forked from pikhq/sabotage
-
Notifications
You must be signed in to change notification settings - Fork 68
images
rofl0r edited this page Mar 9, 2024
·
3 revisions
Image files are available at http://ftp.barfooze.de/pub/sabotage/
unpack using xz
launch using qemu-system-x86_64 imagefile
or alternatively convert to virtualbox format using
VBoxManage convertfromraw $IMG $VDI
if you use virtual box, you may have to change /bin/X to use different device ids (currently commented out)
you can also loopmount the image and copy the rootfs from there:
modprobe loop
losetup -f # find free loop device
losetup /dev/loop0 image.img
partprobe /dev/loop0
mount /dev/loop0p1 /mnt/img_boot
mount /dev/loop0p2 /mnt/img_root
cp -a /mnt/img_root extracted_root
cp -a /mnt/img_boot/* extracted_root/boot/
there's also a rootfs for armv7l available. kernel is not included, because the kernel has to be carefully adopted for each specific device its intended to run on.