VMware described its overall response to a specific set of recently discovered CPU security vulnerabilities in KB 52245: VMware Response to Speculative Execution security issues, CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 (aka Spectre and Meltdown). Since then, customers have inquired if there may be a performance cost associated with either the VMware mitigations, or mitigations of the guest operating systems as released from the OS providers. This knowledge base article will be used as the centralized document to discuss such performance impacts.
VMware has conducted performance testing to determine the costs of the Meltdown/Spectre mitigations for VMware products. We have tested a wide variety of workloads (with and without vSAN) on guest operating systems both with mitigation (“patched”) and without mitigation (“unpatched”) to provide a comprehensive view of relevant performance characteristics. All testing to date has been conducted on a representative range of Intel Xeon server processors. Note that the latest ESXi patches include relevant Intel and AMD CPU microcode for Spectre V2 mitigations. For understanding the performance impact to virtualization environments, we classify the mitigations into two performance categories.
Our conclusions for each are as follows:
Please sign up to be alerted when this KB is updated with new information.
** = This includes Hypervisor-Specific vSphere mitigations, Intel CPU microcode updates for Spectre V2, and also the implementation of Hypervisor-Assisted Guest Mitigation even though no Guest Operating System has been patched to use them.