There is also a key to a kernel object that is able to force immediate checkpoints, and not return until they are taken. This key can be distributed to programs trusted not to abuse it. This key can be multiplexed to both consolidated immediate checkpoints, and limit their frequency.