I'm a bit late, but it's because I wanted my exploit to be universal. When patching kernel .text I'd need know:
- know the offset to the patched instructions (memory scanning will not work)
- know the architecture-compatible instructions to replace it with