aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Pratt <mpratt@google.com>2026-02-06 14:56:49 -0500
committerGopher Robot <gobot@golang.org>2026-02-06 12:52:05 -0800
commit0e905b70ce95ad874c839ae5523b8fb8885e14ce (patch)
treee0f4b3ef30fae02e107a6de92707eeaa92d868cd
parent27c910a2546236f83ef44956bcb8545779b84edc (diff)
downloadgo-x-website-0e905b70ce95ad874c839ae5523b8fb8885e14ce.tar.xz
_content/doc/go1.26: minor adjustments
Move the experimental goroutine leak detector to the end of the runtime section so it isn't sandwiched between two non-experimental features. For an optimization with debugging instructions, add a note to file an issue if they are needed. Add an additional link to simd/archsimd. Change-Id: I6a6a636ce42d7da2df92b5119cb4fe0be647f9a7 Reviewed-on: https://go-review.googlesource.com/c/website/+/742880 Auto-Submit: Michael Pratt <mpratt@google.com> Reviewed-by: Dmitri Shuralyov <dmitshur@golang.org> Reviewed-by: Keith Randall <khr@golang.org> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
-rw-r--r--_content/doc/go1.26.md28
1 files changed, 14 insertions, 14 deletions
diff --git a/_content/doc/go1.26.md b/_content/doc/go1.26.md
index 695d5094..20cb9009 100644
--- a/_content/doc/go1.26.md
+++ b/_content/doc/go1.26.md
@@ -131,6 +131,18 @@ performance or behavior, please [file an issue](/issue/new).
The baseline runtime overhead of cgo calls has been reduced by ~30%.
+### Heap base address randomization
+
+<!-- CL 674835 -->
+
+On 64-bit platforms, the runtime now randomizes the heap base address
+at startup.
+This is a security enhancement that makes it harder for attackers to
+predict memory addresses and exploit vulnerabilities when using cgo.
+This feature may be disabled by setting
+`GOEXPERIMENT=norandomizedheapbase64` at build time.
+This opt-out setting is expected to be removed in a future Go release.
+
### Goroutine leak profiles {#goroutineleak-profiles}
<!-- CL 688335 -->
@@ -209,18 +221,6 @@ issue](/issue/74609).
We aim to enable goroutine leak profiles by default in Go 1.27.
-### Heap base address randomization
-
-<!-- CL 674835 -->
-
-On 64-bit platforms, the runtime now randomizes the heap base address
-at startup.
-This is a security enhancement that makes it harder for attackers to
-predict memory addresses and exploit vulnerabilities when using cgo.
-This feature may be disabled by setting
-`GOEXPERIMENT=norandomizedheapbase64` at build time.
-This opt-out setting is expected to be removed in a future Go release.
-
## Compiler {#compiler}
<!-- CLs 707755, 722440 -->
@@ -231,6 +231,7 @@ situations, which improves performance. If this change is causing trouble, the
find the allocation causing trouble using the `-compile=variablemake` flag. All
such new stack allocations can also be turned off using
`-gcflags=all=-d=variablemakehash=n`.
+If you encounter issues with this optimization, please [file an issue](/issue/new).
## Linker {#linker}
@@ -298,8 +299,7 @@ across all architectures.
Building on top of this, we plan to develop a high-level portable SIMD
package in the future.
-See the package documentation and the [proposal issue](/issue/73787)
-for more details.
+See the [package documentation](/pkg/simd/archsimd) and the [proposal issue](/issue/73787) for more details.
### New experimental runtime/secret package