Slow page loading in Nightly after restart browser.
Categories
(Core :: Security: PSM, defect, P1)
Tracking
()
Tracking | Status | |
---|---|---|
firefox87 | --- | fixed |
People
(Reporter: alice0775, Assigned: keeler)
Details
(Whiteboard: [psm-assigned])
Attachments
(4 files)
Steps to reproduce:
- Create new profile
- Restart several times
- Click Wikipedia button from Top Sites
Actual Results:
Page loading is slow after click the button.
Profiler log Nightly: https://share.firefox.dev/39t5H4y
Expected Results:
Page loading is fast after click the button.
Profiler log Firefox85: https://share.firefox.dev/3cpPFKw
Reporter | ||
Comment 1•4 years ago
|
||
Reporter | ||
Comment 2•4 years ago
|
||
Setting Home to "Blank Page" does not fix the slowness in Nightly.
Profiler log Nightly: https://share.firefox.dev/36qtErg
Reporter | ||
Updated•4 years ago
|
Comment 3•4 years ago
|
||
A quick look at the profile - I do agree that Core :: Networking is probably the right component: it looks like almost 10s is spent trying to establish a TLS connection.
Comment 4•4 years ago
|
||
Thank you for the report, Alice.
It's not clear why TLS connection takes so much time. Could you also record some HTTP logging (new profile if possible - logs may contain private info)
https://developer.mozilla.org/en-US/docs/Mozilla/Debugging/HTTP_logging
Thanks!
Comment 5•4 years ago
|
||
Also, since it works in 85 but not in nightly, do you think you could try to get a regression range?
https://mozilla.github.io/mozregression/quickstart.html
Comment 6•4 years ago
|
||
Dragana suggested that it might be the HTTP3 experiment which is enabled on Nightly.
Indeed, given that it shows up in about:support, it's a probable cause.
Could you check if setting the network.http.http3.enabled
pref to false fixes the issue for you?
Reporter | ||
Comment 7•4 years ago
|
||
I attach HTTP LOG using the method "Logging HTTP activity by manually setting environment variables".
FYI, I can't seem to reproduce the problem, if I tried using the method "Using about:networking".
Reporter | ||
Comment 8•4 years ago
|
||
(In reply to Valentin Gosu [:valentin] (he/him) from comment #6)
Dragana suggested that it might be the HTTP3 experiment which is enabled on Nightly.
Indeed, given that it shows up in about:support, it's a probable cause.
Could you check if setting thenetwork.http.http3.enabled
pref to false fixes the issue for you?
Setting network.http.http3.enabled = false did not fix. the issue.
Reporter | ||
Comment 9•4 years ago
|
||
(In reply to Valentin Gosu [:valentin] (he/him) from comment #5)
Also, since it works in 85 but not in nightly, do you think you could try to get a regression range?
https://mozilla.github.io/mozregression/quickstart.html
I found a regression window, but it is old...
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=ae43921b1fe66df9bc8059b97232a030fc53c687&tochange=cf1159646b4577b0e7ed5589689a378c49d75626
Comment 10•4 years ago
|
||
I looked at the log. We are spendnig a lot of time in TLS handshake.
the regression range is also about TLS handshake.
I will move it to the tight component.
Assignee | ||
Comment 11•4 years ago
|
||
Can you capture a profile with the socket thread and the SSL threads included? (to capture the latter, add SSL*
to the Add custom threads by name:
field. Thanks!
Reporter | ||
Comment 12•4 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #11)
Can you capture a profile with the socket thread and the SSL threads included? (to capture the latter, add
SSL*
to theAdd custom threads by name:
field. Thanks!
profiler: https://share.firefox.dev/3pEa1nd
Assignee | ||
Comment 13•4 years ago
|
||
Oh - my mistake. It looks like you need just SSL
(no *
) to capture the SSL threads.
Reporter | ||
Comment 14•4 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #13)
Oh - my mistake. It looks like you need just
SSL
(no*
) to capture the SSL threads.
profiler: https://share.firefox.dev/2MOHLzx
Reporter | ||
Comment 15•4 years ago
|
||
FWIW,
Delete all files in folder profile\security_state
, then the issue is fixed.
Assignee | ||
Comment 16•4 years ago
|
||
Thanks! Do you still have the files crlite.filter
and crlite.stash
from that folder?
Reporter | ||
Comment 17•4 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #16)
Thanks! Do you still have the files
crlite.filter
andcrlite.stash
from that folder?
Yes, I have these file in backup profile.
Assignee | ||
Comment 18•4 years ago
|
||
Can you attach those to this bug? (there's nothing private in them)
Reporter | ||
Comment 19•4 years ago
|
||
Assignee | ||
Comment 20•4 years ago
|
||
Thanks! I'm fairly confident I know what the issue is, but can you capture another profile and add BackgroundThreadPool
to the custom list of names?
Reporter | ||
Comment 21•4 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #20)
Thanks! I'm fairly confident I know what the issue is, but can you capture another profile and add
BackgroundThreadPool
to the custom list of names?
Profiler log : https://share.firefox.dev/2MAOYDB
Assignee | ||
Comment 22•4 years ago
|
||
Thanks! How does this build perform? https://treeherder.mozilla.org/jobs?repo=try&revision=13ffa944bd99805402a2dbb4c9dd817bf1202058
Reporter | ||
Comment 23•4 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #22)
Thanks! How does this build perform? https://treeherder.mozilla.org/jobs?repo=try&revision=13ffa944bd99805402a2dbb4c9dd817bf1202058
Yes, the try-build fixed this problem!
Assignee | ||
Comment 24•4 years ago
|
||
Loading an accumulated set of crlite stashes can take some time. To address
this, this patch dispatches an asynchronous background task to read the
accumulated set of crlite stashes in a way that doesn't block certificate
verification. Of course, this means that the stash information won't
necessarily be available for the first few verifications. This shouldn't be a
security concern as long as the crlite filter is no more than 10 days out of
date (the maximum lifespan of an OCSP response, which is what Firefox relies on
currently in release). Note that currently crlite filters as published by
remote settings regularly end up being more than 10 days old, which will be
addressed in https://github.com/mozilla/crlite/issues/153. Note further that
crlite is currently not being enforced by default on any channel, so making
this change now is not a security concern.
Updated•4 years ago
|
Assignee | ||
Updated•4 years ago
|
Comment 25•4 years ago
|
||
Comment 26•4 years ago
|
||
bugherder |
Updated•3 years ago
|
Description
•