Fact-checked by Grok 2 weeks ago

Magic SysRq key

The Magic SysRq key is a feature of the that allows users to execute specific low-level commands directly to the operating system, even if it is unresponsive or locked up, by using a designated key combination. This functionality, often referred to as the "magic" system request, bypasses higher-level processes and interfaces with the kernel's handler to perform tasks such as syncing filesystems, terminating processes, or rebooting the system in emergencies. Originally implemented for purposes by kernel developers, it provides a reliable mechanism for system recovery without relying on standard shutdown procedures. The Magic SysRq operates through a in the kernel's drivers/tty/sysrq.c module, where key presses are mapped to predefined operations. On x86 architectures, the combination is typically Alt + SysRq (or ) + a , such as 'b' to immediately the , 's' to synchronize disk buffers, or 'u' to remount filesystems as read-only. A well-known sequence is REISUB (R: turn off raw mode (set to XLATE mode), E: SIGTERM to all processes except , I: SIGKILL to all processes except , S: sync, U: remount read-only, B: ), which safely restarts a hung while minimizing data loss. Commands are case-sensitive and must be entered slowly, holding and SysRq while pressing each subsequent key. Alternative activation methods include sending a BREAK signal on consoles followed by the , or writing directly to the /proc/sysrq-trigger (e.g., echo b > /proc/sysrq-trigger), which requires root privileges. To use the Magic SysRq, it must be enabled during kernel compilation via the CONFIG_MAGIC_SYSRQ option, and runtime control is managed through the /proc/sys/[kernel](/page/Kernel)/sysrq interface. Setting this to 1 enables all functions, 0 disables them entirely, or a bitmask value (e.g., 2 for logging only) allows selective access for reasons, as unrestricted use could pose risks in multi-user environments. On non-x86 platforms like , the combination adjusts to Alt + Stop + . While powerful for administrators and developers, its availability is often disabled by default in production systems to prevent unauthorized access.

Overview and History

Definition and Purpose

The Magic SysRq key is a specialized feature in operating systems, particularly , designed to invoke a kernel-level handler for emergency system requests. It enables users to issue low-level commands directly to the even when higher-level interfaces, such as the or standard input methods, are unresponsive. The activation typically involves pressing Alt + SysRq (often mapped to the key on modern keyboards) followed by a specific , such as 's' for syncing filesystems or 'k' for killing processes; this combination bypasses normal user-space operations to trigger predefined kernel functions. The primary purpose of the Magic SysRq key is to facilitate safe system recovery and without necessitating a full , thereby minimizing and . For instance, it allows critical operations like syncing disk buffers to prevent corruption or terminating hung processes when the system is in a stalled state. This mechanism is especially valuable in server environments or during kernel development, where immediate intervention can avert escalation of issues. A common sequence, remembered by the mnemonic REISUB (for , even if system unresponsive), exemplifies its utility in orderly shutdowns. Despite its robustness, the Magic SysRq key has notable limitations and is not intended as a universal recovery tool. It is ineffective in scenarios such as a that occurs prior to the handler's execution or on lacking SysRq support, requiring specific (e.g., enabling CONFIG_MAGIC_SYSRQ) and potential key remapping on certain keyboards. The term "Magic" derives from its privileged, non-standard access to internals, allowing direct intervention that standard inputs cannot achieve.

Historical Development

The Magic SysRq key originated in the mid-1990s as part of the kernel's development, serving primarily as a tool to execute low-level commands even when the was in an unresponsive state. This functionality drew inspiration from soft-boot mechanisms in earlier systems and the (SysRq) key introduced on the PC/AT in 1984, which was designed to trigger hardware interrupts for basic control. The feature was integrated into the kernel's handler to provide reliable access during crashes or hangs, reflecting the era's focus on enhancing stability for developers and early users. Key milestones in its evolution include expansions during the 2.6 series, where additional commands were added and controls were refined for better security and usability, such as in kernel 2.6.12. This period marked a shift toward broader applicability beyond , incorporating support for more recovery-oriented operations. By the , the codebase in drivers/tty/sysrq.c underwent reorganization and enhancements for compatibility with modern hardware, with ongoing maintenance evident in the kernel 6.x series as of , ensuring continued relevance for emergency interventions. The Magic SysRq's role in gained prominence through community adoption, particularly via the REISUB —a mnemonic for safely a frozen system by sequentially issuing commands to switch to raw keyboard mode (R), terminate processes (E), kill remaining processes (I), synchronize disks (S), remount filesystems read-only (U), and (B). This , leveraging the AT keyboard heritage for reliable input, was popularized in forums starting in the early as a practical alternative to hard power cycles. Adoption across distributions accelerated in the mid-2000s, with enabling it by default under configuration value 438 (allowing most commands while restricting a few for ) to support console-based . and similar distributions followed suit but with partial enabling (e.g., value 176 for basic REISUB components) to balance and , reflecting its as a core feature in enterprise and desktop environments.

