Intel® Network Adapter Linux* Virtual Function Driver for Intel® Ethernet Controller 700 and E810 Series



This release includes iavf Linux* Virtual Function Drivers for Intel® Ethernet Network devices based on 700 and E810 Series controllers.

Available Downloads

  • Linux*
  • Size: 1 KB
  • SHA1: C0FEA968FA85E271E2116E6BFDEA7C2B639CC295
  • Linux*
  • Size: 359.7 KB
  • SHA1: FCC997AEBEEE3744E621E0FD3290205BD18F6A45
  • Linux*
  • Size: 467.4 KB
  • SHA1: FE93B6B23F7DB2BC1C8E33E4CF66FDE9FBBE0895
  • Linux*
  • Size: 455.6 KB
  • SHA1: CFFCA5F52D8B554382912ED2B7146E0EE8A2F004
  • Linux*
  • Size: 382.3 KB
  • SHA1: D68213DA8F28A396A57FC949416114DF650B36EB

Detailed Description


This release includes iavf Linux* Virtual Function Drivers for Intel® Ethernet Network Connections.

The iavf driver supports devices based on the following controllers:

  • Intel® Ethernet Controller E810-C
  • Intel® Ethernet Controller E810-XXV
  • Intel® Ethernet Connection E822-C
  • Intel® Ethernet Connection E822-L
  • Intel® Ethernet Connection E823-C
  • Intel® Ethernet Connection E823-L
  • Intel® Ethernet Controller I710
  • Intel® Ethernet Controller X710
  • Intel® Ethernet Controller XL710
  • Intel® Ethernet Network Connection X722
  • Intel® Ethernet Controller XXV710
  • Intel® Ethernet Controller V710


Due to the continuous development of the Linux kernel, the drivers are updated more often than the bundled releases. The latest driver can be found on (and also on

This release includes RPM packages that contain:

  • Driver signed with Intel's private key in precompiled kernel module form
  • Complete source code for above driver
  • Intel's public key

This release includes the Intel public key to allow you to authenticate the signed driver in secure boot mode. To authenticate the signed driver, you must place Intel's public key in the UEFI Secure Boot key database.

If you decide to recompile the .ko module from the provided source files, the new .ko module will not be signed with any key. To use this .ko module in Secure Boot mode, you must sign it yourself with your own private key and add your public key to the UEFI Secure Boot key database.

The driver kernel module for a specific kernel version can be used with errata kernels within the same minor OS version, unless the errata kernel broke kABI. Whenever you update your kernel with an errata kernel, you must reinstall the driver RPM package.

This download is valid for the product(s) listed below.

Product and Performance Information


Intel is in the process of removing non-inclusive language from our current documentation, user interfaces, and code. Please note that retroactive changes are not always possible, and some non-inclusive language may remain in older documentation, user interfaces, and code.