/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
staticvoid AssertNotWin32kLockdown() { // Check that we are not in Win32k lockdown
MOZ_DIAGNOSTIC_ASSERT(!IsWin32kLockedDown(), "Invalid Windows GfxInfo API with Win32k lockdown");
}
/* GetD2DEnabled and GetDwriteEnabled shouldn't be called until after * gfxPlatform initialization has occurred because they depend on it for
* information. (See bug 591561) */
nsresult GfxInfo::GetD2DEnabled(bool* aEnabled) { // Telemetry queries this during XPCOM initialization, and there's no // gfxPlatform by then. Just bail out if gfxPlatform isn't initialized. if (!gfxPlatform::Initialized()) {
*aEnabled = false; return NS_OK;
}
// We check gfxConfig rather than the actual render mode, since the UI // process does not use Direct2D if the GPU process is enabled. However, // content processes can still use Direct2D.
*aEnabled = gfx::gfxConfig::IsEnabled(gfx::Feature::DIRECT2D); return NS_OK;
}
result =
RegOpenKeyExW(HKEY_LOCAL_MACHINE, keyLocation, 0, KEY_QUERY_VALUE, &key); if (result != ERROR_SUCCESS) { return NS_ERROR_FAILURE;
}
// A chain of null-separated strings; we convert the nulls to spaces
WCHAR wCharValue[1024];
dwcbData = sizeof(wCharValue);
result = RegQueryValueExW(key, keyName, nullptr, &resultType,
(LPBYTE)wCharValue, &dwcbData); if (result == ERROR_SUCCESS && resultType == REG_MULTI_SZ) { // This bit here could probably be cleaner. bool isValid = false;
DWORD strLen = dwcbData / sizeof(wCharValue[0]); for (DWORD i = 0; i < strLen; i++) { if (wCharValue[i] == '\0') { if (i < strLen - 1 && wCharValue[i + 1] == '\0') {
isValid = true; break;
} else {
wCharValue[i] = ' ';
}
}
}
static nsresult GetKeyValues(const WCHAR* keyLocation, const WCHAR* keyName,
nsTArray<nsString>& destStrings) { // First ask for the size of the value
DWORD size; LONG rv = RegGetValueW(HKEY_LOCAL_MACHINE, keyLocation, keyName,
RRF_RT_REG_MULTI_SZ, nullptr, nullptr, &size); if (rv != ERROR_SUCCESS) { return NS_ERROR_FAILURE;
}
// Create a buffer with the proper size and retrieve the value
WCHAR* wCharValue = new WCHAR[size / sizeof(WCHAR)];
rv = RegGetValueW(HKEY_LOCAL_MACHINE, keyLocation, keyName,
RRF_RT_REG_MULTI_SZ, nullptr, (LPBYTE)wCharValue, &size); if (rv != ERROR_SUCCESS) { delete[] wCharValue; return NS_ERROR_FAILURE;
}
// The value is a sequence of null-terminated strings, usually terminated by // an empty string (\0). RegGetValue ensures that the value is properly // terminated with a null character.
DWORD i = 0;
DWORD strLen = size / sizeof(WCHAR); while (i < strLen) {
nsString value(wCharValue + i); if (!value.IsEmpty()) {
destStrings.AppendElement(value);
}
i += value.Length() + 1;
} delete[] wCharValue;
return NS_OK;
}
// The device ID is a string like PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD // this function is used to extract the id's out of it
uint32_t ParseIDFromDeviceID(const nsAString& key, const nsAString& prefix, int length) {
nsAutoString id(key);
ToUpperCase(id);
int32_t start = id.Find(prefix); if (start != -1) {
id.Cut(0, start + prefix.Length());
id.Truncate(length);
} if (id.Equals(L"QCOM", nsCaseInsensitiveStringComparator)) { // String format assumptions are broken, so use a Qualcomm PCI Vendor ID // for now. See also GfxDriverInfo::GetDeviceVendor. return 0x5143;
}
nsresult err; return id.ToUnsignedInteger(&err, 16);
}
staticbool HasBattery() { // Helper classes to manage lifetimes of Windows structs. class MOZ_STACK_CLASS HDevInfoHolder final { public: explicit HDevInfoHolder(HDEVINFO aHandle) : mHandle(aHandle) {}
// We need the tag to query the information below. if (!::DeviceIoControl(hbat, IOCTL_BATTERY_QUERY_TAG, &dwWait, sizeof(dwWait), &bqi.BatteryTag, sizeof(bqi.BatteryTag), &dwOut, nullptr) ||
!bqi.BatteryTag) { returntrue;
}
BATTERY_INFORMATION bi = {0};
bqi.InformationLevel = BatteryInformation;
// If a battery intended for general use (i.e. system use) is not a UPS // (i.e. short term), then we know for certain we have a battery. if ((bi.Capabilities & BATTERY_SYSTEM_BATTERY) &&
!(bi.Capabilities & BATTERY_IS_SHORT_TERM)) { returntrue;
}
// Otherwise we check the next battery.
++i;
}
// If we fail to enumerate because there are no more batteries to check, then // we can safely say there are indeed no system batteries. return ::GetLastError() != ERROR_NO_MORE_ITEMS;
}
/* Other interesting places for info: * IDXGIAdapter::GetDesc() * IDirectDraw7::GetAvailableVidMem() * e->GetAvailableTextureMem()
* */
// If we are locked down in a content process, we can't call any of the // Win32k APIs below. Any method that accesses members of this class should // assert that it's not used in content if (IsWin32kLockedDown()) { return rv;
}
mHasBattery = HasBattery();
DISPLAY_DEVICEW displayDevice;
displayDevice.cb = sizeof(displayDevice); int deviceIndex = 0;
while (EnumDisplayDevicesW(nullptr, deviceIndex, &displayDevice, 0)) { if (displayDevice.StateFlags & DISPLAY_DEVICE_PRIMARY_DEVICE) {
mDeviceKeyDebug = u"NullSearch"_ns; break;
}
deviceIndex++;
}
// make sure the string is nullptr terminated if (wcsnlen(displayDevice.DeviceKey, std::size(displayDevice.DeviceKey)) ==
std::size(displayDevice.DeviceKey)) { // we did not find a nullptr return rv;
}
mDeviceKeyDebug = displayDevice.DeviceKey;
/* DeviceKey is "reserved" according to MSDN so we'll be careful with it */ /* check that DeviceKey begins with DEVICE_KEY_PREFIX */ /* some systems have a DeviceKey starting with \REGISTRY\Machine\ so we need
* to compare case insenstively */ /* If the device key is empty, we are most likely in a remote desktop * environment. In this case we set the devicekey to an empty string so * it can be handled later.
*/ if (displayDevice.DeviceKey[0] != '\0') { if (_wcsnicmp(displayDevice.DeviceKey, DEVICE_KEY_PREFIX,
std::size(DEVICE_KEY_PREFIX) - 1) != 0) { return rv;
}
// chop off DEVICE_KEY_PREFIX
mDeviceKey[0] = displayDevice.DeviceKey + std::size(DEVICE_KEY_PREFIX) - 1;
} else {
mDeviceKey[0].Truncate();
}
// On Windows 8 and Server 2012 hosts, we want to not block RDP // sessions from attempting hardware acceleration. RemoteFX // provides features and functionaltiy that can give a good D3D10 + // D2D + DirectWrite experience emulated via a software GPU. // // Unfortunately, the Device ID is nullptr, and we can't enumerate // it using the setup infrastructure (SetupDiGetClassDevsW below // will return INVALID_HANDLE_VALUE).
