dmesg command lets you peer into the hidden world of the Linux startup processes. Review and monitor hardware device and driver messages from the kernel’s own ring buffer with “the fault finder’s friend.”
How Linux’s Ring Buffer Works
In Linux and Unix-like computers, booting and startup are two distinct phases of the sequence of events that take place when the computer is powered on.
The boot processes (BIOS or UEFI, MBR, and GRUB) take the initialization of the system to the point where the kernel is loaded into memory and connected to the initial ramdisk (initrd or initramfs), and systemd is started.
The startup processes then pick up the baton and complete the initialization of the operating system. In the very early stages of initialization, logging daemons such as syslogd or rsyslogd are not yet up and running. To avoid losing notable error messages and warnings from this phase of initialization, the kernel contains a ring buffer that it uses as a message store.
A ring buffer is a memory space reserved for messages. It is simple in design, and of a fixed size. When it is full, newer messages overwrite the oldest messages. Conceptually it can be thought of as a “circular buffer.”
The kernel ring buffer stores information such as the initialization messages of device drivers, messages from hardware, and messages from kernel modules. Because it contains these low-level startup messages, the ring buffer is a good place to start an investigation into hardware errors or other startup issues.
But don’t go empty-handed. Take
dmesg with you.
The dmesg Command
dmesg command allows you to review the messages that are stored in the ring buffer. By default, you need to use
sudo to use
All of the messages in the ring buffer are displayed in the terminal window.
That was a deluge. Obviously, what we need to do is pipe it through
sudo dmesg | less
Now we can scroll through the messages looking for items of interest.
You can use the search function within
less to locate and highlight items and terms you’re interested in. Start the search function by pressing the forward slash key “/” in
RELATED: How to Use the less Command on Linux
Removing the Need for sudo
If you want to avoid having to use
sudo each time you use
dmesg, you can use this command. But, be aware: it lets anyone with a user account your computer use
dmesg without having to use
sudo sysctl -w kernel.dmesg_restrict=0
Forcing Color Output
dmesg will probably be configured to produce colored output. If it isn’t, you can tell
dmesg to colorize its output using the
-L (color) option.
sudo dmesg -L
dmesg to always default to a colorized display use this command:
sudo dmesg --color=always
dmesg use a timestamp notation of seconds and nanoseconds since the kernel started. To have this rendered in a more human-friendly format, use the
-H (human) option.
sudo dmesg -H
This causes two things to happen.
- The output is automatically displayed in
- The timestamps show a timestamp with the date and time, with a minute resolution. The messages that occurred in each minute are labeled with the seconds and nanoseconds from the start of that minute.
Human Readable Timestamps
If you don’t require nanosecond accuracy, but you do want timestamps that are easier to read than the defaults, use the
-T (human readable) option. (It’s a little confusing.
-H is the “human” option,
-T is the “human readable” option.)
sudo dmesg -T
The timestamps are rendered as standard dates and times, but the resolution is lowered to a minute.
Everything that happened within a single minute has the same timestamp. If all you’re bothered about is the sequence of events, this is good enough. Also, note that you’re dumped back at the command prompt. This option doesn’t automatically invoke
Watching Live Events
To see messages as they arrive in the kernel ring buffer, use the
--follow (wait for messages) option. That sentence might seem a little strange. If the ring buffer is used to store messages from events that take place during the startup sequence, how can live messages arrive in the ring buffer once the computer is up and running?
Anything that causes a change in the hardware connected to your computer will cause messages to be sent to the kernel ring buffer. Update or add a kernel module, and you’ll see ring buffer messages about those changes. If you plug in a USB drive or connect or disconnect a Bluetooth device, you’ll see messages in the
dmesg output. Even virtual hardware will cause new messages to appear in the ring buffer. Fire up a virtual machine, and you’ll see new information arriving in the ring buffer.
sudo dmesg --follow
Note that you are not returned to the command prompt. When new messages appear they are displayed by
dmesg at the bottom of the terminal window.
