Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

aten::transpose.int is acting errouneously #126167

Open
coreylammie opened this issue May 14, 2024 · 0 comments
Open

aten::transpose.int is acting errouneously #126167

coreylammie opened this issue May 14, 2024 · 0 comments
Labels
oncall: jit Add this issue/PR to JIT oncall triage queue

Comments

@coreylammie
Copy link
Contributor

coreylammie commented May 14, 2024

馃悰 Describe the bug

Using the C++ API, arbitrary aten operations can be called as follows:

py::object execute_aten_op(std::string op_name, py::args args, py::kwargs kwargs) {
    auto symbol = c10::Symbol::fromQualString(op_name);
    const auto sorted_ops = torch::jit::getAllSortedOperatorsFor(symbol);
    return _get_operation_for_overload_or_packet(sorted_ops, symbol, args, kwargs, false);
}

With python bindings, the following code can be executed without issue (I have tried additional ops, and they all appear to work fine):

execute_aten_op("aten::t", torch.randn(3, 4))
execute_aten_op("aten::view", torch.randn(3, 4), (12,))

execute_aten_op("aten::transpose.int", torch.randn(3, 4), 0, 1), however, raises the following error:

Traceback (most recent call last):
  File "<string>", line 1, in <module>
RuntimeError: Overloaded torch operator invoked from Python failed to match any schema:

The function signature/schema of aten::t and aten::transpose.int appear to be listed here: https://github.com/pytorch/pytorch/blob/37596769d8b42beba104e14d149cebe0dfd75d12/torch/csrc/jit/runtime/serialized_shape_function_registry.cpp#L3289-L3290 - I seem be calling these correctly.

Versions

Collecting environment information...
PyTorch version: 2.3.0
Is debug build: False
CUDA used to build PyTorch: None
ROCM used to build PyTorch: N/A

OS: Ubuntu 22.04.3 LTS (aarch64)
GCC version: (Ubuntu 11.4.0-1ubuntu1~22.04) 11.4.0
Clang version: Could not collect
CMake version: version 3.22.1
Libc version: glibc-2.35

Python version: 3.11.0 | packaged by conda-forge | (main, Jan 14 2023, 05:01:18) [GCC 11.3.0] (64-bit runtime)
Python platform: Linux-6.6.13-200.fc39.aarch64-aarch64-with-glibc2.35
Is CUDA available: False
CUDA runtime version: No CUDA
CUDA_MODULE_LOADING set to: N/A
GPU models and configuration: No CUDA
Nvidia driver version: No CUDA
cuDNN version: No CUDA
HIP runtime version: N/A
MIOpen runtime version: N/A
Is XNNPACK available: True

CPU:
Architecture:                       aarch64
CPU op-mode(s):                     64-bit
Byte Order:                         Little Endian
CPU(s):                             8
On-line CPU(s) list:                0-7
Vendor ID:                          Apple
Model:                              0
Thread(s) per core:                 1
Core(s) per cluster:                8
Socket(s):                          -
Cluster(s):                         1
Stepping:                           0x0
BogoMIPS:                           48.00
Flags:                              fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 asimddp sha512 asimdfhm dit uscat ilrcpc flagm sb paca pacg dcpodp flagm2 frint
NUMA node(s):                       1
NUMA node0 CPU(s):                  0-7
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit:        Not affected
Vulnerability L1tf:                 Not affected
Vulnerability Mds:                  Not affected
Vulnerability Meltdown:             Not affected
Vulnerability Mmio stale data:      Not affected
Vulnerability Retbleed:             Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass:    Vulnerable
Vulnerability Spectre v1:           Mitigation; __user pointer sanitization
Vulnerability Spectre v2:           Not affected
Vulnerability Srbds:                Not affected
Vulnerability Tsx async abort:      Not affected

Versions of relevant libraries:
[pip3] mypy==1.8.0
[pip3] mypy-extensions==1.0.0
[pip3] numpy==1.26.4
[pip3] torch==2.3.0
[conda] Could not collect

cc @EikanWang @jgong5 @wenzhe-nrv @sanchitintel

@mikaylagawarecki mikaylagawarecki added the oncall: jit Add this issue/PR to JIT oncall triage queue label May 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
oncall: jit Add this issue/PR to JIT oncall triage queue
Projects
None yet
Development

No branches or pull requests

2 participants