From owner-freebsd-hackers Wed Apr 29 08:19:58 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA24756 for freebsd-hackers-outgoing; Wed, 29 Apr 1998 08:19:58 -0700 (PDT) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from soccer.inetspace.com (soccer.inetspace.com [206.50.163.48]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA24715 for ; Wed, 29 Apr 1998 08:19:51 -0700 (PDT) (envelope-from kgor@soccer.inetspace.com) Received: (from kgor@localhost) by soccer.inetspace.com (8.8.7/8.8.7) id KAA04397; Wed, 29 Apr 1998 10:18:26 -0500 (CDT) (envelope-from kgor) Date: Wed, 29 Apr 1998 10:18:26 -0500 (CDT) Message-Id: <199804291518.KAA04397@soccer.inetspace.com> From: "Kent S. Gordon" To: inf@nyef.res.cmu.edu CC: freebsd-hackers@FreeBSD.ORG In-reply-to: <19980428202638.15088@nyef.res.cmu.edu> (message from Marca Registrada on Tue, 28 Apr 1998 20:26:38 -0400) Subject: Re: SIGDANGER Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG >>>>> "inf" == Marca Registrada writes: > Quoting Karl Denninger (karl@mcs.net): >> Critical programs can either free up resources or exit, as they >> see fit. We could also define a semantic that says that if a >> process set SIGHOLD for that signal, then the kernel should do >> everything in its power NOT to whack that particular process. > BTW, I'd like to hope that only processes run as root have this > power to elect themselves to be safe from random kills. On some boxes, some non root process are even more importain than most root processes. Database engines are a example of non-root processes that I would like to exclude from random kill (I want it to be the last process killed not the first). -- Kent S. Gordon Architect iNetSpace Co. voice: (972)851-3494 fax:(972)702-0384 e-mail:kgor@inetspace.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message