lol

qt5.6: backport seccomp patch to fix errors w/new glibc + epoll_pwait

Based on:
https://chromium.googlesource.com/chromium/src/+/4e8083b4ab953ba298aedfc4e79d464be15e4012

Fixes mendeley bug mentioned in #33396,
which links to related issues in other distributions and upstream Qt.

+26 -2
+2 -2
pkgs/development/libraries/qt-5/5.6/default.nix
··· 51 qtscript = [ ./qtscript.patch ]; 52 qtserialport = [ ./qtserialport.patch ]; 53 qttools = [ ./qttools.patch ]; 54 - qtwebengine = 55 - optional stdenv.needsPax ./qtwebengine-paxmark-mksnapshot.patch; 56 qtwebkit = [ ./qtwebkit.patch ]; 57 }; 58
··· 51 qtscript = [ ./qtscript.patch ]; 52 qtserialport = [ ./qtserialport.patch ]; 53 qttools = [ ./qttools.patch ]; 54 + qtwebengine = [ ./qtwebengine-seccomp.patch ] 55 + ++ optional stdenv.needsPax ./qtwebengine-paxmark-mksnapshot.patch; 56 qtwebkit = [ ./qtwebkit.patch ]; 57 }; 58
+24
pkgs/development/libraries/qt-5/5.6/qtwebengine-seccomp.patch
···
··· 1 + Backported to Qt 5.6 for epoll_pwait fix on newer glibc 2 + Part of upstream Chromium's 4e8083b4ab953ba298aedfc4e79d464be15e4012 3 + Review URL: https://codereview.chromium.org/1613883002 4 + --- 5 + diff --git a/3rdparty/chromium/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc b/3rdparty/chromium/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc 6 + index 10278dc5fc9b..b30b3e6acef6 100644 7 + --- a/src/3rdparty/chromium/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc 8 + +++ b/src/3rdparty/chromium/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc 9 + @@ -414,6 +414,7 @@ bool SyscallSets::IsAllowedEpoll(int sysno) { 10 + case __NR_epoll_create: 11 + case __NR_epoll_wait: 12 + #endif 13 + + case __NR_epoll_pwait: 14 + case __NR_epoll_create1: 15 + case __NR_epoll_ctl: 16 + return true; 17 + @@ -421,7 +422,6 @@ bool SyscallSets::IsAllowedEpoll(int sysno) { 18 + #if defined(__x86_64__) 19 + case __NR_epoll_ctl_old: 20 + #endif 21 + - case __NR_epoll_pwait: 22 + #if defined(__x86_64__) 23 + case __NR_epoll_wait_old: 24 + #endif