um: Prevent KASAN splats in dump_stack()
authorVincent Whitchurch <vincent.whitchurch@axis.com>
Wed, 7 Sep 2022 10:05:33 +0000 (12:05 +0200)
committerRichard Weinberger <richard@nod.at>
Mon, 19 Sep 2022 20:58:48 +0000 (22:58 +0200)
commit2975e4a282964dd14831e4612ac1b6b10745e5ba
treec5aa840b7df45e1e8e4bc925a58ca43ef405eeee
parent782b1f70f8a8b28571949d2ba43fe88b96d75ec3
um: Prevent KASAN splats in dump_stack()

Use READ_ONCE_NOCHECK() when reading the stack to prevent KASAN splats
when dump_stack() is used.

Fixes: 5b301409e8bc5d7fad ("UML: add support for KASAN under x86_64")
Signed-off-by: Vincent Whitchurch <vincent.whitchurch@axis.com>
Reviewed-by: Dmitry Vyukov <dvyukov@google.com>
Signed-off-by: Richard Weinberger <richard@nod.at>
arch/um/kernel/sysrq.c