Lines Matching refs:module

14 SBTarget supports module, breakpoint, and watchpoint iterations. For example,
131 target object's executable module's file as the file to launch.
360 AddModule (lldb::SBModule &module);
383 RemoveModule (lldb::SBModule module);
440 SetModuleLoadAddress (lldb::SBModule module,
444 ClearModuleLoadAddress (lldb::SBModule module);
731 If this is non-empty, this will be used as the module filter in the
992 module = self.sbtarget.GetModuleAtIndex(idx)
993 if module.file.basename == key:
994 return module
997 module = self.sbtarget.GetModuleAtIndex(idx)
998 if module.file.fullpath == key:
999 return module
1005 module = self.sbtarget.GetModuleAtIndex(idx)
1006 if module.uuid == the_uuid:
1007 return module
1012 module = self.sbtarget.GetModuleAtIndex(idx)
1013 if module.uuid == key:
1014 return module
1018 module = self.sbtarget.GetModuleAtIndex(idx)
1019 re_match = key.search(module.path.fullpath)
1021 matching_modules.append(module)
1028 '''An accessor function that returns a modules_access() object which allows lazy module access from a lldb.SBTarget object.'''
1054 module = property(get_modules_access_object, None, doc=r'''A read only property that returns an object that implements python operator overloading with the square brackets().\n target.module[<int>] allows array access to any modules.\n target.module[<str>] allows access to modules by basename, full path, or uuid string value.\n target.module[uuid.UUID()] allows module access by UUID.\n target.module[re] allows module access using a regular expression that matches the module full path.''')
1056 executable = property(GetExecutable, None, doc='''A read only property that returns an lldb object that represents the main executable module (lldb.SBModule) for this target.''')