Debian/390 from Sine Nomine Associates

2003-03-24 Thread Stephen Frazier
Last December Sine Nomine Associates put out a set of CD's that were
designed to make it easy to install Debian Linux quickly on a VM system.

I would like to talk with someone else that has used these instillation
CD's. I wish to compare experiences with them.



Stephen Frazier
Information Technology Unit
Oklahoma Department of Corrections
3400 Martin Luther King
Oklahoma City, OK 73111-4298
Tel.:  (405) 425-2549
Fax:  (405) 425-2554
email: [EMAIL PROTECTED]


Re: Oracle 9.2 on Suse 7.2 S390

2003-03-24 Thread Ulrich Weigand
David Boyes wrote:

> Historically, I guess I'm somewhat suspicious of compatibility modes
> like the mixed mode 31/64-bit stuff. None of the implementations of
> such code I've ever worked with was sufficient (DEC Alpha, Cray, HP)
> for production level reliability.  Perhaps you folks are better
> programmers...8-).

Compat mode should work well enough; some people are running a full
32-bit userland environment under a 64-bit kernel, and I think some
of the IBM middleware is actually certified for 32-bit compat layer
on SLES-7 (64-bit) for example.

If you know of specific problems, we are always happy to receive
bug reports ;-)

> I also still find that the algorithms used in Linux for buffer
> management are quite a bit less efficient than the ones used in VM --
> that's no slight to the Linux folks, it's what they have to work with

Could you be more specific here?

> If your application issues a read (either buffered or non-buffered) in
> the VM case and MDC has pre-cached the response by doing a fulltrack
> read or has previously cached the record, the response time for I/O
> completion is significantly better than going direct to disk.

Well, if the block is already in the page cache, response time will be
even more significantly better, as we save the round-trip through CP,
SIE intercepts and all ...

> Simplistic, until you consider that if the same database table
> is active for multiple database machines, you can do quite a bit of
> I/O avoidance that isn't possible in the Linux-only scenario. Net win.

As soon as you have multiple guests accessing the same disk, shared
caching will provide benefits, no arguments about that.  However, I'd
still consider shared read/write access to be a rare scenario, only
exploitable from a few specialized applications at the moment.

> You also gain the early I/O completion notification from
> virtualizing DASDFW, although that's more a hardware feature than a VM
> feature. It does have an impact on write performance in that the write
> I/O completes much more quickly, and is guaranteed via the NVRAM.

And how is that different from Linux using the DASDFW feature directly
(actually, we don't even need to do anything, the hardware uses DASDFW
by default unless you specifically switch it off)?

> Is it better? Maybe not. It does however give you a lot more knobs to
> manipulate the performance of the process. I'm of the opinion that the
> I/O optimization code in VM has had more time to get optimized, and I
> find that to be more tunable than the Linux code.

It is true that the Linux philosophy generally views lots of tuning
knobs with suspicion -- the system is supposed to tune itself, with
the existing knobs having more something of a debugging function.

Is there anything specific you'd like to be able to tune but cannot?

> It also has some
> very inspired hardware feature exploitation code in in that Linux
> hasn't inherited yet.  Time will tell -- you've got plenty of work to
> keep you busy nights...8-).

Is there anything specific you have in mind?  (Things that are applicable
to modern storage subsystems -- we are not particularly interested in
supporting all the quirks of real 3390 devices at this point ...)


Bye,
Ulrich

--
  Dr. Ulrich Weigand
  [EMAIL PROTECTED]


cpio behaviour between sles7 & sles8

2003-03-24 Thread Little, Chris
is there a documented difference between cpio in sles7/390 and sles8/390?
When extracting the oracle 9iR2 archive, the cpio that ships with sles8
errors with a "premature end of file".  I copied the cpio binary from sles7
and it worked fine.


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Peter J. Farley III
At 11:42 AM 3/24/03 -0600, you wrote:

>Having a vast array to choose from and loading one at a time ... THAT
>might be palatable. In fact,  it would be truly spiffy if some user-
>space program could take IBM-defined binary translation files and do
>the right thing to the kernel's console driver from that spec,  one
map
>at a time.
That's actually what I meant to suggest.  A loadable module for
translation, selected by the kernel code at boot time based on the
actual or virtual hardware that is the console.  Or loaded via startup
script via insmod if necessary.
Whether existing IBM binary translation files are the ones that should
be used is a subject I'll leave to you and others to argue.  I just
want a well-defined translation that "just works" no matter whether
it's real iron, VM or hercules.
BTW, further testing on my part shows that at least two of the
EBCDIC-unique characters do not display at all on the hercules console
even with codepage 437/500 enabled -- cent sign and PL/1 not sign.  Are
these even available on a "real iron" HMC?
These are obviously not critical or even necessarily useful for
emergency programming at the HMC, so I really don't care that they
don't show up.  Plus, that could be a hercules issue and not a linux
issue, I haven't isolated who's doing what to whom there yet.

>Right.   But accurate scripting in an emergency
>does not also require that the translate table be symmetric.
>You get input translated correctly from a number of possible
>reference code pages.   If the output does not match,
>the operator can figure out what is happening from the context.
>Again,  this is for the emergency,  not for  "production".
>(But avoid HMC for production work anyway,  as IBM recommends.)
Figuring it out from the context can be a real PITA, even if you think
you know what you're doing.  It's hard enough to get it right without
such complications.
>>  >Here too,  a switch after the fact would be reasonable.
>>
>> ??? After which fact?  You lost me here.
>
>I mean that you could load a symmetrical table later on,
>after the emergency has passed.
I don't necessarily ask for a symmetrical table, just that all the
characters be correctly input fro the keyboard and displayed on the
console.  If an asymmetrical table accomplishes that, it's OK by me.
It *would* be nice if these console codepages were documented in a man
page or info file somewhere, and not require venturing into the kernel
source to resolve a simple question.  Then hercules developers would be
able to tailor their translation to what the kernel needs/wants (using
OSTAILOR LINUX, for instance).
Thanks for your insight on this.  It's been very informative.
-
Peter J. Farley III ([EMAIL PROTECTED])


Re: Read-Only Telnet

2003-03-24 Thread Scott Chapman
I don't think anybody has mentioned it, so...

