For homework #0, you will fetch a source distribution that we have prepared. Next, you will trivially modify a simple hello world C application, use make to compile it, and run it to learn the magic code. You will also run a tool that checks your code for memory leaks. Finally, you will package up and submit your code. As you can probably tell, the real goal of this homework is to make sure that all of the course infrastructure is working for you.

Part A: fetch the code

For this quarter, you’ll fetch code from the course web site. The code is packaged as a “gzip’ed tar archive” so you’ll need to un-gzip and un-tar it to produce your working directory. Once you’ve done that, you’ll have the homework files and can edit them locally until ready to turn them in. We’ll use the course drop box for turn-in.

You may want to use some source control system to help manage your files, and to provide a crude form of backup for them. One option is git. For details on how to access a repository once you’ve set it up on your CSE account, see the Version Control Systems section at the bottom of the Computing Resources for Undergrads page.

Download the tar file

Create a directory to contain your cse333 projects. Click (or right-click if needed) on this hw0.tar.gz link to download the compressed archive containing the starter code and store it in that directory.

Expand the tar file

First, have a look at what is about to happen:

$ tar tzf hw0.tar.gz
clint.py
hw0/
hw0/hello_world.c
hw0/Makefile

The files listed will be created when we expand the tar file. The paths are relative to the current working directory. So, subdirectory hw0 and the files it contains will be created in the current working directory.

$ tar xzf hw0.tar.gz
$ cd hw0

Part B: edit, compile, and run hello_world

In the hw0 directory, type make. This command will use the instructions in file Makefile to compile the hello_world application using the gcc compiler.

$ make
gcc -g -Wall -O0 -c -std=c11 hello_world.c
gcc -g -Wall -O0 -o hello_world hello_world.o

Run hello_world by typing the command ./hello_world. You should see one line of output that looks like:

$ ./hello_world
The magic code is: <xxxxx>

for some <xxxxx>. Now, edit hello_world.c using your favorite editor (e.g., emacs or vim), and change the printf so that it instead says:

$ ./hello_world
The magic word is: <xxxxx>

Execute make to rebuild, and then re-run hello_world to make sure it does what you expect.

Part C: experience the gdb debugger

You’re unlikely to have any run time bugs in this homework, but let’s use the debugger so that you know what it can do. First, launch the gdb debugger.

$ gdb ./hello_world 
GNU gdb (GDB) Fedora 7.7.1-21.fc20
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from ./hello_world...done.
(gdb)

Here is a gdb session that sets a breakpoint on source line 27 of hello_world.c, prints the values of a couple of variables and an expression, prints a “backtrace” of the stack (showing the sequence of procedure calls that led to executing line 27 of hello_world.c), and then continues execution.

(gdb) b 27
Breakpoint 1 at 0x400511: file hello_world.c, line 27.
(gdb) r
Starting program: /home/auser/cse333/hw0/hello_world 

Breakpoint 1, main (argc=1, argv=0x7fffffffe0c8) at hello_world.c:27
27  printf("The magic code is: %X\n", a + b);
(gdb) p argv[0]
$1 = 0x7fffffffe394 "/home/auser/cse333/hw0/hello_world"
(gdb) p a
$2 = -889262067
(gdb) p /x a
$3 = 0xcafef00d
(gdb) p a+b
$4 = -559038737
(gdb) bt
#0  main (argc=1, argv=0x7fffffffe0c8) at hello_world.c:27
(gdb) c
Continuing.
The magic code is: <xxxxxxxx>
[Inferior 1 (process 6760) exited normally]
(gdb) q

Produce debugging information

For gdb to be useful, you must give the -g switch to gcc when compiling. The makefile we distributed does that. If you have already modified your file for part B you will see the new output message after “Continuing.”

Part D: verify you have no leaks

Throughout the quarter, we’ll also be testing whether your code has any memory leaks. We’ll be using Valgrind to do this. Try out Valgrind for yourself, to make sure you can run it:

$ valgrind --leak-check=full ./hello_world

Note that Valgrind prints out that no memory leaks were found.

Part E: check for style issues

Another requirement during the quarter is that your code must be written in good style. Although there are many opinions about what constitutes “good style”, in this course we will generally follow the Google C++ Style Guide for both C and C++ code. The distribution file for this assignment included a Python script clint.py to check C source files for style issues. Try it yourself to be sure you can run it:

$ ../clint.py hello_world.c

No style-checking tool is perfect, but you should try to clean up any problems that clint detects.

Turn in

When you’re ready to turn in your assignment, do the following:

$ ls
hello_world  hello_world.c  hello_world.o  Makefile README.TXT
$ make clean
/bin/rm -f *.o *~ hello_world
$ ls
hello_world.c  Makefile README.TXT
$ cd ..
$ tar czf hw0_<username>.tar.gz hw0
$ tar tzf hw0_<username>.tar.gz 
hw0/
hw0/hello_world.c
hw0/README.TXT
hw0/Makefile

Turn in file hw0_<username>.tar.gz using the course dropbox linked on the main cse333 web page.

For hw0, we’ll give you 3 points if you learn the magic code and correctly submit your work.