=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== ksysguard-5.19.5/plugins/process/network/README.md-17-`/proc/net/udp{,6}` for the sockets, which are mapped to processes by listing ksysguard-5.19.5/plugins/process/network/README.md:18:fds from `/proc/${pid}/fd/` and reading their symlink targets. Entries matching ksysguard-5.19.5/plugins/process/network/README.md:19:`socket:[${port}]` are used to track socket to process mapping. ksysguard-5.19.5/plugins/process/network/README.md-20- ############################################## ksysguard-5.19.5/ksysguardd/Linux/netstat.c-22- ksysguard-5.19.5/ksysguardd/Linux/netstat.c:23:#define _POSIX_SOURCE /* expose old gethostbyaddr(3) call */ ksysguard-5.19.5/ksysguardd/Linux/netstat.c-24-#include <arpa/inet.h> ############################################## ksysguard-5.19.5/ksysguardd/Linux/netstat.c-140- ksysguard-5.19.5/ksysguardd/Linux/netstat.c:141: if ((host = gethostbyaddr((char *)&addr, 4, AF_INET)) == NULL) { ksysguard-5.19.5/ksysguardd/Linux/netstat.c-142- a_addr.s_addr = addr;