lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 10 Aug 2009 13:58:46 GMT
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 13909] md5sum on 3GB file is constantly hanging

http://bugzilla.kernel.org/show_bug.cgi?id=13909





--- Comment #12 from Michael B. Trausch <mike@...usch.us>  2009-08-10 13:58:44 ---
You said that the md5sum is hanging in the R state, yes?  If so, it's not
hanging at all.  It's still computing the MD5 sum.  What sort of disks are you
using (IDE/SCSI/SATA)?  What sort of CPU (cat /proc/cpuinfo)?  How much RAM
(free)?

mbt@...t:~$ time md5sum sample.3gb 
c698c87fb53058d493492b61f4c74189  sample.3gb

real    0m12.017s
user    0m8.561s
sys    0m3.276s

This is on a system that isn't heavily loaded, with a 3.0Gbps SATA II drive
holding the file.

Try this to see if it really is hanging or not.  Install the "pv" utility.  It
is available from http://www.ivarch.com/programs/pv.shtml -- and in many
distributions (I can say for certain that it is in Ubuntu's repositories at the
very least, and am pretty sure that it's on Debian and RH repositories, too).

Then, run:

cat YOUR_3GB_FILE | pv | md5sum

This will show you how much data is being pushed through the pipe, and at what
rate of speed.  My system is able to push about 200MB/s through pv.  This will
give you a better, visual indication of what is going on.

-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