зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1310056: Compatibility hack for mitigating RPC_E_CANTCALLOUT_ININPUTSYNCCALL; r=davidb
MozReview-Commit-ID: MralbBmln2
This commit is contained in:
Родитель
9486c543ca
Коммит
775a8cfe8d
|
@ -6,6 +6,7 @@
|
|||
|
||||
#include "Compatibility.h"
|
||||
|
||||
#include "nsWindowsDllInterceptor.h"
|
||||
#include "nsWinUtils.h"
|
||||
#include "Statistics.h"
|
||||
|
||||
|
@ -47,6 +48,80 @@ IsModuleVersionLessThan(HMODULE aModuleHandle, DWORD aMajor, DWORD aMinor)
|
|||
// Compatibility
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
static WindowsDllInterceptor sUser32Interceptor;
|
||||
static decltype(&InSendMessageEx) sInSendMessageExStub = nullptr;
|
||||
static bool sInSendMessageExHackEnabled = false;
|
||||
static PVOID sVectoredExceptionHandler = nullptr;
|
||||
|
||||
#if defined(_MSC_VER)
|
||||
#include <intrin.h>
|
||||
#pragma intrinsic(_ReturnAddress)
|
||||
#define RETURN_ADDRESS() _ReturnAddress()
|
||||
#elif defined(__GNUC__) || defined(__clang__)
|
||||
#define RETURN_ADDRESS() __builtin_extract_return_addr(__builtin_return_address(0))
|
||||
#endif
|
||||
|
||||
static inline bool
|
||||
IsCurrentThreadInBlockingMessageSend(const DWORD aStateBits)
|
||||
{
|
||||
// From the MSDN docs for InSendMessageEx
|
||||
return (aStateBits & (ISMEX_REPLIED | ISMEX_SEND)) == ISMEX_SEND;
|
||||
}
|
||||
|
||||
/**
|
||||
* COM assumes that if you're invoking a proxy from an STA thread while
|
||||
* InSendMessageEx reports that the calling thread is blocked, that you'll
|
||||
* deadlock your own process. It returns the RPC_E_CANTCALLOUT_ININPUTSYNCCALL
|
||||
* error code. This is not actually true in our case: we are calling into
|
||||
* the multithreaded apartment via ALPC. In this hook, we check to see if the
|
||||
* caller is COM, and if so, we lie to it.
|
||||
*
|
||||
* This hack is necessary for ATs who invoke COM proxies from within
|
||||
* WH_CALLWNDPROC hooks, WinEvent hooks, or a WndProc handling a sent
|
||||
* (as opposed to posted) message.
|
||||
*/
|
||||
static DWORD WINAPI
|
||||
InSendMessageExHook(LPVOID lpReserved)
|
||||
{
|
||||
MOZ_ASSERT(XRE_IsParentProcess());
|
||||
DWORD result = sInSendMessageExStub(lpReserved);
|
||||
if (NS_IsMainThread() && sInSendMessageExHackEnabled &&
|
||||
IsCurrentThreadInBlockingMessageSend(result)) {
|
||||
// We want to take a strong reference to the dll so that it is never
|
||||
// unloaded/reloaded from this point forward, hence we use LoadLibrary
|
||||
// and not GetModuleHandle.
|
||||
static HMODULE comModule = LoadLibrary(L"combase.dll");
|
||||
MOZ_ASSERT(comModule);
|
||||
if (!comModule) {
|
||||
return result;
|
||||
}
|
||||
// Check if InSendMessageEx is being called from code within combase.dll
|
||||
HMODULE callingModule;
|
||||
if (GetModuleHandleEx(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS |
|
||||
GET_MODULE_HANDLE_EX_FLAG_UNCHANGED_REFCOUNT,
|
||||
reinterpret_cast<LPCWSTR>(RETURN_ADDRESS()),
|
||||
&callingModule) && callingModule == comModule) {
|
||||
result = ISMEX_NOTIFY;
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
static LONG CALLBACK
|
||||
DetectInSendMessageExCompat(PEXCEPTION_POINTERS aExceptionInfo)
|
||||
{
|
||||
DWORD exceptionCode = aExceptionInfo->ExceptionRecord->ExceptionCode;
|
||||
if (exceptionCode == RPC_E_CANTCALLOUT_ININPUTSYNCCALL &&
|
||||
NS_IsMainThread()) {
|
||||
sInSendMessageExHackEnabled = true;
|
||||
// We don't need this exception handler anymore, so remove it
|
||||
if (RemoveVectoredExceptionHandler(sVectoredExceptionHandler)) {
|
||||
sVectoredExceptionHandler = nullptr;
|
||||
}
|
||||
}
|
||||
return EXCEPTION_CONTINUE_SEARCH;
|
||||
}
|
||||
|
||||
uint32_t Compatibility::sConsumers = Compatibility::UNKNOWN;
|
||||
|
||||
void
|
||||
|
@ -108,5 +183,23 @@ Compatibility::Init()
|
|||
if (!Preferences::HasUserValue("browser.ctrlTab.disallowForScreenReaders"))
|
||||
Preferences::SetBool("browser.ctrlTab.disallowForScreenReaders", true);
|
||||
}
|
||||
|
||||
// If we have a known consumer who is not NVDA, we enable detection for the
|
||||
// InSendMessageEx compatibility hack. NVDA does not require this.
|
||||
if ((sConsumers & ~(Compatibility::UNKNOWN | NVDA)) &&
|
||||
BrowserTabsRemoteAutostart()) {
|
||||
sUser32Interceptor.Init("user32.dll");
|
||||
if (!sInSendMessageExStub) {
|
||||
sUser32Interceptor.AddHook("InSendMessageEx",
|
||||
reinterpret_cast<intptr_t>(&InSendMessageExHook),
|
||||
(void**)&sInSendMessageExStub);
|
||||
}
|
||||
// The vectored exception handler allows us to catch exceptions ahead of any
|
||||
// SEH handlers.
|
||||
if (!sVectoredExceptionHandler) {
|
||||
sVectoredExceptionHandler =
|
||||
AddVectoredExceptionHandler(TRUE, &DetectInSendMessageExCompat);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче