Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
* rickard/dist-map-gc-fix/OTP-13889:
Fix crash due to heap fragments left after GC
|
|
Do not decode distribution messages as part of the GC operation.
Distribution messages containing maps may generate heap fragments.
|
|
|
|
|
|
* lukas/kernel/os_cmd_fix_exit_message_leak/OTP-13813:
erts: Make sure to flush potential exit message
|
|
|
|
|
|
|
|
* rickard/erl-crash-dump-bug/OTP-13799:
Avoid segfault when printing slogan after crashdumping
|
|
* rickard/proc-tmo-bug/OTP-13798:
Fix race causing lost wakeup on receive-after timeout
|
|
|
|
|
|
|
|
|
|
* lukas/kernel/fix_os_cmd_background_compat/OTP-13741:
kernel: Use ^D as eot for os:cmd on unix platforms
|
|
* raimo/ssl/version-selection/maint-19/OTP-13753:
Improve version selection
|
|
* ingela/inets/mod_esi-handle-PUT-DELETE/OTP-13688:
inets: Prepare for release
inets: Fix typo in doc
inets: Add mod_esi test for PUT
inets: Unify mod_esi "PUT" callback input
inets: Add mod_esi support for PUT AND DELETE
|
|
This is needed as doing only an 'exit' will only exit the
program, but any children started in the program that have
stdout/stderr still open will keep the port open until they
terminate. i.e.
os:cmd("while true; do echo sleep 1; sleep 1; done&").
would block os:cmd forever because the while loop keeps its copies
of stdout/stderr open forever.
It could be argued that this is correct behaviour, and it is
the way it works on windows, but changing this breaks backwards
compatability for os:cmd which is not acceptable.
|
|
|
|
|
|
|
|
Change it to { Input :: string() | undefined, Body :: string() }
|
|
|
|
raimo/ssl/version-selection/maint-19/OTP-13753
Conflicts:
lib/ssl/vsn.mk
lib/ssl/src/ssl.appup.src
|
|
Use the list of versions that the server allows and among those choose
the highest version that is not higher than the client's version.
Note that this chosen version might be lower than the client's version,
but is used to improve interoperability.
Patch suggested by Dimitry Borisov refering to RFC 5246 appendix E.1.
|
|
|
|
|
|
maint-19
* egil/compiler/fix-literal-binary-match/ERL-190/OTP-13738:
Update primary bootstrap
Revert "beam_dead: Improve optimization of literal binary matching"
compiler: Test literal binary matching
|
|
* sverker/update_counter-deadlock/ERL-188/OTP-13731:
erts: Add test ets_SUITE:update_counter_table_growth
erts: Fix deadlock in ets:update_counter/4
erts: Optimize db_finalize_dbterm_hash
|
|
* sverker/bsl-gc-overflow/OTP-13732:
erts: Fix GC overrun bug in 'bsl' op with small Op1
|
|
* hasse/stdlib/fix_shell_records/ERL-182/OTP-13719:
stdlib: Correct a bug regarding records in the shell
|
|
|
|
This reverts commit 105c5b0071056dc062797e58772e098d2a3a4627.
|
|
The following regression was introduced in 19.0:
foo(bar, <<"x">>) -> 1;
foo(_, <<"x">>) -> 2;
foo(_, <<"y">>) -> 3;
foo(_, _) -> fail.
The call foo(bar,<<"y">>) would errorneous return 'fail' instead of 3.
A testcase in match_SUITE has been added to verify this.
|
|
|
|
in 'set' with 'write_concurrency'
when inserting default object causes table to grow
and the bucket to split is protected by same lock as the key.
|
|
Always free term after WUNLOCK_HASH
|
|
Symptom: VM abort "Overrun stack and heap"
Problem: The temporary bignum created in buffer tmp_big[] will be
part of the GC initiated by TestHeapPreserve, but its size is not
included which can cause the GC to overflow if very unlucky.
Solution: Do not include tmp_big in the GC.
|
|
See also ERL-182.
|
|
|
|
|
|
|
|
* rickard/set-gl-fix/OTP-13716:
Fix group_leader/2
|
|
* hans/ssh/ssh_patches/OTP-13715:
ssh: Update ssh version
ssh: Remove possible hanging in TCs when server and client is on the same node
ssh: added dbg keys to ssh:connection_info/2 and ssh:channel_info/3
ssh: Extend experimental ssh_dbg.erl
ssh: remove 'sync sleeps'
|
|
* hans/ssh/retry_passwd_patch/OTP-13674:
ssh: update vsn.mk
ssh: polishing of password prompt's linefeed
ssh: Fix a hazard bug in ssh_auth
ssh: Some code cuddling in ssh_io
ssh: Fix type error in args of ssh_auth:sort_selected_mthds
ssh: Make client send a faulty pwd only once, ssh_connection_handler part
ssh: Make client send a faulty pwd only once, ssh_auth part
ssh: test cases for no repetition of bad passwords
|
|
* hans/inets/ftp_debug_printout/OTP-13712:
inets: updated version
inets: unused var in ftp.erl anonymized
inets: ftp debug printout removed
|
|
* hasse/tools/fix_xref/ERL-173/OTP-13708:
tools: Fix a bug adding multiple modules to an Xref server
|