qethqoat - Query OSA address table
Use the qethqoat command to query the OSA address table and display physical and logical device information.
qethqoat syntax
where:
- -r or --raw
- writes raw data to stdout.
- -s or --scope
- defines the scope of the query. The following values are valid:
- 0
- queries the level of the OSA address table.
- 1
- interface (this option is the default).
- -h or --help
- displays help information. To view the man page, enter man qethqoat.
- -v or --version
- displays version information.
Examples
To display
physical and logical device information for interface enccw0.0.f400,
issue:
# qethqoat enccw0.0.f400 PCHID: 0x0310 CHPID: 0xa9 Manufacturer MAC address: 6c:ae:8b:48:0b:68 Configured MAC address: 00:00:00:00:00:00 Data device sub-channel address: 0xf402 CULA: 0x00 Unit address: 0x02 Physical port number: 0 Number of output queues: 1 Number of input queues: 1 Number of active input queues: 0 CHPID Type: OSD Interface flags: 0x0a000000 OSA Generation: OSA-Express5S Port speed/mode: 10 Gb/s / full duplex Port media type: single mode (LR/LX) Jumbo frames: yes Firmware: 0x00000c9a IPv4 router: no IPv6 router: no IPv4 vmac router: no IPv6 vmac router: no Connection isolation: not active Connection isolation VEPA: no IPv4 assists enabled: 0x00111c77 IPv6 assists enabled: 0x00f15c60 IPv4 outbound checksum enabled: 0x0000003a IPv6 outbound checksum enabled: 0x00000000 IPv4 inbound checksum enabled: 0x0000003a IPv6 inbound checksum enabled: 0x00000000 IPv4 Multicast Address: MAC Address: ----------------------- ------------ 224.0.0.1 01:00:5e:00:00:01 IPv6 Address: IPA Flags: ------------- ---------- fe80::6cae:8b00:748:b68 0x00000000 IPv6 Multicast Address: MAC Address: ----------------------- ------------ ff01::1 33:33:00:00:00:01 ff02::1 33:33:00:00:00:01 ff02::1:ff48:b68 33:33:ff:48:0b:68 ff02::1:3 33:33:00:01:00:03
This example uses scope 0 to query the supported
OAT level and descriptor header types.
# qethqoat -s 0 enccw0.0.f400 Supported Scope mask: 0x00000001 Supported Descriptor hdr types: 0x0001070f
This example
shows how the binary output from qethqoat can be
processed in another tool. Here it is displayed in a hexdump viewer:
# qethqoat -r enccw0.0.f400 | hexdump 0000000 0158 0000 0008 0000 0000 0101 0000 0000 0000010 0000 0001 0000 0000 0000 0000 0000 0000 0000020 0004 0050 0001 0000 0000 0000 d7c8 4040 0000030 0120 0094 001a 643b 8a22 0000 0000 0000 0000040 e102 0002 0000 0004 0001 0000 0800 0000 0000050 0100 0480 0000 0766 0000 0000 0000 0000 0000060 0000 0000 0000 0000 0000 0000 0000 0000 0000070 0008 0060 0001 0000 0000 0000 d3c8 4040 0000080 0000 0000 0000 0000 0000 0000 0000 0000 0000090 0000 0000 0000 0000 0000 0000 0011 1c77 00000a0 0021 5c60 0000 001a 0000 0000 0000 001a 00000b0 0000 0000 0000 0000 0000 0000 0000 0000 00000c0 0002 0000 0000 0000 0000 0000 0000 0000 00000d0 0010 0030 0001 0000 0000 0000 c4c8 f4d4 00000e0 0000 0002 0000 0000 0000 0001 0000 0010 00000f0 0001 0001 0000 0000 0000 0000 0000 0000 0000100 e000 0001 0100 5e00 0001 0000 0000 0000 0000110 0010 0030 0001 0000 0000 0000 c4c8 f6d4 0000120 0000 0008 0000 0000 0000 0001 0000 0018 0000130 0001 0001 0000 0000 0000 0000 0000 0000 0000140 ff02 0000 0000 0000 0000 0000 0000 0001 0000150 3333 0000 0001 0000 0000158