ols2008: time to glean - mac for linux history and the future
TRANSCRIPT
![Page 1: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/1.jpg)
Time to GleanMAC for Linux, history and the future
July 25, 2008
Toshiharu Harada<[email protected]>
Kentaro TakedaTetsuo Handa
NTT DATA CORPORATION
![Page 2: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/2.jpg)
Welcometo my BoF of “MAC for Linux: Time to Glean”
I am project manager of TOMOYO Linux, but this is *not* a TOMOYO Linux BoF
![Page 3: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/3.jpg)
This BoF
• looks in the history of Linux MAC: (Mandatory Access Control)
• As Smack had been added as 2nd in-tree module, it might be a good time to stop by and look what have passed
• I tried to find information from the LSM ml archive during the period December 2003 to June 2008
![Page 4: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/4.jpg)
Please Don’t ...
• Ask me if this is worth spending time (I’ve already spent my time ...)
• Get mad on me if the result is not what you want (we can’t tell what we find until we dig)
![Page 5: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/5.jpg)
Where to look at?
• ML archive has the information
• Whole LKML seems to be too much ...
• LSM mailing list archive should be a modest place for resort
![Page 6: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/6.jpg)
How to glean?
• Downloaded LSM message archive from gmane.org during the period of December 3, 2003 through June 30, 2008
• Plenty of nice tools are available
–ruby, perl, sort, uniq ... (joy of computing)
• Used Excel and Numbers occasionally for saving time purpose
![Page 7: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/7.jpg)
Welcome aboard!Let’s start digging
Is this free?Of course,
it’s open source!
![Page 8: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/8.jpg)
Can You Guess?
![Page 9: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/9.jpg)
Can You Guess?
1. How many messages has been posted during December 3, 2003 - June 30, 2008?
![Page 10: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/10.jpg)
Can You Guess?
1. How many messages has been posted during December 3, 2003 - June 30, 2008?
2. How many threads were there?
![Page 11: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/11.jpg)
Can You Guess?
1. How many messages has been posted during December 3, 2003 - June 30, 2008?
2. How many threads were there?
3. How big is the downloaded mbox file?
![Page 12: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/12.jpg)
Answer
6545 messages
978 threads
55MB(Dec. 2003 - Jun. 2008)
![Page 13: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/13.jpg)
LSM traffic(Dec. 2003 - Jun. 2008)
![Page 14: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/14.jpg)
each monthsum up
![Page 15: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/15.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
1750
3500
5250
7000
LSM activities at a glance
each monthsum up
![Page 16: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/16.jpg)
![Page 17: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/17.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
125
250
375
500
4529
50
202029
4863
107104
144
29
115
8696
34
8
142
878775
22
43
72
16153
14
455
6253
34
103
79
9
76
1927
79
21
200
147
378
180186
143
475
392
327311311
341
179
138
220
Monthly detail
![Page 18: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/18.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
125
250
375
500
4529
50
202029
4863
107104
144
29
115
8696
34
8
142
878775
22
43
72
16153
14
455
6253
34
103
79
9
76
1927
79
21
200
147
378
180186
143
475
392
327311311
341
179
138
220
Monthly detail
Apr 2006
![Page 19: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/19.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
125
250
375
500
4529
50
202029
4863
107104
144
29
115
8696
34
8
142
878775
22
43
72
16153
14
455
6253
34
103
79
9
76
1927
79
21
200
147
378
180186
143
475
392
327311311
341
179
138
220
Monthly detail
Apr 2006
Jun 2007
![Page 20: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/20.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
125
250
375
500
4529
50
202029
4863
107104
144
29
115
8696
34
8
142
878775
22
43
72
16153
14
455
6253
34
103
79
9
76
1927
79
21
200
147
378
180186
143
475
392
327311311
341
179
138
220
Monthly detail
Apr 2006
Jun 2007
Oct 2007
![Page 21: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/21.jpg)
3 Peaks
• Peaks should have reasons
• Let’s take a look at each peaks
![Page 22: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/22.jpg)
(1) April 2006
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Torok Edwin[RFC][PATCH 0/11] security: AppArmor - Overview Tony JonesRE: [ANNOUNCE] Release Digsig 1.5: kernel module for run-timeauthentication of binaries Makan Pourzandi[ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries Makan Pourzandi[ANNOUNCE] ISSI is porting PitBull Foundation and LX to Linux using the LSM Mikel L. Matthews[2.6 patch] remove the Root Plug Support sample module Adrian Bunkusing lsm hook to implement transparent file crypt hu junRE: [ANNOUNCE] Release Digsig 1.5: kernel module forrun-timeauthentication of binaries Makan PourzandiRe: [PATCH] fix up security_socket_getpeersec_* documentation Xiaolan Zhangabout security and trust of linux in engineering information system hu junA transparent secure architecture for special applications hu jun
![Page 23: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/23.jpg)
(1) April 2006
0%0%0%0%1%1%2%2%5%
36%
52%
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Torok Edwin[RFC][PATCH 0/11] security: AppArmor - Overview Tony JonesRE: [ANNOUNCE] Release Digsig 1.5: kernel module for run-timeauthentication of binaries Makan Pourzandi[ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries Makan Pourzandi[ANNOUNCE] ISSI is porting PitBull Foundation and LX to Linux using the LSM Mikel L. Matthews[2.6 patch] remove the Root Plug Support sample module Adrian Bunkusing lsm hook to implement transparent file crypt hu junRE: [ANNOUNCE] Release Digsig 1.5: kernel module forrun-timeauthentication of binaries Makan PourzandiRe: [PATCH] fix up security_socket_getpeersec_* documentation Xiaolan Zhangabout security and trust of linux in engineering information system hu junA transparent secure architecture for special applications hu jun
![Page 24: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/24.jpg)
(2) June 2007
[AppArmor 00/45] AppArmor security module overview John Johansen[AppArmor 00/44] AppArmor security module overview John JohansenRe: implement-file-posix-capabilities.patch Serge E. Hallyn[RFC] TOMOYO Linux Toshiharu Harada[TOMOYO 0/9] TOMOYO Linux security module. Kentaro Takeda[RFD 0/4] AppArmor - Don't pass NULL nameidata to vfs_create/lookup/permission IOPs John JohansenWhat kind of feature does New LSM security model need? Kazuki Omo[PATCH 1/1] file caps: update selinux xattr hooks Serge E. HallynRe: [TOMOYO 5/9] Memory and pathname management functions. Albert Cahalan[PATCH 1/1] file capabilities: get_file_caps cleanups Serge E. Hallyn[RFC][Patch 1/1] IBAC Patch Mimi Zohar[PATCH] [RFC] security: add hook inode_post_removexattr Hawk Xu[PATCH 1/1] file capabilities: introduce cap_setfcap Serge E. HallynRe: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook Pavel MachekRe: implement-file-posix-capabilities.patch Serge E. Hallyn
![Page 25: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/25.jpg)
(2) June 2007
0%0%0%0%1%1%1%1%2%3%
4%
4%
14%
17%
52%
[AppArmor 00/45] AppArmor security module overview John Johansen[AppArmor 00/44] AppArmor security module overview John JohansenRe: implement-file-posix-capabilities.patch Serge E. Hallyn[RFC] TOMOYO Linux Toshiharu Harada[TOMOYO 0/9] TOMOYO Linux security module. Kentaro Takeda[RFD 0/4] AppArmor - Don't pass NULL nameidata to vfs_create/lookup/permission IOPs John JohansenWhat kind of feature does New LSM security model need? Kazuki Omo[PATCH 1/1] file caps: update selinux xattr hooks Serge E. HallynRe: [TOMOYO 5/9] Memory and pathname management functions. Albert Cahalan[PATCH 1/1] file capabilities: get_file_caps cleanups Serge E. Hallyn[RFC][Patch 1/1] IBAC Patch Mimi Zohar[PATCH] [RFC] security: add hook inode_post_removexattr Hawk Xu[PATCH 1/1] file capabilities: introduce cap_setfcap Serge E. HallynRe: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook Pavel MachekRe: implement-file-posix-capabilities.patch Serge E. Hallyn
![Page 26: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/26.jpg)
(3) October 2007
Linux Security *Module* Framework (Was: LSM conversion to static interface Simon Arlott[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler[AppArmor 00/45] AppArmor security module overview John Johansen[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history. Kentaro TakedaRe: Linux Security *Module* Framework (Was: LSM conversion to static interface) Rob Meijer[RFC 0/2] getsecurity/vfs_getxattr cleanup Daved P. QuigleyRe: LSM conversion to static interface Thomas Fricaccia[PATCH] Version 4 (2.6.23-rc8-mm2) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler[TOMOYO #4 00/13] TOMOYO Linux - MAC based on process invocation history. Tetsuo Handa[PATCH 1/2 -mm] capabilities: clean up file capability reading Serge E. Hallyn
