print or clear the kernel ring buffer.
.IP "\fB\-r\fR, \fB\-\-raw\fR"
Print the raw message buffer, i.e., do not strip the log level prefixes.
+
+Note that the real raw format depends on method how
+.BR dmesg (1)
+reads kernel messages. The /dev/kmsg uses different format than
+.BR syslog (2) .
+For backward compatibility
+.BR dmesg (1)
+returns data always in
+.BR syslog (2)
+format. The real raw data from /dev/kmsg is possible to read for example by
+command 'dd if=/dev/kmsg iflag=nonblock'.
.IP "\fB\-S\fR, \fB\-\-syslog\fR"
Force to use
-.BR syslog(2)
+.BR syslog (2)
kernel interface to read kernel messages. The default is to use /dev/kmsg rather
than
-.BR syslog(2)
+.BR syslog (2)
since kernel 3.5.0.
.IP "\fB\-s\fR, \fB\-\-buffer-size \fIsize\fR
Use a buffer of
return;
}
+ if (ctl->raw) {
+ /* compose syslog(2) compatible output */
+ printf("<%d>[%5d.%06d] ",
+ LOG_MAKEPRI(rec->facility, rec->level),
+ (int) rec->tv.tv_sec,
+ (int) rec->tv.tv_usec);
+
+ goto mesg;
+ }
+
if (ctl->decode && rec->level >= 0 && rec->facility >= 0)
printf("%-6s:%-6s: ", facility_names[rec->facility].name,
level_names[rec->level].name);
!ctl->notime && !ctl->delta && !ctl->ctime)
printf("[%5d.%06d] ", (int) rec->tv.tv_sec, (int) rec->tv.tv_usec);
+mesg:
safe_fwrite(rec->mesg, rec->mesg_size, stdout);
if (*(rec->mesg + rec->mesg_size - 1) != '\n')
if (parse_kmsg_record(ctl, &rec, buf, (size_t) sz) != 0)
continue;
+
print_record(ctl, &rec);
} while (1);