
AMD-K5 Processor
75
21062E/0—June 1997
AMD K86 Family BIOS and Software Tools Developers Guide
Preliminary Information
Software Interrupts and the Interrupt Redirection Bitmap (IRB) Extension.
In Virtual-8086 mode, software interrupts (INT
n
exceptions
that vector through interrupt gates) are trapped by the
operating system for emulation because they would otherwise
clear the real IF. When VME extensions are enabled, these
INT
n
instructions are allowed to execute normally, vectoring
directly to a Virtual-8086 service routine via the Virtual-8086
interrupt vector table (IVT) at address 0 of the task address
space. However, it may still be desirable for security or
performance reasons to intercept INT
n
instructions on a
vector-specific basis to allow servicing by Protected-mode
routines accessed through the interrupt descriptor table (IDT).
This is accomplished by an Interrupt Redirection Bitmap (IRB)
in the TSS, which is created by the operating system in a
manner similar to the IO Permission Bitmap (IOPB) in the TSS.
Table 27.
Instructions that Modify the IF or VIF Flags—Protected Mode Virtual
Interrupt Extensions (PVI)
1
TYPE
PE
1
1
1
1
1
1
1
1
1
1
1
1
1
VM
0
0
0
0
0
0
0
0
0
0
0
0
0
VME
—
—
—
—
—
—
—
—
—
—
—
—
—
PVI
1
1
1
1
1
1
1
1
1
1
1
1
1
IOPL
3
<
3
3
<
3
3
<
3
3
<
3
3
<
3
3
<
3
—
GP(0)
No
No
No
No
3
No
No
No
No
No
No
No
No
No
3
IF
VIF
CLI
CLI
STI
STI
PUSHF
PUSHF
PUSHFD
PUSHFD
POPF
POPF
POPFD
POPFD
IRETD
2
Notes:
1.
2.
3.
“—” Not applicable.
IF
←
0
No Change
IF
←
1
No Change
Pushed
Pushed
Pushed
Pushed
Popped
Not Popped
Popped
Not Popped
Popped
No Change
VIF
←
0
No Change
VIF
←
1
Not Pushed
Not Pushed
Pushed
Pushed
Not Popped
Not Popped
Not Popped
Not Popped
Popped
All Protected mode virtual interrupt tasks run at CPL = 3.
All protected mode virtual interrupt handlers run at CPL = 0.
GP(0) if an attempt is made to set VIF when VIP = 1.