Comment 4 for bug 2004145

Revision history for this message
James Wynn (jameswynn) wrote (last edit ):

Oh, I found how to see if it's a virtio network interface. Both eth0 (public IP) and eth1 (VPC) are virtio interfaces.

# lshw -C net
  *-network:0
       description: Ethernet controller
       product: Virtio network device
       vendor: Red Hat, Inc.
       physical id: 3
       bus info: pci@0000:00:03.0
       version: 00
       width: 64 bits
       clock: 33MHz
       capabilities: msix bus_master cap_list
       configuration: driver=virtio-pci latency=0
       resources: irq:10 ioport:c1c0(size=32) memory:fd012000-fd012fff memory:febe8000-febebfff
     *-virtio0
          description: Ethernet interface
          physical id: 0
          bus info: virtio@0
          logical name: eth0
          serial: de:bc:2c:65:xx:xx
          capabilities: ethernet physical
          configuration: autonegotiation=off broadcast=yes driver=virtio_net driverversion=1.0.0 ip=x.x.x.x link=yes multicast=yes

  *-network:1
       description: Ethernet controller
       product: Virtio network device
       vendor: Red Hat, Inc.
       physical id: 4
       bus info: pci@0000:00:04.0
       version: 00
       width: 64 bits
       clock: 33MHz
       capabilities: msix bus_master cap_list
       configuration: driver=virtio-pci latency=0
       resources: irq:11 ioport:c1e0(size=32) memory:fd013000-fd013fff memory:febec000-febeffff
     *-virtio1
          description: Ethernet interface
          physical id: 0
          bus info: virtio@1
          logical name: eth1
          serial: 2a:5c:f8:73:xx:xx
          capabilities: ethernet physical
          configuration: autonegotiation=off broadcast=yes driver=virtio_net driverversion=1.0.0 ip=10.x.x.x link=yes multicast=yes
--------------------

Here's some other information if it helps.

# lscpu
Architecture: x86_64
  CPU op-mode(s): 32-bit, 64-bit
  Address sizes: 40 bits physical, 48 bits virtual
  Byte Order: Little Endian
CPU(s): 1
  On-line CPU(s) list: 0
Vendor ID: GenuineIntel
  Model name: DO-Regular
    CPU family: 6
    Model: 63
    Thread(s) per core: 1
    Core(s) per socket: 1
    Socket(s): 1
    Stepping: 2
    BogoMIPS: 4589.21
    Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx rdtscp lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq vmx ssse3 fma cx16 pcid sse4_1 sse4_
                         2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm cpuid_fault invpcid_single pti ssbd ibrs ibpb tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invp
                         cid xsaveopt arat md_clear
Virtualization features:
  Virtualization: VT-x
  Hypervisor vendor: KVM
  Virtualization type: full
Caches (sum of all):
  L1d: 32 KiB (1 instance)
  L1i: 32 KiB (1 instance)
  L2: 4 MiB (1 instance)
NUMA:
  NUMA node(s): 1
  NUMA node0 CPU(s): 0
Vulnerabilities:
  Itlb multihit: KVM: Mitigation: VMX disabled
  L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT disabled
  Mds: Mitigation; Clear CPU buffers; SMT Host state unknown
  Meltdown: Mitigation; PTI
  Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
  Retbleed: Not affected
  Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
  Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
  Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
  Srbds: Not affected
  Tsx async abort: Not affected