S5L8920

from Wikipedia, the free encyclopedia

The Samsung S5L8920 is a System-on-a-Chip (SoC) manufactured by Samsung for Apple . It combines an ARM CPU with a PowerVR graphics processor and also takes on the functions of a conventional PC chipset.

The S5L8920 was introduced with the iPhone 3GS on June 8, 2009. At the WWDC , Phil Schiller only spoke of changes to the inner workings of the iPhone that should make it up to twice as fast, but without specifically addressing the processor. The iPhone 3GS is the only Apple device that uses this SoC.

Other names for the S5L8920 are Samsung S5PC100 and APL0298 . It belongs to the S5L SoCs .

The predecessor was the S5L8720 , the successor to the S5L8922 .

description

Samsung S5L8920
Structure of the S5L8920

The S5L8920 contains a 32-bit - ARMv7 compatible, backward compatible to ARMv6, ARM Cortex A8 main processor and is in 65nm CMOS process made. The standard core clock of the Cortex A8 is normally 833 MHz, but Apple has lowered it to around 600 MHz. The size of the memory is 254 MB. Just like the previous SoCs , the S5L8920 also has an integrated GPU , a PowerVR SGX535 . The S5L8920 thus supports OpenGL 2.0, OpenGL ES 2.0, OpenGL ES 1.1 with the Extension Pack and OpenVG 1.0.1 & 1.1. A NOR flash is used to boot the processor .

Competing architectures of similar products are Qualcomm's Snapdragon , Texas Instruments ' OMAP 4 , Nvidia's Tegra 2, and Samsung Exynos .

Logicboard of the iPhone 3GS, which uses the S5L8920. The S5L8920 sits invisibly under the upper EMI shield , to the left of the barcode.

Design flaw

A design error of the older S5L89xx iPhone main processors has been adopted in the S5L8920: Any code can be executed through the so-called limera1n exploit, a so-called BootROM error, which was mainly used by jailbreaks . This error , which cannot be patched by software updates, also allows the iPhone's code lock to be read out within a few minutes without great effort by running a bruteforce program. This bug was fixed with the Apple A5 chip.

Individual evidence

  1. YouTube - Apple WWDC 2009 Keynote , accessed December 29, 2013
  2. PDA Data Base - Samsung S5L8920 , accessed December 29, 2013, 12:00
  3. Specification of the "SysInfoPlus" program
  4. Hack2Learn - Apple has probably patched the Limera1n eploit ( memento of the original from December 30, 2013 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. , accessed December 29, 2013, 11:20 am @1@ 2Template: Webachiv / IABot / www.hack2learn.org