Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
  • Register
  • Sign in
  • G go
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributor statistics
    • Graph
    • Compare revisions
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • Deployments
    • Deployments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • Kirill Smelkov
  • go
  • Repository
You need to sign in or sign up before continuing.
  • go
  • src
  • syscall
  • exec_linux.go
Find file BlameHistoryPermalink
  • Julio Montes's avatar
    syscall: allow processes steal a controlling terminal on Linux · 673fdea5
    Julio Montes authored May 22, 2017
    The current implementation of forkAndExecInChild for Linux does not allow
    spawned processes steal the controlling terminal from a different session
    group. This patch passes 1 as the argument to TIOCSCTTY in order to allow
    spawned processes steal controlling terminals.
    
    Fixes #20454
    
    Change-Id: I171b8981509d648b07f89bddc1e9d45cb70e00e6
    Reviewed-on: https://go-review.googlesource.com/44343
    
    
    Reviewed-by: default avatarIan Lance Taylor <iant@golang.org>
    Run-TryBot: Ian Lance Taylor <iant@golang.org>
    673fdea5
GitLab Nexedi Edition | About GitLab | About Nexedi | 沪ICP备2021021310号-2 | 沪ICP备2021021310号-7