Package: linux-image-amd64 Version: 4.19+102 Severity: normal Dear Maintainer,
* What led up to the situation? When I start Brave browser (https://brave.com) in Debian buster/testing, I get an error that my kernel isn't configured correctly: $ brave-browser [8918:8918:0304/181514.182194:FATAL:zygote_host_impl_linux.cc(116)] No usable sandbox! Update your kernel or see https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md for more information on developing with the SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox. Trace/breakpoint trap This is resolved by adding CONFIG_USER_NS=y to the kernel configuration. -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-2-amd64 (SMP w/2 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-amd64 depends on: ii linux-image-4.19.0-2-amd64 4.19.16-1 linux-image-amd64 recommends no packages. linux-image-amd64 suggests no packages. -- no debconf information