In message <9408131143.AA04455@iridium>, "Christopher A. Stewart" writes: >abit..) Actually what it turns out to be is a process where the ruid >!= euid the system won't dump core for it.. So if the Solaris login is >dumping core when someone envokes in on the command line, it must be >doing a setuid(0) early in the code.. I wonder why? Since login is invoked by root, it's not a security problem. (at least not in the usual sense of suid programs dumping core) The problem of login dumping core would be there even if login were not suid root. (and in many installations it isn't) When login gets invoked in normal logins (from getty, etc), ruid = euid. --Dave