From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1335 Path: news.gmane.org!not-for-mail From: =?ISO-8859-2?Q?Daniel_Cegie=B3ka?= Newsgroups: gmane.linux.lib.musl.general Subject: Re: sabotage linux X86_64 image with LXDE desktop released Date: Sun, 22 Jul 2012 11:32:42 +0200 Message-ID: References: <500B181F.7080406@barfooze.de> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Trace: dough.gmane.org 1342949602 23091 80.91.229.3 (22 Jul 2012 09:33:22 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Sun, 22 Jul 2012 09:33:22 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-1336-gllmg-musl=m.gmane.org@lists.openwall.com Sun Jul 22 11:33:21 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1SssXM-0002s6-QF for gllmg-musl@plane.gmane.org; Sun, 22 Jul 2012 11:33:16 +0200 Original-Received: (qmail 13795 invoked by uid 550); 22 Jul 2012 09:33:15 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 13787 invoked from network); 22 Jul 2012 09:33:15 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=Emr3U87s0Z6pxECBvhY2Sc8SNYOx/mxdv+u1q/4zr1U=; b=G0Jj5EhM/WqbWOA6FoGeC9BQOQxdNz+vLVDpNubzfT935SVuvdGHlooqMuvJ5BWmu9 zV0cqBbyOOKWHxFy8F4bc2VXHsQXXOy8iApg9N6/KaqbyT//XzNPRsL+DKE0FhTP7qV+ bP0Wb0RhOjwPExClqn8sniwAPv7/Wy9MGX/vKIoUdP95VxTAGLNVi/RWzqooPxAxP/0n Y3mvSqMxwkBF5FhggdkuPJqrYNMOtnat/wuQADF6jG/ilW5m1mpkB+Fw5W8kbD1Vddt3 y9F0ht6wzVmPV+SIvuTH0hq60hXQOrPDk6irviOzv2ZwFmIZ/S55Wgf1KJ3K1HaBuM/o eyUA== In-Reply-To: <500B181F.7080406@barfooze.de> Xref: news.gmane.org gmane.linux.lib.musl.general:1335 Archived-At: 2012/7/21 John Spencer : > I uploaded an image file of my latest sabotage build from > > https://github.com/rofl0r/sabotage > Image files are available athttp://mirror.wzff.de/sabotage/ > > http://mirror.wzff.de/sabotage/sabotage-0.9.2-x86_64_5e7eda8.img.xz > > sha512 checksum > 442aa4d8fca1516e8ede95265eb62ef8cb9a78f674ae466c312b244c94179eb481d484911d52a8856d70f8026bac9048395c3a89237d9ce6cded4be93abab48e > > unpack using xzcat (extracts to a 10GB imagefile) > > launch using qemu-system-x86_64 imagefile > > or alternatively convert to virtualbox format using > > |VBoxManage convertfromraw $IMG $VDI > | and if you want chroot etc. # file -s sabotage-0.9.2-x86_64_5e7eda8.img sabotage-0.9.2-x86_64_5e7eda8.img: x86 boot sector; partition 1: ID=0x83, active, starthead 32, startsector 2048, 204800 sectors; partition 2: ID=0x83, starthead 223, startsector 206848, 20764672 sectors, code offset 0x31 # mkdir /mnt/sdb1 # mkdir /mnt/sdb2 # mount sabotage-0.9.2-x86_64_5e7eda8.img /mnt/sdb1 -o offset=$((2048*512)) # mount sabotage-0.9.2-x86_64_5e7eda8.img /mnt/sdb2 -o offset=$((206848*512)) Have fun! :) Daniel