Hmm... I'm still skeptical that this code path is even touched.

Thomas Hellstrom is removing the write to BYTES_PER_LINE in any case,
because it is a read-only register.

The most decisive test would be to log entry into this function call,
like I said in my last message, but that would really only prove that
the bug isn't because of my patch, not necessarily help to isolate the
actual cause of the split screen issue.

> Can you please add a logging statement in the kernel to function 
> vmwgfx_fb.c::vmw_fb_check_var() ? E.g.
> printk( KERN_INFO "fb_fix_screeninfo.line_length CODE PATH TRAVERSED\n" );

Thanks for all of the help!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1328898

Title:
  VMware guest video broken by the 3.2.0.64 kernel update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-video-vmware/+bug/1328898/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to