Hi With kernel built from current linus's tree, I can not start xorg, it failed with: Backtrace: 0: X(xorg_backtrace+0x26) [0x4e8bb6] 1: X(xf86SigHandler+0x39) [0x489989] 2: /lib64/libc.so.6 [0x7f077a6b9f30] 3: /usr/lib64/libpciaccess.so.0(pci_device_get_bridge_buses+0xf1) [0x7f077c101fd1] 4: X(initPciBusState+0x8d) [0x470abd] 5: X(xf86AccessInit+0xe) [0x48e26e] 6: X(InitOutput+0x108b) [0x466bfb] 7: X(main+0x20e) [0x42ceee] 8: /lib64/libc.so.6(__libc_start_main+0xe6) [0x7f077a6a5526] 9: X [0x42c529] Fatal server error: Caught signal 11. Server aborting The graphic driver I used is intel (i915) Finally I bisected it, results: 47970b1b2aa64464bc0a9543e86361a622ae7c03 is first bad commit commit 47970b1b2aa64464bc0a9543e86361a622ae7c03 Author: Chris Wright <chrisw@xxxxxxxxxxxx> Date: Thu Feb 10 15:58:56 2011 -0800 pci: use security_capable() when checking capablities during config space read Eric Paris noted that commit de139a3 ("pci: check caps from sysfs file open to read device dependent config space") caused the capability check to bypass security modules and potentially auditing. Rectify this by calling security_capable() when checking the open file's capabilities for config space reads. Reported-by: Eric Paris <eparis@xxxxxxxxxx> Signed-off-by: Chris Wright <chrisw@xxxxxxxxxxxx> Signed-off-by: James Morris <jmorris@xxxxxxxxx> :040000 040000 e14ad9470ca5f84f13cd31eaf5def16d40bc54f1 cbf987647b8052214dd928c87c6becfb639e4ca2 M drivers Any idea? -- Thanks Dave _______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx http://lists.freedesktop.org/mailman/listinfo/dri-devel