Porting UNIX Applications to Openedition for VM/ESA

Total Page:16

File Type:pdf, Size:1020Kb

Porting UNIX Applications to Openedition for VM/ESA Porting UNIX Applications to OpenEdition for VM/ESA Erich Amrehn, Neale Ferguson, Jean-Francois Jiguet International Technical Support Organization http://www.redbooks.ibm.com SG24-5458-00 International Technical Support Organization SG24-5458-00 Porting UNIX Applications to OpenEdition for VM/ESA August 1999 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix M, “Special Notices” on page 337. First Edition (August 1999) This edition applies to Virtual Machine/Enterprise Systems Architecture (VM/ESA) Version 2, Release 3.0, program number 5654-030 for use with OpenEdition for VM/ESA. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, NY 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1999. All rights reserved. Note to U.S Government Users - Documentation related to restricted rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures ......................................................xi Tables .......................................................xv Preface .....................................................xvii The team that wrote this redbook ......................................xvii Commentswelcome...............................................xviii Chapter 1. Introduction to porting .................................1 1.1Leveragingyourinvestment....................................1 1.2Thebottomline..............................................3 1.3Theresources...............................................3 1.3.1Softwarerequired........................................3 1.3.2 Skills needed............................................4 1.3.3Ourworkspace..........................................4 1.3.4Theapplicationsweported.................................4 1.3.5Otherresources.........................................4 1.4 Process management . ........................................5 1.4.1Processes..............................................5 1.4.2 Threads. .............................................8 1.4.3Interprocesscommunication(IPC)...........................8 1.4.4 Signals . ............................................10 Chapter 2. Setting up the VM environment .........................13 2.1OurVMsystem.............................................13 2.2AddingourfirstuserstotheCPdirectory.........................14 2.2.1BFSSERVECPdirectoryentry.............................14 2.2.2PORTINGCPdirectoryentry...............................15 2.2.3UIDandGIDexplained...................................15 2.3CreatingtheBFSserver......................................16 2.3.1FormattingBFSSERVE191minidisk.........................16 2.3.2CreatingthePROFILEEXEC..............................17 2.3.3DefiningBFSTESTDMSPARMS............................17 2.3.4DefiningBFSPOOLDEF..................................17 2.3.5BuildingtheBFSTESTserver..............................18 2.3.6 Enrolling users to the BFSTEST filepool ......................18 2.3.7 Updating execs to load the objects ..........................18 2.3.8 Loading the BFS . .......................................19 2.3.9 Creating a second playground. ............................19 2.4 Establishing the OpenEdition for VM/ESA environment...............19 2.4.1CreatePROFILEEXECforthePORTINGuserID...............19 2.4.2 3270 considerations .....................................20 2.4.3StartingtheSHELL......................................21 2.4.4Creatingourfirsttool.....................................23 2.4.5Customizing/etc/profile...................................23 2.4.6 Some useful Shell commands and utilities.....................25 Chapter 3. Porting application guide ..............................31 3.1S/390andVM/ESAportingissues...............................31 3.1.1ASCIIversusEBCDIC....................................31 3.1.2Forkingandspawning....................................35 © Copyright IBM Corp. 1999 iii 3.1.3Sampleconversions..................................... 36 3.1.4Othergotchasandhints.................................. 40 3.2 XPG4 supplementary APIs ................................... 48 3.2.1XPG4installation....................................... 49 3.2.2 Using XPG4 utility commands ............................. 50 Chapter 4. Porting the essential tools (GNUgzip, GNUmake) .......... 51 4.1WhatisGNU.............................................. 51 4.2PortingGNUgzip........................................... 51 4.2.1Whatisgzip........................................... 52 4.2.2 Loading gzip sources....................................52 4.3PortingGNUmake......................................... 57 4.3.1 About GNU make. .................................... 57 4.3.2 Capabilities of make .................................... 58 4.3.3makeRulesandTargets.................................58 4.3.4 Advantages of GNU make . .............................. 58 4.3.5GettingGNUmake...................................... 59 4.3.6 Loading GNU make in BFS . .............................. 59 4.3.7 Running configure . ....................................60 4.3.8 Compiling GNU make ................................... 60 4.3.9Checkingusageoffork().................................73 4.3.10RebuildingGNUmake.................................. 79 4.3.11Usingmake.......................................... 80 4.3.12 Debugging make . ....................................81 4.3.13TestingGNUmake.................................... 85 4.4Installingmake............................................85 Chapter 5. Infrastructure packages .............................. 87 5.1 Standard PROFILE EXEC ....................................87 5.2SYSLOGD................................................ 88 5.2.1SYSLOGDCPdirectoryentry............................. 88 5.2.2 SYSLOGD BFS requirements ............................. 88 5.2.3SYSLOGDinstallationandconfiguration.....................89 5.3 INETD - the Internet super daemon ............................. 91 5.3.1INETDCPdirectoryentry................................ 93 5.3.2 INETD BFS requirements . .............................. 93 5.3.3INETDinstallationandconfiguration........................ 93 5.4 DAYTIMED - daytime and time daemon. ......................... 95 5.4.1 Daytime daemon . .................................... 95 5.4.2 Time daemon. ......................................... 96 5.4.3DAYTIMEDinstallation.................................. 96 5.5CROND.................................................. 97 5.5.1CRONDCPdirectoryentry............................... 99 5.5.2 CROND BFS requirements . .............................. 99 5.5.3CRONDinstallationandconfiguration....................... 99 5.6REGINA(REXXforUNIX)................................... 100 5.6.1 Regina prerequisite tools . ............................. 100 5.6.2Reginainstallation..................................... 101 5.6.3UsingRegina......................................... 102 5.7RCS................................................... 103 5.7.1FunctionsofRSCS.................................... 104 5.7.2RCSinstallation....................................... 104 5.7.3GNUDiffinstallation................................... 105 iv Porting UNIX Applications to OpenEdition for VM/ESA 5.7.4GettingstartedwithRCS.................................105 5.7.5Automaticidentification..................................107 5.8Patch...................................................108 5.8.1Patchinstallation.......................................108 5.8.2Usingpatch...........................................108 Chapter 6. Configuring and running business applications...........111 6.1Samba..................................................111 6.1.1WhatisSMB..........................................111 6.1.2WhyuseSMB.........................................111 6.1.3WhatSambacando....................................111 6.1.4 Samba components ....................................112 6.1.5SambaCPdirectoryentry................................113 6.1.6 Samba BFS requirements ................................113 6.1.7Sambainstallationandconfiguration........................113 6.1.8UsingSamba.........................................115 6.2LDAP...................................................121 6.2.1Whatisadirectoryservice...............................121 6.2.2WhatisLDAP.........................................121 6.2.3 The OpenLDAP distribution...............................123 6.2.4LDAPCPdirectoryentry.................................123 6.2.5LDAPBFSrequirements.................................123 6.2.6 Install GDBM prerequisite ................................123 6.2.7LDAPinstallation.......................................124 6.2.8LDAPconfiguration.....................................124 6.2.9 Building the database . ................................125 6.2.10StartingtheLDAPserver................................128 6.2.11ConfiguringanLDAPclient..............................129 6.2.12UsingNetscapetosearchdirectory........................134 6.3Apache..................................................136 6.3.1ApacheCPdirectoryentry................................136 6.3.2 Apache BFS requirements ...............................137 6.3.3Apacheinstallationandconfiguration.......................137
Recommended publications
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • Improving Security Through Egalitarian Binary Recompilation
    Improving Security Through Egalitarian Binary Recompilation David Williams-King Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2021 © 2021 David Williams-King All Rights Reserved Abstract Improving Security Through Egalitarian Binary Recompilation David Williams-King In this thesis, we try to bridge the gap between which program transformations are possible at source-level and which are possible at binary-level. While binaries are typically seen as opaque artifacts, our binary recompiler Egalito (ASPLOS 2020) enables users to parse and modify stripped binaries on existing systems. Our technique of binary recompilation is not robust to errors in disassembly, but with an accurate analysis, provides near-zero transformation overhead. We wrote several demonstration security tools with Egalito, including code randomization, control-flow integrity, retpoline insertion, and a fuzzing backend. We also wrote Nibbler (ACSAC 2019, DTRAP 2020), which detects unused code and removes it. Many of these features, including Nibbler, can be combined with other defenses resulting in multiplicatively stronger or more effective hardening. Enabled by our recompiler, an overriding theme of this thesis is our focus on deployable software transformation. Egalito has been tested by collaborators across tens of thousands of Debian programs and libraries. We coined this term egalitarian in the context of binary security. Simply put, an egalitarian analysis or security mechanism is one that can operate on itself (and is usually more deployable as a result). As one demonstration of this idea, we created a strong, deployable defense against code reuse attacks.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Alivenf6p-VSTA
    ALiveNF6P-VSTA User Manual Version 1.1 Published November 2007 Copyright©2007 ASRock INC. All rights reserved. 1 Copyright Notice: No part of this manual may be reproduced, transcribed, transmitted, or translated in any language, in any form or by any means, except duplication of documentation by the purchaser for backup purpose, without written consent of ASRock Inc. Products and corporate names appearing in this manual may or may not be regis- tered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owners’ benefit, without intent to infringe. Disclaimer: Specifications and information contained in this manual are furnished for informa- tional use only and subject to change without notice, and should not be constructed as a commitment by ASRock. ASRock assumes no responsibility for any errors or omissions that may appear in this manual. With respect to the contents of this manual, ASRock does not provide warranty of any kind, either expressed or implied, including but not limited to the implied warran- ties or conditions of merchantability or fitness for a particular purpose. In no event shall ASRock, its directors, officers, employees, or agents be liable for any indirect, special, incidental, or consequential damages (including damages for loss of profits, loss of business, loss of data, interruption of business and the like), even if ASRock has been advised of the possibility of such damages arising from any defect or error in the manual or product. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
    [Show full text]
  • Zenon Manual Programming Interfaces
    zenon manual Programming interfaces v.7.11 ©2014 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form are permitted solely with the written permission of the company COPA-DATA. The technical data contained herein has been provided solely for informational purposes and is not legally binding. Subject to change, technical or otherwise. Contents 1. Welcome to COPA-DATA help ...................................................................................................... 6 2. Programming interfaces ............................................................................................................... 6 3. Process Control Engine (PCE) ........................................................................................................ 9 3.1 The PCE Editor ............................................................................................................................................. 9 3.1.1 The Taskmanager ....................................................................................................................... 10 3.1.2 The editing area .......................................................................................................................... 10 3.1.3 The output window .................................................................................................................... 11 3.1.4 The menus of the PCE Editor .....................................................................................................
    [Show full text]
  • Operating Systems and Computer Networks
    Operating Systems and Computer Networks Exercise 1: Introduction to Operating System Faculty of Engineering Operating Systems and Institute of Computer Engineering Computer Networks Exercises Prof. Dr.-Ing. Axel Hunger Alexander Maxeiner, M.Sc. Q1.1 – Operating System (OS) • Operating System is – a program that manages computer hardware and resources – providing Interfaces between hardware and applications – the intermediary between computer and users • Functions: – For Users: convenient usage of computer system and usage of applications – For System: Management of Computer Resources and abstraction of underlying (complex) machine Faculty of Engineering Operating Systems and Institute of Computer Engineering Computer Networks Exercises Prof. Dr.-Ing. Axel Hunger Alexander Maxeiner, M.Sc. Q1.1 – Operating System (OS) Computer systems •provide a capability for gathering data (i.e. data mining, to get information that lead to tailored commercials) •performing computations (modeling large system instead of building them) •storing information, (Photos, tables, etc.) •communicating with other computer systems (I.e. Internet) “The operating system defines our computing experience. It is the first software we see when we turn on the computer and the last software we see when the computer is turned off.” Faculty of Engineering Operating Systems and Institute of Computer Engineering Computer Networks Exercises Prof. Dr.-Ing. Axel Hunger Alexander Maxeiner, M.Sc. Q1.1 – Operating System (OS) User Application Interfaces nice Operating System Interfaces
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • CIS Ubuntu Linux 18.04 LTS Benchmark
    CIS Ubuntu Linux 18.04 LTS Benchmark v1.0.0 - 08-13-2018 Terms of Use Please see the below link for our current terms of use: https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/ 1 | P a g e Table of Contents Terms of Use ........................................................................................................................................................... 1 Overview ............................................................................................................................................................... 12 Intended Audience ........................................................................................................................................ 12 Consensus Guidance ..................................................................................................................................... 13 Typographical Conventions ...................................................................................................................... 14 Scoring Information ..................................................................................................................................... 14 Profile Definitions ......................................................................................................................................... 15 Acknowledgements ...................................................................................................................................... 17 Recommendations ............................................................................................................................................
    [Show full text]
  • Pew Washington 0250E 17054.Pdf (7.705Mb)
    Testing and Advancement of a Variable Stiffness Transverse Plane Adapter for Use in a Lower Limb Prosthesis Corey Pew A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2017 Reading Committee: Glenn Klute, Chair Gador Canton Santosh Devasia Nate Sniadecki Program Authorized to Offer Degree: Mechanical Engineering ©Copyright 2017 Corey Pew University of Washington i Abstract Testing and Advancement of a Variable Stiffness Transverse Plane Adapter for Use in a Lower Limb Prosthesis Corey Pew Chair of the Supervisory Committee: Glenn Klute, Ph.D. Affiliate Professor Department of Mechanical Engineering Background The goal of a lower limb prosthesis is to restore the abilities of the intact limb for an individual with lower limb amputation. Daily ambulation includes many maneuvers such as turning, and twisting, which require a component of transverse plane mobility. It has been shown that the inclusion of a transverse plane adapter could reduce peak torsional loads on the residual limb and may alleviate soft tissue damage, increase comfort, and improve mobility level for a lower limb amputee. However, currently available transverse plane adaptors only allow for a single stiffness setting and do not allow for variation to accommodate the maneuvers of everyday ambulation. The specific aims of this research were to determine the transverse plane stiffness that minimizes the transverse plane moment applied to the residual limb of lower limb amputees during different ambulatory activities and identify a user’s preferred transverse plane stiffness during different ambulatory activities at different speeds. Three tasks were performed to achieve these aims.
    [Show full text]
  • Linux Fundamentals Paul Cobbaut Linux Fundamentals Paul Cobbaut
    Linux Fundamentals Paul Cobbaut Linux Fundamentals Paul Cobbaut Publication date 2015-05-24 CEST Abstract This book is meant to be used in an instructor-led training. For self-study, the intent is to read this book next to a working Linux computer so you can immediately do every subject, practicing each command. This book is aimed at novice Linux system administrators (and might be interesting and useful for home users that want to know a bit more about their Linux system). However, this book is not meant as an introduction to Linux desktop applications like text editors, browsers, mail clients, multimedia or office applications. More information and free .pdf available at http://linux-training.be . Feel free to contact the author: • Paul Cobbaut: [email protected], http://www.linkedin.com/in/cobbaut Contributors to the Linux Training project are: • Serge van Ginderachter: [email protected], build scripts and infrastructure setup • Ywein Van den Brande: [email protected], license and legal sections • Hendrik De Vloed: [email protected], buildheader.pl script We'd also like to thank our reviewers: • Wouter Verhelst: [email protected], http://grep.be • Geert Goossens: [email protected], http://www.linkedin.com/in/ geertgoossens • Elie De Brauwer: [email protected], http://www.de-brauwer.be • Christophe Vandeplas: [email protected], http://christophe.vandeplas.com • Bert Desmet: [email protected], http://blog.bdesmet.be • Rich Yonts: [email protected], Copyright 2007-2015 Netsec BVBA, Paul Cobbaut Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts.
    [Show full text]
  • Visual Basic 6.0 Internet Programming:Table of Contents
    To access the contents, click the chapter and section titles. Visual Basic 6.0 Internet Programming (Publisher: John Wiley & Sons, Inc.) Author(s): Carl Franklin ISBN: 0471314986 Publication Date: 02/01/99 Brief Full Advanced Search Search this book: Search Tips FOREWORD CHAPTER 1—THE INTERNET Attack of the Buzzwords! Protocols and Data Protocol Stacks and the OSI Model TCP/IP Names and Addresses Ports Name Resolution Sockets The TCP/IP Model CHAPTER 2—WINSOCK PROGRAMMING Introduction Why Not Use the Winsock API? Installing the Software Loading DSSOCK32.OCX into Visual Basic DSSOCK.BAS SocketConnect IsDotAddress ParseString Getting Started with dsSocket Making a Sockets Connection What’s Going On Here? SocketID and the Socket Property Closing the Connection Handling Multiple Connections on the Server Side Sending Data Receiving Data LineMode, EOLChar, and DataSize The Simple Approach A New Twist Splitting Up the Process with Flags A Slight Variation Event Driven = No Loops Which Approach Is Better? Error Handling Winsock Errors Error-Handling Techniques Minimal Error Trapping Debug.Print Error Trapping Message Dialog Reporting Error Log Reporting UDP—User Datagram Protocol Terminal—A Winsock Terminal Program Epilogue CHAPTER 3—SIMPLE PROTOCOLS Introduction NTP (Network Time Protocol) WHOIS FINGER SetTime Application Epilogue CHAPTER 4—USENET NEWS Introduction NNTP MessageIDs vs. Message Numbers NNTP Versions NNTP Commands Sample Conversation The WILDMAT Format Server Responses Usenet Article Format VB Programming Technique String Parsing
    [Show full text]
  • CLI Maintenance Guide
    ARX CLI Maintenance Guide 810-0045-00 Publication Date This manual was published on September 24, 2012. Legal Notices Copyright Copyright 2006-9/24/12, F5 Networks, Inc. All rights reserved. F5 Networks, Inc. (F5) believes the information it furnishes to be accurate and reliable. However, F5 assumes no responsibility for the use of this information, nor any infringement of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent, copyright, or other intellectual property right of F5 except as specifically described by applicable user licenses. F5 reserves the right to change specifications at any time without notice. Trademarks 3DNS, Access Policy Manager, Acopia, Acopia Networks, Advanced Client Authentication, Advanced Routing, APM, Application Security Manager, ARX, AskF5, ASM, BIG-IP, Cloud Extender, CloudFucious, Clustered Multiprocessing, CMP, COHESION, Data Manager, DevCentral, DevCentral [DESIGN], DSI, DNS Express, DSC, Edge Client, Edge Gateway, Edge Portal, ELEVATE, EM, Enterprise Manager, ENGAGE, F5, F5 [DESIGN], F5 Management Pack, F5 Networks, F5 World, Fast Application Proxy, Fast Cache, FirePass, Global Traffic Manager, GTM, GUARDIAN, IBR, Intelligent Browser Referencing, Intelligent Compression, IPv6 Gateway, iApps, iControl, iHealth, iQuery, iRules, iRules OnDemand, iSession, IT agility. Your way., L7 Rate Shaping, LC, Link Controller, Local Traffic Manager, LTM, Message Security Module, MSM, Netcelera, OneConnect, OpenBloX, OpenBloX [DESIGN],
    [Show full text]