Summary: | Firefox for WebGL fallbacks to swrast_dri.so, not using radeon_si.so | ||
---|---|---|---|
Product: | DRI | Reporter: | Mike <bugs.freedesktop.org> |
Component: | libdrm | Assignee: | Default DRI bug account <dri-devel> |
Status: | RESOLVED NOTOURBUG | QA Contact: | |
Severity: | normal | ||
Priority: | medium | CC: | kai |
Version: | DRI git | ||
Hardware: | Other | ||
OS: | All | ||
See Also: |
https://bugs.freedesktop.org/show_bug.cgi?id=107384 https://bugs.freedesktop.org/show_bug.cgi?id=98629 |
||
Whiteboard: | |||
i915 platform: | i915 features: |
Description
Mike
2018-08-07 13:37:38 UTC
Possibly related to bugs 107384 and/or 98629. If firefox start with LIBGL_DEBUG=verbose parameter, it shows: libGL error: MESA-LOADER: failed to retrieve device information libGL error: unable to load driver: amdgpu_dri.so libGL error: driver pointer missing libGL error: failed to load driver: amdgpu I.e. it cannot retrieve device info (and name of driver as "radeonsi"), trying to load non-existant amdgpu_dri.so, then fallbacks to swrast_dri.so One more thing. This bug might be firefox-specific, because other OpenGL apps, say, glxgears, use correct driver and get HW accel. The FF sandboxing is fairly, ahem, strange. The following Mozilla bug addresses that. https://bugzilla.mozilla.org/show_bug.cgi?id=1480755#c1 (In reply to Emil Velikov from comment #3) > https://bugzilla.mozilla.org/show_bug.cgi?id=1480755#c1 Indeed, this is Firefox's problem. Аlthough security.sandbox.content.read_path_whitelist trick didn't work for me, I think this bug should be resolved as INVALID. PS. security.sandbox.content.read_path_whitelist works. Need to add /sys/ (with trailing slash, as https://wiki.mozilla.org/Security/Sandbox says), and restart Firefox. *** Bug 107660 has been marked as a duplicate of this bug. *** Emil, as it might take a while for users to get the related Firefox sandbox change, would it be possible for libdrm to fall back to the same method that worked before? To clarify the underlying cause of this: >Earlier commit reworked our sysfs handling to use realpath. >Sadly that backfired since the Firefox sandboxing mechanism rejects >that. Despite the files/folders being in the allowed list, of the >sandboxing mechanism. The problem is that the underlying implementation of realpath() in libc will issue lstat calls on each of the path components. In Mesa's case, this will cause it to try to stat /sys, which is not on the list of allowed paths. This in turn causes the realpath() call to fail. If this failure isn't handled things broke. Firefox 62 and later will now specifically allow the stat call (only). >Oddly enough, the Chromium sandboxing doesn't complain about any of >this. I'm not sure how much of Chromium's GPU sandbox is enabled by default (on non-Chromebooks), but they literally just did the same fix as we did a few days ago: https://chromium.googlesource.com/chromium/src/+/8655d49f657d3878c937f1387b3d31fa66c8e76a%5E%21/content/gpu/gpu_sandbox_hook_linux.cc |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.