This the messages I have from vivaldi. I just cut some messages that were repeating many times.
[31229:31243:0923/212837.951903:ERROR:service_manager_context.cc(277)] Attempting to run unsupported native service:
bt@linux-0rk5:~> [31303:31319:0923/212839.464503:ERROR:service_manager_context.cc(277)] Attempting to run unsupported native service: /usr/lib64/vivaldi/chrome_renderer.service
[31629:31629:0923/212845.736350:ERROR:sandbox_linux.cc(379)] InitializeSandbox() called with multiple threads in process gpu-process.
glibc was updated and it apparently broke quite a lot of binary applications. Applications need to be fixed and recompiled with new glibc. I do not know if it is possible to create binary that works with both old and new versions.
Download package(s) with older glibc into some folder. Uncompress files from package into folder with Ark, J7Z or other tool.
Use commands that I mentioned previously to override default system settings and use needed libraries instead of system ones.
To use Blender benchmark on Leap 15.2 or older I needed:
The issue is your app used clone3() call and it is not supported in the sandbox.
From the OpenSUSE Factory mailing list:
The problem is more: too many people did not take it serious enough that
glibc will use clone3() in the future. Some projects were sitting for
about 6 month on fixes but did not include them or release fixed packages…
The main problem is, that most projects using seccomp for sandboxing don’t
really think about the future, but only the past. So they look at what
is currently in use and forbid everything else with “ENOPERM”. And are
surprised if suddenly new syscalls are added and their code breaks
It would always be better to block unknown syscalls with “ENOSYS”, so
letting the application think the new syscall still does not exist. This
gives the application (or in this case better glibc) the chance to use the
old code as fallback.
As long as the sandbox developers don’t make their code future proof, we
will have this problem again and again with every new syscall.