Unix & Shell Programming Lab Manual
Unix & Shell Programming Lab Manual
PROGRAMMING LAB
MANUAL
II B. Tech I Semester
CONTENTS
Lab Objective 3
Guidelines 4
List of Lab Exercises 6
Basic UNIX Commands 9
UNIX Command Exercises 18
Solutions to Exercise 20
Week – 1 22
Week – 2 23
Week – 3 24
Week – 4 25
grep Exercise 26
sed Exercise 27
awk Exercise 29
Week – 5 30
Week – 6 31
Week – 7 32
Week – 8 33
Week – 9 35
Shell Programming Exercises 36
Week – 10 37
Week – 11 41
Week – 12 45
Bibliography 49
LAB OBJECTIVE
Upon successful completion of this Lab the student will be able to:
1. Demonstrate how to use the following Bourne Shell commands: cat, grep, ls,
more, ps, chmod, finger, ftp, etc.
2. Use the following Bourne Shell constructs: test, if then, if then else, if then
elif, for, while, until, and case.
3. Learn tracing mechanisms (for debugging), user variables, BourneShell
variables, read-only variables, positional parameters, reading input to a
BourneShell script, command substitution, comments, and exporting
variables. In addition, test on numeric values, test on file type, and test on
character strings are covered.
4. Copy, move, and delete files and directories
5. Write moderately complex Shell scripts.
GUIDELINES TO STUDENTS
There are two ways you can execute your shell scripts. Once you have created a script
file:
Method 1
Pass the file as an argument to the shell that you want to interpret your script.
For example, the script file show has the following lines
Step 2 : To run the script, pass the filename as an argument to the sh (shell )
$ sh show
Here is the date and time
Sat jun 03 13:40:15 PST 2006
Method 2:
Make your script executable using the chmod command.
When we create a file, by default it is created with read and write permission turned
on and execute permission turned off. A file can be made executable using chmod.
For example, the script file show has the following lines
$ show
Here is the date and time
Sat jun 03 13:40:15 PST 2006
Step 1 : Use an editor, such as vi, ex, or ed to write the program. The name of the file
containing the program should end in .c.
main()
{
printf(“ welcome to SCET “);
}
If the program is okay, the compiled version is placed in a file called show.out
$ show.out or ./show
Welcome to SCET
WEEK1
Session 1
Session 2
WEEK2
WEEK3
e) Use the date and who commands in sequence ?(in one line) such that the
output of date will display on the screen and the output of who will be
redirected to a file called my file2.Use the more command to check the
contents of myfile2.
a) write a sed command that deletes the first character in each line in a file
b) write a sed command that deletes the character before the last character in
each line in a file.
c) Write a sed command that swaps the files and second words in each line in a
file
WEEK4
a) pipe ur /etc/passwd file to awk and print out the home directory of each user.
b) Develop an interactive grep script that asks for a word and a file name and
then tells how many lines contain that word
c) Repeat
d) Part using awk
WEEK5
a) Write A shell script that takes a command –line argument and reports on whether it
is directry ,a file,or something else
b) Write a shell script that accepts one or more file name as a arguments and converts
all of thenm to uppercase,provided they exits in the current directory
c) Write a shell script that determines the period for which a specified user is working
on the system
WEEK6
a) write a shell script that accepts a file name starting and ending line numbers as
arguments and displays all the lines between the given line numbers
b) write a shell script that deletes all lines containing a specified word I one or
more files supplied as arguments to it.
WEEK7
a) Write a shell script that computes the gross salary of a employee according to the
following
1) if basic salary is <1500 then HRA 10% of the basic and DA =90% of the basic
2) if basic salary is >1500 then HRA 500 and DA =98% of the basic
The basic salary is entered interactively through the key board
b) Write a shell script that accepts two integers as its arguments and computes
the value of first number raised to the power of the second number
WEEK 8
a) Write an interactive file handling shell program. Let it offer the user the choice
of copying ,removing ,renaming or linking files. Once the use has made a
Department of Computer Science & Engineering 7
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
choice, have the program ask the user for necessary information, such as the
file name ,new name and so on.
b) Write a shell script that takes a login name as command –line argument and
reports when that person logs in
c) Write a shell script which receives two files names as arguments. It should
check whether the two file contents are same or not. If they are same then
second file should be deleted.
