Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
Cloaking
⇢
⇥
RBIL61 - Cloaking
Bibliography
{#idx167302}
{#idx167404}
CALL xxxxh:xxxxh - Cloaking - PROTECTED-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159494}
CALL xxxxh:xxxxh - Cloaking - REAL-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159500}
{#idx159503}
{#idx159505}
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73192}
{#idx73208}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73167}
{#idx73173}
{#idx73182}
{#idx73189}
{#idx73349}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73542}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73527}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73559}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73212}
{#idx73221}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73329}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73574}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73287}
{#idx73295}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73613}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73261}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73339}
{#idx73348}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73480}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73670}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73510}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73601}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73497}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73488}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73591}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73296}
{#idx73305}
{#idx73316}
{#idx73324}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73620}
{#idx73636}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73273}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73583}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73240}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73222}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73249}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73231}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73518}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73645}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73657}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73432}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73399}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73355}
{#idx73367}
{#idx73368}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73384}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73459}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73708}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73445}
{#idx73451}
{#idx73456}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73720}
{#idx73730}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73469}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73741}
{#idx73752}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73696}
INT 2F - EXTENDED MEMORY SPECIFICATION
(
XMS
see Extended Memory Specification
)
v2+ - GET DRIVER ADDRESS
{#idx83392}
{#idx83607}
{#idx83610}
{#idx83618}
{#idx83620}
{#idx83624}
{#idx83625}
{#idx83627}
{#idx83629}
{#idx83632}
{#idx83636}
{#idx83651}
{#idx83661}
{#idx83680}
INT 2F - Helix Multimedia Cloaking - CACHECLK - INSTALLATION CHECK
{
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx86011}
{#idx86024}
INT 31 - Netroom3
DPMI
see DOS Protected-Mode Interface
.EXE v3.00 - ???
{#idx97782}