[victim] AF_RDS bound 127.0.0.1:4242 in init_net (root) [init-probe] count-probe(SOCKETS) rc=-1 errno=28 optlen-after=56 [init-probe] getsockopt(SOCKETS) rc=28 (each=28) len=28 -> 1 entries [0] bound=127.0.0.1:4242 inum=3913 sndbuf=106496 rcvbuf=106496 *** LEAK: this is the victim's init_net socket (127.0.0.1:4242) — visible from attacker's fresh netns *** [init-probe] count-probe(TCP_SOCKETS) rc=41 errno=28 optlen-after=0 [init-probe] getsockopt(COUNTERS) rc=40 (each=40) len=1680 -> 42 entries [attacker] in netns=net:[4026532260] uid=0 [attacker] AF_RDS opened in fresh netns -> fd=4 [attacker] count-probe(SOCKETS) rc=-1 errno=28 optlen-after=56 [attacker] getsockopt(SOCKETS) rc=28 (each=28) len=28 -> 1 entries [0] bound=127.0.0.1:4242 inum=3913 sndbuf=106496 rcvbuf=106496 *** LEAK: this is the victim's init_net socket (127.0.0.1:4242) — visible from attacker's fresh netns *** [attacker] count-probe(TCP_SOCKETS) rc=41 errno=28 optlen-after=0 [attacker] getsockopt(TCP_SOCKETS) rc=41 (each=41) len=0 -> 0 entries [attacker] count-probe(CONNECTIONS) rc=42 errno=28 optlen-after=0 [attacker] getsockopt(COUNTERS) rc=40 (each=40) len=1680 -> 42 entries