Closed Bug 1990699 Opened 9 days ago Closed 16 hours ago

Sporadic Google Drive load times on Firefox browser - Chrome and Safari work fine

Categories

(Core :: Networking: HTTP, defect, P1)

defect

Tracking

()

RESOLVED FIXED
145 Branch
Tracking Status
firefox-esr115 144+ affected
firefox-esr140 144+ fixed
firefox143 + fixed
firefox144 + fixed
firefox145 + fixed

People

(Reporter: servicedesk, Assigned: kershaw, NeedInfo)

References

(Blocks 1 open bug)

Details

(Whiteboard: [necko-triaged] [necko-priority-queue])

Attachments

(7 files, 1 obsolete file)

Several users have reported ongoing issues with Google Drive when using the Firefox browser. Specifically, documents and slides often fail to load or display correctly. While clearing the browser cache temporarily resolves the problem, it tends to recur unpredictably, making it a sporadic but persistent issue. Notably, this behavior is isolated to Firefox—users have confirmed that the same problems do not occur when accessing Google Drive via Chrome or Safari.

Please get in touch in #perf-help on internal Mozilla Slack. We'll need more information to diagnose.

Component: General → Performance: General
Flags: needinfo?(servicedesk)
Product: Firefox → Core

A profile of the issue occurring could also be helpful, although I personally doubt this is a performance issue as opposed to some kind of networking or compat issue a profile could still provide useful information in order to understand what's going on here.

I don't really seem to reproduce this issue myself.

I chatted w/ Vrinda to get a little more info. When using Google Drive, sometimes Gmail and other Google things, Firefox hangs for a while (you see the throbber in the tab spinning). She can clear history/cookies and it will help but only temporarily. She's running Firefox 143.0.1 on MacOS.
She has about 50 tabs open. And at least 1 of them has a very large spreadsheet open - though these don't seem like they should be a problem?

She does not have this problem on Chrome.

While we were on zoom, she ran into the issue when requesting access to a file - she clicked the "Request Access" button and nothing really happened but you could see the throbber in the tab. She took a profile while this was happening: https://share.firefox.dev/4gNiJuR

Something I have noticed as well ( Justin linked the ticket I've opened above with possibly this same issue ) is that the problem does not persist for me if I open a new incognito browser and sign in. I'm not sure if that is the case for everyone reporting this issue, but it is interesting to note as it might indicate this is something related to cookies or local storage?

Based on findings that the issue can be resolved by disabling network.http.http3.enable flag and reloading, defaulting to H2 - This is pointing to an HTTP3 issue. Network logs have been collected and shared with the Necko team for investigation

Severity: -- → S2
Component: Performance: General → Networking: HTTP

I am setting all branches as affected and tracking across the board as I don't see release related information in this bug nor the regression keyword.

Here’s a short summary of what I saw in the log:

  • All HTTP/3 connections appear to be blocked. The log messages below indicate that crypto frames were lost.
2025-10-01 22:11:45.172156494 UTC - [Parent Process 44940: Socket Thread]: D/neqo_transport::* [neqo_transport::crypto] Lost crypto frame space=in offset=1514 length=395
2025-10-01 22:11:45.172159179 UTC - [Parent Process 44940: Socket Thread]: D/neqo_transport::* [neqo_transport::crypto] Lost crypto frame space=in offset=0 length=559
2025-10-01 22:11:45.172160644 UTC - [Parent Process 44940: Socket Thread]: D/neqo_transport::* [neqo_transport::crypto] Lost crypto frame space=in offset=559 length=955
  • This triggers the fallback mechanism to switch to an HTTP/2 connection.
  • We have a bug in the fallback mechanism: the log shows that the fallback connection failed to be created.
2025-10-01 22:11:45.456206054 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp nsHttpConnectionMgr::DoFallbackConnection
2025-10-01 22:11:45.456208740 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp TlsHandshaker::SetupSSL 33c4f0100 caps=0x200011 .SA.....F.[tlsflags0x00000000]drivefrontend-pa.clients6.google.com:443^partitionKey=%28https%2Cgoogle.com%29
2025-10-01 22:11:45.456210449 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp GetH2orH3ActiveConn() request for ent 1668a1940 .SA.....F.[tlsflags0x00000000]drivefrontend-pa.clients6.google.com:443^partitionKey=%28https%2Cgoogle.com%29 found an active experienced connection 33c4f0100 in native connection entry
2025-10-01 22:11:45.456211425 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp GetOrCreateConnectionEntry is coalescing h2/3 an/onymous connections, ent=1668a1940
2025-10-01 22:11:45.456213867 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp TlsHandshaker::SetupSSL 33c4f0100 caps=0x200011 .SA.....F.[tlsflags0x00000000]drivefrontend-pa.clients6.google.com:443^partitionKey=%28https%2Cgoogle.com%29
2025-10-01 22:11:45.456215820 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp GetH2orH3ActiveConn() request for ent 1668a1940 .SA.....F.[tlsflags0x00000000]drivefrontend-pa.clients6.google.com:443^partitionKey=%28https%2Cgoogle.com%29 found an active experienced connection 33c4f0100 in native connection entry
2025-10-01 22:11:45.456217041 UTC - [Parent Process 44940: Socket Thread]: D/nsHttp ConnectionEntry::RestrictConnections 1668a1940 .SA.....F.[tlsflags0x00000000]drivefrontend-pa.clients6.google.com:443^partitionKey=%28https%2Cgoogle.com%29 restricted due to active >=h2
  • The cause is related to the anonymous flag. In Necko, we allow coalescing of anonymous connections, but this doesn’t work for fallback connections.
  • As a solution, we can allow the fallback connection to coalesce with the anonymous one.
Priority: -- → P1
Whiteboard: [necko-triaged] [necko-priority-queue]
Assignee: nobody → kershaw
Status: NEW → ASSIGNED
Attachment #9517893 - Flags: approval-mozilla-beta?