Could you just set up Apache to follow symlinks, and allow directory
listings and then create symlinks to the directories that the developers
need access to?  Then a simple refresh in the browser gets the updated
file.

Note: I haven't actually done this myself, but from my little experience
with Apache it seems like it would at least be possible.  And it seems like
there could be security exposures here too if you let anybody read the
system log.  Of course if we were talking about Websphere under OS/390
you'd have the MVSDS service and you could make people logon with their
RACF user id and password to use MVSDS and then they could only see the
datasets they were permitted to.  As you pointed out, the security model in
*nix leaves a bit to be desired.  (Or perhaps several bits.)

Scott Chapman





  Jeremy Warren
  <[EMAIL PROTECTED]To:   [EMAIL PROTECTED]
  om>  cc:
  Sent by: Linux onSubject:  Re: Read-Only Telnet
  390 Port
  <[EMAIL PROTECTED]
  IST.EDU>


  03/24/03 01:32 PM
  Please respond to
  Linux on 390 Port






> So the first question is: what do they need shell access for? do they
> need full shell access?
>
> * What do they need to run? Is it a something from certain set of
>   commands? If so: take a look at rbash, pdmenu, and similar.

The prime example that the developers keep bringing up is along these
lines:
User A calls in a problem which working with the app via their browser.The
developer wants to ssh into the host and issue a tail -f logfile while the
user is doing their thing to better understand the sequence of events
causing the problem.  With the current FTP method, it becomes difficult to
completely correlate User Action A with Log message B, especially if their
are other folks working just fine at the time.  rbash was one of the ones
that came up in my searches after your earlier post, but I haven't really
had time just yet to delve deeper into just how restricted, "restricted"
is.  (Specifically preventing the modifications of files you might
otherwise gain access to via world permissions).

> Generally a shell user is not supposed to be able to harm the system in
> any way

I frankly feel pretty good about the permissions elsewhere on the box,
(Famous last words) however given that I have such little control over the
permissions within this applications directories, I was hoping there was a
"safer" way.  Something that would override any "world" permissions.  In my
ideal pipe dream, not only would I be able to see "You can look but you
can't touch", but I would even be able to deny access to "You shouldn't be
here ever ever ever" types of files.  (Although the vendor appears to have
done this much right.  I should be able to do that with group permissions
right now, but it would be a nice thing to be SURE).

> Mounting the system read-only may work. But remember that some actual
> work has to be done on this system. That is: those developers need to
> actually change config files.

We have a change management process in place, so if they go in and
determine the problem requires a change, they would need to go to the
development system, make the changes and promote them as needed, so in this
case, the "Read-Only" image might be a good way of doing what I need to do.

On a side note, the security admin suggested that a different way to tackle
this might be through key-stroke auditing, we could allow the developers in
doing the best we could with permissions as they are and send a report of
what EXACTLY they did somewhere that they couldn't get to.  That way IF
someone did something bad we could at least figure out who/what/where/and
when,  (why would be a whole different can of worms).. Any suggestions down
that road would be appreciated too.

Thanks!

---
Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com




|-+>
| |   Tzafrir Cohen|
| |   <[EMAIL PROTECTED]|
| |   .ac.il>  |
| |   Sent by: Linux on|
| |   390 Port |
| |   <[EMAIL PROTECTED]|
| |   IST.EDU> |
| ||
| ||
| |   03/24/2003 12:37 |
| |   PM   |
| |   Please respond to|
| |   Linux on 390 Port|
| ||
|-+>
  >
-|

  |
|
  |   To:   [EMAIL PROTECT

Re: Read-Only Telnet

2003-03-24 Thread Steve Guthrie
You may wish to do what we have done with our application running on all
platforms, not just Linux/390.  We direct logs files out through a secure
port to one or more "log servers".  The level of detail of this action is
set by the system administrator and the log files for the application are
reviewed at one or more workstations located in one or more areas.

For secured access to the system by the administrator(s), use SSH/Telnet.
For log files, see above.  This can be done with syslog as well.

Thanks,

Steve Guthrie

-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] Behalf Of
Jeremy Warren
Sent: Monday, March 24, 2003 12:32 PM
To: [EMAIL PROTECTED]
Subject: Re: Read-Only Telnet


> So the first question is: what do they need shell access for? do they
> need full shell access?
>
> * What do they need to run? Is it a something from certain set of
>   commands? If so: take a look at rbash, pdmenu, and similar.

The prime example that the developers keep bringing up is along these
lines:
User A calls in a problem which working with the app via their browser.The
developer wants to ssh into the host and issue a tail -f logfile while the
user is doing their thing to better understand the sequence of events
causing the problem.  With the current FTP method, it becomes difficult to
completely correlate User Action A with Log message B, especially if their
are other folks working just fine at the time.  rbash was one of the ones
that came up in my searches after your earlier post, but I haven't really
had time just yet to delve deeper into just how restricted, "restricted"
is.  (Specifically preventing the modifications of files you might
otherwise gain access to via world permissions).

> Generally a shell user is not supposed to be able to harm the system in
> any way

I frankly feel pretty good about the permissions elsewhere on the box,
(Famous last words) however given that I have such little control over the
permissions within this applications directories, I was hoping there was a
"safer" way.  Something that would override any "world" permissions.  In my
ideal pipe dream, not only would I be able to see "You can look but you
can't touch", but I would even be able to deny access to "You shouldn't be
here ever ever ever" types of files.  (Although the vendor appears to have
done this much right.  I should be able to do that with group permissions
right now, but it would be a nice thing to be SURE).

> Mounting the system read-only may work. But remember that some actual
> work has to be done on this system. That is: those developers need to
> actually change config files.

We have a change management process in place, so if they go in and
determine the problem requires a change, they would need to go to the
development system, make the changes and promote them as needed, so in this
case, the "Read-Only" image might be a good way of doing what I need to do.

On a side note, the security admin suggested that a different way to tackle
this might be through key-stroke auditing, we could allow the developers in
doing the best we could with permissions as they are and send a report of
what EXACTLY they did somewhere that they couldn't get to.  That way IF
someone did something bad we could at least figure out who/what/where/and
when,  (why would be a whole different can of worms).. Any suggestions down
that road would be appreciated too.

Thanks!

---
Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com




|-+>
| |   Tzafrir Cohen|
| |   <[EMAIL PROTECTED]|
| |   .ac.il>  |
| |   Sent by: Linux on|
| |   390 Port |
| |   <[EMAIL PROTECTED]|
| |   IST.EDU> |
| ||
| ||
| |   03/24/2003 12:37 |
| |   PM   |
| |   Please respond to|
| |   Linux on 390 Port|
| ||
|-+>

>---
--|
  |
|
  |   To:   [EMAIL PROTECTED]
|
  |   cc:
|
  |   Subject:  Re: [LINUX-390] Read-Only Telnet
|

>---
--|




On Mon, Mar 24, 2003 at 11:19:42AM -0500, Jeremy Warren wrote:
> Sorry for the lack of detail...
>
> Basically,
>
> It's a 3rd party java based application, numerous configuration files,
etc,
> which are dynamically updated via the application itself.  Lots of log
> files, etc.  The users access it via a web page front end, but our
> developers are asking to get "beneath the covers" while it's runni

Re: Read-Only Telnet

2003-03-24 Thread Jeremy Warren
> So the first question is: what do they need shell access for? do they
> need full shell access?
>
> * What do they need to run? Is it a something from certain set of
>   commands? If so: take a look at rbash, pdmenu, and similar.

The prime example that the developers keep bringing up is along these
lines:
User A calls in a problem which working with the app via their browser.The
developer wants to ssh into the host and issue a tail -f logfile while the
user is doing their thing to better understand the sequence of events
causing the problem.  With the current FTP method, it becomes difficult to
completely correlate User Action A with Log message B, especially if their
are other folks working just fine at the time.  rbash was one of the ones
that came up in my searches after your earlier post, but I haven't really
had time just yet to delve deeper into just how restricted, "restricted"
is.  (Specifically preventing the modifications of files you might
otherwise gain access to via world permissions).

> Generally a shell user is not supposed to be able to harm the system in
> any way

I frankly feel pretty good about the permissions elsewhere on the box,
(Famous last words) however given that I have such little control over the
permissions within this applications directories, I was hoping there was a
"safer" way.  Something that would override any "world" permissions.  In my
ideal pipe dream, not only would I be able to see "You can look but you
can't touch", but I would even be able to deny access to "You shouldn't be
here ever ever ever" types of files.  (Although the vendor appears to have
done this much right.  I should be able to do that with group permissions
right now, but it would be a nice thing to be SURE).

> Mounting the system read-only may work. But remember that some actual
> work has to be done on this system. That is: those developers need to
> actually change config files.

We have a change management process in place, so if they go in and
determine the problem requires a change, they would need to go to the
development system, make the changes and promote them as needed, so in this
case, the "Read-Only" image might be a good way of doing what I need to do.

On a side note, the security admin suggested that a different way to tackle
this might be through key-stroke auditing, we could allow the developers in
doing the best we could with permissions as they are and send a report of
what EXACTLY they did somewhere that they couldn't get to.  That way IF
someone did something bad we could at least figure out who/what/where/and
when,  (why would be a whole different can of worms).. Any suggestions down
that road would be appreciated too.

Thanks!

---
Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com




|-+>
| |   Tzafrir Cohen|
| |   <[EMAIL PROTECTED]|
| |   .ac.il>  |
| |   Sent by: Linux on|
| |   390 Port |
| |   <[EMAIL PROTECTED]|
| |   IST.EDU> |
| ||
| ||
| |   03/24/2003 12:37 |
| |   PM   |
| |   Please respond to|
| |   Linux on 390 Port|
| ||
|-+>
  
>-|
  |
 |
  |   To:   [EMAIL PROTECTED]  
   |
  |   cc:  
 |
  |   Subject:  Re: [LINUX-390] Read-Only Telnet   
 |
  
>-|




On Mon, Mar 24, 2003 at 11:19:42AM -0500, Jeremy Warren wrote:
> Sorry for the lack of detail...
>
> Basically,
>
> It's a 3rd party java based application, numerous configuration files,
etc,
> which are dynamically updated via the application itself.  Lots of log
> files, etc.  The users access it via a web page front end, but our
> developers are asking to get "beneath the covers" while it's running.
>
> Right now I am using a restricted ftpd where then can only do "gets" from
> various directories.  That way they can pull the files back that they
need
> to look at for debugging, monitoring, etc.  The developers are
complaining
> that what they really need is "telnet/ssh" access so that they can get in
> and

Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Richard Troth
> And under VM, of course, the translation should follow the 3215 HW
> capabilities, requiring at least as many kernel tables as there could
> be legitimate "consoles" for it to talk to, I would think.  That or VM
> needs to provide an HMC virtual device (I know, that one's a lot less
> likely to get done).

Uhh...   That's not what I meant to suggest.
Having lots of kernel A/E tables might be alright as an option.
My beef was just that the default translation when talking to a
(virtual)  3215 should match the ISO 8859-1 to CP 37 v2 mapping.

I am *not* anxious to see a plethora of codepages loaded up
into the kernel to support the myriad of IBM devices out there.
It would make a lot more sense to get the default translation right
and then require emulators ('x3270' is what I use) to handle
"CP 37 v2" or at least handle CP 1047.

Having a vast array to choose from
and loading one at a time ... THAT might be palatable.
In fact,  it would be truly spiffy if some user-space program could
take IBM-defined binary translation files and do the right thing
to the kernel's console driver from that spec,  one map at a time.

>  >it is fair that console kernel codepages be asymmetrical:
 ...

> But commands from the real HMC to a linux LPAR (and by extension, from
> a hercules HMC) might well need to include any characters needed to do
> shell-level scripting in an emergency.  The translation needs to be
> accurate for those cases, I would think.

Right.   But accurate scripting in an emergency
does not also require that the translate table be symmetric.
You get input translated correctly from a number of possible
reference code pages.   If the output does not match,
the operator can figure out what is happening from the context.
Again,  this is for the emergency,  not for  "production".
(But avoid HMC for production work anyway,  as IBM recommends.)

>  >Here too,  a switch after the fact would be reasonable.
>
> ??? After which fact?  You lost me here.

I mean that you could load a symmetrical table later on,
after the emergency has passed.

