When we see reports like https://bugzilla.redhat.com/show_bug.cgi?id=883576
it might be useful to know what modules had been loaded, so they can be compared
with similar reports to see if there is a common suspect.

Signed-off-by: Dave Jones <[email protected]>

diff --git a/mm/memory.c b/mm/memory.c
index 221fc9f..7fc8c01 100644
--- a/mm/memory.c
+++ b/mm/memory.c
@@ -57,6 +57,7 @@
 #include <linux/swapops.h>
 #include <linux/elf.h>
 #include <linux/gfp.h>
+#include <linux/module.h>
 
 #include <asm/io.h>
 #include <asm/pgalloc.h>
@@ -708,6 +709,7 @@ static void print_bad_pte(struct vm_area_struct *vma, 
unsigned long addr,
        if (vma->vm_file && vma->vm_file->f_op)
                print_symbol(KERN_ALERT "vma->vm_file->f_op->mmap: %s\n",
                                (unsigned long)vma->vm_file->f_op->mmap);
+       print_modules();
        dump_stack();
        add_taint(TAINT_BAD_PAGE);
 }
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to