Bug 995760
Summary: | [abrt] firewall-config-0.3.4-1.fc19: firewall-config:1562:onChangeZone:TypeError: 'NoneType' object has no attribute '__getitem__' | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Tomas Dolezal <todoleza> | ||||||
Component: | firewalld | Assignee: | Thomas Woerner <twoerner> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | medium | ||||||||
Version: | 21 | CC: | abo, alihosseini65, benjaminfogel, c.kirbach, crankymoose, eblake, fedyapupkin, formisc, frankrrichards, hafflys, hedelao, jdbarnes, jim, jim.odayinst, jpopelka, jries, kjenzz, lenumina, luke, maurizio.antillon, mflitter, mhroncok, mitr, nguyentienlong88, pal666, rick, scattol, shawnx, s.kieske, ssabcew, sumitkbhardwaj, tcfxfzoi, thiessendg, toxicmerap, tsiatouras.vasilis, twoerner, v3x, viktor.matveenko, vlad, vrutkovs, wielkipiec, Wilhelm.Buchmueller, xperimenterx | ||||||
Target Milestone: | --- | ||||||||
Target Release: | --- | ||||||||
Hardware: | x86_64 | ||||||||
OS: | Linux | ||||||||
Whiteboard: | abrt_hash:6c06059304273d8babd1616f3379a6ef41b1609b | ||||||||
Fixed In Version: | firewalld-0.3.14.1-1.fc22 | Doc Type: | Bug Fix | ||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | |||||||||
: | 1049956 1049957 (view as bug list) | Environment: | |||||||
Last Closed: | 2015-06-18 13:28:07 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Tomas Dolezal
2013-08-10 21:22:25 UTC
Created attachment 785274 [details]
File: backtrace
Created attachment 785275 [details]
File: environ
*** Bug 962398 has been marked as a duplicate of this bug. *** *** Bug 974219 has been marked as a duplicate of this bug. *** *** Bug 993400 has been marked as a duplicate of this bug. *** *** Bug 994446 has been marked as a duplicate of this bug. *** *** Bug 1018484 has been marked as a duplicate of this bug. *** *** Bug 1021073 has been marked as a duplicate of this bug. *** *** Bug 1036290 has been marked as a duplicate of this bug. *** *** Bug 1036373 has been marked as a duplicate of this bug. *** *** Bug 1044643 has been marked as a duplicate of this bug. *** This might be fixed with 0.3.9.2, let's move it to ON_QA. *** Bug 1076827 has been marked as a duplicate of this bug. *** *** Bug 1076846 has been marked as a duplicate of this bug. *** *** Bug 1088630 has been marked as a duplicate of this bug. *** *** Bug 1093313 has been marked as a duplicate of this bug. *** *** Bug 1097696 has been marked as a duplicate of this bug. *** *** Bug 1109341 has been marked as a duplicate of this bug. *** *** Bug 1118913 has been marked as a duplicate of this bug. *** *** Bug 1119541 has been marked as a duplicate of this bug. *** *** Bug 1120403 has been marked as a duplicate of this bug. *** *** Bug 1121310 has been marked as a duplicate of this bug. *** *** Bug 1000054 has been marked as a duplicate of this bug. *** *** Bug 1134838 has been marked as a duplicate of this bug. *** *** Bug 1150733 has been marked as a duplicate of this bug. *** *** Bug 1151746 has been marked as a duplicate of this bug. *** *** Bug 1151753 has been marked as a duplicate of this bug. *** *** Bug 1154034 has been marked as a duplicate of this bug. *** *** Bug 1167129 has been marked as a duplicate of this bug. *** *** Bug 1172205 has been marked as a duplicate of this bug. *** *** Bug 1175806 has been marked as a duplicate of this bug. *** *** Bug 1178140 has been marked as a duplicate of this bug. *** *** Bug 1177289 has been marked as a duplicate of this bug. *** *** Bug 1180344 has been marked as a duplicate of this bug. *** *** Bug 1182274 has been marked as a duplicate of this bug. *** *** Bug 1183311 has been marked as a duplicate of this bug. *** *** Bug 1183240 has been marked as a duplicate of this bug. *** *** Bug 1186535 has been marked as a duplicate of this bug. *** *** Bug 1206792 has been marked as a duplicate of this bug. *** *** Bug 1213129 has been marked as a duplicate of this bug. *** *** Bug 1218098 has been marked as a duplicate of this bug. *** *** Bug 1220373 has been marked as a duplicate of this bug. *** Finally, I was able to reproduce this. It is a result of an issue in polkitd. polkitd is getting bigger with each dbus request and then there is this in my log when it happens: [12429.514960] traps: polkitd[18980] general protection ip:7f9ab803dde2 sp:7fff4282fb30 error:0 in libmozjs-17.0.so[7f9ab7efe000+3ba000] This is the traceback of polkitd within gdb: Program received signal SIGSEGV, Segmentation fault. 