起源是https://zhitongche.taobao.com/ 有个url(g.alicdn.com/kissy/k/1.4.4/seed.js)老是解码错误。
原因是阿里的垃圾程序员,在url里明明写着是GBK的页面,js却是utf-8编码。
blink会在下面堆栈里预加载js:
blink::TextResource::TextResource(const blink::Resou
blink::ScriptResource::ScriptResource(const blink::R
blink::ScriptResource::ScriptResourceFactory::create
blink::ResourceFetcher::createResourceForLoading(bli
blink::ResourceFetcher::requestResource(blink::Fetch
blink::ScriptResource::fetch(blink::FetchRequest & r
blink::DocumentLoader::startPreload(blink::Resource:
blink::HTMLResourcePreloader::preload(WTF::PassOwnPt
blink::ResourcePreloader::takeAndPreload(WTF::Vector
blink::HTMLDocumentParser::processParsedChunkFromBac
blink::HTMLDocumentParser::pumpPendingSpeculations()
blink::HTMLDocumentParser::resumeParsingAfterYield()
blink::HTMLParserScheduler::continueParsing() 行 169
然后会在
node.dll!blink::ScriptLoader::fetchScript(const WTF::String
node.dll!blink::ScriptLoader::prepareScript(const WTF::TextP
node.dll!blink::HTMLScriptRunner::runScript(blink::Element *
node.dll!blink::HTMLScriptRunner::execute(WTF::RawPtr<blink:
node.dll!blink::HTMLDocumentParser::runScriptsForPausedTreeB
node.dll!blink::HTMLDocumentParser::processParsedChunkFromBa
node.dll!blink::HTMLDocumentParser::pumpPendingSpeculations(
node.dll!blink::HTMLDocumentParser::resumeParsingAfterYield(
node.dll!blink::HTMLParserScheduler::continueParsing() 行 16
node.dll!WTF::FunctionWrapper<void (__thiscall blink::HTMLPa
里真正去加载js。但会在ResourceFetcher::requestResource里,因为第一次预加载了,所以只会取出request去用。
我打算在这两个地方做个hook,把这个url强制改成utf-8解码。