Technical Implementation

Kernel-Level Mechanisms

The core implementation of the Magic SysRq key is handled within the kernel's drivers/tty/sysrq.c module, which defines a for key operations and registers handlers for SysRq events using the input subsystem. This module employs register_sysrq_key() to associate specific keys with operation callbacks and integrates via input_register_handler(&sysrq_handler) to monitor input through a filter function, sysrq_filter(). The header file include/linux/sysrq.h provides the necessary structures, such as struct sysrq_key_op, for defining command behaviors. The processing flow initiates when a interrupt handler, from drivers like those for PS/2 or USB interfaces, detects the + SysRq combination, triggering sysrq_handle_keypress(). This function then invokes __handle_sysrq() to capture and execute the subsequent , checking against the enabled before proceeding. Commands are typically executed directly for immediacy, but non-critical actions, such as key reinjection, are queued via workqueues or kthreads using schedule_work() to avoid blocking the interrupt context. For headless systems, serial console support integrates through the TTY layer, where a BREAK signal followed by the command (within 5 seconds) emulates the key sequence, enabling remote access without physical keyboards. SysRq commands operate in space to ensure reliability, but a model enforces checks via the global sysrq_enabled variable and bitmask from /proc/sys/[kernel](/page/Kernel)/sysrq, where values range from 0 (fully disabled) to 1 (all enabled) or bit-specific permissions (e.g., bit 0x2 for ). Before execution, __handle_sysrq() validates the request with sysrq_on_mask() against the configured enable_mask, mitigating by restricting sensitive operations like reboots or termination. Access to the /proc/sysrq-trigger interface for programmatic invocation further requires , aligning with policies.

Hardware and Driver Support

The Magic SysRq key functionality relies on hardware keyboards that include a dedicated SysRq or key, a standard feature on traditional AT-style (PS/2) keyboards where the key generates a specific recognized by the . Modern USB keyboards emulate this behavior through the (HID) protocol, mapping the key's to kernel keycode 99 (KEY_SYSRQ) using tools like setkeycodes if necessary. In the , SysRq key events are processed by the input core subsystem, which includes the evdev interface for delivering raw input events to userspace via /dev/input/eventX devices, and keyboard drivers that translate hardware into standardized keycodes such as KEY_SYSRQ. The input core acts as an intermediary between low-level device drivers (e.g., hid-generic for USB keyboards) and higher-level handlers, ensuring SysRq combinations bypass normal input processing when enabled. Wireless or virtual keyboards, such as those connected via , may require custom key mapping if they lack a dedicated /SysRq key, as they might not generate the expected scancode by default. As of 2025, the Magic SysRq key enjoys full compatibility in most post-2010 x86-based laptops and servers, where standard drivers and HID are included in mainline , often requiring no additional configuration beyond enabling CONFIG_MAGIC_SYSRQ. ARM-based systems generally it through the same kernel mechanisms, including architecture-specific features like the 'v' command for ETM buffer dumps, though minimal devices may lack full driver integration or have the feature disabled in custom to reduce footprint. To verify SysRq scancode detection, users can employ the showkey -s tool, which displays scancodes (the SysRq sequence should map to keycode 99).

