Ghidra Load Linux Headers [on hold]

I’m trying to reverse engineer a linux kernel module (kernel version 4.19). Ghidra does recognize correctly all function names such as: open, misc_register etc, but it cannot determinate their exact signatures.

Let’s take as an example function copy_from_user with signature:

unsigned long copy_from_user (void *to, const void __user *from, unsigned long n); 

and here’s how Ghidra sees it:

undefined _copy_from_user (void) 

I believe that it won’t be the last kernel module for me to reverse engineer and so I would like to learn how to load all missing kernel structures to the program.

Moreover I am aware that I can edit the function signature by hand, but I would then need to add plenty of structures by hand as well (such as struct file) and this would be very ineffective.

What I’ve tried so far

(I’m super new to Ghidra and if you know better way, please just share)

I’ve downloaded headers from debian repository:

$   wget linux-headers-4.19.0-6-common_4.19.67-2+deb10u2_all.deb . $   ls linux-headers-4.19.0-6-common_4.19.67-2+deb10u2_all.deb  usr $   ls /usr/src/ linux-headers-4.19.0-6-common 

I extracted and then tried to load them using File>>Parse C Source option by specifying the path to the extracted folder..

enter image description here

and got an error. What can I do to make Ghidra aware of the correct function signatures?

Update: As MechMK1 has pointed out I have provided a directory instead of header files. I’ve corrected my mistake and this time I’ve just copied the whole content of all files into all_headers.h

$   cat `find . | grep .h` > all_headers.h $   cat all_headers.h | wc -c 29824650 

And I’ve provided all_headers.h to get parsed. This time there was no error, but Ghidra has only added around 20 defines and no function signatures.

enter image description here

enter image description here

How do I manage a player with autism who is at times disruptive? [on hold]

I recently gained a new player who has autism and he is making it harder for me to make my campaign. I have never dealt with any like this and I don’t know what I should do regarding his disability. He sometimes has breakdowns when the other players do something like make a loud noise and no one really knows what what else will set him off. I’d feel like a terrible person if I got rd of him and when he does contribute the campaign moves along nicely. I don’t know whether to make rules for the group to follow or not.

How to create a product customiser? [on hold]

So I’m looking at doing a project to practice and I thought I’d try my hand at building an interactive product customiser, not WordPress or anything. Just to see if I can build this to run in a browser.

The part I’m fuzzy on is how to setup the interactivity.

Could someone point me in the direction of any courses or tutorials that could help me.

Can I use Mage Hand [on hold]

An automaton threw a mechanical bird at my player, and my DM told me to roll inititive to see if I had a chance to do something. I managed to get an action in, so I cast mage hand in front of the bird. As long as it’s thrown with less than 10lbs of force, can I catch csomething with mage hand?

Modeling and managing attack surface around individual finance [on hold]

I want to protect myself from fraud and identity theft.

While there are on the Internet plenty of arbitrary collections of precautionary tips, I want to make rational, fully informed choices to manage the risk that I suffer from financial crime. (I’m not an unusually valuable target for crime; I just want to make responsible choices.)

Essentially, I want to know how my choices will affect the attack surface around my individual finances and crime-relevant information. Having a good model of this attack surface would allow me to answer, for example, these questions:

  • How do I evaluate a bank or credit union for its information security practices?
  • How do I choose among email service providers and email information security practices?
  • What practices around financial transactions minimize this attack surface?

I’m not looking for answers to these questions in particular, but rather how to model the attack surface they are asking about.

So, my question is:

When a security expert wants to model a complex attack surface across multiple institutions and information systems, how does he or she go about doing it? What steps does he or she go through? Can a technically capable but non-expert follow these steps?

Is it possible to play as a minotaur in D&D? [on hold]

I am new to the world of roleplaying games, and a group of my friends has gotten together to set up a game of Dungeons and Dragons. I’ve played many RPG’s online, and instantly got a few ideas for my character, my main one being a minotaur. I was super excited about this but realized I might not be able to play as one. Would I be allowed to play as this race? Am I not? Or is this more of a question for the DM running the game?