Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cool project! As a more advanced form, I think it should be possible to get all this information via eBPF rather than ss output and scraping /proc.

Food for thought!




The OP's project shows process names, which I do not see in this program.


BTW: This is also a TUI - much preferred !


Nice but it feels too much AI slop


eBPF doesn't work on locked down kernels (stock kernels in Secure Boot mode).


eBPF is restricted when booted in a SB environment, but it's not nonfunctional. The default config puts the kernel into "integrity" mode of Kernel Lockdown, which reduces scope of access and enforces read-only usage.

Whether or not the specific functions needed to replicate this tool are impacted is beyond my knowledge.


I think this is a great point, eBPF is cool but probably less popular than ss




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: