Quick Start and Basic Operation
NVIDIA DGX A100 DU-09821-001 _v01|28
Instructions for specifying the GPU architecture depend on the application and are beyond the
scope of this document. Consult the specific application build process.
4.8. Managing CPU Mitigations
DGX OS Server includes security updates to mitigate CPU speculative side-channel
vulnerabilities. These mitigations can decrease the performance of deep learning and machine
learning workloads.
If your installation of DGX systems incorporates other measures to mitigate these
vulnerabilities, such as measures at the cluster level, you can disable the CPU mitigations for
individual DGX nodes and thereby increase performance.
4.8.1. Determining the CPU Mitigation State of the
DGX System
If you do not know whether CPU mitigations are enabled or disabled, issue the following.
$ cat /sys/devices/system/cpu/vulnerabilities/*
‣
CPU mitigations are enabled if the output consists of multiple lines prefixed with
Mitigation:.
Example
KVM: Mitigation: Split huge pages
Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Mitigation: Clear CPU buffers; SMT vulnerable
Mitigation: PTI
Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP:
conditional, RSB filling
Mitigation: Clear CPU buffers; SMT vulnerable
‣
CPU mitigations are disabled if the output consists of multiple lines prefixed with
Vulnerable.
Example
KVM: Vulnerable
Mitigation: PTE Inversion; VMX: vulnerable
Vulnerable; SMT vulnerable
Vulnerable
Vulnerable
Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs
barriers
Vulnerable, IBPB: disabled, STIBP: disabled
Vulnerable