As you all know since cturt announced confirmation of a already patched working kernel exploit i just wanted to mention one of the methods for exploitation revolves around resolving kernel adresses to kernel or modules via closest symbols
you could use kallsyms to debug and extract /rebuild kernel with linker and manually take over a process or syscall by enabling read/and write access or begin creating a exploitable kernel with the desired output of linker passes and then running your exploit of a device that interfaces&interacts to the hardware.
http://linux.about.com/library/cmd/blcmdl8_kallsyms.htm
you could use kallsyms to debug and extract /rebuild kernel with linker and manually take over a process or syscall by enabling read/and write access or begin creating a exploitable kernel with the desired output of linker passes and then running your exploit of a device that interfaces&interacts to the hardware.
http://linux.about.com/library/cmd/blcmdl8_kallsyms.htm