immediate&lt;br /&gt;
 vm_compressor_threads&lt;br /&gt;
 wfi&lt;br /&gt;
 wqsize &lt;br /&gt;
 zalloc_debug&lt;br /&gt;
 zlog&lt;br /&gt;
 zp-factor&lt;br /&gt;
 zp-scale&lt;br /&gt;
 zrecs&lt;br /&gt;
 zsize&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
In the beginning iOS had consistently maintained a fairly higher kernel version than the corresponding version of OS X, but over time iOS and OS X have &amp;quot;moved nearer&amp;quot; together. And now, OS X El Capitan's XNU is 3247.1.106~1 and iOS 9.0 is 3248.1.2~3. This is not surprising, considering that iOS introduced novel features (such as [[Kernel ASLR]], the default freezer, and various security hardening features) which are first incorporated in it, and later made it to OS X. It seems that Apple is gradually uniting the iOS and OS X kernels over time and with iOS 9 and OS X El Capitan the version numbers are nearer to each other then ever before. The following demonstrates the OS versions at present (via terminal '''uname -a''' command):&lt;br /&gt;
&lt;br /&gt;
OS X El Capitan 10.11.4:&lt;br /&gt;
 &lt;br /&gt;
 Darwin Kernel Version 15.4.0: Fri Feb 26 22:08:05 PST 2016; root:xnu-3248.40.184~3/RELEASE_X86_64&lt;br /&gt;
	&lt;br /&gt;
iOS 9.3.1:&lt;br /&gt;
&lt;br /&gt;
 Darwin Kernel Version 15.4.0: Fri Feb 19 13:54:52 PST 2016; root:xnu-3248.41.4~28\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
&lt;br /&gt;
tvOS 9.2:&lt;br /&gt;
 Darwin Kernel Version 15.4.0: Wed Feb 24 12:51:38 PST 2016; root:xnu-3248.41.4~47/RELEASE_ARM64_[[T7000]]&lt;br /&gt;
&lt;br /&gt;
Note: The RELEASE_ARM_xxxxxxxx file obviously differs on device / CPU and the time varies by a few minutes per device. &lt;br /&gt;
&lt;br /&gt;
=== Version List (iOS) ===&lt;br /&gt;
The compilation date for each version will vary slightly between processors. This is due to the fact that compilations are sequential.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| [[Alpine 1A420 (iPhone)|1A420]]&lt;br /&gt;
| Darwin Kernel Version 4.4.2-Purple-19: Thu Mar 8 01:43:04 PST 2007; root:xnu-933.0.14~46/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| from prototype - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Tue May 22 21:15:54 PDT 2007; root:xnu-933.0.178/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.0.0d1: Fri Jun 22 00:38:56 PDT 2007; root:xnu-933.1.178~1/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.2&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Sep 19 00:08:42 PDT 2007; root:xnu-933.0.203~21/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| First kernel that was [[8900_File_Format#8900|8900]] encrypted - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Oct 10 00:07:49 PDT 2007; root:xnu-933.0.204~7/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.0.0d1: Wed Dec 12 00:16:00 PST 2007; root:xnu-933.0.211~2/RELEASE_ARM_[[S5L8900]]XRB &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| iPod touch only&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.3.1: Sun Jun 15 21:37:01 PDT 2008; root:xnu-1228.6.76~45/RELEASE_ARM_[[S5L8900]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.4.1: Sun Aug 10 21:25:25 PDT 2008; root:xnu-1228.7.27~12/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Sat Nov  1 19:13:13 PDT 2008; root:xnu-1228.7.36~2/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Mon Dec  8 21:02:57 PST 2008; root:xnu-1228.7.37~4/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.0.0d3: Wed May 13 22:16:49 PDT 2009; root:xnu-1357.2.89~4/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Aug 14 13:23:32 PDT 2009; root:xnu-1357.5.30~2/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.2&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Sep 25 23:35:35 PDT 2009; root:xnu-1357.5.30~3/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.3&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Dec 18 01:34:28 PST 2009; root:xnu-1357.5.30~6/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Mon Mar 15 23:15:33 PDT 2010; root:xnu-1504.2.27~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | iPad Only &lt;br /&gt;
|-&lt;br /&gt;
| 3.2.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Fri May 28 16:46:17 PDT 2010; root:xnu-1504.2.50~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.2&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Wed Aug  4 19:08:04 PDT 2010; root:xnu-1504.2.60~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 4.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.3.1: Wed May 26 22:28:33 PDT 2010; root:xnu-1504.50.73~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 18:46:06 PDT 2010; root:xnu-1504.50.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.1&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 22:35:51 PDT 2010; root:xnu-1504.55.33~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.1&lt;br /&gt;
| Darwin Kernel Version 10.4.0: Wed Oct 20 20:14:45 PDT 2010; root:xnu-1504.58.28~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Thu Feb 10 21:46:56 PST 2011; root:xnu-1735.46~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Wed Mar 30 18:51:10 PDT 2011; root:xnu-1735.46~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.3&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Sat Jul  9 00:59:43 PDT 2011; root:xnu-1735.47~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.5&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0b5&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Tue Aug  2 22:31:30 PDT 2011; root:xnu-1878.4.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Thu Sep 15 23:34:43 PDT 2011; root:xnu-1878.4.43~2/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1 beta&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Oct 19 19:05:07 PDT 2011; root:xnu-1878.4.45~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1 beta 2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Tue Nov 1 20:34:16 PDT 2011; root:xnu-1878.4.46~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Nov 13 19:10:13 PST 2011; root:xnu-1878.10.61~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Dec  4 18:57:33 PST 2011; root:xnu-1878.10.68~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Mon Jan  2 18:46:01 PST 2012; root:xnu-1878.10.74~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Feb 1 23:18:07 PST 2012; root:xnu-1878.11.8~1/RELEASE_ARM_[[S5L8945]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Apr 8 21:51:26 PDT 2012; root:xnu-1878.11.10~1/RELEASE_ARM_[[S5L8930]]X &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed May 30 19:23:03 PDT 2012; root:xnu-2107.1.78~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jun 17 19:47:47 PDT 2012; root:xnu-2107.1.61~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul  8 20:15:17 PDT 2012; root:xnu-2107.2.9~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul 29 20:15:28 PDT 2012; root:xnu-2107.2.26~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Aug 19 00:31:06 PDT 2012; root:xnu-2107.2.33~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 13.0.0: Wed Oct 10 23:32:19 PDT 2012; root:xnu-2107.2.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.2&lt;br /&gt;
| iPhone 5 only. &lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Oct 21 19:28:43 PDT 2012; root:xnu-2107.7.51~17/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Nov  4 19:02:54 PST 2012; root:xnu-2107.7.53~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Mon Nov 26 21:17:13 PST 2012; root:xnu-2107.7.53~27/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec  9 19:22:45 PST 2012; root:xnu-2107.7.55~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1 beta 5&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Sun Dec 16 20:01:39 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1 beta&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.1&lt;br /&gt;
| iPhone 4S only&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.3 beta 2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Wed Feb 13 21:35:42 PST 2013; root:xnu-2107.7.55.2.2~1/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.3&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.4&lt;br /&gt;
| iPhone 5 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.5&lt;br /&gt;
| iPod touch 4 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.6&lt;br /&gt;
| iPod touch 4 and iPhone 3GS only.&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed May 29 23:53:59 PDT 2013; root:xnu-2423.1.1.1.2~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jun 17 00:51:51 PDT 2013; root:xnu-2423.1.28~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul  1 04:25:28 PDT 2013; root:xnu-2423.1.40~11/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul 22 02:12:11 PDT 2013; root:xnu-2423.1.55~8/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0 beta 5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Sun Aug  4 22:40:14 PDT 2013; root:xnu-2423.1.70~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0 beta 6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 13 21:39:05 PDT 2013; root:xnu-2423.1.73~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Sep 9 20:56:02 PDT 2013; root:xnu-2423.1.74~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| [[iPhone 5c]] and [[iPhone 5s|5s]] only&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | Darwin Kernel Version 14.0.0: Fri Sep 27 23:08:32 PDT 2013; root:xnu-2423.3.12~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.5&lt;br /&gt;
| iPhone 5c (iPhone5,4) and iPhone 5s (iPhone6,2) only.&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Nov 11 04:18:01 PST 2013; root:xnu-2423.10.33~9/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Dec 10 21:25:34 PST 2013; root:xnu-2423.10.38.1.1~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Jan  2 01:55:45 PST 2014; root:xnu-2423.10.45~5/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 13 03:33:00 PST 2014; root:xnu-2423.10.49.0.1~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 27 23:55:13 PST 2014; root:xnu-2423.10.58~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Feb 21 19:41:10 PST 2014; root:xnu-2423.10.67~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Mar 28 21:22:10 PDT 2014; root:xnu-2423.10.70~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu May 15 23:17:54 PDT 2014; root:xnu-2423.10.71~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon May 26 22:09:06 PDT 2014; root:xnu-2729.0.0.0.9~2/RELEASE_ARM_[[S5L8942]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Jun 14 16:36:40 PDT 2014; root:xnu-2775.0.0.1.1~3/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul  2 18:51:34 PDT 2014; root:xnu-2783.1.21~19/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 16 21:55:26 PDT 2014; root:xnu-2783.1.40.0.3~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 30 23:04:17 PDT 2014; root:xnu-2783.1.62~20/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 19 15:09:47 PDT 2014; root:xnu-2783.1.72~8/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Thu Sep 18 21:52:21 PDT 2014; root:xnu-2783.1.72~23/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Sep 27 18:49:49 PDT 2014; root:xnu-2783.3.12~18/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 3 21:52:09 PDT 2014; root:xnu-2783.3.13~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 7 00:04:37 PDT 2014; root:xnu-2783.3.13~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Nov 2 20:21:29 PDT 2014; root:xnu-2783.3.21~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Nov 3 22:54:30 PDT 2014; root:xnu-2783.3.22~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 2 21:29:20 PST 2015; root:xnu-2783.3.26~3/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Dec 14 20:59:15 PST 2014; root:xnu-2783.5.29.0.1~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Jan  6 21:02:10 PST 2015; root:xnu-2783.5.32~9/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2 beta 5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 26 22:16:17 PST 2015; root:xnu-2783.5.37~11/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Feb 9 22:07:57 PST 2015; root:xnu-2783.5.38~5/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Mar 4 20:55:58 PST 2015; root:xnu-2784.20.25~26/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Mar 19 00:16:36 PST 2015; root:xnu-2784.20.31~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Mar 29 19:44:04 PDT 2015; root:xnu-2784.20.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 8 21:26:37 PDT 2015; root:xnu-2784.30.1~29/RELEASE_ARM64_[[T7000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 21 21:49:05 PDT 2015; root:xnu-2784.30.2~9/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue May 5 23:09:22 PDT 2015; root:xnu-2784.30.5~7/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4 beta 4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Wed 3 23:19:49 PDT 2015; root:xnu-2784.30.7~13/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4&lt;br /&gt;
|  Darwin Kernel Version 14.0.0: Wed Jun 24 00:50:15 PDT 2015; root:xnu-2784.30.7~30/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4.1&lt;br /&gt;
|  Darwin Kernel Version 14.0.0: Wed Aug 5 19:24:44 PDT 2015; root:xnu-2784.40.6~18/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri May 29 22:14:48 PDT 2015; root:xnu-3216.0.0.1.15~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Jun 15 21:51:54 PDT 2015; root:xnu-3247.1.6.1.1~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 4&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sat Jul 11 20:01:45 PDT 2015; root:xnu-3247.1.56~13\/RELEASE_ARM64_[[T7001]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0 beta 5&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Aug  3 19:58:41 PDT 2015; root:xnu-3247.1.88.1.1~1\/RELEASE_ARM64_[[T7001]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0[[Golden Master|GM]]&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Thu Aug  6 22:27:22 PDT 2015; root:xnu-3248.1.2~3\/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Thu Aug  20 13:11:13 PDT 2015; root:xnu-3248.1.3~1\/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sat Aug 29 17:41:04 PDT 2015; root:xnu-3248.10.27~10\/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Sep 14 01:24:55 PDT 2015; root:xnu-3248.10.38~3\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri Sep 25 17:14:21 PDT 2015; root:xnu-3248.10.41~11\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 4&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Fri Oct 2 14:07:07 PDT 2015; root:xnu-3248.10.42~4\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1 beta 5&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Sun Oct 18 23:34:30 PDT 2015; root:xnu-3248.20.33.0.1~7\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 2&lt;br /&gt;
| ?&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri Nov  6 22:12:13 PST 2015; root:xnu-3248.21.1~2\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2 beta 4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.0.0: Fri Nov 13 16:08:07 PST 2015; root:xnu-3248.21.2~1\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1 beta&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.0.0: Wed Dec  9 22:19:38 PST 2015; root:xnu-3248.31.3~2\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1 beta 2&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.2.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.4.0: Tue Jan  5 21:24:25 PST 2016; root:xnu-3248.40.155.1.1~3\/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 1.1&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Tue Jan  19 00:18:39 PST 2016; root:xnu-3248.40.166.0.1~10\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Sun Jan  31 22:48:58 PST 2016; root:xnu-3248.40.173.0.1~13\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 4&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Sun Feb 14 23:17:56 PST 2016; root:xnu-3248.41.3~16\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 15.4.0: Sun Feb 22 01:48:23 PST 2016; root:xnu-3248.41.4~36\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3 beta 7&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 15.4.0: Fri Feb 19 13:54:52 PST 2016; root:xnu-3248.41.4~28\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta&lt;br /&gt;
| Darwin Kernel Version 15.5.0: Thu Mar 31 17:49:02 PDT 2016; root:xnu-3248.50.18~19\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta 2&lt;br /&gt;
| Darwin Kernel Version 15.5.0: Tue Apr 5 15:12:03 PDT 2016; root:xnu-3248.50.20~12\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.3.2 beta 3&lt;br /&gt;
| Darwin Kernel Version 15.5.0: Mon Apr 18 16:44:07 PDT 2016; root:xnu-3248.50.21~4\/RELEASE_ARM64_[[S8000]]X&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Version List (tvOS)===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| 9.2&lt;br /&gt;
| Darwin Kernel Version 15.4.0: Wed Feb 24 12:51:38 PST 2016; root:xnu-3248.41.4~47/RELEASE_ARM64_[[T7000]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
== Source Code ==&lt;br /&gt;
As XNU is based off of the [[wikipedia:Berkeley Software Distribution|BSD kernel]], it is [http://opensource.apple.com/source/xnu open source]. The source is under a [http://opensource.apple.com/license/bsd/ 3-clause BSD License] for the original BSD portions with the portions added by Apple under the [http://opensource.apple.com/license/apsl/ Apple Public Source License]. The [[#Versions|versions contained in iOS]] are not available, instead only versions used in ''OS X'' are available. This does not appear to be legal as per &amp;amp;#x00A7;2.3 in the APSL:&lt;br /&gt;
 2.3     Distribution of Executable Versions.  In addition, if You Externally Deploy Covered&lt;br /&gt;
 Code (Original Code and/or Modifications) in object code, executable form only, '''You must'''&lt;br /&gt;
 '''include a prominent notice''', in the code itself as well as in related documentation, '''stating'''&lt;br /&gt;
 '''that Source Code of the Covered Code is available''' under the terms of this License '''with'''&lt;br /&gt;
 '''information on how and where to obtain such Source Code'''.&lt;br /&gt;
with ''Source Code'' defined in &amp;amp;#x00A7;1.8:&lt;br /&gt;
 1.8     &amp;quot;Source Code&amp;quot; means the human readable form of a program or other work that is&lt;br /&gt;
 suitable for making modifications to it, including all modules it contains, plus any&lt;br /&gt;
 associated interface definition files, scripts used to control compilation and installation&lt;br /&gt;
 of an executable (object code).&lt;br /&gt;
&lt;br /&gt;
It is worth noting that Apple does ''not'' list XNU as being an open source component of [[iOS]]. This can be seen by viewing [http://opensource.apple.com/ opensource.apple.com] and selecting ''any'' iOS version. As far as can be told, ''none'' of the versions of XNU are available in source version.&lt;br /&gt;
&lt;br /&gt;
There are many other open souce components that iOS uses that are ''not'' listed, such as:&lt;br /&gt;
* [http://opensource.apple.com/source/CF/ CF] ([https://developer.apple.com/library/mac/#documentation/CoreFoundation/Reference/CoreFoundation_Collection/_index.html CoreFoundation] - Cocoa)&lt;br /&gt;
* [http://opensource.apple.com/source/SQLite/ SQLite] ([http://www.sqlite.org/ SQLite] - database utility)&lt;br /&gt;
* [http://opensource.apple.com/source/TimeZoneData/ TimeZoneData] ([[wikipedia:tz database|tz database]] - [[/usr/share/zoneinfo]])&lt;br /&gt;
* [http://opensource.apple.com/source/curl/ curl](?) ([http://curl.haxx.se/ libcurl] - various HTTP operations)&lt;br /&gt;
* [http://opensource.apple.com/source/hfs/ hfs] (hfs - [[wikipedia:Hierarchical File System|HFS]] driver)&lt;br /&gt;
* [http://opensource.apple.com/source/launchd/ launchd] ([[launchd]] - launch daemon)&lt;br /&gt;
* [http://opensource.apple.com/source/libxml2/ libxml2](?) ([http://www.xmlsoft.org/ libxml2] - parser for [[wikipedia:XML|XML]] [[PList File Format|plist]]s)&amp;lt;!-- or does CF handle the parsing? --&amp;gt;&lt;br /&gt;
* [http://opensource.apple.com/source/xnu/ xnu] (XNU - Kernel)&lt;br /&gt;
* [http://opensource.apple.com/source/zip/ zip] (zip - extraction of various files)&lt;br /&gt;
It does ''not'' appear that Apple assumes what you see in the ''OS X'' pages are also on ''iOS''&amp;lt;!-- reword needed --&amp;gt; as [http://opensource.apple.com/source/JavaScriptCore/ JavaScriptCore], [http://opensource.apple.com/source/WebCore/ WebCore], among others are listed on both [http://opensource.apple.com/release/mac-os-x-108/ OS X] (10.8) and [http://opensource.apple.com/release/ios-60/ iOS] (6.0), albeit different versions.&lt;br /&gt;
&lt;br /&gt;
It is also worth noting that [http://opensource.apple.com/source/gdb/ gdb] ([[wikipedia:GNU Compiler Collection|GCC]] debugger) and [http://opensource.apple.com/source/ld64/ ld64] are listed as components in [http://opensource.apple.com/release/ios-60/ iOS 6.0]. Why there are present is a mystery as they are not present on unaltered devices, but only through [[Cydia.app|Cydia]] or [[Xcode]]'s &amp;lt;code&amp;gt;DeveloperImage.dmg&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Kernel Extensions ==&lt;br /&gt;
iOS, sadly, does ''not'' have [[Kernel Extension|kext]]s floating around the [[/|file system]], but they are indeed present. The [[kernelcache]] can be unpacked to show the kernel proper, along with the kexts (all packed in the __PRELINK_TEXT section) and their [[PList File Format|plist]]s (in the __PRELINK_INFO section).&lt;br /&gt;
&lt;br /&gt;
The Cydia supplied [[kextstat]] does not work on [[iOS]]. Sadly, the reason is that kextstat relies on &amp;lt;code&amp;gt;kmod_get_info(...)&amp;lt;/code&amp;gt;, which is a deprecated (and recently removed) API in  iOS 4.x and OS X 10.6. With that said, the [[Kernel Extension|kext]]s ''do'' exist. As an alternative, consider using kextstat from the iOS BinUtils package (http://NewOSXBook.com/tool/iOSBinaries.html) or the open source modified version &amp;quot;JKextstat&amp;quot; (http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c), which can also dump the raw XML data.&lt;br /&gt;
&lt;br /&gt;
The following is the output from [[kextstat#jkextstat|jkextstat]] on an [[N81AP|iPod touch 4G]] running [[iOS]] 6(?):&lt;br /&gt;
&lt;br /&gt;
 Podicum:~ root# ./kextstat &lt;br /&gt;
   0 __kernel__ &lt;br /&gt;
   1 kpi.bsd &lt;br /&gt;
   2 kpi.dsep &lt;br /&gt;
   3 kpi.iokit &lt;br /&gt;
   4 kpi.libkern &lt;br /&gt;
   5 kpi.mach &lt;br /&gt;
   6 kpi.private &lt;br /&gt;
   7 kpi.unsupported &lt;br /&gt;
   8 driver.AppleARMPlatform &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
   9 iokit.IOStorageFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  10 driver.DiskImages &amp;lt;1 3 4 5 6 7 9&amp;gt;&lt;br /&gt;
  11 driver.FairPlayIOKit &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  12 driver.IOSlaveProcessor &amp;lt;3 4&amp;gt;&lt;br /&gt;
  13 driver.IOP_s5l8930x_firmware &amp;lt;3 4 12&amp;gt;&lt;br /&gt;
  14 iokit.AppleProfileFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  15 iokit.IOCryptoAcceleratorFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  16 driver.AppleMobileFileIntegrity &amp;lt;1 2 3 4 5 6 7 15&amp;gt;&lt;br /&gt;
  17 iokit.IONetworkingFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  18 iokit.IOUserEthernet &amp;lt;1 3 4 5 6 16 17&amp;gt;&lt;br /&gt;
  19 platform.AppleKernelStorage &amp;lt;3 4 7&amp;gt;&lt;br /&gt;
  20 iokit.IOSurface &amp;lt;1 3 4 5 6 7 8&amp;gt;&lt;br /&gt;
  21 iokit.IOStreamFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  22 iokit.IOAudio2Family &amp;lt;1 3 4 5 21&amp;gt;&lt;br /&gt;
  23 driver.AppleAC3Passthrough &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  24 iokit.EncryptedBlockStorage &amp;lt;1 3 4 5 9 15&amp;gt;&lt;br /&gt;
  25 iokit.IOFlashStorage &amp;lt;1 3 4 5 7 9 24&amp;gt;&lt;br /&gt;
  26 driver.AppleEffaceableStorage &amp;lt;1 3 4 5 7 8 25&amp;gt;&lt;br /&gt;
  27 driver.AppleKeyStore &amp;lt;1 3 4 5 6 7 15 16 26&amp;gt;&lt;br /&gt;
  28 kext.AppleMatch &amp;lt;1 4&amp;gt;&lt;br /&gt;
  29 security.sandbox &amp;lt;1 2 3 4 5 6 7 16 28&amp;gt;&lt;br /&gt;
  30 driver.AppleS5L8930X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  31 iokit.IOHIDFamily &amp;lt;1 3 4 5 6 7 16&amp;gt;&lt;br /&gt;
  32 driver.AppleM68Buttons &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  33 iokit.IOUSBDeviceFamily &amp;lt;1 3 4 5&amp;gt;&lt;br /&gt;
  34 iokit.IOSerialFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  35 driver.AppleOnboardSerial &amp;lt;1 3 4 5 7 34&amp;gt;&lt;br /&gt;
  36 iokit.IOAccessoryManager &amp;lt;3 4 5 7 8 33 34 35&amp;gt;&lt;br /&gt;
  37 driver.AppleProfileTimestampAction &amp;lt;1 3 4 5 14&amp;gt;&lt;br /&gt;
  38 driver.AppleProfileThreadInfoAction &amp;lt;1 3 4 6 14&amp;gt;&lt;br /&gt;
  39 driver.AppleProfileKEventAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  40 driver.AppleProfileRegisterStateAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  41 driver.AppleProfileCallstackAction &amp;lt;1 3 4 5 6 14&amp;gt;&lt;br /&gt;
  42 driver.AppleProfileReadCounterAction &amp;lt;3 4 6 14&amp;gt;&lt;br /&gt;
  43 driver.AppleARMPL192VIC &amp;lt;3 4 5 7 8&amp;gt;&lt;br /&gt;
  44 driver.AppleCDMA &amp;lt;1 3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  45 driver.IODARTFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  46 driver.AppleS5L8930XDART &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  47 iokit.IOSDIOFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  48 driver.AppleIOPSDIO &amp;lt;1 3 4 5 7 8 12 47&amp;gt;&lt;br /&gt;
  49 driver.AppleIOPFMI &amp;lt;1 3 4 5 7 8 12 25&amp;gt;&lt;br /&gt;
  50 driver.AppleSamsungSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  51 driver.AppleSamsungSerial &amp;lt;1 3 4 5 7 8 34 35&amp;gt;&lt;br /&gt;
  52 driver.AppleSamsungPKE &amp;lt;3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  53 driver.AppleS5L8920X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  54 driver.AppleSamsungI2S &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  55 driver.AppleEmbeddedUSB &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  56 driver.AppleS5L8930XUSBPhy &amp;lt;1 3 4 5 7 8 55&amp;gt;&lt;br /&gt;
  57 iokit.IOUSBFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  58 driver.AppleUSBEHCI &amp;lt;1 3 4 5 7 57&amp;gt;&lt;br /&gt;
  59 driver.AppleUSBComposite &amp;lt;1 3 4 57&amp;gt;&lt;br /&gt;
  60 driver.AppleEmbeddedUSBHost &amp;lt;1 3 4 5 7 55 57 59&amp;gt;&lt;br /&gt;
  61 driver.AppleUSBOHCI &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  62 driver.AppleUSBOHCIARM &amp;lt;3 4 5 8 55 57 60 61&amp;gt;&lt;br /&gt;
  63 driver.AppleUSBHub &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  64 driver.AppleUSBEHCIARM &amp;lt;3 4 5 8 55 57 58 60 63&amp;gt;&lt;br /&gt;
  65 driver.AppleS5L8930XUSB &amp;lt;1 3 4 5 7 8 55 57 58 60 61 62 64&amp;gt;&lt;br /&gt;
  66 driver.AppleARM7M &amp;lt;3 4 8 12&amp;gt;&lt;br /&gt;
  67 driver.EmbeddedIOP &amp;lt;3 4 5 12&amp;gt;&lt;br /&gt;
  68 driver.AppleVXD375 &amp;lt;1 3 4 5 7 8 11&amp;gt;&lt;br /&gt;
  69 driver.AppleD1815PMU &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  70 iokit.AppleARMIISAudio &amp;lt;1 3 4 5 7 22&amp;gt;&lt;br /&gt;
  71 driver.AppleEmbeddedAudio &amp;lt;1 3 4 5 7 8 22 31 70&amp;gt;&lt;br /&gt;
  72 driver.AppleCS42L59Audio &amp;lt;3 4 5 8 22 31 70 71&amp;gt;&lt;br /&gt;
  73 driver.AppleEmbeddedAccelerometer &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  74 driver.AppleEmbeddedGyro &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  75 driver.AppleEmbeddedLightSensor &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  76 iokit.IOAcceleratorFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  77 IMGSGX535 &amp;lt;1 3 4 5 7 8 76&amp;gt;&lt;br /&gt;
  78 driver.H2H264VideoEncoderDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  79 driver.AppleJPEGDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  80 driver.AppleH3CameraInterface &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  81 driver.AppleM2ScalerCSCDriver &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  82 iokit.IOMobileGraphicsFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  83 driver.AppleDisplayPipe &amp;lt;1 3 4 5 7 8 82&amp;gt;&lt;br /&gt;
  84 driver.AppleCLCD &amp;lt;1 3 4 5 7 8 82 83&amp;gt;&lt;br /&gt;
  85 driver.AppleSamsungMIPIDSI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  86 driver.ApplePinotLCD &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  87 driver.AppleSamsungSWI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  88 iokit.IODisplayPortFamily &amp;lt;1 3 4 5 6 7 22&amp;gt;&lt;br /&gt;
  89 driver.AppleRGBOUT &amp;lt;1 3 4 5 7 8 82 83 88&amp;gt;&lt;br /&gt;
  90 driver.AppleTVOut &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  91 driver.AppleAMC_r2 &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  92 driver.AppleSamsungDPTX &amp;lt;3 4 5 7 8 88&amp;gt;&lt;br /&gt;
  93 driver.AppleSynopsysOTGDevice &amp;lt;1 3 4 5 7 8 33 55&amp;gt;&lt;br /&gt;
  94 driver.AppleNANDFTL &amp;lt;1 3 4 5 7 9 25&amp;gt;&lt;br /&gt;
  95 driver.AppleNANDLegacyFTL &amp;lt;1 3 4 5 9 25 94&amp;gt;&lt;br /&gt;
  96 AppleFSCompression.AppleFSCompressionTypeZlib &amp;lt;1 2 3 4 6&amp;gt;&lt;br /&gt;
  97 IOTextEncryptionFamily &amp;lt;1 3 4 5 7 11&amp;gt;&lt;br /&gt;
  98 driver.AppleBSDKextStarter &amp;lt;3 4&amp;gt;&lt;br /&gt;
  99 nke.ppp &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
 100 nke.l2tp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 101 nke.pptp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 102 iokit.IO80211Family &amp;lt;1 3 4 5 6 7 17&amp;gt;&lt;br /&gt;
 103 driver.AppleBCMWLANCore &amp;lt;1 3 4 5 6 7 8 17 102&amp;gt;&lt;br /&gt;
 104 driver.AppleBCMWLANBusInterfaceSDIO &amp;lt;1 3 4 5 6 7 8 47 103&amp;gt;&lt;br /&gt;
 105 driver.AppleDiagnosticDataAccessReadOnly &amp;lt;1 3 4 5 7 8 94&amp;gt;&lt;br /&gt;
 106 driver.LightweightVolumeManager &amp;lt;1 3 4 5 9 15 24 26&amp;gt;&lt;br /&gt;
 107 driver.IOFlashNVRAM &amp;lt;1 3 4 5 6 7 25&amp;gt;&lt;br /&gt;
 108 driver.AppleNANDFirmware &amp;lt;1 3 4 5 25&amp;gt;&lt;br /&gt;
 109 driver.AppleImage3NORAccess &amp;lt;1 3 4 5 7 8 15 108&amp;gt;&lt;br /&gt;
 110 driver.AppleBluetooth &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 111 driver.AppleMultitouchSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 112 driver.AppleUSBMike &amp;lt;1 3 4 5 8 22 33&amp;gt;&lt;br /&gt;
 113 driver.AppleUSBDeviceMux &amp;lt;1 3 4 5 6 7 33&amp;gt;&lt;br /&gt;
 114 driver.AppleUSBEthernetDevice &amp;lt;1 3 4 5 6 8 17 33&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a specific extension, e.g. SandBox, the full information (including the handy load address) is also accessible:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;root# ./jkextstat -b sandbox  -x&amp;lt;/code&amp;gt;:&lt;br /&gt;
 &amp;lt;plist&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleIdentifier&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;com.apple.security.sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleVersion&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;154.7&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUSubtype&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;9&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUType&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;12&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleDependencies&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;array&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;6&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;7&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;5&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;3&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;28&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;1&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;4&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;16&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;2&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;/array&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleExecutablePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext/Sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleIsInterface&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadAddress&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;2153734144&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadTag&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;29&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleMachOHeaders&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         zvrt/gwAAAAJAAAACwAAAAMAAAAgAgAAAQAAAAEAAAAEAQAAX19URVhUAAAAAAAAAAAA&lt;br /&gt;
         AABgX4AAgAAAAAAAAACAAAAHAAAABwAAAAMAAAAAAAAAX190ZXh0AAAAAAAAAAAAAF9f&lt;br /&gt;
         VEVYVAAAAAAAAAAAAADMbV+AKGEAAMwNAAACAAAAAAAAAAAAAAAABwCAAAAAAAAAAABf&lt;br /&gt;
         X2NzdHJpbmcAAAAAAAAAX19URVhUAAAAAAAAAAAAAPTOX4DLDQAA9G4AAAAAAAAAAAAA&lt;br /&gt;
         AAAAAAIAAAAAAAAAAAAAAF9fY29uc3QAAAAAAAAAAABfX1RFWFQAAAAAAAAAAAAAwNxf&lt;br /&gt;
         gDEDAADAfAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAQBAABfX0RBVEEAAAAA&lt;br /&gt;
         AAAAAAAAAOBfgAAQAAAAgAAAABAAAAcAAAAHAAAAAwAAAAAAAABfX2RhdGEAAAAAAAAA&lt;br /&gt;
         AAAAX19EQVRBAAAAAAAAAAAAAADgX4C0BgAAAIAAAAQAAAAAAAAAAAAAAAAAAAAAAAAA&lt;br /&gt;
         AAAAAF9fYnNzAAAAAAAAAAAAAABfX0RBVEEAAAAAAAAAAAAAwOZfgHgAAAAAAAAABAAA&lt;br /&gt;
         AAAAAAAAAAAAAQAAAAAAAAAAAAAAX19jb21tb24AAAAAAAAAAF9fREFUQQAAAAAAAAAA&lt;br /&gt;
         AAA451+AGAAAAAAAAAACAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAbAAAAGAAAABasg7Y2&lt;br /&gt;
         TzkVrtqsgOViBQ0=&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePrelinked&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleRetainCount&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;0&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleStarted&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleUUID&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         FqyDtjZPORWu2qyA5WIFDQ==&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleWiredSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSKernelResource&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's also worth mentioning that, in the above listing, the OSBundleMachOHeaders (base-64 encoded binary headers) leak kernel addresses in iOS 6.0, defeating [[Kernel ASLR]]. This has been quickly fixed in iOS 6.0.1, effectively locking down iOS for the foreseeable future, thanks to security researcher [[mdowd]].&lt;br /&gt;
&lt;br /&gt;
==[[User:Winocm|Winocm's]] custom kernel==&lt;br /&gt;
[[User:Winocm|Winocm]] uses a custom kernel which the version can be found below.&lt;br /&gt;
 Darwin Kernel Version 13.0.0: Fri Nov 22 18:19:54 CST 2013; root:xnu-2050.48.13~7/DEVELOPMENT_ARM_[[S5L8930]]X&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Kernel Syscalls]]&lt;br /&gt;
* [[Kernel Sysctls]]&lt;br /&gt;
* [[Kernel Task]]&lt;br /&gt;
* [[Kernel Symbols]]&lt;br /&gt;
* [[kdebug]]&lt;br /&gt;
* [[kernelcache]]&lt;br /&gt;
* [[Tutorial:Booting XNU on A4 Devices]]&lt;br /&gt;
* [[History:_Kernel_Manipulation| History:Kernel Manipulation]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://opensource.apple.com/source/xnu XNU Source] (up to latest **OS X** version)&lt;br /&gt;
* [[i0n1c]] on [https://media.blackhat.com/bh-us-11/Esser/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf exploiting the kernel]&lt;br /&gt;
* [[User:Haifisch|Haifisch]] on [http://dylanlaws.com/Kernel101 Decrypting the iOS kernel for disassembly]&lt;br /&gt;
* [http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c jkextstat.c]&lt;br /&gt;
* [http://www.amazon.com/gp/product/1118057651 OSX/iOS internals book]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=52466</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=52466"/>
		<updated>2016-04-24T03:00:53Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Pangu8 (8.0 / 8.0.1 / 8.0.2 / 8.1) */  - * Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) wasn't used here.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[N82AP|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[N72AP|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[N88AP|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[N72AP|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[N88AP|iPhone 3GS]], [[N18AP|iPod touch 3G]], [[K48AP|iPad]], [[iPhone 4]], [[N81AP|iPod touch 4G]] and [[K66AP|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[N72AP|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[N72AP|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[N18AP|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[N94AP|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) (Pangu v1.0.0)&lt;br /&gt;
