I’m playing with a pinetab2. Apparently it may have some kind of thing to patch the kernel and I think it is using packagekit, but am not certain.
The device ships with an obscure Arch ARM64 distro on the built in EMMC. I’m exploring other distros and playing with Fedora Workstation now. Maybe I’m mistaken here, but I think some part of the old kernel is transferred or patching or something. I’m not positive. Stuff like the buggy built in WiFi module are not present, but I think the peripheral hardware and display memory map may be passed. That or packagekit may be an ARM64 kernel thing?
I’m more curious about the broader security/privacy implications, and what kinds of mechanisms are built into the kernel within this kind of application. I thought that the kernel was always built independently and that it defaults to never trusting unregistered code execution. How exactly that intersects with peripheral devices that may have their own memory is something I do not understand yet. Like the WiFi module on this device is a dual core µc slightly more advanced than an ESP32 with its own persistent memory.
- Is this embedded onboard kernel modding/patching a thing?
- How does one explore or monitor it?
- How is trust established with a modem that can execute code in its own compute hardware with persistent memory?
These are just some things I am exploring if anyone feels like chatting casually about them. I’m not interested in tech support like nonsense or attitudes. This is just intended as high level, abstract overview like curiosity between hackers at various levels.