![Page 27: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/27.jpg)
(3) October 2007
3%3%4%
5%
5%
8%
13%
17%
20%
22%
Linux Security *Module* Framework (Was: LSM conversion to static interface Simon Arlott[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler[AppArmor 00/45] AppArmor security module overview John Johansen[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history. Kentaro TakedaRe: Linux Security *Module* Framework (Was: LSM conversion to static interface) Rob Meijer[RFC 0/2] getsecurity/vfs_getxattr cleanup Daved P. QuigleyRe: LSM conversion to static interface Thomas Fricaccia[PATCH] Version 4 (2.6.23-rc8-mm2) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler[TOMOYO #4 00/13] TOMOYO Linux - MAC based on process invocation history. Tetsuo Handa[PATCH 1/2 -mm] capabilities: clean up file capability reading Serge E. Hallyn
![Page 28: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/28.jpg)
People“It is people that writes and reads messages”
![Page 29: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/29.jpg)
People“It is people that writes and reads messages”
It is also people that fight and argue (and reject)
![Page 30: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/30.jpg)
![Page 31: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/31.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 32: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/32.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 33: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/33.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Stephen Smalley
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 34: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/34.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Stephen SmalleyDavid Howells
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 35: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/35.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Stephen SmalleyDavid Howells
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 36: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/36.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Stephen SmalleyDavid HowellsSerge E. Hallyn
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 37: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/37.jpg)
Kylene Jo Hall
Ahmed S. Darwish
KaiGai Kohei
Andreas Gruenbacher
Tony Jones
Pavel Machek
Kentaro Takeda
Valdis.Kletnieks
Greg KH
Andrew G. Morgan
Crispin Cowan
Tetsuo Handa
Paul Moore
Chris Wright
John Johansen
James Morris
Casey Schaufler
Stephen SmalleyDavid HowellsSerge E. Hallyn
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
130
260
390
520
650
LSM top 20 contributors
![Page 38: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/38.jpg)
![Page 39: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/39.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
800
1600
2400
Men of wisdom (“cc”ed ranking)
![Page 40: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/40.jpg)
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-080
800
1600
2400
Men of wisdom (“cc”ed ranking)Stephen SmalleyChris WrightCasey SchauflerJames MorrisSerge E. HallynAndrew MortonDavid HowellsChristoph HellwigAndreas GruenbacherAl ViroJohn JohansenTrond MyklebustLinus TorvaldsAndrew G. MorganCrispin CowanGreg KHEric ParisTony JonesTetsuo HandaArjan van de Ven
![Page 41: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/41.jpg)
![Page 42: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/42.jpg)
0
1750
3500
5250
7000
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08
Which ML cc-ed most
![Page 43: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/43.jpg)
0
1750
3500
5250
7000
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08
Which ML cc-ed mostlinux-security-module ML (self)linux-kernel MLlinux-fsdevel MLselinux MLnetdev MLfireflier-devel MLlinux-audit ML
![Page 44: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/44.jpg)
Threads(not threats)
![Page 45: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/45.jpg)
What is thread?
![Page 46: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/46.jpg)
What is thread?
![Page 47: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/47.jpg)
What should we look at for threads?
1. Life time (how many days)
2. Number of messages
3. Number of people posted their opinions to the thread
![Page 48: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/48.jpg)
Long lived threads 10
days
0 30 60 90
42
44
49
50
54
55
57
59
70
82
[PATCH 0/3] exporting capability name/code pairs (final#2)[PATCH] capabilities: implement per-process securebits[PATCH] Implement file posix capabilities[PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount optionsAppArmor FAQMediating send_sigurg[PATCH 00/28] Permit filesystem local caching [try #2][AppArmor 00/41] AppArmor security module overview[AppArmor 00/45] AppArmor security module overview[PATCH 1/1] security: introduce fs caps
![Page 49: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/49.jpg)
Long lived threads 20subject from start end days people messages
[PATCH 0/3] exporting capability name/code pairs (final#2) KaiGai Kohei 2008/02/24 2008/05/15 82 7 32
[PATCH] capabilities: implement per-process securebits Andrew G. Morgan 2008/02/18 2008/04/27 70 3 7
[PATCH] Implement file posix capabilities Serge E. Hallyn 2006/11/27 2007/01/24 59 5 9
[PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount optionsEric Paris 2008/03/05 2008/04/30 57 3 6
AppArmor FAQ John Johansen 2007/04/16 2007/06/09 55 15 48
Mediating send_sigurg Stephen Smalley 2004/08/27 2004/10/19 54 2 12
[PATCH 00/28] Permit filesystem local caching [try #2] David Howells 2007/12/05 2008/01/23 50 8 126
[AppArmor 00/41] AppArmor security module overview John Johansen 2007/04/12 2007/05/30 49 24 176
[AppArmor 00/45] AppArmor security module overview John Johansen 2007/05/14 2007/06/26 44 22 236
[PATCH 1/1] security: introduce fs caps Serge E. Hallyn 2006/11/08 2006/12/19 42 6 30
[PATCH] Updated BSD Secure Levels Patch Michael Halcrow 2003/12/03 2004/01/10 39 2 2
[PATCH 3/7] SLIM main patch Kylene Jo Hall 2006/09/12 2006/10/20 39 3 8
[PATCH] 64 bit capabilities Andrew G. Morgan 2007/11/07 2007/12/13 37 4 19
[RFC] [Stacking v4 3/3] Cleaned up stacker patch Serge E. Hallyn 2004/12/03 2005/01/06 35 3 8
Linux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott 2007/10/24 2007/11/26 34 26 89
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey Schaufler 2007/09/29 2007/10/30 32 24 81
Problem of attaching a security structer to sock in 2.6.4!! Yuan Chunyang 2004/05/17 2004/06/14 29 6 10
[TOMOYO 00/15] TOMOYO Linux - MAC based on process invocation histroyKentaro Takeda 2007/08/24 2007/09/21 29 8 37
[PATCH] Smack: Simplified Mandatory Access Control Kernel Casey Schaufler 2007/08/11 2007/09/07 28 11 43
![Page 50: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/50.jpg)
Average thread life
3.76 days
![Page 51: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/51.jpg)
Popular threads 10
people
0 10 20 30 40
13
14
15
19
22
24
24
26
33
34
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)[RFC][PATCH 0/11] security: AppArmor - OverviewLinux Security *Module* Framework (Was: LSM conversion to static interface[AppArmor 00/41] AppArmor security module overview[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel[AppArmor 00/45] AppArmor security module overview[AppArmor 00/44] AppArmor security module overviewAppArmor FAQRe: implement-file-posix-capabilities.patchRe: Linux Security *Module* Framework (Was: LSM conversion to static interface)
![Page 52: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/52.jpg)
Popular threads 20subject from start end days people messages
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)Torok Edwin 2006/04/07 2006/05/03 27 34 244
[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones 2006/04/19 2006/04/28 10 33 170
Linux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott 2007/10/24 2007/11/26 34 26 89
[AppArmor 00/41] AppArmor security module overview John Johansen 2007/04/12 2007/05/30 49 24 176
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey Schaufler 2007/09/29 2007/10/30 32 24 81
[AppArmor 00/45] AppArmor security module overview John Johansen 2007/05/14 2007/06/26 44 22 236
[AppArmor 00/44] AppArmor security module overview John Johansen 2007/06/26 2007/07/04 9 19 76
AppArmor FAQ John Johansen 2007/04/16 2007/06/09 55 15 48
Re: implement-file-posix-capabilities.patch Serge E. Hallyn 2007/06/21 2007/07/04 14 14 65
Re: Linux Security *Module* Framework (Was: LSM conversion to static interface)Rob Meijer 2007/10/29 2007/11/06 9 13 33
[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa 2008/04/04 2008/04/24 21 12 74
New stacker performance results Serge E. Hallyn 2005/05/18 2005/05/26 9 12 51
[RFC 0/28] Patches to pass vfsmount to LSM inode security hooks Tony Jones 2007/02/05 2007/02/12 8 12 61
RE: [ANNOUNCE] Release Digsig 1.5: kernel module for run-timeauthentication of binariesMakan Pourzandi 2006/04/24 2006/04/28 5 12 25
[PATCH] Smack: Simplified Mandatory Access Control Kernel Casey Schaufler 2007/08/11 2007/09/07 28 11 43
[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history.Kentaro Takeda 2007/10/02 2007/10/15 14 11 54
[PATCH try #3] security: Convert LSM into a static interface James Morris 2007/07/14 2007/07/24 11 11 27
[patch 00/15] security: pass path instead of inode to security ops Miklos Szeredi 2008/05/29 2008/06/14 17 10 51
[RFC]Introduce generalized hooks for getting and setting inode secctx David P. Quigley 2008/03/05 2008/03/10 6 10 39
[AppArmor 00/45] AppArmor security module overview John Johansen 2007/10/25 2007/10/28 4 10 70
![Page 53: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/53.jpg)
How crowded is the room?
LSM
![Page 54: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/54.jpg)
Crowded threads
![Page 55: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/55.jpg)
Crowded threads
![Page 56: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/56.jpg)
how many people joined the party?
2.45• per thread on the average
![Page 57: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/57.jpg)
Active threads 10
messages
0 50 100 150 200 250
70
74
76
81
89
126
170
176
236
244
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)[AppArmor 00/45] AppArmor security module overview[AppArmor 00/41] AppArmor security module overview[RFC][PATCH 0/11] security: AppArmor - Overview[PATCH 00/28] Permit filesystem local caching [try #2]Linux Security *Module* Framework (Was: LSM conversion to static interface[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel[AppArmor 00/44] AppArmor security module overview[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released[AppArmor 00/45] AppArmor security module overview
![Page 58: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/58.jpg)
Active threads 20subject from start end days people messages
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)Torok Edwin 2006/04/07 2006/05/03 27 34 244[AppArmor 00/45] AppArmor security module overview John Johansen 2007/05/14 2007/06/26 44 22 236[AppArmor 00/41] AppArmor security module overview John Johansen 2007/04/12 2007/05/30 49 24 176[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones 2006/04/19 2006/04/28 10 33 170[PATCH 00/28] Permit filesystem local caching [try #2] David Howells 2007/12/05 2008/01/23 50 8 126Linux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott 2007/10/24 2007/11/26 34 26 89[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey Schaufler 2007/09/29 2007/10/30 32 24 81[AppArmor 00/44] AppArmor security module overview John Johansen 2007/06/26 2007/07/04 9 19 76[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa 2008/04/04 2008/04/24 21 12 74[AppArmor 00/45] AppArmor security module overview John Johansen 2007/10/25 2007/10/28 4 10 70[PATCH 00/37] Permit filesystem local caching David Howells 2008/02/20 2008/02/26 7 8 68Re: implement-file-posix-capabilities.patch Serge E. Hallyn 2007/06/21 2007/07/04 14 14 65[RFC 0/28] Patches to pass vfsmount to LSM inode security hooks Tony Jones 2007/02/05 2007/02/12 8 12 61[RFC] [PATCH] Replace security fields with hashtable Serge E. Hallyn 2004/10/26 2004/11/01 7 8 61[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history.Kentaro Takeda 2007/10/02 2007/10/15 14 11 54[RFC][PATCH] Simplified mandatory access control kernel implementationCasey Schaufler 2007/07/14 2007/08/06 24 7 53New stacker performance results Serge E. Hallyn 2005/05/18 2005/05/26 9 12 51[patch 00/15] security: pass path instead of inode to security ops Miklos Szeredi 2008/05/29 2008/06/14 17 10 51[PATCH] Version 10 (2.6.24-rc1) Smack: Simplified Mandatory Access Control KernelCasey Schaufler 2007/11/02 2007/11/11 10 9 50AppArmor FAQ John Johansen 2007/04/16 2007/06/09 55 15 48
![Page 59: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/59.jpg)
how many “no-children” threads?
470 (48%)this includes SPAM messages
![Page 60: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/60.jpg)
Time to determine “important” threads
• “How?” is the question
• My version of completely fair formula :-)
• Give points to threads ranked 1-20 according to the rank (1st thread gets 20, 20th one gets 1)
• Apply for 3 aspects (days/people/messages), so the perfect thread get 60 points
![Page 61: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/61.jpg)
Example
days people messages
8th 4th 3rd
rank-days rank-people rank-messages
21 - 8 = 13 21 - 4 = 17 21 - 3 = 18
total point is 13+17+18 = 48
![Page 62: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/62.jpg)
Results
• LSM ml top 10 important threads are ...
Good, boy.Show me the list.
