This directory collects the important setting in kernel exploit. It contains:
- what's the meaning of the config.
- how the config affects the way of pwning.
- how to check if the config is enabled in distributed kernels.
- how to bypass the config if possible.