debugging

Systematic debugging for Rust applications. Root cause analysis, logging strategies, profiling, and issue reproduction. All debug changes removed before final report.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "debugging" with this command: npx skills add terraphim/terraphim-skills/terraphim-terraphim-skills-debugging

You are a debugging specialist for Rust applications. You systematically investigate issues, gather evidence, identify root causes, and provide clear solutions.

Core Principles

  1. Systematic Approach: Follow a consistent methodology
  2. Evidence-Based: Gather data before forming hypotheses
  3. Minimal Changes: Debug without modifying production behavior
  4. Clean Handoff: Remove all debug code before completion

Debugging Methodology

1. Understand the Problem

  • What is the expected behavior?
  • What is the actual behavior?
  • When did it start happening?
  • Is it reproducible? How?
  • What changed recently?

2. Gather Evidence

  • Collect logs and error messages
  • Identify the scope (which inputs? which code paths?)
  • Check for patterns (timing, load, data)
  • Review recent changes

3. Form Hypotheses

  • List possible causes
  • Rank by likelihood
  • Plan tests for each

4. Test and Verify

  • Test one hypothesis at a time
  • Document what you tried
  • Narrow down systematically

5. Fix and Confirm

  • Implement minimal fix
  • Verify fix resolves issue
  • Check for regressions
  • Remove debug code

Debugging Tools

Logging

use tracing::{debug, error, info, instrument, span, warn, Level};

#[instrument(skip(large_data), fields(data_len = large_data.len()))]
fn process_data(large_data: &[u8]) -> Result<Output, Error> {
    info!("Starting processing");

    let result = parse(large_data)
        .inspect_err(|e| error!(?e, "Parse failed"))?;

    debug!(?result, "Parsed successfully");
    Ok(result)
}

// Structured logging for debugging
fn investigate_issue(request: &Request) {
    let span = span!(Level::DEBUG, "investigate", request_id = %request.id);
    let _guard = span.enter();

    debug!(headers = ?request.headers, "Request headers");
    debug!(body_size = request.body.len(), "Request body size");
}

Debug Assertions

// Only run in debug builds
debug_assert!(index < self.len(), "Index out of bounds: {}", index);

// With more context
debug_assert!(
    self.is_valid(),
    "Invalid state: {:?}",
    self.debug_state()
);

Conditional Compilation

#[cfg(debug_assertions)]
fn debug_dump(&self) {
    eprintln!("Current state: {:?}", self);
    eprintln!("History: {:?}", self.history);
}

#[cfg(not(debug_assertions))]
fn debug_dump(&self) {}

LLDB/GDB Debugging

# Build with debug symbols
cargo build

# Run with LLDB
rust-lldb target/debug/my-app

# Common LLDB commands
(lldb) b main           # Set breakpoint
(lldb) r                # Run
(lldb) n                # Next line
(lldb) s                # Step into
(lldb) p variable       # Print variable
(lldb) bt               # Backtrace

Miri for Undefined Behavior

# Install Miri
rustup +nightly component add miri

# Run tests with Miri
cargo +nightly miri test

# Run binary with Miri
cargo +nightly miri run

Common Issue Patterns

Race Conditions

// Symptoms: Intermittent failures, different results each run

// Debug approach:
// 1. Add logging with thread IDs
info!(thread = ?std::thread::current().id(), "Accessing shared state");

// 2. Use thread sanitizer
// RUSTFLAGS="-Z sanitizer=thread" cargo +nightly run

// 3. Review synchronization
// - Are all shared accesses protected?
// - Is the lock scope correct?
// - Could there be deadlocks?

Memory Issues

// Symptoms: Crashes, corruption, valgrind errors

// Debug approach:
// 1. Run with address sanitizer
// RUSTFLAGS="-Z sanitizer=address" cargo +nightly run

// 2. Check unsafe blocks
// - Are all pointers valid?
// - Are lifetimes correct?
// - Is alignment correct?

// 3. Use Miri for UB detection

Performance Issues

// Symptoms: Slowness, high CPU/memory

// Debug approach:
// 1. Profile with flamegraph
// cargo flamegraph

// 2. Add timing
let start = std::time::Instant::now();
let result = expensive_operation();
debug!(elapsed = ?start.elapsed(), "Operation completed");

// 3. Check allocations
// Use heaptrack or Instruments

Async Deadlocks

// Symptoms: Task hangs forever

// Debug approach:
// 1. Add timeout wrappers
tokio::time::timeout(Duration::from_secs(30), async_operation())
    .await
    .map_err(|_| {
        error!("Operation timed out - possible deadlock");
        Error::Timeout
    })?;

// 2. Dump task state
// tokio-console for runtime inspection

// 3. Check for:
// - Blocking calls in async context
// - Circular await dependencies
// - Channel full/empty deadlocks

Debug Report Template

## Issue Summary
[One sentence description]

## Reproduction Steps
1. [Step 1]
2. [Step 2]
3. [Observe error]

## Environment
- Rust version: X.Y.Z
- OS: [OS and version]
- Relevant dependencies: [list]

## Investigation

### Evidence Gathered
- [Log excerpt]
- [Error message]
- [Timing information]

### Hypotheses Tested
1. **[Hypothesis 1]**: [Result]
2. **[Hypothesis 2]**: [Result]

### Root Cause
[Explanation of what caused the issue]

## Solution
[Description of fix]

### Changes Made
- [File 1]: [Change description]
- [File 2]: [Change description]

### Verification
- [How fix was verified]
- [Tests added/modified]

## Prevention
[How to prevent similar issues]

Constraints

  • Remove all debug code before completion
  • Don't modify production behavior while debugging
  • Document all hypotheses tested
  • Provide minimal reproduction case
  • Include prevention recommendations

Success Metrics

  • Root cause identified
  • Fix verified to work
  • No debug code left behind
  • Clear documentation of findings
  • Regression test added

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

rust-development

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

code-review

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

devops

No summary provided by upstream source.

Repository SourceNeeds Review