I wrote a simple module for the Linux Kernel and it has a stack buffer overflow vulnerability. I want to exploit the module, but I have to turn off the stack protector in the kernel first. How could I do this quickly and simply?
Is it required to compile the kernel every time?
Is there any other way to turn off stack protection in a module of the Linux Kernel (without compiling the kernel)?