Public bug reported:

https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
/autopkgtest-artful-canonical-kernel-team-
ppa/artful/amd64/s/snapd/20170517_171222_5c77c@/log.gz

2017-05-17 17:11:40 Error restoring 
autopkgtest:ubuntu-17.10-amd64:tests/main/econnreset : 
-----
+ echo 'Remove the firewall rule again'
Remove the firewall rule again
++ id -u test
+ iptables -D OUTPUT -m owner --uid-owner 12345 -j REJECT -p tcp --reject-with 
tcp-reset
iptables: No chain/target/match by that name.
-----

Can be easily reproduced by hand:

$ sudo iptables -I OUTPUT -m owner --uid-owner $(id -u) -j REJECT  -p tcp 
--reject-with tcp-reset
$ sudo iptables -D OUTPUT -m owner --uid-owner $(id -u) -j REJECT  -p tcp 
--reject-with tcp-reset
iptables: No chain/target/match by that name.

The rule is successfully deleted in xenial/zesty.

** Affects: linux (Ubuntu)
     Importance: Medium
     Assignee: Seth Forshee (sforshee)
         Status: In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691752

Title:
  iptables regression causing snapd ADT failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691752/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to