Public bug reported:

In some scenario, Like OpenStack Kolla, system may lack iptables-ipv6 package.
This may  cause  command ip6tables-save or ip6tables-restore invalid. In this 
situation, when enabling security group, may cause ovs agent error:

2015-12-29 10:59:50.020 1 DEBUG neutron.agent.securitygroups_rpc [-] Preparing 
device filters for 1 new devices setup_port_filters 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:345
2015-12-29 10:59:50.021 1 INFO neutron.agent.securitygroups_rpc [-] Preparing 
filters for devices set([u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'])
2015-12-29 10:59:50.022 1 DEBUG neutron.agent.securitygroups_rpc [-] Get 
security group information for devices via rpc 
[u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'] security_group_info_for_devices 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:99
2015-12-29 10:59:50.023 1 DEBUG neutron.openstack.common.rpc.amqp [-] Making 
synchronous call on q-plugin ... multicall 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:566
2015-12-29 10:59:50.023 1 DEBUG neutron.openstack.common.rpc.amqp [-] MSG_ID is 
c49309ed837d4b9e8470314dece984e1 multicall 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:569
2015-12-29 10:59:50.024 1 DEBUG neutron.openstack.common.rpc.amqp [-] UNIQUE_ID 
is 0fd2207db4ab4f37831c913ce9ba4c18. _add_unique_id 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:350
2015-12-29 10:59:50.103 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Preparing device (5735d7ab-6acf-4240-82a3-857da9ddeaf6) filter 
prepare_port_filter 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:75
2015-12-29 10:59:50.104 1 DEBUG neutron.agent.securitygroups_rpc [-] Update 
security group information for ports [u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'] 
prepare_devices_filter 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:228
2015-12-29 10:59:50.105 1 DEBUG neutron.agent.securitygroups_rpc [-] Update 
security group information _update_security_group_info 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:234
2015-12-29 10:59:50.106 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Update rules of security group (1f21c2f6-8da1-4e90-af81-6ea9f0197c5f) 
update_security_group_rules 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:67
2015-12-29 10:59:50.107 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Update members of security group (1f21c2f6-8da1-4e90-af81-6ea9f0197c5f) 
update_security_group_members 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:71
2015-12-29 10:59:50.111 1 DEBUG neutron.openstack.common.lockutils [-] Got 
semaphore "iptables" lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:171
2015-12-29 10:59:50.112 1 DEBUG neutron.openstack.common.lockutils [-] 
Attempting to grab file lock "iptables" lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:181
2015-12-29 10:59:50.113 1 DEBUG neutron.openstack.common.lockutils [-] Got file 
lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:209
2015-12-29 10:59:50.114 1 DEBUG neutron.agent.linux.iptables_manager [-] Got 
semaphore / lock "iptables" _apply 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py:387
2015-12-29 10:59:50.116 1 DEBUG neutron.agent.linux.utils [-] Running command: 
['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', 
'-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
2015-12-29 10:59:50.289 1 DEBUG neutron.agent.linux.utils [-] 
Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-save', '-c']
Exit code: 0
Stdout: '# Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 
2015\n*raw\n:PREROUTING ACCEPT [119556:1153563515]\n:OUTPUT ACCEPT 
[106227:52170137]\n:neutron-openvswi-OUTPUT - 
[0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[31647:32857604] -A PREROUTING -j 
neutron-openvswi-PREROUTING \n[0:0] -A PREROUTING -p gre -m comment --comment 
"333 notrack gre" -j NOTRACK \n[39061:45136621] -A OUTPUT -j 
neutron-openvswi-OUTPUT \nCOMMIT\n# Completed on Tue Dec 29 10:59:50 2015\n# 
Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 
2015\n*nat\n:PREROUTING ACCEPT [1940:78467]\n:POSTROUTING ACCEPT 
[108:7227]\n:OUTPUT ACCEPT [105:6300]\n:DOCKER - 
[0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - 
[0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - 
[0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - 
[0:0]\n[395:16647] -A PREROUTING -j neutron-openvswi-PREROUTING \n[73:4380] -A 
PREROUTING -m addrtype --dst-type LOCAL -j DOCKER \n[3
 6:2907] -A POSTROUTING -j neutron-openvswi-POSTROUTING \n[36:2907] -A 
