diff --git a/src/runtime/proc.go b/src/runtime/proc.go index 465a1adb60..5ea96f03f5 100644 --- a/src/runtime/proc.go +++ b/src/runtime/proc.go @@ -5286,10 +5286,6 @@ func malg(stacksize int32) *g { // The compiler turns a go statement into a call to this. func newproc(fn *funcval) { gp := getg() - if goexperiment.RuntimeSecret && gp.secret > 0 { - panic("goroutine spawned while running in secret mode") - } - pc := sys.GetCallerPC() systemstack(func() { newg := newproc1(fn, gp, pc, false, waitReasonZero) diff --git a/src/runtime/secret/secret.go b/src/runtime/secret/secret.go index f669b98828..9eae22605f 100644 --- a/src/runtime/secret/secret.go +++ b/src/runtime/secret/secret.go @@ -28,7 +28,7 @@ import ( // - Currently only supported on linux/amd64 and linux/arm64. On unsupported // platforms, Do will invoke f directly. // - Protection does not extend to any global variables written by f. -// - Any attempt to launch a goroutine by f will result in a panic. +// - Protection does not extend to any new goroutines made by f. // - If f calls runtime.Goexit, erasure can be delayed by defers // higher up on the call stack. // - Heap allocations will only be erased if the program drops all