===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
ksysguard-5.19.5/plugins/process/network/README.md-17-`/proc/net/udp{,6}` for the sockets, which are mapped to processes by listing
ksysguard-5.19.5/plugins/process/network/README.md:18:fds from `/proc/${pid}/fd/` and reading their symlink targets. Entries matching
ksysguard-5.19.5/plugins/process/network/README.md:19:`socket:[${port}]` are used to track socket to process mapping.
ksysguard-5.19.5/plugins/process/network/README.md-20-
##############################################
ksysguard-5.19.5/ksysguardd/Linux/netstat.c-22-
ksysguard-5.19.5/ksysguardd/Linux/netstat.c:23:#define _POSIX_SOURCE /* expose old gethostbyaddr(3) call */
ksysguard-5.19.5/ksysguardd/Linux/netstat.c-24-#include <arpa/inet.h>
##############################################
ksysguard-5.19.5/ksysguardd/Linux/netstat.c-140-
ksysguard-5.19.5/ksysguardd/Linux/netstat.c:141:	if ((host = gethostbyaddr((char *)&addr, 4, AF_INET)) == NULL) {
ksysguard-5.19.5/ksysguardd/Linux/netstat.c-142-		a_addr.s_addr = addr;