-
-
Notifications
You must be signed in to change notification settings - Fork 8.8k
Description
Your current environment
The output of python collect_env.py
==============================
System Info
==============================
OS : Debian GNU/Linux 11 (bullseye) (x86_64)
GCC version : (Debian 10.2.1-6) 10.2.1 20210110
Clang version : Could not collect
CMake version : version 4.0.3
Libc version : glibc-2.36
==============================
PyTorch Info
==============================
PyTorch version : 2.8.0.dev20250605+cpu
Is debug build : False
CUDA used to build PyTorch : None
ROCM used to build PyTorch : N/A
==============================
Python Environment
==============================
Python version : 3.10.16 (main, Jan 14 2025, 05:27:07) [GCC 10.2.1 20210110] (64-bit runtime)
Python platform : Linux-6.5.0-1013-gcp-x86_64-with-glibc2.36
==============================
CUDA / GPU Info
==============================
Is CUDA available : False
CUDA runtime version : No CUDA
CUDA_MODULE_LOADING set to : N/A
GPU models and configuration : No CUDA
Nvidia driver version : No CUDA
cuDNN version : No CUDA
HIP runtime version : N/A
MIOpen runtime version : N/A
Is XNNPACK available : True
==============================
CPU Info
==============================
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 224
On-line CPU(s) list: 0-223
Thread(s) per core: 2
Core(s) per socket: 56
Socket(s): 2
NUMA node(s): 2
Vendor ID: AuthenticAMD
CPU family: 25
Model: 1
Model name: AMD EPYC 7B13
Stepping: 0
CPU MHz: 2449.998
BogoMIPS: 4899.99
Hypervisor vendor: KVM
Virtualization type: full
L1d cache: 3.5 MiB
L1i cache: 3.5 MiB
L2 cache: 56 MiB
L3 cache: 448 MiB
NUMA node0 CPU(s): 0-55,112-167
NUMA node1 CPU(s): 56-111,168-223
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec rstack overflow: Mitigation; safe RET
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid tsc_known_freq pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw topoext invpcid_single ssbd ibrs ibpb stibp vmmcall fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid rdseed adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 clzero xsaveerptr arat npt nrip_save umip vaes vpclmulqdq rdpid fsrm
==============================
Versions of relevant libraries
==============================
[pip3] numpy==2.1.3
[pip3] optree==0.16.0
[pip3] pyzmq==27.0.0
[pip3] torch==2.8.0.dev20250605+cpu
[pip3] torch-xla==2.8.0+git402612d
[pip3] torchax==0.0.4
[pip3] torchvision==0.23.0.dev20250605+cpu
[pip3] transformers==4.52.4
[pip3] triton==3.3.1
[conda] Could not collect
==============================
vLLM Info
==============================
ROCM Version : Could not collect
Neuron SDK Version : N/A
vLLM Version : 0.9.2.dev84+gee1531bc3 (git sha: ee1531bc3)
vLLM Build Flags:
CUDA Archs: Not Set; ROCm: Disabled; Neuron: Disabled
GPU Topology:
Could not collect
==============================
Environment Variables
==============================
VLLM_TARGET_DEVICE=tpu
NCCL_CUMEM_ENABLE=0
PYTORCH_NVML_BASED_CUDA_CHECK=1
TORCHINDUCTOR_COMPILE_THREADS=1
LD_LIBRARY_PATH=/usr/local/lib/python3.10/site-packages/cv2/../../lib64:
🐛 Describe the bug
Description:
The vllm/vllm-tpu Docker image appears to be based on Debian (e.g., /etc/debian_version shows bookworm/sid), but the APT package sources point to Ubuntu (e.g., jammy). This inconsistency causes package management failures.
Reproduction Steps
1. Pull and run the image: docker run -it vllm/vllm-tpu /bin/bash
2. Inside the container:
cat /etc/debian_version # Shows 'bookworm/sid'
cat /etc/apt/sources.list # Points to Ubuntu 'jammy' repos
apt update && apt install awk
3. This leads to:
dpkg-deb: error: ... uses unknown compression for member 'control.tar.zst'
E: Sub-process /usr/bin/dpkg returned an error code (1)
Impact
• Package upgrades and reinstallations fail due to incompatible compression formats.
• Standard tooling such as pip, venv, or apt install are affected.
• Blocks installing development tools (e.g., gawk, zstd, python3.11-dev).
Expected Behavior
The base OS and APT sources should match. If the image is based on Debian, the package sources should point to Debian repositories (e.g., deb.debian.org) to ensure compatibility.
Suggested Fix
Update the image to:
• correct /etc/apt/sources.list to point to Debian repositories if the base is Debian.
Before submitting a new issue...
- Make sure you already searched for relevant issues, and asked the chatbot living at the bottom right corner of the documentation page, which can answer lots of frequently asked questions.