Public bug reported: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac /autopkgtest-artful-canonical-kernel-team- ppa/artful/amd64/s/snapd/20170517_171222_5c77c@/log.gz
2017-05-17 17:11:40 Error restoring autopkgtest:ubuntu-17.10-amd64:tests/main/econnreset : ----- + echo 'Remove the firewall rule again' Remove the firewall rule again ++ id -u test + iptables -D OUTPUT -m owner --uid-owner 12345 -j REJECT -p tcp --reject-with tcp-reset iptables: No chain/target/match by that name. ----- Can be easily reproduced by hand: $ sudo iptables -I OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp --reject-with tcp-reset $ sudo iptables -D OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp --reject-with tcp-reset iptables: No chain/target/match by that name. The rule is successfully deleted in xenial/zesty. ** Affects: linux (Ubuntu) Importance: Medium Assignee: Seth Forshee (sforshee) Status: In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1691752 Title: iptables regression causing snapd ADT failure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691752/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs