-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Fix WebExtension Excessive Memory Usage #12232
Comments
@cschanaj See https://github.com/koops76/https-everywhere/projects/1 for more ideas. |
Not sure about SpiderMonkey, but in V8 regexps are anyway compiled lazily only on the first use and not when regexp literal is met or |
Firefox only mention that @RReverser |
I've noticed many XML have targets that actually overlap and so unnecessarily duplicate each other. I've extended target checks to test and report this automatically as reducing them might partially help with EFForg#12232.
I've noticed many XML have targets that actually overlap and so unnecessarily duplicate each other. I've extended target checks to test and report this automatically as reducing them might partially help with EFForg#12232.
RE: radix trie with reversed hostnames. I've been wanting to use something like this for privacy badger's storage datastructure. I have a pending PR with an implementation here https://github.com/EFForg/privacybadger/pull/1568/files#diff-930ddd92cefc0f8bc3a8722e10b3e05e I'm not using cc @Hainish |
Several of those points will require a major rewrite of google rulesets (duplicated multiple times, right wildcards, etc.). I don't really like the way targets and rules are split right now anyways. I was already thinking of a major overhaul of these rulesets. I will probably open a new issue about it soon. |
@cschanaj The link you gave for " Avoid using chrome.runtime.sendMessage() whenever possible " no longer works |
It seems that Gorhill has disabled the "Issues" in his repo. Here is some comments made by Gorhill that we might be interested in 18 Jun 2014
Note: It is marked as fixed "verified" AND labeled M32 now. 18 Jun 2014
18 Jun 2014
20 Jun 2014
|
The most common use of Profiling the extension memory usage after subsequent clicks on the popup after visiting boingboing.net (which has lots of active rulesets communicated), I do see an increase overall, but I'm unsure what to look for in a heap analysis to see how much is due to this particular leak. And the overall memory usage in Chrome vacillates for me between 75 and 86M, settling at 72M. I wonder if we can safely ignore this problem until the upstream leak is patched. It seems to me that any minimization we do with |
Any updates on this? A quick check by toggling this extension shows that it's using between 40 and 80 MB of memory (uncertainty because it's not the only extension). |
@Giltyhub2 I actually saw that pull elsewhere and reinstalled — I imagine wasm will help out as well. I'll certainly report back if I notice any issues. |
Type: other
Re-open of #1775, based on #1775 (comment) ordered by priority (personal)
GOAL
???
PROPOSAL
Proof of concept PRs, may or may not be get implemented for various reasons. Discussions should be made in their respective PRs.
Try using a LRU Cache for caching (WIP: Try using a LRU Cache for caching #12591)See Simplify caching using ES6 Map() #3952TODO
Core
securecookie
, thanks @RReverser (Detect static securecookies to trivialize more rules #16029, Batch trivialize rulesets with static securecookies #16378) (2018.9.19)*
in the middle of the target host #4369, Remove support for wildcard in the middle #12319 thanks @Bisaloo)UI
document.createElement
PENDING FIX
WON'T FIX
improve browser startup overheadREF Avoid using chrome.runtime.sendMessage() wherever possible gorhill/httpswitchboard#345Use ES6 generator functions to reduce run-time overhead in search & lookup #16951)Bugs or unexpected features found when reading through the code
The text was updated successfully, but these errors were encountered: