Solved

Can Fedora 14 (32-bit) Utilize 8gb of RAM?

Posted on 2011-03-22
3
1,172 Views
Last Modified: 2012-06-21
Hello,

I'm running Fedora 14, 32-bit edition.

My Motherboard (ASUS M2NPV-VM) says it can handle up to 8gb of RAM.

If I install 8gb of RAM, will my OS be able to utilize all 8gb or still just 4gb?

Basically, is it a waste of money to have more than 4gb of RAM on a 32-bit Linux install?

Thanks,
Jason
0
Comment
Question by:SqueezeOJ
3 Comments
 
LVL 34

Expert Comment

by:Seth Simmons
ID: 35189960
On the one hand, Linux kernel should handle it.  I've had servers in my data center with 32gb on 32bit RHEL 4 because of an application need.

On the other hand, you will face some application issues because of the 4gb user space limitation.  Unless you have a specific need, I'd use x64 version.
0
 
LVL 12

Accepted Solution

by:
upanwar earned 500 total points
ID: 35189992
0
 
LVL 15

Expert Comment

by:DonConsolio
ID: 35190699
To use all of your memory you can install a PAE (Physical Address Extension) enabled kernel.
(more details: http://en.wikipedia.org/wiki/Physical_Address_Extension)

+ can use memory over 4 GB on 32 bit Linux
- applications are still limited to 32 bit address space: no single process can use more than 3GB (on most modern kernels) or 2GB (on older ones)
- a small performance overhead for the additional mapping layer in memory management

If you have one large application requiring >3GB you are out of luck with PAE - use 64bit Linux
If you have several applications requiring less than 3GB PAE is your friend
0

Featured Post

New My Cloud Pro Series - organize everything!

With space to keep virtually everything, the My Cloud Pro Series offers your team the network storage to edit, save and share production files from anywhere with an internet connection. Compatible with both Mac and PC, you're able to protect your content regardless of OS.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now