New kmod-i40e packages are now available for Red Hat Enterprise Linux 7.
The kmod-i40e packages contain the update for the Intel Fortville NIC (i40e)core driver kernel module, which adds official support for the i40e LAN adapter.The PCI IDs supported by this package are 8086:1572, 8086:1584, and 8086:1581.* This enhancement update adds the kmod-i40e packages to Red Hat EnterpriseLinux 7. (BZ#1316161)The kernel module delivered by this erratum has been made available as part ofthe Red Hat Driver Update Program, which provides updated kernel modules thatadd support for selected devices in advance of the next Red Hat Enterprise Linuxminor update release.We strongly recommend that these kernel modules are only used when it isnecessary to enable the specific hardware mentioned in this erratum. Partnersand customers should continue to use the driver that is shipped in the latestRed Hat Enterprise Linux kernel for all other devices that require this driver.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
i40e-1.3.21_k-1.el7_2.src.rpm
    MD5: b07cb65943f0c1e55e8e32bb36ab9f50SHA-256: f6027c381bc21280d60cf03ef78467678975f3f0dd2d4613c020c497c8e4ddd8
 
x86_64:
i40e-debuginfo-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 568a388a6dded908063ad6045fac2255SHA-256: 83444b7b894e81384fec49c73a9719b92583362a05cbedf50d3a6b8d2a63ce5d
kmod-i40e-1.3.21_k-1.el7_2.x86_64.rpm
    MD5: 301497fc49ebb3899533668d59afa3c7SHA-256: 8814a1f08fcd0b5118ff99a58a0674bc8e0ecfb3835748f98827210b0387f5d7
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: