Intel® Network Adapter Virtual Function Driver for Intel® 10 Gigabit Ethernet Network Connections

15622
8/23/2024

Introduction

Provides the ixgbevf driver version 4.20.5 for Intel® 10 Gigabit Ethernet Network Connection virtual function devices.

Available Downloads

  • Linux*
  • Size: 290.3 KB
  • SHA256: 54CE4D336847F26F324263B9546BA1712CF92BAA123635294F16FBCB6038029D
  • Linux*
  • Size: 4 MB
  • SHA256: 0A2CFA9E2BCCAD5A34294830FC193000CB1E0684BEC90A0BBF9167630713B021
  • Linux*
  • Size: 1 KB
  • SHA256: 5D967623F9763D2CFD6622107C2A881FBE9D94755F4F6AF968A306BE10631345

Detailed Description

Overview

This release includes ixgbe Linux* Base Drivers for Intel® Ethernet Network Connections.

 

The ixgbe driver supports devices based on the following controllers:

  • Intel® Ethernet Controller 82598
  • Intel® Ethernet Controller 82599
  • Intel® Ethernet Controller X520
  • Intel® Ethernet Controller X540
  • Intel® Ethernet Controller x550
  • Intel® Ethernet Controller X552
  • Intel® Ethernet Controller X553

 

- The ixgbevf driver can only be activated on kernels that support SR-IOV. It supports all of the above devices except for the Intel(R) Ethernet Controller 82598.

 

ixgbe-x.x.x.tar.gz

ixgbevf-x.x.x.tar.gz

 

Due to the continuous development of the Linux kernel, the drivers are updated more often than the bundled releases. The latest driver can be found on http://e1000.sourceforge.net (and also on http://downloadcenter.intel.com).

 

This release includes RPM packages that contain:

  • Driver signed with Intel's private key in precompiled kernel module form
  • Complete source code for above driver
  • Intel's public key

 

This release includes the Intel public key to allow you to authenticate the signed driver in secure boot mode. To authenticate the signed driver, you must place Intel's public key in the UEFI Secure Boot key database.

 

If you decide to recompile the .ko module from the provided source files, the new .ko module will not be signed with any key. To use this .ko module in Secure Boot mode, you must sign it yourself with your own private key and add your public key to the UEFI Secure Boot key database.

 

The driver kernel module for a specific kernel version can be used with errata kernels within the same minor OS version, unless the errata kernel broke kABI. Whenever you update your kernel with an errata kernel, you must reinstall the driver RPM package.