POSTROUTING -j neutron-postrouting-bottom \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 -d 224.0.0.0/24 -j RETURN \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 -d 255.255.255.255/32 -j RETURN \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 ! -d 192.168.122.0/24 -p tcp -j MASQUERADE --to-ports 
1024-65535 \n[0:0] -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p 
udp -j MASQUERADE --to-ports 1024-65535 \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 ! -d 192.168.122.0/24 -j MASQUERADE \n[0:0] -A POSTROUTING -s 
172.17.0.0/16 ! -o docker0 -j MASQUERADE \n[33:1980] -A OUTPUT -j 
neutron-openvswi-OUTPUT \n[0:0] -A OUTPUT ! -d 127.0.0.0/8 -m addrtype 
--dst-type LOCAL -j DOCKER \n[36:2907] -A neutron-openvswi-snat -j 
neutron-openvswi-float-snat \n[36:2907] -A neutron-postrouting-bottom -j 
neutron-openvswi-snat \nCOMMIT\n# Completed on Tue Dec 29 10:59:50 2015\n# 
Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 2015\n*mang
 le\n:PREROUTING ACCEPT [68870:358570045]\n:INPUT ACCEPT 
[65002:358415325]\n:FORWARD ACCEPT [1937:78287]\n:OUTPUT ACCEPT 
[69746:48620665]\n:POSTROUTING ACCEPT 
[71683:48698952]\n:neutron-openvswi-POSTROUTING - [0:0]\n[39078:44624498] -A 
POSTROUTING -j neutron-openvswi-POSTROUTING \n[0:0] -A POSTROUTING -o virbr0 -p 
udp -m udp --dport 68 -j CHECKSUM --checksum-fill \n[4:745] -A POSTROUTING -p 
udp -m udp --dport 514 -j CHECKSUM --checksum-fill \nCOMMIT\n# Completed on Tue 
Dec 29 10:59:50 2015\n# Generated by iptables-save v1.4.7 on Tue Dec 29 
10:59:50 2015\n*filter\n:INPUT ACCEPT [0:0]\n:FORWARD ACCEPT 
[1934:77360]\n:OUTPUT ACCEPT [69061:47596876]\n:DOCKER - 
[0:0]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - 
[0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - 
[0:0]\n:neutron-openvswi-i5735d7ab-6 - [0:0]\n:neutron-openvswi-local - 
[0:0]\n:neutron-openvswi-o5735d7ab-6 - [0:0]\n:neutron-openvswi-s5735d7ab-6 - 
[0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-o
 penvswi-sg-fallback - [0:0]\n[30114:32143705] -A INPUT -j 
neutron-openvswi-INPUT \n[0:0] -A INPUT -i virbr0 -p udp -m udp --dport 53 -j 
ACCEPT \n[0:0] -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT \n[0:0] -A 
INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT \n[0:0] -A INPUT -i virbr0 
-p tcp -m tcp --dport 67 -j ACCEPT \n[0:0] -A INPUT -p icmp -m comment 
--comment "000 accept all icmp requests" -j ACCEPT \n[4211:221092] -A INPUT -i 
lo -m comment --comment "001 accept all to lo interface" -j ACCEPT 
\n[109877:1152500281] -A INPUT -m comment --comment "002 accept related 
established rules" -m state --state RELATED,ESTABLISHED -j ACCEPT \n[0:0] -A 
INPUT -s 10.20.0.2/32 -p tcp -m multiport --sports 
4369,5672,15672,41055,55672,61613 -m comment --comment "003 remote rabbitmq " 
-j ACCEPT \n[0:0] -A INPUT -s 10.20.0.2/32 -p tcp -m multiport --sports 8140 -m 
comment --comment "004 remote puppet " -j ACCEPT \n[73:4380] -A INPUT -p tcp -m 
multiport --ports 22 -m comment --comment "020 s
 sh" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 80,443 -m comment 
--comment "100 http" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
3306,3307,4567,4568,4444,49000 -m comment --comment "101 mysql" -j ACCEPT 
\n[0:0] -A INPUT -p tcp -m multiport --ports 5000,35357 -m comment --comment 
"102 keystone" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
8080,6000,6001,6002,49001 -m comment --comment "103 swift" -j ACCEPT \n[0:0] -A 
INPUT -p tcp -m multiport --ports 9292,9191,8773 -m comment --comment "104 
glance" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
8774,8775,8776,6080 -m comment --comment "105 nova " -j ACCEPT \n[0:0] -A INPUT 
-p tcp -m multiport --ports 4369,5672,5673,41055 -m comment --comment "106 
rabbitmq " -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 11211 -m 
comment --comment "107 memcached tcp" -j ACCEPT \n[0:0] -A INPUT -p udp -m 
multiport --ports 11211 -m comment --comment "107 memcached udp" -j ACCEPT 
\n[0:0] -A INPUT -p tcp -
 m multiport --ports 873 -m comment --comment "108 rsync" -j ACCEPT \n[0:0] -A 
INPUT -p tcp -m multiport --ports 3260 -m comment --comment "109 iscsi " -j 
ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 9696 -m comment --comment 
"110 neutron " -j ACCEPT \n[3:927] -A INPUT -p udp -m multiport --ports 67 -m 
comment --comment "111 dhcp-server" -j ACCEPT \n[0:0] -A INPUT -p udp -m 
multiport --ports 53 -m comment --comment "111 dns-server" -j ACCEPT \n[0:0] -A 
INPUT -p udp -m multiport --ports 123 -m comment --comment "112 ntp-server" -j 
ACCEPT \n[0:0] -A INPUT -p udp -m multiport --ports 5404 -m comment --comment 
"113 corosync-input" -j ACCEPT \n[0:0] -A INPUT -p udp -m multiport --ports 
