aboutsummaryrefslogtreecommitdiff
path: root/src/syscall/exec_libc.go
diff options
context:
space:
mode:
authorIan Lance Taylor <iant@golang.org>2021-04-26 17:27:58 -0700
committerIan Lance Taylor <iant@golang.org>2021-04-27 13:50:09 +0000
commit7d22c2181b4343b58e40962cefd52af1284b4294 (patch)
treed8e975ccc9e6b025930e8ce173654e65774eb824 /src/syscall/exec_libc.go
parent39844971fb92992305babb4b64d50faa7fea40a0 (diff)
downloadgo-7d22c2181b4343b58e40962cefd52af1284b4294.tar.xz
syscall: restore signal mask after setting foreground process group
Fixes #37217 Change-Id: I0151bb77fc4c4552d1b19c31d784943b72f84b80 Reviewed-on: https://go-review.googlesource.com/c/go/+/313653 Trust: Ian Lance Taylor <iant@golang.org> Run-TryBot: Ian Lance Taylor <iant@golang.org> TryBot-Result: Go Bot <gobot@golang.org> Reviewed-by: Tobias Klauser <tobias.klauser@gmail.com>
Diffstat (limited to 'src/syscall/exec_libc.go')
-rw-r--r--src/syscall/exec_libc.go6
1 files changed, 4 insertions, 2 deletions
diff --git a/src/syscall/exec_libc.go b/src/syscall/exec_libc.go
index 3c8e87d32f..8a84954051 100644
--- a/src/syscall/exec_libc.go
+++ b/src/syscall/exec_libc.go
@@ -116,8 +116,6 @@ func forkAndExecInChild(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr
// Fork succeeded, now in child.
- runtime_AfterForkInChild()
-
// Session ID
if sys.Setsid {
_, err1 = setsid()
@@ -153,6 +151,10 @@ func forkAndExecInChild(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr
}
}
+ // Restore the signal mask. We do this after TIOCSPGRP to avoid
+ // having the kernel send a SIGTTOU signal to the process group.
+ runtime_AfterForkInChild()
+
// Chroot
if chroot != nil {
err1 = chroot1(uintptr(unsafe.Pointer(chroot)))