<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.14.9</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.14.9</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.14.9'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2020-09-09T16:38:16Z</updated>
<entry>
<title>[release-branch.go1.14] go1.14.9</title>
<updated>2020-09-09T16:38:16Z</updated>
<author>
<name>Dmitri Shuralyov</name>
<email>dmitshur@golang.org</email>
</author>
<published>2020-09-09T14:05:09Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=26a85c3634b8b5dc9cf8adb30664dac0ddc6acf0'/>
<id>urn:sha1:26a85c3634b8b5dc9cf8adb30664dac0ddc6acf0</id>
<content type='text'>
Change-Id: I556ecd19f81692ddbd3faf1d918e36466833f12e
Reviewed-on: https://go-review.googlesource.com/c/go/+/253737
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Alexander Rakoczy &lt;alex@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] cmd/compile, runtime: mark R12 clobbered for write barrier call on PPC64</title>
<updated>2020-09-03T14:49:10Z</updated>
<author>
<name>Cherry Zhang</name>
<email>cherryyz@google.com</email>
</author>
<published>2020-08-17T23:06:19Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=652aebf5fc6de98bf5605df80403f04158260920'/>
<id>urn:sha1:652aebf5fc6de98bf5605df80403f04158260920</id>
<content type='text'>
When external linking, for large binaries, the external linker
may insert a trampoline for the write barrier call, which looks

0000000005a98cc8 &lt;__long_branch_runtime.gcWriteBarrier&gt;:
 5a98cc8:       86 01 82 3d     addis   r12,r2,390
 5a98ccc:       d8 bd 8c e9     ld      r12,-16936(r12)
 5a98cd0:       a6 03 89 7d     mtctr   r12
 5a98cd4:       20 04 80 4e     bctr

It clobbers R12 (and CTR, which is never live across a call).

As at compile time we don't know whether the binary is big and
what link mode will be used, I think we need to mark R12 as
clobbered for write barrier call. For extra safety (future-proof)
we mark caller-saved register that cannot be used for function
arguments, which includes R11, as potentially clobbered as well.

Updates #40851.
Fixes #40938.

Change-Id: Iedd901c5072f1127cc59b0a48cfeb4aaec81b519
Reviewed-on: https://go-review.googlesource.com/c/go/+/248917
Run-TryBot: Cherry Zhang &lt;cherryyz@google.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Austin Clements &lt;austin@google.com&gt;
(cherry picked from commit b58d29741650c7bf10b17f455666e2727e1cdd2e)
Reviewed-on: https://go-review.googlesource.com/c/go/+/249697
</content>
</entry>
<entry>
<title>[release-branch.go1.14] cmd/internal/obj: stop removing NOPs from instruction stream</title>
<updated>2020-09-03T02:31:58Z</updated>
<author>
<name>Keith Randall</name>
<email>khr@golang.org</email>
</author>
<published>2020-08-15T15:08:37Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=dd953ded330bd3b859b2eae46af7b6600bfeedff'/>
<id>urn:sha1:dd953ded330bd3b859b2eae46af7b6600bfeedff</id>
<content type='text'>
This has already been done for s390x, ppc64. This CL is for
all the other architectures.

Fixes #40797

Change-Id: Idd1816e057df63022d47e99fa06617811d8c8489
Reviewed-on: https://go-review.googlesource.com/c/go/+/248684
Run-TryBot: Cherry Zhang &lt;cherryyz@google.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Cherry Zhang &lt;cherryyz@google.com&gt;
(cherry picked from commit 46ca7b5ee2a8582736f1ddac27d8660e1104c345)
Reviewed-on: https://go-review.googlesource.com/c/go/+/249443
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] cmd/internal/obj/ppc64: don't remove NOP in assembler</title>
<updated>2020-09-03T02:17:16Z</updated>
<author>
<name>Lynn Boger</name>
<email>laboger@linux.vnet.ibm.com</email>
</author>
<published>2020-08-11T16:04:25Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=32dc9f7a0a8002bf844f4bc1104402c93334ed8f'/>
<id>urn:sha1:32dc9f7a0a8002bf844f4bc1104402c93334ed8f</id>
<content type='text'>
Previously, the assembler removed NOPs from the Prog list in
obj9.go. NOPs shouldn't be removed if they were added as
an inline mark, as described in the issue below.

Fixes #40766

Once the NOPs were left in the Prog list, some instructions
were flagged as invalid because they had an operand which was
not represented in optab. In order to preserve the previous
assembler behavior, entries were added to optab for those
operand cases. They were not flagged as errors before because
the NOP instructions were removed before the code to check the
valid opcode/operand combinations.

Change-Id: Iae5145f94459027cf458e914d7c5d6089807ccf8
Reviewed-on: https://go-review.googlesource.com/c/go/+/247842
Run-TryBot: Lynn Boger &lt;laboger@linux.vnet.ibm.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Paul Murphy &lt;murp@ibm.com&gt;
Reviewed-by: Michael Munday &lt;mike.munday@ibm.com&gt;
Reviewed-by: Keith Randall &lt;khr@golang.org&gt;
(cherry picked from commit 7d7bd5abc7f7ac901830b79496f63ce86895e262)
Reviewed-on: https://go-review.googlesource.com/c/go/+/248382
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] net/http/fgci: skip flaky test</title>
<updated>2020-09-02T17:41:16Z</updated>
<author>
<name>Filippo Valsorda</name>
<email>filippo@golang.org</email>
</author>
<published>2020-09-02T16:19:08Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=532db5deffdb13da0c1c981a2e26e8ad879d8b25'/>
<id>urn:sha1:532db5deffdb13da0c1c981a2e26e8ad879d8b25</id>
<content type='text'>
A test introduced in the security release is flaky due to a pre-existing
issue that does not qualify for backport itself.

