The title says it most, really. On Linux it would be easy with strace
and possibly lsof
or /proc
, and it used to be easy on OSX until truss
was removed from OSX Leopard, along with underlying system calls (afaik).
The obvious approach is to tackle this problem with dtrace
, but alas as far as I understand dtrace
won't do because it catches events as they happen - and in my case, the blocking system call has already started. I'd love to stand corrected if this can be solved with dtrace
, by the way.
I saw Xcode's Instruments has a monitor which achieves something similar by taking periodic samples of a process' stack (not sure what system calls it relies on to do that!), maybe something similar on the command line could be good enough (as it would display the stack all the way to the library call that wraps the system call). To be useful for my usecase, this "sampling commandline tool" would have to find and parse the arguments it finds on the stack to be useful to determine what file/file descriptor are we blocked on.
One last thing - on Linux, you could usually do this as a regular user (assuming no ptrace_scope
tricks). It would be great if the OSX solution won't require root, either.