On Wed, Apr 18, 2012 at 6:43 AM, Giovanni Tirloni <gtirloni at sysdroid.com>wrote: > > Yes, it's the same as the upstream's. You can either fix the code or > disable the checks at your own risk. > > I read the information you provided, thank you very much. I as already familiar with all except the bugzilla entry. However, I still do not know exactly what kind of thing breaks the kABI, so I would not know how to identify the problem areas in the patch. Besides that, is updating the kABI a solution, or not? How the kABI mechanism works is not clearly explained from the documentation I have been able to find. Is there some documentation that describes it for kmod developers? -- *Mike SCHMIDT **CTO Intello Technologies Inc. **mike.schmidt at intello.com* *Canada: 1-888-404-6261 x320 USA: 1-888-404-6268 x320 Mobile: 514-409-6898 www.intello.com* * * -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos-devel/attachments/20120418/a80bf248/attachment-0007.html>