home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
HPAVC
/
HPAVC CD-ROM.iso
/
INTER53C.ZIP
/
INTERRUP.PRI
< prev
next >
Wrap
Text File
|
1997-01-12
|
7KB
|
136 lines
iAPX 86 Interrupt Primer
------------------------
by Ralf Brown
12/87
Updated 6/88, 4/90, 9/92, 1/97
What is an interrupt?
---------------------
An interrupt is a hardware signal that tells the CPU to temporarily
stop what it is doing and go do something else. Without interrupts,
the CPU would have to constantly check for external events; with
interrupts, the CPU can work on something else and still respond to
an event as soon as it occurs.
CPUs typically have an instruction to disable interrupts for use
when a section of code has to run without being disturbed by
external events. Because of this, most CPUs also have a special
interrupt called a Non-Maskable Interrupt (NMI), which is responded
to even when all other interrupts are disabled. The NMI is used to
signal calamities such as memory failure or imminent power loss.
Why so many different interrupts?
---------------------------------
The 8086 family of processors has the ability to recognize 256
different interrupts. They also have the ability to let a program
invoke any of these interrupts with a special instruction, known as
a software interrupt (as opposed to a hardware interrupt which is
signalled from outside the processor). Software interrupts are
treated just like hardware interrupts, except that they are never
disabled and do not result in an acknowledgement to other chips in
the computer. The software interrupt instruction on the 8086 family
is called INT, and is given the number of the interrupt. Thus an
INT 21h instruction invokes interrupt number 33 decimal.
Other processors also have software interrupts, though they often
use different names, such as the Motorola 68000 family TRAP
instruction, the Intel 8080 RST (ReSTart) instruction, or many
mainframes' SVC (SuperVisor Call).
Since a program can invoke an interrupt by number rather than by its
address (as it has to in calling subroutines), interrupts are a
convenient way of providing services without having to recompile a
program whenever the address of the code providing the service
changes. This also allows a user program to enhance the services
provided by directing the interrupt to itself. These enhanced
services can then be made available to other programs.
How does an interrupt work in real-address mode?
------------------------------------------------
The 8086 reserves the lowest 1024 bytes of memory for a table (IVT,
Interrupt Vector Table) containing the addresses for each of the 256
possible interrupts. When an interrupt occurs (hardware or
software), the processor multiplies its number by 4 and looks at the
resulting memory location to find the address of the piece of code
which handles the interrupt. It then places the current address in
the program and the processor flags on the stack, and jumps to the
beginning of the interrupt handler.
When the interrupt handler finishes, it invokes a special
instruction to return from the interrupt. This instruction takes
the previously saved flags and program address off of the stack and
places them back in the appropriate registers in the CPU.
The interrupt handler has to be careful to preserve any registers
that it uses which are not used to communicate results to the
program that invoked the interrupt. If the interrupt can be
triggered by a hardware interrupt (only certain ones can on IBM
PC's, XT's, and AT's), then the interrupt handler has to preserve
ALL registers, since the interrupt could have happened anywhere.
How does an interrupt work in protected mode?
---------------------------------------------
The 80286 and later processors can also operate in protected mode,
in which case the interrupt handling is somewhat different. First,
the interrupt table consists of eight-byte descriptors instead of
four-byte addresses, and need not be located at physical address
zero, nor contain the full 256 entries (the address and size of the
Interrupt Descriptor Table (IDT) may be manipulated with the LIDT
and SIDT instructions).
Second, in protected mode, the descriptor for an interrupt number
specifies HOW control is transferred to the interrupt handler.
Three types of transfer are possible: Interrupt Gate, Trap Gate,
and Task Gate. The first two types transfer control to a handler
running in the same process as the active program, while a Task Gate
performs a complete context switch in order to invoke a handler in
a different process from the active program. Interrupt and Trap
gates are identical except that an Interrupt Gate will clear IF
and thus disable interrupts, while a Trap Gate leaves IF unchanged.
How does an interrupt work in virtual-86 (V86) mode?
----------------------------------------------------
The 80386 and later processors provide a virtual-8086 mode which is
a protected mode that appears to software to be the same as Real
mode. Because it is a protected mode, however, interrupts and
various other actions that potentially affect system integrity do
not execute directly, but instead invoke a supervisor program running
in standard protected mode. Thus, whenever a program running in
V86 mode invokes an interrupt call, the CPU switches to protected
mode and transfers control to the interrupt handler specified by
the protected-mode IDT, rather than the real-mode IVT. The
supervisor program may handle the interrupt call in any way it
likes, but typically switches the CPU back into V86 mode and jumps
to the address specified in the real-mode IVT (a process which is
known as "reflecting" the interrupt).
GLOSSARY
--------
API (Application Program[ming] Interface)
An API is the set of function calls and services that a program
makes available to other processes (applications). Each function or
service has a set format which specifies the values to be supplied
by the caller and the values which are returned. Because of this
interface specification, the underlying organization of the function
or service can be changed without affecting the applications which
use it. For example, the DOS INT 21h file access functions remained
unchanged between DOS 2.x and DOS 3.x, even though the internal data
structures and code organization changed significantly.
IDT (Interrupt Descriptor Table)
IVT (Interrupt Vector Table)
NMI (Non-Maskable Interrupt)
Most external (hardware) interrupts can be disabled by the CLI
(CLear Interrupt enable flag) instruction when the CPU is executing
critical code that should not be interrupted, such as switching from
one stack to another. However, there are some situations so dire
that the CPU must act on them immediately no matter what else it is
doing, even if it has disabled interrupts. The Non-Maskable
Interrupt serves precisely this purpose, as it cannot be disabled
(masked) by the CPU.