Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 559333 - e1000e: wol is broken on 2.6.18-185.el5 [rhel-5.2.z]
e1000e: wol is broken on 2.6.18-185.el5 [rhel-5.2.z]
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel (Show other bugs)
5.5
All Linux
high Severity medium
: rc
: ---
Assigned To: Andy Gospodarek
Red Hat Kernel QE team
: ZStream
Depends On: 557974
Blocks:
  Show dependency treegraph
 
Reported: 2010-01-27 14:25 EST by RHEL Product and Program Management
Modified: 2014-06-29 19:01 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-03-16 23:18:49 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
rhel52z-e1000e-wol.patch (3.60 KB, patch)
2010-02-09 15:32 EST, Andy Gospodarek
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0148 normal SHIPPED_LIVE Important: kernel security and bug fix update 2010-03-16 23:18:17 EDT

  None (edit)
Description RHEL Product and Program Management 2010-01-27 14:25:37 EST
This bug has been copied from bug #557974 and has been proposed
to be backported to 5.2 z-stream (EUS).
Comment 3 Andy Gospodarek 2010-01-28 13:08:28 EST
It looks like we will need to add the flags2 member to e1000e for 5.2.z.
Comment 4 Andy Gospodarek 2010-02-09 15:32:01 EST
Created attachment 389840 [details]
rhel52z-e1000e-wol.patch

This patch should be tested in a system in beaker that contains one of the following PCI IDs.  I do not have a card locally, so I cannot verify this patch:


#define E1000_DEV_ID_82571EB_COPPER             0x105E
#define E1000_DEV_ID_82571EB_FIBER              0x105F
#define E1000_DEV_ID_82571EB_SERDES             0x1060
#define E1000_DEV_ID_82571EB_QUAD_COPPER        0x10A4
#define E1000_DEV_ID_82571PT_QUAD_COPPER        0x10D5
#define E1000_DEV_ID_82571EB_QUAD_FIBER         0x10A5
#define E1000_DEV_ID_82571EB_QUAD_COPPER_LP     0x10BC
#define E1000_DEV_ID_82571EB_SERDES_DUAL        0x10D9
#define E1000_DEV_ID_82571EB_SERDES_QUAD        0x10DA
#define E1000_DEV_ID_82572EI_COPPER             0x107D
#define E1000_DEV_ID_82572EI_FIBER              0x107E
#define E1000_DEV_ID_82572EI_SERDES             0x107F
#define E1000_DEV_ID_82572EI                    0x10B9
#define E1000_DEV_ID_82573E                     0x108B
#define E1000_DEV_ID_82573E_IAMT                0x108C
#define E1000_DEV_ID_82573L                     0x109A

#define E1000_DEV_ID_80003ES2LAN_COPPER_DPT     0x1096
#define E1000_DEV_ID_80003ES2LAN_SERDES_DPT     0x1098
#define E1000_DEV_ID_80003ES2LAN_COPPER_SPT     0x10BA
#define E1000_DEV_ID_80003ES2LAN_SERDES_SPT     0x10BB

#define E1000_DEV_ID_ICH8_IGP_M_AMT             0x1049
#define E1000_DEV_ID_ICH8_IGP_AMT               0x104A
#define E1000_DEV_ID_ICH8_IGP_C                 0x104B
#define E1000_DEV_ID_ICH8_IFE                   0x104C
#define E1000_DEV_ID_ICH8_IFE_GT                0x10C4
#define E1000_DEV_ID_ICH8_IFE_G                 0x10C5
#define E1000_DEV_ID_ICH8_IGP_M                 0x104D
#define E1000_DEV_ID_ICH9_IGP_AMT               0x10BD
#define E1000_DEV_ID_ICH9_IGP_C                 0x294C
#define E1000_DEV_ID_ICH9_IFE                   0x10C0
#define E1000_DEV_ID_ICH9_IFE_GT                0x10C3
#define E1000_DEV_ID_ICH9_IFE_G                 0x10C2
Comment 7 Andy Gospodarek 2010-02-09 19:04:20 EST
verified the patch attached in comment #4 resolves the issue.
Comment 9 Jiri Pirko 2010-03-01 10:57:51 EST
in 2.6.18-92.1.36.el5
Comment 13 errata-xmlrpc 2010-03-16 23:18:49 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2010-0148.html

Note You need to log in before you can comment on or make changes to this bug.