VMware

VMware Performance Impact of Meltdown and Spectre Patches

A post detailing the VMware Performance Impact of Meltdown and Spectre Patches as tested in my home lab environment. After applying Microsoft and VMware patches, how is performance affected?

Update 3.20.2018 – VMware has released vSphere 6.5 U1G which has a newly released microcode update

Update 1.17.2018 – Firmware Updates and Initial Performance Data for Data Center Systems

Update 1.13.2018 – Due to recent Intel sighting VMware now recommending NOT to install the latest microcode patch – link below

Update 1.12.2018 – Added benchmark of patching ESXi with the latest microcode update first before guest OS patch

Update 1.11.2018 – Added specs, virtual hardware, and VM hardware version of the test virtual machine

I have been keenly interested in the performance implications of the Meltdown and Spectre patches on hypervisor systems.ย  I dare say all of us cringed when hearing the โ€œworkaroundsโ€ would impact performance of our performance sensitive production systems.ย  Numbers have been thrown around anywhere from 5-30% impact on performance.ย  With the latest releases and information coming from VMware, I ran a test of OS patches, and then hypervisor patches to gauge VMware performance impact of Meltdown and Spectre patches.ย  Below are the results of my findings that I ran through fairly quickly to determine various impacts.

Configuration for VMware Meltdown and Spectre Performance Tests

Below are the configuration parameters for the test environment used in testing various performance impacts with the patches, both from a guest operating system side and the ESXi hypervisor:

VMware ESXi Server:

VMware Virtual Machine:

  • Windows 10 Pro – 1709 (OS Build 16299.125) – beginning test
  • (4) vCPUs assigned, 8 GB of RAM
  • (1) single 50 GB hard drive
    • Using ParaVirtual Storage controller
  • (1) Network adapter (VMXNET3)
  • VMware Compatibility version ESXi 6.5 (VM version 13)
Windows-10-version-before-patching
Windows 10 version before patching

The version I installed in the test virtual machine is datedย Dec 2017.

Windows-10-downloaded-version
Windows 10 downloaded version
Virtual-Hardware-specs-for-Meltdown-and-Spectre-test-workstation
Virtual Hardware specs for Meltdown and Spectre test workstation

VMware Performance Impact of Meltdown and Spectre Patches

Just as a sanity check I looked to make sure there were no patches installed.ย  As you can see below, none are showing installed.

No-patches-installed-before-running-quick-CPU-and-Disk-test
No patches installed before running quick CPU and Disk test

Just as a quick test of CPU and disk performance, I am usingย CPU-Z for a quick CPU benchmark andย Crystal Disk Benchmarkย for disk benchmark statistics.

Before Applying the Microsoft Guest Operating System Patch

The following benchmarks are before applying the Microsoftย 20118-01 Cumulative Update for Windows 10 Version 1709 for x64-based Systems.

CPU-benchmark-without-the-Meldown-and-Spectre-Guest-Operating-System-patch-from-Microsoft
CPU benchmark without the Meldown and Spectre Guest Operating System patch from Microsoft
Disk-benchmark-before-applying-Meltdown-and-Spectre-guest-operating-system-patch
Disk benchmark before applying Meltdown and Spectre guest operating system patch

After Applying the Microsoft Guest Operating System Patch

Ok so now I have numbers for my Windows 10 virtual machine before running the Microsoft security patch.ย  Let’s apply the operating system patch and see what happens.ย  This is only the guest operating system patch andย not the VMware microcode patch.

Dowloading-and-installing-the-Microsoft-Meltdown-and-Spectre-patch
Dowloading and installing the Microsoft Meltdown and Spectre patch
Waiting-to-restart-after-applying-the-Microsoft-Meltdown-and-Spectre-patch
Waiting to restart after applying the Microsoft Meltdown and Spectre patch

After a restart of the operating system, the following are the benchmark results after applying the guest operating system patch:

CPU-benchmark-after-applying-the-Microsoft-Meltdown-and-Spectre-guest-operating-system-patch
CPU benchmark after applying the Microsoft Meltdown and Spectre guest operating system patch

As shown above, theย single threadย performance was exactly the same.ย  However, theย multi threadย performance has went downย 1.79%.

Disk-benchmark-after-applying-the-Microsoft-Meltdown-and-Spectre-patch
Disk benchmark after applying the Microsoft Meltdown and Spectre patch

The numbers above, while not wildly different are lower aside from the Seq Q32T1 bench on the read side.ย  The other numbers are lower especially on the write side.

After Applying the VMware ESXi Meltdown and Spectre Microcode Patch

VMware has a really good KB found here detailing the vulnerabilities and the order of applying various updates.ย  The VMware ESXi microcode updates implement at the hypervisor software layer what the BIOS update does also.

The below information is found here:ย ย https://kb.vmware.com/s/article/52085

Apply the Microcode/BIOS updates for CVE-2017-5715 in one of two ways:

  • Apply the BIOS/Microcode update from your platform vendor.
    OR
  • Apply one of the following ESXi patches to update the microcode for supported CPUs
    • ESXi650-201801402-BG microcode *
    • ESXi600-201801402-BG microcode *
    • ESXi550-201801401-BG hypervisor and microcode **

So I have applied the VMware updates per the KB article:ย https://kb.vmware.com/s/article/52200

Before Updating:

ESXi-6.5-Update-1-version-before-patching
ESXi 6.5 Update 1 version before patching

After Updating:

After-applying-the-VMware-ESXi-Meltdown-and-Spectre-patches
After applying the VMware ESXi Meltdown and Spectre patches

Here we can see a pretty dramatic decrease in theย Multi Threadย performance as it is a fullย 7.39% less performance.

CPU-benchmark-after-applying-VMware-ESXi-Meltdown-and-Spectre-patch
CPU benchmark after applying VMware ESXi Meltdown and Spectre patch

Disk benchmarks are hit pretty hard as well when it comes to theย Write MB/sย performance.

Disk-Benchmark-after-applying-VMware-ESXi-Meltdown-and-Spectre-patch
Disk Benchmark after applying VMware ESXi Meltdown and Spectre patch

Comparison between CPU and Disk performance between Meltdown and Spectre Patches

Putting it all together, we see the following results in comparing the various Meltdown and Spectre patches and their effect on performance:

Comparison-between-CPU-performance-after-both-Microsoft-and-VMware-patches-applied
Comparison between CPU performance after both Microsoft and VMware Meltdown and Spectre patches applied
Comparison-of-Disk-performance-after-Microsoft-and-VMware-Meltdown-and-Spectre-patches-applied
Comparison between CPU performance after both Microsoft and VMware patches applied

Update 1.12.2018 – Added benchmark of patching ESXi with the latest microcode update first before guest OS patch

Now let’s run this benchmark test in the reverse order, Iย did not apply the Windows patch for Meltdown & Spectre.ย  Instead, I simply fully patched the ESXi host up to the latest patch level including the microcode update from VMware and performance was in line withย no patchesย installed.

With only the VMware microcode updates appliedย (ESXi version 7526125), the benchmark looked really good.ย  Actually not much difference from the above benchmark with nothing applied.

With-no-Microsoft-patches-and-only-VMware-microcode-patch-applied
With no Microsoft patches and only VMware microcode patch applied

Same with the disk benchmarks.

Disk-Benchmark-with-no-Microsoft-patches-and-only-VMware-microcode-patch-applied
Disk Benchmark with no Microsoft patches and only VMware microcode patch applied

Now, to take the step further, we now want to apply the Microsoft Patch.ย  Keep in mind, this is on the virtual machine running on anย already fully patched ESXi host.ย  In the following tests, it looks like it is theย combination of the two patch installs that drastically affects performance.ย  Note the results of both patches being applied, albeit in the opposite order.ย  Below, we see the relative big hit in CPU performance.

CPU-benchmark-after-applying-VMware-ESXi-Meltdown-and-Spectre-patch-1
CPU benchmark after applying VMware ESXi Meltdown and Spectre patch

Disk performance once again is pretty drastically affected on the write side especially.

Disk-Benchmark-after-apply-VMware-microcode-patch-and-then-Microsoft-patch
Disk Benchmark after apply VMware microcode patch and then Microsoft patch

The added conclusion here from the additional testing is that it appears it is the combination of the two patches.ย  When each patch is applied individually, performance isn’t impacted too much.ย  However, in either order of patch installation, once both are applied, we see the performance impact come to light.

Update 1.13.2018 – Due to recent Intel sighting VMware now recommending NOT to install the latest microcode patch – link below

Intel has made observations with Haswell and Broadwell CPUs that have led to them recommending VMware pull the current microcode patch.ย  They will release a new microcode patch to replace the current patch released.ย  See the official KB from VMware here:ย ย https://kb.vmware.com/s/article/52345

Update 1.17.2018 – Firmware Updates and Initial Performance Data for Data Center Systems

Intel has provided their findings on performance data on data center systems:ย ย https://newsroom.intel.com/news/firmware-updates-and-initial-performance-data-for-data-center-systems/

***Update 3.20.2018 – VMware has released vSphere 6.5 U1G which has a newly released microcode update***

VMware has officially released the new microcode update that is compatible with the processors initially found in the Intel sighting.ย  The new release is vSphere 6.5 U1G.ย ย Read about the new updates here.

Concluding Thoughts

My testing above ofย VMware Performance Impact of Meltdown and Spectre Patches is quite telling.ย  With each patch installed, I saw a performance hit.ย  The cumulative impact is fairly dramatic as seen in my home lab testing.ย  We are sure to see more tweaking and fallout from the various patches as has already been seen from the AMD side of things today.

More Meltdown and Spectre Posts:

Subscribe to VirtualizationHowto via Email ๐Ÿ””

Enter your email address to subscribe to this blog and receive notifications of new posts by email.



Brandon Lee

Brandon Lee is the Senior Writer, Engineer and owner at Virtualizationhowto.com, and a 7-time VMware vExpert, with over two decades of experience in Information Technology. Having worked for numerous Fortune 500 companies as well as in various industries, He has extensive experience in various IT segments and is a strong advocate for open source technologies. Brandon holds many industry certifications, loves the outdoors and spending time with family. Also, he goes through the effort of testing and troubleshooting issues, so you don't have to.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.