Lines Matching refs:t0
36 dsubu t0, v0, __NR_O32_Linux # check syscall number
37 sltiu t0, t0, __NR_O32_Linux_syscalls + 1
40 beqz t0, not_o32_scall
55 dsll t0, v0, 3 # offset into table
56 ld t2, (sys32_call_table - (__NR_O32_Linux * 8))(t0)
68 ld t0, PT_R29(sp) # get old user stack pointer
69 daddu t1, t0, 32
72 1: lw a4, 16(t0) # argument #5 from usp
73 2: lw a5, 20(t0) # argument #6 from usp
74 3: lw a6, 24(t0) # argument #7 from usp
75 4: lw a7, 28(t0) # argument #8 from usp (for indirect syscalls)
85 LONG_L t0, TI_FLAGS($28) # syscall tracing enabled?
86 and t0, t1, t0
87 bnez t0, trace_a_syscall
91 li t0, -EMAXERRNO - 1 # error?
92 sltu t0, t0, v0
93 sd t0, PT_R7(sp) # set error flag
94 beqz t0, 1f
134 move t0, s0
144 jalr t0
146 li t0, -EMAXERRNO - 1 # error?
147 sltu t0, t0, v0
148 sd t0, PT_R7(sp) # set error flag
149 beqz t0, 1f
166 li t0, 1 # set error flag
167 sd t0, PT_R7(sp)
183 subu t0, a0, __NR_O32_Linux # check syscall number
184 sltiu v0, t0, __NR_O32_Linux_syscalls + 1
185 beqz t0, einval # do not recurse
186 dsll t1, t0, 3