Lines Matching refs:t0
39 sltiu t0, v0, __NR_O32_Linux_syscalls + 1
42 beqz t0, illegal_syscall
44 sll t0, v0, 2
46 addu t1, t0
57 lw t0, PT_R29(sp) # get old user stack pointer
64 addu t4, t0, 32
76 1: user_lw(t5, 16(t0)) # argument #5 from usp
77 4: user_lw(t6, 20(t0)) # argument #6 from usp
78 3: user_lw(t7, 24(t0)) # argument #7 from usp
79 2: user_lw(t8, 28(t0)) # argument #8 from usp
94 lw t0, TI_FLAGS($28) # syscall tracing enabled?
96 and t0, t1
97 bnez t0, syscall_trace_entry # -> yes
101 li t0, -EMAXERRNO - 1 # error?
102 sltu t0, t0, v0
103 sw t0, PT_R7(sp) # set error flag
104 beqz t0, 1f
133 move t0, s0
139 jalr t0
141 li t0, -EMAXERRNO - 1 # error?
142 sltu t0, t0, v0
143 sw t0, PT_R7(sp) # set error flag
144 beqz t0, 1f
162 li t0, 1 # set error flag
163 sw t0, PT_R7(sp)
172 li t0, 1 # set error flag
173 sw t0, PT_R7(sp)
178 subu t0, a0, __NR_O32_Linux # check syscall number
179 sltiu v0, t0, __NR_O32_Linux_syscalls + 1
180 beqz t0, einval # do not recurse
181 sll t1, t0, 2