Bug 22519 - drakconf crashed
Summary: drakconf crashed
Status: RESOLVED DUPLICATE of bug 21814
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 6
Hardware: x86_64 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia tools maintainers
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-02-04 10:12 CET by Herman Viaene
Modified: 2018-03-17 10:14 CET (History)
1 user (show)

See Also:
Source RPM: drakconf-13.16-1.mga6
CVE:
Status comment:


Attachments

Description Herman Viaene 2018-02-04 10:12:46 CET
The "drakconf" program crashed. Drakbug-17.88.1 caught it.

Trying to open MCC after switching kernel to run server kernel

Could not locate symbol webkit_web_view_new at /usr/lib/libDrakX/mygtk3.pm line 621.
Perl's trace:
drakbug::bug_handler() called from /usr/lib/perl5/5.22.3/Carp.pm:166
Carp::croak() called from /usr/lib/perl5/vendor_perl/5.22.2/x86_64-linux-thread-multi/Glib/Object/Introspection.pm:67
Glib::Object::Introspection::__ANON__() called from /usr/lib/libDrakX/mygtk3.pm:621
mygtk3::_gtk__WebKit_WebView() called from /usr/lib/libDrakX/mygtk3.pm:610
mygtk3::_gtk__WebKit2_WebView() called from /usr/lib/libDrakX/mygtk3.pm:122
mygtk3::_gtk() called from /usr/lib/libDrakX/mygtk3.pm:59
mygtk3::gtknew() called from /usr/libexec/drakconf:687

Theme name: Menta
Kernel version = 4.14.13-server-1.mga6
Distribution=Mageia release 6 (Official) for x86_64
CPU=AMD FX(tm)-6100 Six-Core Processor
Comment 1 Marja Van Waes 2018-02-04 12:20:30 CET
I think this is a duplicate of an existing report, but can't check now

CC: (none) => marja11
Assignee: bugsquad => mageiatools

Comment 2 Marja Van Waes 2018-03-17 10:14:07 CET
(In reply to Marja van Waes from comment #1)
> I think this is a duplicate of an existing report, but can't check now

It is

*** This bug has been marked as a duplicate of bug 21814 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.