You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: erts/doc/notes.md
+44
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,50 @@ limitations under the License.
21
21
22
22
This document describes the changes made to the ERTS application.
23
23
24
+
## Erts 15.1.2
25
+
26
+
### Fixed Bugs and Malfunctions
27
+
28
+
- A bug has been fixed where receiving an SCTP message with `gen_sctp` could waste the first fragments of a message and only deliver the last fragment.
29
+
30
+
This happened with low probability when the OS signaled that the socket was ready for reading in combination with an internal time-out retry.
31
+
32
+
A bug has been fixed with a lingering time-out from after an SCTP connect that could stop the flow of incoming messages on an active `gen_tcp` socket.
33
+
34
+
Own Id: OTP-19235 Aux Id: ERIERL-1133, [PR-8837]
35
+
36
+
- An boolean option `non_block_send` for SCTP, has ben added to be able to achieve the old behaviour to avoid blocking send operations by passing the OS network stack error message (`{error,eagain}` through.
37
+
38
+
Own Id: OTP-19258 Aux Id: OTP-19061, ERIERL-1134
39
+
40
+
- The call `gen_tcp:send/2` could hang indefinitely despite having set the `send_timeout` option for the following unfortunate combination of circumstances:
41
+
42
+
* The socket has to be in passive mode.
43
+
* All output buffers had to be filled util the `high_watermark` was hit, causing the `gen_tcp:send/2` operation to block.
44
+
* While the send operation was blocked, a `gen_tcp:recv/2,3` call had to be done from a different process. It had to block, waiting for data for a while before completing the operation, and the received packet had to fill at least 75% of the receive buffer.
45
+
46
+
Under these circumstances he information that a send operation was waiting got lost, so the send operation that blocked in the first placed would never return. The data it had would be sent, though, and send operations from other processes, still work.
47
+
48
+
This bug has been fixed.
49
+
50
+
Own Id: OTP-19267 Aux Id: [GH-6455], OTP-18520, ERIERL-1138, [PR-8892]
51
+
52
+
- In rare circumstances, in code that matches multiple tuples, the JIT could generate code that would raise a `badmatch` exception even if the given tuples were correct.
53
+
54
+
Own Id: OTP-19268 Aux Id: [GH-8875], [PR-8895]
55
+
56
+
- Fixed beam crash that could happen if resetting `call_time` or `call_memory` trace counters of a function while it is called. Bug exists since OTP R16.
Copy file name to clipboardexpand all lines: lib/kernel/doc/notes.md
+18
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,24 @@ limitations under the License.
21
21
22
22
This document describes the changes made to the Kernel application.
23
23
24
+
## Kernel 10.1.1
25
+
26
+
### Fixed Bugs and Malfunctions
27
+
28
+
- A bug has been fixed where receiving an SCTP message with `gen_sctp` could waste the first fragments of a message and only deliver the last fragment.
29
+
30
+
This happened with low probability when the OS signaled that the socket was ready for reading in combination with an internal time-out retry.
31
+
32
+
A bug has been fixed with a lingering time-out from after an SCTP connect that could stop the flow of incoming messages on an active `gen_tcp` socket.
33
+
34
+
Own Id: OTP-19235 Aux Id: ERIERL-1133, [PR-8837]
35
+
36
+
- An boolean option `non_block_send` for SCTP, has ben added to be able to achieve the old behaviour to avoid blocking send operations by passing the OS network stack error message (`{error,eagain}` through.
Copy file name to clipboardexpand all lines: lib/ssl/doc/notes.md
+22
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,28 @@ limitations under the License.
21
21
22
22
This document describes the changes made to the SSL application.
23
23
24
+
## SSL 11.2.4
25
+
26
+
### Fixed Bugs and Malfunctions
27
+
28
+
- Refactor trying to also make some optimizations introduced a bug in signature algorithms checks in OTP-26.2.1. This could manifest itself in not being able to negotiate connections using certificates needing to use some TLS-1.2 compatibility legacy signature schemes.
29
+
30
+
Own Id: OTP-19249 Aux Id: ERIERL-1137, [PR-8866]
31
+
32
+
- Correct timeout handling for termination code run for own alerts, so that intended timeout is used instead of falling back to OS TCP-stack timeout that is unreasonably long on some platforms.
33
+
34
+
Own Id: OTP-19274 Aux Id: [PR-8901]
35
+
36
+
- Fix assertion so that works as intended.
37
+
This could result in that some TLS-1.2 clients would fail to connect to the the erlang server. Bug introduced in OTP-27.1.1
0 commit comments