Hello UCSC Genome Mirror Support,
Some of our users using Firefox, Safari, or Google Chrome are seeing this error when accessing Mouse MM9.
How can I fix this issue?
Dwayne McCully
SITB, NIAMS, NIH
Contractor
--
---
You received this message because you are subscribed to the Google Groups "UCSC Genome Browser Mirror-Specific Support" group.
To unsubscribe from this group and stop receiving emails from it, send an email to genome-mirro...@soe.ucsc.edu.
To view this discussion visit https://groups.google.com/a/soe.ucsc.edu/d/msgid/genome-mirror/DM8PR09MB610475B44443353434507870E7102%40DM8PR09MB6104.namprd09.prod.outlook.com.
Hi Max,
The free type development package is installed and I use the browserSetup.sh script to keep my site up to date.
These would be the binaries that are downloaded from your mirror site.
BTW: When I use MS Edge browser I don’t get the error message.
[root@~]# rpm -qa | grep -i freetype
freetype-2.10.4-9.el9.x86_64
freetype-devel-2.10.4-9.el9.x86_64
[root@ ~]# more /etc/os-release
NAME="Red Hat Enterprise Linux"
VERSION="9.5 (Plow)"
ID="rhel"
ID_LIKE="fedora"
VERSION_ID="9.5"
PLATFORM_ID="platform:el9"
PRETTY_NAME="Red Hat Enterprise Linux 9.5 (Plow)"
ANSI_COLOR="0;31"
LOGO="fedora-logo-icon"
CPE_NAME="cpe:/o:redhat:enterprise_linux:9::baseos"
HOME_URL=https://www.redhat.com/
DOCUMENTATION_URL=https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9
BUG_REPORT_URL=https://issues.redhat.com/
REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 9"
REDHAT_BUGZILLA_PRODUCT_VERSION=9.5
REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux"
REDHAT_SUPPORT_PRODUCT_VERSION="9.5"
Dwayne
Dwayne McCully
NIAMS, NIH
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and are confident the content is safe.
Hi Max,
I don’t get it either as you can see when I use Chrome it does not work but my Edge does work. Users have seen the same issue on Safari.
Google Chrome
MS Edge
[user@ ~]$ ldd hgTracks
linux-vdso.so.1 (0x00007fff5875b000)
/lib64/liboneagentproc.so (0x00007efffee00000)
libpthread.so.0 => /lib64/libpthread.so.0 (0x00007effff19f000)
libcurl.so.4 => /lib64/libcurl.so.4 (0x00007effff0fd000)
libstdc++.so.6 => /lib64/libstdc++.so.6 (0x00007efffea00000)
libbz2.so.1 => /lib64/libbz2.so.1 (0x00007effff0ea000)
libdl.so.2 => /lib64/libdl.so.2 (0x00007effff0e3000)
libm.so.6 => /lib64/libm.so.6 (0x00007efffed25000)
libz.so.1 => /lib64/libz.so.1 (0x00007effff0c9000)
libgcc_s.so.1 => /lib64/libgcc_s.so.1 (0x00007effff0ae000)
libc.so.6 => /lib64/libc.so.6 (0x00007efffe600000)
libnghttp2.so.14 => /lib64/libnghttp2.so.14 (0x00007effff084000)
libidn2.so.0 => /lib64/libidn2.so.0 (0x00007effff061000)
libssh.so.4 => /lib64/libssh.so.4 (0x00007efffecb0000)
libpsl.so.5 => /lib64/libpsl.so.5 (0x00007effff04d000)
libssl.so.3 => /lib64/libssl.so.3 (0x00007efffe91a000)
libcrypto.so.3 => /lib64/libcrypto.so.3 (0x00007efffe000000)
libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x00007efffec5a000)
libkrb5.so.3 => /lib64/libkrb5.so.3 (0x00007efffe840000)
libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00007effff032000)
libcom_err.so.2 => /lib64/libcom_err.so.2 (0x00007effff02b000)
libldap.so.2 => /lib64/libldap.so.2 (0x00007efffe599000)
liblber.so.2 => /lib64/liblber.so.2 (0x00007efffec48000)
libbrotlidec.so.1 => /lib64/libbrotlidec.so.1 (0x00007efffec3a000)
/lib64/ld-linux-x86-64.so.2 (0x00007effff1b1000)
libunistring.so.2 => /lib64/libunistring.so.2 (0x00007efffde7b000)
libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00007efffec29000)
libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00007efffe839000)
libresolv.so.2 => /lib64/libresolv.so.2 (0x00007efffe825000)
libevent-2.1.so.7 => /lib64/libevent-2.1.so.7 (0x00007efffe540000)
libsasl2.so.3 => /lib64/libsasl2.so.3 (0x00007efffe520000)
libbrotlicommon.so.1 => /lib64/libbrotlicommon.so.1 (0x00007efffde58000)
libselinux.so.1 => /lib64/libselinux.so.1 (0x00007efffde2b000)
libcrypt.so.2 => /lib64/libcrypt.so.2 (0x00007efffddf1000)
libpcre2-8.so.0 => /lib64/libpcre2-8.so.0 (0x00007efffdd55000)