Releases: erlang/otp
Releases · erlang/otp
OTP 21.3.7.1
Patch Package: OTP 21.3.7.1
Git Tag: OTP-21.3.7.1
Date: 2019-05-09
Trouble Report Id: OTP-15781
Seq num: ERIERL-356
System: OTP
Release: 21
Application: erl_interface-3.11.2.1
Predecessor: OTP 21.3.7
Check out the git tag OTP-21.3.7.1, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- erl_interface-3.11.2.1 ------------------------------------------
---------------------------------------------------------------------
The erl_interface-3.11.2.1 application can be applied independently
of other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15781 Application(s): erl_interface
Related Id(s): ERIERL-356
erl_interface/ei refused to use node names with an
alive name (the part of the node name preceding the @
sign) longer than 63 characters and a host name longer
than 64 characters. The total amount of characters
allowed in a node name (alivename@hostname) was thus
limited to 128 characters. These limits applied both to
the own node name as well as node names of other nodes.
Ordinary Erlang nodes limit the node name length to 256
characters, which meant that you could not communicate
with certain Erlang nodes due to their node name used.
erl_interface/ei now allow the total amount of
characters in a node name to be up to 256 characters.
These characters may be distributed between alive name
and host name in whatever way needed. That is, the
maximum amount of characters in the alive name may be
254 and the maximum amount of characters in the host
name may be 254, but in total the node name must not
exceed 256 characters.
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 21.3.8
Patch Package: OTP 21.3.8
Git Tag: OTP-21.3.8
Date: 2019-05-07
Trouble Report Id: OTP-14746, OTP-15295, OTP-15717, OTP-15758,
OTP-15781, OTP-15785, OTP-15793, OTP-15802
Seq num: ERIERL-143, ERIERL-334, ERIERL-337,
ERIERL-342, ERIERL-356, ERL-893, ERL-929,
ERL-934
System: OTP
Release: 21
Application: common_test-1.17.2, eldap-1.2.7,
erl_interface-3.11.3, erts-10.3.5,
public_key-1.6.6, ssl-9.2.3, stdlib-3.8.2
Predecessor: OTP 21.3.7
Check out the git tag OTP-21.3.8, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- POTENTIAL INCOMPATIBILITIES -------------------------------------
---------------------------------------------------------------------
OTP-15717 Application(s): common_test
Related Id(s): ERIERL-334
The test result when a hook function fails is in
general the same as if the function that the hook is
associated with fails. For example, if
post_init_per_testcase fails the result is that the
test case is skipped, as is the case when
init_per_testcase fails.This, however, was earlier not
true for timetrap timeouts or other error situations
where the process running the hook function was killed.
This is now corrected, so the error handling should be
the same no matter how the hook function fails.
---------------------------------------------------------------------
--- common_test-1.17.2 ----------------------------------------------
---------------------------------------------------------------------
The common_test-1.17.2 application can be applied independently of
other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15717 Application(s): common_test
Related Id(s): ERIERL-334
*** POTENTIAL INCOMPATIBILITY ***
The test result when a hook function fails is in
general the same as if the function that the hook is
associated with fails. For example, if
post_init_per_testcase fails the result is that the
test case is skipped, as is the case when
init_per_testcase fails.This, however, was earlier not
true for timetrap timeouts or other error situations
where the process running the hook function was killed.
This is now corrected, so the error handling should be
the same no matter how the hook function fails.
OTP-15758 Application(s): common_test
Related Id(s): ERIERL-342
In some rare cases, when two common_test nodes used the
same log directory, a timing problem could occur which
caused common_test to crash because it's log cache file
was unexpectedly empty. This is now corrected.
--- Improvements and New Features ---
OTP-14746 Application(s): common_test
Related Id(s): ERIERL-143
Two new common_test hook functions are introduced:
post_groups/2, which is called after Suite:groups/0
post_all/3, which is called after Suite:all/0
These functions allow modifying the return values from
the groups/0 and all/0 functions, respectively.
A new term, {testcase,TestCase,RepeatProperties} is now
also allowed in the return from all/0. This can be used
for repeating a single test case a specific number of
times, or until it fails or succeeds once.
Full runtime dependencies of common_test-1.17.2: compiler-6.0,
crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0,
observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0,
stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8
---------------------------------------------------------------------
--- eldap-1.2.7 -----------------------------------------------------
---------------------------------------------------------------------
The eldap-1.2.7 application can be applied independently of other
applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of eldap-1.2.7: asn1-3.0, erts-6.0,
kernel-3.0, ssl-5.3.4, stdlib-2.0
---------------------------------------------------------------------
--- erl_interface-3.11.3 --------------------------------------------
---------------------------------------------------------------------
The erl_interface-3.11.3 application can be applied independently of
other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15781 Application(s): erl_interface
Related Id(s): ERIERL-356
erl_interface/ei refused to use node names with an
alive name (the part of the node name preceding the @
sign) longer than 63 characters and a host name longer
than 64 characters. The total amount of characters
allowed in a node name (alivename@hostname) was thus
limited to 128 characters. These limits applied both to
the own node name as well as node names of other nodes.
Ordinary Erlang nodes limit the node name length to 256
characters, which meant that you could not communicate
with certain Erlang nodes due to their node name used.
erl_interface/ei now allow the total amount of
characters in a node name to be up to 256 characters.
These characters may be distributed between alive name
and host name in whatever way needed. That is, the
maximum amount of characters in the alive name may be
254 and the maximum amount of characters in the host
name may be 254, but in total the node name must not
exceed 256 characters.
---------------------------------------------------------------------
--- erts-10.3.5 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.5 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15793 Application(s): erts
Related Id(s): ERIERL-337, OTP-15709
Fixed more bugs in process_info(reductions) causing it
to sometimes behave non-monotonic. That is, a
subsequent call toward the same process could return a
lower reduction value.
Full runtime dependencies of erts-10.3.5: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- public_key-1.6.6 ------------------------------------------------
---------------------------------------------------------------------
The public_key-1.6.6 application can be applied independently of
other applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of public_key-1.6.6: asn1-3.0, crypto-3.8,
erts-6.0, kernel-3.0, stdlib-3.5
---------------------------------------------------------------------
--- ssl-9.2.3 -------------------------------------------------------
---------------------------------------------------------------------
The ssl-9.2.3 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15802 Application(s): ssl
Related Id(s): ERL-934
Missing check of size of user_data_buffer made internal
socket behave as an active socket instead of active N.
This could cause memory problems.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of ssl-9.2.3: crypto-4.2, erts-10.0,
inets-5.10.7, kernel-6.0, public_key-1.5, stdl...
OTP 22.0-rc3
OTP-22.0-rc3 Release Candidate 3
OTP 21.3.7
Patch Package: OTP 21.3.7
Git Tag: OTP-21.3.7
Date: 2019-04-26
Trouble Report Id: OTP-15772
Seq num:
System: OTP
Release: 21
Application: ssh-4.7.6
Predecessor: OTP 21.3.6
Check out the git tag OTP-21.3.7, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- ssh-4.7.6 -------------------------------------------------------
---------------------------------------------------------------------
The ssh-4.7.6 application can be applied independently of other
applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15772 Application(s): ssh
When an SSH server receives the very first message on a
new TCP connection, and that message is not the
expected one, the 64 first bytes of the received
message are now dumped in the INFO REPORT that reports
the Protocol Error.
This facilitates the debugging of who sends the bad
message or of detecting a possible port scanning.
Full runtime dependencies of ssh-4.7.6: crypto-4.2, erts-6.0,
kernel-3.0, public_key-1.5.2, stdlib-3.3
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 21.3.6
Patch Package: OTP 21.3.6
Git Tag: OTP-21.3.6
Date: 2019-04-18
Trouble Report Id: OTP-15054
Seq num: ERIERL-346
System: OTP
Release: 21
Application: ssl-9.2.2
Predecessor: OTP 21.3.5
Check out the git tag OTP-21.3.6, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- ssl-9.2.2 -------------------------------------------------------
---------------------------------------------------------------------
The ssl-9.2.2 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15054 Application(s): ssl
Related Id(s): ERIERL-346
With the default BEAST Mitigation strategy for TLS 1.0
an empty TLS fragment could be sent after a one-byte
fragment. This glitch has been fixed.
Full runtime dependencies of ssl-9.2.2: crypto-4.2, erts-10.0,
inets-5.10.7, kernel-6.0, public_key-1.5, stdlib-3.5
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 21.3.5
Patch Package: OTP 21.3.5
Git Tag: OTP-21.3.5
Date: 2019-04-15
Trouble Report Id: OTP-15766, OTP-15768, OTP-15769
Seq num: ERIERL-345
System: OTP
Release: 21
Application: diameter-2.2.1, erts-10.3.4, inets-7.0.7
Predecessor: OTP 21.3.4
Check out the git tag OTP-21.3.5, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- diameter-2.2.1 --------------------------------------------------
---------------------------------------------------------------------
The diameter-2.2.1 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15768 Application(s): diameter
Fix inadvertently broad monitor that resulted in
gen_server cast messages to hidden nodes from module
diameter_dist.
Full runtime dependencies of diameter-2.2.1: erts-10.0, kernel-3.2,
ssl-9.0, stdlib-2.4
---------------------------------------------------------------------
--- erts-10.3.4 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.4 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15766 Application(s): erts
Add missing documentation of new external tags NEW_PID,
NEW_PORT and NEWER_REFERENCE introduced in OTP 19.
These new tags are planned to be "activated" in OTP 23
when distribution capability flag DFLAG_BIG_CREATION
becomes mandatory. Older nodes (>= 19) are able to
decode these new tags and send them back to the new
node. Nodes older than OTP 23 will however never encode
their own local pids, ports and references using the
new tags.
Full runtime dependencies of erts-10.3.4: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- inets-7.0.7 -----------------------------------------------------
---------------------------------------------------------------------
The inets-7.0.7 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15769 Application(s): inets
Related Id(s): ERIERL-345
Fix the internal handling of the option
erl_script_timeout in httpd. If explicit
erl_script_timeout value was supplied in seconds it was
not correctly converted to millisecond units for
internal usage.
This change fixes the handling of erl_script_timeout in
all possible configuration scenarios.
Full runtime dependencies of inets-7.0.7: erts-6.0, kernel-3.0,
mnesia-4.12, runtime_tools-1.8.14, ssl-5.3.4, stdlib-3.5
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 21.3.4
Patch Package: OTP 21.3.4
Git Tag: OTP-21.3.4
Date: 2019-04-12
Trouble Report Id: OTP-15716, OTP-15750, OTP-15753, OTP-15757,
OTP-15762, OTP-15763
Seq num: ERL-900, ERL-905
System: OTP
Release: 21
Application: common_test-1.17.1, crypto-4.4.2,
erl_interface-3.11.2, erts-10.3.3, ssh-4.7.5
Predecessor: OTP 21.3.3
Check out the git tag OTP-21.3.4, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- common_test-1.17.1 ----------------------------------------------
---------------------------------------------------------------------
The common_test-1.17.1 application can be applied independently of
other applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15716 Application(s): common_test
OTP internal test improvements.
Full runtime dependencies of common_test-1.17.1: compiler-6.0,
crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0,
observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0,
stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8
---------------------------------------------------------------------
--- crypto-4.4.2 ----------------------------------------------------
---------------------------------------------------------------------
The crypto-4.4.2 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15750 Application(s): crypto
Related Id(s): ERL-905
Fixed build link error on Windows. Unresolved symbol
'bcmp'.
Full runtime dependencies of crypto-4.4.2: erts-9.0, kernel-5.3,
stdlib-3.4
---------------------------------------------------------------------
--- erl_interface-3.11.2 --------------------------------------------
---------------------------------------------------------------------
The erl_interface-3.11.2 application can be applied independently of
other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15757 Application(s): erl_interface
Fix handling of Makefile dependencies so that parallel
make works properly.
---------------------------------------------------------------------
--- erts-10.3.3 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.3 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15753 Application(s): erts
Related Id(s): ERL-900
Fix erlang:open_port/2 with the fd option to correctly
cleanup the pollset when the port is closed. Before
this fix there would be error printouts sent to logger
when the same fd was reused in a new port.
