Lines Matching refs:t0
45 lw t0, PT_R29(sp) # get old user stack pointer
52 addu t4, t0, 32
64 load_a4: user_lw(t5, 16(t0)) # argument #5 from usp
65 load_a5: user_lw(t6, 20(t0)) # argument #6 from usp
66 load_a6: user_lw(t7, 24(t0)) # argument #7 from usp
67 load_a7: user_lw(t8, 28(t0)) # argument #8 from usp
83 lw t0, TI_FLAGS($28) # syscall tracing enabled?
85 and t0, t1
86 bnez t0, syscall_trace_entry # -> yes
89 sltiu t0, v0, __NR_O32_Linux_syscalls
90 beqz t0, illegal_syscall
92 sll t0, v0, 2
94 addu t1, t0
101 li t0, -EMAXERRNO - 1 # error?
102 sltu t0, t0, v0
103 sw t0, PT_R7(sp) # set error flag
104 beqz t0, 1f
152 li t0, 1 # set error flag
153 sw t0, PT_R7(sp)
178 li t0, 1 # set error flag
179 sw t0, PT_R7(sp)
184 subu t0, a0, __NR_O32_Linux # check syscall number
185 sltiu v0, t0, __NR_O32_Linux_syscalls
186 beqz t0, einval # do not recurse
187 sll t1, t0, 2