1/* Retrieve the syscall trap instruction. */ 2unsigned long trap; 3errno = 0; 4trap = ptrace(PTRACE_PEEKTEXT, tcp->pid, (char *)sparc_regs.tpc, 0); 5if (errno) 6 return -1; 7trap >>= 32; 8switch (trap) { 9case 0x91d02010: 10 /* Linux/SPARC syscall trap. */ 11 update_personality(tcp, 0); 12 break; 13case 0x91d0206d: 14 /* Linux/SPARC64 syscall trap. */ 15 update_personality(tcp, 1); 16 break; 17} 18 19scno = sparc_regs.u_regs[U_REG_G1]; 20