Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
SWITCH TO PROTECTED MODE
⇢
⇥
RBIL61 - SWITCH TO PROTECTED MODE
INT 15 - SYSTEM - SWITCH TO PROTECTED MODE
{#idx20981}
INT 21 - Phar Lap 386/DOS-Extender - GET CONFIGURATION INFORMATION
{protected mode}
{#idx42907}
INT 2F - DOS
Protected Mode
One of the operating modes of the 80286 and higher Intel processors, in which addresses used by programs no longer correspond to physical addresses and the CPU enforces various protection mechanisms designed to prevent one program from disrupting other programs or the operating system. See also Real Mode, Virtual-86 Mode.
Services
(
DPMS
see DOS Protected-Mode Services
)
v1.0 - REGISTER CLIENT
{#idx83934}
INT 31 -
DPMI
see DOS Protected-Mode Interface
1.0+ - GET REAL MODE EXTENDED PROCESSOR EXCEPTION HANDLER
{protected mode}
{#idx96967}
INT 31 -
DPMI
see DOS Protected-Mode Interface
1.0+ - SET REAL MODE EXTENDED PROCESSOR EXCEPTION HANDLER
{protected mode}
{#idx97002}
INT 31 - Netroom3
DPMI
see DOS Protected-Mode Interface
.EXE v3.00 - SWITCH TO PROTECTED MODE
{#idx97787}
INT 67 - QEMM-386 v4.23+ - INSTALLATION CHECK
{
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx116018}
INT 67 -
Virtual Control Program Interface
A simple API for protected-mode programs to allocate memory and switch into or out of protected mode. See also DOS Protected-Mode Interface.
- SWITCH TO PROTECTED MODE
{#idx117254}
{#idx117273}
INT 78 - UofSalford DBOS DOS extender -
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx122088}