Courses/Computer Science/CPSC 457.F2013/Lecture Notes/Prog2Proc

We will begin today where we left off: considering the set of tools available for telling us about programs and their transformation from source code to binary artifacts. We will continue our examination of a program as an ELF binary (a key part of the ABI) and then move to examining the state of a machine in terms of all the processes it is running.

We also examine the silly program and why it might produce different answers.

Notes (we may or may not get to all of these topics today)
 * command line demo
 * silly program
 * hello world program
 * man
 * ps
 * pstree
 * top
 * kill
 * strace
 * objdump
 * readelf

Scribe Notes
 * s1
 * s2
 * s3

Readings

The reading for tonight should help lay the groundwork for our discussion of the x86 machine environment, assembly programming, and the invocation of system calls.


 * A Tiny Guide to Programming in 32-bit x86 Assembly Language
 * A Whirlwind Tour on Creating Really Teensy ELF Executables for Linux
 * MOS: 1.3: Computer Hardware Review
 * MOS: 1.6: System Calls
 * MOS: 1.7: Operating System Structure