aboutsummaryrefslogtreecommitdiff
path: root/_content/doc
diff options
context:
space:
mode:
authorCherry Mui <cherryyz@google.com>2026-01-08 14:29:27 -0500
committerCherry Mui <cherryyz@google.com>2026-01-08 13:15:03 -0800
commit76c3d4ea151c4d927cab760d7db1112affee9c72 (patch)
tree53b0119c0ce44c52515d335a29f2f1cc7423a367 /_content/doc
parentc97685a94022a2e826f644e1f62e9976d5d62544 (diff)
downloadgo-x-website-76c3d4ea151c4d927cab760d7db1112affee9c72.tar.xz
_content/doc/go1.26: document heap address randomization
Change-Id: I7e7bad222e5d1a80a1ecaf7b30e8608d5abc9ba1 Reviewed-on: https://go-review.googlesource.com/c/website/+/734900 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Michael Knyszek <mknyszek@google.com> Reviewed-by: Roland Shoemaker <roland@golang.org>
Diffstat (limited to '_content/doc')
-rw-r--r--_content/doc/go1.26.md12
1 files changed, 12 insertions, 0 deletions
diff --git a/_content/doc/go1.26.md b/_content/doc/go1.26.md
index 7de902e1..7b0e2503 100644
--- a/_content/doc/go1.26.md
+++ b/_content/doc/go1.26.md
@@ -202,6 +202,18 @@ issue](/issue/74609).
We aim to enable goroutine leak profiles by default in Go 1.27.
+### Heap base address randomization
+
+<!-- CL 674835 -->
+
+On 64-bit platforms, the runtime now randomizes the heap base address
+at startup.
+This is a security enhancement that makes it harder for attackers to
+predict memory addresses and exploit vulnerabilities when using cgo.
+This feature may be disabled by setting
+`GOEXPERIMENT=norandomizedheapbase64` at build time.
+This opt-out setting is expected to be removed in a future Go release.
+
## Compiler {#compiler}
<!-- CLs 707755, 722440 -->