COMP 3000 Lab 1 2012

From Soma-notes
Revision as of 14:15, 17 September 2012 by Soma (talk | contribs) (→‎Part A)
  • In this lab you will be learning about the standard command shell on Linux, bash.
  • For reference material, we suggest you look at this tutorial on the shell and the associated book The Linux Command Line (available as a PDF for free and in print). You may also use other Internet resources or other people. Please cite all sources that you use to answer the questions in this assignment.
  • You should turn in Lab 1 by 10 PM on Friday, September 21 via cuLearn. Your answers should be in plain text (the true UNIX file format) or PDF. No other formats are acceptable (and will result in a zero grade until re-submitted in the correct format).

You should expect to complete Part A in tutorial.

Part A

  1. [10] What is your username on this wiki? Have a TA help you create an account.
  2. [1] What Linux distribution are you using? What version?
  3. [1] Is your Linux environment running virtualized or on bare metal? How do you know?
  4. [2] Who installed and configured your Linux environment? What level of access do you have to it?
  5. [2] A shell command can be one of four things. What are those four things? Explain very briefly.
  6. [2] On the machine you are on, in what directories are commands external to the shell stored? How can you get this information on the command line?


Processes

Each application running on a system is assigned a unique process identifier. The ps command shows the process identifiers for running processes. Each process running on the system is kept separated from other processes by the operating system. This information will be useful for subsequent questions.

Permissions

Your permission to access a file in Unix is determined by who you are logged in as. All files on the Unix file system (including directories and other special files) have three different sets of permissions. The first set of permissions denotes the allowed file operations for the owner of the file. The second set of permissions denotes the allowed file operations for a group of users. The third set of permissions denotes the allowed file operations for everyone else. A file is always owned by someone and is always associated with a group.

The ls command with the -l option can be used to show both the permissions of a file as well as the owner and group associated with the file. Permissions are listed first, followed by the owner and the group.

  1. Who is the owner of the /etc directory? (1 point)
  2. What group is associated with the /etc/shadow file? (1 point)
  3. Each user is a member of some number of groups. You can determine what groups you are part of by using the groups command. Based on the groups listed, would you be a member of the group associated with the /etc/shadow file? (1 point)

Environment

The environment on both Linux and Windows contains variable - value pairs which are useful to applications running on the system. In Linux, these environment variables can be printed on the command line by referring to the variable name prefixed with a $ sign (eg: to output the value in the HELLO environment variable, one could write echo $HELLO).

  1. On the command line, run the following two sets of commands in the bash or csh shell. Notice that the shell command will start a new shell separate from the shell that the HELLO environment variable was set in.
HELLO="Hi There"          or       set HELLO="Hi There"
bash                               csh
echo $HELLO                        echo $HELLO
exit                               exit
export HELLO="Hi There"   or       setenv HELLO "Hi There"
bash                               csh
echo $HELLO                        echo $HELLO
exit                               exit

Note: Do not put spaces on either side of the equal signs!

What does the export command seem to do? (Or, what is the difference between set and setenv?) (2 points)

Dynamic Libraries

Most applications on the system do not contain all the code that they need right within the executable. Instead, dynamic libraries are loaded into the program address space when the program loads. As an example, the standard C library, which contains such functions as printf is loaded in at run-time.

  1. Using ldd, what dynamic library dependencies does the top command have? Note that you must specify the full path to top. (1 point)
  2. In addition to the libraries listed as dependencies for the application top by ldd, there may be other libraries that the application loads dynamically at run-time. Retrieve the process number PID for the csh process (using ps) and examine the map file located at /proc/PID/maps. What other dynamic libraries have been loaded into the application while it has been running? (2 points)

Part B (take home)

Processes

  1. What is the difference between the fork and exec function in a UNIX environment? ( 1 point )
  2. What is a zombie process? ( 1 point )
  3. Give an example C program which creates a zombie process. Note that the shell by default will collect and destroy zombie processes and so you will need to avoid the shell destroying the zombie process during debugging. This can be done by delaying the parent exit (using sleep is one good way to do this). ( 2 points )
  4. Perform the modifications to your program above to avoid creating a zombie process. List the new program. ( 3 points )

Permissions

  1. Permissions on Unix are grouped into three basic file operations. What are these file operations? ( 1 point )
  2. What does it mean to have execute permission on a directory? ( 1 point )
  3. What are the 6 basic file permissions within Windows? ( 1 point )
  4. What is the difference between the write and modify file permission in Windows? ( 1 point )
  5. Because all files are stored in a directory, under UNIX permission to delete, rename, and move files is determined by the users access rights on the directory the file is contained in. What attribute on the directory prevents those who can modify a directory from deleting files (hint: help on the chmod command may prove useful). ( 1 point )
  6. In Windows, a file can be associated with more than one group and each group can have different access permissions. On Unix, each file can only belong to one group and groups cannot contain other groups (groups can only contain users). Having said that, new groups can be created by the system administrator which are supersets of other groups (e.g., to create group C with members of A and B, just add all of A's and B's members to C). Given this, is it possible to develop an access permission scenario which would be impossible to implement in Unix but possible to implement in Windows? If yes, give an example. If no, explain why. ( 1 point )

Environment

  1. What does the PATH environment variable do? PWD? ( 1 point )
  2. What environment variable tells X applications where to find the X server which it should communicate with to display the output? ( 1 point )

Dynamic Libraries

Dynamic libraries allow one copy of executable code to be used by many different processes on the system, without requiring that multiple copies of the code be stored on disk in different files. What are some problems that can arise when different programs use the same common DLLs (hint: ``DLL Hell)? ( 1 point )