From nobody Sat Sep 30 08:30:38 2023 X-Original-To: wireless@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RyL5G711Xz4vn7q for ; Sat, 30 Sep 2023 08:30:42 +0000 (UTC) (envelope-from bz@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RyL5G6TcVz3J1W for ; Sat, 30 Sep 2023 08:30:42 +0000 (UTC) (envelope-from bz@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1696062642; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=MBozfwWxbbxpH8fk+YPQ3YLMpRcWONAcZciYztDB0/8=; b=COL54JC6HzoGeoH1DJdGHQvi88IBrWXbkalJieAphsp0a4cFmqSEorou8EhR/C0ACqPIgb AU+SQhknuENGSUide8m2W2iOVzBdy2og9ouGmwWu9agPGTsLQxpAOP4Xz7i9gSJpNKbcb7 O3wohmmD6gh4AzgEYBvN0BzXLY8+K/nnU3Bc3+1cCBFSP8Oykei9XfVmN+d4opjM3Zi5LK fqbrwpISjsuFwRlvaxHpzyzxsN6yYefrhhsojVQk3ScbUVSsffpgPya4WAtHWNlvEZSUvo MxCstmVdu4owIYycskop9Cpr+pOb+CrKwN//HhClHu3fmcNgiZjbCOYQLgDLJA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1696062642; a=rsa-sha256; cv=none; b=og3+oBLeAltclSruBW6fiXslUFzZPJYnWNI/q69TQxfAcf4c3iN1+HPEmDGDozCa2+xNdH h6hNV0Vt9jJp3rZ+cWf5EbUAdsuSewMu2otDxC71ExeONHQIhfyE/L/JylHXaO2DuZiqz5 8V500KqL/zaXhpBuYTi/mbRl/8uj9HTN6avrLSe1JptktbVGhWhylC7pOH3NtFOOp3B3aI xYQ6Q3HMFWRoNnIDcpkG8LApd0nDPU6y+oHVMTALRLyXUk35zzs8c7SGQZIBabZufgdx1P z2O8+cgRxQKTc8CWAlDl28eomzsaYncaVu07BGn++tSYxkyqaywQyOnAKkM4Ng== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1696062642; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=MBozfwWxbbxpH8fk+YPQ3YLMpRcWONAcZciYztDB0/8=; b=gLoupfHULiJKQSz2Yj4Ps56BJDyjEmGnVi/MXybjxMUO3EPe8/Khof2QnLCYZO2EVlLwdZ 9YJvXrMl2xEvji7q2+Ku++rjq77QEgH2dsj0C+POrVyIvlkXXWUN8Vi3AmfPLd2O1jlwPC 7uQkWo8xLa7uW0L/E3Q9ABGpHgPQHk/RqrJXRy0l/JtVFcvLg0hA2RLWEkeKf5k6RQWcvO /8sbR2XyvgrONE55GnXuofbbLyXfFEue5O6v9JeJXeXSYWhrXokzdfcO4NSpVmsnG1lZwV EO6Jq0PUxcQu1MlgABD/2bSJ0z+zBYrIeAzW5lh7JUY0VeT8G3CP/o2lQ1AXqQ== Received: from mx1.sbone.de (mx1.sbone.de [IPv6:2a01:4f8:13b:39f::9f:25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE Root Certificate Authority" (not verified)) (Authenticated sender: bz/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4RyL5G4pMnz1RrX for ; Sat, 30 Sep 2023 08:30:42 +0000 (UTC) (envelope-from bz@FreeBSD.org) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:1025]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id 542778D4A175 for ; Sat, 30 Sep 2023 08:30:41 +0000 (UTC) Received: from content-filter.t4-02.sbone.de (content-filter.t4-02.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:2742]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id A9FAC2D029D2 for ; Sat, 30 Sep 2023 08:30:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:4902:0:7404:2:1025]) by content-filter.t4-02.sbone.de (content-filter.t4-02.sbone.de [IPv6:fde9:577b:c1a9:4902:0:7404:2:2742]) (amavisd-new, port 10024) with ESMTP id 0l1T67950dPH for ; Sat, 30 Sep 2023 08:30:39 +0000 (UTC) Received: from strong-aiccu0.sbone.de (strong-aiccu0.sbone.de [IPv6:fde9:577b:c1a9:f491::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 5E9172D029D1 for ; Sat, 30 Sep 2023 08:30:39 +0000 (UTC) Date: Sat, 30 Sep 2023 08:30:38 +0000 (UTC) From: "Bjoern A. Zeeb" To: FreeBSD wireless mailing list Subject: iwlwifi (main) please test now - is your firmware crash gone? Message-ID: X-OpenPGP-Key-Id: 0x14003F198FEFA3E77207EE8D2B58B8F83CCF1842 List-Id: Discussions List-Archive: https://lists.freebsd.org/archives/freebsd-wireless List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-wireless@freebsd.org X-BeenThere: freebsd-wireless@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset=US-ASCII Hi, I just pushed URL: https://cgit.FreeBSD.org/src/commit/?id=16e688b2a403a3dbc05de3b9f8a3132838613790 LinuxKPI: 802.11: fix problem removing sta into main. Anyone on main, can you please test that the annoying firmware crash is gone (or rather things at least improved). I've been running a service netif restart wlan0 / service wpa_supplicant restart wlan0 in a loop over the morning and not hit the fw crash myself anymore. There is at least one more bug lingering (likely currently mitigated by other code; I have a local assert which got triggered once in the above testing loop)) which I'll try to sort out the next 48 hours but any testing now will be highly appreciated also for the upcoming 14.0-R. If I can get any positive feedback I'll feel more at ease merging it all to stable/14 and stable/13. /bz -- Bjoern A. Zeeb r15:7