295 lines
12 KiB
ReStructuredText
295 lines
12 KiB
ReStructuredText
|
Linux Magic System Request Key Hacks
|
||
|
====================================
|
||
|
|
||
|
Documentation for sysrq.c
|
||
|
|
||
|
What is the magic SysRq key?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
It is a 'magical' key combo you can hit which the kernel will respond to
|
||
|
regardless of whatever else it is doing, unless it is completely locked up.
|
||
|
|
||
|
How do I enable the magic SysRq key?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when
|
||
|
configuring the kernel. When running a kernel with SysRq compiled in,
|
||
|
/proc/sys/kernel/sysrq controls the functions allowed to be invoked via
|
||
|
the SysRq key. The default value in this file is set by the
|
||
|
CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE config symbol, which itself defaults
|
||
|
to 1. Here is the list of possible values in /proc/sys/kernel/sysrq:
|
||
|
|
||
|
- 0 - disable sysrq completely
|
||
|
- 1 - enable all functions of sysrq
|
||
|
- >1 - bitmask of allowed sysrq functions (see below for detailed function
|
||
|
description)::
|
||
|
|
||
|
2 = 0x2 - enable control of console logging level
|
||
|
4 = 0x4 - enable control of keyboard (SAK, unraw)
|
||
|
8 = 0x8 - enable debugging dumps of processes etc.
|
||
|
16 = 0x10 - enable sync command
|
||
|
32 = 0x20 - enable remount read-only
|
||
|
64 = 0x40 - enable signalling of processes (term, kill, oom-kill)
|
||
|
128 = 0x80 - allow reboot/poweroff
|
||
|
256 = 0x100 - allow nicing of all RT tasks
|
||
|
|
||
|
You can set the value in the file by the following command::
|
||
|
|
||
|
echo "number" >/proc/sys/kernel/sysrq
|
||
|
|
||
|
The number may be written here either as decimal or as hexadecimal
|
||
|
with the 0x prefix. CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE must always be
|
||
|
written in hexadecimal.
|
||
|
|
||
|
Note that the value of ``/proc/sys/kernel/sysrq`` influences only the invocation
|
||
|
via a keyboard. Invocation of any operation via ``/proc/sysrq-trigger`` is
|
||
|
always allowed (by a user with admin privileges).
|
||
|
|
||
|
How do I use the magic SysRq key?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
On x86
|
||
|
You press the key combo :kbd:`ALT-SysRq-<command key>`.
|
||
|
|
||
|
.. note::
|
||
|
Some
|
||
|
keyboards may not have a key labeled 'SysRq'. The 'SysRq' key is
|
||
|
also known as the 'Print Screen' key. Also some keyboards cannot
|
||
|
handle so many keys being pressed at the same time, so you might
|
||
|
have better luck with press :kbd:`Alt`, press :kbd:`SysRq`,
|
||
|
release :kbd:`SysRq`, press :kbd:`<command key>`, release everything.
|
||
|
|
||
|
On SPARC
|
||
|
You press :kbd:`ALT-STOP-<command key>`, I believe.
|
||
|
|
||
|
On the serial console (PC style standard serial ports only)
|
||
|
You send a ``BREAK``, then within 5 seconds a command key. Sending
|
||
|
``BREAK`` twice is interpreted as a normal BREAK.
|
||
|
|
||
|
On PowerPC
|
||
|
Press :kbd:`ALT - Print Screen` (or :kbd:`F13`) - :kbd:`<command key>`.
|
||
|
:kbd:`Print Screen` (or :kbd:`F13`) - :kbd:`<command key>` may suffice.
|
||
|
|
||
|
On other
|
||
|
If you know of the key combos for other architectures, please
|
||
|
submit a patch to be included in this section.
|
||
|
|
||
|
On all
|
||
|
Write a character to /proc/sysrq-trigger. e.g.::
|
||
|
|
||
|
echo t > /proc/sysrq-trigger
|
||
|
|
||
|
The :kbd:`<command key>` is case sensitive.
|
||
|
|
||
|
What are the 'command' keys?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
=========== ===================================================================
|
||
|
Command Function
|
||
|
=========== ===================================================================
|
||
|
``b`` Will immediately reboot the system without syncing or unmounting
|
||
|
your disks.
|
||
|
|
||
|
``c`` Will perform a system crash and a crashdump will be taken
|
||
|
if configured.
|
||
|
|
||
|
``d`` Shows all locks that are held.
|
||
|
|
||
|
``e`` Send a SIGTERM to all processes, except for init.
|
||
|
|
||
|
``f`` Will call the oom killer to kill a memory hog process, but do not
|
||
|
panic if nothing can be killed.
|
||
|
|
||
|
``g`` Used by kgdb (kernel debugger)
|
||
|
|
||
|
``h`` Will display help (actually any other key than those listed
|
||
|
here will display help. but ``h`` is easy to remember :-)
|
||
|
|
||
|
``i`` Send a SIGKILL to all processes, except for init.
|
||
|
|
||
|
``j`` Forcibly "Just thaw it" - filesystems frozen by the FIFREEZE ioctl.
|
||
|
|
||
|
``k`` Secure Access Key (SAK) Kills all programs on the current virtual
|
||
|
console. NOTE: See important comments below in SAK section.
|
||
|
|
||
|
``l`` Shows a stack backtrace for all active CPUs.
|
||
|
|
||
|
``m`` Will dump current memory info to your console.
|
||
|
|
||
|
``n`` Used to make RT tasks nice-able
|
||
|
|
||
|
``o`` Will shut your system off (if configured and supported).
|
||
|
|
||
|
``p`` Will dump the current registers and flags to your console.
|
||
|
|
||
|
``q`` Will dump per CPU lists of all armed hrtimers (but NOT regular
|
||
|
timer_list timers) and detailed information about all
|
||
|
clockevent devices.
|
||
|
|
||
|
``r`` Turns off keyboard raw mode and sets it to XLATE.
|
||
|
|
||
|
``s`` Will attempt to sync all mounted filesystems.
|
||
|
|
||
|
``t`` Will dump a list of current tasks and their information to your
|
||
|
console.
|
||
|
|
||
|
``u`` Will attempt to remount all mounted filesystems read-only.
|
||
|
|
||
|
``v`` Forcefully restores framebuffer console
|
||
|
``v`` Causes ETM buffer dump [ARM-specific]
|
||
|
|
||
|
``w`` Dumps tasks that are in uninterruptable (blocked) state.
|
||
|
|
||
|
``x`` Used by xmon interface on ppc/powerpc platforms.
|
||
|
Show global PMU Registers on sparc64.
|
||
|
Dump all TLB entries on MIPS.
|
||
|
|
||
|
``y`` Show global CPU Registers [SPARC-64 specific]
|
||
|
|
||
|
``z`` Dump the ftrace buffer
|
||
|
|
||
|
``0``-``9`` Sets the console log level, controlling which kernel messages
|
||
|
will be printed to your console. (``0``, for example would make
|
||
|
it so that only emergency messages like PANICs or OOPSes would
|
||
|
make it to your console.)
|
||
|
=========== ===================================================================
|
||
|
|
||
|
Okay, so what can I use them for?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
Well, unraw(r) is very handy when your X server or a svgalib program crashes.
|
||
|
|
||
|
sak(k) (Secure Access Key) is useful when you want to be sure there is no
|
||
|
trojan program running at console which could grab your password
|
||
|
when you would try to login. It will kill all programs on given console,
|
||
|
thus letting you make sure that the login prompt you see is actually
|
||
|
the one from init, not some trojan program.
|
||
|
|
||
|
.. important::
|
||
|
|
||
|
In its true form it is not a true SAK like the one in a
|
||
|
c2 compliant system, and it should not be mistaken as
|
||
|
such.
|
||
|
|
||
|
It seems others find it useful as (System Attention Key) which is
|
||
|
useful when you want to exit a program that will not let you switch consoles.
|
||
|
(For example, X or a svgalib program.)
|
||
|
|
||
|
``reboot(b)`` is good when you're unable to shut down, it is an equivalent
|
||
|
of pressing the "reset" button.
|
||
|
|
||
|
``crash(c)`` can be used to manually trigger a crashdump when the system is hung.
|
||
|
Note that this just triggers a crash if there is no dump mechanism available.
|
||
|
|
||
|
``sync(s)`` is handy before yanking removable medium or after using a rescue
|
||
|
shell that provides no graceful shutdown -- it will ensure your data is
|
||
|
safely written to the disk. Note that the sync hasn't taken place until you see
|
||
|
the "OK" and "Done" appear on the screen.
|
||
|
|
||
|
``umount(u)`` can be used to mark filesystems as properly unmounted. From the
|
||
|
running system's point of view, they will be remounted read-only. The remount
|
||
|
isn't complete until you see the "OK" and "Done" message appear on the screen.
|
||
|
|
||
|
The loglevels ``0``-``9`` are useful when your console is being flooded with
|
||
|
kernel messages you do not want to see. Selecting ``0`` will prevent all but
|
||
|
the most urgent kernel messages from reaching your console. (They will
|
||
|
still be logged if syslogd/klogd are alive, though.)
|
||
|
|
||
|
``term(e)`` and ``kill(i)`` are useful if you have some sort of runaway process
|
||
|
you are unable to kill any other way, especially if it's spawning other
|
||
|
processes.
|
||
|
|
||
|
"just thaw ``it(j)``" is useful if your system becomes unresponsive due to a
|
||
|
frozen (probably root) filesystem via the FIFREEZE ioctl.
|
||
|
|
||
|
Sometimes SysRq seems to get 'stuck' after using it, what can I do?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
When this happens, try tapping shift, alt and control on both sides of the
|
||
|
keyboard, and hitting an invalid sysrq sequence again. (i.e., something like
|
||
|
:kbd:`alt-sysrq-z`).
|
||
|
|
||
|
Switching to another virtual console (:kbd:`ALT+Fn`) and then back again
|
||
|
should also help.
|
||
|
|
||
|
I hit SysRq, but nothing seems to happen, what's wrong?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
There are some keyboards that produce a different keycode for SysRq than the
|
||
|
pre-defined value of 99
|
||
|
(see ``KEY_SYSRQ`` in ``include/uapi/linux/input-event-codes.h``), or
|
||
|
which don't have a SysRq key at all. In these cases, run ``showkey -s`` to find
|
||
|
an appropriate scancode sequence, and use ``setkeycodes <sequence> 99`` to map
|
||
|
this sequence to the usual SysRq code (e.g., ``setkeycodes e05b 99``). It's
|
||
|
probably best to put this command in a boot script. Oh, and by the way, you
|
||
|
exit ``showkey`` by not typing anything for ten seconds.
|
||
|
|
||
|
I want to add SysRQ key events to a module, how does it work?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
In order to register a basic function with the table, you must first include
|
||
|
the header ``include/linux/sysrq.h``, this will define everything else you need.
|
||
|
Next, you must create a ``sysrq_key_op`` struct, and populate it with A) the key
|
||
|
handler function you will use, B) a help_msg string, that will print when SysRQ
|
||
|
prints help, and C) an action_msg string, that will print right before your
|
||
|
handler is called. Your handler must conform to the prototype in 'sysrq.h'.
|
||
|
|
||
|
After the ``sysrq_key_op`` is created, you can call the kernel function
|
||
|
``register_sysrq_key(int key, const struct sysrq_key_op *op_p);`` this will
|
||
|
register the operation pointed to by ``op_p`` at table key 'key',
|
||
|
if that slot in the table is blank. At module unload time, you must call
|
||
|
the function ``unregister_sysrq_key(int key, const struct sysrq_key_op *op_p)``,
|
||
|
which will remove the key op pointed to by 'op_p' from the key 'key', if and
|
||
|
only if it is currently registered in that slot. This is in case the slot has
|
||
|
been overwritten since you registered it.
|
||
|
|
||
|
The Magic SysRQ system works by registering key operations against a key op
|
||
|
lookup table, which is defined in 'drivers/tty/sysrq.c'. This key table has
|
||
|
a number of operations registered into it at compile time, but is mutable,
|
||
|
and 2 functions are exported for interface to it::
|
||
|
|
||
|
register_sysrq_key and unregister_sysrq_key.
|
||
|
|
||
|
Of course, never ever leave an invalid pointer in the table. I.e., when
|
||
|
your module that called register_sysrq_key() exits, it must call
|
||
|
unregister_sysrq_key() to clean up the sysrq key table entry that it used.
|
||
|
Null pointers in the table are always safe. :)
|
||
|
|
||
|
If for some reason you feel the need to call the handle_sysrq function from
|
||
|
within a function called by handle_sysrq, you must be aware that you are in
|
||
|
a lock (you are also in an interrupt handler, which means don't sleep!), so
|
||
|
you must call ``__handle_sysrq_nolock`` instead.
|
||
|
|
||
|
When I hit a SysRq key combination only the header appears on the console?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
Sysrq output is subject to the same console loglevel control as all
|
||
|
other console output. This means that if the kernel was booted 'quiet'
|
||
|
as is common on distro kernels the output may not appear on the actual
|
||
|
console, even though it will appear in the dmesg buffer, and be accessible
|
||
|
via the dmesg command and to the consumers of ``/proc/kmsg``. As a specific
|
||
|
exception the header line from the sysrq command is passed to all console
|
||
|
consumers as if the current loglevel was maximum. If only the header
|
||
|
is emitted it is almost certain that the kernel loglevel is too low.
|
||
|
Should you require the output on the console channel then you will need
|
||
|
to temporarily up the console loglevel using :kbd:`alt-sysrq-8` or::
|
||
|
|
||
|
echo 8 > /proc/sysrq-trigger
|
||
|
|
||
|
Remember to return the loglevel to normal after triggering the sysrq
|
||
|
command you are interested in.
|
||
|
|
||
|
I have more questions, who can I ask?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
Just ask them on the linux-kernel mailing list:
|
||
|
linux-kernel@vger.kernel.org
|
||
|
|
||
|
Credits
|
||
|
~~~~~~~
|
||
|
|
||
|
- Written by Mydraal <vulpyne@vulpyne.net>
|
||
|
- Updated by Adam Sulmicki <adam@cfar.umd.edu>
|
||
|
- Updated by Jeremy M. Dolan <jmd@turbogeek.org> 2001/01/28 10:15:59
|
||
|
- Added to by Crutcher Dunnavant <crutcher+kernel@datastacks.com>
|