Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
Cloaking
⇢
⇥
RBIL61 - Cloaking
Bibliography
{#idx167077}
{#idx167183}
CALL xxxxh:xxxxh - Cloaking - PROTECTED-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159272}
CALL xxxxh:xxxxh - Cloaking - REAL-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159278}
{#idx159281}
{#idx159283}
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73193}
{#idx73209}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73168}
{#idx73174}
{#idx73183}
{#idx73190}
{#idx73350}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73543}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73528}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73560}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73213}
{#idx73222}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73330}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73575}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73288}
{#idx73296}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73614}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73262}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73340}
{#idx73349}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73481}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73671}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73511}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73602}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73498}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73489}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73592}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73297}
{#idx73306}
{#idx73317}
{#idx73325}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73621}
{#idx73637}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73274}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73584}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73241}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73223}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73250}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73232}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73519}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73646}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73658}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73433}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73400}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73356}
{#idx73368}
{#idx73369}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73385}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73460}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73709}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73446}
{#idx73452}
{#idx73457}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73721}
{#idx73731}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73470}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73742}
{#idx73753}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73697}
INT 2F - EXTENDED MEMORY SPECIFICATION
(
XMS
see Extended Memory Specification
)
v2+ - GET DRIVER ADDRESS
{#idx83259}
{#idx83474}
{#idx83477}
{#idx83485}
{#idx83487}
{#idx83491}
{#idx83492}
{#idx83494}
{#idx83496}
{#idx83499}
{#idx83503}
{#idx83518}
{#idx83528}
{#idx83547}
INT 2F - Helix Multimedia Cloaking - CACHECLK - INSTALLATION CHECK
{
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx85875}
{#idx85888}
INT 31 - Netroom3
DPMI
see DOS Protected-Mode Interface
.EXE v3.00 - ???
{#idx97658}