Top "Stack" questions

A stack is a last in, first out (LIFO) abstract data type and data structure.

Prefix notation to infix notation in Python

I am writing a small calculator (with prefix notation) and I'm curious how I'd convert prefix notation to infix notation. …

python math stack infix-notation prefix-notation
Call tree for embedded software

Does anyone know some tools to create a call tree for C application that will run on a microcontroller (Cortex-M3)? …

c embedded stack microcontroller
free.c throws exception with "this program has stopped working"

When I run the program (server.exe) with Visual C++ 2010 Express's debugger, it runs perfectly, but when I run it …

c++ visual-c++ stack visual-c++-2010-express
How can I view the local variables on the evaluation stack when debugging a .NET CLR application?

I'm using Windbg (with the sos extention) and trying to debug a crashed application. I was able to dump the …

debugging stack windbg il sos
Error in running ./stack.sh in devstack

When I try to do ./stack.sh after the call trace I am provide with the following error : `[Call Trace] ./…

stack openstack devstack
DCD instruction and IRQ stack

I'm studying the topic of setting up a stack for different modes of an ARM processor (IRQ, Supervisor, User, ...). Since …

assembly stack arm irq
Why don't stacks grow upwards (for security)?

This is related to the question 'Why do stacks typically grow downwards?', but more from a security point of …

security architecture x86 stack cpu
Why is there a limit on the stack size?

Possible Duplicate: What and where are the stack and heap My installation of Ubuntu has a default stack size limit …

stack callstack
How to write a buffer-overflow exploit in GCC,windows XP,x86?

void function(int a, int b, int c) { char buffer1[5]; char buffer2[10]; int *ret; ret = buffer1 + 12; (*ret) += 8;//why is it 8?? } …

c gcc stack buffer-overflow exploit
can anyone explain this code to me?

WARNING: This is an exploit. Do not execute this code. //shellcode.c char shellcode[] = "\x31\xc0\x31\xdb\xb0\x17\…

c stack exploit shellcode