2012-07-14

The Korean translation of TLPI is out

The Korean translation of The Linux Programming Interface came out on 10 July. You can find further information about the translation my earlier blog post and on the translations page of the TLPI web site.

The publisher kindly sent me a few photographs of the finished work:



(The table on the left corresponds to page 194 in the English original, and the figure on the right corresponds to page 902.)



(You have to love the bookends...)

2012-06-25

Some licensing changes to the source code

When originally published, the code from TLPI was licensed under the GNU Affero General Public License, version 3.

One reader commented that they are using one of my library functions as part of their everyday "toolbox" of handy pieces of code. As things currently stand, that would mean that if they redistributed any code that linked against that function or ran that code as part of a larger network application, then the complete source code of their application would also need to be licensed under the Affero GPL (i.e., all source code linked to my library functions would also need to be distributed).

That scenario wasn't really my intention (I'd overlooked the case of library functions in my code). So, I've now relicensed the library functions in TLPI under the GNU Lesser General Public License, version 3. The relicensing applies to all files in the lib/ directory of the source code distribution, and the changed licenses are already present in the latest source code tarball and online versions of the programs that went up in an update of the web site a couple of weeks ago.

Aside from the licensing changes, it's worth mentioning that since publication of TLPI, I've made a number of small fixes to various example programs. The fixes are listed in the CHANGES file that is distributed as part of the source code tarball.

2012-06-22

Korean translation of TLPI available soon

The Korean publisher Acorn is completing the final pieces in the production of the Korean translation of TLPI, which should be published next month.

The translation will be published in two volumes that together run to nearly 2000 pages. As well as splitting the book into two volumes, the chapters are reorganized somewhat. Chapters 29 to 33 (POSIX threads) of the English original move to a later position in the translation, so that they form the start of the second volume. (In a two-volume version, this reordering seemed a little better both to the publisher and to me.) The two volumes are thus:
The two volumes will be sold both separately (priced respectively at 50,000 and 35,000 South Korean won), and as a two-volume package (79,000 won).

Considering that translation work began just 18 months ago, the speed of publication is impressive. One of the things that assisted was that the translation was the work of a team of translators.

It is of course an honor and a pleasure to see my book translated, for which I thank both the publisher and translators. Among the translators, a special thanks to Kiju Kim (nontechnical private blog), who kept me up to date on progress and also submitted a number of error reports on the English original while translating. And though I'll never be able to read them, I look forward to being able to hold copies of the Korean translation in some weeks.

2012-04-09

TLPI third print run now available

I'm happy to announce that the third print run of TLPI is now printed, and should be available for sale shortly. The third print run incorporates these 131 errata shown on the errata page. (If that seems like a lot of errata, take a look at this FAQ.)

2012-03-13

Kernel capability usage statistics

(Update: 2012-07-16: I wrote a related article for this blog post, "CAP_SYS_ADMIN: the new root" that was published on LWN.net on 2012-03-14.)

The idea of capabilities is to break the power of root (user ID 0) into independently assigned pieces governing specific privileged operations. Implicit in that model is that the set of privileged operations governed by each capability should be small (otherwise, why break the power of root into pieces at all?). However, that implication hasn't turned out to be true in practice.

Table 1 shows some statistics on the use of the 36 currently existing capabilities in the C files of the Linux 3.2 kernel source code. The "#uses" column is the number of uses of the capability across all source files; the "#files" column is the number of distinct source files where the capability is used.

Table 1: Breakdown of Linux capability uses in Linux 3.2
Capability#uses#files
CAP_AUDIT_CONTROL22
CAP_AUDIT_WRITE11
CAP_CHOWN42
CAP_DAC_OVERRIDE21
CAP_DAC_READ_SEARCH42
CAP_FOWNER98
CAP_FSETID86
CAP_IPC_LOCK138
CAP_IPC_OWNER11
CAP_KILL22
CAP_LEASE11
CAP_LINUX_IMMUTABLE1313
CAP_MAC_ADMIN255
CAP_MAC_OVERRIDE62
CAP_MKNOD33
CAP_NET_ADMIN395182
CAP_NET_BIND_SERVICE1310
CAP_NET_BROADCAST00
CAP_NET_RAW1811
CAP_SETFCAP32
CAP_SETGID106
CAP_SETPCAP22
CAP_SETUID84
CAP_SYS_ADMIN451229
CAP_SYS_BOOT22
CAP_SYS_CHROOT11
CAP_SYSLOG22
CAP_SYS_MODULE43
CAP_SYS_NICE148
CAP_SYS_PACCT11
CAP_SYS_PTRACE116
CAP_SYS_RAWIO6742
CAP_SYS_RESOURCE3624
CAP_SYS_TIME2213
CAP_SYS_TTY_CONFIG114
CAP_WAKE_ALARM21
Total1167610

What is of course notable is the extremely heavy use of  two capabilities: CAP_SYS_ADMIN and CAP_NET_ADMIN. Together, these two capabilities account for more than 70% of all uses of capabilities! The uses of CAP_NET_ADMIN are limited to the drivers/ (mainly drivers/net/) and net/ directories. On the other hand, the uses of CAP_SYS_ADMIN, which accounts for nearly 39% of all capability uses, are spread widely across the kernel source tree.

One might wonder whether either of these two capabilities is overrepresented because of duplications in the drivers/ or the arch/ trees. (In particular, CAP_SYS_ADMIN is used for similar administrative functions on a lot of device drivers.) However, even if we strip drivers/ and architectures other than x86 from the measurements, the overall picture doesn't change greatly, as shown in Table 2.

Table 2: Breakdown of Linux capability uses in Linux 3.2, excluding drivers and architectures other than x86
Capability#uses#files
CAP_AUDIT_CONTROL22
CAP_AUDIT_WRITE11
CAP_CHOWN42
CAP_DAC_OVERRIDE21
CAP_DAC_READ_SEARCH42
CAP_FOWNER98
CAP_FSETID86
CAP_IPC_LOCK116
CAP_IPC_OWNER11
CAP_KILL11
CAP_LEASE11
CAP_LINUX_IMMUTABLE1313
CAP_MAC_ADMIN255
CAP_MAC_OVERRIDE62
CAP_MKNOD33
CAP_NET_ADMIN16773
CAP_NET_BIND_SERVICE129
CAP_NET_BROADCAST00
CAP_NET_RAW1811
CAP_SETFCAP32
CAP_SETGID95
CAP_SETPCAP22
CAP_SETUID84
CAP_SYS_ADMIN16780
CAP_SYS_BOOT22
CAP_SYS_CHROOT11
CAP_SYSLOG22
CAP_SYS_MODULE43
CAP_SYS_NICE126
CAP_SYS_PACCT11
CAP_SYS_PTRACE105
CAP_SYS_RAWIO109
CAP_SYS_RESOURCE2618
CAP_SYS_TIME42
CAP_SYS_TTY_CONFIG11
CAP_WAKE_ALARM21
Total552291

CAP_SYS_ADMIN still accounts for 167 of 552 uses of capabilities--about 30%, and, by chance, usage of CAP_NET_ADMIN is the same.

It turns out that the overall picture hasn't changed that much since capabilities were first introduced with Linux 2.2 (Jan 1999). Then, there were 27 capabilities, broken down as shown in Table 3.

Table 3: Breakdown of Linux capability uses in Linux 2.2
Capability#uses#files
CAP_CHOWN21
CAP_DAC_OVERRIDE55
CAP_DAC_READ_SEARCH44
CAP_FOWNER75
CAP_FSETID32
CAP_IPC_LOCK42
CAP_IPC_OWNER11
CAP_KILL00
CAP_LINUX_IMMUTABLE22
CAP_NET_ADMIN7532
CAP_NET_BIND_SERVICE33
CAP_NET_BROADCAST00
CAP_NET_RAW86
CAP_SETGID72
CAP_SETPCAP22
CAP_SETUID73
CAP_SYS_ADMIN12769
CAP_SYS_BOOT11
CAP_SYS_CHROOT11
CAP_SYS_MODULE42
CAP_SYS_NICE52
CAP_SYS_PACCT11
CAP_SYS_PTRACE99
CAP_SYS_RAWIO21
CAP_SYS_RESOURCE108
CAP_SYS_TIME74
CAP_SYS_TTY_CONFIG11
Total298169

In Linux 2.2, CAP_SYS_ADMIN accounted for 42% of the uses of capabilities, and CAP_NET_ADMIN accounted for 25%.

Table 4 repeats the earlier exercise of excluding drivers/ and architectures other than i386 (as the Intel arch/ directory was then named) from the Linux 2.2 data. In this case, an interesting difference emerges.

Table 4: Breakdown of Linux capability uses in Linux 2.2, excluding drivers and architectures other than i386
Capability#uses#files
CAP_CHOWN21
CAP_DAC_OVERRIDE55
CAP_DAC_READ_SEARCH44
CAP_FOWNER75
CAP_FSETID32
CAP_IPC_LOCK42
CAP_IPC_OWNER11
CAP_KILL00
CAP_LINUX_IMMUTABLE22
CAP_NET_ADMIN4423
CAP_NET_BIND_SERVICE33
CAP_NET_BROADCAST00
CAP_NET_RAW86
CAP_SETGID72
CAP_SETPCAP22
CAP_SETUID73
CAP_SYS_ADMIN2317
CAP_SYS_BOOT11
CAP_SYS_CHROOT11
CAP_SYS_MODULE42
CAP_SYS_NICE52
CAP_SYS_PACCT11
CAP_SYS_PTRACE22
CAP_SYS_RAWIO21
CAP_SYS_RESOURCE54
CAP_SYS_TIME31
CAP_SYS_TTY_CONFIG11
Total14794

The overall picture differs in a way that I suspect is significant: just under 16% (23/147) of the uses of capabilities are CAP_SYS_ADMIN. (As we saw in Table 2, by Linux 3.2, this figure had grown to 30% (167/552).) This difference suggests to me that as a series of kernel developers was faced with the question: "What capability should I use to govern my new privileged kernel feature?", the answer was often something like "I don't know; maybe CAP_SYS_ADMIN?". (That certainly fits with a few anecdotal cases I've encountered while discussing things with kernel developers as I wrote man pages for new kernel features.)

The script (count_kernel_cap_uses.sh) used to generate the data for these statistics can be found here. The first and third tables above are based on analysis of the "p2" output files produced by the script. The second and fourth tables are based on analysis of the "p4" output files.

2012-02-22

Look hard, and you can see TLPI

This is fun... I'm fairly certain that the guess by this redditor about what you can see sitting behind the laptop in this photo (taken by John Snyder, and used in the 21 Feb 2012 Wired article, Lord of the Files: How GitHub Tamed Free Software (And More)) is correct. Probably, it's the copy I gave Linus last year. It's nice to know he held on to it, though I'm not so sure there's so much in the book that he doesn't already know.

Updated 2015-07-06: fix a broken URL, and add the title of Wired article. 
Updates 2016-07-25: fix a broken URL (again... Wired.com doesn't seem to embrace the notion of stable URLs).

2012-02-20

Traditional Chinese translation of TLPI

The Taiwanese publisher GOTOP has contracted the rights to do a Traditional Chinese publication of TLPI.

There are now four translations of TLPI in progress. It looks like the first of the translations that will appear will be the Korean translation, sometime around the middle of this year.

2012-02-04

Web site updates

I've rolled out a few updates to the man7.org web site, including a redesigned main page for TLPI, and the addition of several errata to the errata page. Special thanks for a long list of error reports to Junjiro Okajima, who's working on the Japanese translation of TLPI.

2012-01-16

Third print run (and request for bug reports)

Sales of The Linux Programming Interface have continued well enough that the publisher will soon start preparing the third print run. That print run will incorporate all of the outstanding errata.

If you've been reading TLPI and noticed any errors or typos, now would be a good time to report them, so that fixes can be included in the next printing.

2011-12-03

Nice discount on No Starch books

No Starch Press is doing a brief pre-Christmas sale -- 40% off all paper books, and the ebook is included for free. That's cheaper than the normal discount offered for TLPI, and it applies to all No Starch books. But I only found out about this sale a little late: according to http://nostarch.com/newsletters/2011_holiday.htm, the sale finishes at midnight on 3 Dec. I presume that means midnight in California (UTC-8), about 24 hours from now. So, you might want to take a quick look at the full catalog at No Starch.

PS The publisher's costs for international shipping from the US is pretty hefty, but with the free ebooks, and if you're ordering more than one book, the prices might still beat the online bookstores even if you're shipping outside the US.

2011-11-09

Slides from OpenFest presentation

The slides from my OpenFest presentation, Why kernel space sucks, can be found here.

2011-11-04

Speaking tomorrow at OpenFest

The organizers very kindly invited me to speak at OpenFest in Sofia, Bulgaria. My talk tomorrow is entitled Why Kernel Space Sucks.

That title is of course a reference to the highly amusing presentation of a few years ago by kernel hacker Dave Jones entitled Why Userspace Sucks (MagicPoint presentation). (For the PDF of Dave's complete paper presented at Linux Symposium 2006, look here; LWN.net has a nice tl;dr summary.)

Dave's presentation was all about the ways in which various userspace systems and applications kill performance by wasting system resources on pointless tasks. I'm not contradicting anything that Dave says, but it seems at least fair to point out that there are places where kernel space sucks too. My talk is about one of those places with special interest to me--the kernel-userspace programming interface--a place where kernel developers have inflicted a steady stream of small train wrecks (to borrow Dave's term) on userspace.