pc = regs->nip - (NR_INSN_TO_PRINT * 3 / 4 * sizeof(int));
 
-       /*
-        * Make sure the NIP points at userspace, not kernel text/data or
-        * elsewhere.
-        */
-       if (!__access_ok(pc, NR_INSN_TO_PRINT * sizeof(int), USER_DS)) {
-               pr_info("%s[%d]: Bad NIP, not dumping instructions.\n",
-                       current->comm, current->pid);
-               return;
-       }
-
        seq_buf_init(&s, buf, sizeof(buf));
 
        while (n) {
                for (i = 0; i < 8 && n; i++, n--, pc += sizeof(int)) {
                        int instr;
 
-                       if (probe_kernel_address((const void *)pc, instr)) {
+                       if (probe_user_read(&instr, (void __user *)pc, sizeof(instr))) {
                                seq_buf_printf(&s, "XXXXXXXX ");
                                continue;
                        }
 
        }
        isync();
 
-       pagefault_disable();
        if (is_load)
-               ret = raw_copy_from_user(to, from, n);
+               ret = probe_user_read(to, (const void __user *)from, n);
        else
-               ret = raw_copy_to_user(to, from, n);
-       pagefault_enable();
+               ret = probe_user_write((void __user *)to, from, n);
 
        /* switch the pid first to avoid running host with unallocated pid */
        if (quadrant == 1 && pid != old_pid)
 
                if ((flags & FAULT_FLAG_WRITE) && (flags & FAULT_FLAG_USER) &&
                    access_ok(nip, sizeof(*nip))) {
                        unsigned int inst;
-                       int res;
 
-                       pagefault_disable();
-                       res = __get_user_inatomic(inst, nip);
-                       pagefault_enable();
-                       if (!res)
+                       if (!probe_user_read(&inst, nip, sizeof(inst)))
                                return !store_updates_sp(inst);
                        *must_retry = true;
                }
 
        unsigned int stack_frame[2];
        void __user *p = compat_ptr(sp);
 
-       if (!access_ok(p, sizeof(stack_frame)))
-               return 0;
-
        /*
         * The most likely reason for this is that we returned -EFAULT,
         * which means that we've done all that we can do from
         * interrupt context.
         */
-       if (__copy_from_user_inatomic(stack_frame, p, sizeof(stack_frame)))
+       if (probe_user_read(stack_frame, (void __user *)p, sizeof(stack_frame)))
                return 0;
 
        if (!is_first)
 {
        unsigned long stack_frame[3];
 
-       if (!access_ok((void __user *)sp, sizeof(stack_frame)))
-               return 0;
-
-       if (__copy_from_user_inatomic(stack_frame, (void __user *)sp,
-                                       sizeof(stack_frame)))
+       if (probe_user_read(stack_frame, (void __user *)sp, sizeof(stack_frame)))
                return 0;
 
        if (!is_first)
                        first_frame = 0;
                }
        } else {
-               pagefault_disable();
 #ifdef CONFIG_PPC64
                if (!is_32bit_task()) {
                        while (depth--) {
                                        break;
                                first_frame = 0;
                        }
-                       pagefault_enable();
                        return;
                }
 #endif
                                break;
                        first_frame = 0;
                }
-               pagefault_enable();
        }
 }
 
            ((unsigned long)ptr & 7))
                return -EFAULT;
 
-       pagefault_disable();
-       if (!__get_user_inatomic(*ret, ptr)) {
-               pagefault_enable();
+       if (!probe_user_read(ret, ptr, sizeof(*ret)))
                return 0;
-       }
-       pagefault_enable();
 
        return read_user_stack_slow(ptr, ret, 8);
 }
            ((unsigned long)ptr & 3))
                return -EFAULT;
 
-       pagefault_disable();
-       if (!__get_user_inatomic(*ret, ptr)) {
-               pagefault_enable();
+       if (!probe_user_read(ret, ptr, sizeof(*ret)))
                return 0;
-       }
-       pagefault_enable();
 
        return read_user_stack_slow(ptr, ret, 4);
 }
  */
 static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret)
 {
-       int rc;
-
        if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) ||
            ((unsigned long)ptr & 3))
                return -EFAULT;
 
-       pagefault_disable();
-       rc = __get_user_inatomic(*ret, ptr);
-       pagefault_enable();
-
-       return rc;
+       return probe_user_read(ret, ptr, sizeof(*ret));
 }
 
 static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry,
 
 static __u64 power_pmu_bhrb_to(u64 addr)
 {
        unsigned int instr;
-       int ret;
        __u64 target;
 
        if (is_kernel_addr(addr)) {
        }
 
        /* Userspace: need copy instruction here then translate it */
-       pagefault_disable();
-       ret = __get_user_inatomic(instr, (unsigned int __user *)addr);
-       if (ret) {
-               pagefault_enable();
+       if (probe_user_read(&instr, (unsigned int __user *)addr, sizeof(instr)))
                return 0;
-       }
-       pagefault_enable();
 
        target = branch_target(&instr);
        if ((!target) || (instr & BRANCH_ABSOLUTE))
 
        addr += mfspr(SPRN_MCAR);
 
        if (is_in_pci_mem_space(addr)) {
-               if (user_mode(regs)) {
-                       pagefault_disable();
-                       ret = get_user(inst, (__u32 __user *)regs->nip);
-                       pagefault_enable();
-               } else {
+               if (user_mode(regs))
+                       ret = probe_user_read(&inst, (void __user *)regs->nip,
+                                             sizeof(inst));
+               else
                        ret = probe_kernel_address((void *)regs->nip, inst);
-               }
 
                if (!ret && mcheck_handle_load(regs, inst)) {
                        regs->nip += 4;