Installing JuliaPro

When attempting to start JuliaPro after installation I get the message
"7234:0618/142137.028535:FATAL:atom_main_delegate.cc(194)] Running as root without --no-sandbox is not supported. See 638180 - chromium - An open-source project to help move the web forward. - Monorail.
Launch_JuliaPro: line 23: 7234 Trace/breakpoint trap (core dumped) ./atom “$@”
Any help would be greatly appreciated

Hello, welcome to the Julia community. Can you please provide following details? This will help us find the root cause for this issue

  1. Version of JuliaPro that you’re trying to install
  2. Details regarding your operating system (Windows 10, Ubuntu 16.04, etc)
  3. CPU architecture
  4. Are you trying to launch JuliaPro from a sandbox environment or on a Virtual machine?

Thanks for taking my question…

  1. JuliaPro is version 1.4.2

  2. Operating system is Ubuntu 20.04 LTS

  3. Architecture: x86_64
    CPU op-mode(s): 32-bit, 64-bit
    Byte Order: Little Endian
    Address sizes: 40 bits physical, 48 bits virtual
    CPU(s): 6
    On-line CPU(s) list: 0-5
    Thread(s) per core: 1
    Core(s) per socket: 6
    Socket(s): 1
    NUMA node(s): 1
    Vendor ID: GenuineIntel
    CPU family: 6
    Model: 44
    Model name: Intel(R) Xeon(R) CPU X5650 @ 2.67GHz
    Stepping: 2
    CPU MHz: 2382.706
    BogoMIPS: 5320.00
    Virtualization: VT-x
    L1d cache: 192 KiB
    L1i cache: 192 KiB
    L2 cache: 1.5 MiB
    L3 cache: 12 MiB
    NUMA node0 CPU(s): 0-5
    Vulnerability Itlb multihit: KVM: Vulnerable
    Vulnerability L1tf: Mitigation; PTE Inversion
    Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
    Vulnerability Meltdown: Mitigation; PTI
    Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
    Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
    Vulnerability Spectre v2: Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, RSB filling
    Vulnerability Srbds: Not affected
    Vulnerability Tsx async abort: Not affected
    Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmo
    n pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid dca sse4_1 sse4_2 popcnt aes
    lahf_lm epb pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid dtherm ida arat flush_l1d

  4. I am not aware of any sandbox, I’m new to ubuntu

Thanks in advance,

Tim

FWIW, I can reproduce this bug when trying to start JuliaPro (or Atom, for that matter) in a root shell or with sudo atom.
Is there a reason why you need to start JuliaPro as root?

1 Like

No, I wasn’t even aware I was doing it. Just starting Ubuntu

Tim