Index: net/docs/bug-triage-suggested-workflow.txt |
diff --git a/net/docs/bug-triage-suggested-workflow.txt b/net/docs/bug-triage-suggested-workflow.txt |
index f605c4354f785cf7143b2816af9431cbcc9b21f1..d3e7141dc4be95c16de369aec4f43c27e209cad1 100644 |
--- a/net/docs/bug-triage-suggested-workflow.txt |
+++ b/net/docs/bug-triage-suggested-workflow.txt |
@@ -77,11 +77,16 @@ Investigating Cr-Internals-Network bugs: |
Look for new crashers: |
* Go to go/chromecrash. |
-* For each platform, go to the latest canary. Click on browser -> limit 1000. |
- Search the page for "net::". Ignore crashes that only occur once, as |
+* For each platform, go to the latest canary. |
+* In the "Process Type" frame, click on "browser". |
+* At the bottom of the "Magic Signature" frame, click "limit 1000". |
+ Reported crashers are sorted in decreasing order of the number of reports for |
+ that crash signature. |
+* Search the page for "net::". Ignore crashes that only occur once, as |
memory corruption can easily cause one-off failures when the sample size is |
large enough. |
- * Look at the stack trace to confirm it's a network bug. |
+* Click on the number of reports field to see details of crash. Look at the |
+ stack trace to confirm it's a network bug. |
* If it is, and there's no associated bug filed, file a new bug directly from |
chromecrash, looking at earlier canaries to determine if it's a recent |
regression. Use the most specific label possible. |