LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > SUSE / openSUSE
User Name
Password
SUSE / openSUSE This Forum is for the discussion of Suse Linux.

Notices


Reply
  Search this Thread
Old 08-07-2006, 11:50 AM   #1
*Xenny*
Member
 
Registered: Jul 2006
Posts: 34

Rep: Reputation: 15
my dmesg output looks really weird


I'm new, but this still looks weird to me. I'm trying to look at my dmesg output to see what's going on with my usb phone, and I get this(below). I've only posted a section because it goes on a bit, but there's nothing else other than more of this sort of thing.
Is it anything to do with my internet connection starting at boot?

Thanks!
Xenny

Code:
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.204.50 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=52948 DF PROTO=TCP SPT=1492 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.100.193 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=55788 DF PROTO=TCP SPT=3587 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.100.193 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=56018 DF PROTO=TCP SPT=3587 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.132.206 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=46 ID=55237 DF PROTO=TCP SPT=1129 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.132.206 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=46 ID=56197 DF PROTO=TCP SPT=1129 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=18401 DF PROTO=TCP SPT=3792 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=19152 DF PROTO=TCP SPT=3792 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.98.7 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=47 ID=58566 DF PROTO=TCP SPT=1174 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.168.95 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=45661 DF PROTO=TCP SPT=4695 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8486 PROTO=UDP SPT=45604 DPT=1026 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8485 PROTO=UDP SPT=45604 DPT=1025 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8487 PROTO=UDP SPT=45604 DPT=1027 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8489 PROTO=UDP SPT=45604 DPT=1029 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8488 PROTO=UDP SPT=45604 DPT=1028 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.124.145 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2507 DF PROTO=TCP SPT=3131 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.128.46 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=40708 DF PROTO=TCP SPT=3171 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.128.46 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=41260 DF PROTO=TCP SPT=3171 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.92.93 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=127 ID=31523 DF PROTO=TCP SPT=3887 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.108.29.192 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=30720 DF PROTO=TCP SPT=4653 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.138.128 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=46302 DF PROTO=TCP SPT=2417 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.53.59 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=47 ID=2180 DF PROTO=TCP SPT=1967 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (0204058C010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=53829 DF PROTO=TCP SPT=4760 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.197.59 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=29799 DF PROTO=TCP SPT=3011 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=11338 DF PROTO=TCP SPT=3595 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
 
Old 08-07-2006, 12:52 PM   #2
theNbomr
LQ 5k Club
 
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
Blog Entries: 2

Rep: Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908
These are from your iptables firewall. There is one or more LOG targets in your firewall setup. To see them, type '/sbin/iptables -L' (as root).

--- rod.
 
Old 08-07-2006, 01:41 PM   #3
*Xenny*
Member
 
Registered: Jul 2006
Posts: 34

Original Poster
Rep: Reputation: 15
Heya

Thanks. I didn't know what iptables was so I've just had a quick read on Wikipedia, but will need to know more before really getting the relevance of the logs (below). I didn't get anything from /sbin/iptables -l, but did from just iptables -l.

What has happened to all the other dmesg stuff? How do I see it?! I feel I have to keep apologising as I know I'm probably asking pretty dumb questions at the moment! Sorry.

Thanks again


Code:
Xenny:/ # iptables -L
Chain INPUT (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED
input_ext  all  --  anywhere             anywhere
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET '
DROP       all  --  anywhere             anywhere

Chain FORWARD (policy DROP)
target     prot opt source               destination
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWD-ILL-ROUTING '

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-OUT-ERROR '

Chain forward_ext (0 references)
target     prot opt source               destination

Chain input_ext (1 references)
target     prot opt source               destination
DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp protocol-unreachable
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp redirect
reject_func  tcp  --  anywhere             anywhere            tcp dpt:ident state NEW
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 PKTTYPE = multicast LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
DROP       all  --  anywhere             anywhere            PKTTYPE = multicast
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp flags:FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG        udp  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT-INV '
DROP       all  --  anywhere             anywhere

Chain reject_func (1 references)
target     prot opt source               destination
REJECT     tcp  --  anywhere             anywhere            reject-with tcp-reset
REJECT     udp  --  anywhere             anywhere            reject-with icmp-port-unreachable
REJECT     all  --  anywhere             anywhere            reject-with icmp-proto-unreachable
 
Old 08-07-2006, 01:48 PM   #4
theNbomr
LQ 5k Club
 
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
Blog Entries: 2

Rep: Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908
The other stuff is still there, you just have to sift through it all to find it. Grep may be helpfull if you know something about what you are looking for.

--- rod.
 
Old 08-07-2006, 02:51 PM   #5
*Xenny*
Member
 
Registered: Jul 2006
Posts: 34

Original Poster
Rep: Reputation: 15
I did try "dmesg | grep -i usb" and I got nothing. I've got usb devices working fine, and can see them all in lsusb.
 
Old 08-08-2006, 01:07 PM   #6
theNbomr
LQ 5k Club
 
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
Blog Entries: 2

Rep: Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908Reputation: 908
The log file may be getting truncated, and the messages of interest are lost before you are getting a chance to see them. I assume the messages of interest are being generated at boot time. Perhaps you can reboot, and re-generate the messages you are interested in. Are you sure the messages of interest contain the string 'usb'?

I am loath to suggest modifying your iptables setup, lest it put your system in jeopardy somehow. If you elect to do this, you should to it with caution.

--- rod.
 
Old 08-09-2006, 02:12 AM   #7
abisko00
Senior Member
 
Registered: Mar 2004
Location: Munich
Distribution: Ubuntu
Posts: 3,517

Rep: Reputation: 58
You could try inverse match (select non-matching strings):

dmesg | grep -v SFW2
 
Old 08-10-2006, 06:35 AM   #8
*Xenny*
Member
 
Registered: Jul 2006
Posts: 34

Original Poster
Rep: Reputation: 15
Rod and abisko

Cheers I've got it sorted - Rod I rebooted and it was fine afterwards.

Thanks for the inverse match suggestion - much better and it prompted me to have a proper look at grep
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
please translate my dmesg output for me... Adrian Baker Linux - Software 2 07-27-2005 03:26 PM
Weird dmesg output. [<c01b16f3>] kobject_register+0x43/0x50 gian2oo1 Slackware 1 07-27-2005 12:11 AM
dmesg output cranium2004 Linux - Newbie 1 01-27-2005 02:03 AM
Weird Dmesg Output raid517 Linux - Hardware 2 09-22-2003 10:14 PM
dmesg output safrout Slackware 6 05-18-2003 11:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > SUSE / openSUSE

All times are GMT -5. The time now is 02:21 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration