Release 5.2.0 fails on Intel(R) Xeon(R) CPU W3530

Bug #2059959 reported by Cédric Krier
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
lxml
New
Undecided
Unassigned

Bug Description

The binary package 5.2.0 crash when importing etree with:

> traps: coverage[12597] trap invalid opcode ip:7f698cc80341 sp:7ffdb44b27e0 error:0 in etree.cpython-311-x86_64-linux-gnu.so[7f698cc4e000+327000]

The CPU information are:

Architecture: x86_64
  CPU op-mode(s): 32-bit, 64-bit
  Address sizes: 36 bits physical, 48 bits virtual
  Byte Order: Little Endian
CPU(s): 8
  On-line CPU(s) list: 0-7
Vendor ID: GenuineIntel
  BIOS Vendor ID: Intel
  Model name: Intel(R) Xeon(R) CPU W3530 @ 2.80GHz
    BIOS Model name: Intel(R) Xeon(R) CPU W3530 @ 2.80GHz To Be Filled By O.E.M. CPU @ 2.8GHz
    BIOS CPU family: 179
    CPU family: 6
    Model: 26
    Thread(s) per core: 2
    Core(s) per socket: 4
    Socket(s): 1
    Stepping: 5
    Frequency boost: enabled
    CPU(s) scaling MHz: 59%
    CPU max MHz: 2801.0000
    CPU min MHz: 1600.0000
    BogoMIPS: 5602.20
    Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid
                          aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm dca sse4_1 sse4_2 popcnt lahf_lm pti tpr_shadow flexpriority ept vpid dtherm ida vnmi
Virtualization features:
  Virtualization: VT-x
Caches (sum of all):
  L1d: 128 KiB (4 instances)
  L1i: 128 KiB (4 instances)
  L2: 1 MiB (4 instances)
  L3: 8 MiB (1 instance)
NUMA:
  NUMA node(s): 1
  NUMA node0 CPU(s): 0-7
Vulnerabilities:
  Gather data sampling: Not affected
  Itlb multihit: KVM: Mitigation: VMX disabled
  L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
  Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
  Meltdown: Mitigation; PTI
  Mmio stale data: Unknown: No mitigations
  Retbleed: Not affected
  Spec rstack overflow: Not affected
  Spec store bypass: Vulnerable
  Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
  Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PBRSB-eIBRS Not affected
  Srbds: Not affected
  Tsx async abort: Not affected

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.