balin1
December 25, 2025, 11:02am
1
I upgraded using the two stage qubes-dist-upgrade --releasever=4.3 --all-pre-reboot/manual reboot/qubes-dist-upgrade --releasever=4.3 --all-post-reboot route.
Issues encountered where:
multiple calls to qubes-dist-upgrade --releasever=4.3 --all-pre-reboot where necessary before a final Success was reported/achieved - in my interpretation the reruns where needed as network connection appeared unstable. I did not note any apparent error messages in the last pass, however,
rebooting (which yielded a booting system with qubesd-related errors on the boot console) and calling qubes-dist-upgrade --releasever=4.3 --all-post-reboot made it apparent that something had gone wrong, as no VM (sys-netetc.) was starting due to lvmrelated errors and I needed to call
lvchange -an /dev/qubes_dom0/*
lvconvert --repair qubes_dom0/vm-pool
lvchange -ay /dev/qubes_dom0/*
after which qubes-dist-upgrade --releasever=4.3 --all-post-reboot run through, with
the following salt-related errors remaining:
...
---> (STAGE 5) Cleaning up salt
Error on ext_pillar interface qvm_prefs is expected
local:
True
[CRITICAL] Specified ext_pillar interface qvm_features is unavailable
[CRITICAL] Specified ext_pillar interface qvm_prefs is unavailable
[CRITICAL] Specified ext_pillar interface qvm_tags is unavailable
...
I am at a loss how to fix this.
qubestl sys.list_functions | grep qvm produces
- qvm.check
- qvm.clone
- qvm.create
- qvm.devices
- qvm.features
- qvm.firewall
- qvm.is_halted
- qvm.is_paused
- qvm.is_running
- qvm.kill
- qvm.pause
- qvm.prefs
- qvm.remove
- qvm.run
- qvm.service
- qvm.shutdown
- qvm.start
- qvm.state
- qvm.tags
- qvm.template_info
- qvm.template_install
- qvm.unpause
and dnf list | grep salt
qubes-mgmt-salt.noarch 4.2.3-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-admin-tools.noarch 4.2.3-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-base.noarch 4.3.1-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-base-config.noarch 4.1.2-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-base-topd.noarch 4.3.2-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-config.noarch 4.2.3-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-dom0.noarch 4.2.3-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-dom0-qvm.noarch 4.3.5-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-dom0-update.noarch 4.3.3-1.fc41 qubes-dom0-cached
qubes-mgmt-salt-dom0-virtual-machines.noarch 4.3.13-1.fc41 qubes-dom0-cached
salt.noarch 3007.8-1.fc41 qubes-dom0-cached
salt-minion.noarch 3007.8-1.fc41 qubes-dom0-cached
Any hints?
1 Like
balin1
December 25, 2025, 11:32am
2
qubesctl saltutil.sync_all produces
local:
----------
beacons:
clouds:
engines:
executors:
grains:
log_handlers:
matchers:
modules:
output:
pillar:
proxymodules:
renderers:
returners:
sdb:
serializers:
states:
thorium:
tops:
utils:
wrapper:
and does not fix the issues encountered by qubes-dist-upgrade --releasever=4.3 --all-post-reboot.
balin1
December 25, 2025, 12:14pm
3
qubes-dom0-update --action=reinstall salt salt-minion doesn’t help either.
Brimbo
December 25, 2025, 2:43pm
4
I hit the LVM issue also on my attempt to do an in place upgrade from 4.2 to 4.3. I tought it was because I recently move to a bigger nvme and played with the LVM size but if you didn’t move to a bigger nvme / ssd recently, there’s clearly something off with the handling of the LVMs during in place upgrades.
Might be unrelated.
Are you using Debian 13? I have encountered several salt related issues with using salt with Deb13.
opened 02:16PM - 30 Oct 25 UTC
C: Salt
C: Debian/Ubuntu
P: default
needs diagnosis
affects-4.2
### Qubes OS Release
`4.2` and `4.3` might also be affected.
### Brief Summary…
When trying to apply a Salt state using `qubesctl [...] saltenv=user`, targeting a `debian-13` VM (Gnome, Xfce, or minimal) and specifying a file path (`salt://<path>`) inside the Salt file, the file cannot be found.
### Steps to Reproduce
In `dom0`, run:
1. Create and configure `user_salt` using `qubesctl state.apply qubes.user-dirs`.
2. Put the Salt file `manage-file.sls` and the file to be managed, `managed-file.txt`, inside `/srv/user_salt`.
```
# manage-file.sls
/etc/foo.conf:
file.managed:
- source:
- salt://managed-file.txt
[...]
```
3. Run `sudo qubesctl --skip-dom0 --show-output --targets=debian-13 state.apply manage-file saltenv=user`.
### Expected Behavior
Salt runs without failures and replaces the file.
### Actual Behavior
File not found in saltenv 'user'.
### Additional Information
This issue only occurs when targeting a `debian-13` VM; targeting `fedora` or `whonix-17` works fine.
Target VM & MGMT-VM salt version: `3007.1`
Possibly related:
- #9916
- #8491
- #9129
balin1
December 29, 2025, 4:37pm
6
@neoniobium : in my interpretation the failures are in dom0.
I can add, that I now upgraded a second system (that in contradiction to the first one never had seen any salt customization, so is entirely vanilla ) and have seen exactely the same salt-related errors reported above. So this is a thing.
@balin1 Is the LVM error you saw the same as this:
I had a 4.3 upgrade Stage 3 failure where an old kernel-qubes-vm package couldn’t be removed. I fixed that issue and manually removed the package. I then manually ran the remaining commands (systemctl preset-all and systemctl enable) from the Stage 3 part of the upgrade script.
I rebooted into Qubes 4.3 to complete Stages 4-6. After rebooting, none of my qubes are able to start. If I manually start a qube, I see this error:
Error: Check of pool qubes_dom0/vm-pool failed (status:64). Manual rep…
tripleh
December 30, 2025, 9:41am
9
the following salt-related errors remaining:...
---> (STAGE 5) Cleaning up salt
Error on ext_pillar interface qvm_prefs is expected
local:
True
[CRITICAL] Specified ext_pillar interface qvm_features is unavailable
[CRITICAL] Specified ext_pillar interface qvm_prefs is unavailable
[CRITICAL] Specified ext_pillar interface qvm_tags is unavailable
...
I am at a loss how to fix this.
I guess these errors are expected as the note Error on ext_pillar interface qvm_prefs is expected states?
I got this same message upgrading. I have no idea what I can do about, or if I even need to