nstraz | b72f4d8 | 2001-04-03 21:29:30 +0000 | [diff] [blame] | 1 | # Before running these: BACKUP YOUR SYSTEM! you've been warned! |
| 2 | f00f f00f |
| 3 | # This is a simple test for handling of the pentium f00f bug. |
| 4 | # It is an example of a catistrophic test case. If the system |
| 5 | # doesn't correctly handle this test, it will likely lockup. |
nstraz | db8ba41 | 2001-06-04 15:30:54 +0000 | [diff] [blame] | 6 | crash01 crash01 |
nstraz | b72f4d8 | 2001-04-03 21:29:30 +0000 | [diff] [blame] | 7 | # Generate random code and execute it. Read f00f comment, |
| 8 | # this test lockup SunOS,WindowsNT,etc. in seconds.. |
| 9 | crash02 crash02 |
| 10 | # Generate random syscalls and execute them, less probability |
| 11 | # to hose your system, but still. |
| 12 | mem01 mem01 -r |
| 13 | # Memory eater. Loves to be run in parallel with other programs. |
| 14 | # May panic on buggy systems if the OOM killer was not fast enough :-) |
| 15 | proc01 proc01 |
| 16 | # Read every file in /proc. Not likely to crash, but does enough |
| 17 | # to disturb the kernel. A good kernel latency killer too. |