Summary

Currently apport sends crash reports as public bugs in Launchpad. We will improve this process to avoid exposing potentially sensitive data to the public and avoid sending unwanted bug email to developers.

Because a few bugs cause most crashes, this system should eventually involve a database of crash reports, automatically aggregated by type so that developers can allocate their time to the top crashers.

Release note

Bug reports about crashes which are automatically generated by the Apport system are now private by default. This avoids exposing potentially sensitive data like passwords to the public. Those bug reports are now inspected by a trusted Ubuntu developer before marking it public.

Rationale

The original idea was to create an entirely separate crash database and web frontend for it. However, since we need a lot of the features of a bug tracker (assignments, release tracking, searching, duplication, email/web interaction, getting feedback from reporters), this database will just use Malone in an appropriate way.

Use cases

Design

Authenticated bug filing

We currently do not want bugs to be filed anonymously, because:

New approach of crash bug reporting workflow

  1. Create Launchpad users which control access to the bug, split by main/restricted and universe/multiverse.
  2. Apport files bugs as private/nonsecurity by default, with only the crash reprocessing bot subscribed (Launchpad user apport, the "Apport retracing service").

  3. The retracing bot generates the symbolic stack traces, handles duplicates (see apport-crash-duplicates), and removes the core dump attachment. Then it subscribes the relevant team to the bug.

  4. The triaging teams regularly inspect crash reports (preferably prioritized by number of duplicates). After verifying that a stack trace does not contain sensitive information, they can set the bug to "public".

Comparisons to other crash feedback agents

Implementation

  1. Create two new Launchpad teams ubuntu-crashes-main (for components main and restricted) and ubuntu-crashes-universe (for components universe and multiverse), set a "black hole" contact email address and put the ubuntu-testing teams into them. This avoids sending crash email (explicit requirement from our desktop team) and allows for later adjustments for accessing crash bugs.

  2. Malone currently has the ability to set tags in the blob that gets uploaded to the cloakroom. This needs to get extended to mark a bug as private/nonsecurity (see #116367).

  3. (design is self-explanatory)
  4. (design is self-explanatory)

Test/Demo plan

  1. Cause a packaged program to crash:
    • To generate a signal crash, simply do bash -c 'kill -SEGV $$'.

    • To generate a Python crash, edit the program to have an assert False or similarly disruptive instruction anywhere and run it.

  2. Apport will notify you about the crash and offer to file it. Do that.
  3. The bug will be private and only accessible by you and the LP user apport (Apport retracing service).

  4. After a while the retracing bots will notice the bug, check it for duplicates (for Python crashes) or retrace it/attach symbolic stack traces/check for duplicate (for signal crashes) and subscribe ubuntu-crashes-main for a package from main or restricted, and ubuntu-crashes-universe for other packages. The bug should not have a CoreDump.gz attachment any more, unless the retrace failed and the bug was tagged with apport-failed-retrace.

Comments

MatthewPaulThomas:

MartinPitt responds:

Hggdh:

MartinPitt responds:

Please read what I said. LP will get a proper crash database, that has already been discussed and is a matter of time. But until we do not have that, we simply cannot provide anonymous bug filing. This spec is the best we can do with the current tools.

BrianJMurrell:


CategorySpec