-- RMT


Re: Read-Only Telnet

2003-03-24 Thread Tzafrir Cohen
On Mon, Mar 24, 2003 at 11:19:42AM -0500, Jeremy Warren wrote:
> Sorry for the lack of detail...
>
> Basically,
>
> It's a 3rd party java based application, numerous configuration files, etc,
> which are dynamically updated via the application itself.  Lots of log
> files, etc.  The users access it via a web page front end, but our
> developers are asking to get "beneath the covers" while it's running.
>
> Right now I am using a restricted ftpd where then can only do "gets" from
> various directories.  That way they can pull the files back that they need
> to look at for debugging, monitoring, etc.  The developers are complaining
> that what they really need is "telnet/ssh" access so that they can get in
> and look at the filesystem as a whole.  I realize that they "should" be
> able to do this all via FTP, but I have been told to come up with a
> solution to make this work for them.

ftp is bad to begin with, as it has trivial plaint-text authentication,
like telnet and pop3. It is no use limiting their access to the system
to restricted "guest accunts": whoever has access to those accounts
(possibly by sniffing) is able to write the configuration files of this
complex java app.

The developers want shell access. Shell access is considered problematic
because a user with a shell account is in a better position to harm the
system. However a system generally needs user in order to get something
done (sysadmins are also known to be the causes of some incidents to
systems from time to time ;-) ).

So the first question is: what do they need shell access for? do they
need full shell access?

* What do they need to run? Is it a something from certain set of
  commands? If so: take a look at rbash, pdmenu, and similar.


>
> So I guess a better way to word it would be that I am looking for a way to
> grant them read-only access to the filesystems on the host.  But Linux
> Owner/Group/World Permissions won't work since I can't really muck with
> them since they are set by the vendor.  They have certain areas which are
> validly world writeable, but where an accidental key stroke could wreak
> havoc on the app, so I need to guarantee read only to those areas.  ( I
> sure do miss RACF at times )

A standard unix shell account gives "read-only" access to the system,
except to the home directory, /tmp and a number of other places.
Generally a shell user is not supposed to be able to harm the system in
any way (though defending the system against denial-of-service from
local shell users: fork bombs and friends, takes some extra settings).
Any such method is a security hole that should yield a security-fix of a
locally-exploitable security hole.

Note that I wrote "is not supposed to" and not "is not". You are keeping
your systems up-to-date, right?

>
> I like the idea of another image which mounts all the filesystems RO, but I
> need to investigate it further and try some experiments.  I have also found
> a couple of interesting discussions by searching on kiosk and restricted
> shell which Tzafrir Cohen recommended, but I still need to do some digging.

Mounting the system read-only may work. But remember that some actual
work has to be done on this system. That is: those developers need to
actually change config files.

--
Tzafrir Cohen   +---+
http://www.technion.ac.il/~tzafrir/ |vim is a mutt's best friend|
mailto:[EMAIL PROTECTED]   +---+


Re: CP Signal shutdown requirements

2003-03-24 Thread Ferguson, Neale
They later kernels from SuSE have the patch in it. My patch has been adapted
by the kernel folks so that it's different to the quiesce-diffs you've
located. SLES8 definitely has it. You'll need to update /etc/inittab to
enable the signal to do the ctrl-alt-del processing.

-Original Message-
I see that Neale has a patch called linux-2.4.7-s390-quiesce.diffs which
appears to be a patch on smp.c for SLES7.  In order to apply this patch, do
I have to completely regen the kernel? I'm reluctant to start down that long
learning curve at this time. Or does SuSE or anyone else have a downloadable
2.4.7 kernel with the SIGNAL enablement already installed?  Or should I just
wait for SLES8 to be delivered?  (We ordered it in December.  No idea what
the holdup is.)  Is SIGNAL enabled in SLES8 even?


CP Signal shutdown requirements

2003-03-24 Thread Wolfe, Gordon W
We've just upgraded to z/VM 4.3 and would like to begin using the CP SIGNAL SHUTDOWN 
command to shut down our Linux servers.  We are running SuSE SLES7 with the timer 
patch,and I think I have the latest update.

When I try the SIGNAL command I get

HCPSIG2110E User LNX54321 is not enabled for signals
Ready(02110);

I see that Neale has a patch called linux-2.4.7-s390-quiesce.diffs which appears to be 
a patch on smp.c for SLES7.  In order to apply this patch, do I have to completely 
regen the kernel? I'm reluctant to start down that long learning curve at this time. 
Or does SuSE or anyone else have a downloadable 2.4.7 kernel with the SIGNAL 
enablement already installed?  Or should I just wait for SLES8 to be delivered?  (We 
ordered it in December.  No idea what the holdup is.)  Is SIGNAL enabled in SLES8 even?

They say there are three signs of stress in your life.  You eat too much junk food, 
you drive too fast and you veg out in front of the TV.  Who are they kidding?  That 
sounds like a perfect day to me!
Gordon Wolfe, Ph.D. (425)865-5940
VM & Linux Servers and Storage, The Boeing Company


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Peter J. Farley III
At 10:32 AM 3/24/03 -0600, you wrote:

>The translation when talking to the HMC should match real hardware
>(though perhaps with a switch; the default should match the
hardware).
Do you by any chance know just exactly what *is* the HMC on a real-iron
G5/6 or z900/800?  Is there a document that describes the character set
on the beastie?  I do not think it's a 3215 any more, is it?
>If that is CP 500,  so be it.   Both 500 and 037 are slightly wrong
>from the customer usage standpoint.   This opens up old wounds.
>EBCDIC square brackets are AD and BD in practice,  not 500 or 037.
Old wounds, indeed.  BTDT.  'Nuff said.

>The translation when talking to VM,  specifically the 3215,
>should be either CP 1047 or (better) "CP 37 version 2",
>which is a customer-defined animal (more like a protest).
>1047 is the "open extensions" codepage and gets the brackets right.
>"CP 37 v2" goes further and gets the ASCII circumflex "hat"
>and EBCDIC "not" mapped properly.
I can't speak to this without knowing what the "real iron" HMC really
is.  Whatever *that* beastie is needs to define the translation, don't
you think?
And under VM, of course, the translation should follow the 3215 HW
capabilities, requiring at least as many kernel tables as there could
be legitimate "consoles" for it to talk to, I would think.  That or VM
needs to provide an HMC virtual device (I know, that one's a lot less
likely to get done).
>I haven't had time to create patches to fix this
>let alone maintain any such patches.   :-(
>
>> Any idea why that is so?  Shouldn't those tables be symmetrical?
>
>Even with the above recommended translations,
>it is fair that console kernel codepages be asymmetrical:
>The console is vital to system operation and not used much
>for things like code development,  so you want to be able to
>issue commands,  though their output might look funny.
>(Square brackets ... it's always the square brackets.)
>The idea is that what is typed-in gets mapped to the
>most likely useable subset.
But commands from the real HMC to a linux LPAR (and by extension, from
a hercules HMC) might well need to include any characters needed to do
shell-level scripting in an emergency.  The translation needs to be
accurate for those cases, I would think.
>Here too,  a switch after the fact would be reasonable.

??? After which fact?  You lost me here.
-
Peter J. Farley III ([EMAIL PROTECTED])


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Peter Flass
I can't understand why (well, I uess I can) they didn't standardize on
CP 819 and 1047.  I'm using that pair for all my in-house stuff.

"Peter J. Farley III" wrote:
>
> At 08:57 AM 3/24/03 -0500, you wrote:
> 
>  >What's the matter with the kernel source, Peter?  It shows that, yes,
>
>  >it uses code pages 037 and 500.  It looks like 037 for the 3215 and
>  >3270 console and 500 for the integrated system console (037 if
> running
>  >on VM). All conversions are to 437 (based on commentary).
>  >
>  >http://lxr.linux.no/source/drivers/s390/ebcdic.c?a=s390#L70 and
>  >http://lxr.linux.no/source/arch/s390/kernel/ebcdic.c?a=s390#L91 were
>  >starting points for my search.
>
> Thanks for those references, Alan.  As to why not the kernel source,
> that's because I haven't got the foggiest clue where to begin looking
> in the code.  A kernel hacker I'm not.  In fact, I've never even looked
> at the kernel source, much less read the kernel hackers guides that are
> out there.
>
> Too scared of getting lost, I think.  That water is very, very deep.
>
> I notice, though, that the translations on the page you point out are
> not symmetrical.  In particular, the ascii->ebcdic translate table
> converts ascii square brackets (x'5B', x'5D') to ebcdic x'AD' and
> x'BD', but the ebcdic->ascii translation presumes square brackets are
> at x'BA' and x'BB', and translates those characters to ascii x'5B' and
> x'5D' respectively.  x'AD' and x'BD' both translate to ascii x'07'.
>
> Any idea why that is so?  Shouldn't those tables be symmetrical?
> -
> Peter J. Farley III ([EMAIL PROTECTED])


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Richard Troth
> I notice, though, that the translations on the page you point out are
> not symmetrical.  In particular, the ascii->ebcdic translate table
> converts ascii square brackets (x'5B', x'5D') to ebcdic x'AD' and
> x'BD', but the ebcdic->ascii translation presumes square brackets are
> at x'BA' and x'BB', and translates those characters to ascii x'5B' and
> x'5D' respectively.  x'AD' and x'BD' both translate to ascii x'07'.

The translation when talking to the HMC should match real hardware
(though perhaps with a switch; the default should match the hardware).
If that is CP 500,  so be it.   Both 500 and 037 are slightly wrong
from the customer usage standpoint.   This opens up old wounds.
EBCDIC square brackets are AD and BD in practice,  not 500 or 037.

The translation when talking to VM,  specifically the 3215,
should be either CP 1047 or (better) "CP 37 version 2",
which is a customer-defined animal (more like a protest).
1047 is the "open extensions" codepage and gets the brackets right.
"CP 37 v2" goes further and gets the ASCII circumflex "hat"
and EBCDIC "not" mapped properly.

I haven't had time to create patches to fix this
let alone maintain any such patches.   :-(

> Any idea why that is so?  Shouldn't those tables be symmetrical?

Even with the above recommended translations,
it is fair that console kernel codepages be asymmetrical:
The console is vital to system operation and not used much
for things like code development,  so you want to be able to
issue commands,  though their output might look funny.
(Square brackets ... it's always the square brackets.)
The idea is that what is typed-in gets mapped to the
most likely useable subset.

Here too,  a switch after the fact would be reasonable.

-- RMT


Re: Read-Only Telnet

2003-03-24 Thread David Boyes
Jeremy,

One thought I had would be to make all the volatile portions of the
environment based on VDISKs and have the machine IPL CMS and populate
the VDISKs with a default environment using DDR or similar tool, then
IPL Linux. You bring the the machine up, they play with their app, and
you log it off after they are done playing. Any modifications vanish
when the Linux machine logs off, and you're back to the pristine state
next time someone needs to use the demonstration system. Tdisk would
also work, but VDISK is easier to define and manage, I'd think.

If by "read-only", you mean have an app running against live data, but
be unable to modify it, that's going to take work on your application to
obey a read=only flag of some kind.

-- db

David Boyes
Sine Nomine Associates


> -Original Message-
> From: Linux on 390 Port [mailto:[EMAIL PROTECTED] Behalf Of
> Post, Mark K
> Sent: Saturday, March 22, 2003 1:38 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Read-Only Telnet
>
>
> Jeremy,
>
> You're a little too vague (for me) about what you mean by "so
> they can look
> at an application."  Do you mean you want to be able to demo
> something for
> them?  Do you only want to allow them to see the output of
> the application?
> (In that case, generating HTML output and having them point their web
> browser at the system might be quickest/easiest.)  Something
> else entirely?
>
>
> Mark Post
>
> -Original Message-
> From: Jeremy Warren [mailto:[EMAIL PROTECTED]
> Sent: Friday, March 21, 2003 9:21 AM
> To: [EMAIL PROTECTED]
> Subject: Read-Only Telnet
>
>
> Does anyone know of a simple/quick way to setup a GUARANTEED read-only
> access to a linux guest?
>
> Maybe some type of read-only telnet/ssh daemon?  I couldn't
> find a switch
> to either of them.
>
> Basically I need to grant read-only access to a system to a
> group of users
> so they can look at an application,
>
> However the user/group/world file permissions for other
> reasons don't allow
> me to guarantee that these users will have read-only.
>
>
> TIA!
>
>
> ---
> Jeremy Warren
> Sr. Systems Programmer
> KB Toy Stores
> mailto:[EMAIL PROTECTED]@kbtoys.com
>


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Peter J. Farley III
At 01:47 PM 3/24/03 +, you wrote:
>> I'm running debian-390 under hercules-390 (v2.17.1), both under
RH7.3
>> and under WinXP.  A strange problem showed up recently, in that the
>> split vertical bar character would disappear when entered from the
>> hercules HMC console.  Not get translated into something else, just
>> plain deleted.
>
>What operating system is hosting your Hercules?
I run it both under RedHat Linux 7.3 and under WinXP Pro.  The behavior
is the same in both, and I think it is a function of the linux kernel
translations conflicting with the hercules default translations.
>Only I had the exact same problem with Cygwin on WinME and found this

>in the Cygwin FAQ:
>
>Pipe key (`|') doesn't work on non-US keyboards in Win9x/ME
>This might get fixed someday, but meanwhile, just use rxvt, which
does
>not have this problem. This is no real loss, because rxvt has many
>other advantages. (Do not attempt to use the "broken" pipe key (`|')
as
>a substitute, it is a different character.)
I think knowing what code pages the kernel uses will help resolve the
issue.  When running linux-390 under hercules, one will have to select
the right code page translation, which may not be the same one used for
retro-computing with VM/370 R6 or MVS3.8j.
-
Peter J. Farley III ([EMAIL PROTECTED])


Re: Samba - 1 for 1 or 'n' to 1

2003-03-24 Thread David Boyes
Depends on the politics of your situation. Usually the reason for
separate servers has little to do with technical merit and everything to
do with administrative fiefs.  Trying to consolidate many to one usually
fails due to political control problems, which is why most of the
historical "consolidate everything onto one big z/OS-based file server"
efforts were such horrible failures (performance issues aside). Great
idea technically, but doesn't take into account the reality of most
organizations.

The safest bet is to do physical to logical (ie, one to one) as a first
step, and then start working on the political problems to try to do many
to one. If the one to one step goes smoothly, then the next step is a
lot easier.

One caveat -- printing tends to transfer a lot of data.  You may want to
keep separate servers dedicated to printing only to avoid throughput
issues for consolidated servers.

-- db

David Boyes
Sine Nomine Associates


> -Original Message-
> From: Linux on 390 Port [mailto:[EMAIL PROTECTED] Behalf Of
> Lionel Dyck
> Sent: Saturday, March 22, 2003 12:26 PM
> To: [EMAIL PROTECTED]
> Subject: Samba - 1 for 1 or 'n' to 1
>
>
> When doing a file/print server consolidation using Samba what is the
> recommended approach?
>
> Is it better to do a one for one (windows server to linux
> samba server) or
> to take some number of windows servers into a single samba server?
>
> thx
> 
> Lionel B. Dyck, Systems Software Lead
> Kaiser Permanente Information Technology
> 25 N. Via Monte Ave
> Walnut Creek, Ca 94598
>
> Phone:   (925) 926-5332 (tie line 8/473-5332)
> E-Mail:[EMAIL PROTECTED]
> Sametime: (use Lotus Notes address)
> AIM:lbdyck
>


Re: Is there a Veritas client for the zseries Linux?

2003-03-24 Thread Jeremy Warren
FDR Upstream works extremely well for us.

Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com



|-+>
| |   Abdullah |
| |   Al-humaid|
| |   <[EMAIL PROTECTED]|
| |   om>  |
| |   Sent by: Linux on|
| |   390 Port |
| |   <[EMAIL PROTECTED]|
| |   IST.EDU> |
| ||
| ||
| |   03/21/2003 11:47 |
| |   PM   |
| |   Please respond to|
| |   Linux on 390 Port|
| ||
|-+>
  
>-|
  |
 |
  |   To:   [EMAIL PROTECTED]  
   |
  |   cc:  
 |
  |   Subject:  [LINUX-390] Is there a Veritas client for the zseries Linux?   
 |
  
>-|




How would you go about backing up the linux server if
there wasn't one. One idea I can think of is NFS
mounting the linux filesystem on a mchine that has a
client. Any others?

__
Do you Yahoo!?
Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
http://platinum.yahoo.com


Re: Read-Only Telnet

2003-03-24 Thread Jeremy Warren
Sorry for the lack of detail...

Basically,

It's a 3rd party java based application, numerous configuration files, etc,
which are dynamically updated via the application itself.  Lots of log
files, etc.  The users access it via a web page front end, but our
developers are asking to get "beneath the covers" while it's running.

Right now I am using a restricted ftpd where then can only do "gets" from
various directories.  That way they can pull the files back that they need
to look at for debugging, monitoring, etc.  The developers are complaining
that what they really need is "telnet/ssh" access so that they can get in
and look at the filesystem as a whole.  I realize that they "should" be
able to do this all via FTP, but I have been told to come up with a
solution to make this work for them.

So I guess a better way to word it would be that I am looking for a way to
grant them read-only access to the filesystems on the host.  But Linux
Owner/Group/World Permissions won't work since I can't really muck with
them since they are set by the vendor.  They have certain areas which are
validly world writeable, but where an accidental key stroke could wreak
havoc on the app, so I need to guarantee read only to those areas.  ( I
sure do miss RACF at times )

I like the idea of another image which mounts all the filesystems RO, but I
need to investigate it further and try some experiments.  I have also found
a couple of interesting discussions by searching on kiosk and restricted
shell which Tzafrir Cohen recommended, but I still need to do some digging.

Thanks again!


---
Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com



|-+>
| |   "Post, Mark K"   |
| |   <[EMAIL PROTECTED]|
| |   m>   |
| |   Sent by: Linux on|
| |   390 Port |
| |   <[EMAIL PROTECTED]|
| |   IST.EDU> |
| ||
| ||
| |   03/22/2003 01:38 |
| |   PM   |
| |   Please respond to|
| |   Linux on 390 Port|
| ||
|-+>
  
>-|
  |
 |
  |   To:   [EMAIL PROTECTED]  
   |
  |   cc:  
 |
  |   Subject:  Re: [LINUX-390] Read-Only Telnet   
 |
  
>-|




Jeremy,

You're a little too vague (for me) about what you mean by "so they can look
at an application."  Do you mean you want to be able to demo something for
them?  Do you only want to allow them to see the output of the application?
(In that case, generating HTML output and having them point their web
browser at the system might be quickest/easiest.)  Something else entirely?


Mark Post

-Original Message-
From: Jeremy Warren [mailto:[EMAIL PROTECTED]
Sent: Friday, March 21, 2003 9:21 AM
To: [EMAIL PROTECTED]
Subject: Read-Only Telnet


Does anyone know of a simple/quick way to setup a GUARANTEED read-only
access to a linux guest?

Maybe some type of read-only telnet/ssh daemon?  I couldn't find a switch
to either of them.

Basically I need to grant read-only access to a system to a group of users
so they can look at an application,

However the user/group/world file permissions for other reasons don't allow
me to guarantee that these users will have read-only.


TIA!


---
Jeremy Warren
Sr. Systems Programmer
KB Toy Stores
mailto:[EMAIL PROTECTED]@kbtoys.com


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Peter J. Farley III
At 08:57 AM 3/24/03 -0500, you wrote:

>What's the matter with the kernel source, Peter?  It shows that, yes,
>it uses code pages 037 and 500.  It looks like 037 for the 3215 and
>3270 console and 500 for the integrated system console (037 if
running
>on VM). All conversions are to 437 (based on commentary).
>
>http://lxr.linux.no/source/drivers/s390/ebcdic.c?a=s390#L70 and
>http://lxr.linux.no/source/arch/s390/kernel/ebcdic.c?a=s390#L91 were
>starting points for my search.
Thanks for those references, Alan.  As to why not the kernel source,
that's because I haven't got the foggiest clue where to begin looking
in the code.  A kernel hacker I'm not.  In fact, I've never even looked
at the kernel source, much less read the kernel hackers guides that are
out there.
Too scared of getting lost, I think.  That water is very, very deep.

I notice, though, that the translations on the page you point out are
not symmetrical.  In particular, the ascii->ebcdic translate table
converts ascii square brackets (x'5B', x'5D') to ebcdic x'AD' and
x'BD', but the ebcdic->ascii translation presumes square brackets are
at x'BA' and x'BB', and translates those characters to ascii x'5B' and
x'5D' respectively.  x'AD' and x'BD' both translate to ascii x'07'.
Any idea why that is so?  Shouldn't those tables be symmetrical?
-
Peter J. Farley III ([EMAIL PROTECTED])


RE : z/VM TCPIP Question as pertaing to Linux Guest

2003-03-24 Thread MCCARTIER
You can use OSD Type for OSA Card and using QDIO mode for connecting
Linux Guest to TCP/IP machine.

Then, when you reboot TCP/IP machine Linux Guest wil be dynamically
reconnected. 

Regards

Mathieu C. CARTIER
ALEOS
www.aleos.net


-Message d'origine-
De : Linux on 390 Port [mailto:[EMAIL PROTECTED] De la part de
Ketchens, LeMarr T. (RyTull)
Envoyé : lundi 24 mars 2003 15:15
À : [EMAIL PROTECTED]
Objet : z/VM TCPIP Question as pertaing to Linux Guest


I was wondering if I had any changes to my z/VM TCPIP stack, would I
need to shutdown and reipl all my Linux Guests before recycling the z/VM
TCPIP stack?  If not, what would be ways to insure that?

__
Lemarr T. Ketchens
Technical Services
MVS Systems Programmer
[EMAIL PROTECTED]


--- Legal Disclaimer: The information contained in this communication
may be confidential, is intended only for the use of the recipient named
above, and may be legally privileged.  If the reader of this message is
not the intended recipient, you are hereby notified that any
dissemination, distribution, or copying of this communication, or any of
its contents, is strictly prohibited.  If you have received this
communication in error, please re-send this communication to the sender
and delete the original message and any copy of it from your computer
system. Thank you. ---


Re: z/VM TCPIP Question as pertaing to Linux Guest

2003-03-24 Thread Alan Altmark
On Monday, 03/24/2003 at 08:14 CST, "Ketchens, LeMarr T. (RyTull)"
<[EMAIL PROTECTED]> wrote:
> I was wondering if I had any changes to my z/VM TCPIP stack, would I
need to
> shutdown and reipl all my Linux Guests before recycling the z/VM TCPIP
> stack?  If not, what would be ways to insure that?

Answered on VMESA-L.

Alan Altmark
Sr. Software Engineer
 IBM z/VM Development


z/VM TCPIP Question as pertaing to Linux Guest

2003-03-24 Thread Ketchens, LeMarr T. (RyTull)
I was wondering if I had any changes to my z/VM TCPIP stack, would I need to
shutdown and reipl all my Linux Guests before recycling the z/VM TCPIP
stack?  If not, what would be ways to insure that?

__
Lemarr T. Ketchens
Technical Services
MVS Systems Programmer
[EMAIL PROTECTED]


--- Legal Disclaimer: The information contained in this communication may be
confidential, is intended only for the use of the recipient named above, and
may be legally privileged.  If the reader of this message is not the
intended recipient, you are hereby notified that any dissemination,
distribution, or copying of this communication, or any of its contents, is
strictly prohibited.  If you have received this communication in error,
please re-send this communication to the sender and delete the original
message and any copy of it from your computer system. Thank you. ---


Re: 1000th z800 Sold

2003-03-24 Thread Sebastian Welton
>Anyone else find it a stretch of credibility that the 1000th z900 and
the >1000th z800 both
>went to Linux-only shops?

>As far as I'm aware there isn't a single Linux-only z800 in Europe.  I
may >well be wrong, but
>it's still fingers of one hand making a rude sign.

Okay not quite Linux-only, but definitely in Europe, but the one
sitting a few metres away from me has 2 partitions. One is z/VM4.3 with
Linux and the other is z/VM4.2 with Linux (and OS/390.)

MfG / Best Regards

Sebastian Welton

[EMAIL PROTECTED]
[EMAIL PROTECTED]
www.welton.de

=
MfG / Best Regards

Sebastian Welton

[EMAIL PROTECTED]
[EMAIL PROTECTED]
www.welton.de

__
Do You Yahoo!?
Everything you'll ever need on one web page
from News and Sport to Email and Music Charts
http://uk.my.yahoo.com


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Alan Altmark
On Monday, 03/24/2003 at 12:09 EST, "Peter J. Farley III"
<[EMAIL PROTECTED]> wrote:

> So, my question to this list is whether CP's 437/500 are the
> ASCII/EBCDIC code pages used in the base console code in the linux-390
> kernel (without any "locale" considerations, just LANG=C) to translate
> HMC characters to ASCII, or at least where can I go to find out what is
> used (besides the kernel source, please).
>
> TIA for any info, RTFM's or other assistance you can provide.

