GRID Software for Microsoft Windows Server Release Notes
GRID Software for Microsoft Windows Server Release Notes Version 367.134/370.41
Release information for all users of NVIDIA GRID software and hardware on Microsoft Windows Server.
These Release Notes summarize current status, information on validated platforms, and known issues with NVIDIA GRID™ software and hardware on Microsoft Windows Server.
This release includes the following software:
- NVIDIA Windows drivers for vGPU version 370.41
- NVIDIA Linux drivers for vGPU version 367.134
Updates in this release:
- Miscellaneous bug fixes
- Security updates
This release of NVIDIA GRID software provides support for several NVIDIA GPUs on validated server hardware platforms, Microsoft Windows Server hypervisor software versions, and guest operating systems.
2.1. Supported NVIDIA GPUs and Validated Server Platforms
This release of NVIDIA GRID software provides support for the following NVIDIA GPUs on Microsoft Windows Server, running on validated server hardware platforms:
- GRID K1
- GRID K2
- Tesla M6
- Tesla M10
- Tesla M60
For a list of validated server platforms, refer to NVIDIA GRID Certified Servers.
2.2. Hypervisor Software Versions
This release supports only the hypervisor software versions listed in the table.If a specific release, even an update release, is not listed, it’s not supported.
Software | Release Supported |
---|---|
Microsoft Windows Server |
Windows Server 2016 1709 with Hyper-V role Windows Server 2016 1607 with Hyper-V role |
2.3. Guest OS Support
NVIDIA GRID software supports several Windows releases and Linux distributions as a guest OS using GPU pass-through.
Microsoft Windows Server with Hyper-V role supports GPU pass-through over Microsoft Virtual PCI bus. This bus is supported through paravirtualized drivers.
Use only a guest OS release that is listed as supported by NVIDIA GRID software with your virtualization software. To be listed as supported, a guest OS release must be supported not only by NVIDIA GRID software, but also by your virtualization software. NVIDIA cannot support guest OS releases that your virtualization software does not support.
Windows Guest OS Support
NVIDIA GRID software supports only the following Windows releases as a guest OS on Microsoft Windows Server:
If a specific release, even an update release, is not listed, it’s not supported.
- Windows Server 2016 1607, 1709
- Windows Server 2012 R2 with patch Windows8.1-KB3133690-x64.msu
- Windows 10 RTM (1507), November Update (1511), Anniversary Update (1607), Creators Update (1703) (32/64-bit)
2.3.2. Linux Guest OS Support
NVIDIA GRID software supports only the following 64-bit Linux distributions as a guest OS only on supported Tesla GPUs on Microsoft Windows Server:
If a specific release, even an update release, is not listed, it’s not supported.
- Red Hat Enterprise Linux 7.0-7.4
- CentOS 7.0-7.4
- Ubuntu 16.04 LTS
- SUSE Linux Enterprise Server 12 SP2
GRID K1 and GRID K2 do not support vGPU on a Linux guest OS.
3.1. Restricting Access to GPU Performance Counters
The NVIDIA graphics driver contains a vulnerability (CVE-2018-6260) that may allow access to application data processed on the GPU through a side channel exposed by the GPU performance counters. To address this vulnerability, update the driver and restrict access to GPU performance counters to allow access only by administrator users and users who need to use CUDA profiling tools.
The GPU performance counters that are affected by this vulnerability are the hardware performance monitors used by the CUDA profiling tools such as CUPTI, Nsight Graphics, and Nsight Compute. These performance counters are exposed on the hypervisor host and in guest VMs only as follows:
- On the hypervisor host, they are always exposed. However, the Virtual GPU Manager does not access these performance counters and, therefore, is not affected.
- In Windows and Linux guest VMs, they are exposed only in VMs configured for GPU pass through. They are not exposed in VMs configured for NVIDIA vGPU.
3.1.1. Windows: Restricting Access to GPU Performance Counters for One User by Using NVIDIA Control Panel
Perform this task from the guest VM to which the GPU is passed through.
Ensure that you are running NVIDIA Control Panel version 8.1.950.
- Open NVIDIA Control Panel:
- Right-click on the Windows desktop and select NVIDIA Control Panel from the menu.
- Open Windows Control Panel and double-click the NVIDIA Control Panel icon.
- In NVIDIA Control Panel, select the Manage GPU Performance Counters task in the Developer section of the navigation pane.
- Complete the task by following the instructions in the Manage GPU Performance Counters > Developer topic in the NVIDIA Control Panel help.
3.1.2. Windows: Restricting Access to GPU Performance Counters Across an Enterprise by Using a Registry Key
You can use a registry key to restrict access to GPU Performance Counters for all users who log in to a Windows guest VM. By incorporating the registry key information into a script, you can automate the setting of this registry for all Windows guest VMs across your enterprise.
Perform this task from the guest VM to which the GPU is passed through.
Only enterprise administrators should perform this task. Changes to the Windows registry must be made with care and system instability can result if registry keys are incorrectly set.
- Set the RmProfilingAdminOnly Windows registry key to 1.
[HKEY_LOCAL_MACHINE\SOFTWARE\NVIDIA Corporation\Global\NVTweak] Value: "RmProfilingAdminOnly" Type: DWORD Data: 00000001
The data value 1 restricts access, and the data value 0 allows access, to application data processed on the GPU through a side channel exposed by the GPU performance counters.
- Restart the VM.
3.1.3. Linux Guest VMs: Restricting Access to GPU Performance Counters
On systems where unprivileged users don't need to use GPU performance counters, restrict access to these counters to system administrators, namely users with the CAP_SYS_ADMIN capability set. By default, the GPU performance counters are not restricted to users with the CAP_SYS_ADMIN capability.
Perform this task from the guest VM to which the GPU is passed through.
This task requires sudo privileges.
- Log in to the guest VM.
- Set the kernel module parameter NVreg_RestrictProfilingToAdminUsers to 1 by adding this parameter to the /etc/modprobe.d/nvidia.conf file.
-
If you are setting only this parameter, add an entry for it to the /etc/modprobe.d/nvidia.conf file as follows:
options nvidia NVreg_RegistryDwords="NVreg_RestrictProfilingToAdminUsers=1"
-
If you are setting multiple parameters, set them in a single entry as in the following example:
options nvidia NVreg_RegistryDwords="RmPVMRL=0x0" "NVreg_RestrictProfilingToAdminUsers=1"
If the /etc/modprobe.d/nvidia.conf file does not already exist, create it.
-
- Restart the VM.
4.1. Driver installation fails with Red Hat Enterprise Linux 7.4
Description
During installation of the NVIDIA GRID Software graphics driver in a Red Hat Enterprise Linux 7.4 guest VM on Microsoft Windows Server with Hyper-V role, the VM crashes and the installation fails.
Version
This issue occurs only with the following combination of hypervisor and guest OS versions:
- Hypervisor: Microsoft Windows Server 2016 with Hyper-V role
- Guest OS: Red Hat Enterprise Linux 7.4
Status
Open
Ref. #
200578536
Notice
ALL NVIDIA DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, "MATERIALS") ARE BEING PROVIDED "AS IS." NVIDIA MAKES NO WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE.
Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication of otherwise under any patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all other information previously supplied. NVIDIA Corporation products are not authorized as critical components in life support devices or systems without express written approval of NVIDIA Corporation.
HDMI
HDMI, the HDMI logo, and High-Definition Multimedia Interface are trademarks or registered trademarks of HDMI Licensing LLC.
OpenCL
OpenCL is a trademark of Apple Inc. used under license to the Khronos Group Inc.
Trademarks
NVIDIA, the NVIDIA logo, NVIDIA GRID, vGPU, and Tesla are trademarks or registered trademarks of NVIDIA Corporation in the U.S. and other countries. Other company and product names may be trademarks of the respective companies with which they are associated.