When we see reports like https://bugzilla.redhat.com/show_bug.cgi?id=883576 it might be useful to know what modules had been loaded, so they can be compared with similar reports to see if there is a common suspect. Signed-off-by: Dave Jones <davej@xxxxxxxxxx> diff --git a/mm/memory.c b/mm/memory.c index 221fc9f..7fc8c01 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -57,6 +57,7 @@ #include <linux/swapops.h> #include <linux/elf.h> #include <linux/gfp.h> +#include <linux/module.h> #include <asm/io.h> #include <asm/pgalloc.h> @@ -708,6 +709,7 @@ static void print_bad_pte(struct vm_area_struct *vma, unsigned long addr, if (vma->vm_file && vma->vm_file->f_op) print_symbol(KERN_ALERT "vma->vm_file->f_op->mmap: %s\n", (unsigned long)vma->vm_file->f_op->mmap); + print_modules(); dump_stack(); add_taint(TAINT_BAD_PAGE); } -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>