ladybird/Base/usr/share/man/man1/crash.md

1.3 KiB

Name

crash - intentionally perform an illegal operation

Synopsis

$ crash [options]

Description

This program is used to test how the Serenity kernel handles userspace crashes, and can be used to simulate many different kinds of crashes.

Options

  • -s: Perform a segmentation violation by dereferencing an invalid pointer.
  • -d: Perform a division by zero.
  • -i: Execute an illegal CPU instruction.
  • -a: Call abort().
  • -m: Read a pointer from uninitialized memory, then read from it.
  • -f: Read a pointer from memory freed using free(), then read from it.
  • -M: Read a pointer from uninitialized memory, then write to it.
  • -F: Read a pointer from memory freed using free(), then write to it.
  • -r: Write to read-only memory.
  • -T: Make a syscall while using an invalid stack pointer.
  • -t: Trigger a page fault while using an invalid stack pointer.
  • -S: Make a syscall from writeable memory.
  • -x: Read from recently freed memory. (Tests an opportunistic malloc guard.)
  • -y: Write to recently freed memory. (Tests an opportunistic malloc guard.)
  • -X: Attempt to execute non-executable memory. (Not mapped with PROT_EXEC.)

Examples

$ crash -F
Shell: crash(33) exitied due to signal "Segmentation violation"