Intel® Network Adapter Linux* Virtual Function Driver for Intel® Ethernet Controller 700 and E810 Series

18159
8/23/2024

Introduction

This release includes iavf Linux* Virtual Function Drivers for Intel® Ethernet Network devices based on 700 and E810 Series controllers.

Available Downloads

  • Linux*
  • Size: 421.3 KB
  • SHA256: F1E3EC7A67E8DE1DB2A3D222AB2C3466D2AB635B85B787A506E5385F68BB844E
  • Linux*
  • Size: 13.5 MB
  • SHA256: DF17BA842B92BB2494B71AE0FCF2161F7963BB3EA04805EC1E2946D775F0B549
  • Linux*
  • Size: 1 KB
  • SHA256: 7D365053114D39FA3E640EF06387A2A3CF6B7E3F0BDB845A37BB103993C7E32B

Detailed Description

Overview

This release includes iavf Linux* Virtual Function Drivers for Intel® Ethernet Network Connections.

 

The iavf driver supports devices based on the following controllers:

  • Intel® Ethernet Controller E810-C
  • Intel® Ethernet Controller E810-XXV
  • Intel® Ethernet Connection E822-C
  • Intel® Ethernet Connection E822-L
  • Intel® Ethernet Connection E823-C
  • Intel® Ethernet Connection E823-L
  • Intel® Ethernet Controller I710
  • Intel® Ethernet Controller X710
  • Intel® Ethernet Controller XL710
  • Intel® Ethernet Network Connection X722
  • Intel® Ethernet Controller XXV710
  • Intel® Ethernet Controller V710

 

iavf-x.x.x.tar.gz

 

Due to the continuous development of the Linux kernel, the drivers are updated more often than the bundled releases. The latest driver can be found on http://e1000.sourceforge.net (and also on http://downloadcenter.intel.com).

 

This release includes RPM packages that contain:

  • Driver signed with Intel's private key in precompiled kernel module form
  • Complete source code for above driver
  • Intel's public key

 

This release includes the Intel public key to allow you to authenticate the signed driver in secure boot mode. To authenticate the signed driver, you must place Intel's public key in the UEFI Secure Boot key database.

 

If you decide to recompile the .ko module from the provided source files, the new .ko module will not be signed with any key. To use this .ko module in Secure Boot mode, you must sign it yourself with your own private key and add your public key to the UEFI Secure Boot key database.

 

The driver kernel module for a specific kernel version can be used with errata kernels within the same minor OS version, unless the errata kernel broke kABI. Whenever you update your kernel with an errata kernel, you must reinstall the driver RPM package.

This download is valid for the product(s) listed below.