I have tried -fno-stack-protector too.
But it could be the version of gcc like you said stahta01 and jens because the stack protector was implemented in gcc 4.1, and when I 'am in the directory of mingw and i type gcc -v in command line (under windows) the result is:
gcc version 3.4.5 (mingw-vista special)
But is it possible the stack protector was implemented event though it's a older version ?
In reality I'm learning the stack overflow with Code::Blocks & OllyDbg, and when I overwrite EIP to put the address of my shellcode, a part of the shellcode (not totally) is executed but on an instruction of the shellcode this doesn't works, and make the program stop. The shellcode works because I have tried it with a function pointer and it works.
Is there some others securitys have been implemented, like the stack protector in mingw?
I know it's a newbie problem but it make some days i block on that...
If you want another information to resolve the problem tell me.