Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(162)

Side by Side Diff: net/docs/bug-triage-suggested-workflow.txt

Issue 970953002: Clarifications to network bug triage process. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Incorporated crash feedback. Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/docs/bug-triage.txt ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Look for new crashers:
2 * Go to go/chromecrash.
3 * Choose the platforms and releases for which you will be
mmenke 2015/03/05 15:49:28 Think this would be clearer as "For each platform,
Randy Smith (Not in Mondays) 2015/03/06 00:21:35 Done.
4 investigating crashers. As per bug-triage.txt, this should be the
5 most recent canary, the previous canary (if the most recent is less
6 than a day old), and any of dev/beta/stable that were released in the
7 last couple of days. These releases should be investigated for all
8 platforms.
9 * For each release, in the "Process Type" frame, click on "browser".
10 * At the bottom of the "Magic Signature" frame, click "limit 1000".
11 Reported crashers are sorted in decreasing order of the number of reports for
12 that crash signature.
13 * Search the page for "net::".
14 * For each found signature:
15 * If there is a bug already filed, make sure it is correctly
16 describing the current bug (e.g. not closed, or not describing a
17 long-past issue), and make sure that if it is a net:: bug, that
18 it is labeled as such (and in such a way that it will be caught
19 by other parts of the triage process or the owners of the more
20 narrowly labeled network buckets).
mmenke 2015/03/05 15:49:28 I don't think the "(and in such a way..." part of
Randy Smith (Not in Mondays) 2015/03/06 00:21:35 Done.
21 * Ignore signatures that only occur once, as memory corruption can
22 easily cause one-off failures when the sample size is large
23 enough.
24 * Ignore signatures that only come from a single client ID, as
25 individual machine malware and breakage can also easily cause
26 one-off failures.
27 * Click on the number of reports field to see details of
28 crash. Ignore it if it doesn't appear to be a network bug.
29 * Otherwise, file a new bug directly from chromecrash. Note that
30 this may result in filing bugs for low- and very-low- frequency
31 crashes. That's ok; the bug tracker is a better tool to figure
32 out whether or not we put resources into those crashes than a snap
33 judgement when filing bugs.
34 * For each bug you file, include the following information:
35 * The backtrace. Note that the backtrace should not be added to the
36 bug if Restrict-View-Google isn't set on the bug as it may contain
37 PII. Filing the bug from the crash reporter should do this
38 automatically, but check.
39 * The channel in which the bug is seen (canary/dev/beta/stable),
40 its frequency in that channel, and its rank among crashers in the channel.
41 * The frequency of this signature in recent releases. This
42 information is available by:
43 * Clicking on the signature in the "Magic Signature" list
44 * Clicking "Edit" on the dremel query at the top of the page
45 * Removing the "product.version='X.Y.Z.W' AND" string and clicking
46 "Update".
47 * Clicking "Limit 1000" in the Product Version list in the
48 resulting page (without this, the listing will be restricted to
49 the releases in which the signature is most common, which will
50 often not include the canary/dev release being investigated).
51 * Choose some subset of that list, or all of it, to include in the
52 bug. Make sure to indicate if there is a defined point in the
53 past before which the signature is not present.
54
1 Identifying unlabeled network bugs on the tracker: 55 Identifying unlabeled network bugs on the tracker:
2 * Look at new uncomfirmed bugs since noon PST on the last triager's rotation: 56 * Look at new uncomfirmed bugs since noon PST on the last triager's rotation:
3 https://code.google.com/p/chromium/issues/list?can=2&q=status%3Aunconfirmed& sort=-id&num=1000 57 https://code.google.com/p/chromium/issues/list?can=2&q=status%3Aunconfirmed& sort=-id&num=1000
4 * Press "h" to bring up a preview of the bug text. 58 * Press "h" to bring up a preview of the bug text.
5 * Use "j" and "k" to advance through bugs. 59 * Use "j" and "k" to advance through bugs.
6 * If a bug looks like it might be network/download/safe-browsing related, middle 60 * If a bug looks like it might be network/download/safe-browsing related, middle
7 click [or command-click on OSX] to open in new tab. 61 click [or command-click on OSX] to open in new tab.
