KVM Parallels Virtualization testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel Xeon W-3275M (28 Cores), Motherboard: Parallels Software Virtual (19.0.0 54570 BIOS), Chipset: Red Hat Virtio + ICH8/R, Memory: 128GB, Disk: 1100GB Ubuntu Linux (1), Graphics: llvmpipe, Audio: Generic 1ab8, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 6.2.0-32-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, OpenGL: 4.5 Mesa 23.0.4-0ubuntu1~22.04.1 (LLVM 15.0.7 256 bits), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 3724x2048, System Layer: KVM Parallels Virtualization
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon W-3275M (28 Cores), Motherboard: Parallels Software Virtual (19.0.0 54570 BIOS), Chipset: Red Hat Virtio + ICH8/R, Memory: 128GB, Disk: 1100GB Ubuntu Linux (1), Graphics: llvmpipe, Audio: Generic 1ab8, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 6.2.0-32-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, OpenGL: 4.5 Mesa 23.0.4-0ubuntu1~22.04.1 (LLVM 15.0.7 256 bits), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 3724x2048, System Layer: KVM Parallels Virtualization
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 September 2023 10:44 by user i-bobak.