cannot install kernel 4.9.35 from …-current-testing

72 views
Skip to first unread message

Holger Levsen

unread,
Jul 31, 2017, 4:56:15 PM7/31/17
to qubes...@googlegroups.com
Hi,

I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish this?

[user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel kernel-qubes-vm
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink | 11 kB 00:00
qubes-dom0-current | 2.9 kB 00:00
qubes-dom0-current-testing | 2.9 kB 00:00
qubes-templates-itl | 2.9 kB 00:00
updates/metalink | 11 kB 00:00
--> Running transaction check
---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Processing Dependency: perl(Math::BigInt) for package: 1000:kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64
--> Running transaction check
---> Package perl-Math-BigInt.noarch 0:1.9997-355.fc23 will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm already exists and appears to be complete
/var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm already exists and appears to be complete
/var/lib/qubes/dom0-updates/packages/perl-Math-BigInt-1.9997-355.fc23.noarch.rpm already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws, install kernel kernel-qubes-vm' (see 'man yum2dnf')

Qubes OS Repository for Dom0 44 MB/s | 189 kB 00:00
Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Dependencies resolved.
=============================================================================================================
Package Arch Version Repository Size
=============================================================================================================
Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
kernel x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 40 M
kernel-qubes-vm x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 56 M
perl-Math-BigInt noarch 1.9997-355.fc23 qubes-dom0-cached 188 k

Transaction Summary
=============================================================================================================
Skip 3 Packages

Nothing to do.
Complete!
[user@dom0 ~]$


--
cheers,
Holger
signature.asc

Foppe de Haan

unread,
Jul 31, 2017, 5:38:33 PM7/31/17
to qubes-users, hol...@layer-acht.org

Try manually installing perl-Math-BigInt first?

Holger Levsen

unread,
Jul 31, 2017, 6:42:45 PM7/31/17
to Foppe de Haan, qubes-users
On Mon, Jul 31, 2017 at 02:38:32PM -0700, Foppe de Haan wrote:
> Try manually installing perl-Math-BigInt first?

hah, I only tried installing the kernel and qubes-kernel-vm but not that
package. Installing perl-Math-BigInt succeeded but then I still get this:


[user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink | 12 kB 00:00
qubes-dom0-current | 2.9 kB 00:00
qubes-dom0-current-testing | 2.9 kB 00:00
qubes-templates-itl | 2.9 kB 00:00
updates/metalink | 11 kB 00:00
--> Running transaction check
---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws, install kernel' (see 'man yum2dnf')

Qubes OS Repository for Dom0 66 MB/s | 189 kB 00:00
Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Dependencies resolved.
================================================================================================================================================================================================================================
Package Arch Version Repository Size
================================================================================================================================================================================================================================
Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
kernel x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 40 M

Transaction Summary
================================================================================================================================================================================================================================
Skip 1 Package

Nothing to do.
Complete!
[user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel-qubes-vm
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink | 12 kB 00:00
qubes-dom0-current | 2.9 kB 00:00
qubes-dom0-current-testing | 2.9 kB 00:00
qubes-templates-itl | 2.9 kB 00:00
updates/metalink | 11 kB 00:00
--> Running transaction check
---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws, install kernel-qubes-vm' (see 'man yum2dnf')

Qubes OS Repository for Dom0 66 MB/s | 189 kB 00:00
Package kernel-qubes-vm-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Dependencies resolved.
================================================================================================================================================================================================================================
Package Arch Version Repository Size
================================================================================================================================================================================================================================
Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
kernel-qubes-vm x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 56 M

Transaction Summary
================================================================================================================================================================================================================================
Skip 1 Package
signature.asc

Foppe de Haan

unread,
Aug 1, 2017, 1:11:56 AM8/1/17
to qubes-users, 0spin...@gmail.com, hol...@layer-acht.org

and if you add --best --allowerasing to the command?

Holger Levsen

unread,
Aug 1, 2017, 1:21:10 AM8/1/17
to Foppe de Haan, qubes-users
On Mon, Jul 31, 2017 at 10:11:56PM -0700, Foppe de Haan wrote:
> and if you add --best --allowerasing to the command?

commandline error, no such option :(


--
cheers,
Holger
signature.asc

Foppe de Haan

unread,
Aug 1, 2017, 1:53:32 AM8/1/17
to qubes-users, 0spin...@gmail.com, hol...@layer-acht.org

'sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --best --allowerasing' shouldn't error like that.

Marek Marczykowski-Górecki

unread,
Aug 1, 2017, 7:06:29 AM8/1/17
to qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Mon, Jul 31, 2017 at 08:56:07PM +0000, Holger Levsen wrote:
> Hi,
>
> I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish this?
>
> [user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel kernel-qubes-vm
(...)
> Dependencies resolved.
> =============================================================================================================
> Package Arch Version Repository Size
> =============================================================================================================
> Skipping packages with conflicts:
> (add '--best --allowerasing' to command line to force their upgrade):
> kernel x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 40 M
> kernel-qubes-vm x86_64 1000:4.9.35-19.pvops.qubes qubes-dom0-cached 56 M
> perl-Math-BigInt noarch 1.9997-355.fc23 qubes-dom0-cached 188 k
>
> Transaction Summary
> =============================================================================================================
> Skip 3 Packages
>
> Nothing to do.
> Complete!

Try adding --action=update


- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJZgGCwAAoJENuP0xzK19csQf4H/iTi7tRDY5sSO/sRMja/Ruxy
9MxR1757VJACelwtemqiMsSoBVu5f7FgVifHXcoYUmhBTZY2dsks7r7u4xgLpdE7
kaKFJCtAAukEIjuW5aOdmb65HxMgK14/vbdvrDa+dK9Uvw8zu30j33XWkgPJH0ix
YEYdvMoDu/IOTmwhUTE4iw21O9D63+WH4PKYeJcOQ8M0PP3VaGNfATIKYD6A7Iyu
JpIKMVyyuuQ3QXu2SDWTYE5WTH0ASKvYHD62CfqtBx8vqJCRqptKp7IXcP+6woUe
2WIOprbgXFYh8ni14qSflcQy49TtNt295B0o+3lJiip7UQbpd5GVmfvHPThFHHI=
=BIC7
-----END PGP SIGNATURE-----

Holger Levsen

unread,
Aug 1, 2017, 12:55:48 PM8/1/17
to Foppe de Haan, qubes-users
On Mon, Jul 31, 2017 at 10:53:31PM -0700, Foppe de Haan wrote:
> 'sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --best --allowerasing' shouldn't error like that.

sadly no:


[user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel --best
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
Usage: "yumdownloader [options] package1 [package2] [package..]

Command line error: no such option: --best
[user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --best kernel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
Usage: "yumdownloader [options] package1 [package2] [package..]

Command line error: no such option: --best
signature.asc

Holger Levsen

unread,
Aug 4, 2017, 3:27:43 PM8/4/17
to Marek Marczykowski-Górecki, qubes...@googlegroups.com
On Tue, Aug 01, 2017 at 01:06:24PM +0200, Marek Marczykowski-Górecki wrote:
> > I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish this?
> > [user@dom0 ~]$ LANG=C sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing kernel kernel-qubes-vm
> Try adding --action=update

whoohoo, thanks for that, Marek! It also doens't work but at least hinted what
would be and was working: --action=upgrade!

Now let's see how this kernel works! :-)


--
cheers,
Holger
signature.asc
Reply all
Reply to author
Forward
0 new messages