UINT flags = DIGCF_PRESENT | DIGCF_PROFILE | DIGCF_ALLCLASSES; if (mWindowsVersion >= kWindows8 && mDeviceID[0].Length() == 0 &&
mDeviceString[0].EqualsLiteral("RDPUDD Chained DD")) {
WCHAR sysdir[255];
UINT len = GetSystemDirectory(sysdir, sizeof(sysdir)); if (len < sizeof(sysdir)) {
nsString rdpudd(sysdir);
rdpudd.AppendLiteral("\\rdpudd.dll");
gfxWindowsPlatform::GetDLLVersion(rdpudd.BeginReading(),
mDriverVersion[0]);
mDriverDate[0].AssignLiteral("01-01-1970");
// 0x1414 is Microsoft; 0xfefe is an invented (and unused) code
mDeviceID[0].AssignLiteral("PCI\\VEN_1414&DEV_FEFE&SUBSYS_00000000");
flags |= DIGCF_DEVICEINTERFACE;
}
}
/* create a device information set composed of the current display device */
HDEVINFO devinfo =
SetupDiGetClassDevsW(nullptr, mDeviceID[0].get(), nullptr, flags);
if (devinfo != INVALID_HANDLE_VALUE) {
HKEY key; LONG result;
WCHAR value[255];
DWORD dwcbData;
SP_DEVINFO_DATA devinfoData;
DWORD memberIndex = 0;
devinfoData.cbSize = sizeof(devinfoData);
constexpr auto driverKeyPre =
u"System\\CurrentControlSet\\Control\\Class\\"_ns; /* enumerate device information elements in the device information set */ while (SetupDiEnumDeviceInfo(devinfo, memberIndex++, &devinfoData)) { /* get a string that identifies the device's driver key */ if (SetupDiGetDeviceRegistryPropertyW(devinfo, &devinfoData, SPDRP_DRIVER,
nullptr, (PBYTE)value, sizeof(value), nullptr)) {
nsAutoString driverKey(driverKeyPre);
driverKey += value;
result = RegOpenKeyExW(HKEY_LOCAL_MACHINE, driverKey.get(), 0,
KEY_QUERY_VALUE, &key); if (result == ERROR_SUCCESS) { /* we've found the driver we're looking for */
dwcbData = sizeof(value);
result = RegQueryValueExW(key, L"DriverVersion", nullptr, nullptr,
(LPBYTE)value, &dwcbData); if (result == ERROR_SUCCESS) {
mDriverVersion[0] = value;
} else { // If the entry wasn't found, assume the worst (0.0.0.0).
mDriverVersion[0].AssignLiteral("0.0.0.0");
}
dwcbData = sizeof(value);
result = RegQueryValueExW(key, L"DriverDate", nullptr, nullptr,
(LPBYTE)value, &dwcbData); if (result == ERROR_SUCCESS) {
mDriverDate[0] = value;
} else { // Again, assume the worst
mDriverDate[0].AssignLiteral("01-01-1970");
}
RegCloseKey(key); break;
}
}
}
SetupDiDestroyDeviceInfoList(devinfo);
}
// It is convenient to have these as integers
uint32_t adapterVendorID[2] = {0, 0};
uint32_t adapterDeviceID[2] = {0, 0};
uint32_t adapterSubsysID[2] = {0, 0};
// Sometimes we don't get the valid device using this method. For now, // allow zero vendor or device as valid, as long as the other value is // non-zero. bool foundValidDevice = (adapterVendorID[0] != 0 || adapterDeviceID[0] != 0);
// We now check for second display adapter. If we didn't find the valid // device using the original approach, we will try the alternative.
// Device interface class for display adapters.
