syscall_number icon indicating copy to clipboard operation
syscall_number copied to clipboard

This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).

syscall_number

Description

With this little script you can search for Intel x86 Linux system call names and get the system call number as a result. There are websites like https://filippo.io/linux-syscall-table/ or https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html but who wants to google all the time whe he/she can have a command-line tool that works for 32bit and 64bit!

Requirements

gcc with 32bit support

Ubuntu:

sudo apt-get install gcc gcc-multilib

Fedora:

sudo dnf install gcc glibc-devel.i686

Installation

Requires Python version >= 3.6! (check with python3 --version)

pip3 install --user git+https://github.com/martinclauss/syscall_number.git

for a system-wide installation

sudo pip3 install git+https://github.com/martinclauss/syscall_number.git

Now you can run the command without the .py extension from everywhere:

syscall_number --help

Updates

You won't get new features / bug fixes automatically but you can easily update:

pip3 install --user --upgrade git+https://github.com/martinclauss/syscall_number.git

or

sudo pip3 install --upgrade git+https://github.com/martinclauss/syscall_number.git

Uninstallation

pip3 uninstall syscall_number

remove the global installation

sudo pip3 uninstall syscall_number

Usage

# the first time the command takes a bit longer since it builds a cache for all system calls
# query the system call (-s) read for 32bit (-b 32):
syscall_number -s read -b 32

# this should run a lot faster
# query the system call (-s) write for 64bit (-b 64):
syscall_number -s write -b 64

# reverse lookup is also possible with decimal and hexadecimal numbers
syscall_number -n 11 -b 32
syscall_number -n 0xb -b 32 

# this lists all (-a) 32bit (-b 32) system calls:
syscall_number -a -b 32

# and this lists all (-a) 64bit (-b 64) system calls:
syscall_number -a -b 64

# reverse search is also possible with grep:
syscall_number -a -b 32 | grep read

# if you just want the system call number without any additional text use -q:
syscall_number -s connect -b 32 -q

# or in a more complex scenario with pwntools' asm script (http://docs.pwntools.com/en/stable/asm.html)
echo "mov eax, $(syscall_number -s exit -b 32 -q); mov ebx, 42; int 0x80" | asm

# additionally show an excerpt of the man page for the system call with -m:
syscall_number -s read -b 32 -m


Alternatives

pwntools also provides a similar but more complex method with the syscall() function: 32bit and 64bit.

Contribution

Pull Requests are welcome! :)

Thanks

@tbehner