What's the matter with the kernel source, Peter?  It shows that, yes, it
uses code pages 037 and 500.  It looks like 037 for the 3215 and 3270
console and 500 for the integrated system console (037 if running on VM).
All conversions are to 437 (based on commentary).

http://lxr.linux.no/source/drivers/s390/ebcdic.c?a=s390#L70 and
http://lxr.linux.no/source/arch/s390/kernel/ebcdic.c?a=s390#L91 were
starting points for my search.

Alan Altmark
Sr. Software Engineer
 IBM z/VM Development


Re: Does the linux-390 kernel use CP437/CP500 for ASCII/EBCDIC?

2003-03-24 Thread Dougie G Lawson
> I'm running debian-390 under hercules-390 (v2.17.1), both under RH7.3
> and under WinXP.  A strange problem showed up recently, in that the
> split vertical bar character would disappear when entered from the
> hercules HMC console.  Not get translated into something else, just
> plain deleted.

What operating system is hosting your Hercules?
Only I had the exact same problem with Cygwin on WinME and found this in
the Cygwin FAQ:

Pipe key (`|') doesn't work on non-US keyboards in Win9x/ME
This might get fixed someday, but meanwhile, just use rxvt, which does not
have this problem. This is no real loss, because rxvt has many other
advantages. (Do not attempt to use the "broken" pipe key (`|') as a
substitute, it is a different character.)

Regards, Dougie Lawson

--
ITS Technical Support
SupportLine for IMS, DB2 & Linux


Multiple guests sharing /usr RO... Using RPM

2003-03-24 Thread Daniel Jarboe
Is there a generally accepted "best way" to upgrade/install packages
with RPM with a shared RO /usr across multiple images?  Management is
leaning toward all guests having the same software installed, where
service A would be running on one image, and service B on another,
though the software is installed on both.  The RPM database across
images would be identical.  I do not see a "clean" or "easy" way to deal
with upgrading each img, because of their differences in /etc and /var,
while respecting /usr.

Is Chap 8 (Shared Linux Filesystems) of the Large Scale Linux Deployment
redbook the way to go here?


Thanks,
~ Daniel







---

This message is the property of Time Inc. or its affiliates. It may be
legally privileged and/or confidential and is intended only for the use
of the addressee(s). No addressee should forward, print, copy, or
otherwise reproduce this message in any manner that would allow it to be
viewed by any individual not originally listed as a recipient. If the
reader of this message is not the intended recipient, you are hereby
notified that any unauthorized disclosure, dissemination, distribution,
copying or the taking of any action in reliance on the information
herein is strictly prohibited. If you have received this communication
in error, please immediately notify the sender and delete this message.
Thank you.


Re: logon

2003-03-24 Thread Ferguson, Neale
Try this when you get a prompt.

PATH=/bin:/usr/bin ls


Re: Is there a Veritas client for the zseries Linux?

2003-03-24 Thread Robert Matthews
But there is one . . .

http://www.legato.com/products/networker/linuxclient.cfm

LEGATO NetWorker Client for Linux on the Mainframe (NCLM) provides automated, robust 
backup and recovery of business-critical Linux data on the IBM zSeries and S/390 
mainframes. NCLM delivers the manageability, scalability, and enterprise-class 
performance of LEGATO NetWorker to ensure fast, reliable, "lights out" protection for 
tens to thousands of Linux Virtual Machines (VM) on a single mainframe in DAS or SAN 
environments. NCLM is a part of LEGATO's total information protection solution for 
data centers to minimize downtime costs, reduce management overhead, and maximize ROI 
of storage resources.



- Original Message - 
From: "Abdullah Al-humaid" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, March 22, 2003 5:47 AM
Subject: Is there a Veritas client for the zseries Linux?


> How would you go about backing up the linux server if
> there wasn't one. One idea I can think of is NFS
> mounting the linux filesystem on a mchine that has a
> client. Any others?
> 
> __
> Do you Yahoo!?
> Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
> http://platinum.yahoo.com


Re: Sles8 and V-Disk FBA Swap Two part question

2003-03-24 Thread John Ford
> -Original Message-
> Behalf Of Richard Troth
> Sent: Friday, March 21, 2003 2:49 PM
>
> > Dave Jones of Sine Nomine has written an EXEC that will do
> > just what you want, in the guest's CMS startup phase:
> > http://www.sinenomine.net/downloads/SWAPGEN.EXEC
>
> Mr. Nit Picky sez that Jones' EXEC does exactly the right thing.
> 
> -- RMT

I humbly offer a minor code simplification/performance tweek to
SWAPGEN.EXEC. It doesn't change the outcome one speck, and thus
probably isn't worth changing since it isn't an exec that's called a
zillion times a day. But it's all I've got to offer tonight - please
forgive if this is impertinent. In more frequently used code and/or
longer strings, this change would be more worthy of consideration.
Somewhat more consequential than my LCD-on-a-toaster idea.

swap_blk = ''
do i = 1 to 1027
  swap_blk = swap_blk || d2c(0)
end

can be replaced with...

swap_blk = left('',1027,'00'x)   /* pad-->1027 */

and similarily:

do i = 1033 to 4086
  swap_blk = swap_blk || d2c(0)
end

can be replaced with...

swap_blk = left(swap_blk,4086,'00'x) /* pad-->4086 */

And at this time of night, I haven't much self control, so I can't help
but offer...

swap_blk = ''
do i = 1 to 1027
  swap_blk = swap_blk || d2c(0)
end
pages = trunc((blks * 512)/4096) - 1
swap_blk = swap_blk || d2c(1)
swap_blk = swap_blk || d2c(pages,4)
do i = 1033 to 4086
  swap_blk = swap_blk || d2c(0)
end
swap_blk = swap_blk || sig

could be reduced (at great risk of obfuscation) to...

swap_blk = left(right('01'x || d2c(trunc((blks * 512)/4096) -
1,4),,
  1032,'00'x),,
  4086,'00'x) || sig
/* geez I hope I coded that right! */

-jcf

Code tweeked while-u-wait.
No charge for Rexx.