Introduction
This download record includes the ice Linux* Base Driver version 2.3.10 for the 800 series devices.
Available Downloads
- Linux*
- Size: 1.5 MB
- SHA256: F9360781D06657D4C8F35DC3FDBACF4E13C78077E676CCB9824DFF93C4BD1A5F
- Linux*
- Size: 10.5 MB
- SHA256: 6B2B9A643D5BC6C634728B11E9986A564603A53727332FB965F3CEF5786B1908
- Linux*
- Size: 1 KB
- SHA256: 537511DD132859094A8253576C1BBE6F178D097E8A9605B2B7778AFD70A3A8F9
Detailed Description
Overview
This release includes the ice Linux* Base Driver for Intel® Ethernet Network Connections.
The ice driver supports devices based on the following controllers:
- Intel® Ethernet Controller E810-C
- Intel® Ethernet Controller E810-XXV
- Intel® Ethernet Connection E822-C
- Intel® Ethernet Connection E822-L
- Intel® Ethernet Connection E823-C
- Intel® Ethernet Connection E823-L
- Intel® Ethernet Connection E825-C
- Intel® Ethernet Controller E830
ice-x.x.x.tar.gz
Due to the continuous development of the Linux kernel, the drivers are updated more often than the bundled releases. The latest driver can be found at the following locations:
- http://downloadcenter.intel.com
- https://github.com/intel/ethernet-linux-ice
This release includes RPM packages that contain:
- Device driver signed with Intel's private key in precompiled kernel module form
- RDMA driver
- Complete source code for the drivers above
- Intel's public key
This release includes the Intel public key to allow you to authenticate the signed driver in secure boot mode. To authenticate the signed driver, you must place Intel's public key in the UEFI Secure Boot key database.
Note:
- The driver kernel module for a specific kernel version can be used with errata kernels within the same minor OS version, unless the errata kernel broke kABI. Whenever you update your kernel with an errata kernel, you must reinstall the driver RPM package.
- The RDMA driver will be installed if you reinstall the driver RPM package. If you want to remove the RDMA driver, you will have to do so every time you install the RPM package (for example, when you update your kernel with an errata kernel).
- If you decide to recompile the .ko module from the provided source files, the new .ko module will not be signed with any key. To use this .ko module in Secure Boot mode, you must sign it yourself with your own private key and add your public key to the UEFI Secure Boot key database.
Disclaimers1
Product and Performance Information
Intel is in the process of removing non-inclusive language from our current documentation, user interfaces, and code. Please note that retroactive changes are not always possible, and some non-inclusive language may remain in older documentation, user interfaces, and code.