home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!munnari.oz.au!yoyo.aarnet.edu.au!sirius.ucs.adelaide.edu.au!augean.eleceng.adelaide.edu.AU!idall
- From: idall@augean.eleceng.adelaide.edu.AU (Ian Dall)
- Newsgroups: comp.unix.questions
- Subject: Re: Questions About Unix
- Message-ID: <1992Aug28.014938.780@augean.eleceng.adelaide.edu.AU>
- Date: 28 Aug 92 01:49:38 GMT
- References: <37090@sdcc12.ucsd.edu> <2749@nlsun1.oracle.nl>
- Organization: Electrical and Electronic Eng., University of Adelaide
- Lines: 25
-
- In article <2749@nlsun1.oracle.nl> jhelberg@nl.oracle.com (Joost Helberg) writes:
- >bsuresh@cs.ucsd.edu (Suresh Bollapragada) writes:
- >: Hi,
- >:
- >: I have a couple of questions about Unix.
- >:
- >: 1. can a program crash the processor on which it is running ? if so how?.
- >
- >No, it shouldn't be capable to do so.
-
- There are heaps of ways for a uid 0 process to crash a system (the
- original poser said that root access could be assumed). What are you
- trying to achieve? About the only productive reason I can think for
- wanting to do this are to test crash dump analysers. In that case, you
- want it to crash in such a way that it *does* produce a crash dump.
-
- The two methods which come to mind immediately (and I really can't imagine
- anyone doing kernel work not being able to think of these for them selves)
- are writing to /dev/kmem or /dev/mem and writing to the swap space.
-
- --
- Ian Dall life (n). A sexually transmitted disease which afflicts
- some people more severely than others.
- ACSnet: idall@augean.oz
- Internet: idall@augean.oz.au
-