Ross Patterson wrote:
At 11:08 10/30/2002 -0500, Post, Mark K wrote:
And the key point here is that "getting in" simply requires modifying
known
exploits against vulnerable software with an S/390-specific payload.
But it didn't have to be this way. If Linas Vepstas et al. had been able
to finish the "Bigfoot" i370 port or if his attempts to influence the IBM
s390 port had been successful, we wouldn't have this problem. Linas' port
of GCC for "Bigfoot" had the stack growing *upward*, not *downward* as on
almost every other platform.
I've always been curious. Why is a top down stack used anyways ??
Of course I've been using a bottom up stack for almost 30 yrs so I
might be biased ;-)
Greg