CLSID GUID_DISPLAY_DEVICE_ARRIVAL;
HRESULT hresult = CLSIDFromString(L"{1CA05180-A699-450A-9A0C-DE4FBE3DDD89}",
&GUID_DISPLAY_DEVICE_ARRIVAL); if (hresult == NOERROR) {
devinfo =
SetupDiGetClassDevsW(&GUID_DISPLAY_DEVICE_ARRIVAL, nullptr, nullptr,
DIGCF_PRESENT | DIGCF_INTERFACEDEVICE);
// Sometimes, the enumeration is not quite right and the two adapters // end up being swapped. Actually enumerate the adapters that come // back from the DXGI factory to check, and tag the second as active // if found. if (mHasDualGPU) {
nsModuleHandle dxgiModule(LoadLibrarySystem32(L"dxgi.dll"));
decltype(CreateDXGIFactory)* createDXGIFactory =
(decltype(CreateDXGIFactory)*)GetProcAddress(dxgiModule, "CreateDXGIFactory");
if (createDXGIFactory) {
RefPtr<IDXGIFactory> factory = nullptr;
createDXGIFactory(__uuidof(IDXGIFactory), (void**)(&factory)); if (factory) {
RefPtr<IDXGIAdapter> adapter; if (SUCCEEDED(factory->EnumAdapters(0, getter_AddRefs(adapter)))) {
DXGI_ADAPTER_DESC desc;
PodZero(&desc); if (SUCCEEDED(adapter->GetDesc(&desc))) { if (desc.VendorId != adapterVendorID[0] &&
desc.DeviceId != adapterDeviceID[0] &&
desc.VendorId == adapterVendorID[1] &&
desc.DeviceId == adapterDeviceID[1]) {
mActiveGPUIndex = 1;
}
}
}
}
}
}
mHasDriverVersionMismatch = false; if (mAdapterVendorID[mActiveGPUIndex] ==
GfxDriverInfo::GetDeviceVendor(DeviceVendor::Intel)) { // we've had big crashers (bugs 590373 and 595364) apparently correlated // with bad Intel driver installations where the DriverVersion reported // by the registry was not the version of the DLL.
// Note that these start without the .dll extension but eventually gain it. bool is64bitApp = sizeof(void*) == 8;
nsAutoString dllFileName(is64bitApp ? u"igd10umd64" : u"igd10umd32");
nsAutoString dllFileName2(is64bitApp ? u"igd10iumd64" : u"igd10iumd32");
// Only parse the DLL version for those found in the driver list
nsAutoString eligibleDLLs; if (NS_SUCCEEDED(GetAdapterDriver(eligibleDLLs))) { if (FindInReadable(dllFileName, eligibleDLLs)) {
dllFileName += u".dll"_ns;
gfxWindowsPlatform::GetDLLVersion(dllFileName.get(), dllVersion);
ParseDriverVersion(dllVersion, &dllNumericVersion);
} if (FindInReadable(dllFileName2, eligibleDLLs)) {
dllFileName2 += u".dll"_ns;
gfxWindowsPlatform::GetDLLVersion(dllFileName2.get(), dllVersion2);
ParseDriverVersion(dllVersion2, &dllNumericVersion2);
}
}
// Sometimes the DLL is not in the System32 nor SysWOW64 directories. But // UserModeDriverName (or UserModeDriverNameWow, if available) might provide // the full path to the DLL in some DriverStore FileRepository. if (dllNumericVersion == 0 && dllNumericVersion2 == 0) {
nsTArray<nsString> eligibleDLLpaths; const WCHAR* keyLocation = mDeviceKey[mActiveGPUIndex].get();
GetKeyValues(keyLocation, L"UserModeDriverName", eligibleDLLpaths);
GetKeyValues(keyLocation, L"UserModeDriverNameWow", eligibleDLLpaths);
size_t length = eligibleDLLpaths.Length(); for (size_t i = 0;
i < length && dllNumericVersion == 0 && dllNumericVersion2 == 0;
++i) { if (FindInReadable(dllFileName, eligibleDLLpaths[i])) {
gfxWindowsPlatform::GetDLLVersion(eligibleDLLpaths[i].get(),
dllVersion);
ParseDriverVersion(dllVersion, &dllNumericVersion);
} elseif (FindInReadable(dllFileName2, eligibleDLLpaths[i])) {
gfxWindowsPlatform::GetDLLVersion(eligibleDLLpaths[i].get(),
dllVersion2);
ParseDriverVersion(dllVersion2, &dllNumericVersion2);
}
}
}
// If there's a driver version mismatch, consider this harmful only when // the driver version is less than knownSafeMismatchVersion. See the // above comment about crashes with old mismatches. If the GetDllVersion // call fails, we are not calling it a mismatch. if ((dllNumericVersion != 0 && dllNumericVersion != driverNumericVersion) ||
(dllNumericVersion2 != 0 &&
dllNumericVersion2 != driverNumericVersion)) { if (driverNumericVersion < knownSafeMismatchVersion ||
std::max(dllNumericVersion, dllNumericVersion2) <
knownSafeMismatchVersion) {
mHasDriverVersionMismatch = true;
gfxCriticalNoteOnce
<< "Mismatched driver versions between the registry "
<< NS_ConvertUTF16toUTF8(mDriverVersion[mActiveGPUIndex]).get()
<< " and DLL(s) " << NS_ConvertUTF16toUTF8(dllVersion).get() << ", "
<< NS_ConvertUTF16toUTF8(dllVersion2).get() << " reported.";
}
} elseif (dllNumericVersion == 0 && dllNumericVersion2 == 0) { // Leave it as an asserting error for now, to see if we can find // a system that exhibits this kind of a problem internally.
