Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
INT 2C P
⇢
⇥
RBIL61 - INT 2C P
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73195}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73352}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73546}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73530}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73563}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73216}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73333}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73578}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73291}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73617}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73265}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73343}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73484}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73673}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73513}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73604}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73500}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73491}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73594}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73299}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73623}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73276}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73586}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73243}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73225}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73252}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73234}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73521}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73648}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73660}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73436}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73403}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73359}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73388}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73464}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73712}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73449}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73724}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73474}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73745}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73685}
{#idx73700}