diff options
author | Mauro Carvalho Chehab <mchehab@s-opensource.com> | 2016-09-23 15:07:08 -0400 |
---|---|---|
committer | Mauro Carvalho Chehab <mchehab@s-opensource.com> | 2016-10-24 06:12:35 -0400 |
commit | c8956bb7dd9525bba4155bf5a09022f036224b3c (patch) | |
tree | 8fa276d362b4d96365c79a8b4d5050f626429023 | |
parent | 3177ae4a1034482efe2c3eef5ab9988d050c5b4f (diff) |
Documentation/sysrq.txt: convert to ReST markup
- Fix document title;
- use a table for the valid commands;
- use quote blocks where needed;
- use monotonic fonts for config options and file names;
- adjust whitespaces and blank lines;
- add it to the user's book.
Signed-off-by: Mauro Carvalho Chehab <mchehab@s-opensource.com>
-rw-r--r-- | Documentation/sysrq.txt | 266 |
1 files changed, 149 insertions, 117 deletions
diff --git a/Documentation/sysrq.txt b/Documentation/sysrq.txt index 3a3b30ac2a75..d1712ea2d314 100644 --- a/Documentation/sysrq.txt +++ b/Documentation/sysrq.txt | |||
@@ -1,23 +1,29 @@ | |||
1 | Linux Magic System Request Key Hacks | 1 | Linux Magic System Request Key Hacks |
2 | ==================================== | ||
3 | |||
2 | Documentation for sysrq.c | 4 | Documentation for sysrq.c |
3 | 5 | ||
4 | * What is the magic SysRq key? | 6 | What is the magic SysRq key? |
5 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 7 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
8 | |||
6 | It is a 'magical' key combo you can hit which the kernel will respond to | 9 | It is a 'magical' key combo you can hit which the kernel will respond to |
7 | regardless of whatever else it is doing, unless it is completely locked up. | 10 | regardless of whatever else it is doing, unless it is completely locked up. |
8 | 11 | ||
9 | * How do I enable the magic SysRq key? | 12 | How do I enable the magic SysRq key? |
10 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 13 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
14 | |||
11 | You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when | 15 | You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when |
12 | configuring the kernel. When running a kernel with SysRq compiled in, | 16 | configuring the kernel. When running a kernel with SysRq compiled in, |
13 | /proc/sys/kernel/sysrq controls the functions allowed to be invoked via | 17 | /proc/sys/kernel/sysrq controls the functions allowed to be invoked via |
14 | the SysRq key. The default value in this file is set by the | 18 | the SysRq key. The default value in this file is set by the |
15 | CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE config symbol, which itself defaults | 19 | CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE config symbol, which itself defaults |
16 | to 1. Here is the list of possible values in /proc/sys/kernel/sysrq: | 20 | to 1. Here is the list of possible values in /proc/sys/kernel/sysrq: |
17 | 0 - disable sysrq completely | 21 | |
18 | 1 - enable all functions of sysrq | 22 | - 0 - disable sysrq completely |
19 | >1 - bitmask of allowed sysrq functions (see below for detailed function | 23 | - 1 - enable all functions of sysrq |
20 | description): | 24 | - >1 - bitmask of allowed sysrq functions (see below for detailed function |
25 | description):: | ||
26 | |||
21 | 2 = 0x2 - enable control of console logging level | 27 | 2 = 0x2 - enable control of console logging level |
22 | 4 = 0x4 - enable control of keyboard (SAK, unraw) | 28 | 4 = 0x4 - enable control of keyboard (SAK, unraw) |
23 | 8 = 0x8 - enable debugging dumps of processes etc. | 29 | 8 = 0x8 - enable debugging dumps of processes etc. |
@@ -27,112 +33,126 @@ to 1. Here is the list of possible values in /proc/sys/kernel/sysrq: | |||
27 | 128 = 0x80 - allow reboot/poweroff | 33 | 128 = 0x80 - allow reboot/poweroff |
28 | 256 = 0x100 - allow nicing of all RT tasks | 34 | 256 = 0x100 - allow nicing of all RT tasks |
29 | 35 | ||
30 | You can set the value in the file by the following command: | 36 | You can set the value in the file by the following command:: |
37 | |||
31 | echo "number" >/proc/sys/kernel/sysrq | 38 | echo "number" >/proc/sys/kernel/sysrq |
32 | 39 | ||
33 | The number may be written here either as decimal or as hexadecimal | 40 | The number may be written here either as decimal or as hexadecimal |
34 | with the 0x prefix. CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE must always be | 41 | with the 0x prefix. CONFIG_MAGIC_SYSRQ_DEFAULT_ENABLE must always be |
35 | written in hexadecimal. | 42 | written in hexadecimal. |
36 | 43 | ||
37 | Note that the value of /proc/sys/kernel/sysrq influences only the invocation | 44 | Note that the value of ``/proc/sys/kernel/sysrq`` influences only the invocation |
38 | via a keyboard. Invocation of any operation via /proc/sysrq-trigger is always | 45 | via a keyboard. Invocation of any operation via ``/proc/sysrq-trigger`` is |
39 | allowed (by a user with admin privileges). | 46 | always allowed (by a user with admin privileges). |
40 | 47 | ||
41 | * How do I use the magic SysRq key? | 48 | How do I use the magic SysRq key? |
42 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 49 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
43 | On x86 - You press the key combo 'ALT-SysRq-<command key>'. Note - Some | 50 | |
51 | On x86 - You press the key combo :kbd:`ALT-SysRq-<command key>`. | ||
52 | |||
53 | .. note:: | ||
54 | Some | ||
44 | keyboards may not have a key labeled 'SysRq'. The 'SysRq' key is | 55 | keyboards may not have a key labeled 'SysRq'. The 'SysRq' key is |
45 | also known as the 'Print Screen' key. Also some keyboards cannot | 56 | also known as the 'Print Screen' key. Also some keyboards cannot |
46 | handle so many keys being pressed at the same time, so you might | 57 | handle so many keys being pressed at the same time, so you might |
47 | have better luck with "press Alt", "press SysRq", "release SysRq", | 58 | have better luck with press :kbd:`Alt`, press :kbd:`SysRq`, |
48 | "press <command key>", release everything. | 59 | release :kbd:`SysRq`, press :kbd:`<command key>`, release everything. |
49 | 60 | ||
50 | On SPARC - You press 'ALT-STOP-<command key>', I believe. | 61 | On SPARC - You press :kbd:`ALT-STOP-<command key>`, I believe. |
51 | 62 | ||
52 | On the serial console (PC style standard serial ports only) - | 63 | On the serial console (PC style standard serial ports only) |
53 | You send a BREAK, then within 5 seconds a command key. Sending | 64 | You send a ``BREAK``, then within 5 seconds a command key. Sending |
54 | BREAK twice is interpreted as a normal BREAK. | 65 | ``BREAK`` twice is interpreted as a normal BREAK. |
55 | 66 | ||
56 | On PowerPC - Press 'ALT - Print Screen (or F13) - <command key>, | 67 | On PowerPC |
57 | Print Screen (or F13) - <command key> may suffice. | 68 | Press :kbd:`ALT - Print Screen` (or :kbd:`F13`) - :kbd:`<command key>`, |
69 | :kbd:`Print Screen` (or :kbd:`F13`) - :kbd:`<command key>` may suffice. | ||
58 | 70 | ||
59 | On other - If you know of the key combos for other architectures, please | 71 | On other |
60 | let me know so I can add them to this section. | 72 | If you know of the key combos for other architectures, please |
73 | let me know so I can add them to this section. | ||
61 | 74 | ||
62 | On all - write a character to /proc/sysrq-trigger. e.g.: | 75 | On all |
76 | write a character to /proc/sysrq-trigger. e.g.:: | ||
63 | 77 | ||
64 | echo t > /proc/sysrq-trigger | 78 | echo t > /proc/sysrq-trigger |
65 | 79 | ||
66 | * What are the 'command' keys? | 80 | What are the 'command' keys? |
67 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 81 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
68 | 'b' - Will immediately reboot the system without syncing or unmounting | ||
69 | your disks. | ||
70 | 82 | ||
71 | 'c' - Will perform a system crash by a NULL pointer dereference. | 83 | =========== =================================================================== |
72 | A crashdump will be taken if configured. | 84 | Command Function |
85 | =========== =================================================================== | ||
86 | ``b`` Will immediately reboot the system without syncing or unmounting | ||
87 | your disks. | ||
73 | 88 | ||
74 | 'd' - Shows all locks that are held. | 89 | ``c`` Will perform a system crash by a NULL pointer dereference. |
90 | A crashdump will be taken if configured. | ||
75 | 91 | ||
76 | 'e' - Send a SIGTERM to all processes, except for init. | 92 | ``d`` Shows all locks that are held. |
77 | 93 | ||
78 | 'f' - Will call the oom killer to kill a memory hog process, but do not | 94 | ``e`` Send a SIGTERM to all processes, except for init. |
79 | panic if nothing can be killed. | ||
80 | 95 | ||
81 | 'g' - Used by kgdb (kernel debugger) | 96 | ``f`` Will call the oom killer to kill a memory hog process, but do not |
97 | panic if nothing can be killed. | ||
82 | 98 | ||
83 | 'h' - Will display help (actually any other key than those listed | 99 | ``g`` Used by kgdb (kernel debugger) |
84 | here will display help. but 'h' is easy to remember :-) | ||
85 | 100 | ||
86 | 'i' - Send a SIGKILL to all processes, except for init. | 101 | ``h`` Will display help (actually any other key than those listed |
102 | here will display help. but ``h`` is easy to remember :-) | ||
87 | 103 | ||
88 | 'j' - Forcibly "Just thaw it" - filesystems frozen by the FIFREEZE ioctl. | 104 | ``i`` Send a SIGKILL to all processes, except for init. |
89 | 105 | ||
90 | 'k' - Secure Access Key (SAK) Kills all programs on the current virtual | 106 | ``j`` Forcibly "Just thaw it" - filesystems frozen by the FIFREEZE ioctl. |
91 | console. NOTE: See important comments below in SAK section. | ||
92 | 107 | ||
93 | 'l' - Shows a stack backtrace for all active CPUs. | 108 | ``k`` Secure Access Key (SAK) Kills all programs on the current virtual |
109 | console. NOTE: See important comments below in SAK section. | ||
94 | 110 | ||
95 | 'm' - Will dump current memory info to your console. | 111 | ``l`` Shows a stack backtrace for all active CPUs. |
96 | 112 | ||
97 | 'n' - Used to make RT tasks nice-able | 113 | ``m`` Will dump current memory info to your console. |
98 | 114 | ||
99 | 'o' - Will shut your system off (if configured and supported). | 115 | ``n`` Used to make RT tasks nice-able |
100 | 116 | ||
101 | 'p' - Will dump the current registers and flags to your console. | 117 | ``o`` Will shut your system off (if configured and supported). |
102 | 118 | ||
103 | 'q' - Will dump per CPU lists of all armed hrtimers (but NOT regular | 119 | ``p`` Will dump the current registers and flags to your console. |
104 | timer_list timers) and detailed information about all | ||
105 | clockevent devices. | ||
106 | 120 | ||
107 | 'r' - Turns off keyboard raw mode and sets it to XLATE. | 121 | ``q`` Will dump per CPU lists of all armed hrtimers (but NOT regular |
122 | timer_list timers) and detailed information about all | ||
123 | clockevent devices. | ||
108 | 124 | ||
109 | 's' - Will attempt to sync all mounted filesystems. | 125 | ``r`` Turns off keyboard raw mode and sets it to XLATE. |
110 | 126 | ||
111 | 't' - Will dump a list of current tasks and their information to your | 127 | ``s`` Will attempt to sync all mounted filesystems. |
112 | console. | ||
113 | 128 | ||
114 | 'u' - Will attempt to remount all mounted filesystems read-only. | 129 | ``t`` Will dump a list of current tasks and their information to your |
130 | console. | ||
115 | 131 | ||
116 | 'v' - Forcefully restores framebuffer console | 132 | ``u`` Will attempt to remount all mounted filesystems read-only. |
117 | 'v' - Causes ETM buffer dump [ARM-specific] | ||
118 | 133 | ||
119 | 'w' - Dumps tasks that are in uninterruptable (blocked) state. | 134 | ``v`` Forcefully restores framebuffer console |
135 | ``v`` Causes ETM buffer dump [ARM-specific] | ||
120 | 136 | ||
121 | 'x' - Used by xmon interface on ppc/powerpc platforms. | 137 | ``w`` Dumps tasks that are in uninterruptable (blocked) state. |
122 | Show global PMU Registers on sparc64. | ||
123 | Dump all TLB entries on MIPS. | ||
124 | 138 | ||
