Monday, January 8th 2018

NVIDIA GeForce 390.65 Driver with Spectre Fix Benchmarked in 21 Games

The Meltdown and Spectre vulnerabilities have been making many headlines lately. So far, security researchers have identified three variants. Variant 1 (CVE-2017-5753) and Variant 2 (CVE-2017-5715) are Spectre, while Variant 3 (CVE-2017-5754) is Meltdown. According to their security bulletin, NVIDIA has no reason to believe that their display driver is affected by Variant 3. In order to strengthen security against Variant 1 and 2, the company released their GeForce 390.65 driver earlier today, so NVIDIA graphics card owners can sleep better at night.

Experience tells us that some software patches come with performance hits, whether we like it or not. We were more than eager to find out if this was the case with NVIDIA's latest GeForce 390.65 driver. Therefore, we took to the task of benchmarking this revision against the previous GeForce 388.71 driver in 21 different games at the 1080p, 1440p, and 4K resolutions. We even threw in an Ethereum mining test for good measure. Our test system is powered by an Intel Core i7-8700K processor overclocked to 4.8 GHz, paired with G.Skill Trident-Z 3866 MHz 16 GB memory on an ASUS Maximus X Hero motherboard. We're running the latest BIOS, which includes fixes for Spectre, and Windows 10 64-bit with Fall Creators Update, fully updated, which includes the KB4056891 Meltdown Fix.
We grouped all 21 games, each at three resolutions, into a single chart. Each entry on the X axis is for a single test, showing the percentage difference between old and new driver in percent. Negative values stand for a performance decrease when using today's driver. Positive numbers for performance gained.

Cryptominers can rest assured that the new GeForce 390.65 driver won't affect their profits negatively. Our testing shows zero impact in Ethereum mining. With regard to gaming, there is no significant difference in performance either. The new driver actually gains a little bit of performance on average over the previous version (+0.32%). The results hint at some undocumented small performance gains in Wolfenstein 2 and F1 2017; the other games are nearly unchanged. Even if we exclude those two titles, the performance difference is still +0.1%. The variations that you see in the chart above are due to random effects and due to limited precision on taking measurements in Windows. Generally, for the kind of testing done in our VGA reviews we typically expect 1-2% margin of error between benchmark runs, even when using the same game, at identical settings, on the same hardware.
Add your own comment

42 Comments on NVIDIA GeForce 390.65 Driver with Spectre Fix Benchmarked in 21 Games

#26
W1zzard
SlizzoNo benchmarks should be taking place until the microcode updates come out from Intel/Motherboard manufacturers. Until then these fixes are minimal.
As mentioned in the text, I've used the updated 1003 BIOS from ASUS www.asus.com/News/V5urzYAT6myCC1o2
Posted on Reply
#27
R0H1T
lexluthermiesterBut this what I'm trying to help you understand. These vulnerabilities are not "design flaws". The term "design flaw" directly implies defect. That is not the case. The CPU's affected by these problems will operate perfectly well and stable and will keep doing so even if the vulnerability is exploited. While the vulnerability takes advantage if a trick of a hardware function, those functions are not in and of themselves defects. Does that makes sense?
Alright how about unintended consequences? But meltdown is definitely avoidable ~
A *competent* CPU engineer would fix this by making sure speculation
doesn't happen across protection domains.
Maybe even a L1 I$ that is
keyed by CPL.

I think somebody inside of Intel needs to really take a long hard look
at their CPU's, and actually admit that they have issues instead of
writing PR blurbs that say that everything works as designed.

.. and that really means that all these mitigation patches should be
written with "not all CPU's are crap" in mind.

Or is Intel basically saying "we are committed to selling you shit
forever and ever, and never fixing anything"?

Because if that's the case, maybe we should start looking towards the
ARM64 people more.

Please talk to management. Because I really see exactly two possibibilities:

- Intel never intends to fix anything

OR

- these workarounds should have a way to disable them.

Which of the two is it?

Linus
Posted on Reply
#28
lexluthermiester
R0H1TFrom TPU ~
Security Update
Fixed CVE-2017-5753: Computer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Interesting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.
Posted on Reply
#29
R0H1T
lexluthermiesterInteresting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.
That's why I said it's a developing situation. Everything we think is secure may not be, then there's this ~
According to rough estimates in the Harvard study he co-authored, as many as one third of all zero-days used in a given year may have first been discovered by the NSA.
I'd err on the side of caution & assume everything is vulnerable, but every individual can also choose their level of cautiousness or security.
Posted on Reply
#30
lexluthermiester
R0H1TThat's why I said it's a developing situation. Everything we think is secure may not be, then there's this ~
That's actually what I was referring to with the "scary" comment. And what seems to be clear is that this is a problem for everyone on all platforms. It may have started with Intel, but they are not directly responsible any more than anyone else.
R0H1TI'd err on the side of caution & assume everything is vulnerable, but every individual can also choose their level of cautiousness or security.
Agreed. It's going to take time to solve these problems.

BTW, Thank You for the links. Been doing a ton of research on these problems as they will directly affect my work, but those specific points I had not found/gotten to. I don't mind admitting that these developments leave me more than a little alarmed and deeply concerned.
EDIT: I'm also very glad that I keep many personal systems on a closed network that has no internet access.. Perhaps that might be a possible solution elsewhere.
Posted on Reply
#31
RejZoR
I still don't see the relevancy of this test even if GPU's are affected because they access kernel memory space. CPU's access their own part of internal memory to predict caching and compute of stuff that goes through the CPU, making it faster. Blocking it from doing that gimps its performance. GPU's never even needed to access that part of memory in such a way the CPU does on itself.
Posted on Reply
#32
londiste
When you read up on Meltdown and Spectre, when it comes to mitigation measures Spectre is far worse. Meltdown fix is simple, kernels get KAISER-based patches, there is a performance hit but it will essentially be done. Spectre needs a much more complex approach - firmware/microcode patches plus potentially vulnerable software to take mitigation measures. Compilers have been improved to do some of this automatically but that would still mean recompiling the software. These measures partially overlap with Meltdown things but not only that. If you want an example, see what all major browser vendors did with patches. Things like making timers less accurate :)

GPUs are not affected. Driver does stuff on CPU that might be vulnerable to Spectre variants so mitigation measures are taken.
Mitigation measures introduce additional delays, that means performance hot for CPU-limited situations. So far, small hits, but still.

From the previous page of the topic:
xorbeThe gpu driver runs with priveledge, and by recoding key indirect branches, it closes a side band data leak.
Posted on Reply
#33
TheDeeGee
This benchmark makes no sense to me.

Someone has a proper graph?
Posted on Reply
#34
DRDNA
TheDeeGeeThis benchmark makes no sense to me.

Someone has a proper graph?
Basically the new Nvidia driver with the Security fix DOES NOT AFFECT PERFORMANCE IN A NEGATIVE WAY but did show about a .1% increase in performance.
Posted on Reply
#35
londiste
The graph is very bad as far as grasping the results go. But there clearly is an effect to performance. Nothing changes about how GPU does its work, it is all about CPU and what driver is doing on it. You would need to look at situations that are more CPU dependent.
Note where the bigger performance hits occur - Divinity Original Sin 2 at 1080p, Dawn of War 3 at 1080p. These are the more CPU-heavy situations.
Yes, GTA5 at high resolutions does get hit more and more but I would suspect this is specific to that game, perhaps something about how assets or draw calls are distributed as that is a massive open world.
Posted on Reply
#36
medi01
spectatorxExactly my thoughts. How is gpu driver supposed to fix cpu related problems, especially cpu architecture flaws.
Indeed. Not to mention, last time I've checked meltdown (which is to spectre what nuclear bomb is to a hand grenade) was not fixable, could only be mitigated.
Posted on Reply
#37
londiste
medi01Indeed. Not to mention, last time I've checked meltdown (which is to spectre what nuclear bomb is to a hand grenade) was not fixable, could only be mitigated.
This is not addressing Meltdown, it is addressing Spectre. At least primarily.
Posted on Reply
#38
xorbe
lexluthermiesterInteresting. That release directly implies NVidia saw the possibility of potential vulnerability. They didn't mention MLTDWN&SPCTR specically, but it seems likely now that such an attack is possible, reagrdless of how complex and unlikely. I concede on that point. Although, this does go to show just how complex these new discoveries really are and how scary the potential is.
As I precisely stated in post 10 of this very thread ...
Posted on Reply
#39
lexluthermiester
xorbeAs I precisely stated in post 10 of this very thread ...
Alright, admitted I was wrong. No need to rub it in..
Posted on Reply
#42
lexluthermiester
londisteNope, it isn't. Just the usual crappy level of "tech journalism".
GPUs do not speculate.
Driver patches are taking care of the problem that might occur with drivers running stuff on CPU as with any other piece of software.
Oh. Ok.
Posted on Reply
Add your own comment
Nov 21st, 2024 14:06 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts