Owens

Backup failures for Project on August 1st and 2nd

OSC experienced backup failures on our GPFS file systems (both Project file systems, /fs/project and /fs/ess) the mornings of August 1st and 2nd. The underlying cause was identified and backups were operating as expected the morning of August 3rd. As a result of these failed backups, OSC will not be able to complete some file restore requests for files changed between approximately 2020-07-31 02:30 through 2020-08-02 02:30.

System Downtime August 18, 2020

A downtime for all OSC HPC systems is scheduled from 7 a.m. to 9 p.m., Tuesday, August 18, 2020. The downtime will affect the Pitzer, Ruby and Owens Clusters, web portals and HPC file servers. Login services, except for my.osc.edu, will not be available during this time. OSC clients are able to log into my.osc.edu during the downtime but no changes will take place until the downtime is completed. In preparation for the downtime, the batch scheduler will begin holding jobs that cannot be completed before 7 a.m., August 18, 2020.

PETSc

PETSc is a suite of data structures and routines for the scalable (parallel) solution of scientific applications modeled by partial differential equations. It supports MPI, and GPUs through CUDA or OpenCL, as well as hybrid MPI-GPU parallelism. The supported libraries include f2cblaslapack, superlu, ptso, metis, parmetis, mumps, hypre and scalapack.

intel mpi Default Version Update to 2019.7

The previous intel mpi default version is 2019.3, however this version had an issue with MPI-IO in home directories, so we updated the default version to 2019.7 on June 15, 2020. Applications built with intel mpi version 2019.3 should work with version 2019.7 without rebuilding. We also removed intel mpi version 2019.5 that had another MPI-IO related issue on June 15. For more detail, visit: https://www.osc.edu/resources/available_software/software_list/intel_mpi If you have any questions, please contact OSC Help.

HOWTO: Use Address Sanitizer

Address Sanitizer is a tool developed by Google detect memory access error such as use-after-free and memory leaks. It is built into GCC versions >= 4.8 and can be used on both C and C++ codes. Address Sanitizer uses runtime instrumentation to track memory allocations, which mean you must build your code with Address Sanitizer to take advantage of it's features.

There is extensive documentation on the AddressSanitizer Github Wiki.

Pages