-
Notifications
You must be signed in to change notification settings - Fork 417
util-linux/2.41.1 package update #57389
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
octo-sts
bot
commented
Jun 24, 2025
Signed-off-by: wolfi-bot <121097084+wolfi-bot@users.noreply.github.com>
🩹 Build Failed: Patch Application Failed
Build Details
Root Cause Analysis 🔍The patch 42e34984709ce9c21640b8c2b7aa1cf84a40add0.patch failed to apply cleanly. The system detected that the patch may have been already applied or is in reverse format. When prompted to proceed, the default 'n' was accepted, causing the patch application to fail. This resulted in hunks being rejected and the build process terminating. 🔍 Build failure fix suggestionsFound similar build failures that have been fixed in the past and analyzed them to suggest a fix: Similar PRs with fixes
Suggested ChangesFile: util-linux.yaml
Replacement: Content:
Replacement: Content:
Content: Click to expand fix analysisAnalysisAfter analyzing the similar fixed build failures, a clear pattern emerges: in all three cases, the patch application failures were resolved by updating the package version and removing the problematic patch file entirely, rather than trying to fix the patch itself. The common scenario is that the patched fixes were already incorporated into newer versions of the upstream packages. When a patch fails with "Reversed (or previously applied) patch detected", it typically means either:
In all three examples, the maintainers chose to update to a newer version of the package where the patch content was already included in the upstream release, eliminating the need for the patch entirely. Click to expand fix explanationExplanationThe suggested fix follows the pattern established in the three similar resolved cases. The solution is to update to the latest version of util-linux (version 2.41.2) and remove the problematic patch. The failure message indicates that the patch 42e34984709ce9c21640b8c2b7aa1cf84a40add0.patch cannot be applied because it's either already been applied or doesn't match the current source code. Looking at the error message more closely: "Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] Skipping patch. Hunk #1 ignored at 530. 1 out of 1 hunk ignored -- saving rejects to file libmount/src/context.c.rej" This suggests that the patch was targeting a specific issue in libmount/src/context.c. Since the patch is failing, it's most likely that:
Updating to version 2.41.2 and removing the patch is the cleanest solution, as it:
The new SHA256 checksum (827bd289ce59d29e7c396e5da29119ff0ddab91b7482943c3987503060518479) is for the util-linux-2.41.2.tar.xz file, which can be verified from the upstream source. Click to expand alternative approachesAlternative Approaches
Was this comment helpful? Please use 👍 or 👎 reactions on this comment. |