5405 -m comment --comment "114 corosync-output" -j ACCEPT \n[0:0] -A INPUT -p 
tcp -m multiport --ports 2224 -m comment --comment "115 pcsd-server" -j ACCEPT 
\n[0:0] -A INPUT -p udp -m multiport --ports 58882 -m comment --comment "116 
openvswitch db" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --po
 rts 5666 -m comment --comment "117 nrpe-server" -j ACCEPT \n[0:0] -A INPUT -s 
192.168.0.0/24 -p tcp -m multiport --ports 16509 -m comment --comment "118 
libvirt" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 49152:49215 -m 
comment --comment "119 libvirt migration" -j ACCEPT \n[0:0] -A INPUT -s 
192.168.0.0/24 -p tcp -m multiport --ports 5900:6100 -m comment --comment "120 
vnc ports" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 8777 -m 
comment --comment "121 ceilometer" -j ACCEPT \n[0:0] -A INPUT -p gre -m comment 
--comment "334 accept gre" -j ACCEPT \n[2:80] -A INPUT -m comment --comment 
"999 drop all other requests" -j DROP \n[393:16527] -A FORWARD -j 
neutron-filter-top \n[393:16527] -A FORWARD -j neutron-openvswi-FORWARD \n[0:0] 
-A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate 
RELATED,ESTABLISHED -j ACCEPT \n[0:0] -A FORWARD -s 192.168.122.0/24 -i virbr0 
-j ACCEPT \n[0:0] -A FORWARD -i virbr0 -o virbr0 -j ACCEPT \n[0:0] -A FORWARD 
-o virbr0 -j REJE
 CT --reject-with icmp-port-unreachable \n[0:0] -A FORWARD -i virbr0 -j REJECT 
--reject-with icmp-port-unreachable \n[0:0] -A FORWARD -o docker0 -j DOCKER 
\n[0:0] -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j 
ACCEPT \n[0:0] -A FORWARD -i docker0 ! -o docker0 -j ACCEPT \n[0:0] -A FORWARD 
-i docker0 -o docker0 -j ACCEPT \n[37916:43579541] -A OUTPUT -j 
neutron-filter-top \n[37916:43579541] -A OUTPUT -j neutron-openvswi-OUTPUT 
\n[0:0] -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT 
\n[38309:43596068] -A neutron-filter-top -j neutron-openvswi-local \n[0:0] -A 
neutron-openvswi-FORWARD -m physdev --physdev-out tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-sg-chain \n[3:927] -A 
neutron-openvswi-FORWARD -m physdev --physdev-in tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-sg-chain \n[0:0] -A 
neutron-openvswi-INPUT -m physdev --physdev-in tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-o5735d7ab-6 \n[0:0] -A 
neutron-openvswi-i5735d7ab-6 
 -m state --state INVALID -j DROP \n[0:0] -A neutron-openvswi-i5735d7ab-6 -m 
state --state RELATED,ESTABLISHED -j RETURN \n[0:0] -A 
neutron-openvswi-i5735d7ab-6 -s 192.168.111.3/32 -p udp -m udp --sport 67 
--dport 68 -j RETURN \n[0:0] -A neutron-openvswi-i5735d7ab-6 -p icmp -j RETURN 
\n[0:0] -A neutron-openvswi-i5735d7ab-6 -s 192.168.111.4/32 -j RETURN \n[0:0] 
-A neutron-openvswi-i5735d7ab-6 -j neutron-openvswi-sg-fallback \n[3:927] -A 
neutron-openvswi-o5735d7ab-6 -p udp -m udp --sport 68 --dport 67 -j RETURN 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -j neutron-openvswi-s5735d7ab-6 \n[0:0] 
-A neutron-openvswi-o5735d7ab-6 -p udp -m udp --sport 67 --dport 68 -j DROP 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -m state --state INVALID -j DROP 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -m state --state RELATED,ESTABLISHED -j 
RETURN \n[0:0] -A neutron-openvswi-o5735d7ab-6 -j RETURN \n[0:0] -A 
neutron-openvswi-o5735d7ab-6 -p icmp -j RETURN \n[0:0] -A 
neutron-openvswi-o5735d7ab-6 -j neutron-openvswi
 -sg-fallback \n[0:0] -A neutron-openvswi-s5735d7ab-6 -s 192.168.111.2/32 -m 
mac --mac-source FA:16:3E:DE:22:11 -j RETURN \n[0:0] -A 
neutron-openvswi-s5735d7ab-6 -j DROP \n[0:0] -A neutron-openvswi-sg-chain -m 
physdev --physdev-out tap5735d7ab-6a --physdev-is-bridged -j 
neutron-openvswi-i5735d7ab-6 \n[3:927] -A neutron-openvswi-sg-chain -m physdev 
--physdev-in tap5735d7ab-6a --physdev-is-bridged -j 
neutron-openvswi-o5735d7ab-6 \n[3:927] -A neutron-openvswi-sg-chain -j ACCEPT 
\n[0:0] -A neutron-openvswi-sg-fallback -j DROP \nCOMMIT\n# Completed on Tue 
Dec 29 10:59:50 2015\n'
Stderr: '' _execute 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:94
2015-12-29 10:59:50.298 1 DEBUG neutron.agent.linux.utils [-] Running command: 
['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', 
'-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
2015-12-29 10:59:50.468 1 DEBUG neutron.agent.linux.utils [-] 
Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-restore', '-c']
Exit code: 0
Stdout: ''
Stderr: '' _execute 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:94
2015-12-29 10:59:50.470 1 DEBUG neutron.agent.linux.utils [-] Running command: 
['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', 
