Chrome Network Bug Triage : Suggested Workflow #

[TOC]

Looking for new crashers #

  1. Go to go/chromecrash.

  2. For each platform, look through the releases for which releases to investigate. As per bug-triage.txt, this should be the most recent canary, the previous canary (if the most recent is less than a day old), and any of dev/beta/stable that were released in the last couple of days.

  3. For each release, in the "Process Type" frame, click on "browser".

  4. At the bottom of the "Magic Signature" frame, click "limit 1000". Reported crashers are sorted in decreasing order of the number of reports for that crash signature.

  5. Search the page for "net::".

  6. For each found signature:

    • If there is a bug already filed, make sure it is correctly describing the current bug (e.g. not closed, or not describing a long-past issue), and make sure that if it is a net bug, that it is labeled as such.
    • Ignore signatures that only occur once, as memory corruption can easily cause one-off failures when the sample size is large enough.
    • Ignore signatures that only come from a single client ID, as individual machine malware and breakage can also easily cause one-off failures.
    • Click on the number of reports field to see details of crash. Ignore it if it doesn't appear to be a network bug.
    • Otherwise, file a new bug directly from chromecrash. Note that this may result in filing bugs for low- and very-low- frequency crashes. That's ok; the bug tracker is a better tool to figure out whether or not we put resources into those crashes than a snap judgement when filing bugs.
    • For each bug you file, include the following information:
      • The backtrace. Note that the backtrace should not be added to the bug if Restrict-View-Google isn't set on the bug as it may contain PII. Filing the bug from the crash reporter should do this automatically, but check.
      • The channel in which the bug is seen (canary/dev/beta/stable), its frequency in that channel, and its rank among crashers in the channel.
      • The frequency of this signature in recent releases. This information is available by:
        1. Clicking on the signature in the "Magic Signature" list
        2. Clicking "Edit" on the dremel query at the top of the page
        3. Removing the "product.version='X.Y.Z.W' AND" string and clicking "Update".
        4. Clicking "Limit 1000" in the Product Version list in the resulting page (without this, the listing will be restricted to the releases in which the signature is most common, which will often not include the canary/dev release being investigated).
        5. Choose some subset of that list, or all of it, to include in the bug. Make sure to indicate if there is a defined point in the past before which the signature is not present.

Identifying unlabeled network bugs on the tracker #

Investigating component=Internals>Network bugs #

Monitoring UMA histograms and Chirp/Gasper alerts #

Sign up to chrome-network-debugging@google.com mailing list to receive automated e-mails about UMA alerts. Chirp is the new alert system, sending automated e-mails with sender address finch-chirp@google.com. Gasper is the old alert system, sending automated e-mails with sender address gasper-alerts@google.com. While Chirp is of higher priority, Gasper is not deprecated yet, so both alerts should be monitored for the time being.

For each alert that fires, determine if it's a real alert and file a bug if so.

For each alert, respond to chrome-network-debugging@google.com with a summary of the action you've taken and why, including issue link if an issue was filed.

Investigating crashers #

Dealing with old bugs #