Lines Matching refs:t0
36 dsubu t0, v0, __NR_O32_Linux # check syscall number
37 sltiu t0, t0, __NR_O32_Linux_syscalls + 1
40 beqz t0, not_o32_scall
55 dsll t0, v0, 3 # offset into table
56 ld t2, (sys32_call_table - (__NR_O32_Linux * 8))(t0)
68 ld t0, PT_R29(sp) # get old user stack pointer
69 daddu t1, t0, 32
72 load_a4: lw a4, 16(t0) # argument #5 from usp
73 load_a5: lw a5, 20(t0) # argument #6 from usp
74 load_a6: lw a6, 24(t0) # argument #7 from usp
75 load_a7: lw a7, 28(t0) # argument #8 from usp
86 LONG_L t0, TI_FLAGS($28) # syscall tracing enabled?
87 and t0, t1, t0
88 bnez t0, trace_a_syscall
93 li t0, -EMAXERRNO - 1 # error?
94 sltu t0, t0, v0
95 sd t0, PT_R7(sp) # set error flag
96 beqz t0, 1f
158 li t0, 1 # set error flag
159 sd t0, PT_R7(sp)
191 subu t0, a0, __NR_O32_Linux # check syscall number
192 sltiu v0, t0, __NR_O32_Linux_syscalls + 1
193 beqz t0, einval # do not recurse
194 dsll t1, t0, 3