You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@arrow.apache.org by "Oksana Shadura (Jira)" <ji...@apache.org> on 2021/01/05 16:17:00 UTC

[jira] [Updated] (ARROW-11133) Illegal instruction while importing pyarrow

     [ https://issues.apache.org/jira/browse/ARROW-11133?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Oksana Shadura updated ARROW-11133:
-----------------------------------
    Description: 
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python 
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52) 
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu 
 Architecture: x86_64
 CPU op-mode(s): 32-bit, 64-bit
 Byte Order: Little Endian
 Address sizes: 48 bits physical, 48 bits virtual
 CPU(s): 8
 On-line CPU(s) list: 0-7
 Thread(s) per core: 1
 Core(s) per socket: 4
 Socket(s): 2
 NUMA node(s): 2
 Vendor ID: AuthenticAMD
 CPU family: 16
 Model: 2
 Model name: Quad-Core AMD Opteron(tm) Processor 2354
 Stepping: 3
 CPU MHz: 1100.000
 CPU max MHz: 2200.0000
 CPU min MHz: 1100.0000
 BogoMIPS: 4400.67
 Virtualization: AMD-V
 L1d cache: 512 KiB
 L1i cache: 512 KiB
 L2 cache: 4 MiB
 L3 cache: 4 MiB
 NUMA node0 CPU(s): 0-3
 NUMA node1 CPU(s): 4-7
 Vulnerability Itlb multihit: Not affected
 Vulnerability L1tf: Not affected
 Vulnerability Mds: Not affected
 Vulnerability Meltdown: Not affected
 Vulnerability Spec store bypass: Not affected
 Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
 Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
 Vulnerability Tsx async abort: Not affected
 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
 6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
 jovyan@jupyter-oksana-2eshadura-40cern-2ech:~${code}

  was:
While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
{code:java}
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python 
Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52) 
[GCC 9.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import pyarrow
Illegal instruction (core dumped){code}
Hardware:
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu 
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   48 bits physical, 48 bits virtual
CPU(s):                          8
On-line CPU(s) list:             0-7
Thread(s) per core:              1
Core(s) per socket:              4
Socket(s):                       2
NUMA node(s):                    2
Vendor ID:                       AuthenticAMD
CPU family:                      16
Model:                           2
Model name:                      Quad-Core AMD Opteron(tm) Processor 2354
Stepping:                        3
CPU MHz:                         1100.000
CPU max MHz:                     2200.0000
CPU min MHz:                     1100.0000
BogoMIPS:                        4400.67
Virtualization:                  AMD-V
L1d cache:                       512 KiB
L1i cache:                       512 KiB
L2 cache:                        4 MiB
L3 cache:                        4 MiB
NUMA node0 CPU(s):               0-3
NUMA node1 CPU(s):               4-7
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Spec store bypass: Not affected
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
                                 6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$


> Illegal instruction while importing pyarrow
> -------------------------------------------
>
>                 Key: ARROW-11133
>                 URL: https://issues.apache.org/jira/browse/ARROW-11133
>             Project: Apache Arrow
>          Issue Type: Bug
>          Components: Packaging
>    Affects Versions: 1.0.1
>         Environment: Docker image based on jupyter/minimal-notebook:latest
>            Reporter: Oksana Shadura
>            Priority: Major
>
> While importing Pyarrow we got an illegal instruction (pyarrow version is 1.0.1)
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ python 
> Python 3.8.6 | packaged by conda-forge | (default, Nov 27 2020, 19:31:52) 
> [GCC 9.3.0] on linux
> Type "help", "copyright", "credits" or "license" for more information.
> >>> import pyarrow
> Illegal instruction (core dumped){code}
> Hardware:
> {code:java}
> jovyan@jupyter-oksana-2eshadura-40cern-2ech:~$ lscpu 
>  Architecture: x86_64
>  CPU op-mode(s): 32-bit, 64-bit
>  Byte Order: Little Endian
>  Address sizes: 48 bits physical, 48 bits virtual
>  CPU(s): 8
>  On-line CPU(s) list: 0-7
>  Thread(s) per core: 1
>  Core(s) per socket: 4
>  Socket(s): 2
>  NUMA node(s): 2
>  Vendor ID: AuthenticAMD
>  CPU family: 16
>  Model: 2
>  Model name: Quad-Core AMD Opteron(tm) Processor 2354
>  Stepping: 3
>  CPU MHz: 1100.000
>  CPU max MHz: 2200.0000
>  CPU min MHz: 1100.0000
>  BogoMIPS: 4400.67
>  Virtualization: AMD-V
>  L1d cache: 512 KiB
>  L1i cache: 512 KiB
>  L2 cache: 4 MiB
>  L3 cache: 4 MiB
>  NUMA node0 CPU(s): 0-3
>  NUMA node1 CPU(s): 4-7
>  Vulnerability Itlb multihit: Not affected
>  Vulnerability L1tf: Not affected
>  Vulnerability Mds: Not affected
>  Vulnerability Meltdown: Not affected
>  Vulnerability Spec store bypass: Not affected
>  Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
>  Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
>  Vulnerability Tsx async abort: Not affected
>  Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pni monitor cx1
>  6 popcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs hw_pstate vmmcall npt lbrv svm_lock
>  jovyan@jupyter-oksana-2eshadura-40cern-2ech:~${code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)