Patch Package OTP 22.3.4 Released

Fri May 8 13:33:07 CEST 2020

Patch Package:           OTP 22.3.4
Git Tag:                 OTP-22.3.4
Date:                    2020-05-08
Trouble Report Id:       OTP-16636, OTP-16640, OTP-16641, OTP-16642
Seq num:                 ERIERL-145
System:                  OTP
Release:                 22
Application:             asn1-5.0.12, erts-10.7.2
Predecessor:             OTP 22.3.3

 Check out the git tag OTP-22.3.4, and build a full OTP system
 including documentation. Apply one or more applications from this
 build as patches to your installation using the 'otp_patch_apply'
 tool. For information on install requirements, see descriptions for
 each application version below.

 --- asn1-5.0.12 -----------------------------------------------------

 The asn1-5.0.12 application can be applied independently of other
 applications on a full OTP 22 installation.

 --- Improvements and New Features ---

  OTP-16636    Application(s): asn1
               Related Id(s): ERIERL-145

               Dialyzer warnings of type no_match are now suppressed
               in the generated files.

 Full runtime dependencies of asn1-5.0.12: erts-7.0, kernel-3.0,

 --- erts-10.7.2 -----------------------------------------------------

 Note! The erts-10.7.2 application *cannot* be applied independently
       of other applications on an arbitrary OTP 22 installation.

       On a full OTP 22 installation, also the following runtime
       dependency has to be satisfied:
       -- kernel-6.5.1 (first satisfied in OTP 22.2)

 --- Fixed Bugs and Malfunctions ---

  OTP-16640    Application(s): erts
               Related Id(s): OTP-16193

               A literal area could prematurely be released before all
               uses of it had been removed. This occurred either when
               a terminating process had a complex exit reason
               referring to a literal that concurrently was removed,
               or when a terminating process continued executing a
               dirty NIF accessing a literal (via the heap) that
               concurrently was removed.

  OTP-16641    Application(s): erts

               The VM could potentially crash when checking process
               code of a process that terminated while executing a
               dirty NIF. The checking of process code is part of a
               code purge operation.

  OTP-16642    Application(s): erts

               System tasks of low priority were not interleaved with
               normal priority system tasks as they should. This could
               potentially delay garbage collection of another process
               longer than intended if the garbage collection was
               requested from a low priority process.

 Full runtime dependencies of erts-10.7.2: kernel-6.5.1, sasl-3.3,


More information about the erlang-questions mailing list