On Thu, Apr 16, 2009 at 12:42:17AM +0200, Greg Kurz wrote:On Wed, 2009-04-15 at 23:56 +0400, Alexey Dobriyan wrote:
There are sockets and live netns as the most complex example. I'm notThey should close their sockets before checkpoint and find/have some way
prepared to describe it exactly, but people wishing to do C/R with
"leaks" should be very careful with their wishes.
to reconnect after. This implies some kind of C/R awareness in the code
to be checkpointed.
How do you imagine sshd closing sockets and reconnecting?