In the nightly build for aarch64 RPi4 connmand leaks socket file descriptors, just do
Code
# lsof | grep connmand
551 /usr/sbin/connmand 0 /dev/null
551 /usr/sbin/connmand 1 /dev/null
551 /usr/sbin/connmand 2 /dev/null
551 /usr/sbin/connmand 3 anon_inode:[eventfd]
551 /usr/sbin/connmand 4 anon_inode:[signalfd]
551 /usr/sbin/connmand 5 socket:[483]
551 /usr/sbin/connmand 6 socket:[486]
551 /usr/sbin/connmand 7 /dev/urandom
551 /usr/sbin/connmand 8 anon_inode:inotify
551 /usr/sbin/connmand 9 anon_inode:inotify
551 /usr/sbin/connmand 10 socket:[504]
551 /usr/sbin/connmand 11 /dev/rfkill
551 /usr/sbin/connmand 12 socket:[6422]
551 /usr/sbin/connmand 13 socket:[674]
551 /usr/sbin/connmand 14 socket:[6438]
....
Display More
and note the high numbers in the third column (file descriptors), wait 2 minutes and rerun to see it's increasing (until it tops out at 1024 which is the process's open file limit). I discovered that investigating after lots of messages "connmand: Failed to bind time server socket" after a few hours of uptime.
A debug log can be found at https://paste.libreelec.tv/enabled-lynx.log
I reverted just the subtree packages/network/connman to 19fa1111 "connman: dbus: Use non-deprecated installation path" and there's no leak, the number of file descriptors remains stable around 25.