The ABRT coredump handler has code to emulate default core file creation (as if no such pipe-based handler was installed). The handler runs in a separate process, initially as root. Currently, the handler just switches effective IDs and creates the file. This does not replicate the SELinux context of the zombie process. Is there a way to do that? Is there some recommended way to inherit all the security-related process attributes? -- Florian Weimer / Red Hat Product Security _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.