Version-Release number of selected component: firewall-config-0.3.4-1.fc19 Additional info: reporter: libreport-2.1.6 cmdline: /usr/bin/python /usr/bin/firewall-config executable: /usr/bin/firewall-config kernel: 3.10.5-201.fc19.x86_64 runlevel: N 5 type: Python uid: 1000 Truncated backtrace: firewall-config:1562:onChangeZone:TypeError: 'NoneType' object has no attribute '__getitem__' Traceback (most recent call last): File "/usr/bin/firewall-config", line 1562, in onChangeZone _services = services[:] TypeError: 'NoneType' object has no attribute '__getitem__' Local variables in innermost frame: masquerade: False default: False interfaces: [] args: (<TreeSelection object at 0x23509b0 (GtkTreeSelection at 0x1ffa940)>,) self: <__main__.FirewallConfig object at 0x1e8cf10> sources: [] builtin: False icmpblocks: [] rules: [] services: None active_zone: 'public' ports: [] forward_ports: []
Created attachment 785274 [details] File: backtrace
Created attachment 785275 [details] File: environ
*** Bug 962398 has been marked as a duplicate of this bug. ***
*** Bug 974219 has been marked as a duplicate of this bug. ***
*** Bug 993400 has been marked as a duplicate of this bug. ***
*** Bug 994446 has been marked as a duplicate of this bug. ***
*** Bug 1018484 has been marked as a duplicate of this bug. ***
*** Bug 1021073 has been marked as a duplicate of this bug. ***
*** Bug 1036290 has been marked as a duplicate of this bug. ***
*** Bug 1036373 has been marked as a duplicate of this bug. ***
*** Bug 1044643 has been marked as a duplicate of this bug. ***
This might be fixed with 0.3.9.2, let's move it to ON_QA.
*** Bug 1076827 has been marked as a duplicate of this bug. ***
*** Bug 1076846 has been marked as a duplicate of this bug. ***
*** Bug 1088630 has been marked as a duplicate of this bug. ***
*** Bug 1093313 has been marked as a duplicate of this bug. ***
*** Bug 1097696 has been marked as a duplicate of this bug. ***
*** Bug 1109341 has been marked as a duplicate of this bug. ***
*** Bug 1118913 has been marked as a duplicate of this bug. ***
*** Bug 1119541 has been marked as a duplicate of this bug. ***
*** Bug 1120403 has been marked as a duplicate of this bug. ***
*** Bug 1121310 has been marked as a duplicate of this bug. ***
*** Bug 1000054 has been marked as a duplicate of this bug. ***
*** Bug 1134838 has been marked as a duplicate of this bug. ***
*** Bug 1150733 has been marked as a duplicate of this bug. ***
*** Bug 1151746 has been marked as a duplicate of this bug. ***
*** Bug 1151753 has been marked as a duplicate of this bug. ***
*** Bug 1154034 has been marked as a duplicate of this bug. ***
*** Bug 1167129 has been marked as a duplicate of this bug. ***
*** Bug 1172205 has been marked as a duplicate of this bug. ***
*** Bug 1175806 has been marked as a duplicate of this bug. ***
*** Bug 1178140 has been marked as a duplicate of this bug. ***
*** Bug 1177289 has been marked as a duplicate of this bug. ***
*** Bug 1180344 has been marked as a duplicate of this bug. ***
*** Bug 1182274 has been marked as a duplicate of this bug. ***
*** Bug 1183311 has been marked as a duplicate of this bug. ***
*** Bug 1183240 has been marked as a duplicate of this bug. ***
*** Bug 1186535 has been marked as a duplicate of this bug. ***
*** Bug 1206792 has been marked as a duplicate of this bug. ***
*** Bug 1213129 has been marked as a duplicate of this bug. ***
*** Bug 1218098 has been marked as a duplicate of this bug. ***
*** Bug 1220373 has been marked as a duplicate of this bug. ***
Finally, I was able to reproduce this. It is a result of an issue in polkitd. polkitd is getting bigger with each dbus request and then there is this in my log when it happens: [12429.514960] traps: polkitd[18980] general protection ip:7f9ab803dde2 sp:7fff4282fb30 error:0 in libmozjs-17.0.so[7f9ab7efe000+3ba000]
