This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2102618
This issue is fixed in ovn22.03-22.03.0-62.el9fdp
tested on system provided by Yatin Karel, reproduced on ovn22.03-52: [zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-52]$ ovn-nbctl --version Illegal instruction (core dumped) [zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-52]$ rpm -qa | grep -E "ovn22.03|openvswitch" openvswitch-selinux-extra-policy-1.0-31.el9s.noarch network-scripts-openvswitch2.15-2.15.0-99.el9s.x86_64 openvswitch2.15-2.15.0-99.el9s.x86_64 rdo-openvswitch-2.15-2.el9s.noarch centos-release-nfv-openvswitch-1-4.el9s.noarch ovn22.03-22.03.0-52.el9fdp.x86_64 ovn22.03-central-22.03.0-52.el9fdp.x86_64 ovn22.03-host-22.03.0-52.el9fdp.x86_64 Verified on ovn22.03-62: [zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-62]$ ovn-nbctl --version ovn-nbctl 22.03.2 Open vSwitch Library 2.17.90 DB Schema 6.1.0 [zuul@centos-9-stream-rax-ord-0030375827 ovn22.03-62]$ rpm -qa | grep -E "ovn22.03|openvswitch" openvswitch-selinux-extra-policy-1.0-31.el9s.noarch network-scripts-openvswitch2.15-2.15.0-99.el9s.x86_64 openvswitch2.15-2.15.0-99.el9s.x86_64 rdo-openvswitch-2.15-2.el9s.noarch centos-release-nfv-openvswitch-1-4.el9s.noarch ovn22.03-22.03.0-62.el9fdp.x86_64 ovn22.03-central-22.03.0-62.el9fdp.x86_64 ovn22.03-host-22.03.0-62.el9fdp.x86_64
[zuul@centos-9-stream-rax-ord-0030375827 ~]$ lscpu Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Address sizes: 46 bits physical, 48 bits virtual Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0-7 Vendor ID: GenuineIntel Model name: Intel(R) Xeon(R) CPU E5-2670 0 @ 2.60GHz CPU family: 6 Model: 45 Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 8 Stepping: 7 BogoMIPS: 5187.60 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat clflush mmx fxsr sse sse2 syscall nx rdtscp lm constant_tsc rep_good nopl cpuid tsc_know n_freq pni pclmulqdq ssse3 cx16 sse4_1 sse4_2 x2apic popcnt tsc_deadline_time r aes hypervisor lahf_lm pti Virtualization features: Hypervisor vendor: Xen Virtualization type: full Caches (sum of all): L1d: 256 KiB (8 instances) L1i: 256 KiB (8 instances) L2: 2 MiB (8 instances) L3: 160 MiB (8 instances) NUMA: NUMA node(s): 1 NUMA node0 CPU(s): 0-7 Vulnerabilities: Itlb multihit: KVM: Mitigation: VMX unsupported L1tf: Mitigation; PTE Inversion Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT Host state unknown Meltdown: Mitigation; PTI Spec store bypass: Vulnerable Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling Srbds: Not affected Tsx async abort: Not affected
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn22.03 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:5796