Hi, I am using FC4. I downloaded the updates from download.fedora.redhat.com and tried to run the command "rpm -Uvh *.rpm" on the RPM files. But, it gave a complaint that - "error: error reading from file cman-kernel-2.6.11.5-20050601.152643.FC4.18.i686.rpm". I checked that file separately using the RPM command and found that the file is OK. Then, I found that there are two files with same name and version but different architectures i586 and i686. I ran the rpm command again using "rpm -Uvvh *.rpm" and got the following output : . . . D: ============== cman-kernel-2.6.11.5-20050601.152643.FC4.18.i586.rpm D: Expected size: 149983 = lead(96)+sigs(344)+pad(0)+data(149543) D: Actual size: 149983 D: opening db environment /var/lib/rpm/Packages joinenv D: opening db index /var/lib/rpm/Packages rdonly mode=0x0 D: locked db index /var/lib/rpm/Packages D: opening db index /var/lib/rpm/Pubkeys rdonly mode=0x0 warning: cman-kernel-2.6.11.5-20050601.152643.FC4.18.i586.rpm: Header V3 DSA signature: NOKEY, key ID 4f2a6fd2 D: opening db index /var/lib/rpm/Providename rdonly mode=0x0 D: read h# 1602 Header V3 DSA signature: NOKEY, key ID 4f2a6fd2 D: added binary package [0] D: ============== cman-kernel-2.6.11.5-20050601.152643.FC4.18.i686.rpm D: Expected size: 150181 = lead(96)+sigs(344)+pad(0)+data(149741) D: Actual size: 150181 D: cman-kernel-2.6.11.5-20050601.152643.FC4.18.i686.rpm: Header V3 DSA signature: NOKEY, key ID 4f2a6fd2 warning: package cman-kernel = 2.6.11.5-20050601.152643.FC4.18 was already added, skipping cman-kernel < 2.6.11.5-20050601.152643.FC4.18 error: error reading from file cman-kernel-2.6.11.5-20050601.152643.FC4.18.i686.rpm -- This suggests that the file is read but still it complains. The same thing happened with files like hal-0.5.2-2.fc4.1.i386.rpm hal-0.5.2-2.fc4.i386.rpm which has different release name. Can somebody suggest a suitable solution ? Thanks in advance. With regards, Prasad H. L. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com