Skip to content

Instantly share code, notes, and snippets.

@jimangel
Created September 15, 2020 19:40
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jimangel/c0111e0e6b84e629fcd99d60ca700405 to your computer and use it in GitHub Desktop.
Save jimangel/c0111e0e6b84e629fcd99d60ca700405 to your computer and use it in GitHub Desktop.
VMs with side channel mitigations enabled may exhibit performance degradation (79832)

https://kb.vmware.com/s/article/79832 has a pretty useless resolution...

Symptoms

VMs that have side channel mitigations enabled while running on Fusion on Mac OS 11.0 or later or on Workstation on Windows hosts with virtualization based security enabled may run slowly.

Cause

The root cause of the performance degradation is most likely due to mitigations for side channel attacks such as Spectre and Meltdown. Side channel attacks allow unauthorized read access by malicious processes or virtual machines to the contents of protected kernel or host memory. CPU vendors have introduced a number of features to protect data against this class of attacks such as indirect branch prediction barriers, single thread indirect branch predictor mode, indirect branch restricted speculation mode and L1 data cache flushing. While these features are effective at preventing side channel attacks they can cause noticeable performance degradation in some cases.

Resolution

Right click the VM > Settings... > Options [tab] > Advanced > (check) "Disable side channel mitigations for Hyper-V enabled hosts" > Ok

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment