Intel® Network Adapter Driver for PCIe* 40 Gigabit Ethernet Network Connections under Linux*

18026
8/7/2023

Introduction

This download record includes the i40e Linux* base driver version 2.23.17 for the 700 series devices.

Available Downloads

  • Linux*
  • Size: 693.4 KB
  • SHA1: 57904A541212174C20BACFBF109401C19C59C25C
  • Linux*
  • Size: 1 KB
  • SHA1: 2E9D38935FFA21B0F0D5C20607935EA97304D06D
  • Linux*
  • Size: 985.1 KB
  • SHA1: 3F307DB7AF36D33B31FF57DBFB02947336152D83
  • Linux*
  • Size: 980.1 KB
  • SHA1: DA563E804FADE6B67E603B6D7212683096CDB4E9
  • Linux*
  • Size: 1,018.1 KB
  • SHA1: 2E3363B5071B89C3B605554001FFB7D5ECDCF654
  • Linux*
  • Size: 1,015.1 KB
  • SHA1: C9093B7734971F359CE82F15CAB94D74B9DF1FD1
  • SUSE Linux Family*, Linux*
  • Size: 1.6 MB
  • SHA1: 95DF293F4980735FECF8649BB97F7B6171347142

Detailed Description

Overview

This release includes i40e Linux* Base Drivers for Intel® Ethernet Network Connections.

 

The i40e driver supports devices based on the following controllers:

Intel® Ethernet Controller I710

Intel® Ethernet Controller X710

Intel® Ethernet Controller XL710

Intel® Ethernet Network Connection X722

Intel® Ethernet Controller XXV710

Intel® Ethernet Controller V710

 

i40e-x.x.x.tar.gz

 

Due to the continuous development of the Linux kernel, the drivers are updated more often than the bundled releases. The latest driver can be found on http://e1000.sourceforge.net (and also on http://downloadcenter.intel.com).

 

This release includes RPM packages that contain:

Driver signed with Intel's private key in precompiled kernel module form

Complete source code for above driver

Intel's public key

 

This release includes the Intel public key to allow you to authenticate the signed driver in secure boot mode. To authenticate the signed driver, you must place Intel's public key in the UEFI Secure Boot key database.

 

If you decide to recompile the .ko module from the provided source files, the new .ko module will not be signed with any key. To use this .ko module in Secure Boot mode, you must sign it yourself with your own private key and add your public key to the UEFI Secure Boot key database.

 

The driver kernel module for a specific kernel version can be used with errata kernels within the same minor OS version, unless the errata kernel broke kABI. Whenever you update your kernel with an errata kernel, you must reinstall the driver RPM package.