Report: Kernel System Calls

A kernel system call, or syscall, is an entry point via which usermode code can call functions in the Linux kernel. A syscall table is a mapping between the syscall ID and the kernel address of its implementation.


Report Data: Ia32 (32-bit) Syscalls

Following is the IA32 Syscall Table at the time the memory snapshot was taken of the centos 6 - 2.6.32-696.28.1.el6.x86_64 image from the samples gallery (requires authentication).

Kernel Ia32 Syscalls Report

The following tables describes each column of the reported data.

Column Description Notes
Id Syscall ID
Addr Kernel memory address
Name Syscall name

Report Data: (64-bit) Syscalls

Following is the syscall table at the time the memory snapshot was taken of the centos 6 - 2.6.32-696.28.1.el6.x86_64 image from the samples gallery (requires authentication).

Kernel Syscalls Report

The following tables describes each column of the reported data.

Column Description Notes
Id Syscall ID
Addr Kernel memory address
Name Syscall name

Forensic Hints

Patterns to look for:

Note that the Project Freta analysis engine infers the existence of rootkits and other hooks of these objects, and lists them in the Potential Rootkits report section.

This data cannot be obtained from a running Linux system, so an internal-external comparison is not possible.