* AppleKeyStore::initUserClient info leak ({{cve|2014-4407}}) (Pangu &amp;gt;v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) ({{cve|2014-4422}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOSharedDataQueue notification port overwrite ({{cve|2014-4461}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* the same kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w) - now used to also leak kernel memory (source @Morpheus______)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/xpcd_cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version], dyld, ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis/xpcd_cache)&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit {{cve|2014-4496}} - used to recover the permutation value and addresses of kernel objects&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] (8.1.3 / 8.2 / 8.3 / 8.4) and [[PPJailbreak]] ===&lt;br /&gt;
(See also details at http://newosxbook.com/articles/28DaysLater.html and http://newosxbook.com/articles/HIDeAndSeek.html)&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (also used in TaiG for 8.0-8.1.2 but modified) - to mount a fake DDI&lt;br /&gt;
* enable-dylibs-to-override-cache - force loading of dynamic libraries from filesystem (where available) instead of the shared cache (overriding libmis)&lt;br /&gt;
* Symbolic linking to AFC ({{cve|2015-5746}})&lt;br /&gt;
* Backup exploit to write to protected regions of the disk ({{cve|2015-5752}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3802}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3803}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3805}})&lt;br /&gt;
* Code signing exploit ({{cve|2015-3806}})&lt;br /&gt;
* IOHIDFamily exploit ({{cve|2015-5774}})&lt;br /&gt;
* Air Traffic exploit to allow attackers to access arbitrary filesystem locations via vectors related to asset handling ({{cve|2015-5766}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 9.x ==&lt;br /&gt;
=== [[Pangu9]] (9.0 / 9.0.1 / 9.0.2) ===&lt;br /&gt;
* Photos exploit to gain arbitrary unsandboxed file system access as mobile to load outdated DDI. ({{cve|2015-7037}})&lt;br /&gt;
* MobileStorageMounter allowed older DeveloperDiskImages to be mounted, resulting in unsandboxed unsigned code execution due to known weaknesses in entitled executables.  ({{cve|2015-7051}})&lt;br /&gt;
* IOHIDFamily Use-After-Free for kernel information leak / code execution as mobile. ({{cve|2015-6974}})&lt;br /&gt;
* dyld exploit in dyld shared cache handling to override MISValidateSignature in libmis.dylib for persistency ({{cve|2015-7079}})&lt;br /&gt;
* Racing KPP for some of the patches.&lt;br /&gt;
* AMFI MAC Hooks were in non-__const __DATA section, so wouldn't be integrity checked by KPP, allowing to replace MAC hooks required for code-signing. ({{cve|2015-7055}})&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=TvOS&amp;diff=51526</id>
		<title>TvOS</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=TvOS&amp;diff=51526"/>
		<updated>2016-03-06T08:50:51Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Corrected: TvOS 9.0 is iOS 9.1, not 9.0. Added notes about my research and possible jailbreak.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''tvOS''' is the Operating System that is used by the [[J42dAP|Apple TV 4G]]. It's a stripped down version of [[iOS]]. The first version released was stylized and marketed as tvOS 9.0, which was based on iOS 9.1. Since then, TvOS versions trail those of iOS by 0.1 (i.e. TvOS 9.1 is based on iOS 9.2, etc).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Research ==&lt;br /&gt;
&lt;br /&gt;
As demonstrated in http://NewOSXBook.com/OTA3.html, Apple provides a complete OTA image of TvOS, which enables one to reconstruct the entire system partition along with all binaries, in order to perform static analysis on them. &lt;br /&gt;
&lt;br /&gt;
Additionally, Apple has not actually fixed any bugs from Pangu's iOS 9.0.x Jailbreak in 9.1 but the kernel exploit (CVE-2015-6974), the Pangu9 jailbreak could be used with some modifications (notably, a different kernel bug) in order to achieve a TvOS 9.0 jailbreak. Note that the same could not be said for TvOS 9.1 and later, as iOS 9.2 (from which 9.1 is derived) has patched many vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
An overview analysis of TvOS can be found in http://NewOSXBook.com/articles/TVoS.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Firmware]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kdebug&amp;diff=50050</id>
		<title>Kdebug</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kdebug&amp;diff=50050"/>
		<updated>2015-12-26T13:00:11Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Added KDV - a utility to dump kdebug messages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''kdebug''' is a XNU built-in debugging facility, which has been around OS X from its early days, and is present - to varying extents - in iOS. In OS X, sc_usage(1), fs_usage(1) and latency(1) make use of it. The facility can be enabled and controlled via sysctl(2) calls, similar to the following code.&lt;br /&gt;
&lt;br /&gt;
 #define KDEBUG_ENABLE_TRACE   0x1&lt;br /&gt;
 #define KDEBUG_ENABLE_ENTROPY 0x2&lt;br /&gt;
 #define KDEBUG_ENABLE_CHUD    0x4&lt;br /&gt;
 &lt;br /&gt;
 // N.B - must SETBUF before facility can be enabled. &lt;br /&gt;
 &lt;br /&gt;
 int mib[4];&lt;br /&gt;
 mib[0] = CTL_KERN;&lt;br /&gt;
 mib[1] = KERN_KDEBUG;&lt;br /&gt;
 mib[2] = KERN_KDENABLE;         /* or a host of other codes from kdebug.h */&lt;br /&gt;
 mib[3] = /* One of above values, 0 disables */;&lt;br /&gt;
 &lt;br /&gt;
 if (sysctl(mib, 4, NULL, &amp;amp;needed, NULL, 0) &amp;lt; 0)&lt;br /&gt;
 {&lt;br /&gt;
     perror(&amp;quot;sysctl, KERN_KDENABLE\n&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
kdebug's most useful feature is to enable kernel-level tracing, but can also be enabled for entropy collection (i.e. /dev/random like behavior), among other things. The CHUD (Computer Hardware Understanding) interfaces are very powerful, though woefully poorly documented, and private to Apple (and probably deserve a future Wiki entry on their own). They likely exist in iOS4, though a sysctl to enable them in iOS 5 fails.&lt;br /&gt;
&lt;br /&gt;
The user mode header, &amp;lt;sys/kdebug.h&amp;gt; is partial, at best. A complete header can be found in the [http://www.opensource.apple.com/source/xnu/xnu-1699.24.23/bsd/sys/kdebug.h XNU source code].&lt;br /&gt;
&lt;br /&gt;
In OS X, most of the kdebug functionality can be met (and exceeded) by DTrace. This is not an option with iOS, which does not have DTrace. The kdebug facility, however, is supported. iOS 5.01 has been verified to support it to a similar extent as OS X, including clean compilation and execution of sc_usage(1). The same cannot be said for iOS 4, wherein the binaries compile, but do not execute properly.&lt;br /&gt;
&lt;br /&gt;
A utility to display kdebug output for both OS X and iOS can be found at http://NewOSXBook.com/tools/kdv.html&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Pangu9&amp;diff=49042</id>
		<title>Pangu9</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Pangu9&amp;diff=49042"/>
		<updated>2015-10-17T02:49:17Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Setting the etymology of the jailbreak :)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox software&lt;br /&gt;
| name                   = Pangu9&lt;br /&gt;
| title                  = Pangu9&lt;br /&gt;
| screenshot             = [[File:Pangu9.png|355px]]&lt;br /&gt;
| caption                = Pangu9 v1.0.0 on Windows&lt;br /&gt;
| author                 = Pangu Team&lt;br /&gt;
| developer              = Pangu Team&lt;br /&gt;
| released               = {{Start date|2015|10|14|df=yes}}&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version = 1.0.1&amp;amp;nbsp;(Windows)&amp;amp;nbsp;/&amp;amp;nbsp;{{Start date and age|2015|10|15|df=yes}}&lt;br /&gt;
| latest release date    = &lt;br /&gt;
| latest preview version = &lt;br /&gt;
| latest preview date    = &lt;br /&gt;
| programming language   = [[wikipedia:C (programming language)|C]]&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| language               = [[wikipedia:English language|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://en.pangu.io en.pangu.io] (English)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''Pangu9''' is an [[untethered jailbreak]] for all devices on iOS 9.0 through 9.0.2, except the [[Apple TV]] and [[Apple Watch]]. It was initially released on 14 October 2015.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices ==&lt;br /&gt;
All devices capable of running [[iOS]] 9.0-9.0.2, except the [[Apple TV]] and [[Apple Watch]] family, are supported.&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
=== Windows ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! SHA-1 Hash&lt;br /&gt;
! Download&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| &amp;lt;code&amp;gt;c48e1c1f84c1d5ff6046cc4eb7344335b314ba4b&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.0.exe 25PP]&lt;br /&gt;
| Pangu jailbreak tool for iOS 9.0-9.0.2&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| &amp;lt;code&amp;gt;05a0727085de1dd60eb4ec3a7bc343dd317d55d5&amp;lt;/code&amp;gt;&lt;br /&gt;
| [http://dl.pangu.25pp.com/jb/Pangu9_v1.0.1.exe 25PP]&lt;br /&gt;
| Fix a bug that leads to 0A error code.&amp;lt;br&amp;gt;Fix failure of launching on some PC.&amp;lt;br&amp;gt;Improved success rate&amp;lt;br&amp;gt;Ensure the removal of the Pangu app.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Name ==&lt;br /&gt;
&amp;quot;Pangu&amp;quot; is the name of the &amp;quot;[[wikipedia:Pangu|the first living being and the creator of all in some versions of Chinese mythology]]&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The 9.0-9.0.2 untether is nicknamed &amp;quot;Fuxi Qin&amp;quot;. This continues the tradition of Chinese mythology from the previous jailbreaks (Pangu Axe, XuanYuan Sword), by referring to the instrument (琴) carried by the legendary emperor Fuxi (伏羲)&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=NAND&amp;diff=48977</id>
		<title>NAND</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=NAND&amp;diff=48977"/>
		<updated>2015-10-15T12:00:58Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Partitions */ Correcting utterly wrong statements about NAND only having two partitions.. It has six! One (FSYS) is visible&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:8GBflash.jpg|thumb|right|An 8&amp;amp;nbsp;GiB Samsung &amp;lt;code&amp;gt;KMCMN0000M-B998&amp;lt;/code&amp;gt; NAND chip]]&amp;lt;!-- info: http://www.elnec.com/device/Samsung/KMAKG0000M-B998+%5BFBGA169%5D --&amp;gt;&lt;br /&gt;
'''NAND''', so called because of its use of [[wikipedia:NAND gate|NOT AND (NAND) gates]], is a type of [[wikipedia:Flash memory|non-volatile memory chip]] that is used in all [[iDevice]]s. This chip is where all the ''storage'' of the device is located. In the case of [[iOS]], the chips can range anywhere from 4&amp;amp;nbsp;GiB to 128&amp;amp;nbsp;GiB.&lt;br /&gt;
&lt;br /&gt;
== Partitions ==&lt;br /&gt;
{{see also|/private/etc/fstab}}&lt;br /&gt;
Although the NAND houses two visible filesystems, it actually has more partitions, including: NVRM (the NVRam store), SCFG (system configuration), BOOT (iBoot + more) and others. The visible filesystems are in a partition called FSYS, and are further split into two [[/private/etc/fstab|partitions]], a root partition ranging from 256(?) MiB to ~2 GiB, and a user partition occupying the rest, by using the Lightweight Volume Manager (LwVM). It is important to emphasize that these are LOGICAL rather than PHYSICAL partitions. The root partition is mounted to the [[/|root of the filesystem]] (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;). The user partition is located after the root partition on the chip and is mounted to [[/private/var]].&lt;br /&gt;
=== Size of Partitions ===&lt;br /&gt;
The size of the root partition has varied throughout [[iOS]]'s history, while the user partition just fills the rest of the space of the NAND chip. Here is a comparison of the size of the root partition compared to iOS version:&lt;br /&gt;
* 256 MiB: ?&amp;lt;!-- did this even exist? --&amp;gt;&lt;br /&gt;
* 512 MiB: ? - 4.0&lt;br /&gt;
* 1024 MiB: 4.0 - 8.0&lt;br /&gt;
* 2048 MiB: 8.0 - present&lt;br /&gt;
&lt;br /&gt;
== Jailbreaking ==&lt;br /&gt;
{{main|Jailbreak}}&lt;br /&gt;
Jailbreaking, in it's simplest form, involves modifying [[/private/etc/fstab]] before being parsed by the [[kernelcache|kernel]] to mount the [[/|root partition]] as read-write (&amp;lt;code&amp;gt;rw&amp;lt;/code&amp;gt;), as opposed to read-only (&amp;lt;code&amp;gt;ro&amp;lt;/code&amp;gt;). The only use of a so called &amp;quot;bare-bones&amp;quot; jailbreak is a proof-of-concept. A semi known example (the only publicly disclosed) of a &amp;quot;bare-bones&amp;quot; jailbreak is the [[K66AP|Apple TV 2G]] from [[Mojave 8M89 (AppleTV2,1)|4.0]] (4.1) to [[Jasper 8C150 (AppleTV2,1)|4.1]] (4.2). Not all jailbreak payloads modify [[/private/etc/fstab]], some of them remount the [[/|root partition]] manually.&lt;br /&gt;
&lt;br /&gt;
== Data Layout ==&lt;br /&gt;
As NAND chips are not hard drives, their &amp;quot;sector&amp;quot; sizes are different than that of a typical hard drive. In fact, they aren't even called sectors, but instead called a &amp;quot;page&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The difference between a page and a sector is that a ''modern'' hard drive sector contains either 512 or 4096 bytes of data with anywhere from roughly 30 to 250 bytes of [[wikipedia:Error detection and correction|error correction code]] (ECC) data, while a page contains 8192 bytes of data and ''no'' ECC. ECC is most likely not used as flash memory uses transistors, which are more reliable than magnetism to store data. It has, however, been [http://www.micron.com/~/media/Documents/Products/Software%20Article/SWNL_implementing_ecc.pdf proposed to implement ECC in flash memory] as the smaller [[wikipedia:Semiconductor device fabrication|fabrication process]] has shrunk to the width of about [[wikipedia:22 nanometer|150]] helium atoms (&amp;lt;code&amp;gt;.14 nm&amp;lt;/code&amp;gt;, or &amp;lt;code&amp;gt;22 nm&amp;lt;/code&amp;gt; total).&lt;br /&gt;
&lt;br /&gt;
The next level up from a page is a block which is a collection of 128 pages (1&amp;amp;nbsp;MiB). A block can be compared to a 4K sector hard drive that emulates 512 byte sectors.&lt;br /&gt;
&lt;br /&gt;
The layout of an 8 GiB chip containing [[iOS]] has been documented by [[CPICH]]. He [https://twitter.com/cpich3g/status/15966288660660224 notes] that an [[iPhone 4]] is documented, but it could easily be adapted to any other device or [[firmware]]. He uploaded the document to [http://freepdfhosting.com/29256fdff9.pdf FreePDFHosting], but it was later removed after 30 days as per their policy. [[User:MuscleNerd|MuscleNerd]] rasterized the document's pages and uploaded the images here:&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:N1.png|Page 1&lt;br /&gt;
File:N2.png|Page 2&lt;br /&gt;
File:N3.png|Page 3&lt;br /&gt;
File:N4.png|Page 4&lt;br /&gt;
File:N5.png|Page 5&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[/private/etc/fstab]]&lt;br /&gt;
* [[Jailbreak]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://freepdfhosting.com/29256fdff9.pdf NAND Layout of iPhone 4] (dead link) documented by [[CPICH]]&lt;br /&gt;
* [http://esec-lab.sogeti.com/ SOGETI ESEC-Labs] on the [http://esec-lab.sogeti.com/dotclear/public/publications/11-hitbamsterdam-iphonedataprotection.pdf encryption of iOS devices]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel_Symbols&amp;diff=48755</id>
		<title>Kernel Symbols</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel_Symbols&amp;diff=48755"/>
		<updated>2015-10-11T12:14:57Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: OBsolete page, added ref to Joker&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;iOS's XNU is largely stripped, and contains fewer and fewer symbols with its newer versions. Whereas in pre 3.0 most symbols were visible, nowadays only symbols required for KExt linkage remain so.&lt;br /&gt;
&lt;br /&gt;
This page is started in the hopes of bringing together efforts of the various jailbreakers so as to pool already symbolified sections of the kernel. Because addresses change along with the different builds, please add the symbols under the right kernel version (i.e. release + device). If not 100% sure about a symbol, indicate the level of confidence. &lt;br /&gt;
&lt;br /&gt;
Started with [[N81AP|iPod touch 4G]], because this is the main kernel the author has largely (&amp;gt;80%) symbolicated. Please add your own. Even if your build is different, the address space doesn't change that much. As of iOS 6 ASLR will shift these symbols by a given offset.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below is obsolete - The Joker tool from http://NewOSXBook.com/tools/joker.html exists for the sole purpose of auto-symbolicating kernels, and works on all kernels through XNU 32xx, and symbolicates the symbols below, as well as MIG tables and various other important functions.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!symbol&lt;br /&gt;
!5.0.x [[N81AP|iPod touch 4G]]&lt;br /&gt;
!5.0.1 [[N94AP|iPhone 4S]]&lt;br /&gt;
!5.1 [[N81AP|iPod touch 4G]]&lt;br /&gt;
!6.0 beta 1 [[N81AP|iPod touch 4G]]&lt;br /&gt;
!6.0 [[N81AP|iPod touch 4G]]&lt;br /&gt;
!6.0.1 [[N81AP|iPod touch 4G]]&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|_exception_triage&lt;br /&gt;
|0x80016C34&lt;br /&gt;
| ???&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
|0x80018774&lt;br /&gt;
|0x80018774&lt;br /&gt;
|The Mach exception processing logic.&lt;br /&gt;
|-&lt;br /&gt;
|sysent&lt;br /&gt;
|0x802CCBAC&lt;br /&gt;
|0x802CBBAC&lt;br /&gt;
|0x802CCBAC&lt;br /&gt;
|0x802F00B8&lt;br /&gt;
|0x802F00B8&lt;br /&gt;
|0x802F00B8&lt;br /&gt;
|Through this you can obtain all of XNU's 438 system calls, e.g. _exit @0x8019DE04 on iPod, 0x8019D278 on iPhone 4S, etc.&lt;br /&gt;
|-&lt;br /&gt;
|syscall_names&lt;br /&gt;
|0x802D2C6C&lt;br /&gt;
|0x802D1C6C-0x802D2340&lt;br /&gt;
|0x802D2C5C-0x802D4338&lt;br /&gt;
|0x802A6538-0x802A7540&lt;br /&gt;
|0x802E8FB0-0x802E969C&lt;br /&gt;
|0x802E8FB0-0x802E969C&lt;br /&gt;
|The char[][] containing the textual names of all system calls&lt;br /&gt;
|-&lt;br /&gt;
|AppleMobileFileIntegrity_Start&lt;br /&gt;
|0x805E499C&lt;br /&gt;
| ???&lt;br /&gt;
|0x805D5B94&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
|Initialization of AMFI, the kext responsible for [[sandbox]] policies and entitlements&lt;br /&gt;
|-&lt;br /&gt;
|bsd_init&lt;br /&gt;
|0x802B77C0&lt;br /&gt;
| ???&lt;br /&gt;
|0x802B8A24&lt;br /&gt;
| ...&lt;br /&gt;
|0x802B85B4&lt;br /&gt;
|0x802B9618&lt;br /&gt;
|BSD layer initialization logic. Branches out to initialize virtually every BSD subsystem. Same as OS X XNU, with minor exception (e.g. kernel_memorystatus/jetsam, iptap..)&lt;br /&gt;
|-&lt;br /&gt;
|ExceptionVectorsBase&lt;br /&gt;
|0x80078000&lt;br /&gt;
|0x80078000&lt;br /&gt;
|0x80078000&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
| ...&lt;br /&gt;
|Address of CPU exception handlers in kernel space: fleh_reset, fleh_undef, fleh_swi, fleh_prefabt, _fleh_dataabt, _fleh_addrexc and fleh_irq can be obtained from here&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note: For most of the above symbols, a fairly decent source code can be obtained from the public open source XNU available  [http://opensource.apple.com here]. Bear in mind that ml_, PE_ and other machine specific functions will naturally be implemented quite differently. (but, it's a start!).&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=OTA_Updates&amp;diff=48294</id>
		<title>OTA Updates</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=OTA_Updates&amp;diff=48294"/>
		<updated>2015-10-04T20:40:20Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: adding followup article&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{float toc|right}}&lt;br /&gt;
'''OTA Updates''' ('''Over-the-Air Updates''', also know as ''wireless updates'') were introduced with iOS 5. This allows a user of a device to go into Settings &amp;gt; General &amp;gt; Software Update and download and install the latest iOS software on-device, without the need for [[iTunes]]. The device contacts [http://mesu.apple.com/assets/com_apple_MobileAsset_SoftwareUpdate/com_apple_MobileAsset_SoftwareUpdate.xml mesu.apple.com] to check for updates. The updates are delivered in plain unencrypted ZIP files.&lt;br /&gt;
&lt;br /&gt;
== OTA Update contents  ==&lt;br /&gt;
We now know three versions of OTA updates. OTA update bundle contains an Info.plist file and two folders: ''META-INF'' and ''AssetData''. ''META-INF'' has only one file ''com.apple.ZipMetadata.plist'' which describes bundle contents.&lt;br /&gt;
&lt;br /&gt;
''AssetData'' contains three Bill-Of-Materials files (they can be viewed with ''lsbom'' and created with ''mkbom''). ''pre.bom'' states filesystem before update, ''post.bom'' - after and payload.bom describes the patches to be applied during update process. It also contains ''boot'' folder where [[bootchain]]-related files are stored (iBoot, kernelcache, etc.), ''payloadv2'' or ''payload'' (depends on PackageVersion value of ''AssetData/Info.plist'' file) and ''Info.plist'' file which describes the update. ''Info.plist'' file from ''AssetData'' folder contains ''PackageVersion'' field which can be 1.0, 2.0 or 3.0.&lt;br /&gt;
&lt;br /&gt;
=== Format 1.0 ===&lt;br /&gt;
These updates do not contain ''payload.bom'' file and are deprecated. These updates do not contain any .bom files.&lt;br /&gt;
*'''archive.cpio.gz''' - the actual cpio patch archive (encrypted). Contains a list of BSDIFF40 patches and baseband firmware updates, if available, with the associated flashing tools (bbupdater/imeisv).&lt;br /&gt;
*'''Info.plist.signature''' - asymmetric signature of Info.plist validated against /System/Library/Lockdown/iPhoneSoftwareUpdate.pem.&lt;br /&gt;
*'''libupdate_brain.dylib''' - stage 2 update process library (encrypted).&lt;br /&gt;
&lt;br /&gt;
=== Format 2.0 ===&lt;br /&gt;
All updates with 2.0 package version have ''payload'' folder inside ''AssetData'' instead of ''archive.cpio.gz'' file from 1.0 updates. It contains only two folders: ''added'' folder with unencrypted files which are to be added during update process and ''patches'' folder. ''patches'' folder is used to store BSDIFF40 patches that are applied to files during update process. They can be easily applied manually with [http://www.daemonology.net/bsdiff/ bsdiff] utility. ''patches'' folder file hierarchy is similar to devices [https://theiphonewiki.com/wiki// root file system] (ex. patch for ''/sbin/launchctl'' will be found at ''AssetData/payload/patches/sbin/launchctl''). ''AssetData'' also contains ''payload.bom.signature'' that replaces ''Info.plist.signature''. ''payload.bom.signature'' is used to check ''payload.bom'' which contains CRC32 of all files inside ''AssetData'' folder.&lt;br /&gt;
&lt;br /&gt;
=== Format 3.0 ===&lt;br /&gt;
''payloadv2'' folder replaced ''payload'' folder in updates with package version 3.0. It has no ''added'' folder anymore, but instead contains ''links.txt'' file which describes symlinks that should be created during update, removed.txt which is actually a list of files to delete before (!) update, ''prepare_patches'' which might contain patches that are to be applied before update ([https://theiphonewiki.com/Update_Ramdisk update ramdisk] patch), ''payload'' and ''prepare_payload'' files which might store new files (files that did not exist in previous iOS version), but files from ''prepare_payload'' are extracted before files from ''payload'', and ''patches'' folder which has the same file hierarchy as in pre-8.1.2 updates, but contains patches in BXDIFF41 format (they can be extracted with ''bxpatch'' utility from [http://github.com/npupyshev/bxdiff there]). I'll describe almost each file's structure.&lt;br /&gt;
*'''links.txt''' is just a list of strings. Strings that begin with '=' are symlink targets and following strings that begin with '+' are places where symlinks should be created.&lt;br /&gt;
*'''removed.txt''' contains a list of files that should be removed before update starts.&lt;br /&gt;
*'''payload''' and '''prepare_payload''' are files in some proprietary format. More details about them and a tool to extract them can be found here [http://newosxbook.com/articles/OTA.html &amp;quot;Taking apart iOS OTA Updates: Peeking into Over-The-Air Update bundles in iOS&amp;quot;] - by Jonathan Levin. A script built over that tool which will automatically retrieve a binary from a device and patch it with the OTA update can be found in the [http://newosxbook.com/articles/OTA2.html &amp;quot;followup article&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
* [[Software Update Service]]&lt;br /&gt;
&lt;br /&gt;
== Issues With [[Jailbreak]]ing ==&lt;br /&gt;
*OTA Updates are often known to cause issues when jailbreaking a device. This became evident with [[evasi0n7]], because most devices that were updated OTA, had to be restored with iTunes first, since the jailbreak would often fail if it was not.&lt;br /&gt;
*You cannot update OTA, when jailbroken. If you try, it is likely that your device will either be stuck in a boot loop, or certain things will not work correctly. Newer jailbreaks such as [[evasi0n]] and [[evasi0n7]] disable the OTA search daemon, which prevents the device from searching for an update (it will just stay indefinitely at &amp;quot;Checking for Update...&amp;quot;). This can also be done manually on any jailbreak, by deleting or moving ''/System/Library/LaunchDaemons/com.apple.mobile.softwareupdated.plist'' and ''/System/Library/LaunchDaemons/com.apple.softwareupdateservicesd.plist'' from your device. It can also be done with tools such as iCleaner Pro.&lt;br /&gt;
&lt;br /&gt;
== OTA updates list ==&lt;br /&gt;
* [[OTA Updates/Apple Watch|Apple Watch]]&lt;br /&gt;
* [[OTA Updates/Apple TV|Apple TV]]&lt;br /&gt;
* [[OTA Updates/iPad|iPad]]&lt;br /&gt;
* [[OTA Updates/iPad mini|iPad mini]]&lt;br /&gt;
* [[OTA Updates/iPhone|iPhone]]&lt;br /&gt;
* [[OTA Updates/iPod touch|iPod touch]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Firmware]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=47561</id>
		<title>TaiG</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=47561"/>
		<updated>2015-08-28T23:06:36Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Exploits and analysis */  Added 2nd writeup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{about|the untethered jailbreaks for iOS 8.0-8.1.2 Windows and 8.1.3-8.4 for Windows and Mac|an alternative for Mac OS X|PPJailbreak}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| name                   = TaiG&lt;br /&gt;
| title                  = TaiG&lt;br /&gt;
| author                 = TaiG&lt;br /&gt;
| developer              = TaiG&lt;br /&gt;
| released               = {{Start date|2014|11|29|df=yes}}&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version =  1.2.1 (8.0&amp;amp;nbsp;&amp;amp;#x2011;&amp;amp;nbsp;8.1.2)/{{Start date and age|2015|2|12|df=yes}} &amp;lt;br/&amp;gt; Windows: 2.4.3 (8.1.3&amp;amp;nbsp;&amp;amp;#x2011;&amp;amp;nbsp;8.4)/{{Start date and age|2015|8|4|df=yes}} &amp;lt;br/&amp;gt; Mac: 1.1.0 (8.1.3&amp;amp;nbsp;&amp;amp;#x2011;&amp;amp;nbsp;8.4)/{{Start date and age|2015|8|2|df=yes}} &lt;br /&gt;
| latest release date = &lt;br /&gt;
| programming language   = ?&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = [[wikipedia:Microsoft Windows|Windows]] / [[wikipedia:OS X|OS X]]&lt;br /&gt;
| language               = [[wikipedia:Chinese language|Chinese]] / [[wikipedia:English language|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://www.taig.com/en/ taig.com/en] (English)&amp;lt;br /&amp;gt;[http://taig.com taig.com] (Chinese)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''TaiG''' ('''Taiji''' in Chinese) (&amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;[[wikipedia:Help:IPA for English|/taɪ dʒi/]]&amp;lt;/span&amp;gt; or &amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;/taɪ tʃi/&amp;lt;/span&amp;gt;) is an [[untethered jailbreak]] for all devices on iOS 8.0-8.4, except the [[Apple TV]] and [[Apple Watch]]. It was initially released on 29 November, 2014 for 8.0 - 8.1.2 but since updated to support 8.1.3 - 8.4.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices ==&lt;br /&gt;
All devices capable of running [[iOS]] 8.0-8.4 (except the [[Apple TV]] family and [[Apple Watch]]) are supported.&lt;br /&gt;
&lt;br /&gt;
=== iOS 8.2 Beta ===&lt;br /&gt;
&amp;lt;!-- should be reworded to mention that it was possibly there since the first day; the &amp;quot;signature&amp;quot; on the announcement is dated 2 Dec 2014 --&amp;gt;&lt;br /&gt;
TaiG's website originally claimed as early as [http://web.archive.org/web/20141204221416/http://taig.com/en/ 4 December 2014] that &amp;quot;support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release.&amp;quot; This claim remained through [http://web.archive.org/web/20141231032106/http://www.taig.com/ 31 December 2014], but was removed sometime before [http://web.archive.org/web/20150104165652/http://taig.com/en/ 4 January 2015].&lt;br /&gt;
&lt;br /&gt;
On 23 February 2015, version 1.3 was released to jailbreak iOS 8.2 beta and beta 2.&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
=== Windows ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! Language&lt;br /&gt;
! Download&lt;br /&gt;
! SHA-1&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | English&lt;br /&gt;
| [http://apt.taig.com/installer/TaiG_1006.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2538d85d3b42a2a65ec33aec86245c39047449d3&amp;lt;/code&amp;gt;&lt;br /&gt;
| First version of TaiG which supports all devices with iOS 8.0 - 8.1.1 except Apple TV's.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1010.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;7346849bb3ff3dd1e21530ae1bb7ee27f02f453a&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Improve JB speed&lt;br /&gt;
* Improve stability&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1021.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4edab617f9b951419eca4c32ddc6a5f8a2e94226&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Able to remove 3K-Assistant via Cydia&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.1.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_1101.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2181179badac74cced2eb9ad5639b0f57be66f95&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Avoid sandbox generate redundant info.&lt;br /&gt;
* Officially built TaiG source(apt.taig.com), users who Jailbroke with TaiG before V1.1.0, can fix this problem by install TaiG 8.0-8.1.1 Untether.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_EN_1101.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;d3b40bbbd6f9cf652ece4476b96dafae858f1bb0&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.2.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1201.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;42848662a637234ef14d67448e4cf8e427906b52&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Add support for iOS 8.1.2&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_1201.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;5c6e2939359e36622ca2b4ca71d0def628dbbaf3&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;95df3a271473b5dbed29c950f5441aecd231b47a&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
* TaiG can support iTunes12.1 now(By download new driver from a post in 3K BBS)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.3.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;ca9364cd01ed89cd7b287d99bc061eca1b5d3870&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* TaiG can support all device with iOS8.2 Beta1&amp;amp;2 now&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_1300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;54687293aa915da0660cd34dfdd538df832d9236&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.0.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2000.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;B38B98C99D789CCB664A4EEAFF49976D9D38B260&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Officially released TaiG Jailbreak Tool V2.0.0, which support all device with iOS8.1.3-8.3.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2000.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;40FB5687A4452F9A556AFEAF6C28D00C7A62A9D4&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.1.2&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2120.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;16F5B1C1775B3A28244CB8EF6D966B7A102F0EF2&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fixes problems of getting stuck at 20% and 60%, and adaptate for latest iTunes.&lt;br /&gt;
* Compatible with Cydia Substrate(Mobile Substrate).&lt;br /&gt;
* Corrects the blank Settings problem while matching Apple Watch with iDevice.&lt;br /&gt;
* Fix issues of UIcache.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2120.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;65F55468216B0D584E4B48E1B910E4C87ECF6B00&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.1.3&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2130.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;B2CDDF98017DA7195E85236C5DCE33EFE9A84B74&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fix the issue of getting stuck at 20% while jailbreaking.&lt;br /&gt;
* Update the latest Cydia 1.1.18 and UIKitTools 1.1.1.0; fix the issue of icon missing after jailbreak.&lt;br /&gt;
* Fix long startup time of iPhone 4s after jailbreak.&lt;br /&gt;
* Fix the issue that TaiG Jailbreak Tool doesn't work on the virtual machine.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2130.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;60278237BA0435108A98F001FA7315B3EC365F87&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.2.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2200.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;FF95A038071FF6BDF241DA5987B0848A0D558511&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* TaiG released the original jailbreak tool V2.2.0. It supports all iDevices running iOS 8.1.3-8.4.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2200.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;6F2FD18267D3F7F68C63E988A91A95066F5E6BB1&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.2.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;53763BE89E12AE03D2B6BC44DE4CDFCAD8DF10A0&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fixes setreuid patch to prevent applications from obtaining to root privileges through setreuid.&lt;br /&gt;
* Increases stability.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2E12A2ACEF206FFC276A4DAE3112197150C4F66C&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.3.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;F5D6D7BDE790828395FD1D994F35EB63EEBF7FD5&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrates Cydia 1.1.19, which is perfectly compatible of iOS 8.3-8.4; removes setreuid patch.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;0CECE9B60C51AEE1C833703098279121CE23664C&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.3.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2310.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A35F4F73B8194984FB726D155A0AF4FA16FAB5FF&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrate the latest Cydia 1.1.20.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2310.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A35F4F73B8194984FB726D155A0AF4FA16FAB5FF&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2410.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;BE569D71A0EA413150D7E3064A0F561CD1FBA7E8&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fix the issue of getting stuck at 60% based on users' feedback.&lt;br /&gt;
* Optimize the process of jailbreak; improve the process's stability.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2410.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A8F3E920A082972A4ABB474FBC868969545FA83F&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.2 Beta&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2420.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt; 60C9457043DDF0C7EED4E1C041CC52DCA8FA0471&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrate the latest Cydia 1.1.23.&lt;br /&gt;
* Fix issues of getting stuck at 30% and 40%.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2420.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;FEF99FD48CE2CD0B83533E6275217FAB149BDB68&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.3&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2430.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;F585EE445328D15113E0A65D6D006C95FA0E8218&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Optimize the process of jailbreak.&lt;br /&gt;
* Fix issues of getting stuck at 30% and 40%.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2430.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4B3D8F1D3BDC0FB9FF489043C7F662D23A314D78&amp;lt;/code&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Mac ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! Language&lt;br /&gt;
! Download&lt;br /&gt;
! SHA-1&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | English&lt;br /&gt;
| [http://res.taig.com/installer/mac/TaiGjailbreak_V100.dmg TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;45194B96957EC60F6D62812AC8449C1C52F53BA1&amp;lt;/code&amp;gt;&lt;br /&gt;
| Officially released TaiG Jailbreak Tool for Mac V1.0.0, which support all device with iOS8.1.3-8.4.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.0&lt;br /&gt;
| [http://res.taig.com/installer/mac/TaiGjailbreak_V110.dmg TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4E4573C71C641BAEBD0AC5AC16038E7F3BBF7DB1&amp;lt;/code&amp;gt;&lt;br /&gt;
| TaiG for Mac V1.1.0 fixes the blank screen on OS X 10.9.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Installed Packages ==&lt;br /&gt;
* APR (/usr/lib) (1.3.3-2; &amp;lt;code&amp;gt;apr-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 (apt-key) (0.7.25.3-3; &amp;lt;code&amp;gt;apt7-key&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 Strict (lib) (0.7.25.3-13; &amp;lt;code&amp;gt;apt7-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Base Structure (1-4; &amp;lt;code&amp;gt;base&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Big Boss Icon Set (1.0; &amp;lt;code&amp;gt;org.thebigboss.repo.icons&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Bourne-Again SHell (4.0.44-15; &amp;lt;code&amp;gt;bash&amp;lt;/code&amp;gt;)&lt;br /&gt;
* bzip2 (1.0.5-7; &amp;lt;code&amp;gt;bzip2&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Core Utilities (/bin) (8.12-7p; &amp;lt;code&amp;gt;coreutils-bin&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Installer (1.1.19; &amp;lt;code&amp;gt;cydia&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Translations (1.1.12; &amp;lt;code&amp;gt;cydia-lproj&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Darwin Tools (1-4; &amp;lt;code&amp;gt;darwintools&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Packager (1.14.25-9; &amp;lt;code&amp;gt;dpkg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Utilities (3.3.3ubuntu1-1p; &amp;lt;code&amp;gt;debianutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Diff Utilities (2.8.1-6; &amp;lt;code&amp;gt;diffutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Find Utilities (4.2.33-6; &amp;lt;code&amp;gt;findutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* GNU Privacy Guard (1.4.8-4; &amp;lt;code&amp;gt;gnupg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* grep (2.5.4-3; &amp;lt;code&amp;gt;grep&amp;lt;/code&amp;gt;)&lt;br /&gt;
* gzip (1.6-7; &amp;lt;code&amp;gt;gzip&amp;lt;/code&amp;gt;)&lt;br /&gt;
* LZMA Utils (4.32.7-4; &amp;lt;code&amp;gt;lzma&amp;lt;/code&amp;gt;)&lt;br /&gt;
* New Curses (5.7-13; &amp;lt;code&amp;gt;ncurses&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM (Apple) (32.1-3; &amp;lt;code&amp;gt;pam&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM Modules (36.1-4; &amp;lt;code&amp;gt;pam-modules&amp;lt;/code&amp;gt;)&lt;br /&gt;
* pcre (8.30-5p; &amp;lt;code&amp;gt;pcre&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Profile Directory (0-2; &amp;lt;code&amp;gt;profile.d&amp;lt;/code&amp;gt;)&lt;br /&gt;
* readline (6.0-7; &amp;lt;code&amp;gt;readline&amp;lt;/code&amp;gt;)&lt;br /&gt;
* sed (4.1.5-7; &amp;lt;code&amp;gt;sed&amp;lt;/code&amp;gt;)&lt;br /&gt;
* shell-cmds (118-6; &amp;lt;code&amp;gt;shell-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* system-cmds (433.4-12; &amp;lt;code&amp;gt;system-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* TaiG 8.1.3-8.X Untether (2.3.0;&amp;lt;code&amp;gt;taiguntether83x&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Tape Archive (1.19-8; &amp;lt;code&amp;gt;tar&amp;lt;/code&amp;gt;)&lt;br /&gt;
* UIKit Tools (1.1.10; &amp;lt;code&amp;gt;uikittools&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
== Exploits and analysis ==&lt;br /&gt;
[http://newosxbook.com/articles/TaiG.html &amp;quot;The Annotated (informal) guide to TaiG - Part I&amp;quot;], and [http://newosxbook.com/articles/TaiG2.html &amp;quot;Part II&amp;quot;] by Jonathan Levin (iOS 8.0 - 8.1.2)&lt;br /&gt;
&lt;br /&gt;
[http://newosxbook.com/articles/28DaysLater.html?tiw &amp;quot;28 Days Later - The Annotated (informal) guide to TaiG returns - Part I&amp;quot;],  by Jonathan Levin (iOS 8.3 - iOS 8.4)&lt;br /&gt;
&lt;br /&gt;
[http://newosxbook.com/articles/HIDeAndSeek.html?tiw &amp;quot;HIDden Treasures&amp;quot; (TaiG 2 - Part II)],  by Jonathan Levin (iOS 8.3 - iOS 8.4)&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;br /&gt;
[[Category:Jailbreaking]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=47054</id>
		<title>TaiG</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=47054"/>
		<updated>2015-07-24T15:20:50Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Exploits and analysis */ added writeup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{about|the untethered jailbreak for iOS 8.0-8.1.2 and 8.1.3-8.4 for Windows|the Mac version for 8.0 - 8.1.2|PPJailbreak}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| name                   = TaiG&lt;br /&gt;
| title                  = TaiG&lt;br /&gt;
| author                 = TaiG&lt;br /&gt;
| developer              = TaiG&lt;br /&gt;
| released               = {{Start date|2014|11|29|df=yes}}&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version =  1.2.1 (8.0&amp;amp;nbsp;&amp;amp;#x2011;&amp;amp;nbsp;8.1.2)/{{Start date and age|2015|2|12|df=yes}} &amp;lt;br/&amp;gt; 2.4.3 (8.1.3&amp;amp;nbsp;&amp;amp;#x2011;&amp;amp;nbsp;8.4)/{{Start date and age|2015|7|20|df=yes}} &lt;br /&gt;
| latest release date = &lt;br /&gt;
| programming language   = ?&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| language               = [[wikipedia:Chinese language|Chinese]] / [[wikipedia:English language|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://www.taig.com/en/ taig.com/en] (English)&amp;lt;br /&amp;gt;[http://taig.com taig.com] (Chinese)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''TaiG''' ('''Taiji''' in Chinese) (&amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;[[wikipedia:Help:IPA for English|/taɪ dʒi/]]&amp;lt;/span&amp;gt; or &amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;/taɪ tʃi/&amp;lt;/span&amp;gt;) is an [[untethered jailbreak]] for all devices on iOS 8.0-8.4, except the [[Apple TV]] and [[Apple Watch]]. It was initially released on 29 November, 2014 for 8.0 - 8.1.2 but since updated to support 8.1.3 - 8.4.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices ==&lt;br /&gt;
All devices capable of running [[iOS]] 8.0-8.4 (except the [[Apple TV]] family and [[Apple Watch]]) are supported.&lt;br /&gt;
&lt;br /&gt;
=== iOS 8.2 Beta ===&lt;br /&gt;
&amp;lt;!-- should be reworded to mention that it was possibly there since the first day; the &amp;quot;signature&amp;quot; on the announcement is dated 2 Dec 2014 --&amp;gt;&lt;br /&gt;
TaiG's website originally claimed as early as [http://web.archive.org/web/20141204221416/http://taig.com/en/ 4 December 2014] that &amp;quot;support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release.&amp;quot; This claim remained through [http://web.archive.org/web/20141231032106/http://www.taig.com/ 31 December 2014], but was removed sometime before [http://web.archive.org/web/20150104165652/http://taig.com/en/ 4 January 2015].&lt;br /&gt;
&lt;br /&gt;
On 23 February 2015, version 1.3 was released to jailbreak iOS 8.2 beta and beta 2.&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! Language&lt;br /&gt;
! Download&lt;br /&gt;
! SHA-1&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | English&lt;br /&gt;
| [http://apt.taig.com/installer/TaiG_1006.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2538d85d3b42a2a65ec33aec86245c39047449d3&amp;lt;/code&amp;gt;&lt;br /&gt;
| First version of TaiG which supports all devices with iOS 8.0 - 8.1.1 except Apple TV's.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1010.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;7346849bb3ff3dd1e21530ae1bb7ee27f02f453a&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Improve JB speed&lt;br /&gt;
* Improve stability&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1021.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4edab617f9b951419eca4c32ddc6a5f8a2e94226&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Able to remove 3K-Assistant via Cydia&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.1.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_1101.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2181179badac74cced2eb9ad5639b0f57be66f95&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Avoid sandbox generate redundant info.&lt;br /&gt;
* Officially built TaiG source(apt.taig.com), users who Jailbroke with TaiG before V1.1.0, can fix this problem by install TaiG 8.0-8.1.1 Untether.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_EN_1101.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;d3b40bbbd6f9cf652ece4476b96dafae858f1bb0&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.2.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1201.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;42848662a637234ef14d67448e4cf8e427906b52&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Add support for iOS 8.1.2&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_1201.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;5c6e2939359e36622ca2b4ca71d0def628dbbaf3&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;95df3a271473b5dbed29c950f5441aecd231b47a&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
* TaiG can support iTunes12.1 now(By download new driver from a post in 3K BBS)&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.3.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;ca9364cd01ed89cd7b287d99bc061eca1b5d3870&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* TaiG can support all device with iOS8.2 Beta1&amp;amp;2 now&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_1300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;54687293aa915da0660cd34dfdd538df832d9236&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.0.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2000.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;B38B98C99D789CCB664A4EEAFF49976D9D38B260&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Officially released TaiG Jailbreak Tool V2.0.0, which support all device with iOS8.1.3-8.3.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2000.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;40FB5687A4452F9A556AFEAF6C28D00C7A62A9D4&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.1.2&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2120.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;16F5B1C1775B3A28244CB8EF6D966B7A102F0EF2&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fixes problems of getting stuck at 20% and 60%, and adaptate for latest iTunes.&lt;br /&gt;
* Compatible with Cydia Substrate(Mobile Substrate).&lt;br /&gt;
* Corrects the blank Settings problem while matching Apple Watch with iDevice.&lt;br /&gt;
* Fix issues of UIcache.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2120.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;65F55468216B0D584E4B48E1B910E4C87ECF6B00&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.1.3&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2130.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;B2CDDF98017DA7195E85236C5DCE33EFE9A84B74&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fix the issue of getting stuck at 20% while jailbreaking.&lt;br /&gt;
* Update the latest Cydia 1.1.18 and UIKitTools 1.1.1.0; fix the issue of icon missing after jailbreak.&lt;br /&gt;
* Fix long startup time of iPhone 4s after jailbreak.&lt;br /&gt;
* Fix the issue that TaiG Jailbreak Tool doesn't work on the virtual machine.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2130.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;60278237BA0435108A98F001FA7315B3EC365F87&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.2.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2200.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;FF95A038071FF6BDF241DA5987B0848A0D558511&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* TaiG released the original jailbreak tool V2.2.0. It supports all iDevices running iOS 8.1.3-8.4.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2200.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;6F2FD18267D3F7F68C63E988A91A95066F5E6BB1&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.2.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;53763BE89E12AE03D2B6BC44DE4CDFCAD8DF10A0&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fixes setreuid patch to prevent applications from obtaining to root privileges through setreuid.&lt;br /&gt;
* Increases stability.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2E12A2ACEF206FFC276A4DAE3112197150C4F66C&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.3.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;F5D6D7BDE790828395FD1D994F35EB63EEBF7FD5&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrates Cydia 1.1.19, which is perfectly compatible of iOS 8.3-8.4; removes setreuid patch.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2300.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;0CECE9B60C51AEE1C833703098279121CE23664C&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.3.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_2310.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A35F4F73B8194984FB726D155A0AF4FA16FAB5FF&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrate the latest Cydia 1.1.20.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_2310.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A35F4F73B8194984FB726D155A0AF4FA16FAB5FF&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2410.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;BE569D71A0EA413150D7E3064A0F561CD1FBA7E8&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Fix the issue of getting stuck at 60% based on users' feedback.&lt;br /&gt;
* Optimize the process of jailbreak; improve the process's stability.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2410.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;A8F3E920A082972A4ABB474FBC868969545FA83F&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.2 Beta&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2420.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt; 60C9457043DDF0C7EED4E1C041CC52DCA8FA0471&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Integrate the latest Cydia 1.1.23.&lt;br /&gt;
* Fix issues of getting stuck at 30% and 40%.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2420.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;FEF99FD48CE2CD0B83533E6275217FAB149BDB68&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 2.4.3&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://res.taig.com/installer/TaiGJBreak_2430.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;F585EE445328D15113E0A65D6D006C95FA0E8218&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Optimize the process of jailbreak.&lt;br /&gt;
* Fix issues of getting stuck at 30% and 40%.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://res.taig.com/installer/en/TaiGJBreak_EN_2430.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4B3D8F1D3BDC0FB9FF489043C7F662D23A314D78&amp;lt;/code&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Installed Packages ==&lt;br /&gt;
* APR (/usr/lib) (1.3.3-2; &amp;lt;code&amp;gt;apr-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 (apt-key) (0.7.25.3-3; &amp;lt;code&amp;gt;apt7-key&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 Strict (lib) (0.7.25.3-13; &amp;lt;code&amp;gt;apt7-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Base Structure (1-4; &amp;lt;code&amp;gt;base&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Big Boss Icon Set (1.0; &amp;lt;code&amp;gt;org.thebigboss.repo.icons&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Bourne-Again SHell (4.0.44-15; &amp;lt;code&amp;gt;bash&amp;lt;/code&amp;gt;)&lt;br /&gt;
* bzip2 (1.0.5-7; &amp;lt;code&amp;gt;bzip2&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Core Utilities (/bin) (8.12-7p; &amp;lt;code&amp;gt;coreutils-bin&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Installer (1.1.19; &amp;lt;code&amp;gt;cydia&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Translations (1.1.12; &amp;lt;code&amp;gt;cydia-lproj&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Darwin Tools (1-4; &amp;lt;code&amp;gt;darwintools&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Packager (1.14.25-9; &amp;lt;code&amp;gt;dpkg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Utilities (3.3.3ubuntu1-1p; &amp;lt;code&amp;gt;debianutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Diff Utilities (2.8.1-6; &amp;lt;code&amp;gt;diffutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Find Utilities (4.2.33-6; &amp;lt;code&amp;gt;findutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* GNU Privacy Guard (1.4.8-4; &amp;lt;code&amp;gt;gnupg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* grep (2.5.4-3; &amp;lt;code&amp;gt;grep&amp;lt;/code&amp;gt;)&lt;br /&gt;
* gzip (1.6-7; &amp;lt;code&amp;gt;gzip&amp;lt;/code&amp;gt;)&lt;br /&gt;
* LZMA Utils (4.32.7-4; &amp;lt;code&amp;gt;lzma&amp;lt;/code&amp;gt;)&lt;br /&gt;
* New Curses (5.7-13; &amp;lt;code&amp;gt;ncurses&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM (Apple) (32.1-3; &amp;lt;code&amp;gt;pam&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM Modules (36.1-4; &amp;lt;code&amp;gt;pam-modules&amp;lt;/code&amp;gt;)&lt;br /&gt;
* pcre (8.30-5p; &amp;lt;code&amp;gt;pcre&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Profile Directory (0-2; &amp;lt;code&amp;gt;profile.d&amp;lt;/code&amp;gt;)&lt;br /&gt;
* readline (6.0-7; &amp;lt;code&amp;gt;readline&amp;lt;/code&amp;gt;)&lt;br /&gt;
* sed (4.1.5-7; &amp;lt;code&amp;gt;sed&amp;lt;/code&amp;gt;)&lt;br /&gt;
* shell-cmds (118-6; &amp;lt;code&amp;gt;shell-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* system-cmds (433.4-12; &amp;lt;code&amp;gt;system-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* TaiG 8.1.3-8.X Untether (2.3.0;&amp;lt;code&amp;gt;taiguntether83x&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Tape Archive (1.19-8; &amp;lt;code&amp;gt;tar&amp;lt;/code&amp;gt;)&lt;br /&gt;
* UIKit Tools (1.1.10; &amp;lt;code&amp;gt;uikittools&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
== Exploits and analysis ==&lt;br /&gt;
[http://newosxbook.com/articles/TaiG.html &amp;quot;The Annotated (informal) guide to TaiG - Part I&amp;quot;], and [http://newosxbook.com/articles/TaiG2.html &amp;quot;Part II&amp;quot;] by Jonathan Levin (iOS 8.0 - 8.1.2)&lt;br /&gt;
&lt;br /&gt;
[http://newosxbook.com/articles/28DaysLater.html?tiw &amp;quot;28 Days Later - The Annotated (informal) guide to TaiG returns - Part I&amp;quot;],  by Jonathan Levin (iOS 8.3 - iOS 8.4)&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=47014</id>
		<title>Kernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=47014"/>
		<updated>2015-07-20T19:49:11Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Boot-Args */  updated boot-args list + method of extraction (musclenerd's script was obsolete and didnt work well)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''kernel''' of [[iOS]] is the [[wikipedia:XNU|XNU]] kernel. To learn about what &amp;quot;kernel&amp;quot; means in general, see [https://en.wikipedia.org/wiki/Kernel_(operating_system) the Wikipedia article].&lt;br /&gt;
&lt;br /&gt;
Pre-2.0, it was vulnerable to the [[Ramdisk Hack]] and may still be, but iBoot doesn't allow boot-args to be passed anymore. It is mapped to memory at 0x80000000, forcing a 2/2GB address separation, similar to Windows 32-bit model. On older iOS versions the separation was 3/1 (mapping the kernel at 0xC0000000), closer to the Linux model.&lt;br /&gt;
&lt;br /&gt;
Note, that this is NOT like 32-bit OS X, wherein the kernel resides in its own address space, but more like OS X 64-bit, wherein [[wikipedia:Control_Register#CR3|CR3]] is shared (albeit an address space larger by several orders of magnitude). See the appropriate [[#64-bit|section]].&lt;br /&gt;
&lt;br /&gt;
== [[ASLR]] ==&lt;br /&gt;
{{main|Kernel ASLR}}&lt;br /&gt;
As of [[iOS]] 6, the kernel is subject to ASLR, much akin to Mountain Lion (OS X 10.8). This make exploitation harder as the location of kernel code cannot be known.&lt;br /&gt;
&lt;br /&gt;
On production and development devices, the kernel is always stored as a statically linked [[kernelcache|cache]] stored at [[/System/Library/Caches/com.apple.kernelcaches/kernelcache]] that is decompressed and run on startup. &lt;br /&gt;
&lt;br /&gt;
== Stack ==&lt;br /&gt;
The kernel maintains thread specific stacks by calling kernel_memory_allocate, this allocates stacks in the specified kalloc zone. The bootstrap thread has its own specific static kernel stack, which is specified by _intstack. IRQ and FIQ handlers will also have their own execution stack which is specified by _irqstack.&lt;br /&gt;
&lt;br /&gt;
== Boot-Args ==&lt;br /&gt;
Like its OS X counterpart, iOS's XNU accepts command line arguments (though the actual passing of arguments is done by iBoot, which as of late refuses to do so). Arguments may be directed at the kernel proper, or any one of the many KExts (discussed below). The arguments of the kernel are largely the same as those of OS X.&lt;br /&gt;
&lt;br /&gt;
Kexts use boot-args as well, as can be seen when disassembly by calls to PE_parse_boot_argn (usually exported, _PE_parse_boot_argn 8027A8EC on the iOS 6.1.3 kernel, discovered by [[User:Haifisch|Haifisch]]). Finding references (using IDA) reveals hundreds places in the code wherein arguments are parsed in modules, pertaining to Flash, HDMI, and [[AppleMobileFileIntegrity|AMFI]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The list of boot-args can be extracted from any kernel dump once the address of _PE_parse_boot_argn is determined (which is usually automatically). A list from iOS 8.4 is shown below:&lt;br /&gt;
&lt;br /&gt;
 # perform a full disassembly, isolate decompiled lines (^;) with PE_parse.. and isolate string between quotes, sorted uniquely:&lt;br /&gt;
 # morpheus@Zephyr (~)$ '''jtool -d __TEXT.__text kernel.8.4.dump | grep PE_parse |grep '^; '| cut -d\&amp;quot; -f2 | cut -d\&amp;quot; -f1 | sort -u'''&lt;br /&gt;
 -b&lt;br /&gt;
 -disable_atm&lt;br /&gt;
 -factory_debug&lt;br /&gt;
 -l&lt;br /&gt;
 -multiq-deep-drain&lt;br /&gt;
 -no-zp&lt;br /&gt;
 -no64exec&lt;br /&gt;
 -novfscache&lt;br /&gt;
 -oldmezname&lt;br /&gt;
 -panic_on_exception_triage&lt;br /&gt;
 -progress&lt;br /&gt;
 -qos-policy-allow&lt;br /&gt;
 -s&lt;br /&gt;
 -vm16k&lt;br /&gt;
 -vnode_cache_defeat&lt;br /&gt;
 -x&lt;br /&gt;
 -zc&lt;br /&gt;
 -zinfop&lt;br /&gt;
 -zp&lt;br /&gt;
 aks_default_class&lt;br /&gt;
 assert&lt;br /&gt;
 bg_preempt&lt;br /&gt;
 boot-uuid&lt;br /&gt;
 colors&lt;br /&gt;
 cpumon_ustackshots_trigger_pct&lt;br /&gt;
 darkwake&lt;br /&gt;
 dart&lt;br /&gt;
 dcc&lt;br /&gt;
 debug&lt;br /&gt;
 diag&lt;br /&gt;
 disable_exc_resource&lt;br /&gt;
 fill&lt;br /&gt;
 hwm_user_cores&lt;br /&gt;
 ifa_debug&lt;br /&gt;
 ifnet_debug&lt;br /&gt;
 imp_interactive_receiver &lt;br /&gt;
 inaddr_nhash&lt;br /&gt;
 initmcl&lt;br /&gt;
 interrupt_accounting&lt;br /&gt;
 io&lt;br /&gt;
 io_throttle_period_tier1&lt;br /&gt;
 io_throttle_period_tier2&lt;br /&gt;
 io_throttle_period_tier3&lt;br /&gt;
 io_throttle_window_tier1&lt;br /&gt;
 io_throttle_window_tier2&lt;br /&gt;
 io_throttle_window_tier3&lt;br /&gt;
 iosched&lt;br /&gt;
 iotrace&lt;br /&gt;
 jcon&lt;br /&gt;
 jtag&lt;br /&gt;
 keepsyms&lt;br /&gt;
 kernel_stack_pages&lt;br /&gt;
 kextlog&lt;br /&gt;
 kmapoff&lt;br /&gt;
 lcks&lt;br /&gt;
 lo_txstart&lt;br /&gt;
 longterm&lt;br /&gt;
 max_cpumon_interval&lt;br /&gt;
 max_cpumon_percentage&lt;br /&gt;
 max_task_pmem&lt;br /&gt;
 maxmem&lt;br /&gt;
 maxoffset&lt;br /&gt;
 mbuf_debug&lt;br /&gt;
 mbuf_pool&lt;br /&gt;
 mcache_flags&lt;br /&gt;
 mleak_sample_factor&lt;br /&gt;
 mseg&lt;br /&gt;
 msgbuf&lt;br /&gt;
 mtxspin&lt;br /&gt;
 multiq_drain_band_limit&lt;br /&gt;
 multiq_drain_depth_limit&lt;br /&gt;
 multiq_drain_urgent_first&lt;br /&gt;
 nbuf&lt;br /&gt;
 ncl&lt;br /&gt;
 net.inet.ip.scopedroute&lt;br /&gt;
 net.inet6.ip6.scopedroute&lt;br /&gt;
 net_affinity&lt;br /&gt;
 net_rtref&lt;br /&gt;
 net_rxpoll&lt;br /&gt;
 network-type&lt;br /&gt;
 panic_on_cs_killed&lt;br /&gt;
 preempt&lt;br /&gt;
 qos_override_mode&lt;br /&gt;
 rd&lt;br /&gt;
 rootdev&lt;br /&gt;
 rte_debug&lt;br /&gt;
 sched&lt;br /&gt;
 sched_decay_penalty&lt;br /&gt;
 sched_decay_usage_age_factor&lt;br /&gt;
 sched_pri_decay_limit&lt;br /&gt;
 sched_use_combined_fgbg_decay&lt;br /&gt;
 serial&lt;br /&gt;
 serverperfmode&lt;br /&gt;
 slto_us&lt;br /&gt;
 socket_debug&lt;br /&gt;
 task_policy_suppression_disable&lt;br /&gt;
 task_wakeups_monitor_interval&lt;br /&gt;
 task_wakeups_monitor_rate&lt;br /&gt;
 task_wakeups_monitor_ustackshots_trigger_pct&lt;br /&gt;
 tbi&lt;br /&gt;
 trace&lt;br /&gt;
 trace_panic&lt;br /&gt;
 trace_typefilter&lt;br /&gt;
 trace_wake&lt;br /&gt;
 unrestrict_coalition_syscalls&lt;br /&gt;
 vm_compression_limit&lt;br /&gt;
 vm_compressor&lt;br /&gt;
 vm_compressor_immediate&lt;br /&gt;
 vm_compressor_threads&lt;br /&gt;
 wfi&lt;br /&gt;
 wqsize &lt;br /&gt;
 zalloc_debug&lt;br /&gt;
 zlog&lt;br /&gt;
 zp-factor&lt;br /&gt;
 zp-scale&lt;br /&gt;
 zrecs&lt;br /&gt;
 zsize&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
In the beginning iOS had consistently maintained a fairly higher kernel version than the corresponding version of OS X, but over time iOS and OS X &amp;quot;moved nearer&amp;quot; together. Now at the time of writing, OS X Yosemite's XNU is 2782, whereas iOS 8.4 is 2784. This is not surprising, considering that iOS introduced novel features (such as [[Kernel ASLR]], the default freezer, and various security hardening features) which are first incorporated in it, and later made it to OS X. It seems that Apple is planning to gradually unite iOS and OS X kernels over time and with iOS 8 and OS X Yosemite the at least the version numbers are nearer to each other then ever before. The following demonstrates the OS versions at present (via terminal '''uname -a''' command):&lt;br /&gt;
&lt;br /&gt;
OS X Yosemite 10.10.4:&lt;br /&gt;
 &lt;br /&gt;
 Darwin Kernel Version 14.4.0: Thu May 28 11:35:04 PDT 2015; root:xnu-2782.30.5~1/RELEASE_X86_64&lt;br /&gt;
	&lt;br /&gt;
iOS 8.4:&lt;br /&gt;
&lt;br /&gt;
 Darwin Kernel Version 14.0.0: Wed Jun 24 00:50:15 PDT 2015; root:xnu-2784.30.7~30/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
&lt;br /&gt;
Note: The RELEASE_ARM_xxxxxxxx file obviously differs on device / CPU and the time varies by a few minutes per device. &lt;br /&gt;
&lt;br /&gt;
=== Version List ===&lt;br /&gt;
The compilation date for each version will vary slightly between processors. This is due to the fact that compilations are sequential.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| [[Alpine 1A420 (iPhone)|1A420]]&lt;br /&gt;
| Darwin Kernel Version 4.4.2-Purple-19: Thu Mar 8 01:43:04 PST 2007; root:xnu-933.0.14~46/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| from prototype - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Tue May 22 21:15:54 PDT 2007; root:xnu-933.0.178/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.0.0d1: Fri Jun 22 00:38:56 PDT 2007; root:xnu-933.1.178~1/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
|-&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | 1.0.2&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Sep 19 00:08:42 PDT 2007; root:xnu-933.0.203~21/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| First kernel that was [[8900_File_Format#8900|8900]] encrypted - not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
| Darwin Kernel Version 9.0.0d1: Wed Oct 10 00:07:49 PDT 2007; root:xnu-933.0.204~7/RELEASE_ARM_[[S5L8900]]XRB&lt;br /&gt;
| Not sure if version is 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.0.0d1: Wed Dec 12 00:16:00 PST 2007; root:xnu-933.0.211~2/RELEASE_ARM_[[S5L8900]]XRB &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.5&lt;br /&gt;
| iPod touch only&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | Darwin Kernel Version 9.3.1: Sun Jun 15 21:37:01 PDT 2008; root:xnu-1228.6.76~45/RELEASE_ARM_[[S5L8900]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 9.4.1: Sun Aug 10 21:25:25 PDT 2008; root:xnu-1228.7.27~12/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Sat Nov  1 19:13:13 PDT 2008; root:xnu-1228.7.36~2/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
| Darwin Kernel Version 9.4.1: Mon Dec  8 21:02:57 PST 2008; root:xnu-1228.7.37~4/RELEASE_ARM_[[S5L8720]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.0.0d3: Wed May 13 22:16:49 PDT 2009; root:xnu-1357.2.89~4/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Aug 14 13:23:32 PDT 2009; root:xnu-1357.5.30~2/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.2&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Sep 25 23:35:35 PDT 2009; root:xnu-1357.5.30~3/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.3&lt;br /&gt;
| Darwin Kernel Version 10.0.0d3: Fri Dec 18 01:34:28 PST 2009; root:xnu-1357.5.30~6/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Mon Mar 15 23:15:33 PDT 2010; root:xnu-1504.2.27~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | iPad Only &lt;br /&gt;
|-&lt;br /&gt;
| 3.2.1&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Fri May 28 16:46:17 PDT 2010; root:xnu-1504.2.50~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.2&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Darwin Kernel Version 10.3.1: Wed Aug  4 19:08:04 PDT 2010; root:xnu-1504.2.60~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|-&lt;br /&gt;
| 4.0&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 10.3.1: Wed May 26 22:28:33 PDT 2010; root:xnu-1504.50.73~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.2&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 18:46:06 PDT 2010; root:xnu-1504.50.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.1&lt;br /&gt;
| Darwin Kernel Version 10.3.1: Wed Aug  4 22:35:51 PDT 2010; root:xnu-1504.55.33~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.1&lt;br /&gt;
| Darwin Kernel Version 10.4.0: Wed Oct 20 20:14:45 PDT 2010; root:xnu-1504.58.28~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Thu Feb 10 21:46:56 PST 2011; root:xnu-1735.46~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Wed Mar 30 18:51:10 PDT 2011; root:xnu-1735.46~10/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.3&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.4&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Sat Jul  9 00:59:43 PDT 2011; root:xnu-1735.47~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.5&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0b5&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Tue Aug  2 22:31:30 PDT 2011; root:xnu-1878.4.80~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Thu Sep 15 23:34:43 PDT 2011; root:xnu-1878.4.43~2/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1b&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Oct 19 19:05:07 PDT 2011; root:xnu-1878.4.45~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1b2&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 11.0.0: Tue Nov 1 20:34:16 PDT 2011; root:xnu-1878.4.46~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1b&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Nov 13 19:10:13 PST 2011; root:xnu-1878.10.61~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1b2&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Dec  4 18:57:33 PST 2011; root:xnu-1878.10.68~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 5.1b3&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Mon Jan  2 18:46:01 PST 2012; root:xnu-1878.10.74~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Feb 1 23:18:07 PST 2012; root:xnu-1878.11.8~1/RELEASE_ARM_[[S5L8945]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Apr 8 21:51:26 PDT 2012; root:xnu-1878.11.10~1/RELEASE_ARM_[[S5L8930]]X &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0b&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed May 30 19:23:03 PDT 2012; root:xnu-2107.1.78~18/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0b2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jun 17 19:47:47 PDT 2012; root:xnu-2107.1.61~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0b3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul  8 20:15:17 PDT 2012; root:xnu-2107.2.9~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0b4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Jul 29 20:15:28 PDT 2012; root:xnu-2107.2.26~4/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Aug 19 00:31:06 PDT 2012; root:xnu-2107.2.33~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 13.0.0: Wed Oct 10 23:32:19 PDT 2012; root:xnu-2107.2.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.2&lt;br /&gt;
| iPhone 5 only. &lt;br /&gt;
|-&lt;br /&gt;
| 6.1b&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Oct 21 19:28:43 PDT 2012; root:xnu-2107.7.51~17/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1b2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Nov  4 19:02:54 PST 2012; root:xnu-2107.7.53~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1b3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Mon Nov 26 21:17:13 PST 2012; root:xnu-2107.7.53~27/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1b4&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec  9 19:22:45 PST 2012; root:xnu-2107.7.55~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1b5&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Sun Dec 16 20:01:39 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.1b&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.1&lt;br /&gt;
| iPhone 4S only&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.3b2&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; | Darwin Kernel Version 13.0.0: Wed Feb 13 21:35:42 PST 2013; root:xnu-2107.7.55.2.2~1/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.3&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.4&lt;br /&gt;
| iPhone 5 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.5&lt;br /&gt;
| iPod touch 4 only.&lt;br /&gt;
|-&lt;br /&gt;
| 6.1.6&lt;br /&gt;
| iPod touch 4 and iPhone 3GS only.&lt;br /&gt;
|- &lt;br /&gt;
| 7.0b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed May 29 23:53:59 PDT 2013; root:xnu-2423.1.1.1.2~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0b2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jun 17 00:51:51 PDT 2013; root:xnu-2423.1.28~7/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul  1 04:25:28 PDT 2013; root:xnu-2423.1.40~11/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jul 22 02:12:11 PDT 2013; root:xnu-2423.1.55~8/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 7.0b5&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Sun Aug  4 22:40:14 PDT 2013; root:xnu-2423.1.70~6/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0b6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 13 21:39:05 PDT 2013; root:xnu-2423.1.73~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Sep 9 20:56:02 PDT 2013; root:xnu-2423.1.74~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
| [[iPhone 5c]] and [[iPhone 5s|5s]] only&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; | Darwin Kernel Version 14.0.0: Fri Sep 27 23:08:32 PDT 2013; root:xnu-2423.3.12~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.4&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.5&lt;br /&gt;
