iperf t2000-root% /opt/csw/bin/iperf -s ------------------------------------------------------------ Server listening on TCP port 5001 TCP window size: 48.0 KByte (default) ------------------------------------------------------------ [ 4] local 147.94.64.20 port 5001 connected with 147.94.64.222 port 33769 [ ID] Interval Transfer Bandwidth [ 4] 0.0-10.0 sec 112 MBytes 93.5 Mbits/sec -bash-4.2$ iperf -c t2000 ------------------------------------------------------------ Client connecting to t2000, TCP port 5001 TCP window size: 22.9 KByte (default) ------------------------------------------------------------ [ 3] local 147.94.64.222 port 33769 connected with 147.94.64.20 port 5001 [ ID] Interval Transfer Bandwidth [ 3] 0.0-10.0 sec 112 MBytes 93.6 Mbits/sec ====== Désactiver selinux ====== sans rebooter setenforce 0 mais rien de particulier dans /var/log/secure ni /var/log/messages Jun 24 10:03:42 latpimt222 kernel: [1218281.223157] [] ? selinux_file_alloc_security+0x4a/0x80 Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:10 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3 Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3 la première ligne coreespond à Firefox Jun 24 10:03:42 latpimt222 kernel: [1218281.222949] firefox: page allocation failure: order:4, mode:0x10c0d0 Jun 24 10:03:42 latpimt222 kernel: [1218281.222955] Pid: 31555, comm: firefox Not tainted 3.8.13-100.fc17.x86_64 #1 Jun 24 10:03:42 latpimt222 kernel: [1218281.222957] Call Trace: Jun 24 10:03:42 latpimt222 kernel: [1218281.222967] [] warn_alloc_failed+0xe9/0x150 Jun 24 10:03:42 latpimt222 kernel: [1218281.222969] [] __alloc_pages_nodemask+0x80e/0xa80 Jun 24 10:03:42 latpimt222 kernel: [1218281.222973] [] ? __inc_zone_state+0x5e/0x70 Jun 24 10:03:42 latpimt222 kernel: [1218281.222977] [] alloc_pages_current+0xb8/0x190 Jun 24 10:03:42 latpimt222 kernel: [1218281.222980] [] __get_free_pages+0x2a/0x80 Jun 24 10:03:42 latpimt222 kernel: [1218281.222982] [] kmalloc_order_trace+0x39/0xb0 Jun 24 10:03:42 latpimt222 kernel: [1218281.222985] [] __kmalloc+0x1c0/0x250 Jun 24 10:03:42 latpimt222 kernel: [1218281.223041] [] ? nouveau_vm_create+0x65/0x160 [nouveau] ...