On Thu, Apr 16, 2009 at 12:42:17AM +0200, Greg Kurz wrote: > On Wed, 2009-04-15 at 23:56 +0400, Alexey Dobriyan wrote: > > There are sockets and live netns as the most complex example. I'm not > > prepared to describe it exactly, but people wishing to do C/R with > > "leaks" should be very careful with their wishes. > > They should close their sockets before checkpoint and find/have some way > to reconnect after. This implies some kind of C/R awareness in the code > to be checkpointed. How do you imagine sshd closing sockets and reconnecting? _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/containers