OSDir


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Proposal: Let's drop i386


Nice catch! I just looked for error stack traces that matched between the
i386 version and amd64 and then compared them.  I only removed duplicates
that we're in the flavors I was comparing - my mistake.

Xubuntu error (thunar) - 0.10  - thunar also included in Ubuntu studio

The general process was taking these two links, and finding and comparing
the same stacktrace:
https://errors.ubuntu.com/?release=Ubuntu%2018.04&packageset=xubuntu&period=
week&pkg_arch=i386
https://errors.ubuntu.com/?release=Ubuntu%2018.04&packageset=xubuntu&period=
week&pkg_arch=amd64

engrampa was a very bad choice.  i386 for the Ubuntu kylin package set
doesn't seem to have enough specific bugs for another comparison:
https://errors.ubuntu.com/?release=Ubuntu%2018.04&;
packageset=ubuntukylin&period=week&pkg_arch=amd64
https://errors.ubuntu.com/?release=Ubuntu%2018.04&;
packageset=ubuntukylin&period=week&pkg_arch=i386

Thanks,
Bryan




On Thu, May 10, 2018 at 6:01 PM, Brian Murray <brian at ubuntu.com> wrote:

> On Wed, May 09, 2018 at 04:07:23PM -0400, Bryan Quigley wrote:
> > Hello,
> >
> > Less and less non-amd64-compatible i386 hardware is available for
> consumers
> > to buy today from anything but computer part recycling centers. The last
> of
> > these machines were manufactured over a decade ago, and support from
> > an increasing
> > number of upstream projects has ended.
> >
> > Ubuntu and flavors just completed the 18.04 release cycle. This released
> > version will either be supported until 2021 or 2023, depending on the
> > product, team, and willingness to support it. At that point in time, the
> > majority of these machines are approaching two decades old.
> >
> > >>Previous 2016 thread: And in 2018, the question will come if we can
> > effectively provide security support on i386.
> > We can't.  Machines running i386 Ubuntu which are capable of running
> amd64
> > Ubuntu are vulnerable to the critical Meltdown vulnerability where they
> > wouldn't be if they were running amd64. (Some actual i386 hardware simply
> > isn't vulnerable, but some is).
> >
> > We still have a relatively high number if i386 downloads but that doesn't
> > mean users machines are not capable of amd64. For the flavors remaining
> > today on i386 here are some i386 to amd64 ratios for 18.04:
> >
> > Lubuntu cdimage - 0.87
> > Lubuntu tracker - 0.64
> > Lubuntu error (pcmanfm) - 0.11
> > Xubuntu cdimage - 0.49
> > Xubuntu tracker -  0.30
> > Xubuntu error (thunar) - 0.10
> > Kylin tracker - 0.30
> > Kylin error (engrampa) - 0.10
> > Kubuntu cdimage - 0.14
> > Kubuntu tracker - 0.12
> > Kubuntu error (kinit) - 0.07
> >
> > The data retrieved from cdimage is for a limited time period on May 7th.
> All
> > cdimage statistics included many hundreds to thousands of downloads
> (except
> > Ubuntu Kylin due to it using it's own CDN, so not being included here).
> The
> > torrent tracker results are available here: http://torrent.ubuntu.com:
> 6969/
> > .
> > The error tracker statistics come from comparing top bugs shared between
> > i386 and amd64 over last week. Bugs that affect multiple flavors are not
> > included.
> > It's not fully understood why there is a large discrepancy between the
> > error tracker and other sources - but it's possible apport doesn't work
> as
> > well in low memory.
>
> Could you elaborate on the methodology you used to create these Error
> Tracker statistics?
>
> I'm not certain engrampa was a representative choice given that it is
> also part of the xubuntu-desktop and ubuntu-mate-desktop tasks.
>
> --
> Brian Murray
>
> --
> ubuntu-devel mailing list
> ubuntu-devel at lists.ubuntu.com
> Modify settings or unsubscribe at: https://lists.ubuntu.com/
> mailman/listinfo/ubuntu-devel
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-devel/attachments/20180511/b2cb87b6/attachment-0001.html>