SlideShare a Scribd company logo
1 of 66
Download to read offline
Towards a Catalog of Variability Evolution Patterns – The
                      Linux Kernel Case




          Leonardo Passos                   Krzysztof Czarnecki                    Andrzej Wasowski
        University of Waterloo             University of Waterloo             IT University of Copenhagen
       lpassos@gsd.uwaterloo.ca          kczarnec@gsd.uwaterloo.ca                   wasowski@itu.dk



1/28               IV International Workshop on Feature Oriented Software Development (FOSD’12)
In evolving variant-rich
             software. . .



2/28
In evolving variant-rich software. . .

       • New features are added




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).

            Examples:




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).

            Examples:
             • merge




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).

            Examples:
             • merge

             • split




3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).

            Examples:
             • merge

             • split

             • rename



3/28
In evolving variant-rich software. . .

       • New features are added

       • Features are removed

         1. feature is no longer supported: complete removal

         2. feature continues to be supported, but its abstraction is no longer
            present (disappears from the variability model).

            Examples:
             • merge

             • split

             • rename

       • Constraints are changed, etc.
3/28
Example
       (from Linux)



4/28
...


               Ralink Drivers


       ...   RT2860         RT3090   ...



4/28
...


               Ralink Drivers


       ...   RT2860         RT3090   ...



4/28
...


             Ralink Drivers


       ...     RT2860         ...



4/28
...


             Ralink Drivers


       ...      RT2860           ...

             Complete removal?


4/28
Existing evolution studies tend
       to focus on the variability model
                     alone


5/28
That doesn’t tell the whole
               story. . .



6/28
Ralink Drivers


       ...   RT2860    RT3090   ...




7/28
Ralink Drivers
                                      Configuration space

       ...   RT2860    RT3090   ...




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...

                                      Compilation space




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...




                                      Implementation
                                          space



7/28
Spaces are connected. . .




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...




7/28
Ralink Drivers


       ...   RT2860    RT3090   ...




7/28
With the three spaces in mind,
           the real picture of . . .



8/28
...


               Ralink Drivers


       ...   RT2860         RT3090   ...

                      is
8/28
Ralink Drivers


       ...   RT2860    RT3090   ...




8/28
Ralink Drivers


       ...   RT2860        RT3090   ...



                 copy



                        copy



                        copy




8/28
Ralink Drivers


       ...   RT2860           RT3090        ...



                   copy



                           copy



                           copy



             RT3090 is merged into RT2860
8/28
We want to know. . .




9/28
How do the three spaces evolve
         together in real world variant
                rich software?




10/28
How do the three spaces evolve
         together in real world variant
                rich software?

         Focus: features that disappear from the
                   configuration space


10/28
Two goals




          Understand the evolution of the three spaces in a
                   real-word variant rich software




11/28
Two goals




          Understand the evolution of the three spaces in a
                   real-word variant rich software

        Document our understanding in the form of evolution
                     patterns (preliminary).




11/28
Our subject of analysis




12/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)

        • Continuous development




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)

        • Continuous development

        • Contains multiple spaces:




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)

        • Continuous development

        • Contains multiple spaces:

          ◦ configuration space: Kconfig




13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)

        • Continuous development

        • Contains multiple spaces:

          ◦ configuration space: Kconfig

          ◦ compilation space: Makefile



13/28
Qualities of Linux as a subject of study

        • Mature: over 20 years since its first release

        • Complex: over 6,000 features

        • Changes are kept in a publicly available SCM Repository (git)

        • Continuous development

        • Contains multiple spaces:

          ◦ configuration space: Kconfig

          ◦ compilation space: Makefile

          ◦ implementation space: C code

13/28
Variability evolution patterns
                  from Linux



14/28
Data collection & Analysis




        • Data collection is limited to three pairs of stable kernel releases in
          x86 64

        • For each pair, we considered only the features that disappeared
          from the configuration space

        • Manual analysis of 140 removals from a total of 220 (63%)




15/28
Infrastructure



        • Extraction and reuse of Kconfig parsing infrastructure from Linux
          itself

          ◦ allow us to compute disappearing features among each release kernel

        • Conversion of Linux patches from git into a relational database

          ◦ allow us to quickly identify which commit erases a feature from the
            configuration space

        • git log + gitk, grep: visualize and search logs




16/28
Extracting patterns is hard!


        Difficulties in analyzing patches when collecting patterns:

        • unrelated changes (noise)

        • technical comments (too much jargon)

        • extensive set of changes

        • everything is recorded in the SCM as addition/removal of lines
          (too low level)




17/28
Four identified patterns



        • Optional feature to implicit mandatory

        • Computed attributed feature to code

        • Merge features by module aliasing

        • Optional feature to kernel parameter


        Template: structure, instance and discussion



18/28
Four identified patterns



        • Optional feature to implicit mandatory

        • Computed attributed feature to code

        • Merge features by module aliasing

        • Optional feature to kernel parameter


        Template: structure, instance and discussion



18/28
Optional feature to implicit
                mandatory



19/28
Structure & Instance

                      X                                     X
             ...               ...                 ...               ...
                       Y                CTC                                   CTC[XY]

              if Y,                                 if Y, if X,
                 compile Y.c into Y.o                  compile Y.c into Y.o
                 compile X.c into X.c                  compile X.c into X.c



                                                                              #ifdef X
             Y.c                        #ifdef Y
                                           ...
                                                   Y.c                        #ifdef Y
                                                                                 ...
                                        #endif                                #endif

                      (Before)                               (After)




20/28
Structure & Instance

                      X                                     X
             ...               ...                 ...               ...
                       Y                CTC                                   CTC[XY]

              if Y,                                 if Y, if X,
                 compile Y.c into Y.o                  compile Y.c into Y.o
                 compile X.c into X.c                  compile X.c into X.c



                                                                              #ifdef X
             Y.c                        #ifdef Y
                                           ...
                                                   Y.c                        #ifdef Y
                                                                                 ...
                                        #endif                                #endif

                      (Before)                               (After)




20/28
Structure & Instance

                      X                                     X
             ...               ...                 ...               ...
                       Y                CTC                                   CTC[XY]

              if Y,                                 if Y, if X,
                 compile Y.c into Y.o                  compile Y.c into Y.o
                 compile X.c into X.c                  compile X.c into X.c



                                                                              #ifdef X
             Y.c                        #ifdef Y
                                           ...
                                                   Y.c                        #ifdef Y
                                                                                 ...
                                        #endif                                #endif

                      (Before)                               (After)




20/28
Structure & Instance

                      X                                     X
             ...               ...                 ...               ...
                       Y                CTC                                   CTC[XY]

              if Y,                                 if Y, if X,
                 compile Y.c into Y.o                  compile Y.c into Y.o
                 compile X.c into X.c                  compile X.c into X.c



                                                                              #ifdef X
             Y.c                        #ifdef Y
                                           ...
                                                   Y.c                        #ifdef Y
                                                                                 ...
                                        #endif                                #endif

                      (Before)                               (After)




20/28
Structure & Instance

                      X                                     X
             ...               ...                 ...               ...
                       Y                CTC                                   CTC[XY]

              if Y,                                 if Y, if X,
                 compile Y.c into Y.o                  compile Y.c into Y.o
                 compile X.c into X.c                  compile X.c into X.c



                                                                              #ifdef X
             Y.c                        #ifdef Y
                                           ...
                                                   Y.c                        #ifdef Y
                                                                                 ...
                                        #endif                                #endif

                      (Before)                               (After)


              Instance: X = OCFS, Y= OCFS Access Control List

20/28
Discussion



        Pattern should be used when:

        • users should not be given the freedom to configure Y

           ◦ e.g.: they may inadvertly forget to select it, as in Access Control List
             (Y)

        • Y is a critical feature that makes sense to exist in the software,
          given the presence of its parent X




21/28
Our patterns have direct
            implications. . .



22/28
Direct implications



        • Existing evolution studies (She et al. at Vamos’10, Lotufo et. al.
          at SPLC’10) focus on the variability model alone: our patterns
          show that features can be erased from the configuration space,
          while still present in the implementation space

        • Our patterns capture situations not covered by the existing SPL
          evolution theory (Borba et al. at ITAC’10)

          ◦ compatibility of product is not guaranteed (evolution is not safe)




23/28
Conclusions




24/28
Conclusions



        • Evolution must focus on all spaces

        • We presented 4 patterns extracted from Linux

        • Our patterns explain the evolution of features removed from the
          configuration space

        • They show evolution steps not captured in previous studies (both
          theoretical and empirical).




25/28
Future work




26/28
Future work




        • Collect patterns not restricted to removals

        • Measure frequency

        • Study other systems




27/28
Thanks for listening!




28/28

More Related Content

Similar to FOSD Presentation

Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous Computing
Ruymán Reyes
 
Robotics Toolbox for MATLAB (Relese 9)
Robotics Toolbox for MATLAB (Relese 9)Robotics Toolbox for MATLAB (Relese 9)
Robotics Toolbox for MATLAB (Relese 9)
CHIH-PEI WEN
 
robert-kovacsics-part-ii-dissertation
robert-kovacsics-part-ii-dissertationrobert-kovacsics-part-ii-dissertation
robert-kovacsics-part-ii-dissertation
Robert Kovacsics
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
torque - Automation Testing Tool for C-C++ on Linux
torque -  Automation Testing Tool for C-C++ on Linuxtorque -  Automation Testing Tool for C-C++ on Linux
torque - Automation Testing Tool for C-C++ on Linux
JITENDRA LENKA
 

Similar to FOSD Presentation (20)

Efficient kernel backporting
Efficient kernel backportingEfficient kernel backporting
Efficient kernel backporting
 
Training Slides: Advanced 303: Upgrading from Tungsten Clustering 5.x Multi-S...
Training Slides: Advanced 303: Upgrading from Tungsten Clustering 5.x Multi-S...Training Slides: Advanced 303: Upgrading from Tungsten Clustering 5.x Multi-S...
Training Slides: Advanced 303: Upgrading from Tungsten Clustering 5.x Multi-S...
 
Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous Computing
 
3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...3450 - Writing and optimising applications for performance in a hybrid messag...
3450 - Writing and optimising applications for performance in a hybrid messag...
 
Linuxcon Barcelon 2012: LXC Best Practices
Linuxcon Barcelon 2012: LXC Best PracticesLinuxcon Barcelon 2012: LXC Best Practices
Linuxcon Barcelon 2012: LXC Best Practices
 
Functional Programming in Java
Functional Programming in JavaFunctional Programming in Java
Functional Programming in Java
 
Universal metrics with Apache Beam
Universal metrics with Apache BeamUniversal metrics with Apache Beam
Universal metrics with Apache Beam
 
LINEデリマでのElasticsearchの運用と監視の話
LINEデリマでのElasticsearchの運用と監視の話LINEデリマでのElasticsearchの運用と監視の話
LINEデリマでのElasticsearchの運用と監視の話
 
Jenkins2 - Coding Continuous Delivery Pipelines
Jenkins2 - Coding Continuous Delivery PipelinesJenkins2 - Coding Continuous Delivery Pipelines
Jenkins2 - Coding Continuous Delivery Pipelines
 
OpenTelemetry For Architects
OpenTelemetry For ArchitectsOpenTelemetry For Architects
OpenTelemetry For Architects
 
Strimzi - Where Apache Kafka meets OpenShift - OpenShift Spain MeetUp
Strimzi - Where Apache Kafka meets OpenShift - OpenShift Spain MeetUpStrimzi - Where Apache Kafka meets OpenShift - OpenShift Spain MeetUp
Strimzi - Where Apache Kafka meets OpenShift - OpenShift Spain MeetUp
 
XNAT Open Source Development
XNAT Open Source DevelopmentXNAT Open Source Development
XNAT Open Source Development
 
From shipping rpms to helm charts - Lessons learned and best practices
From shipping rpms to helm charts - Lessons learned and best practicesFrom shipping rpms to helm charts - Lessons learned and best practices
From shipping rpms to helm charts - Lessons learned and best practices
 
Robotics Toolbox for MATLAB (Relese 9)
Robotics Toolbox for MATLAB (Relese 9)Robotics Toolbox for MATLAB (Relese 9)
Robotics Toolbox for MATLAB (Relese 9)
 
Matlab module
Matlab moduleMatlab module
Matlab module
 
Intro to Kubernetes & GitOps Workshop
Intro to Kubernetes & GitOps WorkshopIntro to Kubernetes & GitOps Workshop
Intro to Kubernetes & GitOps Workshop
 
robert-kovacsics-part-ii-dissertation
robert-kovacsics-part-ii-dissertationrobert-kovacsics-part-ii-dissertation
robert-kovacsics-part-ii-dissertation
 
CS_Note_Introduction to Git Workflow.pdf
CS_Note_Introduction to Git Workflow.pdfCS_Note_Introduction to Git Workflow.pdf
CS_Note_Introduction to Git Workflow.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
torque - Automation Testing Tool for C-C++ on Linux
torque -  Automation Testing Tool for C-C++ on Linuxtorque -  Automation Testing Tool for C-C++ on Linux
torque - Automation Testing Tool for C-C++ on Linux
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

FOSD Presentation

  • 1. Towards a Catalog of Variability Evolution Patterns – The Linux Kernel Case Leonardo Passos Krzysztof Czarnecki Andrzej Wasowski University of Waterloo University of Waterloo IT University of Copenhagen lpassos@gsd.uwaterloo.ca kczarnec@gsd.uwaterloo.ca wasowski@itu.dk 1/28 IV International Workshop on Feature Oriented Software Development (FOSD’12)
  • 2. In evolving variant-rich software. . . 2/28
  • 3. In evolving variant-rich software. . . • New features are added 3/28
  • 4. In evolving variant-rich software. . . • New features are added • Features are removed 3/28
  • 5. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 3/28
  • 6. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). 3/28
  • 7. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). Examples: 3/28
  • 8. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). Examples: • merge 3/28
  • 9. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). Examples: • merge • split 3/28
  • 10. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). Examples: • merge • split • rename 3/28
  • 11. In evolving variant-rich software. . . • New features are added • Features are removed 1. feature is no longer supported: complete removal 2. feature continues to be supported, but its abstraction is no longer present (disappears from the variability model). Examples: • merge • split • rename • Constraints are changed, etc. 3/28
  • 12. Example (from Linux) 4/28
  • 13. ... Ralink Drivers ... RT2860 RT3090 ... 4/28
  • 14. ... Ralink Drivers ... RT2860 RT3090 ... 4/28
  • 15. ... Ralink Drivers ... RT2860 ... 4/28
  • 16. ... Ralink Drivers ... RT2860 ... Complete removal? 4/28
  • 17. Existing evolution studies tend to focus on the variability model alone 5/28
  • 18. That doesn’t tell the whole story. . . 6/28
  • 19. Ralink Drivers ... RT2860 RT3090 ... 7/28
  • 20. Ralink Drivers Configuration space ... RT2860 RT3090 ... 7/28
  • 21. Ralink Drivers ... RT2860 RT3090 ... Compilation space 7/28
  • 22. Ralink Drivers ... RT2860 RT3090 ... Implementation space 7/28
  • 24. Ralink Drivers ... RT2860 RT3090 ... 7/28
  • 25. Ralink Drivers ... RT2860 RT3090 ... 7/28
  • 26. Ralink Drivers ... RT2860 RT3090 ... 7/28
  • 27. Ralink Drivers ... RT2860 RT3090 ... 7/28
  • 28. With the three spaces in mind, the real picture of . . . 8/28
  • 29. ... Ralink Drivers ... RT2860 RT3090 ... is 8/28
  • 30. Ralink Drivers ... RT2860 RT3090 ... 8/28
  • 31. Ralink Drivers ... RT2860 RT3090 ... copy copy copy 8/28
  • 32. Ralink Drivers ... RT2860 RT3090 ... copy copy copy RT3090 is merged into RT2860 8/28
  • 33. We want to know. . . 9/28
  • 34. How do the three spaces evolve together in real world variant rich software? 10/28
  • 35. How do the three spaces evolve together in real world variant rich software? Focus: features that disappear from the configuration space 10/28
  • 36. Two goals Understand the evolution of the three spaces in a real-word variant rich software 11/28
  • 37. Two goals Understand the evolution of the three spaces in a real-word variant rich software Document our understanding in the form of evolution patterns (preliminary). 11/28
  • 38. Our subject of analysis 12/28
  • 39. Qualities of Linux as a subject of study • Mature: over 20 years since its first release 13/28
  • 40. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features 13/28
  • 41. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) 13/28
  • 42. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) • Continuous development 13/28
  • 43. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) • Continuous development • Contains multiple spaces: 13/28
  • 44. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) • Continuous development • Contains multiple spaces: ◦ configuration space: Kconfig 13/28
  • 45. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) • Continuous development • Contains multiple spaces: ◦ configuration space: Kconfig ◦ compilation space: Makefile 13/28