Updates #41167
Fixes #41192

Change-Id: Ie6014e0796c1baee7b077881b5a799f9947fc9c2
Reviewed-on: https://go-review.googlesource.com/c/go/+/252718
Run-TryBot: Filippo Valsorda &lt;filippo@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] doc/go1.14: document json.Umarshal map key support of TextUnmarshaler</title>
<updated>2020-09-02T13:39:59Z</updated>
<author>
<name>ShihCheng Tu</name>
<email>mrtoastcheng@gmail.com</email>
</author>
<published>2020-06-14T16:07:10Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=404635c2eb3ab9ac07a013d9508f88ceb8d533c4'/>
<id>urn:sha1:404635c2eb3ab9ac07a013d9508f88ceb8d533c4</id>
<content type='text'>
Document that json.Unmarshal supports map keys whose underlying
types implement encoding.TextUnmarshaler.

Updates #38801.
Fixes #38904.

Change-Id: Icb9414e9067517531ba0da910bd4a2bb3daace65
Reviewed-on: https://go-review.googlesource.com/c/go/+/237857
Reviewed-by: Daniel Martí &lt;mvdan@mvdan.cc&gt;
Run-TryBot: Daniel Martí &lt;mvdan@mvdan.cc&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
(cherry picked from commit 47b450997778163dfed6f58cae379d928fc37687)
Reviewed-on: https://go-review.googlesource.com/c/go/+/252617
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] testing: treat PAUSE lines as changing the active test name</title>
<updated>2020-09-01T19:40:54Z</updated>
<author>
<name>Bryan C. Mills</name>
<email>bcmills@google.com</email>
</author>
<published>2020-08-17T21:31:21Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=2cab203bdaaac657b2f343760b6f65cf0e861cb6'/>
<id>urn:sha1:2cab203bdaaac657b2f343760b6f65cf0e861cb6</id>
<content type='text'>
We could instead fix cmd/test2json to treat PAUSE lines as *not*
changing the active test name, but that seems like it would be more
confusing to humans, and also wouldn't fix tools that parse output
using existing builds of cmd/test2json.

Fixes #40848
Updates #40657

Change-Id: I937611778f5b1e7dd1d6e9f44424d7e725a589ed
Reviewed-on: https://go-review.googlesource.com/c/go/+/248727
Run-TryBot: Bryan C. Mills &lt;bcmills@google.com&gt;
Reviewed-by: Jean de Klerk &lt;deklerk@google.com&gt;
(cherry picked from commit cdc77d34d7770ed02d84b9193380f9646017dce6)
Reviewed-on: https://go-review.googlesource.com/c/go/+/249098
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14] all: merge release-branch.go1.14-security into release-branch.go1.14</title>
<updated>2020-09-01T17:05:19Z</updated>
<author>
<name>Filippo Valsorda</name>
<email>filippo@golang.org</email>
</author>
<published>2020-09-01T17:05:19Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=053469c426969303bd72405ce24ffdab96fce439'/>
<id>urn:sha1:053469c426969303bd72405ce24ffdab96fce439</id>
<content type='text'>
Change-Id: I52c14764e354cb9b11be6019cf8fb44930786ab8
</content>
</entry>
<entry>
<title>[release-branch.go1.14-security] go1.14.8</title>
<updated>2020-09-01T14:08:43Z</updated>
<author>
<name>Dmitri Shuralyov</name>
<email>dmitshur@golang.org</email>
</author>
<published>2020-09-01T13:01:09Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=c187a3d47c41d54bd570905caad128ba947e3d03'/>
<id>urn:sha1:c187a3d47c41d54bd570905caad128ba947e3d03</id>
<content type='text'>
Change-Id: Ie582b6c53c6b120c56fbdd22b0c6946dd87f093b
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/835358
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.14-security] net/http/cgi,net/http/fcgi: add Content-Type detection</title>
<updated>2020-09-01T12:31:38Z</updated>
<author>
<name>Roberto Clapis</name>
<email>roberto@golang.org</email>
</author>
<published>2020-08-26T06:53:03Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=8fcee8abbea1bb959c63a6944f9ddf490a97f802'/>
<id>urn:sha1:8fcee8abbea1bb959c63a6944f9ddf490a97f802</id>
<content type='text'>
This CL ensures that responses served via CGI and FastCGI
have a Content-Type header based on the content of the
response if not explicitly set by handlers.

If the implementers of the handler did not explicitly
specify a Content-Type both CGI implementations would default
to "text/html", potentially causing cross-site scripting.

Thanks to RedTeam Pentesting GmbH for reporting this.

Fixes CVE-2020-24553

Change-Id: I82cfc396309b5ab2e8d6e9a87eda8ea7e3799473
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/823217
Reviewed-by: Russ Cox &lt;rsc@google.com&gt;
(cherry picked from commit 23d675d07fdc56aafd67c0a0b63d5b7e14708ff0)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/835312
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
</feed>