Even mounting a CD-ROM disk is seen as a change, because you’ve grafted the contents of the CD-ROM disk onto the directory tree.
To exit from the real-time feed, hit
Retrieve the Last Ten Messages
Use the tail command to retrieve the last ten kernel ring buffer messages. Of course, you can retrieve any number of messages. Ten is just our example.
sudo dmesg | last -10
The last ten messages are retrieved and listed in the terminal window.
Searching For Specific Terms
Pipe the output from
grep to search for particular strings or patterns. Here we’re using the
-i (ignore case) option so that the case of matching strings is disregarded. our results will include “usb” and “USB” and any other combination of lowercase and uppercase.
sudo dmesg | grep -i usb
The highlighted search results are in uppercase and lowercase.
sudo dmesg | grep -i sda
All of the messages that mention
sda are retrieved and listed in the terminal window.
grep search for multiple terms at once, use the
-E (extend regular expression) option. You must provide the search terms inside a quoted string with pipe “|” delimiters between the search terms:
sudo dmesg | grep -E "memory|tty|dma"
Any message that mentions any of the search terms is listed in the terminal window.
Using Log Levels
Every message logged to the kernel ring buffer has a level attached to it. The level represents the importance of the information in the message. The levels are:
- emerg: System is unusable.
- alert: Action must be taken immediately.
- crit: Critical conditions.
- err: Error conditions.
- warn: Warning conditions.
- notice: Normal but significant condition.
- info: Informational.
- debug: Debug-level messages.
We can make
dmesg extract messages that match a particular level by using the
-l (level) option and passing the name of the level as a command-line parameter. To see only “informational” level messages, use this command:
sudo dmesg -l info
All of the messages that are listed are informational messages. They don’t contain errors or warnings, just useful notifications.
Combine two or more log levels in one command to retrieve messages of several log levels:
sudo dmesg -l debug,notice
The output from
dmesg is a blend of messages of each log level:
The Facility Categories
dmesg messages are grouped into categories called “facilities.” The list of facilities is:
- kern: Kernel messages.
- user: User-level messages.
- mail: Mail system.
- daemon: System daemons.
- auth: Security/authorization messages.
- syslog: Internal syslogd messages.
- lpr: Line printer subsystem.
- news: Network news subsystem.
We can ask
dmesg to filter its output to only show messages in a specific facility. To do so, we must use the
-f (facility) option:
sudo dmesg -f daemon
dmesg lists all of the messages relating to daemons in the terminal window.
As we did with the levels, we can ask
dmesg to list messages from more than one facility at once:
sudo dmesg -f syslog, daemon
The output is a mix of syslog and daemon log messages.
Combining Facility and Level
-x (decode) option makes
dmesg show the facility and level as human-readable prefixes to each line.
sudo dmesg -x
The facility and level can be seen at the start of each line:
The first highlighted section is a message from the “kernel” facility with a level of “notice.” The second highlighted section is a message from the “kernel” facility with a level of “info.”
That’s Great, But Why?
In a nutshell, fault finding.
If you are having issues with a piece of hardware not being recognized or not behaving properly,
dmesg may throw some light on the issue.
dmesgto review messages from the highest level down through each lower level, looking for any errors or warnings that mention the hardware item, or may have a bearing on the issue.
dmesgto search for any mention of the appropriate facility to see whether they contain any useful information.
grepand look for related strings or identifiers such as product manufacturer or model numbers.
grepand look for generic terms like “gpu” or “storage”, or terms such as “failure”, “failed” or “unable”.
- Use the
--followoption and watch
dmesgmessages in real-time.
- › Fix: Why Isn’t Linux Detecting My Wi-Fi Adapter?
- › How to Check the Linux Kernel and Operating System Version
- › How to Use Linux’s screen Command
- › Check Out This Super-Detailed Teardown of the Google Pixel 7
- › PSA: Your Wi-Fi Camera Might Be Streaming to the Whole World
- › How to Post on Reddit
- › How to Make a Fraction in Microsoft Word
- › How to Sanitize a VR Headset