[
https://issues.apache.org/jira/browse/ARROW-11133?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Oksana Shadura updated ARROW-11133:
-----------------------------------
Description:
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 8
On-line CPU(s) list: 0-7
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 2
NUMA node(s): 2
Vendor ID: AuthenticAMD
CPU family: 16
Model: 2
Model name: Quad-Core AMD Opteron(tm) Processor 2354
Stepping: 3
CPU MHz: 1100.000
CPU max MHz: 2200.0000
CPU min MHz: 1100.0000
BogoMIPS: 4400.67
Virtualization: AMD-V
L1d cache: 512 KiB
L1i cache: 512 KiB
L2 cache: 4 MiB
L3 cache: 4 MiB
NUMA node0 CPU(s): 0-3
NUMA node1 CPU(s): 4-7
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user
pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB
filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36
clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm
3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni
monitor cx1
6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse
3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock{code}
was:
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 8
On-line CPU(s) list: 0-7
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 2
NUMA node(s): 2
Vendor ID: AuthenticAMD
CPU family: 16
Model: 2
Model name: Quad-Core AMD Opteron(tm) Processor 2354
Stepping: 3
CPU MHz: 1100.000
CPU max MHz: 2200.0000
CPU min MHz: 1100.0000
BogoMIPS: 4400.67
Virtualization: AMD-V
L1d cache: 512 KiB
L1i cache: 512 KiB
L2 cache: 4 MiB
L3 cache: 4 MiB
NUMA node0 CPU(s): 0-3
NUMA node1 CPU(s): 4-7
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user
pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB
filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36
clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm
3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni
monitor cx1
6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse
3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~${code}
> Illegal instruction while importing pyarrow
> -------------------------------------------
>
> Key: ARROW-11133
> URL: https://issues.apache.org/jira/browse/ARROW-11133
> Project: Apache Arrow
> Issue Type: Bug
> Components: Packaging
> Affects Versions: 1.0.1
> Environment: Docker image based on jupyter/minimal-notebook:latest
> Reporter: Oksana Shadura
> Priority: Major
>
> While importing Pyarrow we got an illegal instruction (pyarrow version is
> 1.0.1)
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
> Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
> [GCC 9.3.0] on linux
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import pyarrow
> Illegal instruction (core dumped){code}
> Hardware:
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
> Architecture: x86_64
> CPU op-mode(s): 32-bit, 64-bit
> Byte Order: Little Endian
> Address sizes: 48 bits physical, 48 bits virtual
> CPU(s): 8
> On-line CPU(s) list: 0-7
> Thread(s) per core: 1
> Core(s) per socket: 4
> Socket(s): 2
> NUMA node(s): 2
> Vendor ID: AuthenticAMD
> CPU family: 16
> Model: 2
> Model name: Quad-Core AMD Opteron(tm) Processor 2354
> Stepping: 3
> CPU MHz: 1100.000
> CPU max MHz: 2200.0000
> CPU min MHz: 1100.0000
> BogoMIPS: 4400.67
> Virtualization: AMD-V
> L1d cache: 512 KiB
> L1i cache: 512 KiB
> L2 cache: 4 MiB
> L3 cache: 4 MiB
> NUMA node0 CPU(s): 0-3
> NUMA node1 CPU(s): 4-7
> Vulnerability Itlb multihit: Not affected
> Vulnerability L1tf: Not affected
> Vulnerability Mds: Not affected
> Vulnerability Meltdown: Not affected
> Vulnerability Spec store bypass: Not affected
> Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user
> pointer sanitization
> Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled,
> RSB filling
> Vulnerability Tsx async abort: Not affected
> Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat
> pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp
> lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid
> pni monitor cx1
> 6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse
> 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock{code}
--
This message was sent by Atlassian Jira
(v8.3.4#803005)