1/* Retrieve the syscall trap instruction. */
2unsigned long trap;
3errno = 0;
4trap = ptrace(PTRACE_PEEKTEXT, tcp->pid, (char *)sparc_regs.tpc, 0);
5if (errno)
6	return -1;
7trap >>= 32;
8switch (trap) {
9case 0x91d02010:
10	/* Linux/SPARC syscall trap. */
11	update_personality(tcp, 0);
12	break;
13case 0x91d0206d:
14	/* Linux/SPARC64 syscall trap. */
15	update_personality(tcp, 1);
16	break;
17}
18
19scno = sparc_regs.u_regs[U_REG_G1];
20