I’m playing with a pinetab2. Apparently it may have some kind of thing to patch the kernel and I think it is using packagekit, but am not certain.

The device ships with an obscure Arch ARM64 distro on the built in EMMC. I’m exploring other distros and playing with Fedora Workstation now. Maybe I’m mistaken here, but I think some part of the old kernel is transferred or patching or something. I’m not positive. Stuff like the buggy built in WiFi module are not present, but I think the peripheral hardware and display memory map may be passed. That or packagekit may be an ARM64 kernel thing?

I’m more curious about the broader security/privacy implications, and what kinds of mechanisms are built into the kernel within this kind of application. I thought that the kernel was always built independently and that it defaults to never trusting unregistered code execution. How exactly that intersects with peripheral devices that may have their own memory is something I do not understand yet. Like the WiFi module on this device is a dual core µc slightly more advanced than an ESP32 with its own persistent memory.

  • Is this embedded onboard kernel modding/patching a thing?
  • How does one explore or monitor it?
  • How is trust established with a modem that can execute code in its own compute hardware with persistent memory?

These are just some things I am exploring if anyone feels like chatting casually about them. I’m not interested in tech support like nonsense or attitudes. This is just intended as high level, abstract overview like curiosity between hackers at various levels.

  • CameronDev
    link
    fedilink
    arrow-up
    7
    ·
    1 day ago

    Packagekit (at least last I heard of it) was just a higher level package manager (wrapping around dnf/apt/etc), not anything specific to kernel patching. Maybe that has changed?

    You can live patch a kernel, each distro has their own way of doing things, usually, you get a kernel module that is loaded that fixes the bug live, and there is a real fixed module to go with it that gets loaded next boot. The kernel patch module is just a hack to avoid rebooting. Ubuntu has some doco on their system LivePatch which is worth a read. I am not sure that kernel module signing is super commonly used, but there may be some distros that ship with it enabled. If it is enabled, then loading an unsigned kernel module should be impossible.

    As for trust a modem, thats a tricky one. Firmware level hacks have been theorised for a long time, but there is very few examples of actual exploits. Its mostly security through obscurity.