Jump to content

INT (x86 instruction)

From Wikipedia, the free encyclopedia

INT is an assembly language instruction for x86 processors that generates a software interrupt. It takes the interrupt number formatted as a byte value.[1]

When written in assembly language, the instruction is written like this:

INT X

where X is the software interrupt that should be generated (0-255).

As is customary with machine binary arithmetic, interrupt numbers are often written in hexadecimal form, which can be indicated with a prefix 0x or with the suffix h. For example, INT 13H will generate the 20th software interrupt (hexadecimal 0x13 is nineteen (19) in decimal notation; the count starts at 0), causing the function pointed to by the 20th vector in the interrupt table to be executed.

INT is widely used in real mode. In protected mode, INT is a privileged instruction.[1]

Real mode

[edit]

A software interrupt is a long call that also saves the processor status. All interrupts have an 8-bit interrupt number associated with them. This number is used to look up a segment:offset in a 256 element interrupt vector table stored at addresses 0-3FFH. When a software interrupt is encountered in real mode, the processor status is pushed, CS and IP are pushed, and the interrupt number is multiplied by four to index a new execution address which is loaded from the vector table. It is entirely possible to use a far-call instruction to start the interrupt-function manually after pushing the flag register. Interrupt routines typically end with a IRET instruction.

An example of a useful DOS software interrupt was interrupt 0x21. By calling it with different parameters in the registers (mostly ah and al) you could access various IO operations, string output and more.[2]

Most Unix systems and derivatives do not use software interrupts, with the exception of interrupt 0x80, used to make system calls before the mid-2000s. This is accomplished by entering a 32-bit value corresponding to a kernel function into the EAX register of the processor and then executing INT 0x80.

INT3

[edit]

The INT3 instruction is a one-byte-instruction defined for use by debuggers to temporarily replace an instruction in a running program in order to set a code breakpoint. The more general INT XXh instructions are encoded using two bytes. This makes them unsuitable for use in patching instructions (which can be one byte long); see SIGTRAP.

The opcode for INT3 is 0xCC, as opposed to the opcode for INT immediate8, which is 0xCD immediate8. Since the dedicated 0xCC opcode has some desired special properties for debugging, which are not shared by the normal two-byte opcode for an INT3, assemblers do not normally generate the generic 0xCD 0x03 opcode from mnemonics.[1]

INTO

[edit]

The INTO instruction is another one-byte-instruction. It is a conditional interrupt which is triggered when the overflow flag is set at the time of executing this opcode. This implicitly indicates interrupt #4.

The opcode for INTO is 0xCE, however it is unavailable in x86-64 mode.

INT1

[edit]

The INT1 instruction is a one-byte-instruction defined for as a hardware debug trap.

The opcode for INT1 is 0xF1, as opposed to the opcode for INT 1, which is 0xCD 0x01. INT1 generates a debug exception (#DB) without setting any bits in DR6. Hardware vendors may use the INT1 instruction for hardware debug. Intel recommends software vendors continue to use the INT3 instruction for software breakpoints.[1] Not implemented in processors before the 80386.

See also

[edit]

References

[edit]
  1. ^ a b c d Intel® 64 and IA-32 Architectures Software Developer's Manual (PDF). Vol. 2. Intel Corporation. March 2024. p. 3-520. Retrieved 2024-05-23.
  2. ^ Definition of: int 21