-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
netavark: unable to append rule '-j MARK --set-xmark 0x2000/0x2000' to table 'nat' #24374
Comments
i might add that 2weeks ago this was working find, not sure which update broke it since f40 running on that server is automatically updated overnight. |
I have the same problem (interestingly also while using Forgejo and its agent) on Fedora IoT 40. Downgrading to the previous deployment is a workaround for me. (I really start to love rpm-ostree based distros :D)
The broken revision is |
just stumbled upon the previously reported issue it also links this bug |
Yes this looks like a kernel problem and not something we can fix. |
The recent fedora kernel 6.11.4 has a problem with ipv6 networks [1]. This is not a podman bug at all but rather a kernel regession. I can reproduce the issue easily by running this test. Given many users were hit by this add it to the distro level gating which runs in the fedora openQA framework and then we should catch a bad kernel like this hopefully in the future and prevent it from going into stable. [1] containers#24374 Signed-off-by: Paul Holzinger <[email protected]>
The recent fedora kernel 6.11.4 has a problem with ipv6 networks [1]. This is not a podman bug at all but rather a kernel regression. I can reproduce the issue easily by running this test. Given many users were hit by this add it to the distro level gating which runs in the fedora openQA framework and then we should catch a bad kernel like this hopefully in the future and prevent it from going into stable. [1] containers#24374 Signed-off-by: Paul Holzinger <[email protected]>
tried it, it works now. thanks. one difference though, i did it with making |
Issue Description
running a pod causes fails with an iptables6 error
Steps to reproduce the issue
Steps to reproduce the issue
additional information
section of the issue in /etc/containers/systemdDescribe the results you received
systemd service is runnning, but containers are not
Describe the results you expected
containers running
podman info output
Podman in a container
No
Privileged Or Rootless
Privileged
Upstream Latest Release
No
Additional environment details
bare metal server
Additional information
this doesnt work with 3 services: traefik, forgejo and vaultwarden.
config for forgejo
/etc/containers/systemd/forgejo.kube
/etc/containers/systemd/forgejo.yaml
/etc/containers/systemd/traefik.network
The text was updated successfully, but these errors were encountered: