Ceci est une ancienne révision du document !
iperf
t2000-root% /opt/csw/bin/iperf -s ------------------------------------------------------------ Server listening on TCP port 5001 TCP window size: 48.0 KByte (default) ------------------------------------------------------------ [ 4] local 147.94.64.20 port 5001 connected with 147.94.64.222 port 33769 [ ID] Interval Transfer Bandwidth [ 4] 0.0-10.0 sec 112 MBytes 93.5 Mbits/sec -bash-4.2$ iperf -c t2000 ------------------------------------------------------------ Client connecting to t2000, TCP port 5001 TCP window size: 22.9 KByte (default) ------------------------------------------------------------ [ 3] local 147.94.64.222 port 33769 connected with 147.94.64.20 port 5001 [ ID] Interval Transfer Bandwidth [ 3] 0.0-10.0 sec 112 MBytes 93.6 Mbits/sec
Désactiver selinux
sans rebooter
setenforce 0
mais rien de particulier dans /var/log/secure ni /var/log/messages
Jun 24 10:03:42 latpimt222 kernel: [1218281.223157] [<ffffffff8129ecea>] ? selinux_file_alloc_security+0x4a/0x80 Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:09 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:10 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3 Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from read access on the file utmp. For complete SELinux messages. run sealert -l eed9e8ec-dc1e-4cef-b235-45fd136391eb Jun 24 14:31:25 latpimt222 setroubleshoot: SELinux is preventing /usr/bin/systemctl from lock access on the file /run/utmp. For complete SELinux messages. run sealert -l d4ff7a52-36f5-48ac-b0bd-0e5f91b243d3
la première ligne coreespond à Firefox
Jun 24 10:03:42 latpimt222 kernel: [1218281.222949] firefox: page allocation failure: order:4, mode:0x10c0d0 Jun 24 10:03:42 latpimt222 kernel: [1218281.222955] Pid: 31555, comm: firefox Not tainted 3.8.13-100.fc17.x86_64 #1 Jun 24 10:03:42 latpimt222 kernel: [1218281.222957] Call Trace: Jun 24 10:03:42 latpimt222 kernel: [1218281.222967] [<ffffffff81137a89>] warn_alloc_failed+0xe9/0x150 Jun 24 10:03:42 latpimt222 kernel: [1218281.222969] [<ffffffff8113bcae>] __alloc_pages_nodemask+0x80e/0xa80 Jun 24 10:03:42 latpimt222 kernel: [1218281.222973] [<ffffffff8115154e>] ? __inc_zone_state+0x5e/0x70 Jun 24 10:03:42 latpimt222 kernel: [1218281.222977] [<ffffffff8117a0c8>] alloc_pages_current+0xb8/0x190 Jun 24 10:03:42 latpimt222 kernel: [1218281.222980] [<ffffffff8113699a>] __get_free_pages+0x2a/0x80 Jun 24 10:03:42 latpimt222 kernel: [1218281.222982] [<ffffffff811853e9>] kmalloc_order_trace+0x39/0xb0 Jun 24 10:03:42 latpimt222 kernel: [1218281.222985] [<ffffffff81185620>] __kmalloc+0x1c0/0x250 Jun 24 10:03:42 latpimt222 kernel: [1218281.223041] [<ffffffffa00b0fc5>] ? nouveau_vm_create+0x65/0x160 [nouveau] ...