| 1 | #!/bin/sh |
| 2 | |
| 3 | # First argument is the path to the kernel headers. |
| 4 | KPATH=$1 |
| 5 | |
| 6 | if [ ! -f ${KPATH}/include/generated/package.h ]; then |
| 7 | echo 0 |
| 8 | exit 0 |
| 9 | fi |
| 10 | |
| 11 | # Debian snippet courtesy of Ben Hutchings |
| 12 | |
| 13 | # Assuming KPATH is the target kernel headers directory |
| 14 | DEB_PACKAGE_VERSION=$(sed -rn 's/^#define LINUX_PACKAGE_ID " Debian (.*)"/\1/p' ${KPATH}/include/generated/package.h) |
| 15 | # Ignore backports part |
| 16 | DEB_PACKAGE_VERSION=$(echo ${DEB_PACKAGE_VERSION} | sed -r 's/~(bpo|deb).*//') |
| 17 | # Get -ckt update number, if present |
| 18 | KERNEL_CKT_UPDATE=$(echo ${DEB_PACKAGE_VERSION} | sed -rn 's/^[0-9]+\.[0-9]+\.[0-9]+-ckt([0-9]+).*/\1/p') |
| 19 | |
| 20 | # Only care about the rest if it is a -ckt kernel, making sure we do not |
| 21 | # clash with older Debian kernels (e.g. Debian 3.2.65-1+deb7u2). |
| 22 | if [ -z "${KERNEL_CKT_UPDATE}" ]; then |
| 23 | echo 0 |
| 24 | exit 0 |
| 25 | fi |
| 26 | |
| 27 | # Get package revision |
| 28 | DEB_PACKAGE_REVISION=$(echo ${DEB_PACKAGE_VERSION} | sed -r 's/.*-([^-]+)$/\1/') |
| 29 | # Get non-sec update number |
| 30 | DEB_PACKAGE_REVISION_BASE=$(echo ${DEB_PACKAGE_REVISION} | sed -r 's/^([0-9]+).*/\1/') |
| 31 | # Get security update number, if present |
| 32 | DEB_PACKAGE_REVISION_SECURITY=$(echo ${DEB_PACKAGE_REVISION} | sed -rn 's/.*\+(squeeze|deb[0-9])+u([0-9]+)$/\1/p') |
| 33 | test -n "${DEB_PACKAGE_REVISION_SECURITY}" || DEB_PACKAGE_REVISION_SECURITY=0 |
| 34 | # Combine all update numbers into one |
| 35 | DEB_API_VERSION=$((KERNEL_CKT_UPDATE * 10000 + DEB_PACKAGE_REVISION_BASE * 100 + DEB_PACKAGE_REVISION_SECURITY)) |
| 36 | |
| 37 | echo ${DEB_API_VERSION} |