ConfInLog: Leveraging Software Logs to Infer Configuration Constraints
Misconfigurations have become the dominant causes of software failures in recent years, drawing tremendous attention for their increasing prevalence and severity. Configuration constraints can preemptively avoid misconfiguration by defining the conditions that configuration options should satisfy. Documentation is the main source of configuration constraints, but it might be incomplete or inconsistent with the source code. In this regard, prior researches have focused on obtaining configuration constraints from software source code through static analysis. However, the difficulty in pointer analysis and context comprehension prevents them from collecting accurate and comprehensive constraints. In this paper, we observed that software logs often contain configuration constraints. We conducted an empirical study and summarized patterns of configuration-related log messages. Guided by the study, we designed and implemented ConfInLog, a static tool to infer configuration constraints from log messages. ConfInLog first selects configuration-related log messages from source code by using the summarized patterns, then infers constraints from log messages based on the summarized natural language patterns. To evaluate the effectiveness of ConfInLog, we applied our tool on seven popular open-source software systems. ConfInLog successfully inferred 22~163 constraints, in which 59.5%~61.6% could not be inferred by the state-of-the-art work. Finally, we submitted 67 documentation patches regarding the constraints inferred by ConfInLog. The constraints in 29 patches have been confirmed by the developers, among which 10 patches have been accepted.
Fri 21 MayDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
02:00 - 02:40 | Inferring code evolutionResearch at ICPC Main Room Chair(s): Shinpei Hayashi Tokyo Institute of Technology | ||
02:00 10mPaper | ConfInLog: Leveraging Software Logs to Infer Configuration Constraints Research Shulin Zhou National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, China, Wang Li National University of Defense Technology, Liao Xiangke National University of Defense Technology, China Pre-print Media Attached | ||
02:10 10mPaper | Using Grammar Patterns to Interpret Test Method Name Evolution Research Anthony Peruma Rochester Institute of Technology, Emily Hu , Jiajun Chen , Eman Abdullah AlOmar Rochester Institute of Technology, USA, Mohamed Wiem Mkaouer Rochester Institute of Technology, Christian D. Newman Rochester Institute of Technology Pre-print Media Attached | ||
02:20 10mPaper | Keywords Guided Method Name Generation Research Pre-print Media Attached | ||
02:30 10mPaper | Automated Comment Update: How Far are We? Research Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xiaoguang Mao National University of Defense Technology, Tegawendé F. Bissyandé SnT, University of Luxembourg Pre-print Media Attached |
Go directly to this room on Clowdr