-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[HELP NEEDED] Did I make reallymine faster? #38
Comments
Also if you want me to provide a binary I could do so later. |
Could you provide a binary plz (Ubuntu 64bit if possible)? I can't seem to figure out how convince go to compile from the other branch. (Or I figured it out and it is still only working on one core.) What I did notice is that the linux nfts driver introduces HUGE overhead and cpu-waits when decrypting so filesystem choice seems to be relevant as well when ppl report slow decrypts. I'll run some tests on that as well. |
I tried concurrent-decryption branch on WD Book Essential, Initio chip. I compared to the decryption on master branch. In the decrypted version, the hexdump -C -n 10000 I would love to use the concurrent version at the speed it was copying. Would love to see this fixed. |
I did some more test. In the concurrent-decryption branch the
|
Of course that will still do a non-concurrent decryption. So this is interesting; will have to look into it. |
Actually I forget if |
Fixed that bug. I'll provide a new build later; I want to do some more benchmarking first. |
All right. Links and the benchmarks are in the first message above. |
Well, it works. But not faster...
|
|
Sorry, then I cannot test it, the key got corrupted on the original drive and had to be retrieved from the modules. (Or maybe... can I manually add the key to the end of the img and loopmount?) |
If you have the key block, you SHOULD be able to insert it with a binary, hex, or sector editor. You could probably do the job with hexedit in Linux, and maybe something like Frhed in Windows. You'd want to be VERY careful about your aligments, though, to make sure it landed in the right place. You'd also need to make sure your tool knows how to work with MASSIVE data files. I'd recommend working on a duplicate of the original image, but given the sizes we're dealing with, I don't imagine that's feasible for a lot of people. |
I'm going to be abandoning this branch and starting over. |
tested on ubuntu 16.04 and i7-4770k give max speed output, about 120/130 Mb/s vs master branch only 10Mb/s. Also if destination disk is NTFS or EXFAT master branch give only 1Mb/s, this branch instead give max speed output on both Ext4 and NTFS and EXFAT |
@andlabs hello, is it possible to test the |
I don't know if this will make anything faster for other people, but I split decryption itself across all CPUs. You can try it on the
concurrent-decryption
branch. A synthetic 2.4GB file decrypted in 3.5 minutes with this vs 11.5 minutes for the last binary release, but I didn't test much further than that. If it does make things faster somehow for everyone though, then I'll be surprised, but I can't know unless someone would be willing to try it. Thanks!UPDATE I've now made some binaries available. You'll need to use the
decrypt
command to see the results.Some benchmarks on a 400MB test file:
OS X Sierra 64-bit
original - average of 1m40s
concurrent - average of 10s
Linux 64-bit in a VM
original - average of 40m (???)
concurrent - average of 12s-18s
http://andlabs.lostsig.com/reallymine-concurrent-decryption-darwin64
3.1MB, md5sum 6a8acd865b9c8efb55d87ab8d5994b40
http://andlabs.lostsig.com/reallymine-concurrent-decryption-linux64
3.2MB, md5sum 5e2c82fe1c4a38b41ac5cdf5887261f5
The text was updated successfully, but these errors were encountered: