FORMAT
Purpose
Format the CTRACE record header, the IP packet header, the protocol header, and the packet data. If one of the ports is a well-known port number and the SYSTCPDA supports data for the port number, the packet data is shown.
Format
CTRACE COMP(SYSTCPDA) SUB((TCPCS)) SHORT OPTIONS((FORMAT))
1 3 MVSJ PACKET 00000001 23:39:11.873541 Packet Trace
2 To Interface : TR1 Device: LCS Token Ring Full=56
Tod Clock : 2002/02/12 23:39:11.873539
3 Sequence # : 0 Flags: Pkt Ver2 Out
Source Port : 1025 Dest Port: 53 Asid: 001E TCB: 007F62C0
4 IpHeader: Version : 4 Header Length: 20
Tos : 00 QOS: Routine Normal Service
Packet Length : 56 ID Number: 000E
Fragment : Offset: 0
5 TTL : 64 Protocol: UDP CheckSum: A6FB FFFF
Source : 9.67.113.65
Destination : 9.37.80.3
6 UDP
Source Port : 1025 () Destination Port: 53 (domain)
Datagram Length : 36 CheckSum: AD0B FFFF
7 DNS: 28
===============================================================================
8 ;; ->>DNS HEADER<<- opcode: QUERY, status: NOERROR, id: 40266
;; flags: rd; Ques: 1, Ans: 0, Auth: 0, Addit: 0
;; QUESTIONS: 1
;; w3.ibm.com IN AAAA
- 1
- A summary line indicating the source of the trace record showing:
- The record number.
- The system name.
- The type of the trace record.
- The time the record was moved to the trace buffer, or with the TOD option the time the trace data was captured.
- The description of the trace record, Packet Trace, Data Trace, EE, or OSAENTA.
- 2
- The trace header with these fields:
- The direction of the trace record: From or To.
- The network interface name (or job name for Data Trace).
- The device type.
- Full or Abbrev with amount of trace data available.
- The time the trace record was captured.
- The number of records lost.
- 3
- The segment number of the CTRACE record for which this packet
trace record was written.
The flags that describe this trace record:
- CfTxt
- This packet contains confidential text.
- Adj
- The CTRACE record size was adjusted to a halfword length.
- Tunnel
- This packet consists of multiple protocol headers, for example, UDP that has an SNA packet (EE).
- Rsm
- This packet was reassembled from multiple packets.
- Home
- The source and destination of this packet are the same.
- IpExt
- The packet has IP header extensions.
- LS
- The packet was part of a segmentation offload group of packets.
- Ping
- The packet is ICMP or ICMPv6 echo or echo reply packet.
- Dat
- The packet was written in response to a DATTRACE command.
- AH
- The packet contains an authentication header.
- Seg
- This trace record was assembled from multiple CTRACE record segments.
- In
- This packet is an inbound packet.
- Out
- This packet is an outbound packet.
- Bad
- The packet had a validation error.
- CkSum
- The packet had a checksum error.
- Pdus
- This packet was written when multiple packets were in the same set of buffers.
- QID
- This packet contains a nonzero OSA QID.
- Nta
- This packet was written in response to an OSAENTA command.
- VLan
- This packet contains a VLAN identifier.
- Frame
- This packet contains an Ethernet header.
- LPAR
- This packet sent over an OSA as LPAR to LPAR.
- L2
- This packet was sent as a Level 2 packet (directly routed by using MAC addresses).
- L3
- This packet was sent as a Level 3 packet (indirectly routed by using IP addresses).
- Dscrd
- This packet was discarded by OSA or by TCPIP.
- Rsp
- This packet is a SNA RU response.
- Req
- This packet is a SNA RU request.
- FMD
- This packet is a SNA Function Management RU.
- NC
- This packet is a SNA Network Control RU.
- SC
- This packet is a SNA System Control RU.
- DFC
- This packet is a SNA Data Flow Control RU.
- FMH
- This packet contains a SNA Function Management header.
- SMC
- This packet was sent over an SMC-R interface.
