From f2339566b4ba8870833e0f3229190624c9205fb8 Mon Sep 17 00:00:00 2001 From: Cyteen Date: Wed, 15 Nov 2017 18:28:16 +0000 Subject: [PATCH] A utility script to extract the root filesystem from an sdcard image for use in mobile phone chroots. --- extract_chroot_image.sh | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 extract_chroot_image.sh diff --git a/extract_chroot_image.sh b/extract_chroot_image.sh new file mode 100644 index 0000000..71e38f6 --- /dev/null +++ b/extract_chroot_image.sh @@ -0,0 +1,33 @@ +# Extract an image from devuan released images for use in mobile phone chroots. + +# Fetch the image, for Samsung S4 we need a armhf image. +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_sunxi.img.xz +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_raspi2.img.xz +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_odroidxu.img.xz +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_n900.img.xz +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_chromeveyron.img.xz +#https://files.devuan.org/devuan_jessie/embedded/devuan_jessie_1.0.0_armhf_chromeacer.img.xz + +FILE_URL=https://files.devuan.org/devuan_jessie/embedded +XZIMAGE=$1|devuan_jessie_1.0.0_armhf_sunxi.img.xz +IMAGE=${XZIMAGE%\.*} + +wget -c ${FILE_URL}/${XZIMAGE} + +# uncompress +unxz ${XZIMAGE} + +# Mount the partitions +apt-get install -y kpartx + + kpartx -a -v ${IMAGE} + +TMP_MNT=/tmp/kpartx-mnt +mkdir -p ${TMP_MNT} + +mount /dev/mapper/loop0p2 ${TMP_MNT} + +tar czvf linux-rootfs.tar.gz -C ${TMP_MNT} . + +umount ${TMP_MNT} +rm ${IMAGE}