Fix: SCSI instrumentation for SLES12 SP2
[lttng-modules.git] / abi-debian-version.sh
1 #!/bin/sh
2
3 # First argument is the path to the kernel headers.
4 KPATH=$1
5
6 if [ ! -f ${KPATH}/include/generated/package.h ]; then
7 echo 0
8 exit 0
9 fi
10
11 # Debian snippet courtesy of Ben Hutchings
12
13 # Assuming KPATH is the target kernel headers directory
14 DEB_PACKAGE_VERSION=$(sed -rn 's/^#define LINUX_PACKAGE_ID " Debian (.*)"/\1/p' ${KPATH}/include/generated/package.h)
15 # Ignore backports part
16 DEB_PACKAGE_VERSION=$(echo ${DEB_PACKAGE_VERSION} | sed -r 's/~(bpo|deb).*//')
17 # Get -ckt update number, if present
18 KERNEL_CKT_UPDATE=$(echo ${DEB_PACKAGE_VERSION} | sed -rn 's/^[0-9]+\.[0-9]+\.[0-9]+-ckt([0-9]+).*/\1/p')
19
20 # Only care about the rest if it is a -ckt kernel, making sure we do not
21 # clash with older Debian kernels (e.g. Debian 3.2.65-1+deb7u2).
22 if [ -z "${KERNEL_CKT_UPDATE}" ]; then
23 echo 0
24 exit 0
25 fi
26
27 # Get package revision
28 DEB_PACKAGE_REVISION=$(echo ${DEB_PACKAGE_VERSION} | sed -r 's/.*-([^-]+)$/\1/')
29 # Get non-sec update number
30 DEB_PACKAGE_REVISION_BASE=$(echo ${DEB_PACKAGE_REVISION} | sed -r 's/^([0-9]+).*/\1/')
31 # Get security update number, if present
32 DEB_PACKAGE_REVISION_SECURITY=$(echo ${DEB_PACKAGE_REVISION} | sed -rn 's/.*\+(squeeze|deb[0-9])+u([0-9]+)$/\1/p')
33 test -n "${DEB_PACKAGE_REVISION_SECURITY}" || DEB_PACKAGE_REVISION_SECURITY=0
34 # Combine all update numbers into one
35 DEB_API_VERSION=$((KERNEL_CKT_UPDATE * 10000 + DEB_PACKAGE_REVISION_BASE * 100 + DEB_PACKAGE_REVISION_SECURITY))
36
37 echo ${DEB_API_VERSION}
This page took 0.030443 seconds and 4 git commands to generate.