iperf
t2000-root% /opt/csw/bin/iperf -s
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 48.0 KByte (default)
------------------------------------------------------------
[ 4] local 147.94.64.20 port 5001 connected with 147.94.64.222 port 33769
[ ID] Interval Transfer Bandwidth
[ 4] 0.0-10.0 sec 112 MBytes 93.5 Mbits/sec
-bash-4.2$ iperf -c t2000
------------------------------------------------------------
Client connecting to t2000, TCP port 5001
TCP window size: 22.9 KByte (default)
------------------------------------------------------------
[ 3] local 147.94.64.222 port 33769 connected with 147.94.64.20 port 5001
[ ID] Interval Transfer Bandwidth
[ 3] 0.0-10.0 sec 112 MBytes 93.6 Mbits/sec
====== Désactiver selinux ======
sans rebooter
setenforce 0
mais rien de particulier dans /var/log/secure ni /var/log/messages
Jun 24 10:03:42 latpimt222 kernel: [1218281.223157] [] ? selinux_file_alloc_security+0x4a/0x80
Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb
Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb
Jun 24 14:31:10 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3
Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb
Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb
Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3
la première ligne coreespond à Firefox
Jun 24 10:03:42 latpimt222 kernel: [1218281.222949] firefox: page allocation failure: order:4, mode:0x10c0d0
Jun 24 10:03:42 latpimt222 kernel: [1218281.222955] Pid: 31555, comm: firefox Not tainted 3.8.13-100.fc17.x86_64 #1
Jun 24 10:03:42 latpimt222 kernel: [1218281.222957] Call Trace:
Jun 24 10:03:42 latpimt222 kernel: [1218281.222967] [] warn_alloc_failed+0xe9/0x150
Jun 24 10:03:42 latpimt222 kernel: [1218281.222969] [] __alloc_pages_nodemask+0x80e/0xa80
Jun 24 10:03:42 latpimt222 kernel: [1218281.222973] [] ? __inc_zone_state+0x5e/0x70
Jun 24 10:03:42 latpimt222 kernel: [1218281.222977] [] alloc_pages_current+0xb8/0x190
Jun 24 10:03:42 latpimt222 kernel: [1218281.222980] [] __get_free_pages+0x2a/0x80
Jun 24 10:03:42 latpimt222 kernel: [1218281.222982] [] kmalloc_order_trace+0x39/0xb0
Jun 24 10:03:42 latpimt222 kernel: [1218281.222985] [] __kmalloc+0x1c0/0x250
Jun 24 10:03:42 latpimt222 kernel: [1218281.223041] [] ? nouveau_vm_create+0x65/0x160 [nouveau]
...