New issue
Advanced search Search tips

Issue 591460 link

Starred by 3 users

Issue metadata

Status: Untriaged
Owner: ----
Cc:
EstimatedDays: ----
NextAction: 2019-07-09
OS: All
Pri: 3
Type: Bug

Blocked on:
issue 691652



Sign in to add a comment

Built-in extensions should not require a first-run process

Project Member Reported by brettw@chromium.org, Mar 2 2016

Issue description

On first run (and upgrades) we start extensions to register their background events and such. We do this also for built-in extensions like the settings page and various bits of code that back services like text-to-speech. This code slows down startup considerably on the critical first run, and also since Chrome updates itself a lot, you'll also hit this more often than you may think. On my linux desktop (no corp policy) I saw 13 processes total on first run on a clean profile.

These built-in extensions can be registered without starting processes. 
In browser/extensions/component_extensions_whitelist we have a list of built-in extensions with a locked-down owners list to prevent regressions of extensions.

My idea is to add to this list the permissions and registrations required for each built-in extension statically, and then skip the normal launch-an-extension-process registration for those extensions.

I think it would be beneficial if the permissions and event lists were also in the locked-down directory so we can keep a handle on what types of events teams are listening for that will require extension process launches.
 

Comment 1 by grt@chromium.org, Mar 3 2016

Cc: fdoray@chromium.org gab@chromium.org
fdoray: since these extra procs are started up after each update, they could be throwing a wrench in the startup metrics you've been measuring and improving.

Comment 2 by finnur@chromium.org, May 27 2016

Cc: rdevlin....@chromium.org
Labels: Hotlist-Fixit
Blockedon: 691652

Comment 5 by w...@chromium.org, Feb 23 2017

Devlin: How would you feel about adding a component-extension-specific section to the manifest that describes the events the extension wants to handle, rather than baking that into the whitelist in Chrome?
Labels: Pri-3
NextAction: 2019-07-09
Downgrading P2s that haven't been modified in more than 6 months, which have no component or owner.

Sign in to add a comment