This is probably not the correct interpretation of this error.
The Win32 error above is more likely to indicate the actual problem.
Flags
Severity
Success
This code indicates success, rather than an error.
This may not be the correct interpretation of this code,
or possibly the program is handling errors incorrectly.
I'm curious about how overwriting the stack is different in the main function than in other functions Take this example: #include <stdio.h> int main(int argc, char *argv[]) { char buf[8]; gets(buf); } In this code, the buffer to be overflowed is created in the main function, and as a result [...] read more
Here is my function with line numbers 8 | void function(char* string) { 9 | char buffer[16]; 10| strcpy(buffer,string); 11| } Here is gdb disassemble function output 0x000011d4 <+0>: push %ebp 0x000011d5 <+1>: mov %esp,%ebp 0x000011d7 <+3>: push %ebx 0x000011d8 <+4>: sub $0x14,%esp 0x000011db <+7>: call 0x123d <__x86.get_pc_thunk.ax> 0x000011e0 <+12>: [...] read more