Created attachment 1219471 [details] snippets of logs Description of problem: Seems that neutron-openvswitch-agent/ryu may in some circumstance leak it's filedescriptor for open port to sudo neutron-roowrap-daemon process. I'm not able to reproduce it atm though, neither i have access to machine where it happened (already got reinstalled). Though it could be visible a from the logs i managed to gather before. Happened with openstack-neutron-openvswitch-9.0.0-1.4.el7ost.noarch. snippet from ovs agent log: > 2016-10-31 18:13:11.728 12455 ERROR ryu.lib.hub [-] hub: uncaught exception: Traceback (most recent call last): > File "/usr/lib/python2.7/site-packages/ryu/lib/hub.py", line 54, in _launch > return func(*args, **kwargs) > File "/usr/lib/python2.7/site-packages/ryu/controller/controller.py", line 97, in __call__ > self.ofp_ssl_listen_port) > File "/usr/lib/python2.7/site-packages/ryu/controller/controller.py", line 120, in server_loop > datapath_connection_factory) > File "/usr/lib/python2.7/site-packages/ryu/lib/hub.py", line 117, in __init__ > self.server = eventlet.listen(listen_info) > File "/usr/lib/python2.7/site-packages/eventlet/convenience.py", line 43, in listen > sock.bind(addr) > File "/usr/lib64/python2.7/socket.py", line 224, in meth > return getattr(self._sock,name)(*args) > error: [Errno 98] Address already in use search for who has the socket: > ss -lnp|grep 6633 > tcp LISTEN 51 50 127.0.0.1:6633 *:* users:(("sudo",pid=4667,fd=5)) > ps -ef |grep 4667 > root 4667 1 0 Oct27 ? 00:00:00 sudo neutron-rootwrap-daemon /etc/neutron/rootwrap.conf > root 4683 4667 0 Oct27 ? 00:00:00 /usr/bin/python2 /usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf attached is same info just with bigger section from ovs agent log (around that traceback)
*** This bug has been marked as a duplicate of bug 1450223 ***