Full runtime dependencies of erts-10.3.3: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- ssh-4.7.5 -------------------------------------------------------
---------------------------------------------------------------------
The ssh-4.7.5 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15762 Application(s): ssh
The callback ssh_channel:init/1 was missing in OTP-21
OTP-15763 Application(s): ssh
If a client was connected to an server on an already
open socket, the callback fun(PeerName,FingerPrint) in
the accept_callback option passed the local name in the
argument PeerName instead of the remote name.
Full runtime dependencies of ssh-4.7.5: crypto-4.2, erts-6.0,
kernel-3.0, public_key-1.5.2, stdlib-3.3
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 21.3.3
Patch Package: OTP 21.3.3
Git Tag: OTP-21.3.3
Date: 2019-04-01
Trouble Report Id: OTP-15704, OTP-15706, OTP-15709
Seq num: ERIERL-336, ERIERL-337
System: OTP
Release: 21
Application: erts-10.3.2, kernel-6.3.1, stdlib-3.8.1
Predecessor: OTP 21.3.2
Check out the git tag OTP-21.3.3, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- erts-10.3.2 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.2 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15704 Application(s): erts
Fixed a bug in seq_trace:reset_trace/0 that could crash
the emulator.
OTP-15709 Application(s): erts
Related Id(s): ERIERL-337
Fixed bug in process_info(reductions) causing it to
sometimes return invalid results.
Full runtime dependencies of erts-10.3.2: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- kernel-6.3.1 ----------------------------------------------------
---------------------------------------------------------------------
Note! The kernel-6.3.1 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependency has to be satisfied:
-- erts-10.2.5 (first satisfied in OTP 21.2.7)
--- Fixed Bugs and Malfunctions ---
OTP-15706 Application(s): kernel, stdlib
Related Id(s): ERIERL-336
Fixed a performance regression when reading files
opened with the compressed flag.
Full runtime dependencies of kernel-6.3.1: erts-10.2.5, sasl-3.0,
stdlib-3.5
---------------------------------------------------------------------
--- stdlib-3.8.1 ----------------------------------------------------
---------------------------------------------------------------------
The stdlib-3.8.1 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15706 Application(s): kernel, stdlib
Related Id(s): ERIERL-336
Fixed a performance regression when reading files
opened with the compressed flag.
Full runtime dependencies of stdlib-3.8.1: compiler-5.0, crypto-3.3,
erts-10.0, kernel-6.0, sasl-3.0
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
OTP 22.0-rc2
OTP-22.0-rc2 Release Candidate 2
OTP 21.3.2
Patch Package: OTP 21.3.2
Git Tag: OTP-21.3.2
Date: 2019-03-21
Trouble Report Id: OTP-15684, OTP-15685, OTP-15688, OTP-15690
Seq num: ERL-475, ERL-837
System: OTP
Release: 21
Application: erts-10.3.1, xmerl-1.3.20
Predecessor: OTP 21.3.1
Check out the git tag OTP-21.3.2, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- erts-10.3.1 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.1 application can *not* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15688 Application(s): erts
If a suspend/resume signal pair was sent to a process
while it was executing dirty, the receiving process
could later end up in a suspended state indefinitely.
This bug was introduced in ERTS version 10.0 (OTP
21.0).
Suspend/resume signals are sent from
erlang:suspend_process()/erlang:resume_process(). The
dbg trace tool utilize this functionality and could
thus trigger this bug.
OTP-15690 Application(s): erts
Related Id(s): PR-2172
Fix a possible deadlock when terminating the ERTS
caused by a dirty scheduler not releasing it's
run-queue lock when terminating.
Full runtime dependencies of erts-10.3.1: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- xmerl-1.3.20 ----------------------------------------------------
---------------------------------------------------------------------
The xmerl-1.3.20 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15684 Application(s): xmerl
Related Id(s): ERL-837
Handling of character references in attributes are
fixed.
OTP-15685 Application(s): xmerl
Related Id(s): ERL-475
Normalization of whitespace characters in attributes
are fixed so it works when character references are
used.
Full runtime dependencies of xmerl-1.3.20: erts-6.0, kernel-3.0,
stdlib-2.5
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------