Interrupt List - Release 61 (16jul00)
⇤
⇠
⇧
🏠
∕
HTML Edition
∕
Browse the Index
∕
Cloaking
⇢
⇥
RBIL61 - Cloaking
Bibliography
{#idx167003}
{#idx167092}
CALL xxxxh:xxxxh - Cloaking - PROTECTED-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159267}
CALL xxxxh:xxxxh - Cloaking - REAL-MODE
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
{#idx159273}
{#idx159276}
{#idx159278}
INT 2C - Cloaking - ALLOCATE GDT SELECTOR
{protected mode}
{#idx73190}
{#idx73206}
INT 2C - Cloaking - CALL PROTECTED-MODE PASSALONG CHAIN
{real mode}
{#idx73165}
{#idx73171}
{#idx73180}
{#idx73187}
{#idx73347}
INT 2C - Cloaking - CALL V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73540}
INT 2C - Cloaking - CALL V86-MODE PROCEDURE
{protected mode}
{#idx73525}
INT 2C - Cloaking - CHAIN TO V86-MODE INTERRUPT HANDLER
{protected mode}
{#idx73557}
INT 2C - Cloaking - FREE GDT SELECTOR
{protected mode}
{#idx73210}
{#idx73219}
INT 2C - Cloaking - GET BASE ADDRESS OF GDT SELECTOR
{protected mode}
{#idx73327}
INT 2C - Cloaking - GET ESP0 FROM TSS
{protected mode}
{#idx73572}
INT 2C - Cloaking - GET PASSALONG ADDRESS
{protected mode}
{#idx73285}
{#idx73293}
INT 2C - Cloaking - GET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73611}
INT 2C - Cloaking - GET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73259}
INT 2C - Cloaking - GET SELECTOR LIMIT
{protected mode}
{#idx73337}
{#idx73346}
INT 2C - Cloaking - GET SIZE OF PROTECTED-MODE STATE
{protected mode}
{#idx73478}
INT 2C - Cloaking - GET TRAPPING STATE OF SPECIFIED
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73668}
INT 2C - Cloaking - ISSUE PROTECTED-MODE
XMS
see Extended Memory Specification
CALL
{protected mode}
{#idx73508}
INT 2C - Cloaking - PROTECTED-MODE VIRTUAL
DMA
see Direct Memory Access
SERVICES
{protected mode}
{#idx73599}
INT 2C - Cloaking - RESTORE PROTECTED-MODE STATE
{protected mode}
{#idx73495}
INT 2C - Cloaking - SAVE PROTECTED-MODE STATE
{protected mode}
{#idx73486}
INT 2C - Cloaking - SET 8259
IRQ
(Interrupt ReQuest) A hardware line connected to the interrupt controller chip which signals that a CPU interrupt should be generated.
BASE VECTORS
{protected mode}
{#idx73589}
INT 2C - Cloaking - SET PASSALONG ADDRESS
{protected mode}
{#idx73294}
{#idx73303}
{#idx73314}
{#idx73322}
INT 2C - Cloaking - SET PORT-TRAPPING PASSALONG
{protected mode}
{#idx73618}
{#idx73634}
INT 2C - Cloaking - SET PROTECTED-MODE INTERRUPT VECTOR
{protected mode}
{#idx73271}
INT 2C - Cloaking - SET SECONDARY STACK
{protected mode}
{#idx73581}
INT 2C - Cloaking - SET SEGMENT ACCESS MODE
{protected mode}
{#idx73238}
INT 2C - Cloaking - SET SEGMENT BASE ADDRESS
{protected mode}
{#idx73220}
INT 2C - Cloaking - SET SEGMENT EXTENDED ACCESS MODE
{protected mode}
{#idx73247}
INT 2C - Cloaking - SET SEGMENT LIMIT
{protected mode}
{#idx73229}
INT 2C - Cloaking - SET V86-MODE STACK
{protected mode}
{#idx73516}
INT 2C - Cloaking - TRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode}
{#idx73643}
INT 2C - Cloaking - UNTRAP I/O
PORT
IBM PC Portable (uses same BIOS as XT)
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73655}
INT 2C - Cloaking v1.01 -
"Issue_System_Modal_Message"
{protected mode}
{#idx73430}
INT 2C - Cloaking v1.01 -
"Query_Current_VM"
{protected mode}
{#idx73397}
INT 2C - Cloaking v1.01 -
"Simulate_Shell_Event"
{protected mode}
{#idx73353}
{#idx73365}
{#idx73366}
INT 2C - Cloaking v1.01 -
"Switch_VMs_and_Call_back"
{protected mode}
{#idx73382}
INT 2C - Cloaking v1.01 - CLEAR CRITICAL SECTION
{protected mode}
{#idx73457}
INT 2C - Cloaking v1.01 - FREE
V86
see Virtual-86 Mode
CALLBACK
{protected mode}
{#idx73706}
INT 2C - Cloaking v1.01 - GET INT 2C
API
(Application Program[ming] Interface) The defined set of calls which a program may make to interact with or request services of the operating system or environment under which it is running. Because the inputs and outputs of the calls are well-defined, a program using the API can continue using the identical calls even if the internal organization of the program providing the API changes.
HANDLER ENTRY POINT
{protected mode}
{#idx73443}
{#idx73449}
{#idx73454}
INT 2C - Cloaking v1.01 - REGISTER CLOAKING CLIENT
{protected mode}
{#idx73718}
{#idx73728}
INT 2C - Cloaking v1.01 - SET CRITICAL SECTION
{protected mode}
{#idx73467}
INT 2C - Cloaking v1.01 - UNREGISTER CLOAKING CLIENT
{protected mode}
{#idx73739}
{#idx73750}
INT 2C - RM386 v6.00 - BUG
{protected mode,
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx73694}
INT 2F - EXTENDED MEMORY SPECIFICATION
(
XMS
see Extended Memory Specification
)
v2+ - GET DRIVER ADDRESS
{#idx83255}
{#idx83470}
{#idx83473}
{#idx83481}
{#idx83483}
{#idx83487}
{#idx83488}
{#idx83490}
{#idx83492}
{#idx83495}
{#idx83499}
{#idx83514}
{#idx83524}
{#idx83543}
INT 2F - Helix Multimedia Cloaking - CACHECLK - INSTALLATION CHECK
{
undocumented
Information about a product which is not publicly available from the manufacturer, and must be determined by reverse-engineering (disassembly, trial-and-error, etc.). Undocumented information tends to change -- often dramatically -- between successive revisions of a product, since the manufacturer has no obligation to maintain compatibility in behavior which is not explicitly stated.
}
{#idx85871}
{#idx85884}
INT 31 - Netroom3
DPMI
see DOS Protected-Mode Interface
.EXE v3.00 - ???
{#idx97653}