Bizarre as it seems, disabling the kernel module tainting stops this occurring.
static inline void add_taint_module(struct module *mod, unsigned flag, enum lockdep_ok lockdep_ok) { - add_taint(flag, lockdep_ok); - mod->taints |= (1U << flag); + //add_taint(flag, lockdep_ok); + //mod->taints |= (1U << flag); } -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558120 Title: Kernel can be oopsed using remap_file_pages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558120/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs