beaug@beaug9530:~$ ./Manager-x86_64.AppImage
[1584513:0830/100245.951045:FATAL:sandbox/linux/suid/client/setuid_sandbox_host.cc:169] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I’m aborting now. You need to make sure that /tmp/.mount_ManagefdktBF/chrome-sandbox is owned by root and has mode 4755.
Trace/breakpoint trap (core dumped)
beaug@beaug9530:~$
The specific parameter kernel.apparmor_restrict_unprivileged_userns controls AppArmor’s restriction on unprivileged user namespace creation.
When set to 1, this parameter enables AppArmor’s restriction, which prevents unprivileged users from creating user namespaces. User namespaces are a feature in Linux that allows a process to have a different set of user and group IDs than the rest of the system.
By setting the parameter to 0 (as in the above command), you’re effectively disabling this restriction, allowing unprivileged users to create user namespaces.
In essence, this command is relaxing a security restriction imposed by AppArmor on unprivileged user namespace creation.
It’s worth noting that modifying kernel parameters can have implications for system security and stability, so use such commands with caution.
While the suggestion did get the app to launch, it is SO SLOW! it takes forever to load compared to previous versions. I hope whatever change was introduced gets back-rev’d otherwise I won’t be able to use new versions going forward.