Lines Matching refs:t0
49 lw t0, PT_R29(sp) # get old user stack pointer
56 addu t4, t0, 32
68 load_a4: user_lw(t5, 16(t0)) # argument #5 from usp
69 load_a5: user_lw(t6, 20(t0)) # argument #6 from usp
70 load_a6: user_lw(t7, 24(t0)) # argument #7 from usp
71 load_a7: user_lw(t8, 28(t0)) # argument #8 from usp
87 lw t0, TI_FLAGS($28) # syscall tracing enabled?
89 and t0, t1
90 bnez t0, syscall_trace_entry # -> yes
92 sltiu t0, v0, __NR_O32_Linux_syscalls + 1
93 beqz t0, illegal_syscall
95 sll t0, v0, 2
97 addu t1, t0
104 li t0, -EMAXERRNO - 1 # error?
105 sltu t0, t0, v0
106 sw t0, PT_R7(sp) # set error flag
107 beqz t0, 1f
156 li t0, 1 # set error flag
157 sw t0, PT_R7(sp)
182 li t0, 1 # set error flag
183 sw t0, PT_R7(sp)
188 subu t0, a0, __NR_O32_Linux # check syscall number
189 sltiu v0, t0, __NR_O32_Linux_syscalls + 1
190 beqz t0, einval # do not recurse
191 sll t1, t0, 2