- 4
- The IP header showing fields from the IPv4 header. The header length is the number of bytes for the header. The offset field is the number of bytes from the end of the IP header where the fragment appears. With the REASSEMBLY option active, this field always contains zeros.
- 5
- The check sum value. If possible, the check sum of the packet is calculated. If the calculated value is X'FFFF', the check sum is correct. If X'0000', the check sum could not be calculated because the packet was incomplete or fragmented. Other values indicate a check sum error.
- 6
- The UDP protocol header. The fields of the header are shown.
The port number for the PORT keywords define the port numbers to be used to invoke a format routine.
- Port
- Keyword
- 67, 68
- BOOTP
- 67, 68
- DHCP
- 53
- Domain
- 12000:12004
- EE
- 79
- Finger
- 70
- Gopher
- 80
- HTTP
- 500
- IKE
- 4500
- NAT
- 123
- NTP
- 111
- RPC
- 520
- RIP
- 520
- Router
- 25
- SMTP
- 161,162
- SNMP
- 23
- TELNET
- 69
- TFTP
- 37
- TIME
- 7
- The length of the DNS packet data following is shown.
- 8
- The DNS header and resource records are formatted. Using the protocol numbers and the known port numbers, format routines are invoked to format standard packet data records.
Figure 1. Format report example
1 17 MVSN PACKET 00000004 19:43:02.541728 Packet Trace
2 To Interface : LOGETH5 Device: QDIO Ethernet Full=6300
Tod Clock : 2004/10/18 19:43:02.541728 Intfx: 5
Sequence # : 0 Flags: Pkt Out Offl
3 IpHeader: Version : 4 Header Length: 20
Tos : 00 QOS: Routine Normal Service
Offload Length : 6300 ID Numbers: 0012-0016
Fragment : Offset: 0
4 TTL : 64 Protocol: TCP CheckSum: 0000 971D
Source : 8.1.1.1
Destination : 8.1.1.2
5 TCP
Source Port : 1026 () Destination Port: 1026 ()
Sequence Number : 3823117120 Ack Number: 3823533758
Header Length : 32 Flags: Ack Psh
Window Size : 32768 CheckSum: 120B 0000 Urgent Data Pointer: 0000
Offload Segments : 4 Length: 1448 Last: 456
Option : NOP
Option : NOP
Option : Timestamp Len: 10 Value: F3913448 Echo: F3913446
- 1
- A summary line indicating the source of the trace record showing:
- The record number.
- The system name.
- The type of the trace record.
- The time the record was moved to the trace buffer, or with the TOD option the time the trace data was captured.
- The description of the trace record, Packet Trace or Data Trace.
- 2
- The trace header with these fields:
- The direction of the trace record: From or To.
- The network interface name (or job name for Data Trace).
- The device type.
- Full or Abbrev with amount of trace data available.
- The time the trace record was captured.
- The number of records lost.
- The packet trace header flags.
- For inbound traffic, the queue identifier (QID) and queue type (for example, SYSDIST, BULKDATA, or EE) on which this packet was received using QDIO inbound workload queueing. For more information about QIDs, see QDIO inbound workload queueing in z/OS Communications Server: IP Configuration Guide.
- 3
- The IP header showing fields from the IPv4 header. The header length is the number of bytes for the header. The offset field is the number of bytes from the end of the IP header where the fragment appears. With the REASSEMBLY option active, this field always contains zeros. If segmentation is offloaded, the ID number field shows the range of IP identifiers represented by this send and the Offload Length field shows the total length of the send (total data length plus one set of headers).
- 4
- The check sum value. If possible, the check sum of the packet is calculated. If the calculated value is X'FFFF', the check sum is correct. If X'0000', the check sum could not be calculated because the packet was incomplete or fragmented. Other values indicate a check sum error.
- 5
- The TCP protocol header. The fields of the header are shown. If segmentation is offloaded, the Offload Segments field shows the number of TCP segments represented by this send and the length of each segment. The length of each segment is the data length (not including headers). If all the segments are the same size, then the Last field does not appear. If the remainder of data length is nonzero, then Last field contains the remainder.