graphic: 0.902 semantic: 0.898 virtual: 0.896 hypervisor: 0.889 user-level: 0.888 permissions: 0.882 peripherals: 0.877 mistranslation: 0.877 performance: 0.870 arm: 0.855 assembly: 0.851 risc-v: 0.850 architecture: 0.848 socket: 0.847 register: 0.844 device: 0.839 debug: 0.835 PID: 0.829 kernel: 0.828 ppc: 0.819 boot: 0.815 TCG: 0.810 vnc: 0.803 x86: 0.766 KVM: 0.758 network: 0.756 VMM: 0.737 files: 0.735 i386: 0.559 Socket leak on each call to qemu_socket() On any host platform where SOCK_CLOEXEC is defined (Linux at least), a socket is leaked on each call to qemu_socket() AND the socket returned hasn't been created with the desired SOCK_CLOEXEC attribute. The qemu_socket routine is: Line 272 of util/osdep.c: /* * Opens a socket with FD_CLOEXEC set */ int qemu_socket(int domain, int type, int protocol) { int ret; #ifdef SOCK_CLOEXEC ret = socket(domain, type | SOCK_CLOEXEC, protocol); if (ret != -1 || errno != EINVAL) { return ret; } #endif ret = socket(domain, type, protocol); if (ret >= 0) { qemu_set_cloexec(ret); } return ret; } I'm not sure that my original report was distributed to the folks who need to see this. My primary email address has a DKIM policy (DMARC) which says that all messages from my address are signed. I received various DMARC reports which said that the bug report sent as "From: