User:Argonel/bug
TODO |
---|
Fix anchor links, see eg "crash" reports section |
Identifying duplicates
There are several ways of identifying duplicate reports depending on the kind of bug. In this guide we will discuss two kinds: normal, and crash.
General
- A search for duplicates should initially be done against the product of the bug report you are triaging. If you don't find any related issues, you may need to search in a different product.
- You may want to limit the results by date: you can select a starting date from some years (or months) ago
Tip |
---|
You can search in multiple products at the same time. |
Processing search results
- If you don't find any similar reports, assume the new bug report is unique
- If you find a similar bug report there are two choices:
- If you're certain it is the same issue, mark the report as duplicate. The bug report you initially picked is going to be marked as duplicate of the original report. If the duplicate has additional information, you may want to add it to the original. Note: some details may look unimportant to you, but they may be important for developers who know about the application workflow and code. By adding a big amount of minimal/incomplete information you may end up generating a big and complete testcase
- If you aren't completely sure, you need someone else to double-check your work. You may want to add a comment in the current report. Then, you should ask in the #kde-bugs IRC channel for someone to look at your comment.
- Comment template:
This bug looks related to bug XXXXXX
- (where XXXXXX is the bug ID of "main" bug)
- Comment template:
For "normal" (non-crash) reports
- Pick some "keywords" from the current report. These keywords need to explain what the bug is about
- Perform a full search over the same product, initially in the "general" component, including the keywords in the summary field
- If your search rendered some results, check them all, reading the whole description and trying to identify the situation
- If you don't get any results, you need to go back and:
- Change your keywords (tip: check a thesaurus, or similar/related concepts) or
- Use the keywords in the "Comments" field (so the search will look in the bug description and comments)
For "crash" reports
- Perform the same operation as with normal bug reports
- Check for reports with duplicate backtraces: (Read the Backtraces section below)
Perform a full search over the same product, initially in the "general" component, putting the "ClassName::FunctionName" pairs that identify the crash in the Comments field of the form (if you put more than one pair, you need to select the option "contains all of the words/strings")
Identifying duplicates (crashes)
C++ Backtraces
Definition
A backtrace is a collection of information that describes what the application was doing when it encountered an error and had to close itself. In part, it contains a listing of the stack of functions involved in the crash.
In KDE applications, the backtraces are most often generated by the Crash Handler Dialog, a.k.a. “Dr. Konqi”. They can also be generated by a general debugger such as “GDB”, but that involves more steps.
The backtrace is read from top to bottom. The first line typically indicates where the crash occurred (because of an illegal instruction, invalid pointer, memory problem or another issue). The other lines show the "path" leading to the crash from the beginning of execution.
Example
Application: Plasma Workspace (kdeinit4), signal: Bus error [KCrash Handler] #5 0x00007fb563bb8f02 in KPixmapCache::Private::mmapFile (this=0x92df60, filename=..., info=0x92dfb0, newsize=33656832) at /usr/src/debug/kdelibs-4.4.1/kdeui/util/kpixmapcache.cpp:491 #6 0x00007fb563be3c34 in KPixmapCache::Private::mmapFiles (this=0x92df60) at /usr/src/debug/kdelibs-4.4.1/kdeui/util/kpixmapcache.cpp:419 #7 0x00007fb563be38e3 in KPixmapCache::Private::init (this=0x92df60) at /usr/src/debug/kdelibs-4.4.1/kdeui/util/kpixmapcache.cpp:1061 #8 0x00007fb563be576d in KPixmapCache::discard (this=0x1203ca0) at /usr/src/debug/kdelibs-4.4.1/kdeui/util/kpixmapcache.cpp:1279 #9 0x00007fb563be5e48 in KPixmapCache::deleteCache (name=...) at /usr/src/debug/kdelibs-4.4.1/kdeui/util/kpixmapcache.cpp:1255 #10 0x00007fb55afdc97d in Plasma::ThemePrivate::discardCache (this=0x7a7d30) at /usr/src/debug/kdelibs-4.4.1/plasma/theme.cpp:224 #11 0x00007fb55afe009b in Plasma::ThemePrivate::setThemeName (this=0x7a7d30, tempThemeName=<value optimized out>, writeSettings=<value optimized out>) at /usr/src/debug/kdelibs-4.4.1/plasma/theme.cpp:380 #12 0x00007fb55afe19fb in Plasma::Theme::settingsChanged (this=0x70af20) at /usr/src/debug/kdelibs-4.4.1/plasma/theme.cpp:341 #13 0x00007fb55afe2918 in Plasma::ThemePrivate::settingsFileChanged (this=0x7a7d30, file=<value optimized out>) at /usr/src/debug/kdelibs- 4.4.1/plasma/theme.cpp:335 ...
Breakdown of a backtrace line
#NumberInTheStack MemoryAddress in Namespace::Class::FunctionMember (argumentThis=pointerValue, argument1=value, argument2=value, ...) at path/to /source/code/file.cpp:linenumber
- #NumberInTheStack: This the position of the call in the stack. Lower numbers are nearer to the point at which the crash occurred. This may not reach #1, especially with Dr. Konqi reports
- MemoryAddress: This is not particularly useful for triage since it represents the memory of the user's machine
- Namespace: C++ namespace of the function. It may not be present if there are no namespaces. This could also be a class name if the next component ("Class") is nested/inherited (a.k.a. a child class)
- Class: C++ class name of the function
- FunctionMember: C++ function name
- argumentThis=pointerValue : this first argument is often the memory address/pointer of the C++ object (example:
"this=0x91ec5f8"
) - other arguments use the same form "parameterName=parameterValue" - (argument1=value, argument2=value, …): arguments supplied to the function. This information may not be available if debug symbols are missing
- path/to/source/code/file.cpp:linenumber : the path to the source code file that describes that function and the line number. The path is the one found at build time, that is, it can be searched for in the source code. This information may not be useful if debug symbols are missing (in that case, the name of the library or application binary may be included instead. Example: /home/kde-devel/kde/lib/libsopranoclient.so.1)
Example:
#13 0xb759d5d7 in Nepomuk::ResourceData::determineUri (this=0x91ec5f8) at /home/kde-devel/kde/src/KDE/kdelibs/nepomuk/core/resourcedata.cpp:671
- The function call is the 13th in the stack
- Function's namespace: "Nepomuk"
- Function's class: "ResourceData"
- Function's name: "determineUri"
- The "Nepomuk::ResourceData" object on which the "determineUri" function was called has the memory address "0x91ec5f8"
- On line 671 of "/home/kde-devel/kde/src/KDE/kdelibs/nepomuk/core/resourcedata.cpp", the call to the 12th function can be found
Identifying the first (useful) function
The first thing to do is locate where the crash occurred. If Dr. Konqi was used to capture the backtrace, the crashed thread will be identified with the text [KCrash Handler]. This thread may be first, last or in the middle, but it's usually the last.
If the backtrace was generated using a different method (like gdb or coredumpctl), it should still have some evidence of which thread crashed:
[Current thread is 1 (Thread 0x7fb5a84e7940 (LWP 2045))]
Thread 1 "kwin_x11" received signal SIGABRT, Aborted.
Process 7254 (plasmashell) of user 1000 dumped core.
If the application only had one thread, then it is at the top of the unique thread. Otherwise you may need to look at all threads (the KCrash Handler mark may not always be in thread number 1).
Once the crashed thread is identified, pick up the first two or three "ClassName::Functions" pairs from top to bottom (some functions should be ignored, read below).
These pairs will be used as "keywords" for the duplicate search.
If the first backtrace functions are not available (they are not there, or "??" are shown instead) then we cannot proceed without asking for more information (a more complete backtrace).
Avoiding useless function calls
Some functions or calls are common to a lot of applications using the same core libraries (like the Qt library, glib, glibc, or many others). These kinds of functions should not be used for searching as they are not representative of the crash itself and the search may return lots of results.
Classes and functions to ignore in a backtrace:
- Kernel/GLibC functions (__kernel_vsyscall, raise, abort)
- Functions from core/base libraries (libraries with filenames like libpthread.so.0, libc.so, libstdc++.so, libglib-2.0.so; or functions starting with "*__GI_"). You may also need to ignore calls to graphics drivers (like nvidia or libGL)
- Qt container classes (QMap, QList, QLinkedList, QVector, QStack, QQueue, QSet, QMap, QMultiMap, QHash, QMultiHash)
- Qt deep core classes (QApplication, QCoreApplication, QBasicAtomicInt, QBasicAtomicPointer, QAtomicInt, QAtomicPointer, QMetaObject, QPointer, QWeakPointer, QSharedPointer, QScopedPointer, QMetaCallEvent)
- Qt misc functions (qt_message_output, qt_message, qGetPtrHelper, functions starting with qt_meta_)
- Threads that "start" with __poll or pthread_cond_wait are probably not useful
Special cases (advanced)
X11 crashes
There are special crashes related to the X11 graphics platform. To identify these crashes you can search for the "XIOError" function name (often on Thread 1). The [KCrash handler] mark appears in a secondary thread.
The important thing in identifying these crashes is recognizing the functions below the XIOError call (which functions caused the X11 error).
In most of these crashes the functions below [KCrash handler] are not important (but they could still be useful to search for duplicates).
Unintelligible functions
In some cases the names of the functions will be encoded (mangled). For example "_ZNK14QMessageLogger5fatalEPKcz" instead of "QMessageLogger::fatal(char const*, ...)". If this occurs, you can use the c++filt utility to convert the mangled names to a human-readable format.
If you see yourself doing this often, you can use Kate's External Tools functionality to make the process easier. Just create an external tool with "c++filt" as the executable, "%{Document:Text}" as input, "Replace Current Document" as output, and add it to the toolbar. This way you can simply copy a backtrace, paste it in Kate and press a button to easily demangle it. Newer versions of Kate should have this external tool by default.
- Every KDE application use kdelibs [Bugzilla product: "kdelibs"]
- Applications using the standard KDE file operations use KIO [Bugzilla product: "kio"] and probably KFile (for the UI part) [Bugzilla product: "kfile"]
- Oxygen widget style (default) [Bugzilla product: "oxygen" component "style"] (component is included because "Oxygen" also refers to Plasma and icon themes)
- Multimedia usage: Phonon library [Bugzilla product: "Phonon"]
- PIM related applications use kdepimlibs, Akonadi and kresources technologies [Bugzilla products: "kdepim", "kdepimlibs", "Akonadi", "kresources"]
- Applications using KHTML [Bugzilla product: konqueror"]
- Applications using OpenDesktop services uses Attica [Bugzilla product: "attica"]
- Screen management related operations use the Kephal subsystem [Bugzilla product: "kephal"]
- Games use libkdegames [Bugzilla product: "libkdegames"]
- Scanning related applications probably use the KSane lib [Bugzilla product: "libksane"]
- Multimedia applications reading audio tags use taglib [Bugzilla product: "taglib"]
- Hardware related functions use Solid classes [Bugzilla product: "solid"]
- Power Management functions use PowerDevil [Bugzilla product: "solid", component: "powerdevil-daemon"]