Deadline: Friday, January 29, 11:00 PM Pacific Time. Note that this deadline is the same deadline as lab 0’s deadline.
To get the starter files for this lab, run the following command in your labs
directory.
$ git pull starter master
If you get an error like the following:
fatal: 'starter' does not appear to be a git repository
fatal: Could not read from remote repository.
make sure to set the starter remote as follows:
$ git remote add starter https://github.com/61c-teach/sp21-lab-starter.git
and run the original command again.
In this lab, we will be using the command line program gcc to compile programs in C. The simplest way to run gcc is as follows:
$ gcc program.c
This compiles program.c into an executable file named a.out. If you’ve taken CS61B or have experience with Java, you can kinda think of gcc as the C equivalent of javac. This file can be run with the following command:
$ ./a.out
The executable file is a.out
, so what the heck is the ./
for? Answer: when
you want to execute an executable, you need to prepend a file path in order to
distinguish your command from a command like python3. The dot refers to the “current
directory.” Incidentally, double dots (..
) would refer to the directory one
level up.
gcc
has various command line options which you are encouraged to
explore. In this lab, however, we will only be using -o
, which is used to specify
the name of the executable file that gcc
creates. You can use the following
commands to compile program.c
into a program named program
, and then run it.
This is helpful if you don’t want all of your executable files to be named a.out
.
$ gcc -o program program.c
$ ./program
For macOS users, install the Xcode command line tool by running
$ xcode-select --install
Then, you can check whether gcc is successfully installed by running
$ gcc --version
If you’re on macOS, this section is for Ubuntu/Debian WSL/Linux.
For Ubuntu/Debian WSL/Linux users, install the build-essential
package by running
$ sudo apt install build-essential cgdb valgrind
This installs many packages such as gcc
and make
, as well as the cgdb
and valgrind
debuging tools. If you’re curious, here is a detailed description of the build-essential
package as of Ubuntu 18.04.
If you’re on Ubuntu/Debian, this section is for Windows.
For Windows users, if you don’t want to use the Hive and want to develop locally, we suggest that you use Windows Subsystem for Linux. If you haven’t already, follow the instructions in the Setup for Windows Users post on Piazza. Part of these instructions include installing a C compiler in your WSL subsystem.
In this exercise, we will see an example of preprocessor macro definitions. Macros
can be a messy topic, but in general the way they work is that before a C file is
compiled, all define
macro constant names are replaced exactly with the value
they refer to. In the scope of this exercise, we will be using macro definitions
exclusively as global constants. Here we define CONSTANT_NAME
to refer to
literal_value
(an integer literal). Note that there is only a space separating
name from value.
#define CONSTANT_NAME literal_value
Now, look at the code contained in eccentric.c
. Notice the four different
examples of basic C control flow. (Think: What are they?)
First compile and run the program to see what it does. Play around with the constant values of the four macros: V0 through V3. See how changing each of them changes the program output.
Modifying only these four values, make the program produce the following output.
Berkeley eccentrics:
====================
Happy Happy Happy
Yoshua
Go BEARS!
There are actually several different combinations of macros that can give this output. Here’s the challenge for you in this exercise: consider what the minimum number of distinct values that V0 through V3 can have such that they still give this exact output. For example, the theoretical maximum is four, when they are all distinct from each other.
Stuck on how to run the program? Revisit the introduction. We’d like you to compile
the program into an executable called eccentric
; can you use the -o
flag to
do this?
A debugger, as the name suggests, is a program which is designed specifically to help you find bugs, or logical errors and mistakes in your code (side note: if you want to know why errors are called bugs, look here). Different debuggers have different features, but it is common for all debuggers to be able to do the following things:
For this exercise, you will find the GDB reference card useful.
GDB stands for “GNU De-Bugger.” Compile hello.c
with the -g
flag:
$ gcc -g -o hello hello.c
This causes gcc
to store information in the executable program for gdb
to make
sense of it. Now start our debugger, (c)gdb:
$ cgdb hello
Notice what this command does! You are running the program cgdb
on the executable file hello generated by gcc. Don’t try running cgdb
on the source code in hello.c! It won’t know what to do. If you can’t run cgdb
for some reason, try gdb
– it’s the same thing but with a different interface.
Note that (C)GDB is installed on the Hive machines by default. For this lab, we strongly recommend that you use the Hive machines. Some notes for other OSes:
cgdb
working, but you can use lldb
instead. The commands differ slightly, but there are great guides out there (like this one!) to help you get started. You can also SSH to the Hive, where everything is already set up.Step through the whole program by doing the following:
Type help from within gdb to find out the commands to do these things, or use the reference card.
Look here if you see an error message like printf.c: No such file or directory. You probably stepped into a printf function! If you keep stepping, you’ll feel like you’re going nowhere! CGDB is complaining because you don’t have the actual file where printf is defined. This is pretty annoying. To free yourself from this black hole, use the command finish to run the program until the current frame returns (in this case, until printf is finished). And NEXT time, use next to skip over the line which used printf.
In this exercise, we use cgdb to debug our programs. cgdb is identical to gdb, except it provides some extra nice features that make it more pleasant to use in practice. All of the commands on the reference sheet work in gdb.
In cgdb, you can press ESC
to go to the code window (top) and i
to return to
the command window (bottom) — similar to vim. The bottom command window is where
you’ll enter your gdb commands.
Learning these commands will prove useful for the rest of this lab, and your C
programming career in general. In the text file named answers.txt
, answer the
following questions.
Let’s see what happens if your program requires user input and you try to run GDB
on it. First, run the program defined by interactive_hello.c
to talk to an overly
friendly program.
$ gcc -g -o int_hello interactive_hello.c
$ ./int_hello
Now, we’re going to try to debug it (even though there really are no bugs).
$ cgdb int_hello
What happens when you try to run the program to completion?
We’ll be learning about a tool to help us avoid this situation. The purpose of this
exercise is to make you unafraid of running the debugger even when your program
needs user input. It turns out that you can send text to stdin
,
the file stream read by the function fgets in this silly program, with some
special characters right from the command line.
Take a look at “redirection” on this website, and see if you can figure out how to send some input to the program without explicitly providing it while it’s running (which, you might have realized, gets you stuck in CGDB). Look at this stackoverflow post for more inspiration.
Hint 1: If you’re creating a text file containing your input, you’re on the right track! Hint 2: Remember you can run things with command line args (including the redirection symbols) from CGDB as well!
Hopefully you’ll appreciate how redirection helps you avoid that nasty situation with CGDB. Don’t ever be afraid of the debugger! We know it looks kind of nasty, but it’s there to help you.
Note: Make sure you complete Exercise 3 before starting this part.
While input redirection is useful, output redirection is perhaps more so. The program primes.c
is designed to print out all the prime numbers less than 1,000,000. Unfortunately, there may be a few bugs…
In order to use our output later, we need to send our output to a file, instead of printf-ing to the terminal. At the same time, we may also want to send some debugging information to the console. The function fprintf
comes in handy for this, as it allows you to print to different datastreams.
In particular, most programs have access to two different output streams: stdout
(Standard Output), and stderr
(Standard Error). By default, both stdout
and stderr
send their output to terminal, but with redirection, the two outputs can be sent to different files. (Note: printf
has the same behavior as fprintf
to stdout
)
answers.txt
, write the terminal command used to send output to a file named primenumbers.txt
primes.c
so that the following behavior is achieved when you run the command in 1:
n% complete
, where n goes from 1 to 99, after every percent complete (Note that we do not expect a “100% complete” message). The exact timing of this doesn’t matter, as long as a correct status message is sent at about the right time.primenumbers.txt
. Note that this takes a few minutes to run; this would be a good time to get up, get some water, and engage in light self-care.There are a few bugs in the starter code that you will need to fix in order for your code to work. It is a good idea to first set up the reporting, then use that to debug your code. In order to autograde your code, we have added a command line argument that modifies how many numbers are checked for primality. This is only for testing your code; do not use it in your command in answers.txt. To compile your code, use
$ gcc -o primes primes.c
Even with a debugger, we might not be able to catch all bugs. Some bugs are what we refer to as “bohrbugs”, meaning they manifest reliably under a well-defined, but possibly unknown, set of conditions. Other bugs are what we call “heisenbugs”, and instead of being determinant, they’re known to disappear or alter their behavior when one attempts to study them. We can detect the first kind with debuggers, but the second kind may slip under our radar because they’re (at least in C) often due to mis-managed memory.
Remember that unlike other programming languages, C requires you (the programmer) to manually manage your memory. We’ll cover this more later this week, but this is all you’ll need to know for now.
To help catch these “heisenbugs” we will use a tool called Valgrind. Valgrind is a program which emulates your CPU and tracks your memory accesses. This slows down the process you’re running (which is why we don’t, for example, always run all executables inside Valgrind) but also can expose bugs that may only display visible incorrect behavior under a unique set of circumstances.
Note: Valgrind is available for install on most Unix-like distros. Many students have reported compatibility issues between Valgrind and recent versions of macOS. If you cannot get a local install to work, we recommend that you use the Hive machines for C development; these tools will become incredibly helpful as you work on more C assignments (Project 1 & 4!).
In this exercise we are going demonstrate two different examples of Valgrind outputs and walk through how each might be useful.
First try building two new executables, segfault_ex
from segfault_ex.c
and
no_segfault_ex
from no_segfault_ex.c
(use the -o
flag from before!). At
this point you should be able to use gcc
to successfully build these executables.
Now let’s try running the executables. What outputs do you observe?
Let’s start with segfault_ex
. You should have observed a segmentation fault
(segfault), which occurs when a program crashes from trying to access memory that
is not available to it (more on this later in the course; This is actually an
artifact from early memory design. Today we work with ‘paged memory’ instead of
‘segmented memory’ but the error message remains!).
This C file is very small so you should be able to open the file and understand what is causing the segfault. Do so at this time, but do not change the file. Why does the segfault occur?
Now let’s understand what to do if we have a very large file and need to find a segfault. Here is where Valgrind is our new friend. To run the program in Valgrind use the command:
$ valgrind ./segfault_ex
This should cause Valgrind to output where the illegal access occurred. Compare
these results to what you determined by opening the file. How could Valgrind help
you address a segfault in the future?
Now try running Valgrind on no_segfault_ex
. The program should not have
crashed but there is still an issue with the file. Valgrind can help us find the
(seemingly invisible) problem.
Unfortunately here you will see that Valgrind seems to not be able to tell you exactly where the problem is occurring. Use the message provided by Valgrind to determine which variable has undefined behavior and then try to infer what must have happened (Hint: What is an uninitialized value?).
At this point we do not expect you to be familiar with sizeof
(that comes next
week!) so all we want you to get out of this section is some intuition around
where the problem likely occurred.
Hopefully after walking through this example you’ll be able to understand and answer the following:
We are introducing you to Valgrind now because it is an extremely important tool that you will want as soon as you start writing C. However to really appreciate it we will need to learn about C’s memory model, which we will do next week. After you have covered memory in lecture, come back to this lab and try answering the following questions:
no_segfault_ex
program segfault?no_segfault_ex
produce inconsistent outputs?sizeof
incorrect? How could you still use sizeof
but make the code
correct?Here’s one to help you in your interviews. In ll_cycle.c
, complete the function
ll_has_cycle()
to implement the following algorithm for checking if a singly-
linked list has a cycle.
If you want to see the definition of the node
struct, open the ll_cycle.h
header file.
Implement ll_has_cycle()
. Once you’ve done so, you can execute the following
commands to run the tests for your code. If you make any changes, make sure
to run ALL of the following commands again, in order.
$ gcc -g -o test_ll_cycle test_ll_cycle.c ll_cycle.c
$ ./test_ll_cycle
Hint: There are two common ways that students usually write this function. They differ in how they choose to encode the stopping criteria. If you do it one way, you’ll have to account for a special case in the beginning. If you do it another way, you’ll have some extra NULL checks, which is OK. The previous 2 sentences are meant to urge you to not stress over cleanliness. If they don’t help you, just ignore them. The point of this exercise is to make sure you know how to use pointers.
Here’s a Wikipedia article on the algorithm and why it works. Don’t worry about it if you don’t completely understand it. We won’t test you on this.
By the way, the pointers are called “tortoise” and “hare” because the tortoise pointer is incremented slowly (like a tortoise, which moves slowly) and the hare pointer is incremented quickly (twice as fast as the tortoise; like a hare, which moves quickly).
As a closing note, the story of the tortoise and the hare is always relevant, especially in CS61C. Writing your C programs slowly and steadily, using debugging programs like CGDB, is what will win you the race.
Please submit to the Lab01: Number Rep, C, and CGDB assignment.
Note that the autograder for the written answers is very simple. Make sure that:
answers.txt
file start with the answer number (e.g.
1. answer
), or are section lines.command arg
, only put command
in the gdb.txt
file.