0x00007ffff6be1de2 in js::ShapeTable::search(long, bool) () from /lib64/libmozjs-17.0.so (gdb) where #0 0x00007ffff6be1de2 in js::ShapeTable::search(long, bool) () at /lib64/libmozjs-17.0.so #1 0x00007ffff6c8f688 in js::ObjectImpl::nativeLookup(JSContext*, long) () at /lib64/libmozjs-17.0.so #2 0x00007ffff6b9de2f in js::GetPropertyHelper(JSContext*, JS::Handle<JSObject*>, JS::Handle<long>, unsigned int, JS::MutableHandle<JS::Value>) () at /lib64/libmozjs-17.0.so #3 0x00007ffff6b78655 in js::Interpret(JSContext*, js::StackFrame*, js::InterpMode) () at /lib64/libmozjs-17.0.so #4 0x00007ffff6b811bd in js::RunScript(JSContext*, JSScript*, js::StackFrame*) () at /lib64/libmozjs-17.0.so #5 0x00007ffff6b81491 in js::InvokeKernel(JSContext*, JS::CallArgs, js::MaybeConstruct) () at /lib64/libmozjs-17.0.so #6 0x00007ffff6b81795 in js::Invoke(JSContext*, JS::Value const&, JS::Value const&, unsigned int, JS::Value*, JS::Value*) () at /lib64/libmozjs-17.0.so #7 0x00007ffff6aed04a in JS_CallFunctionName () at /lib64/libmozjs-17.0.so #8 0x000055555556075d in polkit_backend_js_authority_check_authorization_sync () #9 0x00005555555648ae in check_authorization_sync () #10 0x0000555555565100 in polkit_backend_interactive_authority_check_authorization () #11 0x000055555555e1c6 in server_handle_method_call () #12 0x00007ffff7912aac in call_in_idle_cb () at /lib64/libgio-2.0.so.0 #13 0x00007ffff73067fb in g_main_context_dispatch () at /lib64/libglib-2.0.so.0 #14 0x00007ffff7306b98 in g_main_context_iterate.isra () at /lib64/libglib-2.0.so.0 #15 0x00007ffff7306ec2 in g_main_loop_run () at /lib64/libglib-2.0.so.0 #16 0x000055555555d513 in main () When polkit dies the reply to a dbus call is damaged and not following the signature anymore. There are two issues with polkit: - It gets bigger with each dbus call - It dies sometimes with results in a damaged dbus call reply Thanks for your report. The polkit crashes are bug #910262. firewalld error handling also needs improvement: src/firewall/client.py:handle_exceptions can return None if the function it decorates fails, but the registered error handler doesn’t raise any exception and doesn’t quit. This can happen e.g. through firewall-config:_exception_handler -> firewall-config:_error, when the user clicks on OK and not Quit. So, reassigning back to firewalld to fix this error handling aspect; the polkit part will be fixed through #910262. Fixed upstream (https://github.com/t-woerner/firewalld/commit/bbfb2af0e4f78feda74fd3d6dc4c7f3c582aea2c) *** Bug 1190453 has been marked as a duplicate of this bug. *** *** Bug 1195307 has been marked as a duplicate of this bug. *** *** Bug 1190517 has been marked as a duplicate of this bug. *** *** Bug 1208737 has been marked as a duplicate of this bug. *** *** Bug 1195904 has been marked as a duplicate of this bug. *** *** Bug 1053874 has been marked as a duplicate of this bug. *** *** Bug 1194326 has been marked as a duplicate of this bug. *** *** Bug 1229143 has been marked as a duplicate of this bug. *** firewalld-0.3.14.1-1.fc22 has been submitted as an update for Fedora 22. https://admin.fedoraproject.org/updates/firewalld-0.3.14.1-1.fc22 Package firewalld-0.3.14.1-1.fc22: * should fix your issue, * was pushed to the Fedora 22 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing firewalld-0.3.14.1-1.fc22' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2015-10008/firewalld-0.3.14.1-1.fc22 then log in and leave karma (feedback). firewalld-0.3.14.1-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. |