125 | 'y' - Show global CPU Registers [SPARC-64 specific] | 139 | ``x`` Used by xmon interface on ppc/powerpc platforms. |
140 | Show global PMU Registers on sparc64. | ||
141 | Dump all TLB entries on MIPS. | ||
126 | 142 | ||
127 | 'z' - Dump the ftrace buffer | 143 | ``y`` Show global CPU Registers [SPARC-64 specific] |
128 | 144 | ||
129 | '0'-'9' - Sets the console log level, controlling which kernel messages | 145 | ``z`` Dump the ftrace buffer |
130 | will be printed to your console. ('0', for example would make | 146 | |
131 | it so that only emergency messages like PANICs or OOPSes would | 147 | ``0``-``9`` Sets the console log level, controlling which kernel messages |
132 | make it to your console.) | 148 | will be printed to your console. (``0``, for example would make |
149 | it so that only emergency messages like PANICs or OOPSes would | ||
150 | make it to your console.) | ||
151 | =========== =================================================================== | ||
152 | |||
153 | Okay, so what can I use them for? | ||
154 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
133 | 155 | ||
134 | * Okay, so what can I use them for? | ||
135 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
136 | Well, unraw(r) is very handy when your X server or a svgalib program crashes. | 156 | Well, unraw(r) is very handy when your X server or a svgalib program crashes. |
137 | 157 | ||
138 | sak(k) (Secure Access Key) is useful when you want to be sure there is no | 158 | sak(k) (Secure Access Key) is useful when you want to be sure there is no |
@@ -140,73 +160,80 @@ trojan program running at console which could grab your password | |||
140 | when you would try to login. It will kill all programs on given console, | 160 | when you would try to login. It will kill all programs on given console, |
141 | thus letting you make sure that the login prompt you see is actually | 161 | thus letting you make sure that the login prompt you see is actually |
142 | the one from init, not some trojan program. | 162 | the one from init, not some trojan program. |
143 | IMPORTANT: In its true form it is not a true SAK like the one in a :IMPORTANT | 163 | |
144 | IMPORTANT: c2 compliant system, and it should not be mistaken as :IMPORTANT | 164 | .. important:: |
145 | IMPORTANT: such. :IMPORTANT | 165 | |
146 | It seems others find it useful as (System Attention Key) which is | 166 | In its true form it is not a true SAK like the one in a |
167 | c2 compliant system, and it should not be mistaken as | ||
168 | such. | ||
169 | |||
170 | It seems others find it useful as (System Attention Key) which is | ||
147 | useful when you want to exit a program that will not let you switch consoles. | 171 | useful when you want to exit a program that will not let you switch consoles. |
148 | (For example, X or a svgalib program.) | 172 | (For example, X or a svgalib program.) |
149 | 173 | ||
150 | reboot(b) is good when you're unable to shut down. But you should also | 174 | ``reboot(b)`` is good when you're unable to shut down. But you should also |
151 | sync(s) and umount(u) first. | 175 | ``sync(s)`` and ``umount(u)`` first. |
152 | 176 | ||
153 | crash(c) can be used to manually trigger a crashdump when the system is hung. | 177 | ``crash(c)`` can be used to manually trigger a crashdump when the system is hung. |
154 | Note that this just triggers a crash if there is no dump mechanism available. | 178 | Note that this just triggers a crash if there is no dump mechanism available. |
155 | 179 | ||
156 | sync(s) is great when your system is locked up, it allows you to sync your | 180 | ``sync(s)`` is great when your system is locked up, it allows you to sync your |
157 | disks and will certainly lessen the chance of data loss and fscking. Note | 181 | disks and will certainly lessen the chance of data loss and fscking. Note |
158 | that the sync hasn't taken place until you see the "OK" and "Done" appear | 182 | that the sync hasn't taken place until you see the "OK" and "Done" appear |
159 | on the screen. (If the kernel is really in strife, you may not ever get the | 183 | on the screen. (If the kernel is really in strife, you may not ever get the |
160 | OK or Done message...) | 184 | OK or Done message...) |
161 | 185 | ||
162 | umount(u) is basically useful in the same ways as sync(s). I generally sync(s), | 186 | ``umount(u)`` is basically useful in the same ways as ``sync(s)``. I generally |
163 | umount(u), then reboot(b) when my system locks. It's saved me many a fsck. | 187 | ``sync(s)``, ``umount(u)``, then ``reboot(b)`` when my system locks. It's saved |
164 | Again, the unmount (remount read-only) hasn't taken place until you see the | 188 | me many a fsck. Again, the unmount (remount read-only) hasn't taken place until |
165 | "OK" and "Done" message appear on the screen. | 189 | you see the "OK" and "Done" message appear on the screen. |
166 | 190 | ||
167 | The loglevels '0'-'9' are useful when your console is being flooded with | 191 | The loglevels ``0``-``9`` are useful when your console is being flooded with |
168 | kernel messages you do not want to see. Selecting '0' will prevent all but | 192 | kernel messages you do not want to see. Selecting ``0`` will prevent all but |
169 | the most urgent kernel messages from reaching your console. (They will | 193 | the most urgent kernel messages from reaching your console. (They will |
170 | still be logged if syslogd/klogd are alive, though.) | 194 | still be logged if syslogd/klogd are alive, though.) |
171 | 195 | ||
172 | term(e) and kill(i) are useful if you have some sort of runaway process you | 196 | ``term(e)`` and ``kill(i)`` are useful if you have some sort of runaway process |
173 | are unable to kill any other way, especially if it's spawning other | 197 | you are unable to kill any other way, especially if it's spawning other |
174 | processes. | 198 | processes. |
175 | 199 | ||
176 | "just thaw it(j)" is useful if your system becomes unresponsive due to a frozen | 200 | "just thaw ``it(j)``" is useful if your system becomes unresponsive due to a |
177 | (probably root) filesystem via the FIFREEZE ioctl. | 201 | frozen (probably root) filesystem via the FIFREEZE ioctl. |
202 | |||
203 | Sometimes SysRq seems to get 'stuck' after using it, what can I do? | ||
204 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
178 | 205 | ||
179 | * Sometimes SysRq seems to get 'stuck' after using it, what can I do? | ||
180 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
181 | That happens to me, also. I've found that tapping shift, alt, and control | 206 | That happens to me, also. I've found that tapping shift, alt, and control |
182 | on both sides of the keyboard, and hitting an invalid sysrq sequence again | 207 | on both sides of the keyboard, and hitting an invalid sysrq sequence again |
183 | will fix the problem. (i.e., something like alt-sysrq-z). Switching to another | 208 | will fix the problem. (i.e., something like :kbd:`alt-sysrq-z`). Switching to |
184 | virtual console (ALT+Fn) and then back again should also help. | 209 | another virtual console (:kbd:`ALT+Fn`) and then back again should also help. |
210 | |||
211 | I hit SysRq, but nothing seems to happen, what's wrong? | ||
212 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
185 | 213 | ||
186 | * I hit SysRq, but nothing seems to happen, what's wrong? | ||
187 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
188 | There are some keyboards that produce a different keycode for SysRq than the | 214 | There are some keyboards that produce a different keycode for SysRq than the |
189 | pre-defined value of 99 (see KEY_SYSRQ in include/linux/input.h), or which | 215 | pre-defined value of 99 (see ``KEY_SYSRQ`` in ``include/linux/input.h``), or |
190 | don't have a SysRq key at all. In these cases, run 'showkey -s' to find an | 216 | which don't have a SysRq key at all. In these cases, run ``showkey -s`` to find |
191 | appropriate scancode sequence, and use 'setkeycodes <sequence> 99' to map | 217 | an appropriate scancode sequence, and use ``setkeycodes <sequence> 99`` to map |
192 | this sequence to the usual SysRq code (e.g., 'setkeycodes e05b 99'). It's | 218 | this sequence to the usual SysRq code (e.g., ``setkeycodes e05b 99``). It's |
193 | probably best to put this command in a boot script. Oh, and by the way, you | 219 | probably best to put this command in a boot script. Oh, and by the way, you |
194 | exit 'showkey' by not typing anything for ten seconds. | 220 | exit ``showkey`` by not typing anything for ten seconds. |
221 | |||
222 | I want to add SysRQ key events to a module, how does it work? | ||
223 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
195 | 224 | ||
196 | * I want to add SysRQ key events to a module, how does it work? | ||
197 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
198 | In order to register a basic function with the table, you must first include | 225 | In order to register a basic function with the table, you must first include |
199 | the header 'include/linux/sysrq.h', this will define everything else you need. | 226 | the header ``include/linux/sysrq.h``, this will define everything else you need. |
200 | Next, you must create a sysrq_key_op struct, and populate it with A) the key | 227 | Next, you must create a ``sysrq_key_op`` struct, and populate it with A) the key |
201 | handler function you will use, B) a help_msg string, that will print when SysRQ | 228 | handler function you will use, B) a help_msg string, that will print when SysRQ |
202 | prints help, and C) an action_msg string, that will print right before your | 229 | prints help, and C) an action_msg string, that will print right before your |
203 | handler is called. Your handler must conform to the prototype in 'sysrq.h'. | 230 | handler is called. Your handler must conform to the prototype in 'sysrq.h'. |
204 | 231 | ||
205 | After the sysrq_key_op is created, you can call the kernel function | 232 | After the ``sysrq_key_op`` is created, you can call the kernel function |
206 | register_sysrq_key(int key, struct sysrq_key_op *op_p); this will | 233 | ``register_sysrq_key(int key, struct sysrq_key_op *op_p);`` this will |
207 | register the operation pointed to by 'op_p' at table key 'key', | 234 | register the operation pointed to by ``op_p`` at table key 'key', |
208 | if that slot in the table is blank. At module unload time, you must call | 235 | if that slot in the table is blank. At module unload time, you must call |
209 | the function unregister_sysrq_key(int key, struct sysrq_key_op *op_p), which | 236 | the function ``unregister_sysrq_key(int key, struct sysrq_key_op *op_p)``, which |
210 | will remove the key op pointed to by 'op_p' from the key 'key', if and only if | 237 | will remove the key op pointed to by 'op_p' from the key 'key', if and only if |
211 | it is currently registered in that slot. This is in case the slot has been | 238 | it is currently registered in that slot. This is in case the slot has been |
212 | overwritten since you registered it. | 239 | overwritten since you registered it. |
@@ -214,8 +241,10 @@ overwritten since you registered it. | |||
214 | The Magic SysRQ system works by registering key operations against a key op | 241 | The Magic SysRQ system works by registering key operations against a key op |
215 | lookup table, which is defined in 'drivers/tty/sysrq.c'. This key table has | 242 | lookup table, which is defined in 'drivers/tty/sysrq.c'. This key table has |
216 | a number of operations registered into it at compile time, but is mutable, | 243 | a number of operations registered into it at compile time, but is mutable, |
217 | and 2 functions are exported for interface to it: | 244 | and 2 functions are exported for interface to it:: |
245 | |||
218 | register_sysrq_key and unregister_sysrq_key. | 246 | register_sysrq_key and unregister_sysrq_key. |
247 | |||
219 | Of course, never ever leave an invalid pointer in the table. I.e., when | 248 | Of course, never ever leave an invalid pointer in the table. I.e., when |
220 | your module that called register_sysrq_key() exits, it must call | 249 | your module that called register_sysrq_key() exits, it must call |
221 | unregister_sysrq_key() to clean up the sysrq key table entry that it used. | 250 | unregister_sysrq_key() to clean up the sysrq key table entry that it used. |
@@ -224,33 +253,36 @@ Null pointers in the table are always safe. :) | |||
224 | If for some reason you feel the need to call the handle_sysrq function from | 253 | If for some reason you feel the need to call the handle_sysrq function from |
225 | within a function called by handle_sysrq, you must be aware that you are in | 254 | within a function called by handle_sysrq, you must be aware that you are in |
226 | a lock (you are also in an interrupt handler, which means don't sleep!), so | 255 | a lock (you are also in an interrupt handler, which means don't sleep!), so |
227 | you must call __handle_sysrq_nolock instead. | 256 | you must call ``__handle_sysrq_nolock`` instead. |
257 | |||
258 | When I hit a SysRq key combination only the header appears on the console? | ||
259 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
228 | 260 | ||
229 | * When I hit a SysRq key combination only the header appears on the console? | ||
230 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
231 | Sysrq output is subject to the same console loglevel control as all | 261 | Sysrq output is subject to the same console loglevel control as all |
232 | other console output. This means that if the kernel was booted 'quiet' | 262 | other console output. This means that if the kernel was booted 'quiet' |
233 | as is common on distro kernels the output may not appear on the actual | 263 | as is common on distro kernels the output may not appear on the actual |
234 | console, even though it will appear in the dmesg buffer, and be accessible | 264 | console, even though it will appear in the dmesg buffer, and be accessible |
235 | via the dmesg command and to the consumers of /proc/kmsg. As a specific | 265 | via the dmesg command and to the consumers of ``/proc/kmsg``. As a specific |
236 | exception the header line from the sysrq command is passed to all console | 266 | exception the header line from the sysrq command is passed to all console |
237 | consumers as if the current loglevel was maximum. If only the header | 267 | consumers as if the current loglevel was maximum. If only the header |
238 | is emitted it is almost certain that the kernel loglevel is too low. | 268 | is emitted it is almost certain that the kernel loglevel is too low. |
239 | Should you require the output on the console channel then you will need | 269 | Should you require the output on the console channel then you will need |
240 | to temporarily up the console loglevel using alt-sysrq-8 or: | 270 | to temporarily up the console loglevel using :kbd:`alt-sysrq-8` or:: |
241 | 271 | ||
242 | echo 8 > /proc/sysrq-trigger | 272 | echo 8 > /proc/sysrq-trigger |
243 | 273 | ||
244 | Remember to return the loglevel to normal after triggering the sysrq | 274 | Remember to return the loglevel to normal after triggering the sysrq |
245 | command you are interested in. | 275 | command you are interested in. |
246 | 276 | ||
247 | * I have more questions, who can I ask? | 277 | I have more questions, who can I ask? |
248 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 278 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
279 | |||
249 | Just ask them on the linux-kernel mailing list: | 280 | Just ask them on the linux-kernel mailing list: |
250 | linux-kernel@vger.kernel.org | 281 | linux-kernel@vger.kernel.org |
251 | 282 | ||
252 | * Credits | 283 | Credits |
253 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 284 | ~~~~~~~ |
285 | |||
254 | Written by Mydraal <vulpyne@vulpyne.net> | 286 | Written by Mydraal <vulpyne@vulpyne.net> |
255 | Updated by Adam Sulmicki <adam@cfar.umd.edu> | 287 | Updated by Adam Sulmicki <adam@cfar.umd.edu> |
256 | Updated by Jeremy M. Dolan <jmd@turbogeek.org> 2001/01/28 10:15:59 | 288 | Updated by Jeremy M. Dolan <jmd@turbogeek.org> 2001/01/28 10:15:59 |