Abstract
AutoBash is a set of interactive tools that helps users and system administrators manage configurations. AutoBash leverages causal tracking support implemented within our modified Linux kernel to understand the inputs (causal dependencies) and outputs (causal effects) of configuration actions. It uses OS-level speculative execution to try possible actions, examine their effects, and roll them back when necessary. AutoBash automates many of the tedious parts of trying to fix a misconfiguration, including searching through possible solutions, testing whether a particular solution fixes a problem, and undoing changes to persistent and transient state when a solution fails. Our results show that AutoBash correctly identifies the solution to several CVS, gcc cross-compiler, and Apache configuration errors. We also show that causal analysis reduces AutoBash's search time by an average of 35% and solution verification time by an average of 70%.
Supplemental Material
Available for Download
Supplemental material for AutoBash: improving configuration management with operating system causality analysis
- Aguilera, M. K., Mogul, J. C., Wiener, J. L., Reynolds, P., and Muthitacharoen, A. Performance debugging for distributed systems of black boxes. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 74--89. Google Scholar
Digital Library
- Brown, A. B., and Patterson, D. A. Undo for operators:Building an undoable e-mail store. In Proceedings of the 2003 USENIX Technical Conference (San Antonio, TX, June 2003). Google Scholar
Digital Library
- Chanda, A., Elmeleegy, K., Cox, A. L., and Zwaenepoel, W. Causeway: Operating system support for controlling and analyzing the execution of distributed programs. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS--X) (Santa Fe, NM, June 2005). Google Scholar
Digital Library
- Cohen, I., Zhang, S., Goldszmidt, M., Symons, J., Kelly, T., and Fox, A. Capturing, indexing, clustering, and retrieving system history. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 105--118. Google Scholar
Digital Library
- Ha, J., Rossbach, C. J., Davis, J. V., Roy, I., Ramadan, H. E., Porter, D. E., Chen, D. L., and Witchel, E. Improved error reporting for software that uses black-box components. In Proceedings of the Conference on Programming Language Design and Implementation 2007 (San Diego, CA, 2007). Google Scholar
Digital Library
- Holland, D. A., Josephson, W., Magoutis, K., Seltzer, M., Stein, C., and Lim, A. Research issues in no-futz computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS--VIII) (Schloss Elmau, Germany, May 2001), pp. 106--110. Google Scholar
Digital Library
- Huang, Q., Wang, H. J., and Borisov, N. Privacy-preserving friends troubleshooting network. In Proceedings of the 12th Network and Distributed System Security Symposium (San Diego, CA, February 2005), pp. 245--257.Google Scholar
- Jefferson, D., Beckman, B., Wieland, F., Blume, L., DiLoreto, M., P.Hontalas, Laroche, P., Sturdevant, K., Tupman, J., Warren, V., Weidel, J., Younger, H., and Bellenot, S. Time Warp operating system. In Proceedings of the 11th ACM Symposium on Operating Systems Principles (Austin, TX, November 1987), pp. 77--93. Google Scholar
Digital Library
- Joshi, A., King, S. T., Dunlap, G. W., and Chen, P. M. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 91--104. Google Scholar
Digital Library
- Kephart, J., and Chess, D. M. The vision of autonomic computing. Computer 36, 1 (2003), 45--52. Google Scholar
Digital Library
- King, S. T., and Chen, P. M. Backtracking intrusions. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 223--236. Google Scholar
Digital Library
- Li, T., Ellis, C. S., Lebeck, A. R., and Sorin, D. J. Pulse: A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the 2005 USENIX Technical Conference (3144, April 2005). Google Scholar
Digital Library
- Mummert, L., Ebling, M., and Satyanarayanan, M. Exploiting weak connectivity in mobile le access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995). Google Scholar
Digital Library
- Muniswamy-Reddy, K.-K., Holland, D. A., Braun, U., and Seltzer, M. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference (Boston, MA, May/June 2006), pp. 43--56. Google Scholar
Digital Library
- Nightingale, E. B., Chen, P. M., and Flinn, J. Speculative execution in a distributed le system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 191--205. Google Scholar
Digital Library
- Qin, F., Tucek, J., Sundaresan, J., and Zhou, Y. Rx: Treating bugs as allergies|a safe method to survive software failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 235--248. Google Scholar
Digital Library
- Su, Y.-Y., and Flinn, J. Slingshot: Deploying stateful services in wireless hotspots. In Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services (Seattle, WA, June 2005), pp. 79--92. Google Scholar
Digital Library
- Wang, H. J., Platt, J. C., Chen, Y., Zhang, R., and Wang, Y.-M. Automatic miscon guration troubleshooting with PeerPressure. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 245--257. Google Scholar
Digital Library
- Wang, Y.-M., Verbowski, C., Dunagan, J., Chen, Y.,Wang, H. J., Yuan, C., and Zhang, Z. STRIDER: A black-box, state-based approach to change and configuration management and support. In Proceedings of Usenix Large Installation Systems Administration Conference (October 2003), pp. 159--172. Google Scholar
Digital Library
- Whitaker, A., Cox, R. S., and Gribble, S. D. Configuration debugging as search: Finding the needle in the haystack. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 77--90. Google Scholar
Digital Library
Index Terms
AutoBash: improving configuration management with operating system causality analysis
Recommendations
AutoBash: improving configuration management with operating system causality analysis
SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principlesAutoBash is a set of interactive tools that helps users and system administrators manage configurations. AutoBash leverages causal tracking support implemented within our modified Linux kernel to understand the inputs (causal dependencies) and outputs (...
Applications of non-monotonic reasoning to automotive product configuration using answer set programming
In automotive industry, validation and maintenance of product configuration data is a complex task. Both orders from the customers and new product line designs from the R&D department are subject to a set of configuration rules to be satisfied. In this ...
Research and Implement on Compatibility and Scalability of Agent of Platform for Network Management Based on NETCONF Protocol
ICMTMA '10: Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation - Volume 02As networks become more and more heterogeneous, SNMP can not meet current management requirements for complex networks, especially those configuration management needs. NETCONF protocol is a next generation configuration protocol developed by IETF ...







Comments