skip to main content
article

AutoBash: improving configuration management with operating system causality analysis

Published:14 October 2007Publication History
Skip Abstract Section

Abstract

AutoBash is a set of interactive tools that helps users and system administrators manage configurations. AutoBash leverages causal tracking support implemented within our modified Linux kernel to understand the inputs (causal dependencies) and outputs (causal effects) of configuration actions. It uses OS-level speculative execution to try possible actions, examine their effects, and roll them back when necessary. AutoBash automates many of the tedious parts of trying to fix a misconfiguration, including searching through possible solutions, testing whether a particular solution fixes a problem, and undoing changes to persistent and transient state when a solution fails. Our results show that AutoBash correctly identifies the solution to several CVS, gcc cross-compiler, and Apache configuration errors. We also show that causal analysis reduces AutoBash's search time by an average of 35% and solution verification time by an average of 70%.

Skip Supplemental Material Section

Supplemental Material

Video

References

  1. Aguilera, M. K., Mogul, J. C., Wiener, J. L., Reynolds, P., and Muthitacharoen, A. Performance debugging for distributed systems of black boxes. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 74--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brown, A. B., and Patterson, D. A. Undo for operators:Building an undoable e-mail store. In Proceedings of the 2003 USENIX Technical Conference (San Antonio, TX, June 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chanda, A., Elmeleegy, K., Cox, A. L., and Zwaenepoel, W. Causeway: Operating system support for controlling and analyzing the execution of distributed programs. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS--X) (Santa Fe, NM, June 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cohen, I., Zhang, S., Goldszmidt, M., Symons, J., Kelly, T., and Fox, A. Capturing, indexing, clustering, and retrieving system history. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 105--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ha, J., Rossbach, C. J., Davis, J. V., Roy, I., Ramadan, H. E., Porter, D. E., Chen, D. L., and Witchel, E. Improved error reporting for software that uses black-box components. In Proceedings of the Conference on Programming Language Design and Implementation 2007 (San Diego, CA, 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Holland, D. A., Josephson, W., Magoutis, K., Seltzer, M., Stein, C., and Lim, A. Research issues in no-futz computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS--VIII) (Schloss Elmau, Germany, May 2001), pp. 106--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Huang, Q., Wang, H. J., and Borisov, N. Privacy-preserving friends troubleshooting network. In Proceedings of the 12th Network and Distributed System Security Symposium (San Diego, CA, February 2005), pp. 245--257.Google ScholarGoogle Scholar
  8. Jefferson, D., Beckman, B., Wieland, F., Blume, L., DiLoreto, M., P.Hontalas, Laroche, P., Sturdevant, K., Tupman, J., Warren, V., Weidel, J., Younger, H., and Bellenot, S. Time Warp operating system. In Proceedings of the 11th ACM Symposium on Operating Systems Principles (Austin, TX, November 1987), pp. 77--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Joshi, A., King, S. T., Dunlap, G. W., and Chen, P. M. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 91--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kephart, J., and Chess, D. M. The vision of autonomic computing. Computer 36, 1 (2003), 45--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. King, S. T., and Chen, P. M. Backtracking intrusions. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 223--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Li, T., Ellis, C. S., Lebeck, A. R., and Sorin, D. J. Pulse: A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the 2005 USENIX Technical Conference (3144, April 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mummert, L., Ebling, M., and Satyanarayanan, M. Exploiting weak connectivity in mobile le access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Muniswamy-Reddy, K.-K., Holland, D. A., Braun, U., and Seltzer, M. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference (Boston, MA, May/June 2006), pp. 43--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nightingale, E. B., Chen, P. M., and Flinn, J. Speculative execution in a distributed le system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 191--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Qin, F., Tucek, J., Sundaresan, J., and Zhou, Y. Rx: Treating bugs as allergies|a safe method to survive software failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 235--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Su, Y.-Y., and Flinn, J. Slingshot: Deploying stateful services in wireless hotspots. In Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services (Seattle, WA, June 2005), pp. 79--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wang, H. J., Platt, J. C., Chen, Y., Zhang, R., and Wang, Y.-M. Automatic miscon guration troubleshooting with PeerPressure. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 245--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Wang, Y.-M., Verbowski, C., Dunagan, J., Chen, Y.,Wang, H. J., Yuan, C., and Zhang, Z. STRIDER: A black-box, state-based approach to change and configuration management and support. In Proceedings of Usenix Large Installation Systems Administration Conference (October 2003), pp. 159--172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Whitaker, A., Cox, R. S., and Gribble, S. D. Configuration debugging as search: Finding the needle in the haystack. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 77--90. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. AutoBash: improving configuration management with operating system causality analysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 41, Issue 6
          SOSP '07
          December 2007
          363 pages
          ISSN:0163-5980
          DOI:10.1145/1323293
          Issue’s Table of Contents
          • cover image ACM Conferences
            SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
            October 2007
            378 pages
            ISBN:9781595935915
            DOI:10.1145/1294261

          Copyright © 2007 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 October 2007

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!