You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@arrow.apache.org by "Oksana Shadura (Jira)" <ji...@apache.org> on 2021/01/05 16:17:00 UTC
[jira] [Updated] (ARROW-11133) Illegal instruction while importing
pyarrow
[ https://issues.apache.org/jira/browse/ARROW-11133?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Oksana Shadura updated ARROW-11133:
-----------------------------------
Description:
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 8
On-line CPU(s) list: 0-7
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 2
NUMA node(s): 2
Vendor ID: AuthenticAMD
CPU family: 16
Model: 2
Model name: Quad-Core AMD Opteron(tm) Processor 2354
Stepping: 3
CPU MHz: 1100.000
CPU max MHz: 2200.0000
CPU min MHz: 1100.0000
BogoMIPS: 4400.67
Virtualization: AMD-V
L1d cache: 512 KiB
L1i cache: 512 KiB
L2 cache: 4 MiB
L3 cache: 4 MiB
NUMA node0 CPU(s): 0-3
NUMA node1 CPU(s): 4-7
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~${code}
was:
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 8
On-line CPU(s) list: 0-7
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 2
NUMA node(s): 2
Vendor ID: AuthenticAMD
CPU family: 16
Model: 2
Model name: Quad-Core AMD Opteron(tm) Processor 2354
Stepping: 3
CPU MHz: 1100.000
CPU max MHz: 2200.0000
CPU min MHz: 1100.0000
BogoMIPS: 4400.67
Virtualization: AMD-V
L1d cache: 512 KiB
L1i cache: 512 KiB
L2 cache: 4 MiB
L3 cache: 4 MiB
NUMA node0 CPU(s): 0-3
NUMA node1 CPU(s): 4-7
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$
> Illegal instruction while importing pyarrow
> -------------------------------------------
>
> Key: ARROW-11133
> URL: https://issues.apache.org/jira/browse/ARROW-11133
> Project: Apache Arrow
> Issue Type: Bug
> Components: Packaging
> Affects Versions: 1.0.1
> Environment: Docker image based on jupyter/minimal-notebook:latest
> Reporter: Oksana Shadura
> Priority: Major
>
> While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python
> Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52)
> [GCC 9.3.0] on linux
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import pyarrow
> Illegal instruction (core dumped){code}
> Hardware:
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu
> Architecture: x86_64
> CPU op-mode(s): 32-bit, 64-bit
> Byte Order: Little Endian
> Address sizes: 48 bits physical, 48 bits virtual
> CPU(s): 8
> On-line CPU(s) list: 0-7
> Thread(s) per core: 1
> Core(s) per socket: 4
> Socket(s): 2
> NUMA node(s): 2
> Vendor ID: AuthenticAMD
> CPU family: 16
> Model: 2
> Model name: Quad-Core AMD Opteron(tm) Processor 2354
> Stepping: 3
> CPU MHz: 1100.000
> CPU max MHz: 2200.0000
> CPU min MHz: 1100.0000
> BogoMIPS: 4400.67
> Virtualization: AMD-V
> L1d cache: 512 KiB
> L1i cache: 512 KiB
> L2 cache: 4 MiB
> L3 cache: 4 MiB
> NUMA node0 CPU(s): 0-3
> NUMA node1 CPU(s): 4-7
> Vulnerability Itlb multihit: Not affected
> Vulnerability L1tf: Not affected
> Vulnerability Mds: Not affected
> Vulnerability Meltdown: Not affected
> Vulnerability Spec store bypass: Not affected
> Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
> Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
> Vulnerability Tsx async abort: Not affected
> Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
> 6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~${code}
--
This message was sent by Atlassian Jira
(v8.3.4#803005)