Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
INT 2C P
⇢
⇥
RBIL61 - INT 2C P
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73194}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73351}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73545}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73529}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73562}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73215}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73332}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73577}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73290}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73616}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73264}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73342}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73483}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73672}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73512}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73603}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73499}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73490}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73593}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73298}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73622}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73275}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73585}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73242}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73224}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73251}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73233}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73520}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73647}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73659}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73435}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73402}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73358}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73387}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73463}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73711}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73448}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73723}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73473}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73744}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73684}
{#idx73699}