Pitzer
OSC experienced backup failures on our GPFS file systems (both Project file systems, /fs/project and /fs/ess) the mornings of August 1st and 2nd. The underlying cause was identified and backups were operating as expected the morning of August 3rd. As a result of these failed backups, OSC will not be able to complete some file restore requests for files changed between approximately 2020-07-31 02:30 through 2020-08-02 02:30.
System Downtime August 18, 2020
A downtime for all OSC HPC systems is scheduled from 7 a.m. to 9 p.m., Tuesday, August 18, 2020. The downtime will affect the Pitzer, Ruby and Owens Clusters, web portals and HPC file servers. Login services, except for my.osc.edu, will not be available during this time. OSC clients are able to log into my.osc.edu during the downtime but no changes will take place until the downtime is completed. In preparation for the downtime, the batch scheduler will begin holding jobs that cannot be completed before 7 a.m., August 18, 2020.
Core Ethernet network changes on 2020-07-09 at 09:00
Four 40GbE uplinks for a new switch that will support the Pitzer expansion will be installed on Thursday July 9, 2020 at 09:00. This is a routine non-service affecting change.
GAMESS 30Sep2019R2 is available on Owens and Pitzer
GAMESS version 30Sep2019R2 has been installed on Owens and Pitzer. Usage is via the module gamess/30Sep2019R2. For installation details use command: "module help gamess/30Sep2019R2". For help loading an installation, use command: "module spider gamess/30Sep2019R2".
intel mpi Default Version Update to 2019.7
The previous intel mpi default version is 2019.3, however this version had an issue with MPI-IO in home directories, so we updated the default version to 2019.7 on June 15, 2020.
Applications built with intel mpi version 2019.3 should work with version 2019.7 without rebuilding.
We also removed intel mpi version 2019.5 that had another MPI-IO related issue on June 15.
For more detail, visit:
https://www.osc.edu/resources/available_software/software_list/intel_mpi
If you have any questions, please contact OSC Help.
HOWTO: Use Address Sanitizer
Address Sanitizer is a tool developed by Google detect memory access error such as use-after-free and memory leaks. It is built into GCC versions >= 4.8 and can be used on both C and C++ codes. Address Sanitizer uses runtime instrumentation to track memory allocations, which mean you must build your code with Address Sanitizer to take advantage of it's features.
There is extensive documentation on the AddressSanitizer Github Wiki.