8 * If a user provides a crash ID for a crasher for a bug that could be 62 * If a user provides a crash ID for a crasher for a bug that could be
9 net-related, look at the crash stack at go/crash, and see if it looks to be 63 net-related, look at the crash stack at go/crash, and see if it looks to be
10 network related. Be sure to check if other bug reports have that stack 64 network related. Be sure to check if other bug reports have that stack
11 trace, and mark as a dupe if so. Even if the bug isn't network related, 65 trace, and mark as a dupe if so. Even if the bug isn't network related,
12 paste the stack trace in the bug, so no one else has to look up the crash 66 paste the stack trace in the bug, so no one else has to look up the crash
13 stack from the ID. 67 stack from the ID.
14 * If there's no other information than the crash ID, ask for more details and 68 * If there's no other information than the crash ID, ask for more details and
15 add the Needs-Feedback label. 69 add the Needs-Feedback label.
16 * If network causes are possible, ask for a net-internals log (If it's not a 70 * If network causes are possible, ask for a net-internals log (If it's not a
17 browser crash) and attach the most specific internals-network label that's 71 browser crash) and attach the most specific internals-network label that's
18 applicable. If there isn't an applicable narrower label, a clear owner for 72 applicable. If there isn't an applicable narrower label, a clear owner for
19 the issue, or there are multiple possibilities, attach the internals-network 73 the issue, or there are multiple possibilities, attach the internals-network
20 label and proceed with further investigation. 74 label and proceed with further investigation.
21 * If non-network causes also seem possible, attach those labels as well. 75 * If non-network causes also seem possible, attach those labels as well.
22 76
77 Request data about recent unassigned Cr-Internals-Network bugs from reporters.
78 * For all bugs in this category marked "Needs-Feedback", go through
79 them and remove that label if the reporter has responded with the
80 requested information.
81 * For all bugs in this category not marked "Needs-Feedback", go
82 through those bugs and determine if more information is needed from
83 the reporter to make forward progress on the bug. If it is, request
84 that information and mark the bug Needs-Feedback.
mmenke 2015/03/05 15:49:28 The first bullet seems redundant with the "Dealing
Randy Smith (Not in Mondays) 2015/03/06 00:21:35 Hmmm. This brings up a tricky set of questions, t
mmenke 2015/03/09 18:49:10 SGTM
85
23 Investigating Cr-Internals-Network bugs: 86 Investigating Cr-Internals-Network bugs:
24 * It's recommended that while on triage duty, you subscribe to the 87 * It's recommended that while on triage duty, you subscribe to the
25 Cr-Internals-Network label. To do this, go to 88 Cr-Internals-Network label. To do this, go to
26 https://code.google.com/p/chromium/issues/ and click on "Subscriptions". 89 https://code.google.com/p/chromium/issues/ and click on "Subscriptions".
27 Enter Cr-Internals-Network and click submit. 90 Enter Cr-Internals-Network and click submit.
28 * Look through uncomfirmed and untriaged Cr-Internals-Network bugs, prioritizing 91 * Look through uncomfirmed and untriaged Cr-Internals-Network bugs, prioritizing
29 those updated within the last week: 92 those updated within the last week:
30 https://code.google.com/p/chromium/issues/list?can=2&q=Cr%3DInternals-Networ k+-status%3AAssigned+-status%3AStarted+-status%3AAvailable+&sort=-modified 93 https://code.google.com/p/chromium/issues/list?can=2&q=Cr%3DInternals-Networ k+-status%3AAssigned+-status%3AStarted+-status%3AAvailable+&sort=-modified
31 * While investigating a new issue, change the status to Untriaged. 94 * While investigating a new issue, change the status to Untriaged.
32 * If a bug is a potential security issue (Allows for code execution from remote 95 * If a bug is a potential security issue (Allows for code execution from remote
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
68 strongly suspect CLs. 131 strongly suspect CLs.
69 * If you are having trouble with an issue, particularly for help understanding 132 * If you are having trouble with an issue, particularly for help understanding
70 net-internals logs, email the public net-dev@chromium.org list for help 133 net-internals logs, email the public net-dev@chromium.org list for help
71 debugging. If it's a crasher, or for some other reason discussion needs to 134 debugging. If it's a crasher, or for some other reason discussion needs to
72 be done in private, use chrome-network-debugging@google.com. 135 be done in private, use chrome-network-debugging@google.com.
73 TODO(mmenke): Write up a net-internals tips and tricks docs. 136 TODO(mmenke): Write up a net-internals tips and tricks docs.
74 * If it appears to be a bug in the unowned core of the network stack (i.e. no 137 * If it appears to be a bug in the unowned core of the network stack (i.e. no
75 sublabel applies, or only the Cr-Internals-Network-HTTP sublabel applies, 138 sublabel applies, or only the Cr-Internals-Network-HTTP sublabel applies,
76 and there's no clear owner), try to figure out the exact cause. 139 and there's no clear owner), try to figure out the exact cause.
77 140
78 Look for new crashers: 141 Monitor UMA histograms and gasper alerts. For each Gasper alert that
79 * Go to go/chromecrash. 142 fires, determine if it's a real alert and file a bug if so.
80 * For each platform, go to the latest canary. 143 * Don't file if the alert is coincident with a major volume change.
81 * In the "Process Type" frame, click on "browser". 144 The volume at a particular date can be determined by hovering the
82 * At the bottom of the "Magic Signature" frame, click "limit 1000". 145 mouse over the appropriate location on the alert line.
83 Reported crashers are sorted in decreasing order of the number of reports for 146 * Don't file if the alert is on a graph with very low volume (< ~200
84 that crash signature. 147 data points); it's probably noise, and we probably don't care even
85 * Search the page for "net::". Ignore crashes that only occur once, as 148 if it isn't.
86 memory corruption can easily cause one-off failures when the sample size is 149 * Don't file if the graph is really noisy (but eyeball it to decide if
87 large enough. 150 there is an underlying important shift under the noise).
88 * Click on the number of reports field to see details of crash. Look at the 151 * Don't file if the alert is in the "Known Ignorable" list:
89 stack trace to confirm it's a network bug. 152 * SimpleCache on Windows
90 * If it is, and there's no associated bug filed, file a new bug directly from 153 * DiskCache on Android.
91 chromecrash, looking at earlier canaries to determine if it's a recent 154 For each Gasper alert, respond to chrome-network-debugging@ with a
92 regression. Use the most specific label possible. 155 summary of the action you've taken and why, including issue link if an
93 * The most recent Canary may not yet have a full day of crashes, so it may be 156 issue was filed.
94 worth looking at more than one version.
95 * If there's been a dev, beta, or stable release in the last couple days, should
96 also look at those.
97 157
98 Investigating crashers: 158 Investigating crashers:
99 * Only investigate crashers that are still occurring, as identified by above 159 * Only investigate crashers that are still occurring, as identified by above
100 section. If a search on go/crash indicates a crasher is no longer 160 section. If a search on go/crash indicates a crasher is no longer
101 occurring, mark it as WontFix. 161 occurring, mark it as WontFix.
102 * Particularly for Windows, look for weird dlls associated with the crashes. 162 * Particularly for Windows, look for weird dlls associated with the crashes.
103 If there are some, it may be caused by malware. You can often figure out if 163 If there are some, it may be caused by malware. You can often figure out if
104 a dll is malware by a search, though it's harder to figure out if a dll is 164 a dll is malware by a search, though it's harder to figure out if a dll is
105 definitively not malware. 165 definitively not malware.
106 * See if the same users are repeatedly running into the same issue. This can be 166 * See if the same users are repeatedly running into the same issue. This can be
(...skipping 17 matching lines...) Expand all
124 * If a bug is over 2 months old, and the underlying problem was never 184 * If a bug is over 2 months old, and the underlying problem was never
125 reproduced or really understood: 185 reproduced or really understood:
126 * If it's over a year old, go ahead and mark the issue as Archived. 186 * If it's over a year old, go ahead and mark the issue as Archived.
127 * Otherwise, ask reporters if the issue is still present, and attach the 187 * Otherwise, ask reporters if the issue is still present, and attach the
128 Needs-Feedback label. 188 Needs-Feedback label.
129 * Old unconfirmed or untriaged Cr-Internals-Network issues can be investigated 189 * Old unconfirmed or untriaged Cr-Internals-Network issues can be investigated
130 just like newer ones. Crashers should generally be given higher priority, 190 just like newer ones. Crashers should generally be given higher priority,
131 since we can verify if they still occur, and then newer issues, as they're 191 since we can verify if they still occur, and then newer issues, as they're
132 more likely to still be present, and more likely to have a still responsive 192 more likely to still be present, and more likely to have a still responsive
133 bug reporter. 193 bug reporter.
OLDNEW
« no previous file with comments | « net/docs/bug-triage.txt ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698