/usr/src/lttng-modules-2.5.1/instrumentation/syscalls/README is in lttng-modules-dkms 2.5.1-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 | LTTng system call tracing
1) lttng-syscall-extractor
You need to build a kernel with CONFIG_FTRACE_SYSCALLS=y and
CONFIG_KALLSYMS_ALL=y for extraction. Apply the linker patch to get your
kernel to keep the system call metadata after boot. Then build and load
the LTTng syscall extractor module. The module will fail to load (this
is expected). See the dmesg output for system call metadata.
2) Generate system call TRACE_EVENT().
Take the dmesg metadata and feed it to lttng-syscalls-generate-headers.sh
(do not include the ending SUCCESS line), e.g., from the
instrumentation/syscalls directory. See the script header for usage example.
It should be run for both the integers and pointers types.
After these are created, we just need to follow the new system call additions,
no need to regenerate the whole thing, since system calls are only appended to.
3) Override headers
You need to provide override headers (even if they don't contain
overrides) for each architecture. Those are meant to contain manual
overrides for specific system calls for cases where the script do not
generate the correct typing for specific system calls.
4) Integrating the new architecture, updating architecture header
Edit instrumentation/syscalls/headers/syscalls_integers.h and
syscalls_pointers.h. Add the new architecture
(e.g. CONFIG_X86_64) to the newly-generated headers
(e.g. changing the current x86-64-syscalls-3.10.0-rc7_<CLASS>.h into
x86-64-syscalls-3.13.7_<CLASS>.h), then rebuild lttng-modules.
|