  • 46. Qualities of Linux as a subject of study • Mature: over 20 years since its first release • Complex: over 6,000 features • Changes are kept in a publicly available SCM Repository (git) • Continuous development • Contains multiple spaces: ◦ configuration space: Kconfig ◦ compilation space: Makefile ◦ implementation space: C code 13/28
  • 47. Variability evolution patterns from Linux 14/28
  • 48. Data collection & Analysis • Data collection is limited to three pairs of stable kernel releases in x86 64 • For each pair, we considered only the features that disappeared from the configuration space • Manual analysis of 140 removals from a total of 220 (63%) 15/28
  • 49. Infrastructure • Extraction and reuse of Kconfig parsing infrastructure from Linux itself ◦ allow us to compute disappearing features among each release kernel • Conversion of Linux patches from git into a relational database ◦ allow us to quickly identify which commit erases a feature from the configuration space • git log + gitk, grep: visualize and search logs 16/28
  • 50. Extracting patterns is hard! Difficulties in analyzing patches when collecting patterns: • unrelated changes (noise) • technical comments (too much jargon) • extensive set of changes • everything is recorded in the SCM as addition/removal of lines (too low level) 17/28
  • 51. Four identified patterns • Optional feature to implicit mandatory • Computed attributed feature to code • Merge features by module aliasing • Optional feature to kernel parameter Template: structure, instance and discussion 18/28
  • 52. Four identified patterns • Optional feature to implicit mandatory • Computed attributed feature to code • Merge features by module aliasing • Optional feature to kernel parameter Template: structure, instance and discussion 18/28
  • 53. Optional feature to implicit mandatory 19/28
  • 54. Structure & Instance X X ... ... ... ... Y CTC CTC[XY] if Y, if Y, if X, compile Y.c into Y.o compile Y.c into Y.o compile X.c into X.c compile X.c into X.c #ifdef X Y.c #ifdef Y ... Y.c #ifdef Y ... #endif #endif (Before) (After) 20/28
  • 55. Structure & Instance X X ... ... ... ... Y CTC CTC[XY] if Y, if Y, if X, compile Y.c into Y.o compile Y.c into Y.o compile X.c into X.c compile X.c into X.c #ifdef X Y.c #ifdef Y ... Y.c #ifdef Y ... #endif #endif (Before) (After) 20/28
  • 56. Structure & Instance X X ... ... ... ... Y CTC CTC[XY] if Y, if Y, if X, compile Y.c into Y.o compile Y.c into Y.o compile X.c into X.c compile X.c into X.c #ifdef X Y.c #ifdef Y ... Y.c #ifdef Y ... #endif #endif (Before) (After) 20/28
  • 57. Structure & Instance X X ... ... ... ... Y CTC CTC[XY] if Y, if Y, if X, compile Y.c into Y.o compile Y.c into Y.o compile X.c into X.c compile X.c into X.c #ifdef X Y.c #ifdef Y ... Y.c #ifdef Y ... #endif #endif (Before) (After) 20/28
  • 58. Structure & Instance X X ... ... ... ... Y CTC CTC[XY] if Y, if Y, if X, compile Y.c into Y.o compile Y.c into Y.o compile X.c into X.c compile X.c into X.c #ifdef X Y.c #ifdef Y ... Y.c #ifdef Y ... #endif #endif (Before) (After) Instance: X = OCFS, Y= OCFS Access Control List 20/28
  • 59. Discussion Pattern should be used when: • users should not be given the freedom to configure Y ◦ e.g.: they may inadvertly forget to select it, as in Access Control List (Y) • Y is a critical feature that makes sense to exist in the software, given the presence of its parent X 21/28
  • 60. Our patterns have direct implications. . . 22/28
  • 61. Direct implications • Existing evolution studies (She et al. at Vamos’10, Lotufo et. al. at SPLC’10) focus on the variability model alone: our patterns show that features can be erased from the configuration space, while still present in the implementation space • Our patterns capture situations not covered by the existing SPL evolution theory (Borba et al. at ITAC’10) ◦ compatibility of product is not guaranteed (evolution is not safe) 23/28
  • 63. Conclusions • Evolution must focus on all spaces • We presented 4 patterns extracted from Linux • Our patterns explain the evolution of features removed from the configuration space • They show evolution steps not captured in previous studies (both theoretical and empirical). 25/28
  • 65. Future work • Collect patterns not restricted to removals • Measure frequency • Study other systems 27/28