Meltdown and Spectre Patches May Increase CPU Load [Initial Findings]
![Meltdown and Spectre Patches May Increase CPU Load [Initial Findings]](https://www.lakesidesoftware.com/wp-content/uploads/2018/01/photo-1510746001195-0db09655b6db.jpg)

With the OS and hypervisor patches forย Meltdownย (CVE-2017-5754) having been released and the OS, hypervisor, and firmware patches forย Spectreย (CVE-2017-5715ย and CVE-2017-5753) in someย partial state of release depending on vendor,ย there have beenย manyย questions about the performance implications of updating.ย Because thereโsย low-level interactionย at play forย Meltdownย andย Spectreย patches,ย the net result will depend significantly on factors like workload (e.g. what is it that users are actually doing), CPU architecture, OS version, hypervisor version, hardware characteristics, and so on. Thisย means that itโsย essentialย to haveย aย method of benchmarking (and in someย cases predicting) what the net impact may be. Weโve undertaken someย initial testing to try and give someย indicative guidance but, as always, this may not be reflective of your experience depending on your unique setup.
Clearly there are a wild number of variables at play in this, but for starters, we chose to begin with VDI workloads as our impression was that these (along with other shared CPU scenarios) would be the most likely to see the significant aggregate impact. While we might not be able to validate all scenarios in-house, weย will attempt to benchmark common scenarios with more universal workloads, and weโll especially focus on slightly older hardware to make it more relevant to where many enterprise customers are likely to be in their product cycle for supporting servers.ย Additionally, weย will beย postingย more details on the discrete/physical workstation case when thereโs more information to be drawn from theย SysTrackย Community.
The following is a short summary of our findings aroundย performance impacts ofย Meltdownย andย Spectreย patchesย on VDI workloads.ย You can also listen to the Lifeguard IT podcast for more background on Meltdown and Spectre. The discussion of our CPU impact findings starts at 6:40. The episode is alsoย available on iTunes/Apple Podcasts and Google Play.

Initialย Testing
| Patch Testedย | Meltdownย ONLYย |
| Hypervisor | VMwareย ESXi, 6.0.0, 6921384 |
| Guest OS | Windows 10, build 15063 |
| CPU | Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz |
| Memory | 6 GB |
| Disk | SSDย local storage |
| Density | 62 VMs |
To try and make our workload generally representative of what normal enterprise activity would look like for more of a task-based worker (restricted to mostly browser based and basic Office product usage),ย we restricted our artificial load to Internet Explorer, Microsoft Word, Outlook, and Excel.ย Quick shout-out toย Login VSIย for providing the framework for the synthetic transactions.
Methodology
Theย thought process for the testing was straightforward: letโs evaluate the sameย workload and density on a single VDI host with both hypervisor and OS unpatched and then subsequently patched.ย For the evaluation of the impact,ย we continuously collected data withย SysTrackย toย monitorย allย the resource consumptionย metrics of interest as well as our ownย end-user experience KPIs and score.
So, letโs get straight to the interesting part: what are the results?ย For the unpatched load, we saw an active average (only with workload, not idle) of around 20.26% CPU usage. For patched load, we saw 21.52%. Thatย means weโre looking at around an increase ofย 1.26%ย CPUย inย activeย load.

Now, what does thatย mean overall?ย The workload increase in CPU usage on a per VM basis is small, but as we know,ย that can add up very quickly when you start dealing with higher densities. More importantly, we were only doing very I/O light applications, andย all indicationsย (at least for Windows) seem to show that I/O intense workloads can present much more of a problem.ย So, how can you figure out whether this is going to pose a problem for your users?
How do I play the home game with Meltdown and Spectre patches?
Luckily thisย can be aย simple three-step process,ย givenย the rightย Digital Experience Monitoringย tool.ย Now,ย assuming youโve gotย SysTrack, the process can be made even simpler with Lakeside’s newย Kit for both the predictive analysis and impact outline for after the patch is applied.ย Based on our understanding of the primary factors at play for the mitigationย methods to be used for both problems,ย weโve developed aย method of predicting a potential impact based on the activity from an existing system.ย This is best seen through our Speculation Control Kit dashboard.

This is a complex topic, and weโll have a lot more details as soon as we start to see more of the patched system results out in the wild. Stay tuned for more from us on performance testing, and feel free to reach out with anyย questions.
tl;dr: Performance impact per machine is lowย with a light workload: roughly 1.3% per VM, but that adds up quickly with density.ย Expect to see more impact fromย Spectre, and check with us for resources on how to analyze your environment’s impact.
Subscribe to the Lakeside Newsletter
Receive platform tips, release updates, news and more



