Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
INT 2C P
⇢
⇥
RBIL61 - INT 2C P
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73192}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73349}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73543}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73527}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73560}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73213}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73330}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73575}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73288}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73614}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73262}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73340}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73481}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73670}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73510}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73601}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73497}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73488}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73591}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73296}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73620}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73273}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73583}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73240}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73222}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73249}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73231}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73518}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73645}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73657}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73433}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73400}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73356}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73385}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73461}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73709}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73446}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73721}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73471}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73742}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73682}
{#idx73697}