WEEK 9
a) Write a shell script that displays a list of all files in the current directory to
which the user has read write and execute permissions
b) Develop an interactive script that asks for a word and file name and then tells
how many times that word occurred in the file.
c) Write a shell script to perform the following string operations.
WEEK 10
Write a C program that takes one or more file or directory names as command line
input and reports the following information on the file.
1) file type
2) number of links
3) read, write and execute permissions
4) time of last access
WEEK 11
WEEK 12
Command CAT
Syntax cat [argument] [specific file]
cat /etc/profile
Command pwd
Syntax pwd
ls -a
ls -l
ls -al
ls -al /usr
ls -ld /usr
Rather than list the files contained in the /usr directory, this
command lists information about the /usr directory itself
(without generating a listing of the contents of /usr). This is
very useful when you want to check the permissions of the
directory, and not the files the directory contains.
Command mv
Syntax mv [options] sources target
mv Chapter1 garbage
mv Chapter1 /tmp
mv tmp tmp.old
-f, --force
ignore nonexistent files, never prompt
-i, --interactive
prompt before any removal
-v, --verbose
explain what is being done
rm *.html
rm index*
rm -r new-novel
Command cp
Syntax cp [options] file1 file2
cp /usr/fred/Chapter1 .
cp /usr/fred/Chapter1 /usr/mary
Command grep
Syntax grep [options] regular expression [files]
grep 'joe' *
Command mkdir
Syntax mkdir [options] directory name
mkdir /usr/fred/tmp
mkdir -p /home/joe/customer/acme
Command rmdir
Syntax rmdir [options] directories
Description The "rm" command is used to remove files and
directories. (Warning - be very careful when
removing files and directories!)
Examples rm Chapter1.bad
rm *.html
rm index*
rm -r new-novel
cd /usr/fred
cd /u*/f*
cd
cd -
Description kill ends one or more process IDs. In order to do this you
must own the process or be designated a privileged user. To
find the process ID of a certain job use ps.
Examples
Command ps
Syntax ps [options]
ps -f
ps -e
ps -ef
ps -ef | more
ps -fu fred
mkdir adir
3. List the files in the current directory to verify that the directory adir has been
made correctly.
10. List the contents of both testfile and secondfile to the monitor screen.
14. Use the "bang" command to re-run the command that verified that testfile has been
deleted.
16. Issue the command to find out how large thefile is. How big is it?
20. Copy thefile from your home directory to the current directory.
21. Verify that thefile has been copied from your home directory to the current
directory.
27. Remove the directory adir from your home directory with the following
command.
rmdir adir
28. Verify that thefile and adir are gone from your home directory.
1. pwd
2. mkdir adir
3. ls
4. cd adir
5. pwd
6. ls
8. cp testfile secondfile
9. ls
11. rm testfile
12. ls
13. clear
14. !l
16. ls -l
18. rm thefile
19. ls
21. ls
22. cd ..
23. pwd
24. ls
25. rm thefile
28. ls
WEEK1
Session 1
Sol:
$ vi
~ Unix is Case Sensitive
~ Never leave the Computer without logging out when you are working in
a time sharing or network environments.
Type <Esc>
: wq myfile
$
Session 2
1. Log into the system
2. Open the file created in session 1
3. Add some text
4. Change some text
5. delete some text
6. Save the changes
7. Logout of the system
Sol:
$ login: <user name>
$ password: ******
$ vi myfile
: wq
WEEK2
Sol:
WEEK3
Sol:
WEEK4
pipe ur /etc/passwd file to awk and print out the home directory of each user.
Develop an interactive grep script that asks for a word and a file name and
then tells how many lines contain that word
Repeat
Part using awk
Solutions:
I/P:
1 Clothing 3141
1 Computers 9161
1 Textbooks 21312
2 Clothing 3252
2 Computers 1232
2 Supplies 2242
2 Text books 15462
O/P:
2 Computers 1232
GREP EXERCISE
Create the file grepdata.txt with the following data and then write a series of grep
statements that do the following:
Write grep statements that use command-line options along with the pattern to do the
following:
SED EXERCISE
<article>
<title>About the Web</title>
<para>
This is an article about the World Wide Web.
The World Wide Web is a collection of documents that are linked to
one another. The Web is <emphasis>not</emphasis> the same as the
Internet. The Internet is a world-wide network of networks, and it
does far more than simply serve up Web pages.
</para>
<para>
Web pages are written in a markup language called HTML. Here is what
it
looks like. The < and > mark off elements.
</para>
<listing>
<body>
<div id="top-navig">
<a id="top"></a>
<a href="index.html">CIT 040 Index</a>
&gt;
Assignment 1
</div>
<h1>Assignment 1</h1>
<p>This exercise shows you how to use the two computer
environments that
you will use in this class. You will:</p>
<ol class="upper-roman">
<li>Set up your directories on Windows. This is
where you will write your HTML documents.</li>
</ol>
</listing>
will become
Note: you must do these operations in the order shown above; otherwise, you
will get the wrong results!
AWK EXERCISE
1.
Tom,Red,5,17,22
Joe,Green,3,14,22
Maria,Blue,6,18,21
Fred,Blue,2,15,23
Carlos,Red,-1,15,24
Phuong,Green,7,19,21
Enrique,Green,3,16,20
Nancy,Red,9,12,24
Write an awk script that will compute the average score for every person in the list,
the average score for each test, and the average score for each team. If a score is
negative, that means the person missed the test, and the score must not become part of
the average.
2.
a. Print the names of those who contributed between $75 and $200 in the first
month.
b. Print the names and phone numbers of those with an average monthly
contribution greater than $200.
c. Add $10 to Chet’s second contribution and print the changed record.
d. Change Nancy McNeil’s name to Louise McInnes and print the
changed record.
WEEK5
a) Write A shell script that takes a command –line argument and reports on
whether it is directry ,a file,or something else
b) Write a shell script that accepts one or more file name as a arguments and
converts all of thenm to uppercase,provided they exits in the current directory
c) Write a shell script that determines the period for which a specified user is
working on the system
Sol:
a.
#!/bin/csh
if( -f "$argv[1]") then
echo "you have entered a regular file name"
else
if( -d "$argv[1]") then
echo "you have entered a directory file"
else
if( -l "$argv[1]") then
echo "you have entered a symbolic link file"
endif
endif
endif
b.
#!/bin/csh
set c = 1
set x = $#argv
while( $x != 0)
tr '[a-z]' '[A-Z]' <$argv[$c]
@ c = $c + 1
@ x = $x - 1
End
WEEK6
(a) Write a shell script that accepts a file name starting and ending line
numbers as arguments and displays all the lines between the given line
numbers
(b) Write a shell script that deletes all lines containing a specified word I one
or more files supplied as arguments to it.
Sol:
a.
#!/bin/csh
head -$argv[3] $argv[1] | tail -n $argv[2]
b.
#!/bin/csh
grep -v $argv[1] $argv[2]
WEEK7
a) Write a shell script that computes the gross salary of a employee according to
the following
1) if basic salary is <1500 then HRA 10% of the basic and DA =90% of the
basic
2) if basic salary is >1500 then HRA 500 and DA =98% of the basic
The basic salary is entered interactively through the key board
(b)Write a shell script that accepts two integers as its arguments and
computes the value of first number raised to the power of the second number
a.
b.
#!/bin/csh
set c = 1
set result = 1
while($c <= $argv[2])
@ result *= $argv[1]
@ c = $c + 1
end
echo "$argv[1] raised to the power of $argv[2]=$result"
WEEK 8
(a) Write an interactive file handling shell program. Let it offer the user the
choice of copying ,removing ,renaming or linking files. Once the use has
made a choice, have the program ask the user for necessary information,
such as the file name ,new name and so on.
(b) Write a shell script that takes a login name as command –line argument
and reports when that person logs in
(c) Write a shell script which receives two files names as arguments. It should
check whether the two file contents are same or not. If they are same then
second file should be deleted.
Sol:
a.
