28:. Various schemes were used to make the rest of the first 1MB of memory and later memory beyond the 1MB boundary available to user programs. These schemes were superseded by virtual memory, demand paging
175:
151:
302:
241:
292:
246:
307:
89:
68:
163:
119:
40:
343:
263:
348:
287:
297:
324:
229:
217:
131:
25:
319:
21:
205:
29:
169:
157:
337:
144:
102:
72:
24:
system architecture, originally only the first 640KB of memory was available for
200:
33:
188:
275:
32:
that made use of 32bit addressing capabilities that were introduced in the
258:
114:
88:
The following 27 pages are in this category, out of 27 total.
52:This category has only the following subcategory.
8:
176:Extended Virtual Control Program Interface
85:Pages in category "x86 memory management"
90:This list may not reflect recent changes
152:Enhanced Expanded Memory Specification
7:
94:
65:
54:
46:
14:
303:Supervisor Mode Access Prevention
242:Meltdown (security vulnerability)
293:Spectre (security vulnerability)
247:Microarchitectural Data Sampling
308:SWAPGS (security vulnerability)
1:
164:Expanded Memory Specification
120:Address Windowing Extensions
41:Category:x86 operating modes
365:
264:Physical Address Extension
288:Socket G3 Memory Extender
298:Speculative Store Bypass
325:X86 memory segmentation
69:DOS memory management
230:Load value injection
218:Intel 5-level paging
26:application programs
132:Conventional memory
344:Memory management
320:X86 memory models
30:operating systems
22:IBM PC compatible
356:
349:X86 architecture
206:High memory area
178:
166:
154:
147:
74:
67:
364:
363:
359:
358:
357:
355:
354:
353:
334:
333:
332:
331:
330:
329:
312:
280:
268:
251:
234:
222:
210:
193:
181:
174:
170:Extended memory
162:
158:Expanded memory
150:
143:
136:
124:
107:
82:
81:
80:
79:
76:
75:
64:
45:
20:As part of the
19:
16:
12:
11:
5:
362:
360:
352:
351:
346:
336:
335:
328:
327:
322:
316:
313:
311:
310:
305:
300:
295:
290:
284:
281:
279:
278:
272:
269:
267:
266:
261:
255:
252:
250:
249:
244:
238:
235:
233:
232:
226:
223:
221:
220:
214:
211:
209:
208:
203:
197:
194:
192:
191:
185:
182:
180:
179:
172:
167:
160:
155:
148:
140:
137:
135:
134:
128:
125:
123:
122:
117:
111:
108:
106:
105:
99:
96:
95:
86:
83:
78:
77:
63:
62:
59:
56:
55:
50:
47:
36:processor.
13:
10:
9:
6:
4:
3:
2:
361:
350:
347:
345:
342:
341:
339:
326:
323:
321:
318:
317:
314:
309:
306:
304:
301:
299:
296:
294:
291:
289:
286:
285:
282:
277:
274:
273:
270:
265:
262:
260:
257:
256:
253:
248:
245:
243:
240:
239:
236:
231:
228:
227:
224:
219:
216:
215:
212:
207:
204:
202:
199:
198:
195:
190:
187:
186:
183:
177:
173:
171:
168:
165:
161:
159:
156:
153:
149:
146:
142:
141:
138:
133:
130:
129:
126:
121:
118:
116:
113:
112:
109:
104:
101:
100:
97:
93:
91:
84:
70:
66:
61:
60:
57:
53:
49:Subcategories
48:
44:
42:
37:
35:
31:
27:
23:
17:
145:Enhanced EMS
103:3 GB barrier
87:
51:
38:
18:
15:
201:High memory
73:(2 C, 26 P)
34:Intel 80386
338:Categories
189:Foreshadow
276:RAM limit
39:See also
259:PCI hole
115:A20 line
98:0–9
340::
92:.
71:
43:.
315:X
283:S
271:R
254:P
237:M
225:L
213:I
196:H
184:F
139:E
127:C
110:A
58:D
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.