The stripped redpanda binary you link to is systematically off by 2 in
its dynamic symbol table:
some data symbols point to section 7 (.rela.dyn), .rodata is 9
function symbols point to section 13 (.frame_ehdr), .text is 15
some data symbols (not TLS) point to section 20 (.tbss), .data.rel.ro is
I think Florian is right.
I see a scenario where:
1. someone runs a debuginfod service for closed source software in an
internal network
2. the names for debuginfod server instances are guessable
3. users in corporate networks don't run adblockers
4. the debuginfod defaults change
5
Hi Mark,
it is the Cross-Origin-Resource-Sharing mechanism explained at
https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS 1. by default
JavaScript code from Website A cannot request arbitrary resources from
website B, these are called cross-origin-requests 2. The browser
performs what
would be a good template.
I have confirmed that I can use debuginfod with this patch from my web
application at
https://core-explorer.github.io/cdx-type/
Signed-off-by: Henning Meyer
---
debuginfod/ChangeLog | 6 ++
debuginfod/debuginfod.cxx | 35 +--
2
Hi,
I am working on a DWARF parser and visualizer as a web app,
and I noticed that debuginfod cannot be used from web applications:
The browser's security model prevents XmlHttpRequests to foreign servers
from JavaScript unless the server advertises that it is okay to do so,
following the CORS pr