RTX3080

Intel Core i9-9900K testing with a EVGA 121-KS-E375 v1.0 (1.16 BIOS) and Gigabyte NVIDIA GeForce RTX 3080 10GB on Gentoo 2.8 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2109291-IB-RTX30802724
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Gigabyte NVIDIA GeForce RTX 3080
September 29 2021
  2 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


RTX3080OpenBenchmarking.orgPhoronix Test SuiteIntel Core i9-9900K @ 5.20GHz (8 Cores / 16 Threads)EVGA 121-KS-E375 v1.0 (1.16 BIOS)Intel 8th/9th32GBSamsung SSD 970 EVO 500GB + 240GB KINGSTON SH103S3 + 2000GB Samsung SSD 860 + 256GB PLEXTOR PX-256M6 + 2000GB Western Digital WD2003FZEX-0Gigabyte NVIDIA GeForce RTX 3080 10GBNVIDIA GA102 HD AudioU34G2G4R3Intel I219-VGentoo 2.85.14.8-xanmod1 (x86_64)X Server 1.20.13NVIDIA1.2.175GCC 11.2.0 + Clang 12.0.1 + LLVM 12.0.1 + CUDA 11.4reiserfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverVulkanCompilerFile-SystemScreen ResolutionRTX3080 BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_pstate performance - CPU Microcode: 0x98- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

RTX3080hashcat: MD5hashcat: SHA1hashcat: 7-Ziphashcat: SHA-512hashcat: TrueCrypt RIPEMD160 + XTSGigabyte NVIDIA GeForce RTX 3080596788333331960416666710229672802200000737133OpenBenchmarking.org

Hashcat

Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.1.1Benchmark: MD5Gigabyte NVIDIA GeForce RTX 308013000M26000M39000M52000M65000MSE +/- 38686144.52, N = 359678833333

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.1.1Benchmark: SHA1Gigabyte NVIDIA GeForce RTX 30804000M8000M12000M16000M20000MSE +/- 8466863.51, N = 319604166667

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.1.1Benchmark: 7-ZipGigabyte NVIDIA GeForce RTX 3080200K400K600K800K1000KSE +/- 338.30, N = 31022967

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.1.1Benchmark: SHA-512Gigabyte NVIDIA GeForce RTX 3080600M1200M1800M2400M3000MSE +/- 1571623.36, N = 32802200000

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.1.1Benchmark: TrueCrypt RIPEMD160 + XTSGigabyte NVIDIA GeForce RTX 3080160K320K480K640K800KSE +/- 533.33, N = 3737133