From owner-freebsd-questions@FreeBSD.ORG Sat Jun 7 22:04:17 2014 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 13C1D49B for ; Sat, 7 Jun 2014 22:04:17 +0000 (UTC) Received: from zoom.lafn.org (zoom.lafn.org [108.92.93.123]) by mx1.freebsd.org (Postfix) with ESMTP id E06C626FE for ; Sat, 7 Jun 2014 22:04:16 +0000 (UTC) Received: from [10.0.1.2] (static-71-177-216-148.lsanca.fios.verizon.net [71.177.216.148]) (authenticated bits=0) by zoom.lafn.org (8.14.7/8.14.7) with ESMTP id s57Ls2Or084508 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Sat, 7 Jun 2014 14:54:03 -0700 (PDT) (envelope-from bc979@lafn.org) From: Doug Hardie Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Subject: PRs included in release Message-Id: <7CE03CDF-5D07-4493-9836-233E45774D6B@lafn.org> Date: Sat, 7 Jun 2014 14:54:00 -0700 To: "freebsd-questions@FreeBSD.org Questions" Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) X-Mailer: Apple Mail (2.1510) X-Virus-Scanned: clamav-milter 0.98 at zoom.lafn.org X-Virus-Status: Clean X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 07 Jun 2014 22:04:17 -0000 I encountered what I thought was an unusual situation, although it just = may be that I don't understand something. I have a system that was = originally installed 9.2 Release. It wouldn't find the NIC and hence = couldn't work. Someone here told me I needed to get the patches from a = couple PRs and install them and the NIC would work. This was about a = year ago. As they indicated, those patches fixed the problem and the = system has worked properly ever since. However, there are a number of security fixes that have been issued for = 9.0 and I was really hesitant to upgrade (freebsd-update) as I suspected = that there would be an issue with those patches not being included. = Anyway, I decided to try the update and sure enough on reboot the NIC = didn't get recognized or configured. Fortunately freebsd-update include = a very handy rollback function that does exactly what I expected. I was = down for only a few minutes. The question then becomes how do I know if the patches for a specific PR = are included in a security release? I am guessing that those patches = will be included in 9.3, but I would like some way to check before = attempting an update. Most of my systems do not have the system source = as I try to use generic kernels wherever possible. Freebsd-update is = much more convenient than a complete system rebuild.