Lines Matching refs:t0
45 lw t0, PT_R29(sp) # get old user stack pointer
51 addu t4, t0, 32
62 load_a4: user_lw(t5, 16(t0)) # argument #5 from usp
63 load_a5: user_lw(t6, 20(t0)) # argument #6 from usp
64 load_a6: user_lw(t7, 24(t0)) # argument #7 from usp
65 load_a7: user_lw(t8, 28(t0)) # argument #8 from usp
81 lw t0, TI_FLAGS($28) # syscall tracing enabled?
83 and t0, t1
84 bnez t0, syscall_trace_entry # -> yes
87 sltiu t0, v0, __NR_O32_Linux_syscalls
88 beqz t0, illegal_syscall
90 sll t0, v0, 2
92 addu t1, t0
99 li t0, -EMAXERRNO - 1 # error?
100 sltu t0, t0, v0
101 sw t0, PT_R7(sp) # set error flag
102 beqz t0, 1f
150 li t0, 1 # set error flag
151 sw t0, PT_R7(sp)
176 li t0, 1 # set error flag
177 sw t0, PT_R7(sp)
182 subu t0, a0, __NR_O32_Linux # check syscall number
183 sltiu v0, t0, __NR_O32_Linux_syscalls
184 beqz t0, einval # do not recurse
185 sll t1, t0, 2