firefox-beta Uplift Approval Request

  • User impact if declined: Failed to fallback from HTTP/3 connection to HTTP/2.
  • Code covered by automated testing: yes
  • Fix verified in Nightly: no
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing: N/A
  • Risk associated with taking this patch: low
  • Explanation of risk level: This patch is straightforward.
  • String changes made/needed: N/A
  • Is Android affected?: yes
Attachment #9517895 - Flags: approval-mozilla-beta?

firefox-esr140 Uplift Approval Request

  • User impact if declined: Failed to fallback from HTTP/3 connection to HTTP/2.
  • Code covered by automated testing: yes
  • Fix verified in Nightly: no
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing: N/A
  • Risk associated with taking this patch: low
  • Explanation of risk level: Patch is really straightforward.
  • String changes made/needed: N/A
  • Is Android affected?: yes
Attachment #9517896 - Flags: approval-mozilla-esr140?

firefox-release Uplift Approval Request

  • User impact if declined: Failed to fallback from HTTP/3 to HTTP/2.
  • Code covered by automated testing: yes
  • Fix verified in Nightly: no
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing: N/A
  • Risk associated with taking this patch: low
  • Explanation of risk level: Patch is really straightforward.
  • String changes made/needed: N/A
  • Is Android affected?: yes
Attachment #9517899 - Flags: approval-mozilla-release?
Attachment #9517893 - Attachment is obsolete: true
Attachment #9517893 - Flags: approval-mozilla-beta?
Attachment #9517895 - Attachment description: Bug 1990699 - Allow fallback to coalescing connection (for uplifting), r=#necko → Bug 1990699 - Allow fallback to coalescing connection, r=#necko
Attachment #9517895 - Flags: approval-mozilla-beta? → approval-mozilla-beta+
Attachment #9517899 - Attachment description: Bug 1990699 - Allow fallback to coalescing connection (for uplifting), r=#necko → Bug 1990699 - Allow fallback to coalescing connection, r=#necko
Attachment #9517899 - Flags: approval-mozilla-release? → approval-mozilla-release+
Attachment #9517896 - Attachment description: Bug 1990699 - Allow fallback to coalescing connection (for uplifting), r=#necko → Bug 1990699 - Allow fallback to coalescing connection, r=#necko
Attachment #9517896 - Flags: approval-mozilla-esr140? → approval-mozilla-esr140+
Status: ASSIGNED → RESOLVED
Closed: 16 hours ago
Resolution: --- → FIXED
Target Milestone: --- → 145 Branch
Duplicate of this bug: 1989432
Attachment #9518177 - Flags: approval-mozilla-esr115?

firefox-esr115 Uplift Approval Request

  • User impact if declined: Failed to fallback from HTTP/3 to HTTP/2.
  • Code covered by automated testing: yes
  • Fix verified in Nightly: yes
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing:
  • Risk associated with taking this patch: low
  • Explanation of risk level: Patch is really straightforward.
  • String changes made/needed: n/a
  • Is Android affected?: yes
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: