Bug 2103311 - ovn binaries crashes with Illegal instruction (core dumped) on certain CPU models
Summary: ovn binaries crashes with Illegal instruction (core dumped) on certain CPU mo...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux Fast Datapath
Classification: Red Hat
Component: ovn22.03
Version: FDP 22.B
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ---
Assignee: Ales Musil
QA Contact: Jianlin Shi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-07-02 04:06 UTC by OVN Bot
Modified: 2022-08-01 15:58 UTC (History)
10 users (show)

Fixed In Version: ovn22.03-22.03.0-62.el9fdp
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-08-01 15:58:08 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker FD-2079 0 None None None 2022-07-02 04:10:28 UTC
Red Hat Product Errata RHBA-2022:5796 0 None None None 2022-08-01 15:58:11 UTC

Description OVN Bot 2022-07-02 04:06:03 UTC
This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2102618

Comment 1 OVN Bot 2022-07-02 04:06:09 UTC
This issue is fixed in ovn22.03-22.03.0-62.el9fdp

Comment 7 Jianlin Shi 2022-07-13 07:08:30 UTC
tested on system provided by Yatin Karel, reproduced on ovn22.03-52:

[zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-52]$ ovn-nbctl --version                            
Illegal instruction (core dumped)
[zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-52]$ rpm -qa | grep -E "ovn22.03|openvswitch"       
openvswitch-selinux-extra-policy-1.0-31.el9s.noarch
network-scripts-openvswitch2.15-2.15.0-99.el9s.x86_64                                                 
openvswitch2.15-2.15.0-99.el9s.x86_64                                                                 
rdo-openvswitch-2.15-2.el9s.noarch
centos-release-nfv-openvswitch-1-4.el9s.noarch                                                        
ovn22.03-22.03.0-52.el9fdp.x86_64
ovn22.03-central-22.03.0-52.el9fdp.x86_64
ovn22.03-host-22.03.0-52.el9fdp.x86_64 

Verified on ovn22.03-62:

[zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-62]$ ovn-nbctl --version                            
ovn-nbctl 22.03.2                                                                                     
Open vSwitch Library 2.17.90                                                                          
DB Schema 6.1.0                                                                                       
[zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-62]$ rpm -qa | grep -E "ovn22.03|openvswitch"       
openvswitch-selinux-extra-policy-1.0-31.el9s.noarch                                                   
network-scripts-openvswitch2.15-2.15.0-99.el9s.x86_64                                                 
openvswitch2.15-2.15.0-99.el9s.x86_64                                                                 
rdo-openvswitch-2.15-2.el9s.noarch                                                                    
centos-release-nfv-openvswitch-1-4.el9s.noarch                                                        
ovn22.03-22.03.0-62.el9fdp.x86_64                                                                     
ovn22.03-central-22.03.0-62.el9fdp.x86_64                                                             
ovn22.03-host-22.03.0-62.el9fdp.x86_64

Comment 8 Jianlin Shi 2022-07-13 07:28:16 UTC
[zuul@centos-9-stream-rax-ord-0030375827 ~]$ lscpu 
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         46 bits physical, 48 bits virtual                                            
  Byte Order:            Little Endian                                                                
CPU(s):                  8
  On-line CPU(s) list:   0-7                                                                          
Vendor ID:               GenuineIntel
  Model name:            Intel(R) Xeon(R) CPU E5-2670 0 @ 2.60GHz                                     
    CPU family:          6
    Model:               45                                                                           
    Thread(s) per core:  1                                                                            
    Core(s) per socket:  1                                                                            
    Socket(s):           8
    Stepping:            7
    BogoMIPS:            5187.60
    Flags:               fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat clflush mmx
                          fxsr sse sse2 syscall nx rdtscp lm constant_tsc rep_good nopl cpuid tsc_know
                         n_freq pni pclmulqdq ssse3 cx16 sse4_1 sse4_2 x2apic popcnt tsc_deadline_time
                         r aes hypervisor lahf_lm pti
Virtualization features:                                                                              
  Hypervisor vendor:     Xen                                                                          
  Virtualization type:   full
Caches (sum of all):                                                                                  
  L1d:                   256 KiB (8 instances)
  L1i:                   256 KiB (8 instances)
  L2:                    2 MiB (8 instances)                                                          
  L3:                    160 MiB (8 instances)
NUMA:                    
  NUMA node(s):          1                                                                            
  NUMA node0 CPU(s):     0-7
Vulnerabilities:         
  Itlb multihit:         KVM: Mitigation: VMX unsupported
  L1tf:                  Mitigation; PTE Inversion
  Mds:                   Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown
  Meltdown:              Mitigation; PTI                                                              
  Spec store bypass:     Vulnerable                                                                   
  Spectre v1:            Mitigation; usercopy/swapgs barriers and __user pointer sanitization         
  Spectre v2:            Mitigation; Retpolines, STIBP disabled, RSB filling                          
  Srbds:                 Not affected
  Tsx async abort:       Not affected

Comment 10 errata-xmlrpc 2022-08-01 15:58:08 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (ovn22.03 bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:5796


Note You need to log in before you can comment on or make changes to this bug.