|
| InjectPayloadDynamic (Architecture *g, const string &nm, int4 tp) |
|
void | restoreEntry (const Element *el) |
|
virtual void | inject (InjectContext &context, PcodeEmit &emit) const |
|
virtual void | printTemplate (ostream &s) const |
| Print the p-code ops of the injection to a stream (for debugging)
|
|
virtual string | getSource (void) const |
| Return a string describing the source of the injection (.cspec, prototype model, etc.)
|
|
| InjectPayload (const string &nm, int4 tp) |
| Construct for use with restoreXml.
|
|
int4 | getParamShift (void) const |
| Get the number of parameters shifted.
|
|
bool | isDynamic (void) const |
| Return true if p-code in the injection is generated dynamically.
|
|
bool | isIncidentalCopy (void) const |
| Return true if any injected COPY is considered incidental.
|
|
int4 | sizeInput (void) const |
| Return the number of input parameters.
|
|
int4 | sizeOutput (void) const |
| Return the number of output parameters.
|
|
InjectParameter & | getInput (int4 i) |
| Get the i-th input parameter.
|
|
InjectParameter & | getOutput (int4 i) |
| Get the i-th output parameter.
|
|
virtual | ~InjectPayload (void) |
| Destructor.
|
|
virtual void | restoreXml (const Element *el) |
| Restore this payload from an XML stream. More...
|
|
string | getName (void) const |
| Return the name of the injection.
|
|
int4 | getType (void) const |
| Return the type of injection (CALLFIXUP_TYPE, CALLOTHERFIXUP_TYPE, etc.)
|
|
◆ inject()
Perform the injection of this payload into data-flow.
P-code operations representing this payload are copied into the controlling analysis context. The provided PcodeEmit object dictates exactly where the PcodeOp and Varnode objects are inserted and to what container. An InjectContext object specifies how placeholder elements become concrete Varnodes in the appropriate context.
- Parameters
-
context | is the provided InjectConject object |
emit | is the provovided PcodeEmit object |
Implements InjectPayload.
The documentation for this class was generated from the following files: