Reverting f77bc5b23fb1 "iptables: use match, target and data copy_to_user helpers" fixes the problem.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1691752 Title: iptables regression causing snapd ADT failure Status in linux package in Ubuntu: In Progress Bug description: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac /autopkgtest-artful-canonical-kernel-team- ppa/artful/amd64/s/snapd/20170517_171222_5c77c@/log.gz 2017-05-17 17:11:40 Error restoring autopkgtest:ubuntu-17.10-amd64:tests/main/econnreset : ----- + echo 'Remove the firewall rule again' Remove the firewall rule again ++ id -u test + iptables -D OUTPUT -m owner --uid-owner 12345 -j REJECT -p tcp --reject-with tcp-reset iptables: No chain/target/match by that name. ----- Can be easily reproduced by hand: $ sudo iptables -I OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp --reject-with tcp-reset $ sudo iptables -D OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp --reject-with tcp-reset iptables: No chain/target/match by that name. The rule is successfully deleted in xenial/zesty. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691752/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

