Updated test results from Hardware Certification here, the original comment was pointing to a private document.
Rpi2b-armhf: https://certification.canonical.com/hardware/201906-27188/submission/155540/ Rpi3b-arm64: https://certification.canonical.com/hardware/201811-26649/submission/155539/ Rpi3b-armhf: https://certification.canonical.com/hardware/201811-26649/submission/155536/ Rpi3a+-arm64: https://certification.canonical.com/hardware/201901-26785/submission/155533/ Rpi3a+-armhf: https://certification.canonical.com/hardware/201901-26785/submission/155537/ Rpi3b+-arm64: https://certification.canonical.com/hardware/201901-26765/submission/155607/ Rpi3b+-armhf: https://certification.canonical.com/hardware/201901-26766/submission/155606/ Rpi4b-1g-arm64: https://certification.canonical.com/hardware/201911-27471/submission/155565/ Rpi4b-1g-armhf: https://certification.canonical.com/hardware/201910-27407/submission/155566/ Rpi4b-2g-arm64: https://certification.canonical.com/hardware/201911-27507/submission/155563/ Rpi4b-2g-armhf: https://certification.canonical.com/hardware/201911-27506/submission/155564/ Rpi4b-4g-arm64: https://certification.canonical.com/hardware/201911-27456/submission/155561/ Rpi4b-4g-armhf: https://certification.canonical.com/hardware/201911-27455/submission/155562/ CM3-arm64: https://certification.canonical.com/hardware/201711-25992/submission/155535/ CM3-armhf: https://certification.canonical.com/hardware/201711-25992/submission/155532/ CM3+-arm64: https://certification.canonical.com/hardware/201908-27277/submission/155534/ CM3+-armhf: https://certification.canonical.com/hardware/201908-27277/submission/155538/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-raspi2 in Ubuntu. https://bugs.launchpad.net/bugs/1854006 Title: eoan/linux-raspi2: 5.3.0-1014.16 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-raspi2 package in Ubuntu: Invalid Status in linux-raspi2 source package in Eoan: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1852232 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Ready for Promote to Security phase-changed: Wednesday, 04. December 2019 01:01 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Pending -- ready to copy trackers: eoan/linux-raspi2/pi-kernel: bug 1854005 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1854006/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

