Lost roughly 300 points on Timespy cpu score?

Discussion in 'Overclocking & Cooling' started by scgt1, May 20, 2019.

  1. scgt1

    scgt1 [H]ardness Supreme

    Messages:
    5,164
    Joined:
    Jun 4, 2007
    So I was benching my new 2070 with Timespy on the 17th. I've had windows update since then and I'm just now getting around to attempting more over the scanner overclock.

    Might I say they did a good job with that because if I bump the core up to the next notch it crashes Timespy. lol

    Anyway I had some windows updates this morning and I'm wondering if they put patches in for this new Zombieload or what ever it is that may be affecting my scores on my 6700K?

    When I was benching on the 17th the cpu scores were pretty level +- a few points but to drop around 300 points seems a bit odd to me. Not running the cpu overclock so nothing has been changed with it just the windows update that ran this morning is the only change.
     

    Attached Files:

  2. drescherjm

    drescherjm [H]ardForum Junkie

    Messages:
    14,475
    Joined:
    Nov 19, 2008
    More Spectre / Spectre-NG mitigations??
     
    Killerxp100 and scgt1 like this.
  3. scgt1

    scgt1 [H]ardness Supreme

    Messages:
    5,164
    Joined:
    Jun 4, 2007
    Mother F! Looks that way.

    May 14, 2019—KB4494441 (OS Build 17763.503)
    • Enables “Retpoline” by default if Spectre Variant 2 (CVE-2017-5715) is enabled. Make sure previous OS protections against the Spectre Variant 2 vulnerability are enabled using the registry settings described in the Windows Client and Windows Server articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions). For more information about “Retpoline”, see Mitigating Spectre variant 2 with Retpoline on Windows.
    • Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130). Use the registry settings as described in the Windows Client and Windows Server articles. (These registry settings are enabled by default for Windows Client OS editions and Windows Server OS editions).