| iPhone 5c (iPhone5,4) and iPhone 5s (iPhone6,2) only.&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.6&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Nov 11 04:18:01 PST 2013; root:xnu-2423.10.33~9/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1b2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Dec 10 21:25:34 PST 2013; root:xnu-2423.10.38.1.1~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Jan  2 01:55:45 PST 2014; root:xnu-2423.10.45~5/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 13 03:33:00 PST 2014; root:xnu-2423.10.49.0.1~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1b5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 27 23:55:13 PST 2014; root:xnu-2423.10.58~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Feb 21 19:41:10 PST 2014; root:xnu-2423.10.67~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Mar 28 21:22:10 PDT 2014; root:xnu-2423.10.70~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 7.1.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu May 15 23:17:54 PDT 2014; root:xnu-2423.10.71~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon May 26 22:09:06 PDT 2014; root:xnu-2729.0.0.0.9~2/RELEASE_ARM_[[S5L8942]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0b2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Jun 14 16:36:40 PDT 2014; root:xnu-2775.0.0.1.1~3/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul  2 18:51:34 PDT 2014; root:xnu-2783.1.21~19/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 16 21:55:26 PDT 2014; root:xnu-2783.1.40.0.3~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0b5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Jul 30 23:04:17 PDT 2014; root:xnu-2783.1.62~20/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0[[Golden Master|GM]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Tue Aug 19 15:09:47 PDT 2014; root:xnu-2783.1.72~8/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Thu Sep 18 21:52:21 PDT 2014; root:xnu-2783.1.72~23/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.0.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sat Sep 27 18:49:49 PDT 2014; root:xnu-2783.3.12~18/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1b2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 3 21:52:09 PDT 2014; root:xnu-2783.3.13~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Fri Oct 7 00:04:37 PDT 2014; root:xnu-2783.3.13~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Nov 2 20:21:29 PDT 2014; root:xnu-2783.3.21~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.1&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Darwin Kernel Version 14.0.0: Mon Nov 3 22:54:30 PDT 2014; root:xnu-2783.3.22~1/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.2&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.1.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 2 21:29:20 PST 2015; root:xnu-2783.3.26~3/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Dec 14 20:59:15 PST 2014; root:xnu-2783.5.29.0.1~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Jan  6 21:02:10 PST 2015; root:xnu-2783.5.32~9/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2b5&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Jan 26 22:16:17 PST 2015; root:xnu-2783.5.37~11/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Feb 9 22:07:57 PST 2015; root:xnu-2783.5.38~5/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Mon Mar 4 20:55:58 PST 2015; root:xnu-2784.20.25~26/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Thu Mar 19 00:16:36 PST 2015; root:xnu-2784.20.31~1/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Sun Mar 29 19:44:04 PDT 2015; root:xnu-2784.20.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4b&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 8 21:26:37 PDT 2015; root:xnu-2784.30.1~29/RELEASE_ARM64_[[T7000]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4b2&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Wed Apr 21 21:49:05 PDT 2015; root:xnu-2784.30.2~9/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4b3&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue May 5 23:09:22 PDT 2015; root:xnu-2784.30.5~7/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4b4&lt;br /&gt;
| Darwin Kernel Version 14.0.0: Tue Wed 3 23:19:49 PDT 2015; root:xnu-2784.30.7~13/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 8.4&lt;br /&gt;
|  Darwin Kernel Version 14.0.0: Wed Jun 24 00:50:15 PDT 2015; root:xnu-2784.30.7~30/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0b&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Fri May 29 22:14:48 PDT 2015; root:xnu-3216.0.0.1.15~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 9.0b2&lt;br /&gt;
| Darwin Kernel Version 15.0.0: Mon Jun 15 21:51:54 PDT 2015; root:xnu-3247.1.6.1.1~2/RELEASE_ARM64_[[S5L8960]]X&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Source Code ==&lt;br /&gt;
As XNU is based off of the [[wikipedia:Berkeley Software Distribution|BSD kernel]], it is [http://opensource.apple.com/source/xnu open source]. The source is under a [http://opensource.apple.com/license/bsd/ 3-clause BSD License] for the original BSD portions with the portions added by Apple under the [http://opensource.apple.com/license/apsl/ Apple Public Source License]. The [[#Versions|versions contained in iOS]] are not available, instead only versions used in ''OS X'' are available. This does not appear to be legal as per &amp;amp;#x00A7;2.3 in the APSL:&lt;br /&gt;
 2.3     Distribution of Executable Versions.  In addition, if You Externally Deploy Covered&lt;br /&gt;
 Code (Original Code and/or Modifications) in object code, executable form only, '''You must'''&lt;br /&gt;
 '''include a prominent notice''', in the code itself as well as in related documentation, '''stating'''&lt;br /&gt;
 '''that Source Code of the Covered Code is available''' under the terms of this License '''with'''&lt;br /&gt;
 '''information on how and where to obtain such Source Code'''.&lt;br /&gt;
with ''Source Code'' defined in &amp;amp;#x00A7;1.8:&lt;br /&gt;
 1.8     &amp;quot;Source Code&amp;quot; means the human readable form of a program or other work that is&lt;br /&gt;
 suitable for making modifications to it, including all modules it contains, plus any&lt;br /&gt;
 associated interface definition files, scripts used to control compilation and installation&lt;br /&gt;
 of an executable (object code).&lt;br /&gt;
&lt;br /&gt;
It is worth noting that Apple does ''not'' list XNU as being an open source component of [[iOS]]. This can be seen by viewing [http://opensource.apple.com/ opensource.apple.com] and selecting ''any'' iOS version. As far as can be told, ''none'' of the versions of XNU are available in source version.&lt;br /&gt;
&lt;br /&gt;
There are many other open souce components that iOS uses that are ''not'' listed, such as:&lt;br /&gt;
* [http://opensource.apple.com/source/CF/ CF] ([https://developer.apple.com/library/mac/#documentation/CoreFoundation/Reference/CoreFoundation_Collection/_index.html CoreFoundation] - Cocoa)&lt;br /&gt;
* [http://opensource.apple.com/source/SQLite/ SQLite] ([http://www.sqlite.org/ SQLite] - database utility)&lt;br /&gt;
* [http://opensource.apple.com/source/TimeZoneData/ TimeZoneData] ([[wikipedia:tz database|tz database]] - [[/usr/share/zoneinfo]])&lt;br /&gt;
* [http://opensource.apple.com/source/curl/ curl](?) ([http://curl.haxx.se/ libcurl] - various HTTP operations)&lt;br /&gt;
* [http://opensource.apple.com/source/hfs/ hfs] (hfs - [[wikipedia:Hierarchical File System|HFS]] driver)&lt;br /&gt;
* [http://opensource.apple.com/source/launchd/ launchd] ([[launchd]] - launch daemon)&lt;br /&gt;
* [http://opensource.apple.com/source/libxml2/ libxml2](?) ([http://www.xmlsoft.org/ libxml2] - parser for [[wikipedia:XML|XML]] [[PList File Format|plist]]s)&amp;lt;!-- or does CF handle the parsing? --&amp;gt;&lt;br /&gt;
* [http://opensource.apple.com/source/xnu/ xnu] (XNU - Kernel)&lt;br /&gt;
* [http://opensource.apple.com/source/zip/ zip] (zip - extraction of various files)&lt;br /&gt;
It does ''not'' appear that Apple assumes what you see in the ''OS X'' pages are also on ''iOS''&amp;lt;!-- reword needed --&amp;gt; as [http://opensource.apple.com/source/JavaScriptCore/ JavaScriptCore], [http://opensource.apple.com/source/WebCore/ WebCore], among others are listed on both [http://opensource.apple.com/release/mac-os-x-108/ OS X] (10.8) and [http://opensource.apple.com/release/ios-60/ iOS] (6.0), albeit different versions.&lt;br /&gt;
&lt;br /&gt;
It is also worth noting that [http://opensource.apple.com/source/gdb/ gdb] ([[wikipedia:GNU Compiler Collection|GCC]] debugger) and [http://opensource.apple.com/source/ld64/ ld64] are listed as components in [http://opensource.apple.com/release/ios-60/ iOS 6.0]. Why there are present is a mystery as they are not present on unaltered devices, but only through [[Cydia.app|Cydia]] or [[Xcode]]'s &amp;lt;code&amp;gt;DeveloperImage.dmg&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Kernel Extensions ==&lt;br /&gt;
iOS, sadly, does ''not'' have [[Kernel Extension|kext]]s floating around the [[/|file system]], but they are indeed present. The [[kernelcache]] can be unpacked to show the kernel proper, along with the kexts (all packed in the __PRELINK_TEXT section) and their [[PList File Format|plist]]s (in the __PRELINK_INFO section).&lt;br /&gt;
&lt;br /&gt;
The Cydia supplied [[kextstat]] does not work on [[iOS]]. Sadly, the reason is that kextstat relies on &amp;lt;code&amp;gt;kmod_get_info(...)&amp;lt;/code&amp;gt;, which is a deprecated (and recently removed) API in recent&amp;lt;!-- how recent? --&amp;gt; iOS and OS X versions. With that said, the [[Kernel Extension|kext]]s ''do'' exist. The alternative, [[kextstat#jkextstat|jkextstat]], ''does'' work on recent iOS versions. jkextstat can cause some confusion as it uses the executable name &amp;lt;code&amp;gt;kextstat&amp;lt;/code&amp;gt;, similar to how calling &amp;lt;code&amp;gt;g++&amp;lt;/code&amp;gt; just launches &amp;lt;code&amp;gt;gcc&amp;lt;/code&amp;gt; but with parameters to treat all &amp;lt;code&amp;gt;.c&amp;lt;/code&amp;gt; files as C++ files.&lt;br /&gt;
&lt;br /&gt;
The following is the output from [[kextstat#jkextstat|jkextstat]] on an [[n81ap|iPod touch 4G]] running [[iOS]] 6(?):&lt;br /&gt;
&lt;br /&gt;
 Podicum:~ root# ./kextstat &lt;br /&gt;
   0 __kernel__ &lt;br /&gt;
   1 kpi.bsd &lt;br /&gt;
   2 kpi.dsep &lt;br /&gt;
   3 kpi.iokit &lt;br /&gt;
   4 kpi.libkern &lt;br /&gt;
   5 kpi.mach &lt;br /&gt;
   6 kpi.private &lt;br /&gt;
   7 kpi.unsupported &lt;br /&gt;
   8 driver.AppleARMPlatform &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
   9 iokit.IOStorageFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  10 driver.DiskImages &amp;lt;1 3 4 5 6 7 9&amp;gt;&lt;br /&gt;
  11 driver.FairPlayIOKit &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  12 driver.IOSlaveProcessor &amp;lt;3 4&amp;gt;&lt;br /&gt;
  13 driver.IOP_s5l8930x_firmware &amp;lt;3 4 12&amp;gt;&lt;br /&gt;
  14 iokit.AppleProfileFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  15 iokit.IOCryptoAcceleratorFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  16 driver.AppleMobileFileIntegrity &amp;lt;1 2 3 4 5 6 7 15&amp;gt;&lt;br /&gt;
  17 iokit.IONetworkingFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  18 iokit.IOUserEthernet &amp;lt;1 3 4 5 6 16 17&amp;gt;&lt;br /&gt;
  19 platform.AppleKernelStorage &amp;lt;3 4 7&amp;gt;&lt;br /&gt;
  20 iokit.IOSurface &amp;lt;1 3 4 5 6 7 8&amp;gt;&lt;br /&gt;
  21 iokit.IOStreamFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  22 iokit.IOAudio2Family &amp;lt;1 3 4 5 21&amp;gt;&lt;br /&gt;
  23 driver.AppleAC3Passthrough &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  24 iokit.EncryptedBlockStorage &amp;lt;1 3 4 5 9 15&amp;gt;&lt;br /&gt;
  25 iokit.IOFlashStorage &amp;lt;1 3 4 5 7 9 24&amp;gt;&lt;br /&gt;
  26 driver.AppleEffaceableStorage &amp;lt;1 3 4 5 7 8 25&amp;gt;&lt;br /&gt;
  27 driver.AppleKeyStore &amp;lt;1 3 4 5 6 7 15 16 26&amp;gt;&lt;br /&gt;
  28 kext.AppleMatch &amp;lt;1 4&amp;gt;&lt;br /&gt;
  29 security.sandbox &amp;lt;1 2 3 4 5 6 7 16 28&amp;gt;&lt;br /&gt;
  30 driver.AppleS5L8930X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  31 iokit.IOHIDFamily &amp;lt;1 3 4 5 6 7 16&amp;gt;&lt;br /&gt;
  32 driver.AppleM68Buttons &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  33 iokit.IOUSBDeviceFamily &amp;lt;1 3 4 5&amp;gt;&lt;br /&gt;
  34 iokit.IOSerialFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  35 driver.AppleOnboardSerial &amp;lt;1 3 4 5 7 34&amp;gt;&lt;br /&gt;
  36 iokit.IOAccessoryManager &amp;lt;3 4 5 7 8 33 34 35&amp;gt;&lt;br /&gt;
  37 driver.AppleProfileTimestampAction &amp;lt;1 3 4 5 14&amp;gt;&lt;br /&gt;
  38 driver.AppleProfileThreadInfoAction &amp;lt;1 3 4 6 14&amp;gt;&lt;br /&gt;
  39 driver.AppleProfileKEventAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  40 driver.AppleProfileRegisterStateAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  41 driver.AppleProfileCallstackAction &amp;lt;1 3 4 5 6 14&amp;gt;&lt;br /&gt;
  42 driver.AppleProfileReadCounterAction &amp;lt;3 4 6 14&amp;gt;&lt;br /&gt;
  43 driver.AppleARMPL192VIC &amp;lt;3 4 5 7 8&amp;gt;&lt;br /&gt;
  44 driver.AppleCDMA &amp;lt;1 3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  45 driver.IODARTFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  46 driver.AppleS5L8930XDART &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  47 iokit.IOSDIOFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  48 driver.AppleIOPSDIO &amp;lt;1 3 4 5 7 8 12 47&amp;gt;&lt;br /&gt;
  49 driver.AppleIOPFMI &amp;lt;1 3 4 5 7 8 12 25&amp;gt;&lt;br /&gt;
  50 driver.AppleSamsungSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  51 driver.AppleSamsungSerial &amp;lt;1 3 4 5 7 8 34 35&amp;gt;&lt;br /&gt;
  52 driver.AppleSamsungPKE &amp;lt;3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  53 driver.AppleS5L8920X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  54 driver.AppleSamsungI2S &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  55 driver.AppleEmbeddedUSB &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  56 driver.AppleS5L8930XUSBPhy &amp;lt;1 3 4 5 7 8 55&amp;gt;&lt;br /&gt;
  57 iokit.IOUSBFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  58 driver.AppleUSBEHCI &amp;lt;1 3 4 5 7 57&amp;gt;&lt;br /&gt;
  59 driver.AppleUSBComposite &amp;lt;1 3 4 57&amp;gt;&lt;br /&gt;
  60 driver.AppleEmbeddedUSBHost &amp;lt;1 3 4 5 7 55 57 59&amp;gt;&lt;br /&gt;
  61 driver.AppleUSBOHCI &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  62 driver.AppleUSBOHCIARM &amp;lt;3 4 5 8 55 57 60 61&amp;gt;&lt;br /&gt;
  63 driver.AppleUSBHub &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  64 driver.AppleUSBEHCIARM &amp;lt;3 4 5 8 55 57 58 60 63&amp;gt;&lt;br /&gt;
  65 driver.AppleS5L8930XUSB &amp;lt;1 3 4 5 7 8 55 57 58 60 61 62 64&amp;gt;&lt;br /&gt;
  66 driver.AppleARM7M &amp;lt;3 4 8 12&amp;gt;&lt;br /&gt;
  67 driver.EmbeddedIOP &amp;lt;3 4 5 12&amp;gt;&lt;br /&gt;
  68 driver.AppleVXD375 &amp;lt;1 3 4 5 7 8 11&amp;gt;&lt;br /&gt;
  69 driver.AppleD1815PMU &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  70 iokit.AppleARMIISAudio &amp;lt;1 3 4 5 7 22&amp;gt;&lt;br /&gt;
  71 driver.AppleEmbeddedAudio &amp;lt;1 3 4 5 7 8 22 31 70&amp;gt;&lt;br /&gt;
  72 driver.AppleCS42L59Audio &amp;lt;3 4 5 8 22 31 70 71&amp;gt;&lt;br /&gt;
  73 driver.AppleEmbeddedAccelerometer &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  74 driver.AppleEmbeddedGyro &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  75 driver.AppleEmbeddedLightSensor &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  76 iokit.IOAcceleratorFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  77 IMGSGX535 &amp;lt;1 3 4 5 7 8 76&amp;gt;&lt;br /&gt;
  78 driver.H2H264VideoEncoderDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  79 driver.AppleJPEGDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  80 driver.AppleH3CameraInterface &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  81 driver.AppleM2ScalerCSCDriver &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  82 iokit.IOMobileGraphicsFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  83 driver.AppleDisplayPipe &amp;lt;1 3 4 5 7 8 82&amp;gt;&lt;br /&gt;
  84 driver.AppleCLCD &amp;lt;1 3 4 5 7 8 82 83&amp;gt;&lt;br /&gt;
  85 driver.AppleSamsungMIPIDSI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  86 driver.ApplePinotLCD &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  87 driver.AppleSamsungSWI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  88 iokit.IODisplayPortFamily &amp;lt;1 3 4 5 6 7 22&amp;gt;&lt;br /&gt;
  89 driver.AppleRGBOUT &amp;lt;1 3 4 5 7 8 82 83 88&amp;gt;&lt;br /&gt;
  90 driver.AppleTVOut &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  91 driver.AppleAMC_r2 &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  92 driver.AppleSamsungDPTX &amp;lt;3 4 5 7 8 88&amp;gt;&lt;br /&gt;
  93 driver.AppleSynopsysOTGDevice &amp;lt;1 3 4 5 7 8 33 55&amp;gt;&lt;br /&gt;
  94 driver.AppleNANDFTL &amp;lt;1 3 4 5 7 9 25&amp;gt;&lt;br /&gt;
  95 driver.AppleNANDLegacyFTL &amp;lt;1 3 4 5 9 25 94&amp;gt;&lt;br /&gt;
  96 AppleFSCompression.AppleFSCompressionTypeZlib &amp;lt;1 2 3 4 6&amp;gt;&lt;br /&gt;
  97 IOTextEncryptionFamily &amp;lt;1 3 4 5 7 11&amp;gt;&lt;br /&gt;
  98 driver.AppleBSDKextStarter &amp;lt;3 4&amp;gt;&lt;br /&gt;
  99 nke.ppp &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
 100 nke.l2tp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 101 nke.pptp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 102 iokit.IO80211Family &amp;lt;1 3 4 5 6 7 17&amp;gt;&lt;br /&gt;
 103 driver.AppleBCMWLANCore &amp;lt;1 3 4 5 6 7 8 17 102&amp;gt;&lt;br /&gt;
 104 driver.AppleBCMWLANBusInterfaceSDIO &amp;lt;1 3 4 5 6 7 8 47 103&amp;gt;&lt;br /&gt;
 105 driver.AppleDiagnosticDataAccessReadOnly &amp;lt;1 3 4 5 7 8 94&amp;gt;&lt;br /&gt;
 106 driver.LightweightVolumeManager &amp;lt;1 3 4 5 9 15 24 26&amp;gt;&lt;br /&gt;
 107 driver.IOFlashNVRAM &amp;lt;1 3 4 5 6 7 25&amp;gt;&lt;br /&gt;
 108 driver.AppleNANDFirmware &amp;lt;1 3 4 5 25&amp;gt;&lt;br /&gt;
 109 driver.AppleImage3NORAccess &amp;lt;1 3 4 5 7 8 15 108&amp;gt;&lt;br /&gt;
 110 driver.AppleBluetooth &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 111 driver.AppleMultitouchSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 112 driver.AppleUSBMike &amp;lt;1 3 4 5 8 22 33&amp;gt;&lt;br /&gt;
 113 driver.AppleUSBDeviceMux &amp;lt;1 3 4 5 6 7 33&amp;gt;&lt;br /&gt;
 114 driver.AppleUSBEthernetDevice &amp;lt;1 3 4 5 6 8 17 33&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a specific extension, e.g. SandBox, the full information (including the handy load address) is also accessible:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;root# ./jkextstat -b sandbox  -x&amp;lt;/code&amp;gt;:&lt;br /&gt;
 &amp;lt;plist&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleIdentifier&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;com.apple.security.sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleVersion&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;154.7&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUSubtype&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;9&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUType&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;12&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleDependencies&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;array&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;6&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;7&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;5&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;3&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;28&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;1&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;4&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;16&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;2&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;/array&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleExecutablePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext/Sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleIsInterface&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadAddress&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;2153734144&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadTag&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;29&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleMachOHeaders&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         zvrt/gwAAAAJAAAACwAAAAMAAAAgAgAAAQAAAAEAAAAEAQAAX19URVhUAAAAAAAAAAAA&lt;br /&gt;
         AABgX4AAgAAAAAAAAACAAAAHAAAABwAAAAMAAAAAAAAAX190ZXh0AAAAAAAAAAAAAF9f&lt;br /&gt;
         VEVYVAAAAAAAAAAAAADMbV+AKGEAAMwNAAACAAAAAAAAAAAAAAAABwCAAAAAAAAAAABf&lt;br /&gt;
         X2NzdHJpbmcAAAAAAAAAX19URVhUAAAAAAAAAAAAAPTOX4DLDQAA9G4AAAAAAAAAAAAA&lt;br /&gt;
         AAAAAAIAAAAAAAAAAAAAAF9fY29uc3QAAAAAAAAAAABfX1RFWFQAAAAAAAAAAAAAwNxf&lt;br /&gt;
         gDEDAADAfAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAQBAABfX0RBVEEAAAAA&lt;br /&gt;
         AAAAAAAAAOBfgAAQAAAAgAAAABAAAAcAAAAHAAAAAwAAAAAAAABfX2RhdGEAAAAAAAAA&lt;br /&gt;
         AAAAX19EQVRBAAAAAAAAAAAAAADgX4C0BgAAAIAAAAQAAAAAAAAAAAAAAAAAAAAAAAAA&lt;br /&gt;
         AAAAAF9fYnNzAAAAAAAAAAAAAABfX0RBVEEAAAAAAAAAAAAAwOZfgHgAAAAAAAAABAAA&lt;br /&gt;
         AAAAAAAAAAAAAQAAAAAAAAAAAAAAX19jb21tb24AAAAAAAAAAF9fREFUQQAAAAAAAAAA&lt;br /&gt;
         AAA451+AGAAAAAAAAAACAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAbAAAAGAAAABasg7Y2&lt;br /&gt;
         TzkVrtqsgOViBQ0=&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePrelinked&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleRetainCount&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;0&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleStarted&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleUUID&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         FqyDtjZPORWu2qyA5WIFDQ==&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleWiredSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSKernelResource&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's also worth mentioning that, in the above listing, the OSBundleMachOHeaders (base-64 encoded binary headers) leak kernel addresses in iOS 6.0, defeating [[Kernel ASLR]]. This has been quickly fixed in iOS 6.0.1, effectively locking down iOS for the foreseeable future, thanks to security researcher [[mdowd]].&lt;br /&gt;
&lt;br /&gt;
==[[User:Winocm|Winocm's]] custom kernel==&lt;br /&gt;
[[User:Winocm|Winocm]] uses a custom kernel which the version can be found below.&lt;br /&gt;
 Darwin Kernel Version 13.0.0: Fri Nov 22 18:19:54 CST 2013; root:xnu-2050.48.13~7/DEVELOPMENT_ARM_[[S5L8930]]X&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Kernel Syscalls]]&lt;br /&gt;
* [[Kernel Sysctls]]&lt;br /&gt;
* [[Kernel Task]]&lt;br /&gt;
* [[Kernel Symbols]]&lt;br /&gt;
* [[kdebug]]&lt;br /&gt;
* [[kernelcache]]&lt;br /&gt;
* [[Tutorial:Booting XNU on A4 Devices]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://opensource.apple.com/source/xnu XNU Source] (up to latest **OS X** version)&lt;br /&gt;
* [[i0n1c]] on [https://media.blackhat.com/bh-us-11/Esser/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf exploiting the kernel]&lt;br /&gt;
* [[User:Haifisch|Haifisch]] on [http://dylanlaws.com/Kernel101 Decrypting the iOS kernel for disassembly]&lt;br /&gt;
* [http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c jkextstat.c]&lt;br /&gt;
* [http://www.amazon.com/gp/product/1118057651 OSX/iOS internals book]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=NonUI_builds&amp;diff=45930</id>
		<title>NonUI builds</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=NonUI_builds&amp;diff=45930"/>
		<updated>2015-06-06T12:55:06Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Some more features&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{see also|Beta Firmware}}&lt;br /&gt;
&lt;br /&gt;
This (will be) a documented list of known '''factory firmwares''', used by Apple workers in California to do engineering tests on prototype devices and also by factory workers on production ones during manufacturing. Factory firmwares are based on production iOS ones, but adapted for internal engineering tests, development and debugging. Unlike production iOS firmwares, factory ones have the following differences :&lt;br /&gt;
* Contain DEVELOPMENT Fused bootloaders in \Firmware\dfu\ and \Firmware\all_flash\all_flash.[board codename].factoryfa\.&lt;br /&gt;
* Contain DEVELOPMENT Fused kernel cache with more symbols, and with individual kexts in /System/Library/Extensions&lt;br /&gt;
* Contain Skankwerk (gear) logo image file in \Firmware\all_flash\all_flash.[board codename].factoryfa\.&lt;br /&gt;
* Have the /AppleInternal folder, which the hierarchy inside get priority over hierarchy in /.&lt;br /&gt;
* Launch SwitchBoard instead of SpringBoard as User Interface.&lt;br /&gt;
* /usr and subfolders contain many UNIX command line utilities.&lt;br /&gt;
* SSH daemon is pre-installed - as dropbear&lt;br /&gt;
* Boot loader passes arguments to kernel (unlike RELEASE boot loaders as of iOS 5.0) which makes it easy to disable AMFI&lt;br /&gt;
* It has some Private Frameworks in /System/Library/PrivateFrameworks for internal GUI apps and command line utilities.&lt;br /&gt;
* No SpringBoard, requires the use of daemons to launch [[SwitchBoard.app]] as a multi-app launcher instead.&lt;br /&gt;
* Most internal applications require the use of SkankKit to produce special layers such as text on the framebuffer. &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Codename&lt;br /&gt;
! Baseband&lt;br /&gt;
! SHA1 Hash&lt;br /&gt;
! Comments&lt;br /&gt;
! File Size&lt;br /&gt;
! Device&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.0&lt;br /&gt;
| [[Alpine 1A420|1A420]]&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | Alpine&lt;br /&gt;
| [[03.06.01_G]]&amp;lt;sup&amp;gt;[http://web.archive.org/web/20110730023951/http://imageshack.us/photo/my-images/399/iphone2go0.jpg/]&amp;lt;/sup&amp;gt;&amp;lt;!-- http://img399.imageshack.us/i/iphone2go0.jpg/ --&amp;gt;&lt;br /&gt;
| &amp;lt;code&amp;gt;6e798e906c6590a7521ef89b731569be6d05b3aa&amp;lt;/code&amp;gt;&lt;br /&gt;
| Originally available [http://forums.macrumors.com/showpost.php?p=7249071&amp;amp;postcount=85 here], but was soon taken down.&lt;br /&gt;
| 109,813,128&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[m68ap|iPhone]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Alpine 4A57|4A57]]&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot;|?&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot;|?&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot;| Runs [[SwitchBoard.app|SwitchBoard]], a simple launcher for other utilities.&lt;br /&gt;
| rowspan=&amp;quot;9&amp;quot; class=&amp;quot;rborderplz&amp;quot;|?&lt;br /&gt;
|-&lt;br /&gt;
| 3.1b&lt;br /&gt;
| [[Sierra 7C108b|7C108b]]&lt;br /&gt;
| Sierra&lt;br /&gt;
| [[n88ap|iPhone 3GS]]&lt;br /&gt;
|-&lt;br /&gt;
| Inf1&lt;br /&gt;
| [[Inferno 8A2062a|8A2062a]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| [[n90ap|iPhone 4]]&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot;|?&lt;br /&gt;
| [[Inferno 7C144|7C144]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | [[n18ap|iPod 3G]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Inferno 7C1023e|7C1023e]]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | Inferno&lt;br /&gt;
|-&lt;br /&gt;
| [[Inferno 8A2062a |8A2062a]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| [[n90ap|iPhone 4]]&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| [[Inferno 10A23110z|10A23110z]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| [[n41ap|iPhone 5]]&lt;br /&gt;
|-&lt;br /&gt;
| 7.0.3&lt;br /&gt;
| [[Inferno 11B64940j|11B64940j]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| [[j86ap|iPad mini 2]]&lt;br /&gt;
|-&lt;br /&gt;
| 8.0&lt;br /&gt;
| [[Inferno 12A9331h|12A9331h]]&lt;br /&gt;
| Inferno&lt;br /&gt;
| [[n61ap|iPhone 6]]&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:DeviceTree&amp;diff=45750</id>
		<title>Talk:DeviceTree</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:DeviceTree&amp;diff=45750"/>
		<updated>2015-05-12T18:54:29Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Is the parser broken? ==&lt;br /&gt;
&lt;br /&gt;
Yesterday, I compiled this, an ran it on both an encrypted and decrypted version of the DeviceTree IMG3 for the iPod 4th Gen. For both files, it said that that file wasn't a valid IMG3 file. Does this only work for older devices, or does it need to be modified to work? --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 12:07, 11 May 2015 (UTC)&lt;br /&gt;
: Just tested it, looks like it works fine. xpwntool may be stripping your IMG3 header though, check with a hex editor. Is this tool linked on the img3 page as well? --[[User:Haifisch|Haifisch]] ([[User talk:Haifisch|talk]]) 01:18, 12 May 2015 (UTC)&lt;br /&gt;
:: I believe I got a faulty IPSW, iTunes won't accept it. And no, it isn't on the [[IMG3 File Format|IMG3]] page. Should I put it there? --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 02:01, 12 May 2015 (UTC)&lt;br /&gt;
::: Seems like a more proper place to put it, since it is a img3/img4 utility and not just for the DeviceTree format. --[[User:Haifisch|Haifisch]] ([[User talk:Haifisch|talk]]) 02:32, 12 May 2015 (UTC)&lt;br /&gt;
:::: Does anyone else agree/disagree? --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 12:05, 12 May 2015 (UTC)&lt;br /&gt;
::::: As the guy who wrote said parser I can say : A) it's generic for all IMG3, but dumps the device tree in more detail than others. B) It requires the IMG3 header, too. C) It's easier to ask me directly through the book's web site - - I don't always check RecentChanges in the Wiki.. [[User:Morpheus|Morpheus]] 14:54, 12 May 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=45513</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=45513"/>
		<updated>2015-04-15T21:08:02Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: minor corrections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[i0n1c]]'s Infoleak vulnerability (Pangu v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) (Pangu v1.1.0)&lt;br /&gt;
* LightSensor / ProxALSSensor kernel exploit (Pangu 1.0.0) ({{cve|2014-4388}})&lt;br /&gt;
* TempSensor kernel exploit (Pangu 1.1.0) ({{cve|2014-4388}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
* IOKit crafted call maker utility ({{cve|2014-4407}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version] ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}}) - leaks slid addresses&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=45512</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=45512"/>
		<updated>2015-04-15T21:07:07Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Quit attributing every single kernel bug to 10n1c. Just because he whines doesn't mean he owns them all. 4491 was known before him&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[i0n1c]]'s Infoleak vulnerability (Pangu v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) (Pangu v1.1.0)&lt;br /&gt;
* LightSensor / ProxALSSensor kernel exploit (Pangu 1.0.0) ({{cve|2014-4388}})&lt;br /&gt;
* TempSensor kernel exploit (Pangu 1.1.0) ({{cve|2014-4388}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
* IOKit crafted call maker utility ({{cve|2014-4407}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
(See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* A new AFC symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* Mach-O OSBundleHeaders info leak ({{cve|2014-4491}})&lt;br /&gt;
* IOHID memory overwrite&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]], also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* A new overlapping segment attack [in a modified version] ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual, with overlapping segment variant on TaiG (Segment at end of file, negative)&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
* MobileStorageMounter exploit ({{cve|2015-1062}})&lt;br /&gt;
* Backup exploit used to access restricted parts of the filesystem ({{cve|2015-1087}})&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* MachOBundleHeaders - to leak kernel addresses (slid)&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45285</id>
		<title>Apple Watch (1st generation)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45285"/>
		<updated>2015-03-30T20:00:04Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: OS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Watch.jpg|right|thumb|Apple Watch]]&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
This is the Apple Watch introduced by Tim Cook at Apple's 'Wish we could say more.' event on the 9th September 2014.&lt;br /&gt;
&lt;br /&gt;
== Application Processor ==&lt;br /&gt;
This device uses the new Apple S1 processor, The processor is an ARMv7k architecture (32-bit). Internally, the watch is referred to as n27.&lt;br /&gt;
&lt;br /&gt;
== Specifications ==&lt;br /&gt;
* RAM: [http://appleinsider.com/articles/14/09/22/rumor-apple-watch-to-feature-512mb-of-ram-4gb-of-storage 512MB]&lt;br /&gt;
* [http://www.chipworks.com/en/technical-competitive-analysis/resources/blog/broadcom-wins-wifi-in-apple-watch/ BCM4334 Wi-Fi chip from Broadcom]&lt;br /&gt;
* NAND size: 4GB/8GB. It's also possible, that more will be available.&lt;br /&gt;
* Display: Retina.&lt;br /&gt;
* Screen: Sapphire crystal (Apple Watch/Apple Watch Edition)/Strengthened Ion-X glass (Apple Watch Sport)&lt;br /&gt;
* Compatibility: iOS 8.2 running on: iPhone 5, iPhone 5C, iPhone 5S, iPhone 6, iPhone 6 Plus&lt;br /&gt;
&lt;br /&gt;
== Operating System ==&lt;br /&gt;
&lt;br /&gt;
The watch runs a slimmed down version of iOS 8.x. The user interface is managed by &amp;quot;Carousel&amp;quot; (instead of Springboard). Most frameworks are replaced with &amp;quot;Nano&amp;quot; equivalents.&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
* Apple Watch&lt;br /&gt;
* Apple Watch Sport&lt;br /&gt;
* Apple Watch Edition (the body is made from gold)&lt;br /&gt;
&lt;br /&gt;
== Third-party applications ==&lt;br /&gt;
Apple confirmed, that Watch will support third-party applications. The device will have an API called WatchKit.&lt;br /&gt;
&lt;br /&gt;
[[File:Watch_apps.jpg|right|thumb|Some Watch icons]]&lt;br /&gt;
[[File:PairWatch.jpg|right|thumb]]&lt;br /&gt;
&lt;br /&gt;
Currently announced third-party apps:&lt;br /&gt;
*Facebook&lt;br /&gt;
*Twitter (A07)&lt;br /&gt;
*City Mapper (E10)&lt;br /&gt;
*BMW&lt;br /&gt;
*HoneyWell (B07)&lt;br /&gt;
*Lutron (C07)&lt;br /&gt;
*Nike+&lt;br /&gt;
*American Airlines (B06)&lt;br /&gt;
*Starwood Hotels (C02)&lt;br /&gt;
*Major League Baseball (C10)&lt;br /&gt;
*PInterest (D07)&lt;br /&gt;
*Yahoo (D06)&lt;br /&gt;
*Comedy Central (A04)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*http://www.apple.com/watch/&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45284</id>
		<title>Apple Watch (1st generation)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45284"/>
		<updated>2015-03-30T19:58:22Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Application Processor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Watch.jpg|right|thumb|Apple Watch]]&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
This is the Apple Watch introduced by Tim Cook at Apple's 'Wish we could say more.' event on the 9th September 2014.&lt;br /&gt;
&lt;br /&gt;
== Application Processor ==&lt;br /&gt;
This device uses the new Apple S1 processor, The processor is an ARMv7k architecture (32-bit). Internally, the watch is referred to as n27.&lt;br /&gt;
&lt;br /&gt;
== Specifications ==&lt;br /&gt;
* RAM: [http://appleinsider.com/articles/14/09/22/rumor-apple-watch-to-feature-512mb-of-ram-4gb-of-storage 512MB]&lt;br /&gt;
* [http://www.chipworks.com/en/technical-competitive-analysis/resources/blog/broadcom-wins-wifi-in-apple-watch/ BCM4334 Wi-Fi chip from Broadcom]&lt;br /&gt;
* NAND size: 4GB/8GB. It's also possible, that more will be available.&lt;br /&gt;
* Display: Retina.&lt;br /&gt;
* Screen: Sapphire crystal (Apple Watch/Apple Watch Edition)/Strengthened Ion-X glass (Apple Watch Sport)&lt;br /&gt;
* Compatibility: iOS 8.2 running on: iPhone 5, iPhone 5C, iPhone 5S, iPhone 6, iPhone 6 Plus&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
* Apple Watch&lt;br /&gt;
* Apple Watch Sport&lt;br /&gt;
* Apple Watch Edition (the body is made from gold)&lt;br /&gt;
&lt;br /&gt;
== Third-party applications ==&lt;br /&gt;
Apple confirmed, that Watch will support third-party applications. The device will have an API called WatchKit.&lt;br /&gt;
&lt;br /&gt;
[[File:Watch_apps.jpg|right|thumb|Some Watch icons]]&lt;br /&gt;
[[File:PairWatch.jpg|right|thumb]]&lt;br /&gt;
&lt;br /&gt;
Currently announced third-party apps:&lt;br /&gt;
*Facebook&lt;br /&gt;
*Twitter (A07)&lt;br /&gt;
*City Mapper (E10)&lt;br /&gt;
*BMW&lt;br /&gt;
*HoneyWell (B07)&lt;br /&gt;
*Lutron (C07)&lt;br /&gt;
*Nike+&lt;br /&gt;
*American Airlines (B06)&lt;br /&gt;
*Starwood Hotels (C02)&lt;br /&gt;
*Major League Baseball (C10)&lt;br /&gt;
*PInterest (D07)&lt;br /&gt;
*Yahoo (D06)&lt;br /&gt;
*Comedy Central (A04)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*http://www.apple.com/watch/&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45283</id>
		<title>Apple Watch (1st generation)</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Apple_Watch_(1st_generation)&amp;diff=45283"/>
		<updated>2015-03-30T19:57:31Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Application Processor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Watch.jpg|right|thumb|Apple Watch]]&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
This is the Apple Watch introduced by Tim Cook at Apple's 'Wish we could say more.' event on the 9th September 2014.&lt;br /&gt;
&lt;br /&gt;
== Application Processor ==&lt;br /&gt;
This device uses the new Apple S1 processor, The processor is an ARMv7k architecture (32-bit). Internally, the phone is referred to as n27.&lt;br /&gt;
&lt;br /&gt;
== Specifications ==&lt;br /&gt;
* RAM: [http://appleinsider.com/articles/14/09/22/rumor-apple-watch-to-feature-512mb-of-ram-4gb-of-storage 512MB]&lt;br /&gt;
* [http://www.chipworks.com/en/technical-competitive-analysis/resources/blog/broadcom-wins-wifi-in-apple-watch/ BCM4334 Wi-Fi chip from Broadcom]&lt;br /&gt;
* NAND size: 4GB/8GB. It's also possible, that more will be available.&lt;br /&gt;
* Display: Retina.&lt;br /&gt;
* Screen: Sapphire crystal (Apple Watch/Apple Watch Edition)/Strengthened Ion-X glass (Apple Watch Sport)&lt;br /&gt;
* Compatibility: iOS 8.2 running on: iPhone 5, iPhone 5C, iPhone 5S, iPhone 6, iPhone 6 Plus&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
* Apple Watch&lt;br /&gt;
* Apple Watch Sport&lt;br /&gt;
* Apple Watch Edition (the body is made from gold)&lt;br /&gt;
&lt;br /&gt;
== Third-party applications ==&lt;br /&gt;
Apple confirmed, that Watch will support third-party applications. The device will have an API called WatchKit.&lt;br /&gt;
&lt;br /&gt;
[[File:Watch_apps.jpg|right|thumb|Some Watch icons]]&lt;br /&gt;
[[File:PairWatch.jpg|right|thumb]]&lt;br /&gt;
&lt;br /&gt;
Currently announced third-party apps:&lt;br /&gt;
*Facebook&lt;br /&gt;
*Twitter (A07)&lt;br /&gt;
*City Mapper (E10)&lt;br /&gt;
*BMW&lt;br /&gt;
*HoneyWell (B07)&lt;br /&gt;
*Lutron (C07)&lt;br /&gt;
*Nike+&lt;br /&gt;
*American Airlines (B06)&lt;br /&gt;
*Starwood Hotels (C02)&lt;br /&gt;
*Major League Baseball (C10)&lt;br /&gt;
*PInterest (D07)&lt;br /&gt;
*Yahoo (D06)&lt;br /&gt;
*Comedy Central (A04)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
*http://www.apple.com/watch/&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Touch_ID&amp;diff=45244</id>
		<title>Touch ID</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Touch_ID&amp;diff=45244"/>
		<updated>2015-03-28T23:40:06Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Correction:  As of iOS 8, the dylib has been removed from the iOS SDK, and has been replaced by a stub (containing symbols, but no code). The dylib can still be obtained easily from the dyld_shared_cache on the device. Code is ARM64, but can be disassembl&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [[iPhone 5s]] and newer, [[iPad Air 2]] and newer, and [[iPad mini 3]] and newer comes equipped with '''Touch ID''', a fingerprint scanner. Currently, there is no official developer API for it, because it is intended for unlocking the device and purchasing items on [[iTunes Store]] only. According to [http://m.imore.com/apple-took-touch-id-security-one-step-further-secure-enclave-heres-how-and-what-it-means this article] the sensor is bound to each device uniquely. This means that Touch ID sensors seem to be tied to specific devices somehow similar to HDMI protected media path.&lt;br /&gt;
&lt;br /&gt;
However there is a private API for it; its dylib file is in [[Xcode]] 5 in the path &lt;br /&gt;
&amp;lt;pre&amp;gt;Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS7.0.sdk/System/Library/PrivateFrameworks/BiometricKit.framework/BiometricKit&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As of iOS 8, the dylib has been removed from the iOS SDK, and has been replaced by a stub (containing symbols, but no code). The dylib can still be obtained easily from the dyld_shared_cache on the device. Code is ARM64, but can be disassembled by newer versions of IDA (6.4) or NewOSXBook.com's jtool.&lt;br /&gt;
&lt;br /&gt;
== Process ==&lt;br /&gt;
&lt;br /&gt;
=== Fingerprint Registration Process===&lt;br /&gt;
[[Image:Touchid process.jpg|thumb|Touch ID process]]&lt;br /&gt;
Apple has applied for belows process to be patented for TouchID in  [http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&amp;amp;Sect2=HITOFF&amp;amp;d=PG01&amp;amp;p=1&amp;amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.html&amp;amp;r=1&amp;amp;f=G&amp;amp;l=50&amp;amp;s1=%2220130308838%22.PGNR.&amp;amp;OS=DN/20130308838&amp;amp;RS=DN/20130308838 Apple Patent Application 20130308838].&lt;br /&gt;
&lt;br /&gt;
* The fingerprint sensor detects an object to scan (activated via the 'metal ring' around the home button).&lt;br /&gt;
* The fingerprint sensor starts the scan - basically it takes a picture of the finger (UIImage).&lt;br /&gt;
* The picture is transferred to the Secure Enclave Processor (SEP) over an an encrypted dataline (similar to HDMI protected media path).&lt;br /&gt;
* The SEP stores this picture as a so-called template. Then it constructs a lower resolution version: a histogram of the most common ridge angles storing it together with the higer resolution template in the Secure Enclave.&lt;br /&gt;
* The SEP sends the lower resolution version to the main CPU.&lt;br /&gt;
* The main CPU stores the lower resultion version in a database (for a later authentication).&lt;br /&gt;
&lt;br /&gt;
=== Fingerprint Authentication Process===&lt;br /&gt;
&lt;br /&gt;
* The fingerprint sensor detects an object to scan (activated via the 'metal ring' around the home button).&lt;br /&gt;
* The fingerprint sensor starts the scan - basically it takes a picture of the finger (UIImage).&lt;br /&gt;
* The picture is transferred to the Secure Enclave Processor (SEP) over an an encrypted dataline (similar to HDMI protected media path).&lt;br /&gt;
* The SEP constructs a lower resolution version: a histogram of the most common ridge angles.&lt;br /&gt;
* The SEP sends the lower resolution version to the main CPU.&lt;br /&gt;
* The main compares the the lower resolution version for possible matches in its database.&lt;br /&gt;
* The main sends possible matches back to SEP or the authentication is rejected if no matches are found.&lt;br /&gt;
* The SEP takes the matches received by the main CPU and compares the initial image to high resolution versions of the received matches from main CPU.&lt;br /&gt;
* Access is granted in case of positive comparison or rejected in case of negative comparison.&lt;br /&gt;
&lt;br /&gt;
==Inferred Information==&lt;br /&gt;
Based on a string dump, here is what is implied.&lt;br /&gt;
&lt;br /&gt;
* It's codename is &amp;quot;mesa&amp;quot;&lt;br /&gt;
* It communicates over XPC to a binary that handles access to it&lt;br /&gt;
* There are kernel extensions to interface with it&lt;br /&gt;
* The kernel extension communicates to the secure keystore to set and verify fingerprints&lt;br /&gt;
* The fingerprint scanner calibrates itself and has upgradable firmware&lt;br /&gt;
* The fingerprint scanner uses normal image formats (i.e. UIImage) before setting and verifying fingerprints&lt;br /&gt;
* There's biometric lockout as well as passcode lockout&lt;br /&gt;
* The A7 chip contains a secure element marketed as the Secure Enclave. The string dump refers to SEP, the Secure Element Protocol. This chip is most likely one sourced from NXP. It contains physical security to ensure that the only operations of the chip involve setting new fingerprints and verifying fingerprints against the ones stored in it (i.e. challenge-response). This way, the fingerprint data cannot be extracted from it.&lt;br /&gt;
&lt;br /&gt;
== String Dump ==&lt;br /&gt;
Below there is a full string dump of the framework, which can hint at its functionalities.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
initWithMachServiceName:options:&lt;br /&gt;
connectWithReplyBlock:&lt;br /&gt;
registerDelegate:withReplyBlock:&lt;br /&gt;
suspendWork:withReplyBlock:&lt;br /&gt;
enroll:withAuthToken:withReplyBlock:&lt;br /&gt;
match:withReplyBlock:&lt;br /&gt;
match:withOptions:withReplyBlock:&lt;br /&gt;
matchIdentities:withReplyBlock:&lt;br /&gt;
cancelWithReplyBlock:&lt;br /&gt;
updateIdentity:withReplyBlock:&lt;br /&gt;
removeIdentity:withReplyBlock:&lt;br /&gt;
getIdentityFromUUID:withReplyBlock:&lt;br /&gt;
identities:withReplyBlock:&lt;br /&gt;
resetEngineWithReplyBlock:&lt;br /&gt;
registerDSID:withAuthToken:withReplyBlock:&lt;br /&gt;
registerStoreToken:withReplyBlock:&lt;br /&gt;
getCountersignedStoreTokenWithReplyBlock:&lt;br /&gt;
getMaxIdentityCount:withReplyBlock:&lt;br /&gt;
enrollContinueWithReplyBlock:&lt;br /&gt;
pullAlignmentDataWithReplyBlock:&lt;br /&gt;
pullMatchTopologyDataWithReplyBlock:&lt;br /&gt;
getNodeTopologyForIdentity:withReplyBlock:&lt;br /&gt;
preventAutonomousMatchingMode:withReplyBlock:&lt;br /&gt;
getProvisioningStateWithReplyBlock:&lt;br /&gt;
getCalBlobVersionWithReplyBlock:&lt;br /&gt;
getSensorCalibrationStatusWithReplyBlock:&lt;br /&gt;
getCalibrationDataStateWithReplyBlock:&lt;br /&gt;
setDebugImages:withReplyBlock:&lt;br /&gt;
pullCaptureBufferWithReplyBlock:&lt;br /&gt;
pullDebugImageData:withReplyBlock:&lt;br /&gt;
provisionSensorWithReplyBlock:&lt;br /&gt;
unpairSensorWithReplyBlock:&lt;br /&gt;
lockSensorWithReplyBlock:&lt;br /&gt;
getSerialisedTemplateForIdentity:withReplyBlock:&lt;br /&gt;
interfaceWithProtocol:&lt;br /&gt;
setRemoteObjectInterface:&lt;br /&gt;
remoteObjectInterface&lt;br /&gt;
setWithObject:&lt;br /&gt;
setClasses:forSelector:argumentIndex:ofReply:&lt;br /&gt;
setWithObjects:&lt;br /&gt;
enrollResult:&lt;br /&gt;
matchResult:&lt;br /&gt;
statusMessage:&lt;br /&gt;
homeButtonPressed&lt;br /&gt;
setExportedInterface:&lt;br /&gt;
setExportedObject:&lt;br /&gt;
setInterruptionHandler:&lt;br /&gt;
resume&lt;br /&gt;
invalidate&lt;br /&gt;
remoteObjectProxyWithErrorHandler:&lt;br /&gt;
code&lt;br /&gt;
respondsToSelector:&lt;br /&gt;
connect&lt;br /&gt;
registerDelegate:&lt;br /&gt;
suspendWork:&lt;br /&gt;
enroll:withAuthToken:&lt;br /&gt;
match:&lt;br /&gt;
match:withOptions:&lt;br /&gt;
matchIdentities:&lt;br /&gt;
cancel&lt;br /&gt;
updateIdentity:&lt;br /&gt;
removeIdentity:&lt;br /&gt;
getIdentityFromUUID:&lt;br /&gt;
identities:&lt;br /&gt;
getMaxIdentityCount:&lt;br /&gt;
resetEngine&lt;br /&gt;
enrollContinue&lt;br /&gt;
pullAlignmentData&lt;br /&gt;
pullMatchTopologyData&lt;br /&gt;
getNodeTopologyForIdentity:&lt;br /&gt;
preventAutonomousMatchingMode:&lt;br /&gt;
getProvisioningState&lt;br /&gt;
registerDSID:withAuthToken:&lt;br /&gt;
registerStoreToken:&lt;br /&gt;
getCountersignedStoreToken:&lt;br /&gt;
getCalBlobVersion&lt;br /&gt;
getSensorCalibrationStatus&lt;br /&gt;
getCalibrationDataState&lt;br /&gt;
pullCaptureBuffer&lt;br /&gt;
pullDebugImageData:imageWidth:imageHeight:&lt;br /&gt;
provisionSensor&lt;br /&gt;
unpairSensor&lt;br /&gt;
lockSensor&lt;br /&gt;
setDebugImages:&lt;br /&gt;
getSerialisedTemplateForIdentity:&lt;br /&gt;
delegate&lt;br /&gt;
setDelegate:&lt;br /&gt;
interruptionHandler&lt;br /&gt;
_connection&lt;br /&gt;
_delegate&lt;br /&gt;
_interruptionHandler&lt;br /&gt;
setTopology:&lt;br /&gt;
setDetails:&lt;br /&gt;
topology&lt;br /&gt;
details&lt;br /&gt;
_topology&lt;br /&gt;
_details&lt;br /&gt;
initEnrollmentValues&lt;br /&gt;
message&lt;br /&gt;
messageDetails&lt;br /&gt;
objectForKeyedSubscript:&lt;br /&gt;
currentPrimaryComponentID&lt;br /&gt;
integerValue&lt;br /&gt;
doubleValue&lt;br /&gt;
statistics&lt;br /&gt;
enroll:&lt;br /&gt;
enrollResult:componentSet:&lt;br /&gt;
enrollProgress:&lt;br /&gt;
_fingerOn&lt;br /&gt;
_enrolling&lt;br /&gt;
_badImagePerFingerDown&lt;br /&gt;
_enrollmentStarTime&lt;br /&gt;
_touchesPerEnroll&lt;br /&gt;
_badImagesPerEnroll&lt;br /&gt;
_rejectedImagesPerEnroll&lt;br /&gt;
_primaryClusterAdditions&lt;br /&gt;
_primaryClusterFailedAdditions&lt;br /&gt;
_otherClustersAdditions&lt;br /&gt;
_joinEvents&lt;br /&gt;
_area&lt;br /&gt;
_primaryClusterArea&lt;br /&gt;
numberWithBool:&lt;br /&gt;
preferencesGetStringValue:&lt;br /&gt;
preferencesGetBOOLValue:&lt;br /&gt;
enableLogger:toPath:&lt;br /&gt;
manager&lt;br /&gt;
defaultCenter&lt;br /&gt;
appDidEnterBackground:&lt;br /&gt;
addObserver:selector:name:object:&lt;br /&gt;
appWillEnterForeground:&lt;br /&gt;
bundleForClass:&lt;br /&gt;
imageNamed:inBundle:&lt;br /&gt;
updateEnableLogger&lt;br /&gt;
dataWithBytes:length:&lt;br /&gt;
startEnrollLog&lt;br /&gt;
data&lt;br /&gt;
logRemoveIdentity:&lt;br /&gt;
bytes&lt;br /&gt;
imageFromRawImageData:&lt;br /&gt;
imageFromBitmapData:inRect:&lt;br /&gt;
pullDebugImageData:target:&lt;br /&gt;
getRadarAtachmentsForLastEnrollment&lt;br /&gt;
getRadarAtachmentsForLastMatch&lt;br /&gt;
length&lt;br /&gt;
stringWithString:&lt;br /&gt;
getModulationRatio&lt;br /&gt;
stringForProvisioningState:&lt;br /&gt;
getSensorPatchVersion&lt;br /&gt;
stringWithFormat:&lt;br /&gt;
getLogsForProcess:&lt;br /&gt;
sharedConnection&lt;br /&gt;
isFingerprintUnlockAllowed&lt;br /&gt;
setGracePeriod:passcode:completionBlock:&lt;br /&gt;
finishEnrollLogWithStatus:withIdentity:withTemplate:&lt;br /&gt;
matchResult:withDetails:&lt;br /&gt;
createMatchInfo:withTopology:withMatchImage:&lt;br /&gt;
logMatchResult:withTopology:withImage:withCaptureBuffer:withTemplate:&lt;br /&gt;
getBytes:length:&lt;br /&gt;
logEnrollMessage:withTopology:withImage:withCaptureBuffer:&lt;br /&gt;
logStatus:&lt;br /&gt;
enrollProgressMessage:&lt;br /&gt;
logRejectedImage:&lt;br /&gt;
size&lt;br /&gt;
drawInRect:&lt;br /&gt;
drawInRect:blendMode:alpha:&lt;br /&gt;
CGImage&lt;br /&gt;
scale&lt;br /&gt;
imageOrientation&lt;br /&gt;
imageWithCGImage:scale:orientation:&lt;br /&gt;
imageWithImage:inRect:&lt;br /&gt;
identityImage:&lt;br /&gt;
imageWithImage:withNode:withRect:alpha:&lt;br /&gt;
compositeTopologyImage:&lt;br /&gt;
imageTopology:forGroup:&lt;br /&gt;
imageFauxprint:withTheta:withLamda:&lt;br /&gt;
greenColor&lt;br /&gt;
imageWithImage:withTintColor:&lt;br /&gt;
dataWithData:&lt;br /&gt;
imageWithCGImage:&lt;br /&gt;
preferencesSetBOOLValue:forKey:&lt;br /&gt;
pullDebugImage:&lt;br /&gt;
getLoggerAttachmentsForRadar:&lt;br /&gt;
stringFromSensorConfiguration&lt;br /&gt;
matchIdentity:&lt;br /&gt;
topologyImage:&lt;br /&gt;
imageWithImage:withMaskImage:&lt;br /&gt;
inUse&lt;br /&gt;
setInUse:&lt;br /&gt;
enrollProgressConfigRenderMode&lt;br /&gt;
setEnrollProgressConfigRenderMode:&lt;br /&gt;
enrollProgressConfigRenderViewSize&lt;br /&gt;
setEnrollProgressConfigRenderViewSize:&lt;br /&gt;
renderMode&lt;br /&gt;
setRenderMode:&lt;br /&gt;
opacity&lt;br /&gt;
setOpacity:&lt;br /&gt;
_xpcClient&lt;br /&gt;
_enrollingMode&lt;br /&gt;
_matchingMode&lt;br /&gt;
_statistics&lt;br /&gt;
_scanbedImage&lt;br /&gt;
_fauxprintImage&lt;br /&gt;
_nodeRect&lt;br /&gt;
_images&lt;br /&gt;
_compSet&lt;br /&gt;
_rejectTouchCount&lt;br /&gt;
_rejectTouch&lt;br /&gt;
_showDebugImages&lt;br /&gt;
_enableLogger&lt;br /&gt;
_enrollImageSet&lt;br /&gt;
_isInternalInstall&lt;br /&gt;
_inUse&lt;br /&gt;
_enrollProgressConfigRenderMode&lt;br /&gt;
_renderMode&lt;br /&gt;
_opacity&lt;br /&gt;
_enrollProgressConfigRenderViewSize&lt;br /&gt;
setUuid:&lt;br /&gt;
decodeBytesForKey:returnedLength:&lt;br /&gt;
initWithUUIDBytes:&lt;br /&gt;
decodeIntForKey:&lt;br /&gt;
decodeObjectOfClass:forKey:&lt;br /&gt;
copy&lt;br /&gt;
getUUIDBytes:&lt;br /&gt;
encodeBytes:length:forKey:&lt;br /&gt;
encodeInt:forKey:&lt;br /&gt;
encodeObject:forKey:&lt;br /&gt;
biometricKitIdentity&lt;br /&gt;
supportsSecureCoding&lt;br /&gt;
encodeWithCoder:&lt;br /&gt;
initWithCoder:&lt;br /&gt;
uuid&lt;br /&gt;
type&lt;br /&gt;
setType:&lt;br /&gt;
attribute&lt;br /&gt;
setAttribute:&lt;br /&gt;
entity&lt;br /&gt;
setEntity:&lt;br /&gt;
name&lt;br /&gt;
setName:&lt;br /&gt;
stringByReplacingOccurrencesOfString:withString:&lt;br /&gt;
initWithCapacity:&lt;br /&gt;
setLength:&lt;br /&gt;
mutableBytes&lt;br /&gt;
defaultManager&lt;br /&gt;
createDirectoryAtPath:withIntermediateDirectories:attributes:error:&lt;br /&gt;
removeItemAtPath:error:&lt;br /&gt;
UUIDString&lt;br /&gt;
setMessageDetails:&lt;br /&gt;
setCaptureImage:&lt;br /&gt;
setRenderedImage:&lt;br /&gt;
progress&lt;br /&gt;
setProgress:&lt;br /&gt;
setCurrentPrimaryComponentID:&lt;br /&gt;
captureImage&lt;br /&gt;
renderedImage&lt;br /&gt;
setMessage:&lt;br /&gt;
_message&lt;br /&gt;
_progress&lt;br /&gt;
_currentPrimaryComponentID&lt;br /&gt;
_captureImage&lt;br /&gt;
_renderedImage&lt;br /&gt;
_messageDetails&lt;br /&gt;
setX:&lt;br /&gt;
setY:&lt;br /&gt;
angle&lt;br /&gt;
setAngle:&lt;br /&gt;
_angle&lt;br /&gt;
setTransformationCoordinates:&lt;br /&gt;
componentID&lt;br /&gt;
setComponentID:&lt;br /&gt;
transformationCoordinates&lt;br /&gt;
_componentID&lt;br /&gt;
_transformationCoordinates&lt;br /&gt;
pathComponents&lt;br /&gt;
com.apple.biometrickitd&lt;br /&gt;
T@&amp;quot;&amp;lt;BiometricKitDelegate&amp;gt;&amp;quot;,N,V_delegate&lt;br /&gt;
interruptionHandler&lt;br /&gt;
T@?,C,N,V_interruptionHandler&lt;br /&gt;
topology&lt;br /&gt;
T@&amp;quot;NSDictionary&amp;quot;,&amp;amp;,N,V_details&lt;br /&gt;
com.apple.fingerprint.enroll.attempts&lt;br /&gt;
com.apple.fingerprint.enroll.passes&lt;br /&gt;
com.apple.fingerprint.enroll.touchesPerEnroll&lt;br /&gt;
com.apple.fingerprint.enroll.badImagesPerEnroll&lt;br /&gt;
com.apple.fingerprint.enroll.rejectedImagesPerEnroll&lt;br /&gt;
com.apple.fingerprint.enroll.primaryClusterAdditions&lt;br /&gt;
com.apple.fingerprint.enroll.primaryClusterFailedAdditions&lt;br /&gt;
com.apple.fingerprint.enroll.otherClustersAdditions&lt;br /&gt;
com.apple.fingerprint.enroll.joinEvents&lt;br /&gt;
com.apple.fingerprint.enroll.clusterCount&lt;br /&gt;
com.apple.fingerprint.enroll.nodeCount&lt;br /&gt;
com.apple.fingerprint.enroll.primaryClusterNodeCount&lt;br /&gt;
com.apple.fingerprint.enroll.area&lt;br /&gt;
com.apple.fingerprint.enroll.primaryClusterArea&lt;br /&gt;
com.apple.fingerprint.enroll.passTime&lt;br /&gt;
com.apple.fingerprint.enroll.fails&lt;br /&gt;
com.apple.fingerprint.enroll.failTime&lt;br /&gt;
com.apple.ManagedConfiguration.profileListChanged&lt;br /&gt;
com.apple.biometrickitd.debugLogEnabled&lt;br /&gt;
com.apple.biometrickitd.debugLogPath&lt;br /&gt;
debugLogEnabled&lt;br /&gt;
debugLogPath&lt;br /&gt;
BKOptionSuppressHapticFeedback&lt;br /&gt;
BKOptionFilterOutHomeButtonEvents&lt;br /&gt;
BKOptionMatchForUnlock&lt;br /&gt;
InternalBuild&lt;br /&gt;
scanbed&lt;br /&gt;
synthetic&lt;br /&gt;
Uninitialized&lt;br /&gt;
Not Provisioned&lt;br /&gt;
Unprovisioned&lt;br /&gt;
Provisioned&lt;br /&gt;
Provisioned Locked&lt;br /&gt;
Unpaired&lt;br /&gt;
Unknown&lt;br /&gt;
biosensor,mesa&lt;br /&gt;
modulation-ratio&lt;br /&gt;
AppleBiometricSensor&lt;br /&gt;
patch-version&lt;br /&gt;
Mesa configuration:&lt;br /&gt;
Provisioning Status: %@&lt;br /&gt;
Calibrated: &lt;br /&gt;
- Version: &lt;br /&gt;
- Signed: &lt;br /&gt;
Modulation ratio: &lt;br /&gt;
Kernel: &lt;br /&gt;
Thick kernel&lt;br /&gt;
Thin kernel&lt;br /&gt;
Sensor Patch Version: &lt;br /&gt;
Steps to Reproduce:&lt;br /&gt;
inUse&lt;br /&gt;
TB,V_inUse&lt;br /&gt;
enrollProgressConfigRenderMode&lt;br /&gt;
Ti,N,V_enrollProgressConfigRenderMode&lt;br /&gt;
enrollProgressConfigRenderViewSize&lt;br /&gt;
T{CGSize=dd},N,V_enrollProgressConfigRenderViewSize&lt;br /&gt;
renderMode&lt;br /&gt;
Ti,N,V_renderMode&lt;br /&gt;
opacity&lt;br /&gt;
Tf,N,V_opacity&lt;br /&gt;
Notification callback.&lt;br /&gt;
BiometricKitErrorDomain&lt;br /&gt;
BKIdentityUUID&lt;br /&gt;
BKIdentityType&lt;br /&gt;
BKIdentityAttribute&lt;br /&gt;
BKIdentityEntityNumber&lt;br /&gt;
BKIdentityName&lt;br /&gt;
/var/mobile/BiometricKit/biometrickitd&lt;br /&gt;
BKEPDReason&lt;br /&gt;
BKEPDNewNodeID&lt;br /&gt;
BKEPDNewComponentID&lt;br /&gt;
BKEPDNewNodeCoordinates&lt;br /&gt;
BKEPDRemovedNodeID&lt;br /&gt;
BKEPDRemovedComponentID&lt;br /&gt;
BKEPDExtendedComponentID&lt;br /&gt;
BKEPDResultComponentID&lt;br /&gt;
BKEPDMergedInComponents&lt;br /&gt;
BKEPDRedundantNode&lt;br /&gt;
BKTDLargestCompArea&lt;br /&gt;
BKTDLargestCompNodes&lt;br /&gt;
BKTDTotalArea&lt;br /&gt;
BKTDTotalNodes&lt;br /&gt;
BKTemplateUpdated&lt;br /&gt;
Td,N,V_x&lt;br /&gt;
Td,N,V_y&lt;br /&gt;
angle&lt;br /&gt;
Td,N,V_angle&lt;br /&gt;
componentID&lt;br /&gt;
Tq,N,V_componentID&lt;br /&gt;
transformationCoordinates&lt;br /&gt;
T@&amp;quot;BiometricKitEnrollProgressCoordinates&amp;quot;,&amp;amp;,N,V_transformationCoordinates&lt;br /&gt;
Remove identity: %@&lt;br /&gt;
Log package:%@&lt;br /&gt;
biometrickitd&lt;br /&gt;
%@.tar.gz&lt;br /&gt;
cd %@ &amp;amp;&amp;amp; tar -cjf %@ %@&lt;br /&gt;
Time: % 8.3f&lt;br /&gt;
PASS&lt;br /&gt;
FAIL&lt;br /&gt;
Closing log with result %@&lt;br /&gt;
Template identity:&lt;br /&gt;
UUID  : %@&lt;br /&gt;
Type  : %i&lt;br /&gt;
Attrib: %i&lt;br /&gt;
Entity: %i&lt;br /&gt;
Error: Unable to get identity&lt;br /&gt;
Serialised template: %@&lt;br /&gt;
%@_%04d.bin&lt;br /&gt;
Status message: %@&lt;br /&gt;
Progress %i&lt;br /&gt;
Count of enrollments: %i&lt;br /&gt;
BiometricKitErrorTaskCancelled&lt;br /&gt;
BiometricKitErrorIdentityInvalid&lt;br /&gt;
BiometricKitErrorIdentityNotAllowed&lt;br /&gt;
BiometricKitErrorIdentityErrorInvalidData&lt;br /&gt;
BiometricKitErrorIdentityErrorUnknown&lt;br /&gt;
BiometricKitStatusFingerOn&lt;br /&gt;
BiometricKitStatusFingerOff&lt;br /&gt;
BiometricKitStatusEnrollmentComplete&lt;br /&gt;
BiometricKitStatusEnrollmentCancelled&lt;br /&gt;
BiometricKitStatusEnrollmentFailed&lt;br /&gt;
BiometricKitStatusEnrollmentTimeout&lt;br /&gt;
BiometricKitStatusUnknownError&lt;br /&gt;
BiometricKitStatusImageRejected&lt;br /&gt;
BiometricKitStatusNoCalibration&lt;br /&gt;
BiometricKitImageForProcessing&lt;br /&gt;
BiometricKitStatusTemplateListUpdated&lt;br /&gt;
BiometricKitStatusRequestFingerOff&lt;br /&gt;
BiometricKitStatusAutoMatchingStarted&lt;br /&gt;
BiometricKitStatusAutoMatchingStopped&lt;br /&gt;
BiometricKitStatusCaptureRestart&lt;br /&gt;
BiometricKitStatusScanTooShort&lt;br /&gt;
BiometricKitStatusAutoMatchingStartByHomeButton&lt;br /&gt;
BiometricKitStatusMatchingCancelled&lt;br /&gt;
BiometricKitStatusFingerOnBeforeFirstPasscodeUnlock&lt;br /&gt;
BiometricKitStatusFingerOnInPasscodeLockout&lt;br /&gt;
BiometricKitStatusFingerOnInBioLockout&lt;br /&gt;
BiometricKitStatusFingerOnTokenExpired&lt;br /&gt;
BiometricKitStatusESDRecovery&lt;br /&gt;
BiometricKitStatusImageRejectedUnknown&lt;br /&gt;
BiometricKitStatusImageRejectedBadBlocks&lt;br /&gt;
BiometricKitStatusImageRejectedChFPN&lt;br /&gt;
BiometricKitStatusImageRejectedCaFPN&lt;br /&gt;
BiometricKitStatusSensorOperationModeIdle&lt;br /&gt;
BiometricKitStatusSensorOperationModeCapture&lt;br /&gt;
BiometricKitStatusSensorOperationModePause&lt;br /&gt;
Other unknown status %i&lt;br /&gt;
Image #%i was rejected&lt;br /&gt;
Sensor patch version: %ld&lt;br /&gt;
Sensor patch version: unknown&lt;br /&gt;
Calibration Data: %@&lt;br /&gt;
Capture buffer: %@&lt;br /&gt;
Matcher: image refused&lt;br /&gt;
Matcher: image %s node %u&lt;br /&gt;
added as&lt;br /&gt;
replaced&lt;br /&gt;
Coordinates: %s[%i, %i, %i]&lt;br /&gt;
inverse of &lt;br /&gt;
Parent: %i&lt;br /&gt;
Processed image: %@&lt;br /&gt;
Enroll debug log, version 7&lt;br /&gt;
static const node_placement_t table_%02i = &lt;br /&gt;
%@{%i,%i,%i,%i,%i,%i,{&lt;br /&gt;
%@{%i,%i,%i,%i,%i}&lt;br /&gt;
%@},%i,%i,%i,%i,%i,0x%04x};&lt;br /&gt;
bin8&lt;br /&gt;
bin16&lt;br /&gt;
binXX&lt;br /&gt;
calibdata.bin&lt;br /&gt;
calibration-blob&lt;br /&gt;
Image #%i%s&lt;br /&gt;
 was sent to matcher&lt;br /&gt;
Match result&lt;br /&gt;
Match details:&lt;br /&gt;
Matching score: %i&lt;br /&gt;
Match S2S count: %i&lt;br /&gt;
Matching node: %i&lt;br /&gt;
Updated node: %i&lt;br /&gt;
Not available&lt;br /&gt;
No match (artificial)&lt;br /&gt;
No match&lt;br /&gt;
Image #%i&lt;br /&gt;
Warning: the log is not complete, previous part of the log was deleted.&lt;br /&gt;
Starting enrollment&lt;br /&gt;
Starting matching&lt;br /&gt;
No known identities with enroll log are available.&lt;br /&gt;
Known identities with enroll log available:&lt;br /&gt;
%@ : %@&lt;br /&gt;
Match debug log, version 7&lt;br /&gt;
messages.log&lt;br /&gt;
OS version: %@ (%@)&lt;br /&gt;
Mesa: %@&lt;br /&gt;
Process name:%@&lt;br /&gt;
PrimaryUsagePage&lt;br /&gt;
PrimaryUsage&lt;br /&gt;
com.apple.iokit.hid.displayStatus&lt;br /&gt;
com.apple.mobile.keybagd.lock_status&lt;br /&gt;
AppleMesaSEPDriver&lt;br /&gt;
IOGeneralInterest&lt;br /&gt;
ScanningState&lt;br /&gt;
ScanningStateIdle&lt;br /&gt;
ScanningStateShortScanning&lt;br /&gt;
ScanningStateLongScanning&lt;br /&gt;
Unknown scanning state %i&lt;br /&gt;
Event: %@&lt;br /&gt;
HomeButtonPress&lt;br /&gt;
ExtendedDeviceLockState&lt;br /&gt;
MobileKeyBagDeviceIsUnlocked&lt;br /&gt;
MobileKeyBagDeviceIsLocked&lt;br /&gt;
MobileKeyBagDeviceIsLocking&lt;br /&gt;
MobileKeyBagDisabled&lt;br /&gt;
MobileKeyBagDeviceUnlockInProgress&lt;br /&gt;
MobileKeyBagDeviceInGracePeriod&lt;br /&gt;
MobileKeyBagDeviceInAssertDelay&lt;br /&gt;
MobileKeyBagDeviceInBioUnlock&lt;br /&gt;
Unknown lock state %i&lt;br /&gt;
DisplayOn&lt;br /&gt;
DisplayOff&lt;br /&gt;
/SourceCache/Mesa/Mesa-152/AppleBiometricServices/BiometricKit/BiometricKitDebugLog.m&lt;br /&gt;
/var/mobile/Library/Logs/CrashReporter/BiometricKit&lt;br /&gt;
v24@0:8@&amp;quot;BiometricKitIdentity&amp;quot;16&lt;br /&gt;
@&amp;quot;NSXPCConnection&amp;quot;&lt;br /&gt;
@&amp;quot;&amp;lt;BiometricKitDelegate&amp;gt;&amp;quot;&lt;br /&gt;
@&amp;quot;BiometricKitXPCClient&amp;quot;&lt;br /&gt;
@&amp;quot;BiometricKitStatistics&amp;quot;&lt;br /&gt;
@&amp;quot;UIImage&amp;quot;&lt;br /&gt;
[25{CGRect=&amp;quot;origin&amp;quot;{CGPoint=&amp;quot;x&amp;quot;d&amp;quot;y&amp;quot;d}&amp;quot;size&amp;quot;{CGSize=&amp;quot;width&amp;quot;d&amp;quot;height&amp;quot;d}}]&lt;br /&gt;
[25@&amp;quot;UIImage&amp;quot;]&lt;br /&gt;
{?=&amp;quot;count&amp;quot;i&amp;quot;capa&amp;quot;i&amp;quot;items&amp;quot;^^{?}&amp;quot;unusedImageCount&amp;quot;i&amp;quot;componentCount&amp;quot;i&amp;quot;componentCapa&amp;quot;i&amp;quot;bestComponentIndex&amp;quot;i&amp;quot;bestMapiComponentIndex&amp;quot;i&amp;quot;components&amp;quot;^^{?}&amp;quot;mapiNodeAddedIndex&amp;quot;s&amp;quot;mapiNodeRemovedIndex&amp;quot;s&amp;quot;updateCount&amp;quot;i&amp;quot;structureIsInconsistent&amp;quot;B}&lt;br /&gt;
{?=&amp;quot;nodes&amp;quot;[25{?=&amp;quot;imageData&amp;quot;@&amp;quot;NSData&amp;quot;&amp;quot;width&amp;quot;I&amp;quot;height&amp;quot;I}]}&lt;br /&gt;
BiometricKitXpcProtocol&lt;br /&gt;
BiometricKitDelegateXpcProtocol&lt;br /&gt;
BiometricKitXPCClient&lt;br /&gt;
BiometricKitTemplateInfo&lt;br /&gt;
BiometricKitStatistics&lt;br /&gt;
BiometricKit&lt;br /&gt;
BiometricKitDelegate&lt;br /&gt;
BiometricKitIdentity&lt;br /&gt;
NSSecureCoding&lt;br /&gt;
NSCoding&lt;br /&gt;
BiometricKitMatchInfo&lt;br /&gt;
BiometricKitEnrollProgressInfo&lt;br /&gt;
BiometricKitEnrollProgressCoordinates&lt;br /&gt;
BiometricKitEnrollProgressMergedComponent&lt;br /&gt;
BiometricKitDebugLog&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{stub|hardware}}&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44541</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44541"/>
		<updated>2015-02-15T09:27:28Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* TaiG and PPJailbreak (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[i0n1c]]'s Infoleak vulnerability (Pangu v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) (Pangu v1.1.0)&lt;br /&gt;
* LightSensor / ProxALSSensor kernel exploit (Pangu 1.0.0) ({{cve|2014-4388}})&lt;br /&gt;
* TempSensor kernel exploit (Pangu 1.1.0) ({{cve|2014-4388}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
* IOKit crafted call maker utility ({{cve|2014-4407}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* i0n1c's Kernel info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
 (See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* a new afc symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])  also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* a new ovelapping segment attack [in a modified version] ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* MachOBundleHeaders - to leak kernel addresses (slid)&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44540</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44540"/>
		<updated>2015-02-15T09:26:55Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: also dont need a tweet as a source.. TAIG2 @NewOSXBook clearly explains it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[i0n1c]]'s Infoleak vulnerability (Pangu v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) (Pangu v1.1.0)&lt;br /&gt;
* LightSensor / ProxALSSensor kernel exploit (Pangu 1.0.0) ({{cve|2014-4388}})&lt;br /&gt;
* TempSensor kernel exploit (Pangu 1.1.0) ({{cve|2014-4388}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
* IOKit crafted call maker utility ({{cve|2014-4407}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* i0n1c's Kernel info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
 (See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* a new afc symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
 * [[DeveloperDiskImage race condition]] (by [[comex]])  also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* a new ovelapping segment attack [in a modified version] ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* MachOBundleHeaders - to leak kernel addresses (slid)&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44539</id>
		<title>Jailbreak Exploits</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Jailbreak_Exploits&amp;diff=44539"/>
		<updated>2015-02-15T09:25:23Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: ProxALS not actually used, at least not in TaiG. Not mach_ports_info. corrected, added MachOBundle and more&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page lists the '''exploits''' used in [[jailbreak]]s.&lt;br /&gt;
&lt;br /&gt;
== Common exploits which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
* [[Pwnage]] + [[Pwnage 2.0]] (together to jailbreak the [[n82ap|iPhone 3G]])&lt;br /&gt;
* [[ARM7 Go]] (from iOS 2.1.1) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
* [[0x24000 Segment Overflow]] (for [[untethered jailbreak]] on [[n88ap|iPhone 3GS]] with [[Bootrom 359.3|old bootrom]] and [[n72ap|iPod touch 2G]] with [[Bootrom 240.4|old bootrom]]; another exploit as the [[limera1n Exploit]] is required)&lt;br /&gt;
* [[limera1n Exploit]] (for [[tethered jailbreak]] on [[n88ap|iPhone 3GS]], [[n18ap|iPod touch 3G]], [[k48ap|iPad]], [[iPhone 4]], [[n81ap|iPod touch 4G]] and [[k66ap|Apple TV 2G]])&lt;br /&gt;
* [[usb_control_msg(0xA1, 1) Exploit]] (also known as &amp;quot;steaks4uce&amp;quot;) (for [[tethered jailbreak]] on [[n72ap|iPod touch 2G]])&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak different versions of iOS ==&lt;br /&gt;
=== [[PwnageTool]] (2.0 - 5.1.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[redsn0w]] (3.0 - 6.0) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the same exploits as [[Absinthe|Absinthe]] and [[Absinthe|Absinthe 2.0]] to jailbreak iOS 5.0/5.0.1 and 5.1.1&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 5.1.1&lt;br /&gt;
&lt;br /&gt;
=== [[sn0wbreeze]] (3.1.3 - 6.1.3) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* uses the exploits listed below to untether up to iOS 6.1.2&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 1.x ==&lt;br /&gt;
=== [[AppTapp Installer]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[iBrickr]] (1.0 / 1.0.1 / 1.0.2) ===&lt;br /&gt;
* iBoot &amp;lt;code&amp;gt;cp&amp;lt;/code&amp;gt;-command exploit&lt;br /&gt;
&lt;br /&gt;
=== [[AppSnapp]]/[[JailbreakMe|JailbreakMe 1.0]] (1.0 / 1.0.1 / 1.0.2 / 1.1.1) ===&lt;br /&gt;
* [[LibTiff|libtiff exploit]] (Adapted from the PSP scene, used by [[JailbreakMe]]) ({{cve|2006-3459}})&lt;br /&gt;
&lt;br /&gt;
=== [[mknod|OktoPrep]] (1.1.2) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.2 from a jailborken 1.1.1&lt;br /&gt;
* [[mknod]]&lt;br /&gt;
&lt;br /&gt;
=== [[Soft Upgrade]] (1.1.3) ===&lt;br /&gt;
&amp;quot;Upgrade&amp;quot; to 1.1.3 from a running jailbroken 1.1.2&lt;br /&gt;
&lt;br /&gt;
=== [[ZiPhone]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
* [[Ramdisk Hack]]&lt;br /&gt;
&lt;br /&gt;
=== [[iLiberty+|iLiberty / iLiberty+]] (1.1.3 / 1.1.4 /1.1.5) ===&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 2.x ==&lt;br /&gt;
=== [[QuickPwn]] (2.0 - 2.2.1) ===&lt;br /&gt;
* uses [[Pwnage]] and [[Pwnage 2.0]]&lt;br /&gt;
&lt;br /&gt;
=== [[Redsn0w Lite]] (2.1.1) ===&lt;br /&gt;
* [[ARM7 Go]] (for [[n72ap|iPod touch 2G]] only)&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 3.x ==&lt;br /&gt;
=== [[purplera1n]] (3.0) ===&lt;br /&gt;
* [[iBoot Environment Variable Overflow]] ({{cve|2009-2795}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[blackra1n]] (3.1.2) ===&lt;br /&gt;
* [[usb_control_msg(0x21, 2) Exploit]] ({{cve|2010-0038}})&lt;br /&gt;
* uses [[0x24000 Segment Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Spirit]] (3.1.2 / 3.1.3 / 3.2) ===&lt;br /&gt;
* [[MobileBackup Copy Exploit]]&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[BPF_STX Kernel Write Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (3.1.2 / 3.1.3 / 3.2 / 3.2.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] / [[greenpois0n (jailbreak)|greenpois0n]] (3.2.2) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 4.x ==&lt;br /&gt;
=== [[Star|JailbreakMe 2.0 / Star]] (4.0 / 4.0.1) ===&lt;br /&gt;
* [[Malformed CFF Vulnerability]] ({{cve|2010-1797}})&lt;br /&gt;
* [[Incomplete Codesign Exploit]]&lt;br /&gt;
* [[IOSurface Kernel Exploit]] ({{cve|2010-2973}})&lt;br /&gt;
&lt;br /&gt;
=== [[limera1n]] /  (4.0 / 4.0.1 / 4.0.2 / 4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[Packet Filter Kernel Exploit]]&lt;br /&gt;
&lt;br /&gt;
=== [[greenpois0n (jailbreak)|greenpois0n]] (4.2.1) ===&lt;br /&gt;
* uses different common exploits&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.2.6 / 4.2.7 / 4.2.8) ===&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[HFS Legacy Volume Name Stack Buffer Overflow]]&lt;br /&gt;
&lt;br /&gt;
=== [[Saffron|JailbreakMe 3.0 / Saffron]] (4.3 / 4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
Except for the [[n18ap|iPod touch 3G]] on iOS 4.3.1.&lt;br /&gt;
* [[T1 Font Integer Overflow]] ({{cve|2011-0226}})&lt;br /&gt;
* [[IOMobileFrameBuffer Privilege Escalation Exploit]] ({{cve|2011-0227}})&lt;br /&gt;
&lt;br /&gt;
=== i0nic's Untether (4.3.1 / 4.3.2 / 4.3.3) ===&lt;br /&gt;
used in [[redsn0w]] to untether iOS 4.3.1 / 4.3.2 / 4.3.3&lt;br /&gt;
* [[ndrv_setspec() Integer Overflow]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 5.x ==&lt;br /&gt;
=== [[unthredera1n]] (5.0 / 5.0.1 / 5.1 / 5.1.1) ===&lt;br /&gt;
Except for the [[iPad 3]]&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* [[AMFID code signing evasion]] ({{cve|2013-0977}})&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe]] (5.0 on [[n94ap|iPhone 4S]] only / 5.0.1 on [[iPad 2]] and [[iPhone 4S]])  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}}) (used both for payload injection and untether)&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Corona|Corona Untether]] (5.0.1)  ===&lt;br /&gt;
* [[Racoon String Format Overflow Exploit]] ({{cve|2012-0646}})&lt;br /&gt;
* [[HFS Heap Overflow]] ({{cve|2012-0642}})&lt;br /&gt;
* unknown exploit ({{cve|2012-0643}})&lt;br /&gt;
&lt;br /&gt;
=== [[Absinthe|Absinthe 2.0]] and [[Rocky Racoon|Rocky Racoon Untether]] (5.1.1) ===&lt;br /&gt;
* a new Packet Filter Kernel Exploit ({{cve|2012-3728}})&lt;br /&gt;
* Racoon DNS4/WINS4 table buffer overflow ({{cve|2012-3727}})&lt;br /&gt;
* MobileBackup2 Copy Exploit&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 6.x ==&lt;br /&gt;
=== [[evasi0n]] (6.0 / 6.0.1 / 6.0.2 / 6.1 / 6.1.1 / 6.1.2)  ===&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-0979}})&lt;br /&gt;
* [[Timezone Vulnerability]]&lt;br /&gt;
* [[Shebang Trick]] ({{cve|2013-5154}})&lt;br /&gt;
* [[AMFID code signing evasion]]&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
* [[IOUSBDeviceFamily Vulnerability]] ({{cve|2013-0981}})&lt;br /&gt;
* [[ARM Exception Vector Info Leak]] ({{cve|2013-0978}})&lt;br /&gt;
* [[dynamic memmove() locating]]&lt;br /&gt;
* [[vm_map_copy_t corruption for arbitrary memory disclosure]]&lt;br /&gt;
* [[kernel memory write via ROP gadget]]&lt;br /&gt;
* [[Overlapping Segment Attack]] ({{cve|2013-0977}})&lt;br /&gt;
&lt;br /&gt;
=== [[p0sixspwn]] (6.1.3 / 6.1.4 / 6.1.5 / 6.1.6) ===&lt;br /&gt;
* [[posix_spawn kernel information leak]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[posix_spawn kernel exploit]] ({{cve|2013-3954}}) (by [[i0n1c]])&lt;br /&gt;
* [[mach_msg_ool_descriptor_ts for heap shaping]] ({{cve|2013-3953}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* [[DeveloperDiskImage race condition]] (by [[comex]])&lt;br /&gt;
* [[launchd.conf untether]]&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 7.x ==&lt;br /&gt;
=== [[evasi0n7]] (7.0 / 7.0.1 / 7.0.2 / 7.0.3 / 7.0.4 / 7.0.5 / 7.0.6) ===&lt;br /&gt;
{{Section Stub}}&lt;br /&gt;
* [[Symbolic Link Vulnerability]] ({{cve|2013-5133}})&lt;br /&gt;
* [[AMFID_code_signing_evasi0n7]] ({{cve|2014-1273}})&lt;br /&gt;
* CrashHouseKeeping chmod vulnarability ({{cve|2014-1272}})&lt;br /&gt;
* ptmx_get_ioctl ioctl crafted call ({{cve|2014-1278}})&lt;br /&gt;
&lt;br /&gt;
=== [[Geeksn0w]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[limera1n]]'s bootrom exploit ([[Tethered jailbreak]]) on [[iPhone 4]]&lt;br /&gt;
&lt;br /&gt;
=== [[Pangu]] (7.1 / 7.1.1 / 7.1.2) ===&lt;br /&gt;
* [[i0n1c]]'s Infoleak vulnerability (Pangu v1.0.0)&lt;br /&gt;
* break_early_random (by [[i0n1c]] and Tarjei Mandt of Azimuth) (Pangu v1.1.0)&lt;br /&gt;
* LightSensor / ProxALSSensor kernel exploit (Pangu 1.0.0) ({{cve|2014-4388}})&lt;br /&gt;
* TempSensor kernel exploit (Pangu 1.1.0) ({{cve|2014-4388}})&lt;br /&gt;
* &amp;quot;syslogd chown&amp;quot; vulnerability&lt;br /&gt;
* enterprise certificate (no real exploit, used for initial &amp;quot;unsigned&amp;quot; code execution)&lt;br /&gt;
* &amp;quot;foo_extracted&amp;quot; symlink vulnerability (used to write to /var) ({{cve|2014-4386}})&lt;br /&gt;
* /tmp/bigfile (a big file for improvement of the reliability of a race condition)&lt;br /&gt;
* VoIP backgrounding trick (used to auto restart the app)&lt;br /&gt;
* hidden segment attack&lt;br /&gt;
* IOKit crafted call maker utility ({{cve|2014-4407}})&lt;br /&gt;
&lt;br /&gt;
== Programs which are used in order to jailbreak 8.x ==&lt;br /&gt;
=== [[Pangu8]] (8.0 / 8.0.1 / 8.0.2 / 8.1) ===&lt;br /&gt;
* an exploit for a bug in /usr/libexec/neagent (source @iH8sn0w)&lt;br /&gt;
* enterprise certificate (inside the IPA)&lt;br /&gt;
* a kind of dylib injection into a system process (see IPA)&lt;br /&gt;
* a dmg mount command (looks like the Developer DMG) (syslog while jailbreaking)&lt;br /&gt;
* a sandboxing problem in debugserver ({{cve|2014-4457}})&lt;br /&gt;
* the same/a similar kernel exploit as used in [[Pangu|the first Pangu]] ({{cve|2014-4461}}) (source @iH8sn0w)&lt;br /&gt;
* enable-dylibs-to-override-cache&lt;br /&gt;
* a new ovelapping segment attack ({{cve|2014-4455}})&lt;br /&gt;
* i0n1c's Kernel info leak ({{cve|2014-4491}})&lt;br /&gt;
&lt;br /&gt;
=== [[TaiG]] and [[PPJailbreak]] (8.0 / 8.0.1 / 8.0.2 / 8.1 / 8.1.1 / 8.1.2) ===&lt;br /&gt;
 (See also details at [http://newosxbook.com/articles/TaiG.html newosxbook.com])&lt;br /&gt;
* a new afc symlink attack ({{cve|2014-4480}}) - to get onto the device filesystem&lt;br /&gt;
 * [[DeveloperDiskImage race condition]] (by [[comex]]) (source: https://twitter.com/iH8sn0w/status/538602532088860672; also used in p0sixspwn) - to mount a fake DDI and instantly overwrite (via union) libmis/libxpcd.cache&lt;br /&gt;
* a new ovelapping segment attack [in a modified version] ({{cve|2014-4455}}) - negative LC_SEGMENT - to allow libmis and xpcdcache to load&lt;br /&gt;
* libmis redirection of MISValidateSignature (as per evasion) to kCFEqual&lt;br /&gt;
* enable-dylibs-to-override-cache - (not an exploit, a feature) - required to allow loading of xpcd/libmis from filesystem, because they are both in shared cache&lt;br /&gt;
&lt;br /&gt;
Kernel:&lt;br /&gt;
&lt;br /&gt;
* MachOBundleHeaders - to leak kernel addresses (slid)&lt;br /&gt;
* mach_port_kobject exploit - to defeat KASLR&lt;br /&gt;
* IOHIDFamily Kernel exploit ({{cve|2014-4487}}) - to overwrite memory&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=44538</id>
		<title>TaiG</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=TaiG&amp;diff=44538"/>
		<updated>2015-02-15T09:19:43Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Adding Part 2 of my writeup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{about|untethered jailbreak for iOS 8.0-8.1.2 for Windows|the Mac version|PPJailbreak}}&lt;br /&gt;
{{Infobox software&lt;br /&gt;
| name                   = TaiG&lt;br /&gt;
| title                  = TaiG&lt;br /&gt;
| author                 = TaiG&lt;br /&gt;
| developer              = TaiG&lt;br /&gt;
| released               = {{Start date|2014|11|29|df=yes}}&lt;br /&gt;
| discontinued           = &lt;br /&gt;
| latest release version = 1.2.1&lt;br /&gt;
| latest release date    = {{Start date and age|2015|2|12|df=yes}}&lt;br /&gt;
| latest preview version = &lt;br /&gt;
| latest preview date    = &lt;br /&gt;
| programming language   = ?&lt;br /&gt;
| operating system       = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| size                   = &lt;br /&gt;
| platform               = [[wikipedia:Microsoft Windows|Windows]]&lt;br /&gt;
| language               = [[wikipedia:Chinese language|Chinese]] / [[wikipedia:English language|English]]&lt;br /&gt;
| status                 = Active&lt;br /&gt;
| genre                  = Jailbreaking&lt;br /&gt;
| license                = [[wikipedia:Freeware|Freeware]]&lt;br /&gt;
| website                = [http://www.taig.com/en/ taig.com/en] (English)&amp;lt;br /&amp;gt;[http://taig.com taig.com] (Chinese)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''TaiG''' ('''Taiji''' in Chinese) (&amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;[[wikipedia:Help:IPA for English|/taɪ dʒi/]]&amp;lt;/span&amp;gt; or &amp;lt;span class=&amp;quot;ipa&amp;quot;&amp;gt;/taɪ tʃi/&amp;lt;/span&amp;gt;) is an [[untethered jailbreak]] for all devices on iOS 8.0-8.1.2, except the [[Apple TV]]. It was initially released on 29 November, 2014.&lt;br /&gt;
&lt;br /&gt;
== Supported Devices ==&lt;br /&gt;
All devices capable of running [[iOS]] 8.0-8.1.2 except the [[Apple TV]] family, are supported.&lt;br /&gt;
&lt;br /&gt;
=== iOS 8.2 Beta ===&lt;br /&gt;
&amp;lt;!-- should be reworded to mention that it was possibly there since the first day; the &amp;quot;signature&amp;quot; on the announcement is dated 2 Dec 2014 --&amp;gt;&lt;br /&gt;
TaiG's website originally claimed as early as [http://web.archive.org/web/20141204221416/http://taig.com/en/ 4 December 2014] that &amp;quot;support of iOS 8.2 has been completed by TaiG, [but] as 8.2 is still at beta stage, we have disabled support for 8.2 in [the] current public release.&amp;quot; This claim remained through [http://web.archive.org/web/20141231032106/http://www.taig.com/ 31 December 2014], but was removed sometime before [http://web.archive.org/web/20150104165652/http://taig.com/en/ 4 January 2015].&lt;br /&gt;
&lt;br /&gt;
== Download ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Version&lt;br /&gt;
! Language&lt;br /&gt;
! Download&lt;br /&gt;
! SHA-1&lt;br /&gt;
! Changes&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; | English&lt;br /&gt;
| [http://apt.taig.com/installer/TaiG_1006.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2538d85d3b42a2a65ec33aec86245c39047449d3&amp;lt;/code&amp;gt;&lt;br /&gt;
| First version of TaiG which supports all devices with iOS 8.0 - 8.1.1 except Apple TV's.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1010.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;7346849bb3ff3dd1e21530ae1bb7ee27f02f453a&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Improve JB speed&lt;br /&gt;
* Improve stability&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1021.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;4edab617f9b951419eca4c32ddc6a5f8a2e94226&amp;lt;/code&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
* Able to remove 3K-Assistant via Cydia&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.1.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_1101.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;2181179badac74cced2eb9ad5639b0f57be66f95&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Avoid sandbox generate redundant info.&lt;br /&gt;
* Officially built TaiG source(apt.taig.com), users who Jailbroke with TaiG before V1.1.0, can fix this problem by install TaiG 8.0-8.1.1 Untether.&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/channel/1205/TaiGJBreak_EN_1101.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;d3b40bbbd6f9cf652ece4476b96dafae858f1bb0&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | 1.2.0&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1201.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;42848662a637234ef14d67448e4cf8e427906b52&amp;lt;/code&amp;gt;&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
* Add support for iOS 8.1.2&lt;br /&gt;
|-&lt;br /&gt;
| English&lt;br /&gt;
| [http://apt.taig.com/installer/en/TaiGJBreak_EN_1201.zip TaiG]&lt;br /&gt;
| class=&amp;quot;rborderplz&amp;quot; | &amp;lt;code&amp;gt;5c6e2939359e36622ca2b4ca71d0def628dbbaf3&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1.2.1&lt;br /&gt;
| Chinese&lt;br /&gt;
| [http://apt.taig.com/installer/TaiGJBreak_1210.zip TaiG]&lt;br /&gt;
| &amp;lt;code&amp;gt;95df3a271473b5dbed29c950f5441aecd231b47a&amp;lt;/code&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
* TaiG can support iTunes12.1 now(By download new driver from a post in 3K BBS)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Installed Packages ==&lt;br /&gt;
* APR (/usr/lib) (1.3.3-2; &amp;lt;code&amp;gt;apr-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 (apt-key) (0.7.25.3-3; &amp;lt;code&amp;gt;apt7-key&amp;lt;/code&amp;gt;)&lt;br /&gt;
* APT 0.7 Strict (lib) (0.7.25.3-13; &amp;lt;code&amp;gt;apt7-lib&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Base Structure (1-4; &amp;lt;code&amp;gt;base&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Big Boss Icon Set (1.0; &amp;lt;code&amp;gt;org.thebigboss.repo.icons&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Bourne-Again SHell (4.0.44-15; &amp;lt;code&amp;gt;bash&amp;lt;/code&amp;gt;)&lt;br /&gt;
* bzip2 (1.0.5-7; &amp;lt;code&amp;gt;bzip2&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Core Utilities (/bin) (8.12-7p; &amp;lt;code&amp;gt;coreutils-bin&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Installer (1.1.16; &amp;lt;code&amp;gt;cydia&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Cydia Translations (1.1.12; &amp;lt;code&amp;gt;cydia-lproj&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Darwin Tools (1-4; &amp;lt;code&amp;gt;darwintools&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Packager (1.14.25-9; &amp;lt;code&amp;gt;dpkg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Debian Utilities (3.3.3ubuntu1-1p; &amp;lt;code&amp;gt;debianutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Diff Utilities (2.8.1-6; &amp;lt;code&amp;gt;diffutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Find Utilities (4.2.33-6; &amp;lt;code&amp;gt;findutils&amp;lt;/code&amp;gt;)&lt;br /&gt;
* GNU Privacy Guard (1.4.8-4; &amp;lt;code&amp;gt;gnupg&amp;lt;/code&amp;gt;)&lt;br /&gt;
* grep (2.5.4-3; &amp;lt;code&amp;gt;grep&amp;lt;/code&amp;gt;)&lt;br /&gt;
* gzip (1.6-7; &amp;lt;code&amp;gt;gzip&amp;lt;/code&amp;gt;)&lt;br /&gt;
* LZMA Utils (4.32.7-4; &amp;lt;code&amp;gt;lzma&amp;lt;/code&amp;gt;)&lt;br /&gt;
* New Curses (5.7-13; &amp;lt;code&amp;gt;ncurses&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM (Apple) (32.1-3; &amp;lt;code&amp;gt;pam&amp;lt;/code&amp;gt;)&lt;br /&gt;
* PAM Modules (36.1-4; &amp;lt;code&amp;gt;pam-modules&amp;lt;/code&amp;gt;)&lt;br /&gt;
* pcre (8.30-5p; &amp;lt;code&amp;gt;pcre&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Profile Directory (0-2; &amp;lt;code&amp;gt;profile.d&amp;lt;/code&amp;gt;)&lt;br /&gt;
* readline (6.0-7; &amp;lt;code&amp;gt;readline&amp;lt;/code&amp;gt;)&lt;br /&gt;
* sed (4.1.5-7; &amp;lt;code&amp;gt;sed&amp;lt;/code&amp;gt;)&lt;br /&gt;
* shell-cmds (118-6; &amp;lt;code&amp;gt;shell-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* system-cmds (433.4-12; &amp;lt;code&amp;gt;system-cmds&amp;lt;/code&amp;gt;)&lt;br /&gt;
* TaiG 8.0-8.1.X Untether (1.1 (using 1.2.0); &amp;lt;code&amp;gt;taiguntether&amp;lt;/code&amp;gt;)&lt;br /&gt;
* TaiG AFC2 (0.1; &amp;lt;code&amp;gt;taigafc2&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Tape Archive (1.19-8; &amp;lt;code&amp;gt;tar&amp;lt;/code&amp;gt;)&lt;br /&gt;
* UIKit Tools (1.1.9; &amp;lt;code&amp;gt;uikittools&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
== Exploits and analysis ==&lt;br /&gt;
[http://newosxbook.com/articles/TaiG.html &amp;quot;The Annotated (informal) guide to TaiG - Part I&amp;quot;], and [http://newosxbook.com/articles/TaiG2.html &amp;quot;Part II&amp;quot;] by Jonathan Levin&lt;br /&gt;
&lt;br /&gt;
[[Category:Jailbreaks]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=User_talk:EverythingApplesPro&amp;diff=44310</id>
		<title>User talk:EverythingApplesPro</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=User_talk:EverythingApplesPro&amp;diff=44310"/>
		<updated>2015-01-26T01:18:44Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Talk */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Talk==&lt;br /&gt;
Hi! Please don't re upload pictures. His pictures are perfectly valid, so upload another set, if it is different. Thank you! --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 23:38, 24 November 2014 (UTC)&lt;br /&gt;
:Also, just emailed him. His exact words: &amp;quot;No he can't replace the images that's not ok&amp;quot;. So, please, someone reading this, roll them back, and if I can figure out how, I will.--[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 23:53, 24 November 2014 (UTC)&lt;br /&gt;
::Sorry, didn't know the icon was already made {{unsigned|EverythingApplesPro}}&lt;br /&gt;
:::That's ok, please just separately upload existing files from now on. --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 00:39, 25 November 2014 (UTC)&lt;br /&gt;
Thanks, also sorry if I am editing/creating lots of information and pictures today, i have lots of information and cool things i can offer and i just got my account today. {{unsigned|EverythingApplesPro}}&lt;br /&gt;
:Thought I'd chime in. With images such as &amp;quot;[[:File:iPad mini retina ios7.jpeg|iPad mini retina ios7.jpeg]]&amp;quot;, that's Ok, but if it's a different image such as with &amp;quot;[[:File:Grapecalmain.png|Grapecalmain.png]]&amp;quot;, use a different file name. Thanks --[[User:5urd|5urd]] ([[User talk:5urd|talk]]) 07:51, 25 November 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
I dont know why everythingapplepro deleted my edit, namely :&lt;br /&gt;
&lt;br /&gt;
 &amp;quot;This was made evident by a wave of alleged &amp;quot;prototypes&amp;quot; to have hit eBay during the fall of 2014. The &amp;quot;prototypes&amp;quot; in question were various devices that, for one reason or another, did not get formatted fully, and thus remained with a full image of SwitchBoard, root access (via SSH running on the device's USB interface), and a full suite of debug utilities&amp;quot;&lt;br /&gt;
&lt;br /&gt;
When it is, in fact, very true. Apple themselves admitted to much  [[User:morpheus|morpheus]] 25 January 2015&lt;br /&gt;
&lt;br /&gt;
== Sign pages ==&lt;br /&gt;
Please use &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;--~~~~&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt; to sign your talk page entries. --[[User:Jaggions|Jaggions]] ([[User talk:Jaggions|talk]]) 21:02, 1 December 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Please don't upload hard-to-see pictures. ==&lt;br /&gt;
&lt;br /&gt;
Is there any way you could screenshot it? I know it must be possible, others have done it. --[[User:Awesomebing1|Awesomebing1]] ([[User talk:Awesomebing1|talk]]) 14:07, 13 December 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
Probably, I'm trying to do a screenshot but i can't get it to work. If i take a better picture of it, would i replace the current one and override it or just upload the newer one ?  --[[User:EverythingApplesPro|EverythingApplesPro]] ([[User talk:EverythingApplesPro|talk]]) 13 December 2014&lt;br /&gt;
: You can just upload a new version of the image, also please thumbnail the images like they are on the [[SwitchBoard.app]]. Try taking a screenshot through Xcode, if the developer image isn't already mounted on the device, Xcode should do it for you. --[[User:Haifisch|Haifisch]] ([[User talk:Haifisch|talk]]) 18:36, 13 December 2014 (UTC)&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Launchd&amp;diff=44299</id>
		<title>Launchd</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Launchd&amp;diff=44299"/>
		<updated>2015-01-22T14:04:53Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: No more source for this.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''launchd''' is the background process used to manage daemons running on the device. It is commanded using launchctl. The source code used to be available, but with OS X 10.10/iOS 8.0 has been moved into the closed source libxpc, and has undergone significant changes (e.g. single process rather than per-user launchd, and improved XPC functionality).&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [[wikipedia:launchd|Wikipedia]]&lt;br /&gt;
&lt;br /&gt;
{{stub|firmware}}&lt;br /&gt;
[[Category:Daemons]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=SwitchBoard.app&amp;diff=43114</id>
		<title>SwitchBoard.app</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=SwitchBoard.app&amp;diff=43114"/>
		<updated>2014-11-01T03:37:49Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: explaining so called&amp;quot;prototypes&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''SwitchBoard.app''' is one of Apple's internal utilities. It's a simple launcher of other developer utilities. It's usually located in [[Apple_Internal_Apps#Internal_diagnostic_apps_known_from_beta_firmwares_and_prototypes|/AppleInternal/Applications]] folder along the other internal applications. Currently, there is no SwitchBoard binary available for public.&lt;br /&gt;
&lt;br /&gt;
SwitchBoard and diagnostic utilities are copied onto the device during restore from special firmware bundles which are seeded only to Apple official service centers. It may be installed onto devices through [[PurpleRestore]]. Switchboard and its internal utilities are, in fact, present on all i-Devices during manufacturing - The utilities run extensive tests on the devices, including sensors, thermal measurements and more - and only when all tests pass do the devices go through a final stage,  involving  formatting and installing the production image of iOS on them.  This was made evident by a wave of alleged &amp;quot;prototypes&amp;quot; to have hit eBay during the fall of 2014. The &amp;quot;prototypes&amp;quot; in question were various iPhone 6 devices that, for one reason or another, did not get formatted fully, and thus remained with a full image of switchboard, root access (via drop bear running on the device's USB interface), and a full suite of debug utilities.&lt;br /&gt;
&lt;br /&gt;
== Gallery ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Switchboard.jpg|[[N88ap|iPhone 3GS]] running [[Sierra 7C108b]]&lt;br /&gt;
File:SwitchBoard_4G.jpg|[[iPhone 4]] running Inferno(?) [[8A2130h]]&lt;br /&gt;
File:SwitchBoard_iPod.png|[[iPod touch]] running [[Inferno 7C1023e]]&lt;br /&gt;
File:IPad-prototype.JPG|[[iPad]] running SwitchBoard&lt;br /&gt;
File:SwitchBoard.jpg|[[N82ap|iPhone 3G]] or [[N88ap|iPhone 3GS]]&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple Internal Apps]]&lt;br /&gt;
[[Category:Software]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Tutorial:Mounting_the_Ramdisk_of_IPSW_in_Betas_4-7&amp;diff=34496</id>
		<title>Talk:Tutorial:Mounting the Ramdisk of IPSW in Betas 4-7</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Tutorial:Mounting_the_Ramdisk_of_IPSW_in_Betas_4-7&amp;diff=34496"/>
		<updated>2013-08-27T15:28:58Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Deletion Request */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What versions? ==&lt;br /&gt;
What versions are the beta 4-7 it is referring to? --[[User:5urd|5urd]] 00:58, 26 June 2011 (UTC)&lt;br /&gt;
:This page seems fairly recent, so, I'd say iOS 4.2? remember how that went through like 50 betas? --[[User:rdqronos|rdqronos]] 21:07, 27 June 2011 (UTC)&lt;br /&gt;
::No, the move was recent, the page goes back to '08.  Maybe 2.0b4-2.0b7 because those are the only ones with a beta 6(p/f) and 7... --[[User:5urd|5urd]] 00:16, 28 June 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Deletion Request ==&lt;br /&gt;
&lt;br /&gt;
I don't want to have valuable information deleted, just because it's old. Feel free to improve, reorganize, mark as deprecated or whatever, but don't delete useful information. If you can prove that all this information is already somewhere else in this wiki, then, and only then, it's ok to delete. I'll remove the deletion mark to avoid that it stays there forever and then one day someone accidentally deleteds it. You can continue discussion nevertheless. --[[User:Http|http]] ([[User talk:Http|talk]]) 07:52, 16 June 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I vote delete.. specifically, why the heck is this tutorial so darn complicated? all you need to do is strip the IMG header, (first 64 bytes, with dd)&lt;br /&gt;
then you use 'file' and see:&lt;br /&gt;
&lt;br /&gt;
bash-3.2# file restore.dmg &lt;br /&gt;
restore.dmg: Macintosh HFS Extended version 4 data last mounted by: '10.0', created: Thu Aug  8 04:07:48 2013, last modified: Sat Aug 24 14:31:00 2013, last checked: Thu Aug  8 07:07:48 2013, block size: 4096, number of blocks: 2342, free blocks: 0&lt;br /&gt;
&lt;br /&gt;
Then you just use&lt;br /&gt;
&lt;br /&gt;
hdiutil attach -imagekey diskimage-class=CRawDiskImage restore.dmg&lt;br /&gt;
&lt;br /&gt;
And you are done. Tutorial is confusing. --[[User:morpheus|morpheus]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=System_Log&amp;diff=33149</id>
		<title>System Log</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=System_Log&amp;diff=33149"/>
		<updated>2013-07-28T03:25:54Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* Read syslog from command line */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==bgm's trick for enabling system log==&lt;br /&gt;
# In the shell, do: echo &amp;quot;*.* /var/log/syslog&amp;quot; &amp;gt; /etc/syslog.conf &lt;br /&gt;
# Add the following tags to /System/Library/LaunchDaemons/com.apple.syslogd.plist after the tag &amp;lt;string&amp;gt;/usr/sbin/syslogd&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;string&amp;gt;-bsd_out&amp;lt;/string&amp;gt;&lt;br /&gt;
 &amp;lt;string&amp;gt;1&amp;lt;/string&amp;gt;&lt;br /&gt;
This will tell the Daemon Launcher to call /usr/sbin/syslogd -bsd_out 1, and we have configured it to write all messages to [[:/var/log/syslog]]&lt;br /&gt;
# &amp;quot;reboot &amp;amp; enjoy your kernel and other messages&amp;quot; (bgm)&lt;br /&gt;
&lt;br /&gt;
== Note ==&lt;br /&gt;
The syslog will grow very big quite quickly if you use [[WinterBoard]]'s debug setting, but the folder [[:/private/var/log]] is on the data partition (music, etc).&amp;lt;br&amp;gt;&lt;br /&gt;
If you keep your device full of music, be careful you don't fill the partition. Unix systems tend to break when they &lt;br /&gt;
cant write to the syslog. Keep an eye on it or employ some log rotation.&lt;br /&gt;
&lt;br /&gt;
To disable, enter [[Terminal.app]] and run:&lt;br /&gt;
 rm /var/log/syslog;&lt;br /&gt;
 mknod /var/log/syslog c 3 2&lt;br /&gt;
This will delete (&amp;lt;tt&amp;gt;rm&amp;lt;/tt&amp;gt;) the file and create a [[:/dev/null]]. (&amp;lt;tt&amp;gt;mknod *** c 3 2&amp;lt;/tt&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
To reenable, enter [[Terminal.app]] and run:&lt;br /&gt;
 rm /var/log/syslog&lt;br /&gt;
 touch /var/log/syslog&lt;br /&gt;
&lt;br /&gt;
This will delete (&amp;lt;tt&amp;gt;rm&amp;lt;/tt&amp;gt;) the file and and make a blank regular file. (&amp;lt;tt&amp;gt;touch&amp;lt;/tt&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
== SBSettings Toggle ==&lt;br /&gt;
An SBSettings [http://apt.thebigboss.org/onepackage.php?bundleid=sbsettingssyslogd toggle] for enabling/disabling syslog is available at BigBoss' Cydia repository.  The &amp;lt;tt&amp;gt;syslog &amp;amp;gt; /var/log/syslog&amp;lt;/tt&amp;gt; package from [[User:Saurik|saurik]]'s repo is not a dependency and you must manually install it also.&lt;br /&gt;
&lt;br /&gt;
== Read syslog from command line ==&lt;br /&gt;
&lt;br /&gt;
 apt-get install socat&lt;br /&gt;
 socat - UNIX-CONNECT:/var/run/lockdown/syslog.sock&lt;br /&gt;
&lt;br /&gt;
This gives an interactive shell with the syslog daemon (no need to enable file output). The watch command prints new messages as they arrive.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Read i-Device syslog on Mac through lockdown ==&lt;br /&gt;
&lt;br /&gt;
A binary (and its source code) to view ASL messages from Mac using the MobileDevice.framework has been made available on http://newosxbook.com/index.php?page=downloads.&lt;br /&gt;
&lt;br /&gt;
== Reference ==&lt;br /&gt;
* [http://code.google.com/p/iphone-elite/wiki/IphoneSyslogd Google Code]&amp;lt;br /&amp;gt;&lt;br /&gt;
* [http://code.google.com/p/iphone-elite/source/list?path=/wiki/IphoneSyslogd.wiki&amp;amp;start=398 Full History]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31851</id>
		<title>Kernelcache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31851"/>
		<updated>2013-04-21T16:54:04Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Updated for GSM iPhone 4&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The kernelcache is basically the [[kernel]] itself as well as all of its extensions (AppleImage3NORAccess, IOAESAccelerator, IOPKEAccelerator, etc.) into one file, then packed/encrypted in an [[IMG3 File Format|IMG3]] (iOS 2.0 and above) or [[S5L File Formats#8900|8900]] (iOS 1.0 through 1.1.4) container.&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
&lt;br /&gt;
The joker tool, from http://newosxbook.com/ can be used to dump information from a decrypted kernelcache - including system call and Mach trap addresses (in the kernel) as well as a list of all the KEXTs contained therein and their load addresses. The output from a 6.1.3 kernelcache (iPhone 4 GSM) using this tool, showing 153 kexts, is as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
KextCache begins at : 0x80396000 (File Offset: 3493888)&lt;br /&gt;
Kext: Libkern Pseudoextension @0x80396000 (File: 0xffffffff) (com.apple.kpi.libkern)&lt;br /&gt;
Kext: Mach Kernel Pseudoextension @0x8039e000 (File: 0x35d000) (com.apple.kpi.mach)&lt;br /&gt;
Kext: Unsupported Pseudoextension @0x8039f000 (File: 0x35e000) (com.apple.kpi.unsupported)&lt;br /&gt;
Kext: I/O Kit Pseudoextension @0x803a1000 (File: 0x360000) (com.apple.kpi.iokit)&lt;br /&gt;
Kext: Private Pseudoextension @0x803b8000 (File: 0x377000) (com.apple.kpi.private)&lt;br /&gt;
Kext: BSD Kernel Pseudoextension @0x803bd000 (File: 0x37c000) (com.apple.kpi.bsd)&lt;br /&gt;
Kext: AppleARMPlatform @0x803c3000 (File: 0x382000) (com.apple.driver.AppleARMPlatform)&lt;br /&gt;
Kext: AppleSamsungSPI @0x803fd000 (File: 0x3bc000) (com.apple.driver.AppleSamsungSPI)&lt;br /&gt;
Kext: MAC Framework Pseudoextension @0x80401000 (File: 0x3c0000) (com.apple.kpi.dsep)&lt;br /&gt;
Kext: IOCryptoAcceleratorFamily @0x80402000 (File: 0x3c1000) (com.apple.iokit.IOCryptoAcceleratorFamily)&lt;br /&gt;
Kext: AppleMobileFileIntegrity @0x80410000 (File: 0x3cf000) (com.apple.driver.AppleMobileFileIntegrity)&lt;br /&gt;
Kext: IOHIDFamily @0x80427000 (File: 0x3e6000) (com.apple.iokit.IOHIDFamily)&lt;br /&gt;
Kext: AppleEmbeddedLightSensor @0x80447000 (File: 0x406000) (com.apple.driver.AppleEmbeddedLightSensor)&lt;br /&gt;
Kext: I/O Kit USB Family @0x80453000 (File: 0x412000) (com.apple.iokit.IOUSBFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB User Clients @0x80483000 (File: 0x442000) (com.apple.iokit.IOUSBUserClient)&lt;br /&gt;
Kext: I/O Kit Driver for USB EHCI Controllers @0x80486000 (File: 0x445000) (com.apple.driver.AppleUSBEHCI)&lt;br /&gt;
Kext: I/O Kit Driver for USB OHCI Controllers @0x8049c000 (File: 0x45b000) (com.apple.driver.AppleUSBOHCI)&lt;br /&gt;
Kext: AppleD1815PMU @0x804a8000 (File: 0x467000) (com.apple.driver.AppleD1815PMU)&lt;br /&gt;
Kext: AppleARMPL080DMAC @0x804bf000 (File: 0x47e000) (com.apple.driver.AppleARMPL080DMAC)&lt;br /&gt;
Kext: AppleMultitouchSPI @0x804c3000 (File: 0x482000) (com.apple.driver.AppleMultitouchSPI)&lt;br /&gt;
Kext: AppleKernelStorage @0x804d7000 (File: 0x496000) (com.apple.platform.AppleKernelStorage)&lt;br /&gt;
Kext: I/O Kit Storage Family @0x804da000 (File: 0x499000) (com.apple.iokit.IOStorageFamily)&lt;br /&gt;
Kext: AppleDiskImageDriver @0x804f2000 (File: 0x4b1000) (com.apple.driver.DiskImages)&lt;br /&gt;
Kext: AppleDiskImagesKernelBacked @0x804fe000 (File: 0x4bd000) (com.apple.driver.DiskImages.KernelBacked)&lt;br /&gt;
Kext: AppleDiskImagesRAMBackingStore @0x8050a000 (File: 0x4c9000) (com.apple.driver.DiskImages.RAMBackingStore)&lt;br /&gt;
Kext: AppleJPEGDriver @0x8050d000 (File: 0x4cc000) (com.apple.driver.AppleJPEGDriver)&lt;br /&gt;
Kext: EncryptedBlockStorage @0x80517000 (File: 0x4d6000) (com.apple.iokit.EncryptedBlockStorage)&lt;br /&gt;
Kext: IOFlashStorage @0x8051f000 (File: 0x4de000) (com.apple.iokit.IOFlashStorage)&lt;br /&gt;
Kext: AppleTVOut @0x80538000 (File: 0x4f7000) (com.apple.driver.AppleTVOut)&lt;br /&gt;
Kext: AppleEmbeddedUSB @0x8053c000 (File: 0x4fb000) (com.apple.driver.AppleEmbeddedUSB)&lt;br /&gt;
Kext: I/O Kit Driver for USB Composite Devices @0x80545000 (File: 0x504000) (com.apple.driver.AppleUSBComposite)&lt;br /&gt;
Kext: I/O Kit Driver for USB Devices @0x8054a000 (File: 0x509000) (com.apple.driver.AppleUSBMergeNub)&lt;br /&gt;
Kext: AppleEmbeddedUSBHost @0x8054f000 (File: 0x50e000) (com.apple.driver.AppleEmbeddedUSBHost)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB OHCI Controllers @0x80554000 (File: 0x513000) (com.apple.driver.AppleUSBOHCIARM)&lt;br /&gt;
Kext: AppleHIDKeyboardEmbedded @0x80559000 (File: 0x518000) (com.apple.iokit.IOStreamFamily)&lt;br /&gt;
Kext: IOAudio2Family @0x8055e000 (File: 0x51d000) (com.apple.iokit.IOAudio2Family)&lt;br /&gt;
Kext: IOAVFamily @0x80568000 (File: 0x527000) (com.apple.iokit.IOAVFamily)&lt;br /&gt;
Kext: IODisplayPortFamily @0x8059d000 (File: 0x55c000) (com.apple.iokit.IODisplayPortFamily)&lt;br /&gt;
Kext: AppleSamsungDPTX @0x805b3000 (File: 0x572000) (com.apple.driver.AppleSamsungDPTX)&lt;br /&gt;
Kext: IODARTFamily @0x805d0000 (File: 0x58f000) (com.apple.driver.IODARTFamily)&lt;br /&gt;
Kext: Apple M2 Scaler and Color Space Converter Driver @0x805db000 (File: 0x59a000) (com.apple.driver.AppleM2ScalerCSCDriver)&lt;br /&gt;
Kext: IOSlaveProcessor @0x805ef000 (File: 0x5ae000) (com.apple.driver.IOSlaveProcessor)&lt;br /&gt;
Kext: AppleARM7M @0x805f4000 (File: 0x5b3000) (com.apple.driver.AppleARM7M)&lt;br /&gt;
Kext: AppleEffaceableStorage @0x805f8000 (File: 0x5b7000) (com.apple.driver.AppleEffaceableStorage)&lt;br /&gt;
Kext: LightweightVolumeManager @0x80602000 (File: 0x5c1000) (com.apple.driver.LightweightVolumeManager)&lt;br /&gt;
Kext: IOKit Serial Port Family @0x8060c000 (File: 0x5cb000) (com.apple.iokit.IOSerialFamily)&lt;br /&gt;
Kext: AppleOnboardSerial @0x80616000 (File: 0x5d5000) (com.apple.driver.AppleOnboardSerial)&lt;br /&gt;
Kext: AppleARMIISAudio @0x80624000 (File: 0x5e3000) (com.apple.iokit.AppleARMIISAudio)&lt;br /&gt;
Kext: HighlandParkAudioDevice @0x8062b000 (File: 0x5ea000) (com.apple.driver.HighlandParkAudioDevice)&lt;br /&gt;
Kext: AppleBasebandAudio @0x8065e000 (File: 0x61d000) (com.apple.driver.AppleBasebandAudio)&lt;br /&gt;
Kext: IOUSBDeviceFamily @0x80661000 (File: 0x620000) (com.apple.iokit.IOUSBDeviceFamily)&lt;br /&gt;
Kext: I/O Kit Networking Family @0x8066e000 (File: 0x62d000) (com.apple.iokit.IONetworkingFamily)&lt;br /&gt;
Kext: AppleUSBEthernetDevice @0x80688000 (File: 0x647000) (com.apple.driver.AppleUSBEthernetDevice)&lt;br /&gt;
Kext: AppleTCA6408GPIOIC @0x8068d000 (File: 0x64c000) (com.apple.driver.AppleTCA6408GPIOIC)&lt;br /&gt;
Kext: AppleNANDConfigAccess @0x80691000 (File: 0x650000) (com.apple.driver.AppleNANDConfigAccess)&lt;br /&gt;
Kext: AppleCDMA @0x80694000 (File: 0x653000) (com.apple.driver.AppleCDMA)&lt;br /&gt;
Kext: AppleNANDFTL @0x8069b000 (File: 0x65a000) (com.apple.driver.AppleNANDFTL)&lt;br /&gt;
Kext: IOAccessoryManager @0x806a4000 (File: 0x663000) (com.apple.iokit.IOAccessoryManager)&lt;br /&gt;
Kext: IOUserEthernet @0x806b8000 (File: 0x677000) (com.apple.iokit.IOUserEthernet)&lt;br /&gt;
Kext: AppleUSBAudio @0x806c0000 (File: 0x67f000) (com.apple.driver.AppleUSBAudio)&lt;br /&gt;
Kext: AppleDiskImagesUDIFDiskImage @0x806f0000 (File: 0x6af000) (com.apple.driver.DiskImages.UDIFDiskImage)&lt;br /&gt;
Kext: AppleS5L8930XUSB @0x806f7000 (File: 0x6b6000) (com.apple.driver.AppleS5L8930XUSB)&lt;br /&gt;
Kext: AppleEmbeddedGyro @0x806fb000 (File: 0x6ba000) (com.apple.driver.AppleEmbeddedGyro)&lt;br /&gt;
Kext: IOMobileGraphicsFamily @0x80704000 (File: 0x6c3000) (com.apple.iokit.IOMobileGraphicsFamily)&lt;br /&gt;
Kext: IOSurface @0x80713000 (File: 0x6d2000) (com.apple.iokit.IOSurface)&lt;br /&gt;
Kext: AppleDisplayPipe @0x80721000 (File: 0x6e0000) (com.apple.driver.AppleDisplayPipe)&lt;br /&gt;
Kext: AppleCLCD @0x80731000 (File: 0x6f0000) (com.apple.driver.AppleCLCD)&lt;br /&gt;
Kext: AppleS5L8930XDART @0x8073f000 (File: 0x6fe000) (com.apple.driver.AppleS5L8930XDART)&lt;br /&gt;
Kext: AppleEmbeddedGPS @0x80744000 (File: 0x703000) (com.apple.driver.AppleEmbeddedGPS)&lt;br /&gt;
Kext: AppleS5L8920X @0x8074a000 (File: 0x709000) (com.apple.driver.AppleS5L8920X)&lt;br /&gt;
Kext: PPP @0x80757000 (File: 0x716000) (com.apple.nke.ppp)&lt;br /&gt;
Kext: L2TP @0x80761000 (File: 0x720000) (com.apple.nke.l2tp)&lt;br /&gt;
Kext: AppleEmbeddedAccelerometer @0x80767000 (File: 0x726000) (com.apple.driver.AppleEmbeddedAccelerometer)&lt;br /&gt;
Kext: AppleSynopsysOTGDevice @0x8076d000 (File: 0x72c000) (com.apple.driver.AppleSynopsysOTGDevice)&lt;br /&gt;
Kext: FairPlayIOKit @0x80777000 (File: 0x736000) (com.apple.driver.FairPlayIOKit)&lt;br /&gt;
Kext: LSKDIOKit @0x807d7000 (File: 0x796000) (com.apple.driver.LSKDIOKit)&lt;br /&gt;
Kext: AppleAMC_r2 @0x807f5000 (File: 0x7b4000) (com.apple.driver.AppleAMC_r2)&lt;br /&gt;
Kext: AppleProfileFamily @0x8086e000 (File: 0x82d000) (com.apple.iokit.AppleProfileFamily)&lt;br /&gt;
Kext: AppleProfileTimestampAction @0x80899000 (File: 0x858000) (com.apple.driver.AppleProfileTimestampAction)&lt;br /&gt;
Kext: AppleAC3Passthrough @0x8089d000 (File: 0x85c000) (com.apple.driver.AppleAC3Passthrough)&lt;br /&gt;
Kext: IOTextEncryptionFamily @0x808a3000 (File: 0x862000) (com.apple.IOTextEncryptionFamily)&lt;br /&gt;
Kext: corecrypto @0x808a8000 (File: 0x867000) (com.apple.kec.corecrypto)&lt;br /&gt;
Kext: AppleUSBMike @0x808d3000 (File: 0x892000) (com.apple.driver.AppleUSBMike)&lt;br /&gt;
Kext: AppleProfileRegisterStateAction @0x808d7000 (File: 0x896000) (com.apple.driver.AppleProfileRegisterStateAction)&lt;br /&gt;
Kext: AppleDiskImagesFileBackingStore @0x808db000 (File: 0x89a000) (com.apple.driver.DiskImages.FileBackingStore)&lt;br /&gt;
Kext: AppleEmbeddedProx @0x808df000 (File: 0x89e000) (com.apple.driver.AppleEmbeddedProx)&lt;br /&gt;
Kext: AppleProfileReadCounterAction @0x808e7000 (File: 0x8a6000) (com.apple.driver.AppleProfileReadCounterAction)&lt;br /&gt;
Kext: BasebandSPI @0x808eb000 (File: 0x8aa000) (com.apple.driver.BasebandSPI)&lt;br /&gt;
Kext: AppleSerialMultiplexer @0x80905000 (File: 0x8c4000) (com.apple.driver.AppleSerialMultiplexer)&lt;br /&gt;
Kext: AppleNANDFirmware @0x80924000 (File: 0x8e3000) (com.apple.driver.AppleNANDFirmware)&lt;br /&gt;
Kext: AppleImage3NORAccess @0x80928000 (File: 0x8e7000) (com.apple.driver.AppleImage3NORAccess)&lt;br /&gt;
Kext: AppleSamsungSWI @0x80930000 (File: 0x8ef000) (com.apple.driver.AppleSamsungSWI)&lt;br /&gt;
Kext: AppleARMPL192VIC @0x80934000 (File: 0x8f3000) (com.apple.driver.AppleARMPL192VIC)&lt;br /&gt;
Kext: AppleIOPFMI @0x80937000 (File: 0x8f6000) (com.apple.driver.AppleIOPFMI)&lt;br /&gt;
Kext: IO80211Family @0x80947000 (File: 0x906000) (com.apple.iokit.IO80211Family)&lt;br /&gt;
Kext: Broadcom 802.11 Driver @0x80996000 (File: 0x955000) (com.apple.driver.AppleBCMWLANCore)&lt;br /&gt;
Kext: IOFlashNVRAM @0x80a04000 (File: 0x9c3000) (com.apple.driver.IOFlashNVRAM)&lt;br /&gt;
Kext: AppleSamsungSerial @0x80a0a000 (File: 0x9c9000) (com.apple.driver.AppleSamsungSerial)&lt;br /&gt;
Kext: AppleBasebandUSB @0x80a0e000 (File: 0x9cd000) (com.apple.driver.AppleBasebandUSB)&lt;br /&gt;
Kext: AppleRGBOUT @0x80a11000 (File: 0x9d0000) (com.apple.driver.AppleRGBOUT)&lt;br /&gt;
Kext: AppleBSDKextStarter @0x80a19000 (File: 0x9d8000) (com.apple.driver.AppleBSDKextStarter)&lt;br /&gt;
Kext: AppleSamsungMIPIDSI @0x80a1c000 (File: 0x9db000) (com.apple.driver.AppleSamsungMIPIDSI)&lt;br /&gt;
Kext: Regular Expression Matching Engine @0x80a21000 (File: 0x9e0000) (com.apple.kext.AppleMatch)&lt;br /&gt;
Kext: AppleLTC4099Charger @0x80a25000 (File: 0x9e4000) (com.apple.driver.AppleLTC4099Charger)&lt;br /&gt;
Kext: IOMikeyBusFamily @0x80a29000 (File: 0x9e8000) (com.apple.iokit.IOMikeyBusFamily)&lt;br /&gt;
Kext: AppleEmbeddedAudio @0x80a3b000 (File: 0x9fa000) (com.apple.driver.AppleEmbeddedAudio)&lt;br /&gt;
Kext: AppleCS42L61Audio @0x80a5c000 (File: 0xa1b000) (com.apple.driver.AppleCS42L61Audio)&lt;br /&gt;
Kext: IOP_s5l8930x_firmware @0x80a61000 (File: 0xa20000) (com.apple.driver.IOP_s5l8930x_firmware)&lt;br /&gt;
Kext: AppleBasebandN90 @0x80a8e000 (File: 0xa4d000) (com.apple.driver.AppleBasebandN90)&lt;br /&gt;
Kext: AppleMultitouchSPIN1F55 @0x80a97000 (File: 0xa56000) (com.apple.driver.AppleBluetooth)&lt;br /&gt;
Kext: AppleIntegratedProxALSSensor @0x80a9a000 (File: 0xa59000) (com.apple.driver.AppleIntegratedProxALSSensor)&lt;br /&gt;
Kext: AppleCDCSerialDevice @0x80aa4000 (File: 0xa63000) (com.apple.driver.AppleCDCSerialDevice)&lt;br /&gt;
Kext: H3 H264 Video Encoder @0x80aac000 (File: 0xa6b000) (com.apple.driver.H2H264VideoEncoderDriver)&lt;br /&gt;
Kext: AppleProfileKEventAction @0x80acd000 (File: 0xa8c000) (com.apple.driver.AppleProfileKEventAction)&lt;br /&gt;
Kext: AppleS5L8930XUSBPhy @0x80ad1000 (File: 0xa90000) (com.apple.driver.AppleS5L8930XUSBPhy)&lt;br /&gt;
Kext: IOKit SDIO Family @0x80ad5000 (File: 0xa94000) (com.apple.iokit.IOSDIOFamily)&lt;br /&gt;
Kext: AppleSamsungPKE @0x80ae5000 (File: 0xaa4000) (com.apple.driver.AppleSamsungPKE)&lt;br /&gt;
Kext: AppleIOPSDIO @0x80ae9000 (File: 0xaa8000) (com.apple.driver.AppleIOPSDIO)&lt;br /&gt;
Kext: Seatbelt sandbox policy @0x80af1000 (File: 0xab0000) (com.apple.security.sandbox)&lt;br /&gt;
Kext: AppleHIDKeyboard @0x80afc000 (File: 0xabb000) (com.apple.driver.AppleHIDKeyboard)&lt;br /&gt;
Kext: AppleKeyStore @0x80aff000 (File: 0xabe000) (com.apple.driver.AppleKeyStore)&lt;br /&gt;
Kext: AppleHDQGasGaugeControl @0x80b0c000 (File: 0xacb000) (com.apple.driver.AppleHDQGasGaugeControl)&lt;br /&gt;
Kext: Broadcom WLAN SDIO Bus Driver @0x80b10000 (File: 0xacf000) (com.apple.driver.AppleBCMWLANBusInterfaceSDIO)&lt;br /&gt;
Kext: I/O Kit HID Event Driver @0x80b21000 (File: 0xae0000) (com.apple.driver.AppleH3CameraInterface)&lt;br /&gt;
Kext: AppleDiskImagesReadWriteDiskImage @0x80b40000 (File: 0xaff000) (com.apple.driver.DiskImages.ReadWriteDiskImage)&lt;br /&gt;
Kext: AppleFSCompressionTypeZlib @0x80b43000 (File: 0xb02000) (com.apple.AppleFSCompression.AppleFSCompressionTypeZlib)&lt;br /&gt;
Kext: AppleUSBEthernet @0x80b48000 (File: 0xb07000) (com.apple.driver.AppleUSBEthernet)&lt;br /&gt;
Kext: EmbeddedIOP @0x80b51000 (File: 0xb10000) (com.apple.driver.EmbeddedIOP)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x80b59000 (File: 0xb18000) (com.apple.driver.AppleS5L8930X)&lt;br /&gt;
Kext: AppleSamsungI2S @0x80b63000 (File: 0xb22000) (com.apple.driver.AppleSamsungI2S)&lt;br /&gt;
Kext: AppleM68Buttons @0x80b67000 (File: 0xb26000) (com.apple.driver.AppleM68Buttons)&lt;br /&gt;
Kext: AppleVXD375 @0x80b6b000 (File: 0xb2a000) (com.apple.driver.AppleVXD375)&lt;br /&gt;
Kext: AppleUSBDeviceMux @0x80b87000 (File: 0xb46000) (com.apple.driver.AppleUSBDeviceMux)&lt;br /&gt;
Kext: PPTP @0x80b8f000 (File: 0xb4e000) (com.apple.nke.pptp)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x80b94000 (File: 0xb53000) (com.apple.iokit.IOUSBHIDDriver)&lt;br /&gt;
Kext: AppleMultitouchSPIZ2F13 @0x80b9a000 (File: 0xb59000) (com.apple.iokit.IOAcceleratorFamily)&lt;br /&gt;
Kext: IMGSGX535 Graphics Kernel Extension @0x80bb7000 (File: 0xb76000) (com.apple.IMGSGX535)&lt;br /&gt;
Kext: ApplePinotLCD @0x80be4000 (File: 0xba3000) (com.apple.driver.ApplePinotLCD)&lt;br /&gt;
Kext: I/O Kit Driver for USB Hubs @0x80be7000 (File: 0xba6000) (com.apple.driver.AppleUSBHub)&lt;br /&gt;
Kext: AppleEmbeddedCompass @0x80bf0000 (File: 0xbaf000) (com.apple.driver.AppleEmbeddedCompass)&lt;br /&gt;
Kext: AppleProfileThreadInfoAction @0x80bf8000 (File: 0xbb7000) (com.apple.driver.AppleProfileThreadInfoAction)&lt;br /&gt;
Kext: AppleBasebandCDC @0x80bfc000 (File: 0xbbb000) (com.apple.driver.AppleBasebandCDC)&lt;br /&gt;
Kext: AppleUSBEthernetHost @0x80c02000 (File: 0xbc1000) (com.apple.driver.AppleUSBEthernetHost)&lt;br /&gt;
Kext: AppleDPRepeater @0x80c07000 (File: 0xbc6000) (com.apple.driver.AppleDPRepeater)&lt;br /&gt;
Kext: I/O Kit HID Event Driver Safe Boot @0x80c36000 (File: 0xbf5000) (com.apple.driver.AppleCD3282Mikey)&lt;br /&gt;
Kext: tlsnke @0x80c3a000 (File: 0xbf9000) (com.apple.nke.tls)&lt;br /&gt;
Kext: AppleUSBHIDKeyboard @0x80c40000 (File: 0xbff000) (com.apple.driver.AppleUSBHIDKeyboard)&lt;br /&gt;
Kext: AppleProfileCallstackAction @0x80c43000 (File: 0xc02000) (com.apple.driver.AppleProfileCallstackAction)&lt;br /&gt;
Kext: AppleDiagnosticDataAccessReadOnly @0x80c47000 (File: 0xc06000) (com.apple.driver.AppleDiagnosticDataAccessReadOnly)&lt;br /&gt;
Kext: AppleNANDLegacyFTL @0x80c4a000 (File: 0xc09000) (com.apple.driver.AppleNANDLegacyFTL)&lt;br /&gt;
Kext: AppleTetheredDevice @0x80c78000 (File: 0xc37000) (com.apple.driver.AppleTetheredDevice)&lt;br /&gt;
Kext: AppleUSBHSIC @0x80c7b000 (File: 0xc3a000) (com.apple.driver.AppleUSBHSIC)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB EHCI Controllers @0x80c83000 (File: 0xc42000) (com.apple.driver.AppleUSBEHCIARM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:Kernelcache&amp;diff=31580</id>
		<title>Talk:Kernelcache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:Kernelcache&amp;diff=31580"/>
		<updated>2013-04-09T00:09:16Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Would it be possible to boot an iPhone over usb (or transfer a kernelcache via irecovery to the phone so it boots). I was messing with kernelcaches in the firmware files and now my 2G is stuck in recovery mode. {{unsigned|M2m|15:40, September 7, 2010 (UTC)}}&lt;br /&gt;
&lt;br /&gt;
Yes its possible, check out [http://github.com/fallensn0w/openiBooty openiBooty] for example. --[[User:Fallensn0w|Fallensn0w]] 16:02, 7 September 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Changed kernelcache dump to 6.1.3 final, not beta 2. -- Morpheus&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31579</id>
		<title>Kernelcache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31579"/>
		<updated>2013-04-09T00:08:51Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The kernelcache is basically the [[kernel]] itself as well as all of its extensions (AppleImage3NORAccess, IOAESAccelerator, IOPKEAccelerator, etc.) into one file, then packed/encrypted in an [[IMG3 File Format|IMG3]] (iOS 2.0 and above) or [[S5L File Formats#8900|8900]] (iOS 1.0 through 1.1.4) container.&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
&lt;br /&gt;
The joker tool, from http://newosxbook.com/ can be used to dump information from a decrypted kernelcache - including system call and Mach trap addresses (in the kernel) as well as a list of all the KEXTs contained therein and their load addresses. The output from a 6.1.3 kernelcache (iPod 4,1) is as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Kext: MAC Framework Pseudoextension @0x8039600(com.apple.kpi.dsep)&lt;br /&gt;
Kext: Private Pseudoextension @0x8039700(com.apple.kpi.private)&lt;br /&gt;
Kext: I/O Kit Pseudoextension @0x8039c00(com.apple.kpi.iokit)&lt;br /&gt;
Kext: Libkern Pseudoextension @0x803b300(com.apple.kpi.libkern)&lt;br /&gt;
Kext: BSD Kernel Pseudoextension @0x803bb00(com.apple.kpi.bsd)&lt;br /&gt;
Kext: AppleFSCompressionTypeZlib @0x803c100(com.apple.AppleFSCompression.AppleFSCompressionTypeZlib)&lt;br /&gt;
Kext: Mach Kernel Pseudoextension @0x803c600(com.apple.kpi.mach)&lt;br /&gt;
Kext: Unsupported Pseudoextension @0x803c700(com.apple.kpi.unsupported)&lt;br /&gt;
Kext: I/O Kit USB Family @0x803c900(com.apple.iokit.IOUSBFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB User Clients @0x803f900(com.apple.iokit.IOUSBUserClient)&lt;br /&gt;
Kext: I/O Kit Storage Family @0x803fc00(com.apple.iokit.IOStorageFamily)&lt;br /&gt;
Kext: AppleDiskImageDriver @0x8041400(com.apple.driver.DiskImages)&lt;br /&gt;
Kext: AppleDiskImagesKernelBacked @0x8042000(com.apple.driver.DiskImages.KernelBacked)&lt;br /&gt;
Kext: FairPlayIOKit @0x8042c00(com.apple.driver.FairPlayIOKit)&lt;br /&gt;
Kext: LSKDIOKit @0x8048c00(com.apple.driver.LSKDIOKit)&lt;br /&gt;
Kext: AppleARMPlatform @0x804aa00(com.apple.driver.AppleARMPlatform)&lt;br /&gt;
Kext: AppleVXD375 @0x804e400(com.apple.driver.AppleVXD375)&lt;br /&gt;
Kext: IOSlaveProcessor @0x8050000(com.apple.driver.IOSlaveProcessor)&lt;br /&gt;
Kext: IOP_s5l8930x_firmware @0x8050500(com.apple.driver.IOP_s5l8930x_firmware)&lt;br /&gt;
Kext: AppleDiskImagesUDIFDiskImage @0x8053200(com.apple.driver.DiskImages.UDIFDiskImage)&lt;br /&gt;
Kext: IOStreamFamily @0x8053900(com.apple.iokit.IOStreamFamily)&lt;br /&gt;
Kext: IOAudio2Family @0x8053e00(com.apple.iokit.IOAudio2Family)&lt;br /&gt;
Kext: IOAVFamily @0x8054800(com.apple.iokit.IOAVFamily)&lt;br /&gt;
Kext: IODisplayPortFamily @0x8057d00(com.apple.iokit.IODisplayPortFamily)&lt;br /&gt;
Kext: AppleSamsungDPTX @0x8059300(com.apple.driver.AppleSamsungDPTX)&lt;br /&gt;
Kext: IOUSBDeviceFamily @0x805b000(com.apple.iokit.IOUSBDeviceFamily)&lt;br /&gt;
Kext: AppleUSBDeviceMux @0x805bd00(com.apple.driver.AppleUSBDeviceMux)&lt;br /&gt;
Kext: PPP @0x805c500(com.apple.nke.ppp)&lt;br /&gt;
Kext: L2TP @0x805cf00(com.apple.nke.l2tp)&lt;br /&gt;
Kext: I/O Kit Networking Family @0x805d500(com.apple.iokit.IONetworkingFamily)&lt;br /&gt;
Kext: IO80211Family @0x805ef00(com.apple.iokit.IO80211Family)&lt;br /&gt;
Kext: IOKit Serial Port Family @0x8063e00(com.apple.iokit.IOSerialFamily)&lt;br /&gt;
Kext: AppleOnboardSerial @0x8064800(com.apple.driver.AppleOnboardSerial)&lt;br /&gt;
Kext: Broadcom 802.11 Driver @0x8065600(com.apple.driver.AppleBCMWLANCore)&lt;br /&gt;
Kext: AppleSamsungSPI @0x806c400(com.apple.driver.AppleSamsungSPI)&lt;br /&gt;
Kext: I/O Kit Driver for USB Composite Devices @0x806c800(com.apple.driver.AppleUSBComposite)&lt;br /&gt;
Kext: I/O Kit Driver for USB Devices @0x806cd00(com.apple.driver.AppleUSBMergeNub)&lt;br /&gt;
Kext: AppleEmbeddedUSBHost @0x806d200(com.apple.driver.AppleEmbeddedUSBHost)&lt;br /&gt;
Kext: AppleUSBEthernetHost @0x806d700(com.apple.driver.AppleUSBEthernetHost)&lt;br /&gt;
Kext: AppleARM7M @0x806dc00(com.apple.driver.AppleARM7M)&lt;br /&gt;
Kext: corecrypto @0x806e000(com.apple.kec.corecrypto)&lt;br /&gt;
Kext: IOTextEncryptionFamily @0x8070b00(com.apple.IOTextEncryptionFamily)&lt;br /&gt;
Kext: IOCryptoAcceleratorFamily @0x8071000(com.apple.iokit.IOCryptoAcceleratorFamily)&lt;br /&gt;
Kext: AppleMobileFileIntegrity @0x8071e00(com.apple.driver.AppleMobileFileIntegrity)&lt;br /&gt;
Kext: Regular Expression Matching Engine @0x8073500(com.apple.kext.AppleMatch)&lt;br /&gt;
Kext: Seatbelt sandbox policy @0x8073900(com.apple.security.sandbox)&lt;br /&gt;
Kext: AppleProfileFamily @0x8074400(com.apple.iokit.AppleProfileFamily)&lt;br /&gt;
Kext: AppleProfileTimestampAction @0x8076f00(com.apple.driver.AppleProfileTimestampAction)&lt;br /&gt;
Kext: AppleNANDConfigAccess @0x8077300(com.apple.driver.AppleNANDConfigAccess)&lt;br /&gt;
Kext: AppleDiagnosticDataAccessReadOnly @0x8077600(com.apple.driver.AppleDiagnosticDataAccessReadOnly)&lt;br /&gt;
Kext: IOMobileGraphicsFamily @0x8077900(com.apple.iokit.IOMobileGraphicsFamily)&lt;br /&gt;
Kext: IODARTFamily @0x8078800(com.apple.driver.IODARTFamily)&lt;br /&gt;
Kext: Apple M2 Scaler and Color Space Converter Driver @0x8079300(com.apple.driver.AppleM2ScalerCSCDriver)&lt;br /&gt;
Kext: IOAcceleratorFamily @0x807a700(com.apple.iokit.IOAcceleratorFamily)&lt;br /&gt;
Kext: EncryptedBlockStorage @0x807c400(com.apple.iokit.EncryptedBlockStorage)&lt;br /&gt;
Kext: IOFlashStorage @0x807cc00(com.apple.iokit.IOFlashStorage)&lt;br /&gt;
Kext: AppleNANDFTL @0x807e500(com.apple.driver.AppleNANDFTL)&lt;br /&gt;
Kext: ApplePPNFTL @0x807ee00(com.apple.driver.ApplePPNFTL)&lt;br /&gt;
Kext: AppleDiskImagesRAMBackingStore @0x8081b00(com.apple.driver.DiskImages.RAMBackingStore)&lt;br /&gt;
Kext: IOHIDFamily @0x8081e00(com.apple.iokit.IOHIDFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x8083e00(com.apple.iokit.IOUSBHIDDriver)&lt;br /&gt;
Kext: AppleS5L8920X @0x8084400(com.apple.driver.AppleS5L8920X)&lt;br /&gt;
Kext: AppleARMPL192VIC @0x8085100(com.apple.driver.AppleARMPL192VIC)&lt;br /&gt;
Kext: AppleBluetooth @0x8085400(com.apple.driver.AppleBluetooth)&lt;br /&gt;
Kext: I/O Kit Driver for USB EHCI Controllers @0x8085700(com.apple.driver.AppleUSBEHCI)&lt;br /&gt;
Kext: I/O Kit Driver for USB OHCI Controllers @0x8086d00(com.apple.driver.AppleUSBOHCI)&lt;br /&gt;
Kext: AppleEmbeddedUSB @0x8087900(com.apple.driver.AppleEmbeddedUSB)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB OHCI Controllers @0x8088200(com.apple.driver.AppleUSBOHCIARM)&lt;br /&gt;
Kext: AppleNANDFirmware @0x8088700(com.apple.driver.AppleNANDFirmware)&lt;br /&gt;
Kext: AppleEmbeddedCompass @0x8088b00(com.apple.driver.AppleEmbeddedCompass)&lt;br /&gt;
Kext: AppleD1815PMU @0x8089300(com.apple.driver.AppleD1815PMU)&lt;br /&gt;
Kext: AppleProfileThreadInfoAction @0x808aa00(com.apple.driver.AppleProfileThreadInfoAction)&lt;br /&gt;
Kext: AppleEmbeddedGyro @0x808ae00(com.apple.driver.AppleEmbeddedGyro)&lt;br /&gt;
Kext: AppleSynopsysOTGDevice @0x808b700(com.apple.driver.AppleSynopsysOTGDevice)&lt;br /&gt;
Kext: AppleEmbeddedLightSensor @0x808c100(com.apple.driver.AppleEmbeddedLightSensor)&lt;br /&gt;
Kext: AppleSamsungSerial @0x808cd00(com.apple.driver.AppleSamsungSerial)&lt;br /&gt;
Kext: AppleUSBMike @0x808d100(com.apple.driver.AppleUSBMike)&lt;br /&gt;
Kext: AppleNANDLegacyFTL @0x808d500(com.apple.driver.AppleNANDLegacyFTL)&lt;br /&gt;
Kext: AppleSamsungMIPIDSI @0x8090300(com.apple.driver.AppleSamsungMIPIDSI)&lt;br /&gt;
Kext: I/O Kit HID Event Driver Safe Boot @0x8090800(com.apple.driver.AppleBSDKextStarter)&lt;br /&gt;
Kext: AppleHIDKeyboard @0x8090b00(com.apple.driver.AppleHIDKeyboard)&lt;br /&gt;
Kext: IOKit SDIO Family @0x8090e00(com.apple.iokit.IOSDIOFamily)&lt;br /&gt;
Kext: AppleIOPSDIO @0x8091e00(com.apple.driver.AppleIOPSDIO)&lt;br /&gt;
Kext: AppleLTC4099Charger @0x8092600(com.apple.driver.AppleLTC4099Charger)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x8092a00(com.apple.driver.AppleCDMA)&lt;br /&gt;
Kext: AppleProfileReadCounterAction @0x8093100(com.apple.driver.AppleProfileReadCounterAction)&lt;br /&gt;
Kext: AppleSamsungSWI @0x8093500(com.apple.driver.AppleSamsungSWI)&lt;br /&gt;
Kext: IOUserEthernet @0x8093900(com.apple.iokit.IOUserEthernet)&lt;br /&gt;
Kext: AppleUSBHSIC @0x8094100(com.apple.driver.AppleUSBHSIC)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB EHCI Controllers @0x8094900(com.apple.driver.AppleUSBEHCIARM)&lt;br /&gt;
Kext: AppleAMC_r2 @0x8095000(com.apple.driver.AppleAMC_r2)&lt;br /&gt;
Kext: EmbeddedIOP @0x809c900(com.apple.driver.EmbeddedIOP)&lt;br /&gt;
Kext: ApplePinotLCD @0x809d100(com.apple.driver.ApplePinotLCD)&lt;br /&gt;
Kext: IOSurface @0x809d400(com.apple.iokit.IOSurface)&lt;br /&gt;
Kext: AppleDisplayPipe @0x809e200(com.apple.driver.AppleDisplayPipe)&lt;br /&gt;
Kext: AppleCLCD @0x809f200(com.apple.driver.AppleCLCD)&lt;br /&gt;
Kext: AppleS5L8930XDART @0x80a0000(com.apple.driver.AppleS5L8930XDART)&lt;br /&gt;
Kext: I/O Kit Driver for USB Hubs @0x80a0500(com.apple.driver.AppleUSBHub)&lt;br /&gt;
Kext: AppleKernelStorage @0x80a0e00(com.apple.platform.AppleKernelStorage)&lt;br /&gt;
Kext: AppleM68Buttons @0x80a1100(com.apple.driver.AppleM68Buttons)&lt;br /&gt;
Kext: AppleUSBEthernetDevice @0x80a1500(com.apple.driver.AppleUSBEthernetDevice)&lt;br /&gt;
Kext: AppleUSBHIDKeyboard @0x80a1a00(com.apple.driver.AppleUSBHIDKeyboard)&lt;br /&gt;
Kext: BasebandSPI @0x80a1d00(com.apple.driver.BasebandSPI)&lt;br /&gt;
Kext: AppleEffaceableStorage @0x80a3700(com.apple.driver.AppleEffaceableStorage)&lt;br /&gt;
Kext: LightweightVolumeManager @0x80a4100(com.apple.driver.LightweightVolumeManager)&lt;br /&gt;
Kext: IMGSGX535 Graphics Kernel Extension @0x80a4b00(com.apple.IMGSGX535)&lt;br /&gt;
Kext: I/O Kit HID Event Driver @0x80a7800(com.apple.driver.AppleIOPFMI)&lt;br /&gt;
Kext: AppleTetheredDevice @0x80a8800(com.apple.driver.AppleTetheredDevice)&lt;br /&gt;
Kext: AppleProfileKEventAction @0x80a8b00(com.apple.driver.AppleProfileKEventAction)&lt;br /&gt;
Kext: AppleRGBOUT @0x80a8f00(com.apple.driver.AppleRGBOUT)&lt;br /&gt;
Kext: IOFlashNVRAM @0x80a9700(com.apple.driver.IOFlashNVRAM)&lt;br /&gt;
Kext: AppleS5L8930XUSB @0x80a9d00(com.apple.driver.AppleS5L8930XUSB)&lt;br /&gt;
Kext: AppleDPRepeater @0x80aa100(com.apple.driver.AppleDPRepeater)&lt;br /&gt;
Kext: AppleARMPL080DMAC @0x80ad000(com.apple.driver.AppleARMPL080DMAC)&lt;br /&gt;
Kext: AppleAC3Passthrough @0x80ad400(com.apple.driver.AppleAC3Passthrough)&lt;br /&gt;
Kext: AppleIntegratedProxALSSensor @0x80ada00(com.apple.driver.AppleIntegratedProxALSSensor)&lt;br /&gt;
Kext: AppleDiskImagesFileBackingStore @0x80ae400(com.apple.driver.DiskImages.FileBackingStore)&lt;br /&gt;
Kext: AppleUSBAudio @0x80ae800(com.apple.driver.AppleUSBAudio)&lt;br /&gt;
Kext: AppleTVOut @0x80b1800(com.apple.driver.AppleTVOut)&lt;br /&gt;
Kext: tlsnke @0x80b1c00(com.apple.nke.tls)&lt;br /&gt;
Kext: AppleS5L8930XUSBPhy @0x80b2200(com.apple.driver.AppleS5L8930XUSBPhy)&lt;br /&gt;
Kext: AppleProfileRegisterStateAction @0x80b2600(com.apple.driver.AppleProfileRegisterStateAction)&lt;br /&gt;
Kext: IOAccessoryManager @0x80b2a00(com.apple.iokit.IOAccessoryManager)&lt;br /&gt;
Kext: AppleS5L8930X @0x80b3e00(com.apple.driver.AppleS5L8930X)&lt;br /&gt;
Kext: AppleBSDKextStarterVPN @0x80b4800(com.apple.driver.DiskImages.ReadWriteDiskImage)&lt;br /&gt;
Kext: AppleARMIISAudio @0x80b4b00(com.apple.iokit.AppleARMIISAudio)&lt;br /&gt;
Kext: AppleEmbeddedProx @0x80b5200(com.apple.driver.AppleEmbeddedProx)&lt;br /&gt;
Kext: AppleMultitouchSPI @0x80b5a00(com.apple.driver.AppleMultitouchSPI)&lt;br /&gt;
Kext: H3 H264 Video Encoder @0x80b6e00(com.apple.driver.H2H264VideoEncoderDriver)&lt;br /&gt;
Kext: Broadcom WLAN SDIO Bus Driver @0x80b8f00(com.apple.driver.AppleBCMWLANBusInterfaceSDIO)&lt;br /&gt;
Kext: AppleUSBEthernet @0x80ba000(com.apple.driver.AppleUSBEthernet)&lt;br /&gt;
Kext: PPTP @0x80ba900(com.apple.nke.pptp)&lt;br /&gt;
Kext: AppleJPEGDriver @0x80bae00(com.apple.driver.AppleJPEGDriver)&lt;br /&gt;
Kext: AppleSamsungI2S @0x80bb800(com.apple.driver.AppleSamsungI2S)&lt;br /&gt;
Kext: AppleEmbeddedAccelerometer @0x80bbc00(com.apple.driver.AppleEmbeddedAccelerometer)&lt;br /&gt;
Kext: IOMikeyBusFamily @0x80bc200(com.apple.iokit.IOMikeyBusFamily)&lt;br /&gt;
Kext: AppleEmbeddedAudio @0x80bd400(com.apple.driver.AppleEmbeddedAudio)&lt;br /&gt;
Kext: AppleLM48557Amp @0x80bf500(com.apple.driver.AppleLM48557Amp)&lt;br /&gt;
Kext: AppleProfileCallstackAction @0x80bf800(com.apple.driver.AppleProfileCallstackAction)&lt;br /&gt;
Kext: AppleMultitouchSPIN1F55 @0x80bfc00(com.apple.driver.AppleCD3282Mikey)&lt;br /&gt;
Kext: AppleMultitouchSPIZ2F13 @0x80c0000(com.apple.driver.AppleImage3NORAccess)&lt;br /&gt;
Kext: AppleH3CameraInterface @0x80c0800(com.apple.driver.AppleH3CameraInterface)&lt;br /&gt;
Kext: AppleSamsungPKE @0x80c2700(com.apple.driver.AppleSamsungPKE)&lt;br /&gt;
Kext: AppleKeyStore @0x80c2b00(com.apple.driver.AppleKeyStore)&lt;br /&gt;
Kext: AppleHIDKeyboardEmbedded @0x80c3800(com.apple.driver.AppleCS42L59Audio)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31572</id>
		<title>Kernelcache</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernelcache&amp;diff=31572"/>
		<updated>2013-04-08T20:45:46Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: dump of kernel cache&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The kernelcache is basically the [[kernel]] itself as well as all of its extensions (AppleImage3NORAccess, IOAESAccelerator, IOPKEAccelerator, etc.) into one file, then packed/encrypted in an [[IMG3 File Format|IMG3]] (iOS 2.0 and above) or [[S5L File Formats#8900|8900]] (iOS 1.0 through 1.1.4) container.&lt;br /&gt;
&lt;br /&gt;
[[Category:Filesystem]]&lt;br /&gt;
&lt;br /&gt;
The joker tool, from http://newosxbook.com/ can be used to dump information from a decrypted kernelcache - including system call and Mach trap addresses (in the kernel) as well as a list of all the KEXTs contained therein and their load addresses. The output from a 6.1.3b2 kernelcache (iPod 4,1) is as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Kext: MAC Framework Pseudoextension @0x8039600(com.apple.kpi.dsep)&lt;br /&gt;
Kext: Private Pseudoextension @0x8039700(com.apple.kpi.private)&lt;br /&gt;
Kext: I/O Kit Pseudoextension @0x8039c00(com.apple.kpi.iokit)&lt;br /&gt;
Kext: Libkern Pseudoextension @0x803b300(com.apple.kpi.libkern)&lt;br /&gt;
Kext: BSD Kernel Pseudoextension @0x803bb00(com.apple.kpi.bsd)&lt;br /&gt;
Kext: AppleFSCompressionTypeZlib @0x803c100(com.apple.AppleFSCompression.AppleFSCompressionTypeZlib)&lt;br /&gt;
Kext: Mach Kernel Pseudoextension @0x803c600(com.apple.kpi.mach)&lt;br /&gt;
Kext: Unsupported Pseudoextension @0x803c700(com.apple.kpi.unsupported)&lt;br /&gt;
Kext: I/O Kit USB Family @0x803c900(com.apple.iokit.IOUSBFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB User Clients @0x803f900(com.apple.iokit.IOUSBUserClient)&lt;br /&gt;
Kext: I/O Kit Storage Family @0x803fc00(com.apple.iokit.IOStorageFamily)&lt;br /&gt;
Kext: AppleDiskImageDriver @0x8041400(com.apple.driver.DiskImages)&lt;br /&gt;
Kext: AppleDiskImagesKernelBacked @0x8042000(com.apple.driver.DiskImages.KernelBacked)&lt;br /&gt;
Kext: FairPlayIOKit @0x8042c00(com.apple.driver.FairPlayIOKit)&lt;br /&gt;
Kext: LSKDIOKit @0x8048c00(com.apple.driver.LSKDIOKit)&lt;br /&gt;
Kext: AppleARMPlatform @0x804aa00(com.apple.driver.AppleARMPlatform)&lt;br /&gt;
Kext: AppleVXD375 @0x804e400(com.apple.driver.AppleVXD375)&lt;br /&gt;
Kext: IOSlaveProcessor @0x8050000(com.apple.driver.IOSlaveProcessor)&lt;br /&gt;
Kext: IOP_s5l8930x_firmware @0x8050500(com.apple.driver.IOP_s5l8930x_firmware)&lt;br /&gt;
Kext: AppleDiskImagesUDIFDiskImage @0x8053200(com.apple.driver.DiskImages.UDIFDiskImage)&lt;br /&gt;
Kext: IOStreamFamily @0x8053900(com.apple.iokit.IOStreamFamily)&lt;br /&gt;
Kext: IOAudio2Family @0x8053e00(com.apple.iokit.IOAudio2Family)&lt;br /&gt;
Kext: IOAVFamily @0x8054800(com.apple.iokit.IOAVFamily)&lt;br /&gt;
Kext: IODisplayPortFamily @0x8057d00(com.apple.iokit.IODisplayPortFamily)&lt;br /&gt;
Kext: AppleSamsungDPTX @0x8059300(com.apple.driver.AppleSamsungDPTX)&lt;br /&gt;
Kext: IOUSBDeviceFamily @0x805b000(com.apple.iokit.IOUSBDeviceFamily)&lt;br /&gt;
Kext: AppleUSBDeviceMux @0x805bd00(com.apple.driver.AppleUSBDeviceMux)&lt;br /&gt;
Kext: PPP @0x805c500(com.apple.nke.ppp)&lt;br /&gt;
Kext: L2TP @0x805cf00(com.apple.nke.l2tp)&lt;br /&gt;
Kext: I/O Kit Networking Family @0x805d500(com.apple.iokit.IONetworkingFamily)&lt;br /&gt;
Kext: IO80211Family @0x805ef00(com.apple.iokit.IO80211Family)&lt;br /&gt;
Kext: IOKit Serial Port Family @0x8063e00(com.apple.iokit.IOSerialFamily)&lt;br /&gt;
Kext: AppleOnboardSerial @0x8064800(com.apple.driver.AppleOnboardSerial)&lt;br /&gt;
Kext: Broadcom 802.11 Driver @0x8065600(com.apple.driver.AppleBCMWLANCore)&lt;br /&gt;
Kext: AppleSamsungSPI @0x806c400(com.apple.driver.AppleSamsungSPI)&lt;br /&gt;
Kext: I/O Kit Driver for USB Composite Devices @0x806c800(com.apple.driver.AppleUSBComposite)&lt;br /&gt;
Kext: I/O Kit Driver for USB Devices @0x806cd00(com.apple.driver.AppleUSBMergeNub)&lt;br /&gt;
Kext: AppleEmbeddedUSBHost @0x806d200(com.apple.driver.AppleEmbeddedUSBHost)&lt;br /&gt;
Kext: AppleUSBEthernetHost @0x806d700(com.apple.driver.AppleUSBEthernetHost)&lt;br /&gt;
Kext: AppleARM7M @0x806dc00(com.apple.driver.AppleARM7M)&lt;br /&gt;
Kext: corecrypto @0x806e000(com.apple.kec.corecrypto)&lt;br /&gt;
Kext: IOTextEncryptionFamily @0x8070b00(com.apple.IOTextEncryptionFamily)&lt;br /&gt;
Kext: IOCryptoAcceleratorFamily @0x8071000(com.apple.iokit.IOCryptoAcceleratorFamily)&lt;br /&gt;
Kext: AppleMobileFileIntegrity @0x8071e00(com.apple.driver.AppleMobileFileIntegrity)&lt;br /&gt;
Kext: Regular Expression Matching Engine @0x8073500(com.apple.kext.AppleMatch)&lt;br /&gt;
Kext: Seatbelt sandbox policy @0x8073900(com.apple.security.sandbox)&lt;br /&gt;
Kext: AppleProfileFamily @0x8074400(com.apple.iokit.AppleProfileFamily)&lt;br /&gt;
Kext: AppleProfileTimestampAction @0x8076f00(com.apple.driver.AppleProfileTimestampAction)&lt;br /&gt;
Kext: AppleNANDConfigAccess @0x8077300(com.apple.driver.AppleNANDConfigAccess)&lt;br /&gt;
Kext: AppleDiagnosticDataAccessReadOnly @0x8077600(com.apple.driver.AppleDiagnosticDataAccessReadOnly)&lt;br /&gt;
Kext: IOMobileGraphicsFamily @0x8077900(com.apple.iokit.IOMobileGraphicsFamily)&lt;br /&gt;
Kext: IODARTFamily @0x8078800(com.apple.driver.IODARTFamily)&lt;br /&gt;
Kext: Apple M2 Scaler and Color Space Converter Driver @0x8079300(com.apple.driver.AppleM2ScalerCSCDriver)&lt;br /&gt;
Kext: IOAcceleratorFamily @0x807a700(com.apple.iokit.IOAcceleratorFamily)&lt;br /&gt;
Kext: EncryptedBlockStorage @0x807c400(com.apple.iokit.EncryptedBlockStorage)&lt;br /&gt;
Kext: IOFlashStorage @0x807cc00(com.apple.iokit.IOFlashStorage)&lt;br /&gt;
Kext: AppleNANDFTL @0x807e500(com.apple.driver.AppleNANDFTL)&lt;br /&gt;
Kext: ApplePPNFTL @0x807ee00(com.apple.driver.ApplePPNFTL)&lt;br /&gt;
Kext: AppleDiskImagesRAMBackingStore @0x8081b00(com.apple.driver.DiskImages.RAMBackingStore)&lt;br /&gt;
Kext: IOHIDFamily @0x8081e00(com.apple.iokit.IOHIDFamily)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x8083e00(com.apple.iokit.IOUSBHIDDriver)&lt;br /&gt;
Kext: AppleS5L8920X @0x8084400(com.apple.driver.AppleS5L8920X)&lt;br /&gt;
Kext: AppleARMPL192VIC @0x8085100(com.apple.driver.AppleARMPL192VIC)&lt;br /&gt;
Kext: AppleBluetooth @0x8085400(com.apple.driver.AppleBluetooth)&lt;br /&gt;
Kext: I/O Kit Driver for USB EHCI Controllers @0x8085700(com.apple.driver.AppleUSBEHCI)&lt;br /&gt;
Kext: I/O Kit Driver for USB OHCI Controllers @0x8086d00(com.apple.driver.AppleUSBOHCI)&lt;br /&gt;
Kext: AppleEmbeddedUSB @0x8087900(com.apple.driver.AppleEmbeddedUSB)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB OHCI Controllers @0x8088200(com.apple.driver.AppleUSBOHCIARM)&lt;br /&gt;
Kext: AppleNANDFirmware @0x8088700(com.apple.driver.AppleNANDFirmware)&lt;br /&gt;
Kext: AppleEmbeddedCompass @0x8088b00(com.apple.driver.AppleEmbeddedCompass)&lt;br /&gt;
Kext: AppleD1815PMU @0x8089300(com.apple.driver.AppleD1815PMU)&lt;br /&gt;
Kext: AppleProfileThreadInfoAction @0x808aa00(com.apple.driver.AppleProfileThreadInfoAction)&lt;br /&gt;
Kext: AppleEmbeddedGyro @0x808ae00(com.apple.driver.AppleEmbeddedGyro)&lt;br /&gt;
Kext: AppleSynopsysOTGDevice @0x808b700(com.apple.driver.AppleSynopsysOTGDevice)&lt;br /&gt;
Kext: AppleEmbeddedLightSensor @0x808c100(com.apple.driver.AppleEmbeddedLightSensor)&lt;br /&gt;
Kext: AppleSamsungSerial @0x808cd00(com.apple.driver.AppleSamsungSerial)&lt;br /&gt;
Kext: AppleUSBMike @0x808d100(com.apple.driver.AppleUSBMike)&lt;br /&gt;
Kext: AppleNANDLegacyFTL @0x808d500(com.apple.driver.AppleNANDLegacyFTL)&lt;br /&gt;
Kext: AppleSamsungMIPIDSI @0x8090300(com.apple.driver.AppleSamsungMIPIDSI)&lt;br /&gt;
Kext: I/O Kit HID Event Driver Safe Boot @0x8090800(com.apple.driver.AppleBSDKextStarter)&lt;br /&gt;
Kext: AppleHIDKeyboard @0x8090b00(com.apple.driver.AppleHIDKeyboard)&lt;br /&gt;
Kext: IOKit SDIO Family @0x8090e00(com.apple.iokit.IOSDIOFamily)&lt;br /&gt;
Kext: AppleIOPSDIO @0x8091e00(com.apple.driver.AppleIOPSDIO)&lt;br /&gt;
Kext: AppleLTC4099Charger @0x8092600(com.apple.driver.AppleLTC4099Charger)&lt;br /&gt;
Kext: I/O Kit Driver for USB HID Devices @0x8092a00(com.apple.driver.AppleCDMA)&lt;br /&gt;
Kext: AppleProfileReadCounterAction @0x8093100(com.apple.driver.AppleProfileReadCounterAction)&lt;br /&gt;
Kext: AppleSamsungSWI @0x8093500(com.apple.driver.AppleSamsungSWI)&lt;br /&gt;
Kext: IOUserEthernet @0x8093900(com.apple.iokit.IOUserEthernet)&lt;br /&gt;
Kext: AppleUSBHSIC @0x8094100(com.apple.driver.AppleUSBHSIC)&lt;br /&gt;
Kext: Embedded I/O Kit Driver for USB EHCI Controllers @0x8094900(com.apple.driver.AppleUSBEHCIARM)&lt;br /&gt;
Kext: AppleAMC_r2 @0x8095000(com.apple.driver.AppleAMC_r2)&lt;br /&gt;
Kext: EmbeddedIOP @0x809c900(com.apple.driver.EmbeddedIOP)&lt;br /&gt;
Kext: ApplePinotLCD @0x809d100(com.apple.driver.ApplePinotLCD)&lt;br /&gt;
Kext: IOSurface @0x809d400(com.apple.iokit.IOSurface)&lt;br /&gt;
Kext: AppleDisplayPipe @0x809e200(com.apple.driver.AppleDisplayPipe)&lt;br /&gt;
Kext: AppleCLCD @0x809f200(com.apple.driver.AppleCLCD)&lt;br /&gt;
Kext: AppleS5L8930XDART @0x80a0000(com.apple.driver.AppleS5L8930XDART)&lt;br /&gt;
Kext: I/O Kit Driver for USB Hubs @0x80a0500(com.apple.driver.AppleUSBHub)&lt;br /&gt;
Kext: AppleKernelStorage @0x80a0e00(com.apple.platform.AppleKernelStorage)&lt;br /&gt;
Kext: AppleM68Buttons @0x80a1100(com.apple.driver.AppleM68Buttons)&lt;br /&gt;
Kext: AppleUSBEthernetDevice @0x80a1500(com.apple.driver.AppleUSBEthernetDevice)&lt;br /&gt;
Kext: AppleUSBHIDKeyboard @0x80a1a00(com.apple.driver.AppleUSBHIDKeyboard)&lt;br /&gt;
Kext: BasebandSPI @0x80a1d00(com.apple.driver.BasebandSPI)&lt;br /&gt;
Kext: AppleEffaceableStorage @0x80a3700(com.apple.driver.AppleEffaceableStorage)&lt;br /&gt;
Kext: LightweightVolumeManager @0x80a4100(com.apple.driver.LightweightVolumeManager)&lt;br /&gt;
Kext: IMGSGX535 Graphics Kernel Extension @0x80a4b00(com.apple.IMGSGX535)&lt;br /&gt;
Kext: I/O Kit HID Event Driver @0x80a7800(com.apple.driver.AppleIOPFMI)&lt;br /&gt;
Kext: AppleTetheredDevice @0x80a8800(com.apple.driver.AppleTetheredDevice)&lt;br /&gt;
Kext: AppleProfileKEventAction @0x80a8b00(com.apple.driver.AppleProfileKEventAction)&lt;br /&gt;
Kext: AppleRGBOUT @0x80a8f00(com.apple.driver.AppleRGBOUT)&lt;br /&gt;
Kext: IOFlashNVRAM @0x80a9700(com.apple.driver.IOFlashNVRAM)&lt;br /&gt;
Kext: AppleS5L8930XUSB @0x80a9d00(com.apple.driver.AppleS5L8930XUSB)&lt;br /&gt;
Kext: AppleDPRepeater @0x80aa100(com.apple.driver.AppleDPRepeater)&lt;br /&gt;
Kext: AppleARMPL080DMAC @0x80ad000(com.apple.driver.AppleARMPL080DMAC)&lt;br /&gt;
Kext: AppleAC3Passthrough @0x80ad400(com.apple.driver.AppleAC3Passthrough)&lt;br /&gt;
Kext: AppleIntegratedProxALSSensor @0x80ada00(com.apple.driver.AppleIntegratedProxALSSensor)&lt;br /&gt;
Kext: AppleDiskImagesFileBackingStore @0x80ae400(com.apple.driver.DiskImages.FileBackingStore)&lt;br /&gt;
Kext: AppleUSBAudio @0x80ae800(com.apple.driver.AppleUSBAudio)&lt;br /&gt;
Kext: AppleTVOut @0x80b1800(com.apple.driver.AppleTVOut)&lt;br /&gt;
Kext: tlsnke @0x80b1c00(com.apple.nke.tls)&lt;br /&gt;
Kext: AppleS5L8930XUSBPhy @0x80b2200(com.apple.driver.AppleS5L8930XUSBPhy)&lt;br /&gt;
Kext: AppleProfileRegisterStateAction @0x80b2600(com.apple.driver.AppleProfileRegisterStateAction)&lt;br /&gt;
Kext: IOAccessoryManager @0x80b2a00(com.apple.iokit.IOAccessoryManager)&lt;br /&gt;
Kext: AppleS5L8930X @0x80b3e00(com.apple.driver.AppleS5L8930X)&lt;br /&gt;
Kext: AppleBSDKextStarterVPN @0x80b4800(com.apple.driver.DiskImages.ReadWriteDiskImage)&lt;br /&gt;
Kext: AppleARMIISAudio @0x80b4b00(com.apple.iokit.AppleARMIISAudio)&lt;br /&gt;
Kext: AppleEmbeddedProx @0x80b5200(com.apple.driver.AppleEmbeddedProx)&lt;br /&gt;
Kext: AppleMultitouchSPI @0x80b5a00(com.apple.driver.AppleMultitouchSPI)&lt;br /&gt;
Kext: H3 H264 Video Encoder @0x80b6e00(com.apple.driver.H2H264VideoEncoderDriver)&lt;br /&gt;
Kext: Broadcom WLAN SDIO Bus Driver @0x80b8f00(com.apple.driver.AppleBCMWLANBusInterfaceSDIO)&lt;br /&gt;
Kext: AppleUSBEthernet @0x80ba000(com.apple.driver.AppleUSBEthernet)&lt;br /&gt;
Kext: PPTP @0x80ba900(com.apple.nke.pptp)&lt;br /&gt;
Kext: AppleJPEGDriver @0x80bae00(com.apple.driver.AppleJPEGDriver)&lt;br /&gt;
Kext: AppleSamsungI2S @0x80bb800(com.apple.driver.AppleSamsungI2S)&lt;br /&gt;
Kext: AppleEmbeddedAccelerometer @0x80bbc00(com.apple.driver.AppleEmbeddedAccelerometer)&lt;br /&gt;
Kext: IOMikeyBusFamily @0x80bc200(com.apple.iokit.IOMikeyBusFamily)&lt;br /&gt;
Kext: AppleEmbeddedAudio @0x80bd400(com.apple.driver.AppleEmbeddedAudio)&lt;br /&gt;
Kext: AppleLM48557Amp @0x80bf500(com.apple.driver.AppleLM48557Amp)&lt;br /&gt;
Kext: AppleProfileCallstackAction @0x80bf800(com.apple.driver.AppleProfileCallstackAction)&lt;br /&gt;
Kext: AppleMultitouchSPIN1F55 @0x80bfc00(com.apple.driver.AppleCD3282Mikey)&lt;br /&gt;
Kext: AppleMultitouchSPIZ2F13 @0x80c0000(com.apple.driver.AppleImage3NORAccess)&lt;br /&gt;
Kext: AppleH3CameraInterface @0x80c0800(com.apple.driver.AppleH3CameraInterface)&lt;br /&gt;
Kext: AppleSamsungPKE @0x80c2700(com.apple.driver.AppleSamsungPKE)&lt;br /&gt;
Kext: AppleKeyStore @0x80c2b00(com.apple.driver.AppleKeyStore)&lt;br /&gt;
Kext: AppleHIDKeyboardEmbedded @0x80c3800(com.apple.driver.AppleCS42L59Audio)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=31571</id>
		<title>Kernel</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Kernel&amp;diff=31571"/>
		<updated>2013-04-08T20:43:16Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: /* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''kernel''' of [[iOS]] is the [[wikipedia:XNU|XNU]] kernel. Pre-2.0, it was vulnerable to the [[Ramdisk Hack]] and may still be, but iBoot doesn't allow boot-args to be passed anymore. It is mapped to memory at 0x80000000, forcing a 2/2GB address separation, similar to Windows 32-bit model. On older iOS the separation was 3/1 (mapping the kernel at 0xC0000000), closer to the Linux model.&lt;br /&gt;
&lt;br /&gt;
Note, that this is NOT like 32-bit OS X, wherein the kernel resides in its own address space, but more like OS X 64-bit, wherein CR3 is shared (albeit an address space larger by several orders of magnitude). See the appropriate [[#64-bit|section]]&lt;br /&gt;
&lt;br /&gt;
== [[ASLR]] ==&lt;br /&gt;
{{main|Kernel ASLR}}&lt;br /&gt;
As of [[iOS]] 6, the kernel is subject to ASLR, much akin to Mountain Lion (OS X 10.8). This make exploitation harder as the location of kernel code cannot be known.&lt;br /&gt;
&lt;br /&gt;
On production devices, the kernel is always stored as a statically linked [[kernelcache|cache]] stored at [[/System/Library/Caches/com.apple.kernelcaches/kernelcache]] that is decompressed and run on startup. On development devices the kernel is stored in the same location as OS X, at [[/mach_kernel]].&lt;br /&gt;
&lt;br /&gt;
== Stack ==&lt;br /&gt;
The kernel maintains its stack at &amp;lt;code&amp;gt;0xd2000000&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Boot-Args ==&lt;br /&gt;
Like its OS X counterpart, iOS's XNU accepts command line arguments (though the actual passing of arguments is done by iBoot, which as of late refuses to do so). Arguments may be directed at the kernel proper, or any one of the many KExts (discussed below). The arguments of the kernel are largely the same as those of OS X.&lt;br /&gt;
&lt;br /&gt;
KExts use boot-args as well, as can be seen when disassembly by calls to PE_parse_boot_argn (usually exported, _PE_parse_boot_argn 8027A8EC on the iOS 6.1.3 kernel, discovered by [[User:Haifisch|Haifisch]]). Finding references (using IDA) reveals hundreds places in the code wherein arguments are parsed in modules, pertaining to Flash, HDMI, and [[AppleMobileFileIntegrity|AMFI]].&lt;br /&gt;
&lt;br /&gt;
Here's a list of boot-args extracted with the [https://github.com/pod2g/ios_stuff/tree/master/idc-ios-boot-args IDA script] by [[User:MuscleNerd|MuscleNerd]]:&lt;br /&gt;
&lt;br /&gt;
 _nand-part-poison&lt;br /&gt;
 _panicd_corename&lt;br /&gt;
 _panicd_ip&lt;br /&gt;
 _router_ip&lt;br /&gt;
 acc_debug&lt;br /&gt;
 aesdev&lt;br /&gt;
 als_enable_debug&lt;br /&gt;
 amfi&lt;br /&gt;
 amfi_allow_any_signature&lt;br /&gt;
 amfi_get_out_of_my_way&lt;br /&gt;
 amfi_unrestrict_task_for_pid&lt;br /&gt;
 AppleEmbeddedUSBArbitrator-debug&lt;br /&gt;
 AppleS5L8930XUSBArbitrator-debug&lt;br /&gt;
 AppleUSBPhy-debug&lt;br /&gt;
 arm7m-enable-jtag&lt;br /&gt;
 -b&lt;br /&gt;
 backlight-level&lt;br /&gt;
 backlight-logging&lt;br /&gt;
 baseband-spi-sclk-period&lt;br /&gt;
 bcom.chip.driveStrength_mA&lt;br /&gt;
 bcom.chip.watermark&lt;br /&gt;
 bcom.clock.sd-rate&lt;br /&gt;
 bcom.devif.fn2-block-size&lt;br /&gt;
 bcom.devif.rx-retries&lt;br /&gt;
 bcom.devif.transaction-log&lt;br /&gt;
 bcom.devif.tx-retries&lt;br /&gt;
 bcom.feature.flags&lt;br /&gt;
 bcom.ps.inactivity.timeout&lt;br /&gt;
 bcom.wte.thread-priority&lt;br /&gt;
 boot-uuid&lt;br /&gt;
 brightness&lt;br /&gt;
 burnin-size&lt;br /&gt;
 cameraclocks&lt;br /&gt;
 charger-debug&lt;br /&gt;
 cpus&lt;br /&gt;
 cs_debug&lt;br /&gt;
 cs_enforcement_disable&lt;br /&gt;
 darkwake&lt;br /&gt;
 dart&lt;br /&gt;
 dcc&lt;br /&gt;
 debug&lt;br /&gt;
 disable-usb-iap&lt;br /&gt;
 dp_async_event_fail_hard&lt;br /&gt;
 dp_audio_driver_level&lt;br /&gt;
 dp_audio_driver_mask&lt;br /&gt;
 dp_audio_interface_level&lt;br /&gt;
 dp_audio_interface_mask&lt;br /&gt;
 dp_controller_level&lt;br /&gt;
 dp_controller_mask&lt;br /&gt;
 dp_device_level&lt;br /&gt;
 dp_device_mask&lt;br /&gt;
 dp_display_interface_level&lt;br /&gt;
 dp_display_interface_mask&lt;br /&gt;
 dp_interface_level&lt;br /&gt;
 dp_interface_mask&lt;br /&gt;
 dp_log_level&lt;br /&gt;
 dp_max_channel_count_lpcm&lt;br /&gt;
 dp_max_sample_rate_lpcm&lt;br /&gt;
 dp_max_sample_size_lpcm&lt;br /&gt;
 dp_min_channel_count_lpcm&lt;br /&gt;
 dp_min_sample_rate_lpcm&lt;br /&gt;
 dp_min_sample_size_lpcm&lt;br /&gt;
 dp_service_level&lt;br /&gt;
 dp_service_mask&lt;br /&gt;
 dpsm&lt;br /&gt;
 dvb&lt;br /&gt;
 dvc&lt;br /&gt;
 dvd&lt;br /&gt;
 effaceable-enable-full-scan&lt;br /&gt;
 effaceable-enable-wipe&lt;br /&gt;
 enable-acsleep&lt;br /&gt;
 fairshare_minblockedtime&lt;br /&gt;
 fill&lt;br /&gt;
 fixedpriority_quantum&lt;br /&gt;
 fix-parity&lt;br /&gt;
 force-usb-host&lt;br /&gt;
 force-usb-power&lt;br /&gt;
 hdmi_max_channel_count_lpcm&lt;br /&gt;
 hdmi_max_sample_rate_lpcm&lt;br /&gt;
 hdmi_max_sample_size_lpcm&lt;br /&gt;
 hdmi_min_channel_count_lpcm&lt;br /&gt;
 hdmi_min_sample_rate_lpcm&lt;br /&gt;
 hdmi_min_sample_size_lpcm&lt;br /&gt;
 hdmi_protection_type&lt;br /&gt;
 hp-detect-invert&lt;br /&gt;
 hp-pop-workaround&lt;br /&gt;
 hp-switch-force-config&lt;br /&gt;
 hp-switch-ramp&lt;br /&gt;
 hsic&lt;br /&gt;
 i2c-logsize&lt;br /&gt;
 i2c-verbose&lt;br /&gt;
 ifa_debug&lt;br /&gt;
 ifnet_debug&lt;br /&gt;
 initmcl&lt;br /&gt;
 io&lt;br /&gt;
 iopfmi-timeout&lt;br /&gt;
 iotrace&lt;br /&gt;
 jpeg-log&lt;br /&gt;
 jtag&lt;br /&gt;
 kdp_crashdump_pkt_size&lt;br /&gt;
 kdp_ip_addr&lt;br /&gt;
 kdp_match_mac&lt;br /&gt;
 kdp_match_name&lt;br /&gt;
 keepsyms&lt;br /&gt;
 kextlog&lt;br /&gt;
 link_recovery_enabled&lt;br /&gt;
 mbuf_debug&lt;br /&gt;
 mbuf_pool&lt;br /&gt;
 mcache_flags&lt;br /&gt;
 mleak_sample_factor&lt;br /&gt;
 mseg&lt;br /&gt;
 msgbuf&lt;br /&gt;
 mt-bytes&lt;br /&gt;
 mt-strings&lt;br /&gt;
 mtxspin&lt;br /&gt;
 nand-boot-malloc&lt;br /&gt;
 nand-check-vs&lt;br /&gt;
 nand-commands&lt;br /&gt;
 nand-disable-driver&lt;br /&gt;
 nand-dump-vs-table&lt;br /&gt;
 nand-enable-adm&lt;br /&gt;
 nand-enable-reformat&lt;br /&gt;
 nand-enable-yaftl&lt;br /&gt;
 nand-erase&lt;br /&gt;
 nand-erase-install&lt;br /&gt;
 nand-fbbt-publish&lt;br /&gt;
 nand-force-restore&lt;br /&gt;
 nand-idle-timeout-ms&lt;br /&gt;
 nand-ignore-ptab&lt;br /&gt;
 nand-index-cache-size&lt;br /&gt;
 nand-latency-us&lt;br /&gt;
 nand-max-pages&lt;br /&gt;
 nand-neuralize&lt;br /&gt;
 nand-nvram-debug&lt;br /&gt;
 nand-ppn-debug&lt;br /&gt;
 nand-ppn-vs-debug&lt;br /&gt;
 nand-qual&lt;br /&gt;
 nand-queue-entries&lt;br /&gt;
 nand-read-blocks-max&lt;br /&gt;
 nand-read-dccycle-clks&lt;br /&gt;
 nand-read-hold-clks&lt;br /&gt;
 nand-readonly&lt;br /&gt;
 nand-read-setup-clks&lt;br /&gt;
 nand-reorder-defer-max&lt;br /&gt;
 nand-reorder-defer-size-trigger&lt;br /&gt;
 nand-reorder-read-promote-max&lt;br /&gt;
 nand-reset-burnin&lt;br /&gt;
 nand-save-rma-data&lt;br /&gt;
 nand-set-rma&lt;br /&gt;
 nand-sftl-cache-drain&lt;br /&gt;
 nand-sleep-debug-panic&lt;br /&gt;
 nand-slow-timings&lt;br /&gt;
 nand-wearlevel-timeout-ms&lt;br /&gt;
 nand-whiten-metadata&lt;br /&gt;
 nand-wipe&lt;br /&gt;
 nand-write-blocks-max&lt;br /&gt;
 nand-write-hold-clks&lt;br /&gt;
 nand-write-setup-clks&lt;br /&gt;
 nbuf&lt;br /&gt;
 ncl&lt;br /&gt;
 net.inet6.ip6.scopedroute&lt;br /&gt;
 net_affinity&lt;br /&gt;
 net_rtref&lt;br /&gt;
 network-type&lt;br /&gt;
 -no64exec&lt;br /&gt;
 -novfscache&lt;br /&gt;
 panicd_port&lt;br /&gt;
 pcp&lt;br /&gt;
 pctb&lt;br /&gt;
 pdmvr&lt;br /&gt;
 pio-error&lt;br /&gt;
 pmu-chargetrap&lt;br /&gt;
 pmu-debug&lt;br /&gt;
 ppn-clean&lt;br /&gt;
 -progress&lt;br /&gt;
 prox_enable_debug&lt;br /&gt;
 pthtest&lt;br /&gt;
 rd&lt;br /&gt;
 remote_nmi&lt;br /&gt;
 rootdev&lt;br /&gt;
 -s&lt;br /&gt;
 sdio.clock.base-rate&lt;br /&gt;
 sdio.clock.sd-rate&lt;br /&gt;
 sdio.debug.abort-init&lt;br /&gt;
 sdio.debug.init-delay&lt;br /&gt;
 sdio.log.flags&lt;br /&gt;
 sdio.log.level&lt;br /&gt;
 sdio.transfer.max-pio-blocks&lt;br /&gt;
 sdio.transfer.max-pio-size&lt;br /&gt;
 sdio.transfer.mode&lt;br /&gt;
 serial&lt;br /&gt;
 sgx_panic_on_recovery&lt;br /&gt;
 shadev&lt;br /&gt;
 slto_us&lt;br /&gt;
 socket_debug&lt;br /&gt;
 torchcltm0&lt;br /&gt;
 usb&lt;br /&gt;
 usb_dev_nmi&lt;br /&gt;
 usb_dev_reset&lt;br /&gt;
 -vnode_cache_defeat&lt;br /&gt;
 wdt&lt;br /&gt;
 wfi&lt;br /&gt;
 wlan.ap.channel&lt;br /&gt;
 wlan.debug.abort-init&lt;br /&gt;
 wlan.debug.generate-mac&lt;br /&gt;
 wlan.log.flags&lt;br /&gt;
 wlan.log.level&lt;br /&gt;
 wlan.log.timestamp&lt;br /&gt;
 wlan.netmanager.stats-timer-interval&lt;br /&gt;
 wlan.panic.factory&lt;br /&gt;
 wqsize&lt;br /&gt;
 WTE&lt;br /&gt;
 -x&lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
iOS has consistently maintained a higher kernel version than the corresponding version of OS X. At the time of writing, OS X Mountain Lion's XNU is 20xx, whereas iOS is 21xx. This is not surprising, considering that iOS has novel features (such as [[Kernel ASLR]], the default freezer, and various security hardening features) which are first incorporated in it, and only later make it to OS X. The following demonstrates the two OS versions at present:&lt;br /&gt;
&lt;br /&gt;
OS X Mountain Lion 10.8.3:&lt;br /&gt;
&lt;br /&gt;
 Darwin Kernel Version 12.3.0: Sun Jan  6 22:37:10 PST 2013; root:xnu-2050.22.13~1/RELEASE_X86_64 x86_64&lt;br /&gt;
	&lt;br /&gt;
iOS 6.1.3:&lt;br /&gt;
 Darwin Kernel Version 13.0.0: Wed Feb 13 21:36:52 PST 2013; root:xnu-2107.7.55.2.2~1/RELEASE_ARM_S5L8930X 		&lt;br /&gt;
&lt;br /&gt;
Note: The RELEASE_ARM_xxxxxxxx file obviously differs on device / CPU.&lt;br /&gt;
&lt;br /&gt;
=== Version List ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;font-size: smaller; text-align: center;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Version&lt;br /&gt;
! Build&lt;br /&gt;
! Comment&lt;br /&gt;
|-&lt;br /&gt;
| [[Alpine 1A420 (iPhone)|1A420]]&lt;br /&gt;
| Darwin Kernel Version 4.4.2-Purple-19: Thu Mar 8 01:43:04 PST 2007; root:xnu-933.0.14~46/RELEASE_ARM_S5L8900XRB&lt;br /&gt;
| from prototype - not sure if 100% correct.&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.0.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.3&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 1.1.4&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.0.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 2.2.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.0.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.1.3&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 3.2.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.0.2&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.1&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.2.1&lt;br /&gt;
| Darwin Kernel Version 10.4.0: Wed Oct 20 20:14:45 PDT 2010; root:xnu-1504.58.28~3/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.1&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.2&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.3&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Mar 30 18:44:45 PDT 2011; root:xnu-1735.46~10/RELEASE_ARM_[[S5L8920]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.4&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 4.3.5&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sat Jul  9 00:59:43 PDT 2011; root:xnu-1735.47~1/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Thu Sep 15 23:34:43 PDT 2011; root:xnu-1878.4.43~2/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.0.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Tue Nov 1 20:34:16 PDT 2011; root:xnu-1878.4.46~1/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Wed Feb 1 23:18:07 PST 2012; root:xnu-1878.11.8~1/RELEASE_ARM_[[S5L8945]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 5.1.1&lt;br /&gt;
| Darwin Kernel Version 11.0.0: Sun Apr 8 21:51:26 PDT 2012; root:xnu-1878.11.10~1/RELEASE_ARM_[[S5L8930]]X &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Aug 19 00:31:06 PDT 2012; root:xnu-2107.2.33~4/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.1&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed Oct 10 23:29:02 PDT 2012; root:xnu-2107.2.34~2/RELEASE_ARM_[[S5L8930]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.0.2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed Oct 10 23:32:19 PDT 2012; root:xnu-2107.2.34~2/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 6.1&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec 16 20:01:39 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.1&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec 16 19:58:44 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8940]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.2&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Sun Dec 16 20:01:39 PST 2012; root:xnu-2107.7.55~11/RELEASE_ARM_[[S5L8950]]X&lt;br /&gt;
|&lt;br /&gt;
|- &lt;br /&gt;
| 6.1.3&lt;br /&gt;
| Darwin Kernel Version 13.0.0: Wed Feb 13 21:36:52 PST 2013; root:xnu-2107.7.55.2.2~1/RELEASE_ARM_[[S5L8930]]X &lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Source Code ==&lt;br /&gt;
As XNU is based off of the [[wikipedia:Berkeley Software Distribution|BSD kernel]], it is [http://opensource.apple.com/source/xnu open source]. The source is under a [http://opensource.apple.com/license/bsd/ 3-clause BSD License] for the original BSD portions with the portions added by Apple under the [http://opensource.apple.com/license/apsl/ Apple Public Source License]. The [[#Versions|versions contained in iOS]] are not available, instead only versions used in ''OS X'' are available. This does not appear to be legal as per &amp;amp;#x00A7;2.3 in the APSL:&lt;br /&gt;
 2.3     Distribution of Executable Versions.  In addition, if You Externally Deploy Covered&lt;br /&gt;
 Code (Original Code and/or Modifications) in object code, executable form only, '''You must'''&lt;br /&gt;
 '''include a prominent notice''', in the code itself as well as in related documentation, '''stating'''&lt;br /&gt;
 '''that Source Code of the Covered Code is available''' under the terms of this License '''with'''&lt;br /&gt;
 '''information on how and where to obtain such Source Code'''.&lt;br /&gt;
with ''Source Code'' defined in &amp;amp;#x00A7;1.8:&lt;br /&gt;
 1.8     &amp;quot;Source Code&amp;quot; means the human readable form of a program or other work that is&lt;br /&gt;
 suitable for making modifications to it, including all modules it contains, plus any&lt;br /&gt;
 associated interface definition files, scripts used to control compilation and installation&lt;br /&gt;
 of an executable (object code).&lt;br /&gt;
&lt;br /&gt;
It is worth noting that Apple does ''not'' list XNU as being an open source component of [[iOS]]. This can be seen by viewing [http://opensource.apple.com/ opensource.apple.com] and selecting ''any'' iOS version. As far as can be told, ''none'' of the versions of XNU are available in source version.&lt;br /&gt;
&lt;br /&gt;
There are many other open souce components that iOS uses that are ''not'' listed, such as:&lt;br /&gt;
* [http://opensource.apple.com/source/CF/ CF] ([https://developer.apple.com/library/mac/#documentation/CoreFoundation/Reference/CoreFoundation_Collection/_index.html CoreFoundation] - Cocoa)&lt;br /&gt;
* [http://opensource.apple.com/source/SQLite/ SQLite] ([http://www.sqlite.org/ SQLite] - database utility)&lt;br /&gt;
* [http://opensource.apple.com/source/TimeZoneData/ TimeZoneData] ([[wikipedia:tz database|tz database]] - [[/usr/share/zoneinfo]])&lt;br /&gt;
* [http://opensource.apple.com/source/curl/ curl](?) ([http://curl.haxx.se/ libcurl] - various HTTP operations)&lt;br /&gt;
* [http://opensource.apple.com/source/hfs/ hfs] (hfs - [[wikipedia:Hierarchical File System|HFS]] driver)&lt;br /&gt;
* [http://opensource.apple.com/source/launchd/ launchd] ([[launchd]] - launch daemon)&lt;br /&gt;
* [http://opensource.apple.com/source/libxml2/ libxml2](?) ([http://www.xmlsoft.org/ libxml2] - parser for [[wikipedia:XML|XML]] [[Property List|plist]]s)&amp;lt;!-- or does CF handle the parsing? --&amp;gt;&lt;br /&gt;
* [http://opensource.apple.com/source/xnu/ xnu] (XNU - Kernel)&lt;br /&gt;
* [http://opensource.apple.com/source/zip/ zip] (zip - extraction of various files)&lt;br /&gt;
It does ''not'' appear that Apple assumes what you see in the ''OS X'' pages are also on ''iOS''&amp;lt;!-- reword needed --&amp;gt; as [http://opensource.apple.com/source/JavaScriptCore/ JavaScriptCore], [http://opensource.apple.com/source/WebCore/ WebCore], among others are listed on both [http://opensource.apple.com/release/mac-os-x-108/ OS X] (10.8) and [http://opensource.apple.com/release/ios-60/ iOS] (6.0), albeit different versions.&lt;br /&gt;
&lt;br /&gt;
It is also worth noting that [http://opensource.apple.com/source/gdb/ gdb] ([[wikipedia:GNU Compiler Collection|GCC]] debugger) and [http://opensource.apple.com/source/ld64/ ld64] are listed as components in [http://opensource.apple.com/release/ios-60/ iOS 6.0]. Why there are present is a mystery as they are not present on unaltered devices, but only through [[Cydia.app|Cydia]] or [[Xcode]]'s &amp;lt;code&amp;gt;DeveloperImage.dmg&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== Kernel Extensions ==&lt;br /&gt;
iOS, sadly, does ''not'' have [[Kernel Extension|kext]]s floating around the [[/|file system]], but they are indeed present. The [[kernelcache]] can be unpacked to show the kernel proper, along with the kexts (all packed in the __PRELINK_TEXT section) and their [[Property List|plist]]s (in the __PRELINK_INFO section).&lt;br /&gt;
&lt;br /&gt;
The Cydia supplied [[kextstat]] does not work on [[iOS]]. Sadly, the reason is that kextstat relies on &amp;lt;code&amp;gt;kmod_get_info(...)&amp;lt;/code&amp;gt;, which is a deprecated (and recently removed) API in recent&amp;lt;!-- how recent? --&amp;gt; iOS and OS X versions. With that said, the [[Kernel Extension|kext]]s ''do'' exist. The alternative, [[kextstat#jkextstat|jkextstat]], ''does'' work on recent iOS versions. jkextstat can cause some confusion as it uses the executable name &amp;lt;code&amp;gt;kextstat&amp;lt;/code&amp;gt;, similar to how calling &amp;lt;code&amp;gt;g++&amp;lt;/code&amp;gt; just launches &amp;lt;code&amp;gt;gcc&amp;lt;/code&amp;gt; but with parameters to treat all &amp;lt;code&amp;gt;.c&amp;lt;/code&amp;gt; files as C++ files.&lt;br /&gt;
&lt;br /&gt;
The following is the output from [[kextstat#jkextstat|jkextstat]] on an [[n81ap|iPod touch 4G]] running [[iOS]] 6(?):&lt;br /&gt;
&lt;br /&gt;
 Podicum:~ root# ./kextstat &lt;br /&gt;
   0 __kernel__ &lt;br /&gt;
   1 kpi.bsd &lt;br /&gt;
   2 kpi.dsep &lt;br /&gt;
   3 kpi.iokit &lt;br /&gt;
   4 kpi.libkern &lt;br /&gt;
   5 kpi.mach &lt;br /&gt;
   6 kpi.private &lt;br /&gt;
   7 kpi.unsupported &lt;br /&gt;
   8 driver.AppleARMPlatform &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
   9 iokit.IOStorageFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  10 driver.DiskImages &amp;lt;1 3 4 5 6 7 9&amp;gt;&lt;br /&gt;
  11 driver.FairPlayIOKit &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  12 driver.IOSlaveProcessor &amp;lt;3 4&amp;gt;&lt;br /&gt;
  13 driver.IOP_s5l8930x_firmware &amp;lt;3 4 12&amp;gt;&lt;br /&gt;
  14 iokit.AppleProfileFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  15 iokit.IOCryptoAcceleratorFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  16 driver.AppleMobileFileIntegrity &amp;lt;1 2 3 4 5 6 7 15&amp;gt;&lt;br /&gt;
  17 iokit.IONetworkingFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  18 iokit.IOUserEthernet &amp;lt;1 3 4 5 6 16 17&amp;gt;&lt;br /&gt;
  19 platform.AppleKernelStorage &amp;lt;3 4 7&amp;gt;&lt;br /&gt;
  20 iokit.IOSurface &amp;lt;1 3 4 5 6 7 8&amp;gt;&lt;br /&gt;
  21 iokit.IOStreamFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  22 iokit.IOAudio2Family &amp;lt;1 3 4 5 21&amp;gt;&lt;br /&gt;
  23 driver.AppleAC3Passthrough &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  24 iokit.EncryptedBlockStorage &amp;lt;1 3 4 5 9 15&amp;gt;&lt;br /&gt;
  25 iokit.IOFlashStorage &amp;lt;1 3 4 5 7 9 24&amp;gt;&lt;br /&gt;
  26 driver.AppleEffaceableStorage &amp;lt;1 3 4 5 7 8 25&amp;gt;&lt;br /&gt;
  27 driver.AppleKeyStore &amp;lt;1 3 4 5 6 7 15 16 26&amp;gt;&lt;br /&gt;
  28 kext.AppleMatch &amp;lt;1 4&amp;gt;&lt;br /&gt;
  29 security.sandbox &amp;lt;1 2 3 4 5 6 7 16 28&amp;gt;&lt;br /&gt;
  30 driver.AppleS5L8930X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  31 iokit.IOHIDFamily &amp;lt;1 3 4 5 6 7 16&amp;gt;&lt;br /&gt;
  32 driver.AppleM68Buttons &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  33 iokit.IOUSBDeviceFamily &amp;lt;1 3 4 5&amp;gt;&lt;br /&gt;
  34 iokit.IOSerialFamily &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
  35 driver.AppleOnboardSerial &amp;lt;1 3 4 5 7 34&amp;gt;&lt;br /&gt;
  36 iokit.IOAccessoryManager &amp;lt;3 4 5 7 8 33 34 35&amp;gt;&lt;br /&gt;
  37 driver.AppleProfileTimestampAction &amp;lt;1 3 4 5 14&amp;gt;&lt;br /&gt;
  38 driver.AppleProfileThreadInfoAction &amp;lt;1 3 4 6 14&amp;gt;&lt;br /&gt;
  39 driver.AppleProfileKEventAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  40 driver.AppleProfileRegisterStateAction &amp;lt;1 3 4 14&amp;gt;&lt;br /&gt;
  41 driver.AppleProfileCallstackAction &amp;lt;1 3 4 5 6 14&amp;gt;&lt;br /&gt;
  42 driver.AppleProfileReadCounterAction &amp;lt;3 4 6 14&amp;gt;&lt;br /&gt;
  43 driver.AppleARMPL192VIC &amp;lt;3 4 5 7 8&amp;gt;&lt;br /&gt;
  44 driver.AppleCDMA &amp;lt;1 3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  45 driver.IODARTFamily &amp;lt;3 4 5&amp;gt;&lt;br /&gt;
  46 driver.AppleS5L8930XDART &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  47 iokit.IOSDIOFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  48 driver.AppleIOPSDIO &amp;lt;1 3 4 5 7 8 12 47&amp;gt;&lt;br /&gt;
  49 driver.AppleIOPFMI &amp;lt;1 3 4 5 7 8 12 25&amp;gt;&lt;br /&gt;
  50 driver.AppleSamsungSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  51 driver.AppleSamsungSerial &amp;lt;1 3 4 5 7 8 34 35&amp;gt;&lt;br /&gt;
  52 driver.AppleSamsungPKE &amp;lt;3 4 5 7 8 15&amp;gt;&lt;br /&gt;
  53 driver.AppleS5L8920X &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  54 driver.AppleSamsungI2S &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  55 driver.AppleEmbeddedUSB &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  56 driver.AppleS5L8930XUSBPhy &amp;lt;1 3 4 5 7 8 55&amp;gt;&lt;br /&gt;
  57 iokit.IOUSBFamily &amp;lt;1 3 4 5 7&amp;gt;&lt;br /&gt;
  58 driver.AppleUSBEHCI &amp;lt;1 3 4 5 7 57&amp;gt;&lt;br /&gt;
  59 driver.AppleUSBComposite &amp;lt;1 3 4 57&amp;gt;&lt;br /&gt;
  60 driver.AppleEmbeddedUSBHost &amp;lt;1 3 4 5 7 55 57 59&amp;gt;&lt;br /&gt;
  61 driver.AppleUSBOHCI &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  62 driver.AppleUSBOHCIARM &amp;lt;3 4 5 8 55 57 60 61&amp;gt;&lt;br /&gt;
  63 driver.AppleUSBHub &amp;lt;1 3 4 5 57&amp;gt;&lt;br /&gt;
  64 driver.AppleUSBEHCIARM &amp;lt;3 4 5 8 55 57 58 60 63&amp;gt;&lt;br /&gt;
  65 driver.AppleS5L8930XUSB &amp;lt;1 3 4 5 7 8 55 57 58 60 61 62 64&amp;gt;&lt;br /&gt;
  66 driver.AppleARM7M &amp;lt;3 4 8 12&amp;gt;&lt;br /&gt;
  67 driver.EmbeddedIOP &amp;lt;3 4 5 12&amp;gt;&lt;br /&gt;
  68 driver.AppleVXD375 &amp;lt;1 3 4 5 7 8 11&amp;gt;&lt;br /&gt;
  69 driver.AppleD1815PMU &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  70 iokit.AppleARMIISAudio &amp;lt;1 3 4 5 7 22&amp;gt;&lt;br /&gt;
  71 driver.AppleEmbeddedAudio &amp;lt;1 3 4 5 7 8 22 31 70&amp;gt;&lt;br /&gt;
  72 driver.AppleCS42L59Audio &amp;lt;3 4 5 8 22 31 70 71&amp;gt;&lt;br /&gt;
  73 driver.AppleEmbeddedAccelerometer &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  74 driver.AppleEmbeddedGyro &amp;lt;1 3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  75 driver.AppleEmbeddedLightSensor &amp;lt;3 4 5 7 8 31&amp;gt;&lt;br /&gt;
  76 iokit.IOAcceleratorFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  77 IMGSGX535 &amp;lt;1 3 4 5 7 8 76&amp;gt;&lt;br /&gt;
  78 driver.H2H264VideoEncoderDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  79 driver.AppleJPEGDriver &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  80 driver.AppleH3CameraInterface &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  81 driver.AppleM2ScalerCSCDriver &amp;lt;1 3 4 5 7 8 45&amp;gt;&lt;br /&gt;
  82 iokit.IOMobileGraphicsFamily &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  83 driver.AppleDisplayPipe &amp;lt;1 3 4 5 7 8 82&amp;gt;&lt;br /&gt;
  84 driver.AppleCLCD &amp;lt;1 3 4 5 7 8 82 83&amp;gt;&lt;br /&gt;
  85 driver.AppleSamsungMIPIDSI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  86 driver.ApplePinotLCD &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  87 driver.AppleSamsungSWI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  88 iokit.IODisplayPortFamily &amp;lt;1 3 4 5 6 7 22&amp;gt;&lt;br /&gt;
  89 driver.AppleRGBOUT &amp;lt;1 3 4 5 7 8 82 83 88&amp;gt;&lt;br /&gt;
  90 driver.AppleTVOut &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
  91 driver.AppleAMC_r2 &amp;lt;1 3 4 5 7 8 11 21 22&amp;gt;&lt;br /&gt;
  92 driver.AppleSamsungDPTX &amp;lt;3 4 5 7 8 88&amp;gt;&lt;br /&gt;
  93 driver.AppleSynopsysOTGDevice &amp;lt;1 3 4 5 7 8 33 55&amp;gt;&lt;br /&gt;
  94 driver.AppleNANDFTL &amp;lt;1 3 4 5 7 9 25&amp;gt;&lt;br /&gt;
  95 driver.AppleNANDLegacyFTL &amp;lt;1 3 4 5 9 25 94&amp;gt;&lt;br /&gt;
  96 AppleFSCompression.AppleFSCompressionTypeZlib &amp;lt;1 2 3 4 6&amp;gt;&lt;br /&gt;
  97 IOTextEncryptionFamily &amp;lt;1 3 4 5 7 11&amp;gt;&lt;br /&gt;
  98 driver.AppleBSDKextStarter &amp;lt;3 4&amp;gt;&lt;br /&gt;
  99 nke.ppp &amp;lt;1 3 4 5 6 7&amp;gt;&lt;br /&gt;
 100 nke.l2tp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 101 nke.pptp &amp;lt;1 3 4 5 6 7 99&amp;gt;&lt;br /&gt;
 102 iokit.IO80211Family &amp;lt;1 3 4 5 6 7 17&amp;gt;&lt;br /&gt;
 103 driver.AppleBCMWLANCore &amp;lt;1 3 4 5 6 7 8 17 102&amp;gt;&lt;br /&gt;
 104 driver.AppleBCMWLANBusInterfaceSDIO &amp;lt;1 3 4 5 6 7 8 47 103&amp;gt;&lt;br /&gt;
 105 driver.AppleDiagnosticDataAccessReadOnly &amp;lt;1 3 4 5 7 8 94&amp;gt;&lt;br /&gt;
 106 driver.LightweightVolumeManager &amp;lt;1 3 4 5 9 15 24 26&amp;gt;&lt;br /&gt;
 107 driver.IOFlashNVRAM &amp;lt;1 3 4 5 6 7 25&amp;gt;&lt;br /&gt;
 108 driver.AppleNANDFirmware &amp;lt;1 3 4 5 25&amp;gt;&lt;br /&gt;
 109 driver.AppleImage3NORAccess &amp;lt;1 3 4 5 7 8 15 108&amp;gt;&lt;br /&gt;
 110 driver.AppleBluetooth &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 111 driver.AppleMultitouchSPI &amp;lt;1 3 4 5 7 8&amp;gt;&lt;br /&gt;
 112 driver.AppleUSBMike &amp;lt;1 3 4 5 8 22 33&amp;gt;&lt;br /&gt;
 113 driver.AppleUSBDeviceMux &amp;lt;1 3 4 5 6 7 33&amp;gt;&lt;br /&gt;
 114 driver.AppleUSBEthernetDevice &amp;lt;1 3 4 5 6 8 17 33&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a specific extension, e.g. SandBox, the full information (including the handy load address) is also accessible:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;root# ./jkextstat -b sandbox  -x&amp;lt;/code&amp;gt;:&lt;br /&gt;
 &amp;lt;plist&amp;gt;&lt;br /&gt;
 &amp;lt;dict&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleIdentifier&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;com.apple.security.sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;CFBundleVersion&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;154.7&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUSubtype&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;9&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleCPUType&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;12&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleDependencies&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;array&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;6&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;7&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;5&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;3&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;28&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;1&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;4&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;16&amp;lt;/integer&amp;gt;&lt;br /&gt;
                 &amp;lt;integer&amp;gt;2&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;/array&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleExecutablePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext/Sandbox&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleIsInterface&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadAddress&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;2153734144&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleLoadTag&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;29&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleMachOHeaders&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         zvrt/gwAAAAJAAAACwAAAAMAAAAgAgAAAQAAAAEAAAAEAQAAX19URVhUAAAAAAAAAAAA&lt;br /&gt;
         AABgX4AAgAAAAAAAAACAAAAHAAAABwAAAAMAAAAAAAAAX190ZXh0AAAAAAAAAAAAAF9f&lt;br /&gt;
         VEVYVAAAAAAAAAAAAADMbV+AKGEAAMwNAAACAAAAAAAAAAAAAAAABwCAAAAAAAAAAABf&lt;br /&gt;
         X2NzdHJpbmcAAAAAAAAAX19URVhUAAAAAAAAAAAAAPTOX4DLDQAA9G4AAAAAAAAAAAAA&lt;br /&gt;
         AAAAAAIAAAAAAAAAAAAAAF9fY29uc3QAAAAAAAAAAABfX1RFWFQAAAAAAAAAAAAAwNxf&lt;br /&gt;
         gDEDAADAfAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAQBAABfX0RBVEEAAAAA&lt;br /&gt;
         AAAAAAAAAOBfgAAQAAAAgAAAABAAAAcAAAAHAAAAAwAAAAAAAABfX2RhdGEAAAAAAAAA&lt;br /&gt;
         AAAAX19EQVRBAAAAAAAAAAAAAADgX4C0BgAAAIAAAAQAAAAAAAAAAAAAAAAAAAAAAAAA&lt;br /&gt;
         AAAAAF9fYnNzAAAAAAAAAAAAAABfX0RBVEEAAAAAAAAAAAAAwOZfgHgAAAAAAAAABAAA&lt;br /&gt;
         AAAAAAAAAAAAAQAAAAAAAAAAAAAAX19jb21tb24AAAAAAAAAAF9fREFUQQAAAAAAAAAA&lt;br /&gt;
         AAA451+AGAAAAAAAAAACAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAbAAAAGAAAABasg7Y2&lt;br /&gt;
         TzkVrtqsgOViBQ0=&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePath&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;string&amp;gt;/System/Library/Extensions/Sandbox.kext&amp;lt;/string&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundlePrelinked&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleRetainCount&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;0&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleStarted&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;true/&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleUUID&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;data&amp;gt;&lt;br /&gt;
         FqyDtjZPORWu2qyA5WIFDQ==&lt;br /&gt;
         &amp;lt;/data&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSBundleWiredSize&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;integer&amp;gt;36864&amp;lt;/integer&amp;gt;&lt;br /&gt;
         &amp;lt;key&amp;gt;OSKernelResource&amp;lt;/key&amp;gt;&lt;br /&gt;
         &amp;lt;false/&amp;gt;&lt;br /&gt;
 &amp;lt;/dict&amp;gt;&lt;br /&gt;
 &amp;lt;/plist&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's also worth mentioning that, in the above listing, the OSBundleMachOHeaders (base-64 encoded binary headers) leak kernel addresses in iOS 6.0, defeating [[Kernel ASLR]]. This has been quickly fixed in iOS 6.0.1, effectively locking down iOS for the foreseeable future, thanks to security researcher [[mdowd]].&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [[Kernel Syscalls]]&lt;br /&gt;
* [[Kernel Sysctls]]&lt;br /&gt;
* [[Kernel Task]]&lt;br /&gt;
* [[Kernel Symbols]]&lt;br /&gt;
* [[kdebug]]&lt;br /&gt;
* [[kernelcache]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://opensource.apple.com/source/xnu XNU Source] (up to latest **OS X** version)&lt;br /&gt;
* [[i0n1c]] on [https://media.blackhat.com/bh-us-11/Esser/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf exploiting the kernel]&lt;br /&gt;
* [http://newosxbook.com/src.jl?tree=listings&amp;amp;file=18-1-JKextstat.c jkextstat.c]&lt;br /&gt;
* [http://www.amazon.com/gp/product/1118057651 OSX/iOS internals book]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Backboardd&amp;diff=30990</id>
		<title>Backboardd</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Backboardd&amp;diff=30990"/>
		<updated>2013-03-05T03:57:34Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: + Lsof&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''backboardd''' is a [[wikipedia:Daemon (computing)|daemon]] that runs alongside the [[SpringBoard]] daemon. It has been introduced in iOS 6, aiming to offload some of Springboard's responsibilities, chiefly that of event handling. Prior to its introduction, SpringBoard was effectively the UI event sink for iOS, as is WindowServer in OS X. With backboardd, all touch events are first processed by this daemon, then translated and relayed to the iOS application in the foreground (i.e. to its UIApplication event loop).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a simple experiment, login over SSH to send a kill -STOP signal to the daemon, then touch your device. If you kill -CONT the daemon, you will see your touch events played out, as the events are consumed from I/O Kit by backboardd, and relayed to the foreground app.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The backboardd is also responsible for automatic screen dimming (via AutoBrightness and Backlight plugins) as well as opening and holding icon states for Springboard. This can be easily verified with an output of &amp;quot;lsof&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Padmi:~ root# ./lsof-arm7-iOS4.2  -p 64            &lt;br /&gt;
COMMAND   PID   USER   FD     TYPE     DEVICE  SIZE/OFF   NODE NAME&lt;br /&gt;
backboard  64 mobile  cwd      DIR        1,2       884      2 /&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3    333104 435969 /private/var/stash/libexec.hIXve8/backboardd&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2  39067948  42342 /System/Library/Frameworks/UIKit.framework/Shared@2x.artwork&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3      8902 439760 /private/var/mobile/Library/Caches/com.apple.springboard.sharedimagecache/Persistent/NewsstandApplicationIconOverlay.cpbitmap&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3   5767168 601899 /private/var/tmp/iconLabels_gray.V8prSQ&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     26694 439757 /private/var/mobile/Library/Caches/com.apple.springboard.sharedimagecache/Persistent/NewsstandShadowTopNotch.cpbitmap&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3  19400560 436078 /private/var/stash/share.xUDAtn/icu/icudt49l.dat&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2    120336  34879 /System/Library/Extensions/AppleMultitouchSPI.kext/PlugIns/MultitouchHID.plugin/MultitouchHID&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2     70096  11359 /System/Library/HIDPlugins/AutoBrightness.plugin/AutoBrightness&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2     27312  11354 /System/Library/HIDPlugins/Backlight.plugin/Backlight&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     20480 439566 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122736642270&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439565 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831221284115396&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94880 601950 /private/var/mobile/Library/Caches/com.apple.IconsCache/com.klausthul.ktdictce_defaultRole-Icon.png_Icon@2x.png_Icon-Small.png_Icon-Small@2x.png_Icon-72.png_Icon-72@2x.png_Icon-Small-50.png_Icon-Small-50@2x.png-37&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3  12140544 601932 /private/var/tmp/iconImages.eXOvjh&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     24576 511984 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122770392540&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2    115152    779 /System/Library/AccessibilityBundles/BackBoard.axbundle/BackBoard&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439564 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831223638791652&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3  12140544 601961 /private/var/tmp/ghostlyIcons.4GmCvg&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439657 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831221447664047&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439561 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122596967800&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     69632 439563 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831221404757235&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     81920 439656 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122477341617&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439556 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831221855203170&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94208 439581 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831223601320839&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94208 439580 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831222319862850&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     81920 439557 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831224201689474&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     65536 439570 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122373921450&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3    110592 439655 /private/var/mobile/Library/Caches/com.apple.keyboards/images/3064683122583137537&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94880 601955 /private/var/mobile/Library/Caches/com.apple.IconsCache/com.touchpress.orchestra_defaultRole-Icon-72_Icon-Small-50_Icon-Small_Icon-37&lt;br /&gt;
backboard  64 mobile  txt      REG        1,2   8353196  42333 /System/Library/Frameworks/UIKit.framework/Shared@2x~ipad.artwork&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     92486 426595 /private/var/mobile/Library/Caches/com.apple.springboard.sharedimagecache/Persistent/WallpaperIconDockShadow.cpbitmap&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94880 601960 /private/var/mobile/Library/Caches/com.apple.IconsCache/com.apple.mobilesafari_CFBundleIcon[37]&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     94880 601962 /private/var/mobile/Library/Caches/com.apple.IconsCache/com.apple.mobilemail_CFBundleIcon[37]&lt;br /&gt;
backboard  64 mobile  txt      REG        1,3     81920 439560 /private/var/mobile/Library/Caches/com.apple.keyboards/images/30646831222343767418&lt;br /&gt;
... etc.. etc..&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[Category:Daemons]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Backboardd&amp;diff=30989</id>
		<title>Backboardd</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Backboardd&amp;diff=30989"/>
		<updated>2013-03-05T03:48:55Z</updated>

		<summary type="html">&lt;p&gt;Morpheus: Explained what backboardd actually does, removed stub.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
'''backboardd''' is a [[wikipedia:Daemon (computing)|daemon]] that runs alongside the [[SpringBoard]] daemon. It has been introduced in iOS 6, aiming to offload some of Springboard's responsibilities, chiefly that of event handling. Prior to its introduction, SpringBoard was effectively the UI event sink for iOS, as is WindowServer in OS X. With backboardd, all touch events are first processed by this daemon, then translated and relayed to the iOS application in the foreground (i.e. to its UIApplication event loop).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a simple experiment, login over SSH to send a kill -STOP signal to the daemon, then touch your device. If you kill -CONT the daemon, you will see your touch events played out, as the events are consumed from I/O Kit by backboardd, and relayed to the foreground app.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Daemons]]&lt;/div&gt;</summary>
		<author><name>Morpheus</name></author>
		
	</entry>
</feed>