From nobody Wed Feb 14 21:23:42 2024 X-Original-To: wireless@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZrm25xKQz53RjB for ; Wed, 14 Feb 2024 21:23:46 +0000 (UTC) (envelope-from bz@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZrm2520mz40Ct; Wed, 14 Feb 2024 21:23:46 +0000 (UTC) (envelope-from bz@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707945826; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Ga2yXcSUu9xvRlbT4nmuoj1gsZ3jt/53zVOojQyF/Nk=; b=Qm3rTkjTFHs4DVNc5WyI+xtJ3G7bLExYF535aacZywe4tWmtsIF9QJMaE62Lsw805FlPyu O9+jm4vta1+ei6O6eI2tiXG2vYAToRiYW54dgumid8zgCCDx1eBK8cuZMqH9gcDPNzo8r3 k5PDOOXE3KDFPb5LXjQyjk8tMXkrUt7S1J2Sf7+k/2pjrPzbTXq0DEGinUFvKyStw9X3qH +06NSxtkLq2Z28D3Alwo9Pb9QoN2FF8CHUYFN9sdt1oxP1YFtRx9A47THLDM/2S0n0telV 1fm56EDMBjcvvgacaqlOkc1ExVxWru9gR0zjQ/iVUgmqz2s8vU3e/XsP3EeTEg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707945826; a=rsa-sha256; cv=none; b=EkyGK1sy26BZQDAQUqkZM6MDmzOuRrFjIbiydNtZAXLQhGEsqgcYZeXB1KbZfnCED10+aV YeSgRJoXZpxMLhYUMKz8GmY0fgKd2evxJVZpwH9yfaWUGaHOBE+eYQn500cdCmltzAqVeJ jE9NmNtBdv5IkOOMuBNK7HP0IN84EfDyx2Ne1roYDp/BnjFO/JatRYaGTwwrtBt4oYBs+K P7H4d0nF9Y6QkBgUfNGwppJYsFt3AWH/xP4ksZuyb0ojUIHnJ7RAj1xAJQ/1fhHDVh2h0D gVMFL+118QHZZi26SmEPZMyA/SGJ9aeQhrZKs660Kincq4S1uoMULove1wZuFA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707945826; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Ga2yXcSUu9xvRlbT4nmuoj1gsZ3jt/53zVOojQyF/Nk=; b=ETLRpduaM+PbABluoDWP7DCdqJHYfdpzV1aAcBkBHfJAikMIUK0KUA9t2DtTiHlh5SGjuz Byeby3KJuugmbG8TwqlHJzL53yPcn7D7m9wcmba+6YYnEYI1qsjHYM+98vmYtUWZIX9bTN xbUWDX4K37MltbCh7blXYSeezTsZ2acqFWckLrukfamiIBd/vAuXdCdcTT5Q3hxnvSb9hb Z0r06fcSwJgqBNfHLNoeFwEQpnuneqI1B/NDMBb/W7Wys/IxuR9SstyQ+lPchaNQnsyiEC YX9PVRv6RkUB0uG5Y6UQwGphggqh8vb2RbmtR4kMLF4MZhBp729uqIiuygclWw== Received: from mx1.sbone.de (cross.sbone.de [195.201.62.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE Root Certificate Authority" (not verified)) (Authenticated sender: bz/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TZrm23PyqzWLF; Wed, 14 Feb 2024 21:23:46 +0000 (UTC) (envelope-from bz@freebsd.org) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:1025]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id A60AB8D4A214; Wed, 14 Feb 2024 21:23:44 +0000 (UTC) Received: from content-filter.t4-02.sbone.de (content-filter.t4-02.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:2742]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id D81AC2D029D7; Wed, 14 Feb 2024 21:23:43 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:4902:0:7404:2:1025]) by content-filter.t4-02.sbone.de (content-filter.t4-02.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:2742]) (amavisd-new, port 10024) with ESMTP id 1KouF4aQI2w6; Wed, 14 Feb 2024 21:23:42 +0000 (UTC) Received: from strong-iwl0.sbone.de (strong-iwl0.sbone.de [IPv6:fde9:577b:c1a9:4902:b66b:fcff:fef3:e3d2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id C36602D029D2; Wed, 14 Feb 2024 21:23:42 +0000 (UTC) Date: Wed, 14 Feb 2024 21:23:42 +0000 (UTC) From: "Bjoern A. Zeeb" To: Chris cc: FreeBSD wireless mailing list Subject: Re: PLEASE TEST (all drivers) sta/ap mode In-Reply-To: <51a52c8d46a781aa29496618d4b9b264@bsdforge.com> Message-ID: References: <51a52c8d46a781aa29496618d4b9b264@bsdforge.com> X-OpenPGP-Key-Id: 0x14003F198FEFA3E77207EE8D2B58B8F83CCF1842 List-Id: Discussions List-Archive: https://lists.freebsd.org/archives/freebsd-wireless List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-wireless@freebsd.org X-BeenThere: freebsd-wireless@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed On Wed, 14 Feb 2024, Chris wrote: > On 2024-02-14 11:53, Bjoern A. Zeeb wrote: >> Hi, >> >> can I ask everyone who has a spare cycle to test main on/after >> 0936c648ad0ee5152dc19f261e77fe9c1833fe05 (commit went in a minute ago). > Will a freebsd-update install fetch any of these changes? Or will this > require > building from src on or after 0936c648ad0ee5152dc19f261e77fe9c1833fe05? There is no freebsd-update support for main (CURRENT) to my best knowledge, so you would have to do this from git. If you are not on main (CURRENT) then for 14 and 13 you'd probably also have to do this from git; for the upcoming 13.3 I would hope that by RC1 the changes will have made it there (likely to miss BETA3). -- Bjoern A. Zeeb r15:7