?
Solved

Can Fedora 14 (32-bit) Utilize 8gb of RAM?

Posted on 2011-03-22
3
Medium Priority
?
1,251 Views
Last Modified: 2012-06-21
Hello,

I'm running Fedora 14, 32-bit edition.

My Motherboard (ASUS M2NPV-VM) says it can handle up to 8gb of RAM.

If I install 8gb of RAM, will my OS be able to utilize all 8gb or still just 4gb?

Basically, is it a waste of money to have more than 4gb of RAM on a 32-bit Linux install?

Thanks,
Jason
0
Comment
Question by:SqueezeOJ
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 35

Expert Comment

by:Seth Simmons
ID: 35189960
On the one hand, Linux kernel should handle it.  I've had servers in my data center with 32gb on 32bit RHEL 4 because of an application need.

On the other hand, you will face some application issues because of the 4gb user space limitation.  Unless you have a specific need, I'd use x64 version.
0
 
LVL 12

Accepted Solution

by:
upanwar earned 2000 total points
ID: 35189992
0
 
LVL 15

Expert Comment

by:DonConsolio
ID: 35190699
To use all of your memory you can install a PAE (Physical Address Extension) enabled kernel.
(more details: http://en.wikipedia.org/wiki/Physical_Address_Extension)

+ can use memory over 4 GB on 32 bit Linux
- applications are still limited to 32 bit address space: no single process can use more than 3GB (on most modern kernels) or 2GB (on older ones)
- a small performance overhead for the additional mapping layer in memory management

If you have one large application requiring >3GB you are out of luck with PAE - use 64bit Linux
If you have several applications requiring less than 3GB PAE is your friend
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Suggested Courses
Course of the Month8 days, left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question