'-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
2015-12-29 10:59:50.604 1 ERROR neutron.agent.linux.utils [-] 
Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'ip6tables-save', '-c']
Exit code: 96
Stdout: ''
Stderr: '/usr/bin/neutron-rootwrap: Executable not found: ip6tables-save 
(filter match = ip6tables-save)\n'
2015-12-29 10:59:50.605 1 DEBUG neutron.openstack.common.lockutils [-] Released 
file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:213
2015-12-29 10:59:50.606 1 DEBUG neutron.agent.linux.iptables_manager [-] 
Semaphore / lock released "iptables" _apply 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py:390
2015-12-29 10:59:50.607 1 ERROR 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Error while processing 
VIF ports
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Traceback (most recent call 
last):
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py",
 line 1299, in rpc_loop
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     ovs_restarted)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py",
 line 1126, in process_network_ports
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
port_info.get('updated', set()))
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
346, in setup_port_filters
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.prepare_devices_filter(new_devices)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
205, in decorated_function
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     return func(self, 
*args, **kwargs)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
230, in prepare_devices_filter
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     security_groups, 
security_group_member_ips)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib64/python2.6/contextlib.py", line 23, in __exit__
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     self.gen.next()
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/firewall.py", line 109, in 
defer_apply
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.filter_defer_apply_off()
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py", 
line 436, in filter_defer_apply_off
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.iptables.defer_apply_off()
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 372, in defer_apply_off
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     self._apply()
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 388, in _apply
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     return 
self._apply_synchronized()
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 408, in _apply_synchronized
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     all_tables = 
self.execute(args, root_helper=self.root_helper)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py", line 118, in 
execute
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     extra_ok_codes)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py", line 92, in 
_execute
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     raise RuntimeError(m)
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent RuntimeError: 
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Command: ['sudo', 
'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c']
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Exit code: 96
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Stdout: ''
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Stderr: 
'/usr/bin/neutron-rootwrap: Executable not found: ip6tables-save (filter match 
= ip6tables-save)\n'
2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent 
2015-12-29 10:59:50.611 1 DEBUG 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent rpc_loop - 
iteration:1005 completed. Processed ports statistics: {'ancillary': {'removed': 
0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. 
Elapsed:1.472 rpc_loop 
/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1349
2015-12-29 10:59:51.139 1 DEBUG 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent rpc_loop - 
iteration:1006 started rpc_loop 
/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1248

This problem can avoid by using neutron sanity check tool.

** Affects: neutron
     Importance: Undecided
     Assignee: Dongcan Ye (hellochosen)
         Status: New

** Changed in: neutron
     Assignee: (unassigned) => Dongcan Ye (hellochosen)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1530042

Title:
  Missing iptables-ipv6 package cause ovs agent create flow failed

Status in neutron:
  New

Bug description:
  In some scenario, Like OpenStack Kolla, system may lack iptables-ipv6 package.
