<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.clustermonkey.net/cdp/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shewmaker</id>
		<title>Cluster Documentation Project - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.clustermonkey.net/cdp/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shewmaker"/>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php/Special:Contributions/Shewmaker"/>
		<updated>2026-05-06T12:18:15Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1687</id>
		<title>Talk:Cluster Benchmarking Packages</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1687"/>
				<updated>2006-02-27T06:43:32Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It seems HINT has disappeared?!&lt;br /&gt;
&lt;br /&gt;
It used to be at:&lt;br /&gt;
http://www.scl.ameslab.gov/HINT/&lt;br /&gt;
&lt;br /&gt;
Cheers&lt;br /&gt;
Steve&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I always liked HINT.&lt;br /&gt;
&lt;br /&gt;
A company called [http://www.scl.ameslab.gov/Projects/old/ClusterCookbook/hintrun.html Technology Labs] tried to spin off the Analytical HINT technology, but they went out of business.&lt;br /&gt;
&lt;br /&gt;
It later popped up on at hint.byu.edu, but it's no longer there.&lt;br /&gt;
&lt;br /&gt;
The only version I could find to download off of the web is this  [http://www.ima.umn.edu/~coult/hint.tar.gz serial UNIX HINT]&lt;br /&gt;
&lt;br /&gt;
Paul A. Farrell has [http://discov.cs.kent.edu/resources/perf/hint/ serial, threaded, and PVM versions of HINT] on his web site.&lt;br /&gt;
&lt;br /&gt;
I might have a copy of the MPI version somewhere.  I'll look.&lt;br /&gt;
&lt;br /&gt;
Andrew Shewmaker&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1686</id>
		<title>Talk:Cluster Benchmarking Packages</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1686"/>
				<updated>2006-02-24T21:53:26Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It seems HINT has disappeared?!&lt;br /&gt;
&lt;br /&gt;
It used to be at:&lt;br /&gt;
http://www.scl.ameslab.gov/HINT/&lt;br /&gt;
&lt;br /&gt;
Cheers&lt;br /&gt;
Steve&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I always liked HINT.&lt;br /&gt;
&lt;br /&gt;
A company called [http://www.scl.ameslab.gov/Projects/old/ClusterCookbook/hintrun.html Technology Labs] tried to spin off the Analytical HINT technology, but they went out of business.&lt;br /&gt;
&lt;br /&gt;
It later popped up on at hint.byu.edu, but it's no longer there.&lt;br /&gt;
&lt;br /&gt;
The only version I could find to download off of the web is this  [http://www.ima.umn.edu/~coult/hint.tar.gz serial UNIX HINT]&lt;br /&gt;
&lt;br /&gt;
I might have a copy of the MPI version somewhere.  I'll look.&lt;br /&gt;
&lt;br /&gt;
Andrew Shewmaker&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1685</id>
		<title>Passwordless SSH (and RSH) Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1685"/>
				<updated>2006-02-23T04:00:10Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER:''' Implementing any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very BAD thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''OpenSSH Public Key Authentication'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from Robert G Brown (aka RGB) at Duke University email on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
A more secure option is to use a non-blank passphrase.  In this case, you will have to use a couple more ssh tools (once per session).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
guest@localhost$ ssh-agent $SHELL&lt;br /&gt;
guest@localhost$ ssh-add&lt;br /&gt;
Enter passphrase for /home/guest/.ssh/id_rsa: &lt;br /&gt;
Identity added: /home/guest/.ssh/id_rsa (/home/guest/.ssh/id_rsa)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If entering the passphrase once per session is annoying, then you should try [http://www.gentoo.org/proj/en/keychain/index.xml keychain], which will reuse ssh-agents across all of your sessions.  The associated IBM developerWorks articles are very nice introductions to openssh public key authentication. &lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; (it'll whinge that you should use the command line option - ignore it) &lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in '''both''' directions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OpenSSH hostbased authentication'''&lt;br /&gt;
&lt;br /&gt;
A cluster adminstrator may want to save his users the trouble of setting up public keys themselves by enabling [http://www.omega.telia.net/vici/openssh/ hostbased authentication].  Keep in mind that if someone compromises your trusted host(s), then they will have comprimised your entire cluster. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RLOGIN and RSH'''&lt;br /&gt;
&lt;br /&gt;
There's a fair degree of implementation difference between distro's. The RedHat flavours and derivatives all seem to be vaguely similar. You always want the non-Kerberos version of the &amp;quot;R&amp;quot; utilites. Rather than producing the whole thing, here's a link to an articles that worked for the author:&lt;br /&gt;
&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/Enabling%20RSH/RLOGIN%20without%20a%20password%20%28even%20for%20root%21%29&lt;br /&gt;
&lt;br /&gt;
Here's the upstream URL too: http://howto.x-tend.be/openMosixWiki/index.php/ -&amp;gt; Stick &amp;quot;RSH&amp;quot; in the search box.&lt;br /&gt;
&lt;br /&gt;
In some respects the R utilites are quicker than their chatty SSH cousins. However, this becomes irrelevant after MPI starts up (that by design handles its own comms after the link is established). Also a lot of utilites leave their SSH connection open rather than rsh which they rerun on every request (eg. MOODSS).&lt;br /&gt;
&lt;br /&gt;
Seriously think about *why* you want RSH/RLOGIN. As you can see above, SSH isn't hard and (I'd argue) a bit easier!&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1684</id>
		<title>Passwordless SSH (and RSH) Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1684"/>
				<updated>2006-02-23T03:48:58Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER:''' Implementing any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very BAD thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from Robert G Brown (aka RGB) at Duke University email on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
A more secure option is to use a non-blank passphrase.  In this case, you will have to use a couple more ssh tools (once per session).&lt;br /&gt;
&lt;br /&gt;
guest@localhost$ ssh-agent $SHELL&lt;br /&gt;
guest@localhost$ ssh-add&lt;br /&gt;
Enter passphrase for /home/guest/.ssh/id_rsa: &lt;br /&gt;
Identity added: /home/guest/.ssh/id_rsa (/home/guest/.ssh/id_rsa)&lt;br /&gt;
&lt;br /&gt;
If entering the passphrase once per session is annoying, then you should try [http://www.gentoo.org/proj/en/keychain/index.xml keychain], which will reuse ssh-agents across all of your sessions.  The associated IBM developerWorks articles are very nice introductions to openssh public key authentication. &lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; (it'll whinge that you should use the command line option - ignore it) &lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in '''both''' directions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RLOGIN and RSH'''&lt;br /&gt;
&lt;br /&gt;
There's a fair degree of implementation difference between distro's. The RedHat flavours and derivatives all seem to be vaguely similar. You always want the non-Kerberos version of the &amp;quot;R&amp;quot; utilites. Rather than producing the whole thing, here's a link to an articles that worked for the author:&lt;br /&gt;
&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/Enabling%20RSH/RLOGIN%20without%20a%20password%20%28even%20for%20root%21%29&lt;br /&gt;
&lt;br /&gt;
Here's the upstream URL too: http://howto.x-tend.be/openMosixWiki/index.php/ -&amp;gt; Stick &amp;quot;RSH&amp;quot; in the search box.&lt;br /&gt;
&lt;br /&gt;
In some respects the R utilites are quicker than their chatty SSH cousins. However, this becomes irrelevant after MPI starts up (that by design handles its own comms after the link is established). Also a lot of utilites leave their SSH connection open rather than rsh which they rerun on every request (eg. MOODSS).&lt;br /&gt;
&lt;br /&gt;
Seriously think about *why* you want RSH/RLOGIN. As you can see above, SSH isn't hard and (I'd argue) a bit easier!&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Care_and_Feeding_of_Government_Labs:_What%27s_Next%3F&amp;diff=1683</id>
		<title>Care and Feeding of Government Labs: What's Next?</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Care_and_Feeding_of_Government_Labs:_What%27s_Next%3F&amp;diff=1683"/>
				<updated>2006-02-23T03:23:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==List Of DOE Linux/Cluster Projects==&lt;br /&gt;
&lt;br /&gt;
The US Department Of Energy labs sponsor or are members of many Linux and Cluster projects.  Note that there is cooperation as well as competition among the labs.&lt;br /&gt;
&lt;br /&gt;
'''Umbrella Projects'''&lt;br /&gt;
*  [http://www.clustermatic.org Clustermatic]&lt;br /&gt;
*  [http://www.llnl.gov/linux/ Linux @ Livermore]&lt;br /&gt;
*  [http://www.scidac.org SciDAC]&lt;br /&gt;
*  [http://www.scl.ameslab.gov/projects.html Scalable Computing Laboratory Projects] (Ames and Iowa State University)&lt;br /&gt;
*  [http://www.csm.ornl.gov/torc/ TORC]&lt;br /&gt;
&lt;br /&gt;
'''Firmware and Kernel level projects'''&lt;br /&gt;
*  [http://bproc.sf.net BProc]&lt;br /&gt;
*  [http://www.linuxbios.org LinuxBIOS]&lt;br /&gt;
*  [http://www.lustre.org Lustre]&lt;br /&gt;
*  [http://www.openib.org OpenIB]&lt;br /&gt;
*  [http://www.pvfs.org PVFS]&lt;br /&gt;
*  [http://swik.net/v9fs v9fs]&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/zeptoos/ ZeptoOS]&lt;br /&gt;
&lt;br /&gt;
'''Operating Systems, Distributions, and Configuration Management Tools'''&lt;br /&gt;
*  [http://www.llnl.gov/linux/conman/conman.html ConMan]&lt;br /&gt;
*  [http://www.llnl.gov/linux/genders/genders.html Genders]&lt;br /&gt;
*  [http://www.onesis.org oneSIS]&lt;br /&gt;
*  [http://oscar.openclustergroup.org OSCAR]&lt;br /&gt;
*  [http://www.llnl.gov/linux/powerman/powerman.html PowerMan]&lt;br /&gt;
*  [https://www.scientificlinux.org Scientific Linux]&lt;br /&gt;
*  [http://www.yaci.org Yet Another Cluster Installer]&lt;br /&gt;
&lt;br /&gt;
'''Programming Tools and Libraries'''&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/mpi/mpich/ MPICH]&lt;br /&gt;
*  [http://www.open-mpi.org Open MPI]&lt;br /&gt;
*  [http://www.eclipse.org/photran/ Photran] - a Fortran IDE based on Eclipse&lt;br /&gt;
*  [http://upc.nersc.gov Berkeley Unified Parallel C]&lt;br /&gt;
&lt;br /&gt;
'''Visualization'''&lt;br /&gt;
*  [http://www.llnl.gov/visit/ VisIt]&lt;br /&gt;
*  [http://www.paraview.org ParaView]&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/perfvis/ Performance Visualization]&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Care_and_Feeding_of_Government_Labs:_What%27s_Next%3F&amp;diff=1682</id>
		<title>Care and Feeding of Government Labs: What's Next?</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Care_and_Feeding_of_Government_Labs:_What%27s_Next%3F&amp;diff=1682"/>
				<updated>2006-02-23T03:00:06Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==List Of DOE Linux/Cluster Projects==&lt;br /&gt;
&lt;br /&gt;
The US Department Of Energy labs sponsor or are members of many Linux and Cluster projects.&lt;br /&gt;
&lt;br /&gt;
'''Umbrella Projects'''&lt;br /&gt;
*  [http://www.clustermatic.org Clustermatic]&lt;br /&gt;
*  [http://www.llnl.gov/linux/ Linux @ Livermore]&lt;br /&gt;
*  [http://www.scidac.org SciDAC]&lt;br /&gt;
*  [http://www.scl.ameslab.gov/projects.html Scalable Computing Laboratory Projects] (Ames Laboratory and Iowa State University)&lt;br /&gt;
*  [http://www.csm.ornl.gov/torc/ TORC]&lt;br /&gt;
&lt;br /&gt;
'''Firmware and Kernel level projects'''&lt;br /&gt;
*  [http://bproc.sf.net BProc]&lt;br /&gt;
*  [http://www.linuxbios.org LinuxBIOS]&lt;br /&gt;
*  [http://www.lustre.org Lustre]&lt;br /&gt;
*  [http://www.openib.org OpenIB]&lt;br /&gt;
*  [http://www.pvfs.org PVFS]&lt;br /&gt;
*  [http://swik.net/v9fs v9fs]&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/zeptoos/ ZeptoOS]&lt;br /&gt;
&lt;br /&gt;
'''Operating Systems, Distributions, and Configuration Management Tools'''&lt;br /&gt;
*  [http://www.onesis.org oneSIS]&lt;br /&gt;
*  [http://oscar.openclustergroup.org OSCAR]&lt;br /&gt;
*  [https://www.scientificlinux.org Scientific Linux]&lt;br /&gt;
*  [http://www.yaci.org Yet Another Cluster Installer]&lt;br /&gt;
&lt;br /&gt;
'''Programming Tools and Libraries'''&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/mpi/mpich/ MPICH]&lt;br /&gt;
*  [http://www.open-mpi.org Open MPI]&lt;br /&gt;
*  [http://www.eclipse.org/photran/ Photran] - a Fortran IDE based on Eclipse&lt;br /&gt;
*  [http://upc.nersc.gov Berkeley Unified Parallel C]&lt;br /&gt;
&lt;br /&gt;
'''Visualization'''&lt;br /&gt;
*  [http://www.llnl.gov/visit/ VisIt]&lt;br /&gt;
*  [http://www.paraview.org ParaView]&lt;br /&gt;
*  [http://www-unix.mcs.anl.gov/perfvis/ Performance Visualization]&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1667</id>
		<title>Memory</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1667"/>
				<updated>2006-02-21T06:48:01Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Error Detection And Correction==&lt;br /&gt;
&lt;br /&gt;
A cluster of systems with large amounts of RAM provides system integrators and administrators with an opportunity to become familiar with [http://en.wikipedia.org/wiki/Soft_error Soft Errors].&lt;br /&gt;
&lt;br /&gt;
According to arch/*/kernel/mce.c and arch/*/kernel/traps.c, Linux kernels older than 2.6.16 will either see an uncorrectable bit error as a Machine Check Exception (MCE), print out a message with the DIMM bank, and panic; or as a Non-Maskable Interrupt (NMI) and continue on with a &amp;quot;Dazed&amp;quot; message.  An NMI would be seen if MCE panic was disabled with the mce=off kernel boot parameter.&lt;br /&gt;
&lt;br /&gt;
There are new capabilites beginning with the 2.6.16 kernel.  The code from the [http://bluesmoke.sourceforge.net EDAC] project was merged into the kernel as optional modules.  The modules provide counters for correctable and uncorrectable errors, the ability to reset counters through sysfs, a reset counter - seconds since last reset, etc.&lt;br /&gt;
&lt;br /&gt;
*  [http://lwn.net/Articles/168972/ short LWN EDAC writeup]&lt;br /&gt;
*  [http://lwn.net/Articles/168975/ edac.txt from the 2.6.16 kernel docs]&lt;br /&gt;
&lt;br /&gt;
The Linux EDAC modules support the following memory controllers:&lt;br /&gt;
&lt;br /&gt;
* AMD 76x&lt;br /&gt;
* Intel e752x&lt;br /&gt;
* Intel e7xxx&lt;br /&gt;
* Intel 82860&lt;br /&gt;
* Intel D82875P&lt;br /&gt;
* Radisys 82600&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==I/O on 64-bit Systems With Large Amounts of Memory==&lt;br /&gt;
&lt;br /&gt;
Part of the transition from 32-bit x86 to x86_64 with large amounts of memory involves handling I/O devices that only support 32-bit memory addresses.  AMD products include a hardware IOMMU that makes everything work transparently, for the most part.  Intel EM64T and IA64 products do not include an IOMMU, so the Linux kernel implements a &amp;quot;software I/O translation buffer&amp;quot;.  The memory allocated to the swiotlb is made unavailable to normal processes, and some device drivers (such as the proprietary [http://download.nvidia.com/XFree86/Linux-x86_64/1.0-8178/README/appendix-l.html NVIDIA graphics driver]) may require more memory to be reserved in order to operate reliably.  See the Linux kernel's documentation for information about the swiotlb and iommu boot parameters.  Much of the information summarized in this paragraph was learned from an [http://lwn.net/Articles/91870/ LWN DMA article] by Jonathan Corbet.&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1666</id>
		<title>Memory</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1666"/>
				<updated>2006-02-21T02:57:10Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: swiotlb&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Error Detection And Correction'''&lt;br /&gt;
&lt;br /&gt;
A cluster of systems with large amounts of RAM provides system integrators and administrators with an opportunity to become familiar with [http://en.wikipedia.org/wiki/Soft_error Soft Errors].&lt;br /&gt;
&lt;br /&gt;
According to arch/*/kernel/mce.c and arch/*/kernel/traps.c, Linux kernels older than 2.6.16 will either see an uncorrectable bit error as a Machine Check Exception (MCE), print out a message with the DIMM bank, and panic; or as an NMI and continue on with a &amp;quot;Dazed&amp;quot; message.  An NMI would be seen if MCE panic was disabled with the mce=off boot parameter.&lt;br /&gt;
&lt;br /&gt;
There are new capabilites beginning with the 2.6.16 kernel.  The code from the [http://bluesmoke.sourceforge.net EDAC] project was merged into the kernel as optional modules.  The modules provide counters for correctable and uncorrectable errors, the ability to reset counters through sysfs, a reset counter - seconds since last reset, etc.&lt;br /&gt;
&lt;br /&gt;
 * [http://lwn.net/Articles/168972/ short LWN EDAC writeup]&lt;br /&gt;
 * [http://lwn.net/Articles/168975/ edac.txt from the 2.6.16 kernel docs]&lt;br /&gt;
&lt;br /&gt;
The Linux EDAC modules support the following memory controllers:&lt;br /&gt;
&lt;br /&gt;
 * AMD 76x&lt;br /&gt;
 * Intel e752x&lt;br /&gt;
 * Intel e7xxx&lt;br /&gt;
 * Intel 82860&lt;br /&gt;
 * Intel D82875P&lt;br /&gt;
 * Radisys 82600&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''I/O on 64-bit Systems With Large Amount of Memory'''&lt;br /&gt;
&lt;br /&gt;
Part of the transition from 32-bit x86 to x86_64 with large amounts of memory involves handling I/O devices that only support 32-bit memory addresses.  The AMD chipsets include a hardware IOMMU that makes everything work transparently.  Intel EM64T (and IA64) chipsets do not include an IOMMU, so the Linux kernel implements a &amp;quot;software I/O translation buffer&amp;quot;.  The memory allocated to the swiotlb is made unavailable to normal processes, and some devices (such a NVIDIA graphic cards) may require more memory to be reserved in order to operate reliably.  See the Linux kernel's documentation for information about the swiotlb boot parameter.  This paragraph is a short summary of part of an [http://lwn.net/Articles/91870/ LWN DMA article] by Jonathan Corbet.&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1665</id>
		<title>Memory</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Memory&amp;diff=1665"/>
				<updated>2006-02-21T02:18:36Z</updated>
		
		<summary type="html">&lt;p&gt;Shewmaker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Error Detection And Correction'''&lt;br /&gt;
&lt;br /&gt;
A cluster of systems with large amounts of RAM provides system integrators and administrators with an opportunity to become familiar with [http://en.wikipedia.org/wiki/Soft_error Soft Errors].&lt;br /&gt;
&lt;br /&gt;
According to arch/*/kernel/mce.c and arch/*/kernel/traps.c, Linux kernels older than 2.6.16 will either see an uncorrectable bit error as a Machine Check Exception (MCE), print out a message with the DIMM bank, and panic; or as an NMI and continue on with a &amp;quot;Dazed&amp;quot; message.  An NMI would be seen if MCE panic was disabled with the mce=off boot parameter.&lt;br /&gt;
&lt;br /&gt;
There are new capabilites beginning with the 2.6.16 kernel.  The code from the [http://bluesmoke.sourceforge.net EDAC] project was merged into the kernel as optional modules.  The modules provide counters for correctable and uncorrectable errors, the ability to reset counters through sysfs, a reset counter - seconds since last reset, etc.&lt;br /&gt;
&lt;br /&gt;
 * [http://lwn.net/Articles/168972/ short LWN EDAC writeup]&lt;br /&gt;
 * [http://lwn.net/Articles/168975/ edac.txt from the 2.6.16 kernel docs]&lt;br /&gt;
&lt;br /&gt;
The Linux EDAC modules support the following memory controllers:&lt;br /&gt;
&lt;br /&gt;
 * AMD 76x&lt;br /&gt;
 * Intel e752x&lt;br /&gt;
 * Intel e7xxx&lt;br /&gt;
 * Intel 82860&lt;br /&gt;
 * Intel D82875P&lt;br /&gt;
 * Radisys 82600&lt;/div&gt;</summary>
		<author><name>Shewmaker</name></author>	</entry>

	</feed>