#!/bin/csh
echo "MENU"
echo "1.FILE COPYING"
echo "2.FILE RENAMING"
echo "3.FILE REMOVING"
echo "4.FILE LINKING"
echo "ENTER YOUR CHOICE"
set choice = $<
switch ($choice)
case 1:
echo "enter the source file name"
set source = $<
echo "enter the target file name"
set target = $<
if( -f $source ) then
cp $source $target
echo "file copied successfully"
else
echo "source file doesnot exist"
endif
breaksw
case 2:
echo "enter the source file to rename"
set source = $<
echo "enter the new name for the source file"
set target = $<
mv $source $target
echo "file renamed succeessfully"
breaksw
case 3:
echo "enter the source file to remove"
set source = $<
Department of Computer Science & Engineering 33
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
rm $source
echo "file removed successfully"
breaksw
case 4:
echo "enter the source file to provide link"
set source = $<
echo "enter the link name for the source file"
set target = $<
link $source $target
echo "file linked successfully"
breaksw
echo "file linked succeessfully"
breaksw
deefault:
echo " you entered wrong choice"
endsw
b.
#!/bin/csh
echo "the user $argv[1] is logged on to the sytem on"
who|grep "$argv[1]"| cut -c22-38
c.
#!/bin/ksh
if(cmp $1 $2)
then
print "the two files are identical"
rm $2
print "Now $2 is deleted"
else
print "the two files are different"
fi
WEEK 9
(a) Write a shell script that displays a list of all files in the current directory
to which the user has read write and execute permissions
(b) Develop an interactive script that asks for a word and file name and then
tells how many times that word occurred in the file.
(c) Write a shell script to perform the following string operations.
1) To extract a sub string from a given string
2) To find the length of a given string
(a) PROGRAM
#!/bin/csh
ls -l|grep '^.rwx'
(b) PROGRAM
#!/bin/bash
read -p "Enter a file name : " fn
if test -f $fn
then
echo "The contents of the file $fn is :"
cat $fn
echo "No. of Line : `wc -l $fn`"
echo "No. of Words : `wc -w $fn`"
echo "No. of Characters: `wc -c $fn`"
else
echo "$fn is not exists or not a file"
fi
(c) PROGRAM
#!/bin/ksh
print "MENU"
print "1.TO EXTRACT A SUBSTRING FROM AGIVEN STRING"
print "2.TO FIND THE LENGTH OF THE STRING"
print "ENTER YOUR CHOICE"
read choice
print "enter a string"
read string
case $choice in
1) print "enter position1"
read pos1
print "enter position2"
read pos2
print "the extracted substring from $pos1 to $pos2 of $string is"
print $string|cut -c$pos1-$pos2;;
2) print the length of the string $string is
c=$(print $string|wc -c)
Department of Computer Science & Engineering 35
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
((ch=c-1))
print $ch number of characters;;
*) print " wrong choice ";;
esac
1. Write a simple shell script that takes any number of arguments on the
command line, and prints the arguments with “Hello ” in front. For example, if
the name of the script is hello, then you should be able to run it like this:
4. Write a script which reads a number in units of seconds and converts it to the
units hours:minutes:seconds and prints the result to standard output. Your
script must prompt for re-input if a negative value is input
5. Suppose that the script you wrote for question 2 is called jot. Then run it
calling sh yourself. Notice the difference:
sh jot 2 5
sh -v jot 2 5
sh -x jot 2 5
$ calculate 2 12 5 2
The value of "2*20 - 12*2 + 5/2" is 18
WEEK 10
Write a C program that takes one or more file or directory names as command
line input and reports the following information on the file.
1. file type
2. number of links
3. read, write and execute permissions
4. time of last access
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/mkdev.h>
#include <stdio.h>
char *typeOfFile(mode_t);
char *permOfFile(mode_t);
void outputStatInfo(char *, struct stat *);
int
main(int argc, char **argv)
{
char *filename;
struct stat st;
/*
* For each file on the command line...
*/
while (--argc) {
filename = *++argv;
/*
* Find out about it.
*/
if (lstat(filename, &st) < 0) {
perror(filename);
putchar('\n');
continue;
}
/*
* Print out the information.
*/
outputStatInfo(filename, &st);
putchar('\n');
}
exit(0);
Department of Computer Science & Engineering 37
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
/*
* outputStatInfo - print out the contents of the stat structure.
*/
void
outputStatInfo(char *filename, struct stat *st)
{
printf("File Name: %s\n", filename);
printf("File Type: %s\n", typeOfFile(st->st_mode));
/*
* If the file is not a device, print its size and optimal
* i/o unit; otherwise print its major and minor device
* numbers.
*/
if (((st->st_mode & S_IFMT) != S_IFCHR) &&
((st->st_mode & S_IFMT) != S_IFBLK)) {
printf("File Size: %d bytes, %d blocks\n", st->st_size,
st->st_blocks);
printf("Optimum I/O Unit: %d bytes\n", st->st_blksize);
}
else {
printf("Device Numbers: Major: %u Minor: %u\n",
major(st->st_rdev), minor(st->st_rdev));
}
/*
* Print the permission bits in both "ls" format and
* octal.
*/
printf("Permission Bits: %s (%04o)\n", permOfFile(st->st_mode),
st->st_mode & 07777);
/*
* Print the major and minor device numbers of the
* file system that contains the file.
*/
printf("File System Device: Major: %u Minor: %u\n",
major(st->st_dev), minor(st->st_dev));
/*
* Print the access, modification, and change times.
* The ctime() function converts the time to a human-
* readable format; it is described in Chapter 7,
Department of Computer Science & Engineering 38
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
/*
* typeOfFile - return the english description of the file type.
*/
char *
typeOfFile(mode_t mode)
{
switch (mode & S_IFMT) {
case S_IFREG:
return("regular file");
case S_IFDIR:
return("directory");
case S_IFCHR:
return("character-special device");
case S_IFBLK:
return("block-special device");
case S_IFLNK:
return("symbolic link");
case S_IFIFO:
return("FIFO");
case S_IFSOCK:
return("UNIX-domain socket");
}
return("???");
}
/*
* permOfFile - return the file permissions in an "ls"-like string.
*/
char *
permOfFile(mode_t mode)
{
int i;
char *p;
static char perms[10];
p = perms;
strcpy(perms, "---------");
/*
* The permission bits are three sets of three
* bits: user read/write/exec, group read/write/exec,
* other read/write/exec. We deal with each set
Department of Computer Science & Engineering 39
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
/*
* Put special codes in for set-user-id, set-group-id,
* and the sticky bit. (This part is incomplete; "ls"
* uses some other letters as well for cases such as
* set-user-id bit without execute bit, and so forth.)
*/
if ((mode & S_ISUID) != 0)
perms[2] = 's';
return(perms);
}
WEEK 11
a.
/*
** Enter here
*/
if (argc < 3)
help("Not enough parameters");
/*
** Handle cases where target is a directory
*/
if (strrchr(argv[src], '\\'))
strcat(target, strrchr(argv[src], '\\') + 1);
else if (argv[src][1] == ':')
strcat(target, argv[src] + 2);
else strcat(target, argv[src]);
/*
** Nothing left except 2 explicit file names
*/
else if (argc == 3)
errcount += mv(argv[1], argv[2]);
return errcount;
}
b.
#defineBSIZE 512
#include <stdio.h>
#include <sys/types.h>
#include <sys/stat.h>
struct stat stbuf1, stbuf2;
char iobuf[BSIZE];
main(argc, argv)
char *argv[];
Department of Computer Science & Engineering 42
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
{
register i, r;
if (argc < 3)
goto usage;
if (argc > 3) {
if (stat(argv[argc-1], &stbuf2) < 0)
goto usage;
if ((stbuf2.st_mode&S_IFMT) != S_IFDIR)
goto usage;
}
r = 0;
for(i=1; i<argc-1;i++)
r |= copy(argv[i], argv[argc-1]);
exit(r);
usage:
fprintf(stderr, "Usage: cp: f1 f2; or cp f1 ... fn d2\n");
exit(1);
}
copy(from, to)
char *from, *to;
{
int fold, fnew, n;
register char *p1, *p2, *bp;
int mode;
if ((fold = open(from, 0)) < 0) {
fprintf(stderr, "cp: cannot open %s\n", from);
return(1);
}
fstat(fold, &stbuf1);
mode = stbuf1.st_mode;
/* is target a directory? */
if (stat(to, &stbuf2) >=0 &&
(stbuf2.st_mode&S_IFMT) == S_IFDIR) {
p1 = from;
p2 = to;
bp = iobuf;
while(*bp++ = *p2++)
;
bp[-1] = '/';
p2 = bp;
while(*bp = *p1++)
if (*bp++ == '/')
bp = p2;
to = iobuf;
}
if (stat(to, &stbuf2) >= 0) {
if (stbuf1.st_dev == stbuf2.st_dev &&
stbuf1.st_ino == stbuf2.st_ino) {
Department of Computer Science & Engineering 43
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
WEEK 12
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/mkdev.h>
#include <dirent.h>
#include <stdio.h>
char typeOfFile(mode_t);
char *permOfFile(mode_t);
void outputStatInfo(char *, char *, struct stat *);
int
main(int argc, char **argv)
{
DIR *dp;
char *dirname;
struct stat st;
struct dirent *d;
char filename[BUFSIZ+1];
/*
* For each directory on the command line...
*/
while (--argc) {
dirname = *++argv;
/*
* Open the directory.
*/
if ((dp = opendir(dirname)) == NULL) {
perror(dirname);
continue;
}
printf("%s:\n", dirname);
/*
* For each file in the directory...
*/
while ((d = readdir(dp)) != NULL) {
/*
* Create the full file name.
*/
sprintf(filename, "%s/%s", dirname, d->d_name);
/*
* Find out about it.
*/
if (lstat(filename, &st) < 0) {
perror(filename);
putchar('\n');
continue;
}
/*
* Print out the information.
*/
outputStatInfo(filename, d->d_name, &st);
putchar('\n');
}
putchar('\n');
closedir(dp);
}
exit(0);
}
/*
* outputStatInfo - print out the contents of the stat structure.
*/
void
outputStatInfo(char *pathname, char *filename, struct stat *st)
{
int n;
char slink[BUFSIZ+1];
/*
* Print the number of file system blocks, permission bits,
* number of links, user-id, and group-id.
*/
printf("%5d ", st->st_blocks);
printf("%c%s ", typeOfFile(st->st_mode), permOfFile(st->st_mode));
printf("%3d ", st->st_nlink);
printf("%5d/%-5d ", st->st_uid, st->st_gid);
/*
* If the file is not a device, print its size; otherwise
* print its major and minor device numbers.
*/
if (((st->st_mode & S_IFMT) != S_IFCHR) &&
((st->st_mode & S_IFMT) != S_IFBLK))
printf("%9d ", st->st_size);
else
Department of Computer Science & Engineering 46
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
/*
* Print the access time. The ctime() function is
* described in Chapter 7, "Time of Day Operations."
*/
printf("%.12s ", ctime(&st->st_mtime) + 4);
/*
* Print the file name. If it's a symblic link, also print
* what it points to.
*/
printf("%s", filename);
/*
* typeOfFile - return the letter indicating the file type.
*/
char
typeOfFile(mode_t mode)
{
switch (mode & S_IFMT) {
case S_IFREG:
return('-');
case S_IFDIR:
return('d');
case S_IFCHR:
return('c');
case S_IFBLK:
return('b');
case S_IFLNK:
return('l');
case S_IFIFO:
return('p');
case S_IFSOCK:
return('s');
}
return('?');
}
/*
* permOfFile - return the file permissions in an "ls"-like string.
Department of Computer Science & Engineering 47
SCET UNIX & SHELL PROGRAMMING LAB MANUAL
*/
char *
permOfFile(mode_t mode)
{
int i;
char *p;
static char perms[10];
p = perms;
strcpy(perms, "---------");
/*
* The permission bits are three sets of three
* bits: user read/write/exec, group read/write/exec,
* other read/write/exec. We deal with each set
* of three bits in one pass through the loop.
*/
for (i=0; i < 3; i++) {
if (mode & (S_IREAD >> i*3))
*p = 'r';
p++;
/*
* Put special codes in for set-user-id, set-group-id,
* and the sticky bit. (This part is incomplete; "ls"
* uses some other letters as well for cases such as
* set-user-id bit without execute bit, and so forth.)
*/
if ((mode & S_ISUID) != 0)
perms[2] = 's';
return(perms);
}
BIBLIOGRAPHY
5. UNIX Shell Programming, 4th Edition , Lowell Jay Arthur, Ted Burns
7. The UNIX Operating System, 3rd Edition, by Kaare Christian, Susan Richter