Patch Package: OTP 28.1.1
Git Tag: OTP-28.1.1
Date: 2025-10-20
Trouble Report Id: OTP-19768, OTP-19771, OTP-19774, OTP-19780,
OTP-19790, OTP-19791, OTP-19792, OTP-19796,
OTP-19799, OTP-19806
Seq num: ERERL-1261, ERIERL-1251, ERIERL-1264,
GH-10150, GH-10191, GH-10212, GH-10217,
PR-10182, PR-10194, PR-10201, PR-10221,
PR-10241, PR-10245, PR-10248, PR-10249,
PR-10274, PR-9970
System: OTP
Release: 28
Application: diameter-2.5.2, erts-16.1.1, kernel-10.4.1,
ssl-11.4.1, xmerl-2.1.7
Predecessor: OTP 28.1
Check out the git tag OTP-28.1.1, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below.
OTP-28.1.1
Improvements and New Features
-
When building OTP, some applications may be skipped due to lacking dependencies, or due to user choice. Such skipped applications are excluded from the docs build step and a placeholder page is displayed in their stead.
Own Id: OTP-19771
Related Id(s): ERIERL-1251, PR-10194
diameter-2.5.2
The diameter-2.5.2 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
-
Added documentation about 'proxy' and 'resend' options in diameter:handle_request/3
Full runtime dependencies of diameter-2.5.2
erts-10.0, kernel-3.2, ssl-9.0, stdlib-5.0
erts-16.1.1
The erts-16.1.1 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
-
Fixed the
erl
documentation of the default timewarp mode used.Own Id: OTP-19790
Related Id(s): PR-9970 -
The
erlang:suspend_process()
BIFs failed to suspend processes currently executing on dirty schedulers.Own Id: OTP-19799
Related Id(s): PR-10241
Full runtime dependencies of erts-16.1.1
kernel-9.0, sasl-3.3, stdlib-4.1
kernel-10.4.1
The kernel-10.4.1 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
-
With this change group.erl will not crash when receiving unknown message.
Own Id: OTP-19796
Related Id(s): ERIERL-1264, PR-10248
Full runtime dependencies of kernel-10.4.1
crypto-5.0, erts-15.2.5, sasl-3.0, stdlib-6.0
ssl-11.4.1
Note! The ssl-11.4.1 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
On a full OTP 28 installation, also the following runtime
dependencies have to be satisfied:
-- crypto-5.7 (first satisfied in OTP 28.1)
-- public_key-1.18.3 (first satisfied in OTP 28.1)
Fixed Bugs and Malfunctions
-
Fixed so that sending of application data will adhere to max_fragment_length. This was broken in OTP-27 release by an optimization.
-
PR-10046 put to hard requirements on key file content. Make sure same file can be used as keyfile and certfile
Own Id: OTP-19780
Related Id(s): GH-10212, GH-10217, PR-10221 -
Assert that hello extensions are unique and send an illegal parameter alert if they are not.
Own Id: OTP-19791
Related Id(s): PR-10245 -
Avoid sending an internal message to the user process in conjunction with handling a key update.
Own Id: OTP-19806
Related Id(s): PR-10274
Full runtime dependencies of ssl-11.4.1
crypto-5.7, erts-16.0, inets-5.10.7, kernel-10.3, public_key-1.18.3, runtime_tools-1.15.1, stdlib-7.0
xmerl-2.1.7
The xmerl-2.1.7 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
-
The XSD validation failed due to not handling the optional text blocks correctly in an XSD complex type with attribute
mixed=true
.Own Id: OTP-19792
Related Id(s): PR-10249, ERERL-1261
Full runtime dependencies of xmerl-2.1.7
erts-6.0, kernel-8.4, stdlib-2.5
Thanks to
Daniel Gorin, Dmytro Lytovchenko, Jean-Philippe Jodoin