This is the traceback of polkitd within gdb: Program received signal SIGSEGV, Segmentation fault. 0x00007ffff6be1de2 in js::ShapeTable::search(long, bool) () from /lib64/libmozjs-17.0.so (gdb) where #0 0x00007ffff6be1de2 in js::ShapeTable::search(long, bool) () at /lib64/libmozjs-17.0.so #1 0x00007ffff6c8f688 in js::ObjectImpl::nativeLookup(JSContext*, long) () at /lib64/libmozjs-17.0.so #2 0x00007ffff6b9de2f in js::GetPropertyHelper(JSContext*, JS::Handle<JSObject*>, JS::Handle<long>, unsigned int, JS::MutableHandle<JS::Value>) () at /lib64/libmozjs-17.0.so #3 0x00007ffff6b78655 in js::Interpret(JSContext*, js::StackFrame*, js::InterpMode) () at /lib64/libmozjs-17.0.so #4 0x00007ffff6b811bd in js::RunScript(JSContext*, JSScript*, js::StackFrame*) () at /lib64/libmozjs-17.0.so #5 0x00007ffff6b81491 in js::InvokeKernel(JSContext*, JS::CallArgs, js::MaybeConstruct) () at /lib64/libmozjs-17.0.so #6 0x00007ffff6b81795 in js::Invoke(JSContext*, JS::Value const&, JS::Value const&, unsigned int, JS::Value*, JS::Value*) () at /lib64/libmozjs-17.0.so #7 0x00007ffff6aed04a in JS_CallFunctionName () at /lib64/libmozjs-17.0.so #8 0x000055555556075d in polkit_backend_js_authority_check_authorization_sync () #9 0x00005555555648ae in check_authorization_sync () #10 0x0000555555565100 in polkit_backend_interactive_authority_check_authorization () #11 0x000055555555e1c6 in server_handle_method_call () #12 0x00007ffff7912aac in call_in_idle_cb () at /lib64/libgio-2.0.so.0 #13 0x00007ffff73067fb in g_main_context_dispatch () at /lib64/libglib-2.0.so.0 #14 0x00007ffff7306b98 in g_main_context_iterate.isra () at /lib64/libglib-2.0.so.0 #15 0x00007ffff7306ec2 in g_main_loop_run () at /lib64/libglib-2.0.so.0 #16 0x000055555555d513 in main ()
When polkit dies the reply to a dbus call is damaged and not following the signature anymore.
There are two issues with polkit: - It gets bigger with each dbus call - It dies sometimes with results in a damaged dbus call reply
Thanks for your report. The polkit crashes are bug #910262. firewalld error handling also needs improvement: src/firewall/client.py:handle_exceptions can return None if the function it decorates fails, but the registered error handler doesn’t raise any exception and doesn’t quit. This can happen e.g. through firewall-config:_exception_handler -> firewall-config:_error, when the user clicks on OK and not Quit. So, reassigning back to firewalld to fix this error handling aspect; the polkit part will be fixed through #910262.
Fixed upstream (https://github.com/t-woerner/firewalld/commit/bbfb2af0e4f78feda74fd3d6dc4c7f3c582aea2c)
*** Bug 1190453 has been marked as a duplicate of this bug. ***
*** Bug 1195307 has been marked as a duplicate of this bug. ***
*** Bug 1190517 has been marked as a duplicate of this bug. ***
*** Bug 1208737 has been marked as a duplicate of this bug. ***
*** Bug 1195904 has been marked as a duplicate of this bug. ***
*** Bug 1053874 has been marked as a duplicate of this bug. ***
*** Bug 1194326 has been marked as a duplicate of this bug. ***
*** Bug 1229143 has been marked as a duplicate of this bug. ***
firewalld-0.3.14.1-1.fc22 has been submitted as an update for Fedora 22. https://admin.fedoraproject.org/updates/firewalld-0.3.14.1-1.fc22
Package firewalld-0.3.14.1-1.fc22: * should fix your issue, * was pushed to the Fedora 22 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing firewalld-0.3.14.1-1.fc22' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2015-10008/firewalld-0.3.14.1-1.fc22 then log in and leave karma (feedback).
firewalld-0.3.14.1-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.