What's preventing a compromised kernel on one core from hijacking the other cores? This doesn't seem like much of a security boundary
What's preventing a compromised kernel on one core from hijacking the other cores? This doesn't seem like much of a security boundary
Nothing prevents it if you achieve code execution. But where it helps is scenarios like syscall / memory mapping exploits where a user process can only affect resources attached to their current kernel. For example https://dirtycow.ninja/ would have a limited scope.