• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

NVIDIA GeForce 390.65 Driver with Spectre Fix Benchmarked in 21 Games

Joined
Jul 5, 2013
Messages
25,559 (6.47/day)
design flaw
But this what I'm trying to help you understand. These vulnerabilities are not "design flaws". The term "design flaw" directly implies defect. That is not the case. The CPU's affected by these problems will operate perfectly well and stable and will keep doing so even if the vulnerability is exploited. While the vulnerability takes advantage if a trick of a hardware function, those functions are not in and of themselves defects. Does that makes sense?
 

W1zzard

Administrator
Staff member
Joined
May 14, 2004
Messages
27,053 (3.71/day)
Processor Ryzen 7 5700X
Memory 48 GB
Video Card(s) RTX 4080
Storage 2x HDD RAID 1, 3x M.2 NVMe
Display(s) 30" 2560x1600 + 19" 1280x1024
Software Windows 10 64-bit
Joined
Apr 12, 2013
Messages
6,750 (1.67/day)
But this what I'm trying to help you understand. These vulnerabilities are not "design flaws". The term "design flaw" directly implies defect. That is not the case. The CPU's affected by these problems will operate perfectly well and stable and will keep doing so even if the vulnerability is exploited. While the vulnerability takes advantage if a trick of a hardware function, those functions are not in and of themselves defects. Does that makes sense?
Alright how about unintended consequences? But meltdown is definitely avoidable ~
A *competent* CPU engineer would fix this by making sure speculation
doesn't happen across protection domains.
Maybe even a L1 I$ that is
keyed by CPL.

I think somebody inside of Intel needs to really take a long hard look
at their CPU's, and actually admit that they have issues instead of
writing PR blurbs that say that everything works as designed.

.. and that really means that all these mitigation patches should be
written with "not all CPU's are crap" in mind.

Or is Intel basically saying "we are committed to selling you shit
forever and ever, and never fixing anything"?

Because if that's the case, maybe we should start looking towards the
ARM64 people more.

Please talk to management. Because I really see exactly two possibibilities:

- Intel never intends to fix anything

OR

- these workarounds should have a way to disable them.

Which of the two is it?

Linus
 
Joined
Jul 5, 2013
Messages
25,559 (6.47/day)
From TPU ~
Security Update
Fixed CVE-2017-5753: Computer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Interesting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.
 
Joined
Apr 12, 2013
Messages
6,750 (1.67/day)
Interesting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.
That's why I said it's a developing situation. Everything we think is secure may not be, then there's this ~
According to rough estimates in the Harvard study he co-authored, as many as one third of all zero-days used in a given year may have first been discovered by the NSA.

I'd err on the side of caution & assume everything is vulnerable, but every individual can also choose their level of cautiousness or security.
 
Joined
Jul 5, 2013
Messages
25,559 (6.47/day)
That's why I said it's a developing situation. Everything we think is secure may not be, then there's this ~
That's actually what I was referring to with the "scary" comment. And what seems to be clear is that this is a problem for everyone on all platforms. It may have started with Intel, but they are not directly responsible any more than anyone else.
I'd err on the side of caution & assume everything is vulnerable, but every individual can also choose their level of cautiousness or security.
Agreed. It's going to take time to solve these problems.

BTW, Thank You for the links. Been doing a ton of research on these problems as they will directly affect my work, but those specific points I had not found/gotten to. I don't mind admitting that these developments leave me more than a little alarmed and deeply concerned.
EDIT: I'm also very glad that I keep many personal systems on a closed network that has no internet access.. Perhaps that might be a possible solution elsewhere.
 
Last edited:
Joined
Oct 2, 2004
Messages
13,791 (1.93/day)
I still don't see the relevancy of this test even if GPU's are affected because they access kernel memory space. CPU's access their own part of internal memory to predict caching and compute of stuff that goes through the CPU, making it faster. Blocking it from doing that gimps its performance. GPU's never even needed to access that part of memory in such a way the CPU does on itself.
 
Joined
Feb 3, 2017
Messages
3,481 (1.32/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
When you read up on Meltdown and Spectre, when it comes to mitigation measures Spectre is far worse. Meltdown fix is simple, kernels get KAISER-based patches, there is a performance hit but it will essentially be done. Spectre needs a much more complex approach - firmware/microcode patches plus potentially vulnerable software to take mitigation measures. Compilers have been improved to do some of this automatically but that would still mean recompiling the software. These measures partially overlap with Meltdown things but not only that. If you want an example, see what all major browser vendors did with patches. Things like making timers less accurate :)

GPUs are not affected. Driver does stuff on CPU that might be vulnerable to Spectre variants so mitigation measures are taken.
Mitigation measures introduce additional delays, that means performance hot for CPU-limited situations. So far, small hits, but still.

From the previous page of the topic:
The gpu driver runs with priveledge, and by recoding key indirect branches, it closes a side band data leak.
 
Last edited:
Joined
Aug 2, 2012
Messages
1,771 (0.41/day)
Location
Netherlands
System Name TheDeeGee's PC
Processor Intel Core i7-11700
Motherboard ASRock Z590 Steel Legend
Cooling Noctua NH-D15
Memory Crucial Ballistix 3200/C16 32GB
Video Card(s) Nvidia RTX 4070 Ti 12GB
Storage Crucial P5 Plus 2TB / Crucial P3 Plus 2TB / Crucial P3 Plus 4TB
Display(s) EIZO CX240
Case Lian-Li O11 Dynamic Evo XL
Audio Device(s) Creative Sound Blaster ZxR / AKG K601 Headphones
Power Supply Seasonic PRIME Fanless TX-700
Mouse Logitech G500s
Keyboard Keychron Q6
Software Windows 10 Pro 64-Bit
Benchmark Scores None, as long as my games runs smooth.
This benchmark makes no sense to me.

Someone has a proper graph?
 
Joined
Feb 19, 2006
Messages
6,270 (0.94/day)
Location
New York
Processor INTEL CORE I9-9900K @ 5Ghz all core 4.7Ghz Cache @1.305 volts
Motherboard ASUS PRIME Z390-P ATX
Cooling CORSAIR HYDRO H150I PRO RGB 360MM 6x120mm fans push pull
Memory CRUCIAL BALLISTIX 3000Mhz 4x8 32gb @ 4000Mhz
Video Card(s) EVGA GEFORECE RTX 2080 SUPER XC HYBRID GAMING
Storage ADATA XPG SX8200 Pro 1TB 3D NAND NVMe,Intel 660p 1TB m.2 ,1TB WD Blue 3D NAND,500GB WD Blue 3D NAND,
Display(s) 50" Sharp Roku TV 8ms responce time and Philips 75Hz 328E9QJAB 32" curved
Case BLACK LIAN LI O11 DYNAMIC XL FULL-TOWER GAMING CASE,
Power Supply 1600 Watt
Software Windows 10
This benchmark makes no sense to me.

Someone has a proper graph?
Basically the new Nvidia driver with the Security fix DOES NOT AFFECT PERFORMANCE IN A NEGATIVE WAY but did show about a .1% increase in performance.
 
Joined
Feb 3, 2017
Messages
3,481 (1.32/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
The graph is very bad as far as grasping the results go. But there clearly is an effect to performance. Nothing changes about how GPU does its work, it is all about CPU and what driver is doing on it. You would need to look at situations that are more CPU dependent.
Note where the bigger performance hits occur - Divinity Original Sin 2 at 1080p, Dawn of War 3 at 1080p. These are the more CPU-heavy situations.
Yes, GTA5 at high resolutions does get hit more and more but I would suspect this is specific to that game, perhaps something about how assets or draw calls are distributed as that is a massive open world.
 
Joined
Jul 9, 2015
Messages
3,413 (1.06/day)
System Name M3401 notebook
Processor 5600H
Motherboard NA
Memory 16GB
Video Card(s) 3050
Storage 500GB SSD
Display(s) 14" OLED screen of the laptop
Software Windows 10
Benchmark Scores 3050 scores good 15-20% lower than average, despite ASUS's claims that it has uber cooling.
Exactly my thoughts. How is gpu driver supposed to fix cpu related problems, especially cpu architecture flaws.
Indeed. Not to mention, last time I've checked meltdown (which is to spectre what nuclear bomb is to a hand grenade) was not fixable, could only be mitigated.
 
Joined
Feb 3, 2017
Messages
3,481 (1.32/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Indeed. Not to mention, last time I've checked meltdown (which is to spectre what nuclear bomb is to a hand grenade) was not fixable, could only be mitigated.
This is not addressing Meltdown, it is addressing Spectre. At least primarily.
 
Joined
Feb 14, 2012
Messages
2,323 (0.52/day)
System Name msdos
Processor 8086
Motherboard mainboard
Cooling passive
Memory 640KB + 384KB extended
Video Card(s) EGA
Storage 5.25"
Display(s) 80x25
Case plastic
Audio Device(s) modchip
Power Supply 45 watts
Mouse serial
Keyboard yes
Software disk commander
Benchmark Scores still running
Interesting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.

As I precisely stated in post 10 of this very thread ...
 
Joined
Feb 3, 2017
Messages
3,481 (1.32/day)
Processor R5 5600X
Motherboard ASUS ROG STRIX B550-I GAMING
Cooling Alpenföhn Black Ridge
Memory 2*16GB DDR4-2666 VLP @3800
Video Card(s) EVGA Geforce RTX 3080 XC3
Storage 1TB Samsung 970 Pro, 2TB Intel 660p
Display(s) ASUS PG279Q, Eizo EV2736W
Case Dan Cases A4-SFX
Power Supply Corsair SF600
Mouse Corsair Ironclaw Wireless RGB
Keyboard Corsair K60
VR HMD HTC Vive
Top