gfxCriticalErrorOnce()
<< "Potential driver version mismatch ignored due to missing DLLs "
<< NS_ConvertUTF16toUTF8(dllFileName).get()
<< " v=" << NS_ConvertUTF16toUTF8(dllVersion).get() << " and "
<< NS_ConvertUTF16toUTF8(dllFileName2).get()
<< " v=" << NS_ConvertUTF16toUTF8(dllVersion2).get();
}
}
constchar* spoofedDriverVersionString =
PR_GetEnv("MOZ_GFX_SPOOF_DRIVER_VERSION"); if (spoofedDriverVersionString) {
mDriverVersion[mActiveGPUIndex].AssignASCII(spoofedDriverVersionString);
}
constchar* spoofedVendor = PR_GetEnv("MOZ_GFX_SPOOF_VENDOR_ID"); if (spoofedVendor) {
mAdapterVendorID[mActiveGPUIndex].AssignASCII(spoofedVendor);
}
constchar* spoofedDevice = PR_GetEnv("MOZ_GFX_SPOOF_DEVICE_ID"); if (spoofedDevice) {
mAdapterDeviceID[mActiveGPUIndex].AssignASCII(spoofedDevice);
}
NS_IMETHODIMP
GfxInfo::GetIsGPU2Active(bool* aIsGPU2Active) { // This is never the case, as the active GPU ends up being // the first one. It should probably be removed.
*aIsGPU2Active = false; return NS_OK;
}
/* Cisco's VPN software can cause corruption of the floating point state. * Make a note of this in our crash reports so that some weird crashes
* make more sense */ staticvoid CheckForCiscoVPN() { LONG result;
HKEY key; /* This will give false positives, but hopefully no false negatives */
result =
RegOpenKeyExW(HKEY_LOCAL_MACHINE, L"Software\\Cisco Systems\\VPN Client",
0, KEY_QUERY_VALUE, &key); if (result == ERROR_SUCCESS) {
RegCloseKey(key);
CrashReporter::AppendAppNotesToCrashReport("Cisco VPN\n"_ns);
}
}
/* Add an App Note, this contains extra information. */
nsAutoCString note;
// TODO: We should probably convert this into a proper annotation if (vendorID == GfxDriverInfo::GetDeviceVendor(DeviceVendor::All)) { /* if we didn't find a valid vendorID lets append the mDeviceID string to
* try to find out why */
LossyAppendUTF16toASCII(mDeviceID[mActiveGPUIndex], note);
note.AppendLiteral(", ");
LossyAppendUTF16toASCII(mDeviceKeyDebug, note);
}
note.AppendLiteral("\n");
// Make a slight difference between the two cases so that we // can see it in the crash reports. It may come in handy. if (mActiveGPUIndex == 1) {
note.AppendLiteral("Has dual GPUs. GPU-#2: ");
} else {
note.AppendLiteral("Has dual GPUs. GPU #2: ");
}
GetAdapterDeviceID2(deviceID2);
CopyUTF16toUTF8(deviceID2, narrowDeviceID2);
GetAdapterVendorID2(vendorID2);
CopyUTF16toUTF8(vendorID2, narrowVendorID2);
GetAdapterDriverVersion2(adapterDriverVersionString2);
GetAdapterSubsysID(subsysID2);
CopyUTF16toUTF8(subsysID2, narrowSubsysID2);
note.AppendLiteral("AdapterVendorID2: ");
note.Append(narrowVendorID2);
note.AppendLiteral(", AdapterDeviceID2: ");
note.Append(narrowDeviceID2);
note.AppendLiteral(", AdapterSubsysID2: ");
note.Append(narrowSubsysID2);
note.AppendLiteral(", AdapterDriverVersion2: ");
note.Append(NS_LossyConvertUTF16toASCII(adapterDriverVersionString2));
}
CrashReporter::AppendAppNotesToCrashReport(note);
}
static OperatingSystem WindowsVersionToOperatingSystem(
int32_t aWindowsVersion) { switch (aWindowsVersion) { case kWindows7: return OperatingSystem::Windows7; case kWindows8: return OperatingSystem::Windows8; case kWindows8_1: return OperatingSystem::Windows8_1; case kWindows10: return OperatingSystem::Windows10; case kWindowsUnknown: default: return OperatingSystem::Unknown;
}
}
// Return true if the CPU supports AVX, but the operating system does not. #ifdefined(_M_X64) staticinlinebool DetectBrokenAVX() { int regs[4];
__cpuid(regs, 0); if (regs[0] == 0) { // Level not supported. returnfalse;
}
__cpuid(regs, 1);
constunsigned AVX = 1u << 28; constunsigned XSAVE = 1u << 26; if ((regs[2] & (AVX | XSAVE)) != (AVX | XSAVE)) { // AVX is not supported on this CPU. returnfalse;
}
constunsigned OSXSAVE = 1u << 27; if ((regs[2] & OSXSAVE) != OSXSAVE) { // AVX is supported, but the OS didn't enable it. // This can be forced via bcdedit /set xsavedisable 1. returntrue;
}
const nsTArray<GfxDriverInfo>& GfxInfo::GetGfxDriverInfo() { if (!sDriverInfo->Length()) { /* * It should be noted here that more specialized rules on certain features * should be inserted -before- more generalized restriction. As the first * match for feature/OS/device found in the list will be used for the final * blocklisting call.
*/
/* * NVIDIA entries
*/ /* * The last 5 digit of the NVIDIA driver version maps to the version that * NVIDIA uses. The minor version (15, 16, 17) corresponds roughtly to the * OS (Vista, Win7, Win7) but they show up in smaller numbers across all * OS versions (perhaps due to OS upgrades). So we want to support * October 2009+ drivers across all these minor versions. * * 187.45 (late October 2009) and earlier contain a bug which can cause us * to crash on shutdown.
*/
APPEND_TO_DRIVER_BLOCKLIST(
OperatingSystem::Windows7, DeviceFamily::NvidiaAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_LESS_THAN_OR_EQUAL,
V(8, 15, 11, 8745), "FEATURE_FAILURE_NV_W7_15", "nVidia driver > 187.45");
APPEND_TO_DRIVER_BLOCKLIST_RANGE(
OperatingSystem::Windows7, DeviceFamily::NvidiaAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BETWEEN_INCLUSIVE_START, V(8, 16, 10, 0000), V(8, 16, 11, 8745), "FEATURE_FAILURE_NV_W7_16", "nVidia driver > 187.45"); // Telemetry doesn't show any driver in this range so it might not even be // required.
