Issue Description
WSL2 usermode networking no longer works on VPN-enabled networks. The traffic no longer flows through.
The gvproxy shipped since Podman v5.8.0 (PR #28066) has the following bug that breaks argument parsing:
containers/gvisor-tap-vsock#632
The bug been fixed on March 24, 2026 (36 days ago).
I have manually recompiled the gvproxy.exe on Windows from the latest HEAD and verified that this fixes the issue.
Please release a new Podman version for Windows that includes a new gvproxy build that includes this fix.
Thank you.
podman version
Client: Podman Engine
Version: 5.8.2
API Version: 5.8.2
Go Version: go1.26.2
Git Commit: 5b263b5f5b48004a87caac44e67349a8266d9ef4
Built: Tue Apr 14 19:51:05 2026
OS/Arch: windows/amd64
Server: Podman Engine
Version: 5.8.2
API Version: 5.8.2
Go Version: go1.25.9 X:nodwarf5
Git Commit: 5b263b5f5b48004a87caac44e67349a8266d9ef4
Built: Mon Apr 13 02:00:00 2026
OS/Arch: linux/amd64
Steps to reproduce the issue
Steps to reproduce the issue
- Install Podman v5.8.2 on Windows 11 with WSL2 enabled
- Enable usermode networking for the podman-machine-default
- Connect to a VPN
- Try to establish connection from inside WSL2 container to the Internet
Describe the results you received
Host network is not available from inside the container.
Describe the results you expected
Host network is available from inside the container.
podman info output
podman info
Client:
APIVersion: 5.8.2
Built: 1776189065
BuiltTime: Tue Apr 14 19:51:05 2026
GitCommit: 5b263b5f5b48004a87caac44e67349a8266d9ef4
GoVersion: go1.26.2
Os: windows
OsArch: windows/amd64
Version: 5.8.2
host:
arch: amd64
buildahVersion: 1.43.1
cgroupControllers:
- cpuset
- cpu
- io
- memory
- hugetlb
- pids
- rdma
cgroupManager: cgroupfs
cgroupVersion: v2
conmon:
package: conmon-2.2.1-2.fc43.x86_64
path: /usr/bin/conmon
version: 'conmon version 2.2.1, commit: '
cpuUtilization:
idlePercent: 98.59
systemPercent: 0.68
userPercent: 0.73
cpus: 16
databaseBackend: sqlite
distribution:
distribution: fedora
variant: container
version: "43"
eventLogger: journald
freeLocks: 2048
hostname: <REDACTED>
idMappings:
gidmap: null
uidmap: null
kernel: 6.6.114.1-microsoft-standard-WSL2
linkmode: dynamic
logDriver: journald
memFree: 14943346688
memTotal: 16510951424
networkBackend: netavark
networkBackendInfo:
backend: netavark
defaultNetwork: podman
dns:
package: aardvark-dns-1.17.1-1.fc43.x86_64
path: /usr/libexec/podman/aardvark-dns
version: aardvark-dns 1.17.1
package: netavark-1.17.2-1.fc43.x86_64
path: /usr/libexec/podman/netavark
version: netavark 1.17.2
ociRuntime:
name: crun
package: crun-1.27-1.fc43.x86_64
path: /usr/bin/crun
version: |-
crun version 1.27
commit: a718a92cc9a94955a5a550b6fdec1378c247ec50
rundir: /run/crun
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL
os: linux
pasta:
executable: /usr/bin/pasta
package: passt-0^20260120.g386b5f5-1.fc43.x86_64
version: |
pasta 0^20260120.g386b5f5-1.fc43.x86_64
Copyright Red Hat
GNU General Public License, version 2 or later
<https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
remoteSocket:
exists: true
path: unix:///run/podman/podman.sock
rootlessNetworkCmd: pasta
security:
apparmorEnabled: false
capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
rootless: false
seccompEnabled: true
seccompProfilePath: /usr/share/containers/seccomp.json
selinuxEnabled: false
serviceIsRemote: true
slirp4netns:
executable: ""
package: ""
version: ""
swapFree: 4294967296
swapTotal: 4294967296
uptime: 0h 3m 43.00s
variant: ""
plugins:
authorization: null
log:
- k8s-file
- none
- passthrough
- journald
network:
- bridge
- macvlan
- ipvlan
volume:
- local
registries:
search:
- docker.io
store:
configFile: /usr/share/containers/storage.conf
containerStore:
number: 0
paused: 0
running: 0
stopped: 0
graphDriverName: overlay
graphOptions:
overlay.additionalImageStores:
- /usr/lib/containers/storage
overlay.imagestore: /usr/lib/containers/storage
overlay.mountopt: nodev,metacopy=on
graphRoot: /var/lib/containers/storage
graphRootAllocated: 1081101176832
graphRootUsed: 1391411200
graphStatus:
Backing Filesystem: extfs
Native Overlay Diff: "false"
Supports d_type: "true"
Supports shifting: "true"
Supports volatile: "true"
Using metacopy: "true"
imageCopyTmpDir: /var/tmp
imageStore:
number: 0
runRoot: /run/containers/storage
transientStore: false
volumePath: /var/lib/containers/storage/volumes
version:
APIVersion: 5.8.2
BuildOrigin: 'Copr: packit/containers-podman-28501'
Built: 1776038400
BuiltTime: Mon Apr 13 02:00:00 2026
GitCommit: 5b263b5f5b48004a87caac44e67349a8266d9ef4
GoVersion: go1.25.9 X:nodwarf5
Os: linux
OsArch: linux/amd64
Version: 5.8.2
Podman in a container
Yes
Privileged Or Rootless
Privileged
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Additional information
No response
Issue Description
WSL2 usermode networking no longer works on VPN-enabled networks. The traffic no longer flows through.
The
gvproxyshipped since Podman v5.8.0 (PR #28066) has the following bug that breaks argument parsing:containers/gvisor-tap-vsock#632
The bug been fixed on March 24, 2026 (36 days ago).
I have manually recompiled the
gvproxy.exeon Windows from the latest HEAD and verified that this fixes the issue.Please release a new Podman version for Windows that includes a new
gvproxybuild that includes this fix.Thank you.
Steps to reproduce the issue
Steps to reproduce the issue
Describe the results you received
Host network is not available from inside the container.
Describe the results you expected
Host network is available from inside the container.
podman info output
Podman in a container
Yes
Privileged Or Rootless
Privileged
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Additional information
No response