COMP 3000 Lab 2 2010 Soln

From Soma-notes
Jump to navigation Jump to search

Part A (Mandatory)

Help

  1. When working in the shell, help is available on most programs in the system, especially those that are command line based. This system of help is available by using the man command. If one wanted to get help on the echo command, the associated command would be man echo. What does man stand for?
    A:Manual
  2. The man command can also be used to get help on standard C functions. Briefly (in one line), what does the C function brk do?
    A: Change data segment size
  3. How do you quit the less command?
    A: Type the q key

Shell Basics

  1. The which command can be used to figure out what directory an executable program resides in. Using this command, what directory contains the top command?
    A: /usr/X11R6/bin
  2. bash is your default shell. Which of the following is another shell that can be used instead of BASH? mv, cat, bc, tcsh, or arch
    A: tcsh
  3. The ls command can be used to get a listing of the files in a directory. What options are passed to ls to see all of the files within a directory (including hidden files)?
    A: -a
  4. The ps command is used to get a list of processes which are running on the system. Start a new shell from bash by running bash. Does the new shell replace or run in parallel with the old BASH shell? What about exec bash? You can use the ps command to determine if bash is still running.
    A: bash runs in parallel, exec bash replaces it.
  5. Because each process is started by some other process, there is a process tree structure on the system. From within your bash terminal, determine what process started BASH by using the pstree command. What graphical application can give you the same information?
    A: gnome-terminal or maybe xterm (note that other answers are possible)

Permissions

Your permission to access a file in Unix is determined by who you are logged in as. All files on the Unix file system (including directories and other special files) have three different sets of permissions. The first set permissions denotes the allowed file operations for the owner of the file. The second set of permissions denotes the allowed file operations for a group of users. The third set of permissions denotes the allowed file operations for everyone else. A file is always owned by someone and is always associated with a group.

The ls command with the -l option can be used to show both the permissions of a file as well as the owner and group associated with the file. Permissions are listed first, followed by the owner and the group.

  1. Who is the owner of the /etc directory?
    A: root
  2. What group is associated with the /etc/shadow file?
    A: shadow
  3. Each user is a member of some number of groups. You can determine what groups you are part of by using the groups command. Based on the groups listed, would you (the ``student user in the lab) be a member of the group associated with the /etc/shadow file?
    A: No

Environment

The environment on both Linux and Windows contains variable - value pairs which are useful to applications running on the system. In Linux, these environment variables can be printed on the command line by referring to the variable name prefixed with a $ sign (eg: to output the value in the HELLO environment variable, one could write echo $HELLO).

  1. On the command line, run the following two sets of commands. Notice that the bash command will start a new shell separate from the shell that the HELLO environment variable was set in.
HELLO="Hi There"
bash
echo $HELLO
exit
export HELLO="Hi There"
bash
echo $HELLO
exit

What does the export command seem to do?
A: Allow the second (child) bash process to see the environment variable.

Dynamic Libraries

Most applications on the system do not contain all the code that they need right within the executable. Instead, dynamic libraries are loaded into the program address space when the program loads. As an example, the standard C library, which contains such functions as printf is loaded in at run-time.

  1. Using ldd, what dynamic library dependencies does the top command have?
    A: linux-gate, libproc, libncurses, libc, libdl, ld-linux
  2. In addition to the libraries listed as dependencies for the application top by ldd, there may be other libraries that the application loads dynamically at run-time. Retrieve the process number PID for the bash process (using ps) and examine the map file located at /proc/PID/maps. What other dynamic libraries have been loaded into the application while it has been running?
    A: ld, nss compat, nsl, nss nis, nss files

Part B (Optional)

Processes

  1. What is the difference between the fork and exec function in a UNIX environment?
    A: fork creates a new process, exec replaces the running program in the current process with a new program.
  2. What is a zombie process?
    A: A process which has finished running but has not had it’s return value read by the person who started it yet.
  3. Give an example C program which creates a zombie process. Note that BASH by default will collect and destroy zombie processes and so you will need to avoid bash destroying the zombie process during debugging. This can be done by delaying the parent exit (using sleep is one good way to do this).
    A:
    int main() {
    if( fork() == 0 ) {
    return 0;
    }else {
    sleep( 1 );
    }
    }
  4. Perform the modifications to your program above to avoid creating a zombie process. List the new program.
    A.
    int main() {
    if( fork() == 0 ) {
    return 0;
    } else {
    wait( NULL );
    sleep( 1 );
    }
    }

Permissions

  1. Permissions on Unix are grouped into three basic file operations. What are these file operations?
    A: Read,Write, Execute
  2. What does it mean to have execute permission on a directory?
    A: Can change into the directory.
  3. What are the 6 basic file permissions within Windows?
    A:
    • Read: Allows files or folders to be opened as read-only and to be copied.
    • Write: Allows the creation of files and folders; allows data to be added to or removed from files.
    • List Folder Contents: As per Read but also allows navigation of sub-folders.
    • Read and Execute: As per Read but also allows users to run executable files.
    • Modify: All the above as well as the permission to delete the file or folder.
    • Full Control: Full Control – including the ability to change ACLs.
  4. What is the difference between the write and modify file permission in Windows?
    A:Modify allows you to delete the file or folder.
  5. Because all files are stored in a directory, under UNIX permission to delete, rename, and move files is determined by the users access rights on the directory the file is contained in. What attribute on the directory prevents those who can modify a directory from deleting files (hint: help on the chmod command may prove useful).
    A: The Sticky bit.
  6. In Windows, a file can be associated with more than one group and each group can have different access permissions. On Unix, new groups can be created by the system administrator which are super-sets of other groups. Given this, is it possible to develop an access permission scenario which would be impossible to implement in Unix but possible to implement in Windows? If yes, give an example. If no, explain why.
    A: Yes. File 1 (G1-R), File 2 (G2-R), File 3 (G1-R, G2-W).

Environment

  1. What does the PATH environment variable do?
    A: Dictates where to look for executable programs.
  2. What environment variable tells X applications where to find the X server which it should communicate with to display the output?
    A: DISPLAY

Dynamic Libraries

Dynamic libraries allow one copy of executable code to be used by many different processes on the system, without requiring that multiple copies of the code be stored on disk in different files. What are some problems that can arise when different programs use the same common DLLs (hint: ``DLL Hell)?
A: Different Versions of the DLL. No standard location for the DLL. Hard to determine
when no application is installed which uses the DLL.