If that is the case, going to extra trouble to infect Linux kernel source may well be worth it for the attackers.
If that is the case, going to extra trouble to infect Linux kernel source may well be worth it for the attackers.