

A trick is given everywhere on the web, set kernel.unprivileged_userns_clone = 1.
https://brave-browser.readthedocs.io/en ... html#linux
https://github.com/brave/brave-browser/ ... -permalink
DO NOT SET kernel.unprivileged_userns_clone = 1. NEVER.
Enabling unprivileged user namespaces opens up severe vulnerabilities in the Linux kernel. If you did not intend to enable it, you should ensure it is disabled. Numerous vulnerabilities that are found regularly are often only exploitable if unprivileged user namespaces are supported and enabled by the kernel.
BREAK also "Ptrace Protection with Yama LSM (Non-broker)" into chrome://sandbox.
Copy and paste this into your terminal:
Code: Select all
cat /etc/sysctl.d/*.conf /etc/sysctl.conf | sudo sysctl -e -p -
( Search in those file /etc/sysctl.d/*.conf, /etc/sysctl.conf )
THE BEST WAY:
Copy and paste this into your terminal:
Code: Select all
sudo tee /etc/sysctl.d/10-securized-yama-scope.conf <<EOF
# resolve chrome://sandbox/ errors:
# sudo setcap cap_sys_ptrace=eip /usr/bin/chromium
kernel.yama.ptrace_scope = 1
EOF
Code: Select all
sudo setcap cap_sys_ptrace=eip /usr/bin/chromium
Load configuration stored in specific file:
Code: Select all
sudo sysctl --load /etc/sysctl.d/10-securized-yama-scope.conf
Code: Select all
sudo sysctl --system
NOW, WATCH THE MAGIC:
Close and re-open chromium.
Copy and paste (in the address bar):
Code: Select all
chrome://sandbox

INFO:
driver Nouveau + `--ignore-gpu-blacklist` command line causes in chrome://gpu at "Driver Information" section … "Sandboxed | false"
READ:
https://linux-audit.com/protect-ptrace- ... ace_scope/
https://blog.sleeplessbeastie.eu/2019/0 ... iguration/
https://chromium.googlesource.com/chrom ... sandbox.md
https://www.andreasch.com/2018/01/13/capabilities/