![Page 63: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/63.jpg)
LSM important threads 10[AppArmor 00/41] AppArmor security module overview
[AppArmor 00/45] AppArmor security module overview
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)
Linux Security *Module* Framework (Was: LSM conversion to static interface
[RFC][PATCH 0/11] security: AppArmor - Overview
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel
AppArmor FAQ
[PATCH 00/28] Permit filesystem local caching [try #2]
[AppArmor 00/44] AppArmor security module overview
[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released
0 10 20 30 40 50
12
13
16
1
14
17
15
20
19
18
10
14
0
13
16
19
18
20
15
17
0
0
14
16
5
0
6
1
12
13
days people messages
![Page 64: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/64.jpg)
LSM important threads 20subject from days people messages rank-
daysrank-
peoplerank-
messagespoint
[AppArmor 00/41] AppArmor security module overview John Johansen 49 24 176 13 17 18 48[AppArmor 00/45] AppArmor security module overview John Johansen 44 22 236 12 15 19 46[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)Torok Edwin 27 34 244 1 20 20 41Linux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott 34 26 89 6 18 15 39[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones 10 33 170 19 17 36[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey Schaufler 32 24 81 5 16 14 35AppArmor FAQ John Johansen 55 15 48 16 13 1 30[PATCH 00/28] Permit filesystem local caching [try #2] David Howells 50 8 126 14 16 30[AppArmor 00/44] AppArmor security module overview John Johansen 9 19 76 14 13 27[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa 21 12 74 10 12 22Re: implement-file-posix-capabilities.patch Serge E. Hallyn 14 14 65 12 9 21[PATCH 0/3] exporting capability name/code pairs (final#2) KaiGai Kohei 82 7 32 20 20[PATCH] capabilities: implement per-process securebits Andrew G. Morgan 70 3 7 19 19[PATCH] Implement file posix capabilities Serge E. Hallyn 59 5 9 18 18[PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount optionsEric Paris 57 3 6 17 17[RFC 0/28] Patches to pass vfsmount to LSM inode security hooksTony Jones 8 12 61 8 8 16Mediating send_sigurg Stephen Smalley 54 2 12 15 15New stacker performance results Serge E. Hallyn 9 12 51 9 4 13[AppArmor 00/45] AppArmor security module overview John Johansen 4 10 70 1 11 12Re: Linux Security *Module* Framework (Was: LSM conversion to static interface)Rob Meijer 9 13 33 11 11
![Page 65: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/65.jpg)
LSM important threads 10Subject By
12345678910
[AppArmor 00/41] AppArmor security module overview John Johansen[AppArmor 00/45] AppArmor security module overview John Johansen[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)Torok EdwinLinux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey SchauflerAppArmor FAQ John Johansen[PATCH 00/28] Permit filesystem local caching [try #2] David Howells[AppArmor 00/44] AppArmor security module overview John Johansen[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa
![Page 66: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/66.jpg)
LSM important threads top 10
• 4 LSM related (including 1 for Smack)
• 1 for TOMOYO
• 5 out of 10 belong to AppArmor
Subject By12345678910
[AppArmor 00/41] AppArmor security module overview John Johansen[AppArmor 00/45] AppArmor security module overview John Johansen[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)Torok EdwinLinux Security *Module* Framework (Was: LSM conversion to static interfaceSimon Arlott[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control KernelCasey SchauflerAppArmor FAQ John Johansen[PATCH 00/28] Permit filesystem local caching [try #2] David Howells[AppArmor 00/44] AppArmor security module overview John Johansen[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa
![Page 67: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/67.jpg)
TOMOYO, AppArmor and Smack2003-12 2007 2008-6
??
![Page 68: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/68.jpg)
Close up (After 2007)
??
![Page 69: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/69.jpg)
past
now
AppArmor, Smack and TOMOYOwhich is which?
guess!
guess!
guess!
![Page 70: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/70.jpg)
past
now
AppArmor, Smack and TOMOYOwhich is which?
guess!
guess!
![Page 71: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/71.jpg)
past
now
AppArmor, Smack and TOMOYOwhich is which?
guess!
![Page 72: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/72.jpg)
past
now
AppArmor, Smack and TOMOYOwhich is which?
![Page 73: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/73.jpg)
past
now
AppArmor, Smack and TOMOYOwhich is which?
![Page 74: OLS2008: Time to Glean - Mac for Linux history and the future](https://reader036.vdocument.in/reader036/viewer/2022081403/555121e6b4c905f1528b456b/html5/thumbnails/74.jpg)
Summary
• Numbers of messages passing by every day
• We always have a lot of things to do and it’s hard to stop by and think about the past
• I felt we were doing kind of waste and that was a major motivation of this attempt
• Despite of the amount time I spent, I don’t really think I found out something quite new ...
• There should be more wise way to extract valuable information from the past