Struct frida_sys::_GHookList
source · [−]#[repr(C)]pub struct _GHookList {
pub seq_id: gulong,
pub _bitfield_align_1: [u16; 0],
pub _bitfield_1: __BindgenBitfieldUnit<[u8; 3]>,
pub hooks: *mut GHook,
pub dummy3: gpointer,
pub finalize_hook: GHookFinalizeFunc,
pub dummy: [gpointer; 2],
}Fields
seq_id: gulong_bitfield_align_1: [u16; 0]_bitfield_1: __BindgenBitfieldUnit<[u8; 3]>hooks: *mut GHookdummy3: gpointerfinalize_hook: GHookFinalizeFuncdummy: [gpointer; 2]Implementations
sourceimpl _GHookList
impl _GHookList
pub fn hook_size(&self) -> guint
pub fn set_hook_size(&mut self, val: guint)
pub fn is_setup(&self) -> guint
pub fn set_is_setup(&mut self, val: guint)
pub fn new_bitfield_1(
hook_size: guint,
is_setup: guint
) -> __BindgenBitfieldUnit<[u8; 3]>
Trait Implementations
sourceimpl Clone for _GHookList
impl Clone for _GHookList
sourcefn clone(&self) -> _GHookList
fn clone(&self) -> _GHookList
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source. Read more
sourceimpl Debug for _GHookList
impl Debug for _GHookList
impl Copy for _GHookList
Auto Trait Implementations
impl RefUnwindSafe for _GHookList
impl !Send for _GHookList
impl !Sync for _GHookList
impl Unpin for _GHookList
impl UnwindSafe for _GHookList
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcepub fn borrow_mut(&mut self) -> &mut T
pub fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcepub fn to_owned(&self) -> T
pub fn to_owned(&self) -> T
Creates owned data from borrowed data, usually by cloning. Read more
sourcepub fn clone_into(&self, target: &mut T)
pub fn clone_into(&self, target: &mut T)
🔬 This is a nightly-only experimental API. (
toowned_clone_into)Uses borrowed data to replace owned data, usually by cloning. Read more