Xref: utzoo comp.unix.internals:2124 comp.unix.wizards:24205 Path: utzoo!utgpu!news-server.csri.toronto.edu!cs.utexas.edu!usc!apple!agate!ucbvax!dog.ee.lbl.gov!elf.ee.lbl.gov!torek From: torek@elf.ee.lbl.gov (Chris Torek) Newsgroups: comp.unix.internals,comp.unix.wizards Subject: Re: Help with 4.3 mod to kill uninteruptable procs. Message-ID: <10112@dog.ee.lbl.gov> Date: 21 Feb 91 15:45:32 GMT References: <1991Feb19.001941.29928@lynx.CS.ORST.EDU> <4066@stl.stc.co.uk> Reply-To: torek@elf.ee.lbl.gov (Chris Torek) Organization: Lawrence Berkeley Laboratory, Berkeley Lines: 17 X-Local-Date: Thu, 21 Feb 91 07:45:32 PST In article <4066@stl.stc.co.uk> "Neil Todd" writes: >A while back (~4-5 yrs) Chris Torek (I think) produced a nice little >patch to the 4.3 kernel to kill groups of run away (and rapidly >spawning) processes - this was the 'zonk' system call. ``Not I,'' said the pig. (Since I just ate half a dozen chocolate chip cookies, I think I qualify. :-) ) Seriously: I never produced this particular bletcherous hack. (I am responsible for a number of other, different bletcherous hacks, but not this one.) If (A) you have SIGSTOP and (B) signals work correctly, the super-user can stop everything, pick out the bad processes, kill them, and then resume everything. (This is a bit tricky to get right, admittedly.) -- In-Real-Life: Chris Torek, Lawrence Berkeley Lab EE div (+1 415 486 5427) Berkeley, CA Domain: torek@ee.lbl.gov Brought to you by Super Global Mega Corp .com