  This may  cause  command ip6tables-save or ip6tables-restore invalid. In this 
situation, when enabling security group, may cause ovs agent error:

  2015-12-29 10:59:50.020 1 DEBUG neutron.agent.securitygroups_rpc [-] 
Preparing device filters for 1 new devices setup_port_filters 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:345
  2015-12-29 10:59:50.021 1 INFO neutron.agent.securitygroups_rpc [-] Preparing 
filters for devices set([u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'])
  2015-12-29 10:59:50.022 1 DEBUG neutron.agent.securitygroups_rpc [-] Get 
security group information for devices via rpc 
[u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'] security_group_info_for_devices 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:99
  2015-12-29 10:59:50.023 1 DEBUG neutron.openstack.common.rpc.amqp [-] Making 
synchronous call on q-plugin ... multicall 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:566
  2015-12-29 10:59:50.023 1 DEBUG neutron.openstack.common.rpc.amqp [-] MSG_ID 
is c49309ed837d4b9e8470314dece984e1 multicall 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:569
  2015-12-29 10:59:50.024 1 DEBUG neutron.openstack.common.rpc.amqp [-] 
UNIQUE_ID is 0fd2207db4ab4f37831c913ce9ba4c18. _add_unique_id 
/usr/lib/python2.6/site-packages/neutron/openstack/common/rpc/amqp.py:350
  2015-12-29 10:59:50.103 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Preparing device (5735d7ab-6acf-4240-82a3-857da9ddeaf6) filter 
prepare_port_filter 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:75
  2015-12-29 10:59:50.104 1 DEBUG neutron.agent.securitygroups_rpc [-] Update 
security group information for ports [u'5735d7ab-6acf-4240-82a3-857da9ddeaf6'] 
prepare_devices_filter 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:228
  2015-12-29 10:59:50.105 1 DEBUG neutron.agent.securitygroups_rpc [-] Update 
security group information _update_security_group_info 
/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py:234
  2015-12-29 10:59:50.106 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Update rules of security group (1f21c2f6-8da1-4e90-af81-6ea9f0197c5f) 
update_security_group_rules 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:67
  2015-12-29 10:59:50.107 1 DEBUG neutron.agent.linux.iptables_firewall [-] 
Update members of security group (1f21c2f6-8da1-4e90-af81-6ea9f0197c5f) 
update_security_group_members 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py:71
  2015-12-29 10:59:50.111 1 DEBUG neutron.openstack.common.lockutils [-] Got 
semaphore "iptables" lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:171
  2015-12-29 10:59:50.112 1 DEBUG neutron.openstack.common.lockutils [-] 
Attempting to grab file lock "iptables" lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:181
  2015-12-29 10:59:50.113 1 DEBUG neutron.openstack.common.lockutils [-] Got 
file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:209
  2015-12-29 10:59:50.114 1 DEBUG neutron.agent.linux.iptables_manager [-] Got 
semaphore / lock "iptables" _apply 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py:387
  2015-12-29 10:59:50.116 1 DEBUG neutron.agent.linux.utils [-] Running 
command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-save', '-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
  2015-12-29 10:59:50.289 1 DEBUG neutron.agent.linux.utils [-] 
  Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-save', '-c']
  Exit code: 0
  Stdout: '# Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 
2015\n*raw\n:PREROUTING ACCEPT [119556:1153563515]\n:OUTPUT ACCEPT 
[106227:52170137]\n:neutron-openvswi-OUTPUT - 
[0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[31647:32857604] -A PREROUTING -j 
neutron-openvswi-PREROUTING \n[0:0] -A PREROUTING -p gre -m comment --comment 
"333 notrack gre" -j NOTRACK \n[39061:45136621] -A OUTPUT -j 
neutron-openvswi-OUTPUT \nCOMMIT\n# Completed on Tue Dec 29 10:59:50 2015\n# 
Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 
2015\n*nat\n:PREROUTING ACCEPT [1940:78467]\n:POSTROUTING ACCEPT 
[108:7227]\n:OUTPUT ACCEPT [105:6300]\n:DOCKER - 
[0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - 
[0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - 
[0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - 
[0:0]\n[395:16647] -A PREROUTING -j neutron-openvswi-PREROUTING \n[73:4380] -A 
PREROUTING -m addrtype --dst-type LOCAL -j DOCKER \n
 [36:2907] -A POSTROUTING -j neutron-openvswi-POSTROUTING \n[36:2907] -A 
POSTROUTING -j neutron-postrouting-bottom \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 -d 224.0.0.0/24 -j RETURN \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 -d 255.255.255.255/32 -j RETURN \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 ! -d 192.168.122.0/24 -p tcp -j MASQUERADE --to-ports 
1024-65535 \n[0:0] -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p 
udp -j MASQUERADE --to-ports 1024-65535 \n[0:0] -A POSTROUTING -s 
192.168.122.0/24 ! -d 192.168.122.0/24 -j MASQUERADE \n[0:0] -A POSTROUTING -s 
172.17.0.0/16 ! -o docker0 -j MASQUERADE \n[33:1980] -A OUTPUT -j 
neutron-openvswi-OUTPUT \n[0:0] -A OUTPUT ! -d 127.0.0.0/8 -m addrtype 
--dst-type LOCAL -j DOCKER \n[36:2907] -A neutron-openvswi-snat -j 
neutron-openvswi-float-snat \n[36:2907] -A neutron-postrouting-bottom -j 
neutron-openvswi-snat \nCOMMIT\n# Completed on Tue Dec 29 10:59:50 2015\n# 
Generated by iptables-save v1.4.7 on Tue Dec 29 10:59:50 2015\n*ma
 ngle\n:PREROUTING ACCEPT [68870:358570045]\n:INPUT ACCEPT 
[65002:358415325]\n:FORWARD ACCEPT [1937:78287]\n:OUTPUT ACCEPT 
[69746:48620665]\n:POSTROUTING ACCEPT 
[71683:48698952]\n:neutron-openvswi-POSTROUTING - [0:0]\n[39078:44624498] -A 
POSTROUTING -j neutron-openvswi-POSTROUTING \n[0:0] -A POSTROUTING -o virbr0 -p 
udp -m udp --dport 68 -j CHECKSUM --checksum-fill \n[4:745] -A POSTROUTING -p 
udp -m udp --dport 514 -j CHECKSUM --checksum-fill \nCOMMIT\n# Completed on Tue 
Dec 29 10:59:50 2015\n# Generated by iptables-save v1.4.7 on Tue Dec 29 
10:59:50 2015\n*filter\n:INPUT ACCEPT [0:0]\n:FORWARD ACCEPT 
[1934:77360]\n:OUTPUT ACCEPT [69061:47596876]\n:DOCKER - 
[0:0]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - 
[0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - 
[0:0]\n:neutron-openvswi-i5735d7ab-6 - [0:0]\n:neutron-openvswi-local - 
[0:0]\n:neutron-openvswi-o5735d7ab-6 - [0:0]\n:neutron-openvswi-s5735d7ab-6 - 
[0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron
 -openvswi-sg-fallback - [0:0]\n[30114:32143705] -A INPUT -j 
neutron-openvswi-INPUT \n[0:0] -A INPUT -i virbr0 -p udp -m udp --dport 53 -j 
ACCEPT \n[0:0] -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT \n[0:0] -A 
INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT \n[0:0] -A INPUT -i virbr0 
-p tcp -m tcp --dport 67 -j ACCEPT \n[0:0] -A INPUT -p icmp -m comment 
--comment "000 accept all icmp requests" -j ACCEPT \n[4211:221092] -A INPUT -i 
lo -m comment --comment "001 accept all to lo interface" -j ACCEPT 
\n[109877:1152500281] -A INPUT -m comment --comment "002 accept related 
established rules" -m state --state RELATED,ESTABLISHED -j ACCEPT \n[0:0] -A 
INPUT -s 10.20.0.2/32 -p tcp -m multiport --sports 
4369,5672,15672,41055,55672,61613 -m comment --comment "003 remote rabbitmq " 
-j ACCEPT \n[0:0] -A INPUT -s 10.20.0.2/32 -p tcp -m multiport --sports 8140 -m 
comment --comment "004 remote puppet " -j ACCEPT \n[73:4380] -A INPUT -p tcp -m 
multiport --ports 22 -m comment --comment "020
  ssh" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 80,443 -m comment 
--comment "100 http" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
3306,3307,4567,4568,4444,49000 -m comment --comment "101 mysql" -j ACCEPT 
\n[0:0] -A INPUT -p tcp -m multiport --ports 5000,35357 -m comment --comment 
"102 keystone" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
8080,6000,6001,6002,49001 -m comment --comment "103 swift" -j ACCEPT \n[0:0] -A 
INPUT -p tcp -m multiport --ports 9292,9191,8773 -m comment --comment "104 
glance" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 
8774,8775,8776,6080 -m comment --comment "105 nova " -j ACCEPT \n[0:0] -A INPUT 
-p tcp -m multiport --ports 4369,5672,5673,41055 -m comment --comment "106 
rabbitmq " -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 11211 -m 
comment --comment "107 memcached tcp" -j ACCEPT \n[0:0] -A INPUT -p udp -m 
multiport --ports 11211 -m comment --comment "107 memcached udp" -j ACCEPT 
\n[0:0] -A INPUT -p tcp
  -m multiport --ports 873 -m comment --comment "108 rsync" -j ACCEPT \n[0:0] 
-A INPUT -p tcp -m multiport --ports 3260 -m comment --comment "109 iscsi " -j 
ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 9696 -m comment --comment 
"110 neutron " -j ACCEPT \n[3:927] -A INPUT -p udp -m multiport --ports 67 -m 
comment --comment "111 dhcp-server" -j ACCEPT \n[0:0] -A INPUT -p udp -m 
multiport --ports 53 -m comment --comment "111 dns-server" -j ACCEPT \n[0:0] -A 
INPUT -p udp -m multiport --ports 123 -m comment --comment "112 ntp-server" -j 
ACCEPT \n[0:0] -A INPUT -p udp -m multiport --ports 5404 -m comment --comment 
"113 corosync-input" -j ACCEPT \n[0:0] -A INPUT -p udp -m multiport --ports 
5405 -m comment --comment "114 corosync-output" -j ACCEPT \n[0:0] -A INPUT -p 
tcp -m multiport --ports 2224 -m comment --comment "115 pcsd-server" -j ACCEPT 
\n[0:0] -A INPUT -p udp -m multiport --ports 58882 -m comment --comment "116 
openvswitch db" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --
 ports 5666 -m comment --comment "117 nrpe-server" -j ACCEPT \n[0:0] -A INPUT 
-s 192.168.0.0/24 -p tcp -m multiport --ports 16509 -m comment --comment "118 
libvirt" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 49152:49215 -m 
comment --comment "119 libvirt migration" -j ACCEPT \n[0:0] -A INPUT -s 
192.168.0.0/24 -p tcp -m multiport --ports 5900:6100 -m comment --comment "120 
vnc ports" -j ACCEPT \n[0:0] -A INPUT -p tcp -m multiport --ports 8777 -m 
comment --comment "121 ceilometer" -j ACCEPT \n[0:0] -A INPUT -p gre -m comment 
--comment "334 accept gre" -j ACCEPT \n[2:80] -A INPUT -m comment --comment 
"999 drop all other requests" -j DROP \n[393:16527] -A FORWARD -j 
neutron-filter-top \n[393:16527] -A FORWARD -j neutron-openvswi-FORWARD \n[0:0] 
-A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate 
RELATED,ESTABLISHED -j ACCEPT \n[0:0] -A FORWARD -s 192.168.122.0/24 -i virbr0 
-j ACCEPT \n[0:0] -A FORWARD -i virbr0 -o virbr0 -j ACCEPT \n[0:0] -A FORWARD 
-o virbr0 -j RE
 JECT --reject-with icmp-port-unreachable \n[0:0] -A FORWARD -i virbr0 -j 
REJECT --reject-with icmp-port-unreachable \n[0:0] -A FORWARD -o docker0 -j 
DOCKER \n[0:0] -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED 
-j ACCEPT \n[0:0] -A FORWARD -i docker0 ! -o docker0 -j ACCEPT \n[0:0] -A 
FORWARD -i docker0 -o docker0 -j ACCEPT \n[37916:43579541] -A OUTPUT -j 
neutron-filter-top \n[37916:43579541] -A OUTPUT -j neutron-openvswi-OUTPUT 
\n[0:0] -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT 
\n[38309:43596068] -A neutron-filter-top -j neutron-openvswi-local \n[0:0] -A 
neutron-openvswi-FORWARD -m physdev --physdev-out tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-sg-chain \n[3:927] -A 
neutron-openvswi-FORWARD -m physdev --physdev-in tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-sg-chain \n[0:0] -A 
neutron-openvswi-INPUT -m physdev --physdev-in tap5735d7ab-6a 
--physdev-is-bridged -j neutron-openvswi-o5735d7ab-6 \n[0:0] -A 
neutron-openvswi-i5735d7ab-
 6 -m state --state INVALID -j DROP \n[0:0] -A neutron-openvswi-i5735d7ab-6 -m 
state --state RELATED,ESTABLISHED -j RETURN \n[0:0] -A 
neutron-openvswi-i5735d7ab-6 -s 192.168.111.3/32 -p udp -m udp --sport 67 
--dport 68 -j RETURN \n[0:0] -A neutron-openvswi-i5735d7ab-6 -p icmp -j RETURN 
\n[0:0] -A neutron-openvswi-i5735d7ab-6 -s 192.168.111.4/32 -j RETURN \n[0:0] 
-A neutron-openvswi-i5735d7ab-6 -j neutron-openvswi-sg-fallback \n[3:927] -A 
neutron-openvswi-o5735d7ab-6 -p udp -m udp --sport 68 --dport 67 -j RETURN 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -j neutron-openvswi-s5735d7ab-6 \n[0:0] 
-A neutron-openvswi-o5735d7ab-6 -p udp -m udp --sport 67 --dport 68 -j DROP 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -m state --state INVALID -j DROP 
\n[0:0] -A neutron-openvswi-o5735d7ab-6 -m state --state RELATED,ESTABLISHED -j 
RETURN \n[0:0] -A neutron-openvswi-o5735d7ab-6 -j RETURN \n[0:0] -A 
neutron-openvswi-o5735d7ab-6 -p icmp -j RETURN \n[0:0] -A 
neutron-openvswi-o5735d7ab-6 -j neutron-openvs
 wi-sg-fallback \n[0:0] -A neutron-openvswi-s5735d7ab-6 -s 192.168.111.2/32 -m 
mac --mac-source FA:16:3E:DE:22:11 -j RETURN \n[0:0] -A 
neutron-openvswi-s5735d7ab-6 -j DROP \n[0:0] -A neutron-openvswi-sg-chain -m 
physdev --physdev-out tap5735d7ab-6a --physdev-is-bridged -j 
neutron-openvswi-i5735d7ab-6 \n[3:927] -A neutron-openvswi-sg-chain -m physdev 
--physdev-in tap5735d7ab-6a --physdev-is-bridged -j 
neutron-openvswi-o5735d7ab-6 \n[3:927] -A neutron-openvswi-sg-chain -j ACCEPT 
\n[0:0] -A neutron-openvswi-sg-fallback -j DROP \nCOMMIT\n# Completed on Tue 
Dec 29 10:59:50 2015\n'
  Stderr: '' _execute 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:94
  2015-12-29 10:59:50.298 1 DEBUG neutron.agent.linux.utils [-] Running 
command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-restore', '-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
  2015-12-29 10:59:50.468 1 DEBUG neutron.agent.linux.utils [-] 
  Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'iptables-restore', '-c']
  Exit code: 0
  Stdout: ''
  Stderr: '' _execute 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:94
  2015-12-29 10:59:50.470 1 DEBUG neutron.agent.linux.utils [-] Running 
command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'ip6tables-save', '-c'] create_process 
/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py:58
  2015-12-29 10:59:50.604 1 ERROR neutron.agent.linux.utils [-] 
  Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 
'ip6tables-save', '-c']
  Exit code: 96
  Stdout: ''
  Stderr: '/usr/bin/neutron-rootwrap: Executable not found: ip6tables-save 
(filter match = ip6tables-save)\n'
  2015-12-29 10:59:50.605 1 DEBUG neutron.openstack.common.lockutils [-] 
Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock 
/usr/lib/python2.6/site-packages/neutron/openstack/common/lockutils.py:213
  2015-12-29 10:59:50.606 1 DEBUG neutron.agent.linux.iptables_manager [-] 
Semaphore / lock released "iptables" _apply 
/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py:390
  2015-12-29 10:59:50.607 1 ERROR 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Error while processing 
VIF ports
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Traceback (most recent call 
last):
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py",
 line 1299, in rpc_loop
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     ovs_restarted)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py",
 line 1126, in process_network_ports
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
port_info.get('updated', set()))
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
346, in setup_port_filters
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.prepare_devices_filter(new_devices)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
205, in decorated_function
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     return func(self, 
*args, **kwargs)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/securitygroups_rpc.py", line 
230, in prepare_devices_filter
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     security_groups, 
security_group_member_ips)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib64/python2.6/contextlib.py", line 23, in __exit__
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     self.gen.next()
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/firewall.py", line 109, in 
defer_apply
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.filter_defer_apply_off()
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_firewall.py", 
line 436, in filter_defer_apply_off
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     
self.iptables.defer_apply_off()
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 372, in defer_apply_off
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     self._apply()
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 388, in _apply
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     return 
self._apply_synchronized()
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/iptables_manager.py", 
line 408, in _apply_synchronized
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     all_tables = 
self.execute(args, root_helper=self.root_helper)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py", line 118, in 
execute
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     extra_ok_codes)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent   File 
"/usr/lib/python2.6/site-packages/neutron/agent/linux/utils.py", line 92, in 
_execute
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent     raise RuntimeError(m)
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent RuntimeError: 
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Command: ['sudo', 
'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c']
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Exit code: 96
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Stdout: ''
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent Stderr: 
'/usr/bin/neutron-rootwrap: Executable not found: ip6tables-save (filter match 
= ip6tables-save)\n'
  2015-12-29 10:59:50.607 1 TRACE 
neutron.plugins.openvswitch.agent.ovs_neutron_agent 
  2015-12-29 10:59:50.611 1 DEBUG 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent rpc_loop - 
iteration:1005 completed. Processed ports statistics: {'ancillary': {'removed': 
0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. 
Elapsed:1.472 rpc_loop 
/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1349
  2015-12-29 10:59:51.139 1 DEBUG 
neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent rpc_loop - 
iteration:1006 started rpc_loop 
/usr/lib/python2.6/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1248

  This problem can avoid by using neutron sanity check tool.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1530042/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to