iosnoop no longer works on OS X 10.11 El Capitan

[Note: This all started because some process – I'm still not sure which – is chewing on my hard drive for minutes at a time. This behavior started when I updated to OS X 10.11.1. Given the duration, it seems unlikely to be a simple re-indexing by mdsworkers.]

I recently tried using iosnoop to find out which processes were chewing on my Fusion drive with enough vigor to make the hard drive audible. Instead of a running log of events, I got this:

That's not right.

I filed a radar with Apple. The response was unsatisfying, as it effectively means iosnoop is no longer usable:

This issue behaves as intended based on the following: Some significant portions of dtrace are not compatible with System Integrity Protection. Unfortunately, the iosnoop script contains probes that are not compatible, and thus cannot run.

The iosnoop(1m) man page says nothing about this. At the least this is a documentation failure on Apple's part.


Twitter turned up a workaround/solution:

@sevanjaniyan To reenable dtrace reboot to recovery, open terminal. csrutil disable; csrutil enable --without dtrace

Unfortunately this isn't working on my late 2009 iMac. As I understand it the problem is that, when I installed an SSD and configured a Fusion Drive last year, I didn't put the recovery HD outside the fusion drive. So I have some storage reconfiguration to do.


From 2 March 2015:

Exclusive: Obama sharply criticizes China's plans for new technology rules | Reuters:

In an interview with Reuters, Obama said he was concerned about Beijing's plans for a far-reaching counterterrorism law that would require technology firms to hand over encryption keys, the passcodes that help protect data, and install security "backdoors" in their systems to give Chinese authorities surveillance access.

Obama said the rules could also backfire on China.

"Those kinds of restrictive practices I think would ironically hurt the Chinese economy over the long term because I don’t think there is any U.S. or European firm, any international firm, that could credibly get away with that wholesale turning over of data, personal data, over to a government," he said.

From 24 February 2015, an exchange between Yahoo's Chief Information Security Officer and NSA Director Mike Rogers:

Yahoo's security boss faces down NSA director over crypto ban - Boing Boing:

AS: [...] So, if we’re going to build defects/backdoors or golden master keys for the US government, do you believe we should do so — we have about 1.3 billion users around the world — should we do for the Chinese government, the Russian government, the Saudi Arabian government, the Israeli government, the French government? Which of those countries should we give backdoors to?


MR: I think we can work our way through this.

AS: I’m sure the Chinese and Russians are going to have the same opinion.

MR: I said I think we can work through this.

AS: Okay, nice to meet you. Thanks.

Connecting to a headless Raspberry Pi w. VNC

Rather than dedicate a keyboard, mouse and display to my Raspberry Pi I'd prefer to access it over the network. ssh access is usually good enough, but sometimes I'd also like to use its graphical desktop, via VNC.

This post at My Raspberry Pi Experience provides all the required info in one place. Many thanks!

To recap the article: with the Pi connected to my network, and with its IP address reserved on the router, log in via ssh. Then install tightvncserver:

$ sudo apt-get install tightvncserver

Create a script, somewhere on the path, to start the VNC server manually:

# start_vnc_server
# Starts a VNC server listening on port 1, with a 16-bit pixel depth.
vncserver :1 -geometry 1024x768 -depth 16

Run the script (natch).

When you're done, either unplug the Pi or shut down the server. If you're as forgetful as I am, you'll need a script for that, too:

# stop_vnc_server
vncserver -kill :1

I use Jolly's Fast VNC as my vnc client. The Pi's server doesn't seem to advertise its presence via ZeroConf/Bonjour, but it's pretty easy to configure:

Pasted Image 3 8 14 12 23 PM 5

And there it is:

Pasted Image 3 8 14 12 42 PM 2

Coincidentally, it's curious that all of my iOS devices show up in the server list. Someday when time is free I should investigate how to view them via VNC...