Updated test results from Hardware Certification here, the original
comment was pointing to a private document.

Rpi2b-armhf: 
https://certification.canonical.com/hardware/201906-27188/submission/155540/
Rpi3b-arm64: 
https://certification.canonical.com/hardware/201811-26649/submission/155539/
Rpi3b-armhf: 
https://certification.canonical.com/hardware/201811-26649/submission/155536/
Rpi3a+-arm64: 
https://certification.canonical.com/hardware/201901-26785/submission/155533/
Rpi3a+-armhf: 
https://certification.canonical.com/hardware/201901-26785/submission/155537/
Rpi3b+-arm64: 
https://certification.canonical.com/hardware/201901-26765/submission/155607/
Rpi3b+-armhf: 
https://certification.canonical.com/hardware/201901-26766/submission/155606/
Rpi4b-1g-arm64: 
https://certification.canonical.com/hardware/201911-27471/submission/155565/
Rpi4b-1g-armhf: 
https://certification.canonical.com/hardware/201910-27407/submission/155566/
Rpi4b-2g-arm64: 
https://certification.canonical.com/hardware/201911-27507/submission/155563/
Rpi4b-2g-armhf: 
https://certification.canonical.com/hardware/201911-27506/submission/155564/
Rpi4b-4g-arm64: 
https://certification.canonical.com/hardware/201911-27456/submission/155561/
Rpi4b-4g-armhf: 
https://certification.canonical.com/hardware/201911-27455/submission/155562/
CM3-arm64: 
https://certification.canonical.com/hardware/201711-25992/submission/155535/
CM3-armhf: 
https://certification.canonical.com/hardware/201711-25992/submission/155532/
CM3+-arm64: 
https://certification.canonical.com/hardware/201908-27277/submission/155534/
CM3+-armhf: 
https://certification.canonical.com/hardware/201908-27277/submission/155538/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1854006

Title:
  eoan/linux-raspi2: 5.3.0-1014.16 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-raspi2 package in Ubuntu:
  Invalid
Status in linux-raspi2 source package in Eoan:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1852232
  packages:
    main: linux-raspi2
    meta: linux-meta-raspi2
  phase: Ready for Promote to Security
  phase-changed: Wednesday, 04. December 2019 01:01 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
    promote-to-security: Pending -- ready to copy
  trackers:
    eoan/linux-raspi2/pi-kernel: bug 1854005
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854006/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to