3Unless it accesses illegally the stack: see Tom Reps, http://pages.cs.wisc.edu/ reps