Knowledge (XXG)

Category:x86 memory management

Source 📝

28:. Various schemes were used to make the rest of the first 1MB of memory and later memory beyond the 1MB boundary available to user programs. These schemes were superseded by virtual memory, demand paging 175: 151: 302: 241: 292: 246: 307: 89: 68: 163: 119: 40: 343: 263: 348: 287: 297: 324: 229: 217: 131: 25: 319: 21: 205: 29: 169: 157: 337: 144: 102: 72: 24:
system architecture, originally only the first 640KB of memory was available for
200: 33: 188: 275: 32:
that made use of 32bit addressing capabilities that were introduced in the
258: 114: 88:
The following 27 pages are in this category, out of 27 total.
52:This category has only the following subcategory. 8: 176:Extended Virtual Control Program Interface 85:Pages in category "x86 memory management" 90:This list may not reflect recent changes 152:Enhanced Expanded Memory Specification 7: 94: 65: 54: 46: 14: 303:Supervisor Mode Access Prevention 242:Meltdown (security vulnerability) 293:Spectre (security vulnerability) 247:Microarchitectural Data Sampling 308:SWAPGS (security vulnerability) 1: 164:Expanded Memory Specification 120:Address Windowing Extensions 41:Category:x86 operating modes 365: 264:Physical Address Extension 288:Socket G3 Memory Extender 298:Speculative Store Bypass 325:X86 memory segmentation 69:DOS memory management 230:Load value injection 218:Intel 5-level paging 26:application programs 132:Conventional memory 344:Memory management 320:X86 memory models 30:operating systems 22:IBM PC compatible 356: 349:X86 architecture 206:High memory area 178: 166: 154: 147: 74: 67: 364: 363: 359: 358: 357: 355: 354: 353: 334: 333: 332: 331: 330: 329: 312: 280: 268: 251: 234: 222: 210: 193: 181: 174: 170:Extended memory 162: 158:Expanded memory 150: 143: 136: 124: 107: 82: 81: 80: 79: 76: 75: 64: 45: 20:As part of the 19: 16: 12: 11: 5: 362: 360: 352: 351: 346: 336: 335: 328: 327: 322: 316: 313: 311: 310: 305: 300: 295: 290: 284: 281: 279: 278: 272: 269: 267: 266: 261: 255: 252: 250: 249: 244: 238: 235: 233: 232: 226: 223: 221: 220: 214: 211: 209: 208: 203: 197: 194: 192: 191: 185: 182: 180: 179: 172: 167: 160: 155: 148: 140: 137: 135: 134: 128: 125: 123: 122: 117: 111: 108: 106: 105: 99: 96: 95: 86: 83: 78: 77: 63: 62: 59: 56: 55: 50: 47: 36:processor. 13: 10: 9: 6: 4: 3: 2: 361: 350: 347: 345: 342: 341: 339: 326: 323: 321: 318: 317: 314: 309: 306: 304: 301: 299: 296: 294: 291: 289: 286: 285: 282: 277: 274: 273: 270: 265: 262: 260: 257: 256: 253: 248: 245: 243: 240: 239: 236: 231: 228: 227: 224: 219: 216: 215: 212: 207: 204: 202: 199: 198: 195: 190: 187: 186: 183: 177: 173: 171: 168: 165: 161: 159: 156: 153: 149: 146: 142: 141: 138: 133: 130: 129: 126: 121: 118: 116: 113: 112: 109: 104: 101: 100: 97: 93: 91: 84: 70: 66: 61: 60: 57: 53: 49:Subcategories 48: 44: 42: 37: 35: 31: 27: 23: 17: 145:Enhanced EMS 103:3 GB barrier 87: 51: 38: 18: 15: 201:High memory 73:(2 C, 26 P) 34:Intel 80386 338:Categories 189:Foreshadow 276:RAM limit 39:See also 259:PCI hole 115:A20 line 98:0–9 340:: 92:. 71:‎ 43:. 315:X 283:S 271:R 254:P 237:M 225:L 213:I 196:H 184:F 139:E 127:C 110:A 58:D

Index

IBM PC compatible
application programs
operating systems
Intel 80386
Category:x86 operating modes

DOS memory management
This list may not reflect recent changes
3 GB barrier
A20 line
Address Windowing Extensions
Conventional memory
Enhanced EMS
Enhanced Expanded Memory Specification
Expanded memory
Expanded Memory Specification
Extended memory
Extended Virtual Control Program Interface
Foreshadow
High memory
High memory area
Intel 5-level paging
Load value injection
Meltdown (security vulnerability)
Microarchitectural Data Sampling
PCI hole
Physical Address Extension
RAM limit
Socket G3 Memory Extender
Spectre (security vulnerability)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.