Initial revision
diff --git a/PORTING b/PORTING
new file mode 100644
index 0000000..aef4ce4
--- /dev/null
+++ b/PORTING
@@ -0,0 +1,70 @@
+I am frequently asked to port strace to a given platform.  Less
+frequently I am asked how one would go about porting strace to a given
+platform. :-) Since I have ported strace to a few platforms already I
+have some advice to the would-be strace porter.
+
+The number one question is ``Does the native operating support a
+concept which enables even the mere possibility of tracing?''.  So far
+I have seen two mechanisms which support system call tracing.  They
+are the SunOS originated feature of the PTRACE_SYSCALL argument to the
+ptrace system call and the PIOCSENTRY/PIOCSEXIT ioctl for the /proc
+filesystem under System V release 4 style Unix derived systems.  There
+may be others (surely a better one could be devised :-) but innovation
+is a rare commodity so unless one of these is supported you may be
+SOL.
+
+Therefore the first step is to try `man 2 ptrace' and `man 4 proc' to
+see if there is even a glimmer of hope.  Without assistance from the
+operating system, system call tracing is a lost cause.  If there is a
+native system call tracing program (however pathetic it might be :-),
+you may be able to use it to trace itself to determine what mechanism
+it is using for tracing the system calls of another process.  If the
+interface is documented you should be a happy camper.  Otherwise,
+unless you can tolerate the thought of many thankless hours
+single-stepping in a debugger with little or nothing to show for it,
+you should consider other tasks to distract you from your friends,
+family, education, job, spouse and/or significant other.
+
+If you have arrived here, your OS should have ptrace or proc or you
+should have a high tolerance for pain.  Then again, curious but
+detached readers are invited to continue with little to risk but
+boredom.  If the mechanism is neither ptrace nor proc then examine how
+it is intended to work and see how well it fits with what strace
+already does.  If it fits, fine, add a few more ifdefs.  If there is a
+gross mismatch, write a whole new event loop.
+
+At this point you are responsible for determining three things: how is
+the specific system call communicated, how are system call arguments
+handled, and how is errno handled.  These things can usually be
+resolved in a day or two using a decent assembly level debugger and
+some educated guesswork.  For example, set a breakpoint on `read'.
+Then disassemble the code and see where the arguments go.  Do they go
+on the stack?  Do they go into registers?  Some combination of the
+two?  Find the point where the transition from user mode to kernel
+mode is made.  Can you identify the arguments at this point?  When the
+call returns where does errno go?  Into a specific register?  Into a
+global variable?
+
+Next you need to determine how to decode numeric system call numbers
+into system call names (syscallent.h), errno values into errno names
+(errnoent.h) and ioctl values into ioctl names (ioctlent.h).  Often
+this fragile step can be accomplished by massaging system header files
+with ad hoc shell scripts.  Expect your scripts to break with every
+dot rev of each OS release.
+
+Finally, once you have the basic framework in which system calls and
+their arguments can be decoded, you must do the dirty work of decoding
+every useful call.  Some may be similar or identical to like-named
+calls in other operating systems.  Go ahead and tweak what is there
+to achieve what you want.  If there is more difference than similarity,
+then just write your own version of it using one of the existing
+implementations for ideas.
+
+The first order of decoding is the generation of suitable system call,
+errno, ioctl and signal tables.  Sample scripts are included to assist
+with the generation of a first pass at these tables.
+
+Good luck and feel free to contact me before and/or during any major
+project.
+
+Rick Sladkey <jrs@world.std.com>