Hello, Andrew Morton wrote: >> EIP is at sysfs_addrm_finish+0x1c2/0x226 >> eax: 00000001 ebx: c5ff9dc0 ecx: c058aa40 edx: 00000001 >> esi: c5ff9de8 edi: c37c3240 ebp: c5ff9e1c esp: c5ff9db8 >> ds: 007b es: 007b fs: 0000 gs: 0033 ss: 0068 >> Process modprobe (pid: 3519, ti=c5ff9000 task=c5ef15e0 task.ti=c5ff9000) >> Stack: c03a3eda c5ff9e24 00000000 00000001 dead4ead ffffffff ffffffff c0657cf0 >> 00000000 c046359d c5ff9de0 c5ff9de0 00000000 00000001 dead4ead ffffffff >> ffffffff c0657cf0 00000000 c046359d c5ff9de0 c5ff9de0 c37c3240 c5ff9e24 >> Call Trace: >> [] remove_dir+0x2e/0x35 >> [] __sysfs_remove_dir+0x5a/0x61 >> [] sysfs_remove_dir+0x2c/0x30 Hmm... That's weird. I tried to regenerate it here but mine unloads happily. Can you apply the attached patch and report the resulting messages when oops happens? Thanks. -- tejun