Assumptions. We assume that the logs faithfully capture events and their causality in the system’s execution. For instance, if the log declares that event X happened before event Y, we assume that is indeed the case, as the system executes. We assume that the logs record each event’s timestamp with integrity, and as close in time (as possi- ble) to when the event actually occurred in the sequence of the system’s execution. Again, we recognize that, in practice, the preemption of the system’s execution might cause a delay in the occurrence of an event X and the cor- responding log message (and timestamp generation) for entry into the log. We do.