APPEND_TO_DRIVER_BLOCKLIST_RANGE(
OperatingSystem::Windows7, DeviceFamily::NvidiaAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BETWEEN_INCLUSIVE_START, V(8, 17, 10, 0000), V(8, 17, 11, 8745), "FEATURE_FAILURE_NV_W7_17", "nVidia driver > 187.45");
/* * AMD/ATI entries. 8.56.1.15 is the driver that shipped with Windows 7 RTM
*/
APPEND_TO_DRIVER_BLOCKLIST(OperatingSystem::Windows, DeviceFamily::AtiAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_LESS_THAN, V(8, 56, 1, 15), "FEATURE_FAILURE_AMD1", "8.56.1.15");
// Bug 1587155 // // There are a several reports of strange rendering corruptions with this // driver version, with and without webrender. We weren't able to // reproduce these problems, but the users were able to update their // drivers and it went away. So just to be safe, let's blocklist all // gpu use with this particular (very old) driver, restricted // to Win10 since we only have reports from that platform.
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows10, DeviceFamily::AtiAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_EQUAL,
V(22, 19, 162, 4), "FEATURE_FAILURE_BUG_1587155");
// Bug 1829487 - Work around a gen6 driver bug that miscompiles shaders // resulting // in black squares. Disabling shader optimization pass // appears to work around this for now.
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows, DeviceFamily::IntelSandyBridge,
nsIGfxInfo::FEATURE_WEBRENDER_OPTIMIZED_SHADERS,
nsIGfxInfo::FEATURE_BLOCKED_DEVICE, DRIVER_LESS_THAN,
GfxDriverInfo::allDriverVersions, "FEATURE_FAILURE_BUG_1829487");
/* * Bug 783517 - crashes in AMD driver on Windows 8
*/
APPEND_TO_DRIVER_BLOCKLIST_RANGE(
OperatingSystem::Windows8, DeviceFamily::AtiAll,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BETWEEN_INCLUSIVE_START, V(8, 982, 0, 0), V(8, 983, 0, 0), "FEATURE_FAILURE_BUG_783517_AMD", "!= 8.982.*.*");
/* * Bug 1599981 - crashes in AMD driver on Windows 10
*/
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows10, DeviceFamily::RadeonCaicos,
nsIGfxInfo::FEATURE_DIRECT3D_11_LAYERS,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_LESS_THAN,
V(15, 301, 1901, 0), "FEATURE_FAILURE_BUG_1599981");
/* OpenGL on any ATI/AMD hardware is discouraged * See: * bug 619773 - WebGL: Crash with blue screen : "NMI: Parity Check / Memory * Parity Error" bugs 584403, 584404, 620924 - crashes in atioglxx * + many complaints about incorrect rendering
*/
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows, DeviceFamily::AtiAll,
nsIGfxInfo::FEATURE_OPENGL_LAYERS, nsIGfxInfo::FEATURE_DISCOURAGED,
DRIVER_LESS_THAN, GfxDriverInfo::allDriverVersions, "FEATURE_FAILURE_OGL_ATI_DIS");
/* * Intel entries
*/
/* The driver versions used here come from bug 594877. They might not * be particularly relevant anymore.
*/ #define IMPLEMENT_INTEL_DRIVER_BLOCKLIST(winVer, devFamily, driverVer, ruleId) \
APPEND_TO_DRIVER_BLOCKLIST2(winVer, devFamily, \
GfxDriverInfo::optionalFeatures, \
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, \
DRIVER_LESS_THAN, driverVer, ruleId)
/* Disable Direct2D on Intel GMAX4500 devices because of rendering * corruption discovered in bug 1180379. These seems to affect even the most * recent drivers. We're black listing all of the devices to be safe even * though we've only confirmed the issue on the G45
*/
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows, DeviceFamily::IntelGMAX4500HD,
nsIGfxInfo::FEATURE_DIRECT2D, nsIGfxInfo::FEATURE_BLOCKED_DEVICE,
DRIVER_LESS_THAN, GfxDriverInfo::allDriverVersions, "FEATURE_FAILURE_1180379");
/* OpenGL on any Intel hardware is discouraged */
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows, DeviceFamily::IntelAll,
nsIGfxInfo::FEATURE_OPENGL_LAYERS, nsIGfxInfo::FEATURE_DISCOURAGED,
DRIVER_LESS_THAN, GfxDriverInfo::allDriverVersions, "FEATURE_FAILURE_INTEL_OGL_DIS");
/** * Disable acceleration on Intel HD 3000 for graphics drivers * <= 8.15.10.2321. See bug 1018278 and bug 1060736.
*/
APPEND_TO_DRIVER_BLOCKLIST(OperatingSystem::Windows,
DeviceFamily::IntelSandyBridge,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BUILD_ID_LESS_THAN_OR_EQUAL, 2321, "FEATURE_FAILURE_BUG_1018278", "X.X.X.2342");
/** * Disable D2D on Win7 on Intel Haswell for graphics drivers build id <= * 4578. See bug 1432610
*/
APPEND_TO_DRIVER_BLOCKLIST2(OperatingSystem::Windows7,
DeviceFamily::IntelHaswell,
nsIGfxInfo::FEATURE_DIRECT2D,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BUILD_ID_LESS_THAN_OR_EQUAL, 4578, "FEATURE_FAILURE_BUG_1432610"); /** * Disable VP8 HW decoding on Windows 8.1 on Intel Haswel and a certain * driver version. See bug 1760464 comment 6 and bug 1761332.
*/
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows8_1, DeviceFamily::IntelHaswell,
nsIGfxInfo::FEATURE_VP8_HW_DECODE, nsIGfxInfo::FEATURE_BLOCKED_DEVICE,
DRIVER_LESS_THAN, GfxDriverInfo::allDriverVersions, "FEATURE_FAILURE_BUG_1760464");
// Bug 1548410. Disable hardware accelerated video decoding on // Qualcomm drivers used on Windows on ARM64 which are known to // cause BSOD's and output suprious green frames while decoding video. // Bug 1592826 expands the blocklist.
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows10, DeviceFamily::QualcommAll,
nsIGfxInfo::FEATURE_HARDWARE_VIDEO_DECODING,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_LESS_THAN_OR_EQUAL,
V(25, 18, 10440, 0), "FEATURE_FAILURE_BUG_1592826");
/* This may not be needed at all */
APPEND_TO_DRIVER_BLOCKLIST2(
OperatingSystem::Windows7, DeviceFamily::Bug1155608,
nsIGfxInfo::FEATURE_HARDWARE_VIDEO_DECODING,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_LESS_THAN,
V(8, 15, 10, 2869), "FEATURE_FAILURE_INTEL_W7_HW_DECODING");
/* Bug 1137716: XXX this should really check for the matching Intel piece as
* well. Unfortunately, we don't have the infrastructure to do that */
APPEND_TO_DRIVER_BLOCKLIST_RANGE_GPU2(
OperatingSystem::Windows7, DeviceFamily::Bug1137716,
GfxDriverInfo::optionalFeatures,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_BETWEEN_INCLUSIVE,
V(8, 17, 12, 5730), V(8, 17, 12, 6901), "FEATURE_FAILURE_BUG_1137716", "Nvidia driver > 8.17.12.6901");
/* Bug 1304360: Graphical artifacts with D3D9 on Windows 7. */
APPEND_TO_DRIVER_BLOCKLIST2(OperatingSystem::Windows7,
DeviceFamily::IntelGMAX3000,
nsIGfxInfo::FEATURE_DIRECT3D_9_LAYERS,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION,
DRIVER_BUILD_ID_LESS_THAN_OR_EQUAL, 1749, "FEATURE_FAILURE_INTEL_W7_D3D9_LAYERS");
/* Bug 1717519/1717911: Crashes while drawing with swgl.
* Reproducible but not investigated yet.*/
APPEND_TO_DRIVER_BLOCKLIST_RANGE(
OperatingSystem::Windows, DeviceFamily::IntelAll,
nsIGfxInfo::FEATURE_DIRECT3D_11_LAYERS,
nsIGfxInfo::FEATURE_BLOCKED_DRIVER_VERSION, DRIVER_BETWEEN_INCLUSIVE,
V(8, 15, 10, 2125), V(8, 15, 10, 2141), "FEATURE_FAILURE_BUG_1717911", "Intel driver > 8.15.10.2141");
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.