https://gcc.gnu.org/bugzilla/show_bug.cgi?id=28334
Eric Gallager changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
CC|
--- Comment #5 from nigelenki at comcast dot net 2006-07-11 04:44 ---
(In reply to comment #4)
> See bug #28328 comment #5 on why this should be closed as WONTFIX/INVALID or
> the likes.
>
Eh close it WONTFIX because it's not gcc's job. Like I said, the stack smash
handler can be alte
--- Comment #4 from solar at gentoo dot org 2006-07-11 04:28 ---
See bug #28328 comment #5 on why this should be closed as WONTFIX/INVALID or
the likes.
--
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28334
--- Comment #3 from pinskia at gcc dot gnu dot org 2006-07-11 04:27 ---
(In reply to comment #2)
> And the developer is going to debug a program nice and slow when those
> obscure,
> hard to trigger bugs come along.
An end user should not care why something crashed, it just confuses th
--- Comment #2 from nigelenki at comcast dot net 2006-07-11 03:27 ---
And the developer is going to debug a program nice and slow when those obscure,
hard to trigger bugs come along.
I was just toying with metasploit the other day. Threw an exploit at Windows
to get me a remote VNC ses
--- Comment #1 from pinskia at gcc dot gnu dot org 2006-07-11 03:03 ---
Again an end user should not care what caused the bug, even if it gives more
information to the developer faster, the developer should be able to debug the
program just fine. Also using SSP is about not trusting the