By entering this site you need to consent to the use of cookies and their functional use according to this privacy policy. Cookies help us to provide the functional services of the website. Kindly read the below message of use and consent to the use.
The following cookies are stored and shared when accessing this website:
- Internal cookies for the MediaWiki site. This is used for user authentication and article modifications.
- Third-party cookies from Google providing services for Google AdSense and Google Analytics
We will never use data collected outside of the above scope.
For retrieving camera video data, [[NDMA]] with arm9 startup mode 11(camera) is used with this src register. Transferred length varies per resolution. In the video data, each pixel is 2 bytes.
+
For retrieving camera video data, [[NDMA]] with arm9 startup mode 11(camera) is used with this src register. Transfer lengths used are 0x18000 and 0x96000. The former is 256x192(actual camera resolution to final video data resolution conversion is handled by DSP) and the latter is 640x480.
+
+
The DSP fw binary still seems to be loaded after cameras were used in the exploited title, as reading this register(with cameras reinitialized prior to that) results in changing data rather than fixed data. The DSP is a proprietary CEVA DSP, since this ISA is proprietary fw binaries can't be compiled for it. Thus homebrew could potentially only use cameras when the exploited title can use cameras and cameras were used in the title prior to running hax.