-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
broken sandbox (archlinux) #1899
Comments
cc @mbacchi |
A commonly-quoted workaround is enabling unprivileged user namespaces using
However, before doing that, see this reply on Note also that (from the link above):
Which is true: Chromium works just fine on Arch with the defaults, so I don't see a reason why Brave shouldn't. |
Related: #1986 (same for Debian) |
@liunkae I believe this issue should be reopened, and had mentioned it with @bbondy in the related PR. Two reasons:
Please, please consider a better sandboxing solution. This is an opportunity for Brave to lead and do better than Chromium. |
This was also reported in #6247 and fixed in brave/brave-core#4223. |
Binary: https://github.com/brave/brave-browser/releases/download/v0.55.21/brave-browser_0.55.21_amd64.deb
OS:; archlinux
kernel: 4.19.0
Log
trap' para punto de parada/seguimiento (
core' generado)dmesg log
[28488.802310] traps: brave[21676] trap int3 ip:55812609b770 sp:7ffeb929bd90 error:0 in brave[558123e06000+65e2000]
[28488.802396] audit: type=1701 audit(1540863866.209:131): auid=1000 uid=1000 gid=1000 ses=2 pid=21676 comm="brave" exe="/opt/brave.com/brave/brave" sig=5 res=1
also
it works with --no-sandbox flag
The text was updated successfully, but these errors were encountered: