pykd/test/scripts/mspdbtest.py
SND\EreTIk_cp d0234bcb4f [0.2.x]
~ getName fixed
 ~ MsPdbTest expanded


git-svn-id: https://pykd.svn.codeplex.com/svn@83547 9b283d60-5439-405e-af05-b73fd8c4d996
2017-11-08 17:42:50 +04:00

46 lines
1.7 KiB
Python

"""Public microsoft symbols tests"""
import unittest
import pykd
import os
class PeFileAsDumpLoader:
"""Load/unload PE-file from System as crash dump file"""
def __init__(self, fileName):
self._fileName = fileName
def __enter__(self):
pykd.loadDump(self._fileName)
def __exit__(self, exc_type, exc_value, exc_tb):
pykd.detachProcess()
class MsPdbTest(unittest.TestCase):
"""Public Microsoft symbols tests"""
def testSymbolNameAddress(self):
"""Lookup symbol by name/address"""
with PeFileAsDumpLoader( os.path.join(os.environ["WINDIR"], r"System32\ole32.dll") ):
mod = pykd.module("ole32")
print "\n" + str( mod )
targetSymAddr = mod.offset("CPackagerMoniker::Create")
self.assertNotEqual( 0, targetSymAddr )
self.assertEqual( "CPackagerMoniker::Create", mod.findSymbol(targetSymAddr) )
targetSymAddr = mod.offset("CoInitialize")
self.assertNotEqual( 0, targetSymAddr )
self.assertEqual( "CoInitialize", mod.findSymbol(targetSymAddr) )
with PeFileAsDumpLoader( os.path.join(os.environ["WINDIR"], r"System32\authz.dll") ):
mod = pykd.module("authz")
print "\n" + str( mod )
targetSymAddr = mod.offset("AuthzpDefaultAccessCheck")
self.assertNotEqual( 0, targetSymAddr )
self.assertEqual( "AuthzpDefaultAccessCheck", mod.findSymbol(targetSymAddr) )
targetSymAddr = mod.offset("AuthzAccessCheck")
self.assertNotEqual( 0, targetSymAddr )
self.assertEqual( "AuthzAccessCheck", mod.findSymbol(targetSymAddr) )