Open AIWintermuteAI opened 3 weeks ago
Same result for running in MacOS (above the results from Ubuntu 22.04 container on MacOS host created specifically to tests executorch). Could that be the realpath is present in the host system, but absent in the toolchain used for cross-compilation (here arm-gnu-toolchain-12.3.rel1-aarch64-arm-none-eabi/bin/arm-none-eabi-gcc)?
cc @digantdesai
I got this error during my build and I tried a lot of different combination of rm/rebuild and got passed it. Unfortunately my tests where a bit messy as I along the way ended up with another build error and I'm not sure what fixed it in the end. Looking in my bash history it mighe have been removing all cmake-out folders e.g.
rm -Rf cmake-out cmake-out-aot-lib/ examples/arm/executor_runner/cmake-out/
So that could be something to try.
Also as a note I'm not sure realpath() should be used in the embeded compilation (but are not 100% sure) and there is a flag detecting if its available, I kind of wonder if we both ended up in a mixed local gcc/target gcc problem where the wrong compiler was used/picked when config/building some stuff and then another when rerunning the build of flatc?
I'm sorry I don't have a solution for you but hope this might work out or at least give us some more clues.
Mixed local gcc / target gcc problem sounds very probable. Removing cmake-out does not fix the issue. Still waiting for response from PyTorch team, @digantdesai
Other things I did was to remove pip-out and a cmake folder under third party flatc , not sure if one of those also fixed something.
Another thing to check could be the python version used, I got the error with Python 3.12.3 (ubuntu 24.04) and and think the Executotch setup guide recommend Python 3.10. Since I not getting the error anymore Ill cant test if python 3.10 helps.
I have used Python 3.10.12 - you can see it in my python collect_env.py dump.
Hi, if you are still having this error I resolved it by running build/install_flatc.sh
. Would be nice to find this path automatically or at least catch this with a better error though.
IIUC is this because we shouldn't cross compile flatc in the first place?
🐛 Describe the bug
Following the instructions https://github.com/pytorch/executorch/tree/main/examples/arm after successfully completing
then
gets to building flatc and outputs the following error
Full output of the command is
Versions
root@127cbb8410e1:~/app/executorch/examples/arm# python collect_env.py Collecting environment information... PyTorch version: N/A Is debug build: N/A CUDA used to build PyTorch: N/A ROCM used to build PyTorch: N/A
OS: Ubuntu 22.04.5 LTS (aarch64) GCC version: (Ubuntu 11.4.0-1ubuntu1~22.04) 11.4.0 Clang version: Could not collect CMake version: version 3.30.5 Libc version: glibc-2.35
Python version: 3.10.12 (main, Sep 11 2024, 15:47:36) [GCC 11.4.0] (64-bit runtime) Python platform: Linux-6.6.32-linuxkit-aarch64-with-glibc2.35 Is CUDA available: N/A CUDA runtime version: Could not collect CUDA_MODULE_LOADING set to: N/A GPU models and configuration: Could not collect Nvidia driver version: Could not collect cuDNN version: Could not collect HIP runtime version: N/A MIOpen runtime version: N/A Is XNNPACK available: N/A
CPU: Architecture: aarch64 CPU op-mode(s): 64-bit Byte Order: Little Endian CPU(s): 10 On-line CPU(s) list: 0-9 Vendor ID: Apple Model: 0 Thread(s) per core: 1 Core(s) per cluster: 10 Socket(s): - Cluster(s): 1 Stepping: 0x0 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm jscvt fcma lrcpc dcpop sha3 asimddp sha512 asimdfhm dit uscat ilrcpc flagm ssbs sb paca pacg dcpodp flagm2 frint Vulnerability Gather data sampling: Not affected Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Not affected Vulnerability Mds: Not affected Vulnerability Meltdown: Not affected Vulnerability Mmio stale data: Not affected Vulnerability Reg file data sampling: Not affected Vulnerability Retbleed: Not affected Vulnerability Spec rstack overflow: Not affected Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Vulnerability Spectre v1: Mitigation; __user pointer sanitization Vulnerability Spectre v2: Not affected Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected
Versions of relevant libraries: [pip3] No relevant packages [conda] Could not collect