| Index: net/docs/bug-triage-suggested-workflow.txt
 | 
| diff --git a/net/docs/bug-triage-suggested-workflow.txt b/net/docs/bug-triage-suggested-workflow.txt
 | 
| index f605c4354f785cf7143b2816af9431cbcc9b21f1..d3e7141dc4be95c16de369aec4f43c27e209cad1 100644
 | 
| --- a/net/docs/bug-triage-suggested-workflow.txt
 | 
| +++ b/net/docs/bug-triage-suggested-workflow.txt
 | 
| @@ -77,11 +77,16 @@ Investigating Cr-Internals-Network bugs:
 | 
|  
 | 
|  Look for new crashers:
 | 
|  * Go to go/chromecrash.
 | 
| -* For each platform, go to the latest canary.  Click on browser -> limit 1000.
 | 
| -    Search the page for "net::".  Ignore crashes that only occur once, as
 | 
| +* For each platform, go to the latest canary.
 | 
| +* In the "Process Type" frame, click on "browser".
 | 
| +* At the bottom of the "Magic Signature" frame,  click "limit 1000".
 | 
| +  Reported crashers are sorted in decreasing order of the number of reports for
 | 
| +  that crash signature.
 | 
| +* Search the page for "net::".  Ignore crashes that only occur once, as
 | 
|      memory corruption can easily cause one-off failures when the sample size is
 | 
|      large enough.
 | 
| -  * Look at the stack trace to confirm it's a network bug.
 | 
| +* Click on the number of reports field to see details of crash. Look at the
 | 
| +    stack trace to confirm it's a network bug.
 | 
|    * If it is, and there's no associated bug filed, file a new bug directly from
 | 
|        chromecrash, looking at earlier canaries to determine if it's a recent
 | 
|        regression.  Use the most specific label possible.
 | 
| 
 |