SysRq Commands

Core Command Set

The core command set of the Magic SysRq key consists of a predefined series of single-character commands invoked by pressing + SysRq (or ) followed by the specific key, enabling direct interaction with the for critical operations even when the system is unresponsive. These commands have been part of the since version 2.6 and remain largely unchanged through 6.x series as of 2025, providing a stable set of emergency and debugging functions when enabled via configuration. The following table summarizes the standard Magic SysRq commands and their effects, based on the QWERTY keyboard layout defaults:
CommandFunction
bImmediately reboots the system without syncing or unmounting disks.
cTriggers a kernel crash for crashdump analysis, if the system is configured for it.
dShows all locks currently held by the kernel.
eSends a SIGTERM signal to all processes except init.
fInvokes the Out-of-Memory (OOM) killer to terminate a memory-hogging process, without panicking if none is killed.
gReserved for use by the kgdb kernel debugger.
hDisplays a help message listing available commands (pressing any unrecognized key also shows this).
iSends a SIGKILL signal to all processes except init.
jThaws filesystems previously frozen via the FIFREEZE ioctl.
kPerforms a Secure Attention Key (SAK) operation, killing all programs on the current console to regain control.
lDumps the kernel stack backtrace for all active CPUs.
mOutputs current memory usage information to the console/log.
nMakes real-time (RT) tasks adjustable in priority (nice-able).
oPowers off the system, if hardware and configuration support it.
pDumps the current CPU registers and flags to the console/log.
qDisplays per-CPU high-resolution timer (hrtimer) lists and clockevent device details.
rDisables keyboard raw mode and switches to translated (XLATE) mode.
sSynchronizes all mounted filesystems to disk.
tDumps a list of current tasks and their states to the console/log.
uRemounts all mounted filesystems in read-only mode.
vForces the framebuffer console to display the foreground virtual console (or dumps ETM buffer on ARM).
wShows tasks blocked in uninterruptible sleep (D-state).
xArchitecture-specific: enters xmon interface on PowerPC, shows PMU registers on SPARC64, or dumps TLB on MIPS.
yDisplays global CPU registers (SPARC64-specific).
zDumps the ftrace buffer contents.
0-9Sets the console logging level (0 for emergency messages only, up to 9 for all kernel messages).
RReplays recent kernel log messages on all consoles.
These commands can be grouped into functional categories for better understanding: system control commands like b, c, and o handle rebooting, crashing, and shutdown; process management includes e, f, i, and n for signaling and prioritizing processes; filesystem operations cover j, s, and u for thawing, syncing, and remounting; while tools such as d, l, m, p, q, t, w, x, y, and z provide diagnostics on locks, stacks, , registers, timers, tasks, and traces; console and adjustments encompass k, r, v, and the numeric log levels plus R. A popular mnemonic for safe system recovery is the REISUB sequence, which stands for "Reboot Even If System Utterly Broken" and executes commands r (turn off raw mode / switch to XLATE), e (SIGTERM to processes), i (SIGKILL to processes), s (sync filesystems), u (remount read-only), and b () in order to gracefully shut down and restart a hung system without . The mnemonic uses uppercase letters for , but the keys pressed are lowercase except for specific uppercase commands like R (log replay). This sequence is particularly useful in emergencies, as it ensures filesystems are safely prepared before , and it has been a standard recommendation since the core commands stabilized in kernel 2.6.

Layout-Specific Variations

The Magic SysRq key functionality in the operates based on hardware scancodes and keycodes, which are independent of the layout, ensuring that commands are triggered by the physical position of keys rather than their labeled characters. This design assumes a standard layout for command interpretation, where pressing +SysRq followed by a specific letter (e.g., 'r' for switching to mode) directly corresponds to the key label. For users on keyboards, this provides straightforward access to core commands without additional adjustments. On non- layouts such as or , users must press the physical key located in the position of the corresponding QWERTY letter to invoke the intended command, as the kernel maps the to the QWERTY-equivalent keycode. For example, in layout, the key positioned where 'r' is on QWERTY (labeled 'p' in Dvorak) is used for raw mode, while the shutdown command ('o' in QWERTY) requires the Dvorak 'r' key. Similarly, users need to adapt for shifted mappings; the memory info command ('m' in QWERTY) uses the comma key (',') in AZERTY, and the blocked tasks display ('w' in QWERTY) uses the 'z' key. alternatives can serve as fallbacks for letter commands on compact keyboards lacking full alpha rows, provided the scancodes map correctly to the required keycodes. International keyboards, including those for (QWERTZ) or (AZERTY variants), follow the same scancode-based approach, with adaptations primarily for swapped or accented keys. In , for instance, the 'y' and 'z' positions are exchanged, so the CPU info command ('y' in QWERTY) requires pressing the physical 'z' key. The kernel's input subsystem supports characters through higher-level layers, but Magic SysRq commands remain restricted to ASCII keycodes to maintain low-level reliability, ignoring layout-specific modifiers or diacritics. To handle potential ambiguities in key mapping, the processes SysRq inputs at the driver level using scancodes, bypassing user-space layout configurations. Users can verify effective scancodes for their hardware by running showkey -s in a console, which displays the sequences for pressed keys, allowing confirmation that the desired QWERTY-equivalent is triggered without layout interference.
Command ExampleQWERTY KeyDvorak KeyAZERTY Key
Raw moderpr
Memory infomm,
Sync filesystemssos
Blocked tasksw,z

Configuration Options

Enabling and Disabling Features

The Magic SysRq key functionality is enabled during compilation by selecting the CONFIG_MAGIC_SYSRQ option and setting it to 'y' in the configuration menu, which is the default in kernels provided by most distributions. This compile-time choice integrates the necessary code to handle SysRq invocations, creating the relevant proc filesystem entries upon boot. At boot time, the initial set of enabled SysRq functions is controlled via the kernel's interface, with the default value of /proc/sys/kernel/ determining the bitmask of permitted operations; for example, distributions configure this to 176 by default, enabling a subset of recovery commands such as sync, remount, and . The boot parameter sysrq_always_enabled can be added to the kernel command line (e.g., in configuration) to force all SysRq functions to be available, overriding any subsequent restrictions for debugging purposes. For security reasons, particularly in multi-user or environments where unauthorized physical access could allow disruption, the Magic SysRq key can be fully disabled by setting the value to 0, typically via /etc/.conf or equivalent distribution-specific configuration files that apply at boot. This prevents invocation of any SysRq commands from the , though alternative triggers like /proc/ may still require separate handling. Post-boot verification of the enabled status is performed by reading the value in /proc/sys//sysrq, where 0 indicates complete disablement, 1 enables all functions, and other numeric values represent a bitmask of specific allowed operations (e.g., 176 for partial features).

Customization

The SysRq functionality in the can be dynamically adjusted at runtime through the interface exposed at /proc/sys/[kernel](/page/Kernel)/sysrq, which accepts a bitmask value to enable or disable specific commands. This integer value represents a bitwise OR of flags corresponding to individual SysRq operations: for instance, bit 4 (value 16 or 0x10) enables the sync command to flush filesystem buffers, while bit 7 (value 128 or 0x80) permits or poweroff actions. Setting the value to 0 disables all SysRq key invocations entirely, 1 enables the full set of functions, and values greater than 1 allow selective enabling via the bitmask; the maximum practical mask sums all defined bits, though not all 16 bits in 0xFFFF are typically used, as higher bits control less common features like nice-ing tasks (bit 8, value 256 or 0x100). To apply changes, administrators can write directly to the file, such as echo 1 > /proc/sys/kernel/sysrq to enable all functions temporarily, or use sysctl -w kernel.sysrq=1 for the same effect; these modifications persist only until reboot unless configured in /etc/sysctl.conf or drop-in files under /etc/sysctl.d/. Distribution-specific defaults vary for security: for example, Debian sets a "safe" bitmask of 438 (0x1B6 in hexadecimal), enabling sync, remount read-only, keyboard control, console logging, nice RT tasks, and reboot, but excluding more disruptive options like process signaling or debugging dumps. In contrast, systemd-based environments, such as those in Arch Linux or Fedora, default to 16 (0x10), restricting to basic sync operations to minimize risks in multi-user or containerized setups. Advanced runtime customization extends to registering custom SysRq handlers through loadable modules, which define operations via the sysrq_key_op and register them using register_sysrq_key() from <linux/sysrq.h>. This allows third-party modules to add or override behaviors for specific keys, such as custom or hardware-specific recovery actions, provided the corresponding bit in the mask is enabled; unregistration occurs via unregister_sysrq_key() upon module unload. Security modules like SELinux can enforce policies on these modules and related accesses, ensuring that only authorized contexts invoke or modify SysRq handlers, though this requires custom policy rules for fine-grained control.

Practical Applications

Emergency System Recovery

The Magic SysRq key enables emergency recovery from system hangs or freezes by allowing direct commands, minimizing and filesystem corruption compared to a . In scenarios such as (GUI) lockups in X11 or environments, where the desktop appears unresponsive but the remains operational, SysRq sequences can regain control without abrupt power-off. Similarly, when the out-of-memory (OOM) killer fails to resolve exhaustion, invoking SysRq commands like 'f' can manually trigger termination to resources. A common recovery procedure is the REISUB sequence, pressed as + SysRq followed by each letter in order, with a brief pause between keys:
  • R: Switches the from raw to interpreted , restoring control if the input subsystem is hung.
  • E: Terminates all processes except by sending SIGTERM, allowing graceful shutdowns.
  • I: Kills all remaining processes except using SIGKILL for forceful termination.
  • S: Synchronizes dirty filesystem buffers to disk, ensuring .
  • U: Remounts all filesystems as read-only to prevent further writes.
  • B: Immediately s the system without further checks.
    This sequence provides a controlled even in severely unresponsive states, reducing the risk of filesystem damage.
The effectiveness of SysRq in recovery stems from its kernel-level priority, bypassing user-space issues like frozen desktops, and has been a standard feature in distributions since its integration into the kernel. It outperforms hard resets by flushing data and unmounting filesystems, preserving consistency. As of 2025, SysRq's necessity has diminished for desktop systems using modern journaled filesystems like and , which employ to maintain and enable rapid after unclean shutdowns, making hard resets less damaging. However, it remains essential for servers handling critical data, where ensuring synchronization and safe unmounting prevents potential corruption in production environments.

Debugging and Maintenance Tasks

The Magic SysRq key enables a range of diagnostic commands that facilitate system introspection during normal or semi-normal operation, allowing administrators and developers to gather critical state information without disrupting ongoing processes. These commands output data primarily to the system console, which can be a local display, serial console, or virtual terminal, and the information is also logged to the ring buffer accessible via dmesg. Visibility of the output depends on the current console log level, which can be adjusted using SysRq keys 0-9 to ensure detailed traces are displayed. Key logging commands include 'l' for displaying stack backtraces across all active CPUs, providing insights into execution paths and potential bottlenecks; 'w' for dumping tasks in uninterruptible (D-state) blocked conditions, often accompanied by their traces to identify I/O stalls or ; and 'm' for outputting current usage statistics, such as slab allocator details and zone information, aiding in the analysis of memory pressure. These outputs are particularly valuable in scenarios where standard tools like top or ps may be unresponsive due to high load. For instance, invoking 'w' via echo w > /proc/sysrq-trigger reveals blocked processes with trace details in dmesg, helping pinpoint hangs without a full . In maintenance tasks, the 'd' command lists all currently held locks, offering lock that are essential for kernel developers investigating deadlocks or contention issues in multithreaded environments. Similarly, 'f' activates the Out-of-Memory () killer to terminate a resource-intensive , serving as a maintenance mechanism to alleviate exhaustion during diagnostic sessions, though it does not directly produce an oops dump—full requires with tools like kdump, which captures vmcore images for post-mortem examination. The 'c' command can trigger a controlled crash to generate such a dump if kdump is configured, complementing these for deeper forensics. These SysRq features support remote over consoles or via SSH where physical keyboards may be absent; for example, developers use echo l > /proc/sysrq-trigger to capture CPU backtraces, ensuring reliable diagnostics without halting operations. Best practices recommend combining SysRq with kdump for comprehensive analysis—enabling kdump via parameters like crashkernel=auto allows 'c' to produce analyzable dumps using tools like crash, while always syncing filesystems first with 's' to preserve during introspection. This approach overlaps minimally with emergency recovery sequences, focusing instead on non-disruptive data collection.

Alternative Invocation Methods

Filesystem and Software Triggers

The Magic SysRq key can be invoked through the procfs filesystem interface, allowing software-based triggering of kernel commands without physical keyboard input. This method involves writing a specific command character to the special file /proc/sysrq-trigger using a tool like echo, such as echo s > /proc/sysrq-trigger to synchronize filesystems. Access to this interface requires root privileges, as the file is writable only by the superuser to prevent unauthorized kernel interventions. This approach is particularly useful in scripted environments where manual key combinations are impractical. Daemon tools like sysrqd extend this capability by providing a structured way to execute SysRq commands programmatically, often integrated into automated or scripts. Sysrqd operates as a lightweight service that listens for triggers and issues the corresponding operations, enabling reliable scripted invocation in scenarios like periodic system health checks or routines. Its design emphasizes responsiveness under load, making it suitable for environments requiring unattended SysRq operations without direct filesystem writes. Security for these triggers relies on the inherent file permissions of /proc/sysrq-trigger, which restrict writes to root users only, thereby limiting exposure to risks. Administrators can leverage this in scheduled tasks, such as jobs running echo s > /proc/sysrq-trigger at regular intervals to ensure filesystem consistency during high-I/O workloads. However, such usage must be carefully managed to avoid unintended system disruptions. A key limitation of filesystem and software triggers is their ineffectiveness during full kernel panics, where the kernel's responsiveness is halted, preventing any SysRq processing. This feature remains supported in Linux kernel versions up to 6.17 (stable as of November 2025), with no fundamental changes to the interface.

Remote and Virtualized Access

The Magic SysRq key can be invoked remotely over a serial console on systems by configuring the to use a as the primary console, typically via boot parameters such as console=ttyS0,115200n8, which directs output to the specified UART . Once enabled, commands are sent by transmitting a break signal—often generated via terminal emulators like minicom (Ctrl+A followed by F) or screen (Ctrl+A followed by \ (backslash))—followed by the desired command character within 5 seconds. For SSH or IPMI SOL sessions, the sequence may be ~B. This approach emulates the physical keypress on PC-style serial ports and is essential for headless servers in data centers, where direct keyboard access is impractical. Network-based invocation of Magic SysRq commands typically relies on secure remote access protocols rather than dedicated consoles, as the netconsole kernel module primarily forwards kernel messages over for debugging but does not handle incoming command injection. Instead, administrators can connect via SSH to a responsive system or use IPMI serial-over-LAN () to write directly to /proc/sysrq-trigger, echoing the command character (e.g., echo b > /proc/sysrq-trigger for reboot) as a user. This method proves valuable in cloud environments like AWS or instances, where physical intervention is impossible, enabling emergency recovery without local access. In virtualized setups, hypervisors facilitate Magic SysRq passthrough to guest operating systems through specialized tools. For KVM/QEMU environments managed by libvirt, the virsh send-key command injects key sequences, such as virsh send-key [domain](/page/Domain) KEY_LEFTALT KEY_SYSRQ KEY_S --holdtime 500ms to mimic sustained presses for sync. hypervisors support similar functionality via the vSphere Client or ESXi console, where guests receive SysRq by pressing Ctrl + (held), Space (press and release), (held), then the . These mechanisms ensure reliable remote debugging and recovery in VM deployments without requiring guest-side modifications.

References

  1. [1]
    Linux Magic System Request Key Hacks
    What is the magic SysRq key?¶. It is a 'magical' key combo you can hit which the kernel will respond to regardless of whatever else it is doing, unless it ...
  2. [2]
    Every sysadmin needs a little SysRq magic - Pingdom
    Jun 26, 2012 · Pressing the SysRq key caused the BIOS to execute a special hardware interrupt code. It was originally intended as an aid to running multiple OSs on the PC/AT' ...
  3. [3]
    Further exploring the SysRq support in Linux - Pingdom
    Jul 10, 2012 · Did you ever notice the SysRq key on your keyboard? Do you know what it is used for? We have the history and potential use of the SysRq key.<|control11|><|separator|>
  4. [4]
    kernel/git/torvalds/linux.git - Linux kernel source tree
    ### Summary of Magic SysRq Functionality in drivers/tty/sysrq.c
  5. [5]
    REISUB - the gentle Linux restart - Andrew Kember
    Apr 23, 2008 · Holding down Alt and SysRq (which is the Print Screen key) while slowly typing REISUB will get you safely restarted. REISUO will do a shutdown ...
  6. [6]
    [SOLVED] What is the right setting for Magic SysRq?
    Dec 3, 2022 · Before the advent of journaled filesystems a common use of the magic SysRq key was to perform a safe reboot of a Linux computer which has ...cat /proc/sys/kernel/sysrq 176??? - Linux Mint Forumsrestart X with magic Sysrq key - Linux Mint ForumsMore results from forums.linuxmint.comMissing: history | Show results with:history
  7. [7]
    4.9. Restricting the use of the Magic SysRq key - Debian
    The Magic SysRq key is a key combination that allows users connected to the system console of a Linux kernel to perform some low-level commands.
  8. [8]
    Linux Magic System Request Key Hacks — The Linux Kernel documentation
    ### Summary of Magic SysRq Kernel Implementation
  9. [9]
  10. [10]
    9.9. Magic SysRq key
    Kernel software developers use this interface to debug their software. Under most circumstances it can also be used to uncleanly reboot the computer, something ...
  11. [11]
    1. Introduction — The Linux Kernel documentation
    ### Summary: Keyboard Input Handling (including SysRq) by evdev and Input Core in Linux Kernel
  12. [12]
    Magic SysRq key - LinuxReviews
    Dec 30, 2019 · Pressing Alt + SysRq and another key which specifies a command can be used to forcibly unmount file systems, kill processes, recover keyboard ...
  13. [13]
    sysRq fine control - Ask Ubuntu
    Apr 22, 2017 · Setting /proc/sys/kernel/sysrq to 1 enables the sysrq magic keys, setting it to 0 disables it. By default the value is set to 176.How can I enable the "magic sysrq key" on ubuntu desktop? [duplicate]Is SysRq still a thing? - Ask UbuntuMore results from askubuntu.com
  14. [14]
    The kernel's command-line parameters
    The following is a consolidated list of the kernel parameters as implemented by the __setup(), core_param() and module_param() macros and sorted into English ...
  15. [15]
    Linux Magic System Request Key Hacks - The Linux Kernel Archives
    What is the magic SysRq key?¶. It is a 'magical' key combo you can hit which the kernel will respond to regardless of whatever else it is doing, unless it ...
  16. [16]
    Use the Magic SysRq Key on Linux to Fix Frozen X Servers, Cleanly ...
    Jul 16, 2012 · The magic SysRq key can send commands directly to the Linux kernel. You can use it to recover from freezes or cleanly restart your system, even if nothing ...<|control11|><|separator|>
  17. [17]
    Journaled filesystems and power failure - linux - Server Fault
    Jul 1, 2012 · In the event of a system crash or power failure, such file systems are quicker to bring back online and less likely to become corrupted."safe" ext4 configuration for systems running unattended - Server FaultCan ext4 fs be completely unrecoverable broken due to power loss ...More results from serverfault.comMissing: reduce shutdown
  18. [18]
    Using the Linux SysRq Key for Debugging - ALLPCB
    Sep 3, 2025 · To use SysRq, you must enable the CONFIG_MAGIC_SYSRQ option in your kernel configuration. After booting, this will create the /proc/sysrq- ...
  19. [19]
    jd/sysrqd: Linux SysRQ daemon - GitHub
    sysrqd is a small daemon intended to manage Linux SysRq over the network. Its philosophy is to be very responsive under heavy load and to try to be somehow ...Missing: scripted execution
  20. [20]
    System Recovery using SysRq Key - Kicksecure
    The SysRq function in Linux is equivalent to the well-known Control-Alt-Delete Ctrl+Alt+Del function in Windows. This page documents how to use SysRq for ...
  21. [21]
    How to trigger SysRq from ipmitool and ipmiconsole using the ...
    Aug 5, 2024 · On serial console we can trigger the SysRq event by sending a Break signal to the console and then by hitting the desired keys. After sending ...
  22. [22]
    Troubleshooting using the serial console | Compute Engine
    Note: The Magic SysRq key is normally implemented by using PC keyboard scan codes but there is no direct equivalent on a serial port. This is the recommended ...Missing: params | Show results with:params
  23. [23]
    netconsole - The Linux Kernel Archives
    This module logs kernel printk messages over UDP allowing debugging of problem where disk logging fails and serial consoles are impractical. It can be used ...
  24. [24]
    5.2.29. /proc/sysrq-trigger | Reference Guide - Red Hat Documentation
    Using the echo command to write to this file, a remote root user can execute most System Request Key commands remotely as if at the local terminal.
  25. [25]
    virsh - Libvirt
    For the QEMU hypervisor, a virttype of either 'qemu' or 'kvm' must be supplied along with either the emulatorbin or arch in order to generate output for the ...Missing: sysrq | Show results with:sysrq
  26. [26]
    20.26. Sending a Keystroke Combination to a Specified Guest ...
    The virsh send-key domain --codeset --holdtime keycode command allows you to send a sequence as a keycode to a specific guest virtual machine.Missing: sysrq | Show results with:sysrq
  27. [27]
    What is the key combination for triggering SysRq to force a manual ...
    Aug 6, 2024 · What key combination should be pressed in-order to panic the system manually using SysRq keys when running RHEL as a guest VM on VMware?