On 30 April 2013 07:38, John Rigby <john.ri...@linaro.org> wrote:
> +    /* set up the stack frame for unwinding */
> +    err |= __put_user(env->xregs[29], &sf->fp);

__put_user can't fail so all this collection of error
status is unnecessary. (Every address we write with it
has to be covered by the lock_user_struct() call which
is where we'll find out if it wasn't writable memory.
Existing code in signal.c that checks __put_user
and __get_user return values is generally cut-n-paste
from the Linux kernel, which does do access rights
testing on each individual load/store.)


> +    err |= __put_user(env->xregs[30], &sf->lr);
> +
> +    for (i = 0; i < 31; i++) {
> +        err |= __put_user(env->xregs[i], &sf->uc.tuc_mcontext.regs[i]);
> +    }
> +    err |= __put_user(env->sp, &sf->uc.tuc_mcontext.sp);
> +    err |= __put_user(env->pc, &sf->uc.tuc_mcontext.pc);
> +    err |= __put_user(env->pstate, &sf->uc.tuc_mcontext.pstate);




> +
> +    for (i = 0; i < 32 * 2; i++) {
> +       err |= __get_user(env->vfp.regs[i], &aux->fpsimd.vregs[i]);
> +    }
> +
> +#if 0
> +    err |= __get_user(env->fpsr, &aux->fpsimd.fpsr);
> +    err |= __get_user(env->fpcr, &aux->fpsimd.fpcr);
> +#endif

No #if-0 code, please.

thanks
-- PMM

Reply via email to