The title says it most, really. On Linux it would be easy with strace
and possibly lsof
or /proc
, and it used to be easy on OSX until truss
was removed from OSX Leopard, along with underlying system calls (afaik).
The obvious approach is to tackle this problem with dtrace
, but alas as far as I understand dtrace
won't do because it catches events as they happen - and in my case, the blocking system call has already started. I'd love to stand corrected if this can be solved with dtrace
, by the way.
I saw Xcode's Instruments has a monitor which achieves something similar by taking periodic samples of a process' stack (not sure what system calls it relies on to do that!), maybe something similar on the command line could be good enough (as it would display the stack all the way to the library call that wraps the system call). To be useful for my usecase, this "sampling commandline tool" would have to find and parse the arguments it finds on the stack to be useful to determine what file/file descriptor are we blocked on.
One last thing - on Linux, you could usually do this as a regular user (assuming no ptrace_scope
tricks). It would be great if the OSX solution won't require root, either.
You can use sample
: sample PID -e
E.g. for the nc -l localhost 5999
you'd get a file with call graph:
Call graph:
9046 Thread_242504 DispatchQueue_1: com.apple.main-thread (serial)
9046 start (in libdyld.dylib) + 1 [0x7fff90a847e1]
9046 ??? (in nc) load address 0x102453000 + 0x166c [0x10245466c]
9046 __accept (in libsystem_kernel.dylib) + 10 [0x7fff94445996]
And other useful information like loaded Binary Images.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With