当前位置:网站首页>Openwrt source code generation image
Openwrt source code generation image
2022-07-06 16:07:00 【mrbone9】
The code download :
Update the latest package definition :
Install all packages :
Generate default profile :
Configure the system :
1. Target platform x86
2. install LuCI Tools
3. Compile the generated VM Usable .vmdk Image file
Compile code :
V=s Show the compilation process ,-j2 Compile with two threads , Speed up
Here I have changed it into Ubuntu20, Because of other projects
The final stage of compilation generates image An error occurred when , As before , To generate VM Finally, you need to use tools to convert the image of
The default time used here qemu-img To complete , But Ubuntu 20 It's a little different , Different from an earlier version
sudo apt-get install qemu Can be installed qemu All the relevant software , Cut into several packages for installation (mips For example ):
1. System level virtual machine ,sudo apt-get install qemu-system-mips
2. Process level virtual machine ,sudo apt-get install qemu-user
3. Tools , such as qemu-img,sudo apt-get install qemu-utils
Current error reporting :
therefore , We need to install :
Finally, generate the image file you need :
Subsequent operation in VM See Openwrt Image mount
边栏推荐
- E. Breaking the Wall
- 渗透测试 ( 3 ) --- Metasploit Framework ( MSF )
- Research Report of exterior wall insulation system (ewis) industry - market status analysis and development prospect prediction
- [exercise-2] (UVA 712) s-trees
- TCP's three handshakes and four waves
- C basic grammar
- 渗透测试 2 --- XSS、CSRF、文件上传、文件包含、反序列化漏洞
- 用C语言写网页游戏
- Truck History
- Flink 使用之 CEP
猜你喜欢
Web based photo digital printing website
Penetration test (3) -- Metasploit framework (MSF)
[analysis of teacher Gao's software needs] collection of exercises and answers for level 20 cloud class
Gartner:关于零信任网络访问最佳实践的五个建议
渗透测试 ( 3 ) --- Metasploit Framework ( MSF )
[exercise-5] (UVA 839) not so mobile (balance)
Borg maze (bfs+ minimum spanning tree) (problem solving report)
滲透測試 ( 1 ) --- 必備 工具、導航
Information security - Epic vulnerability log4j vulnerability mechanism and preventive measures
[exercise-7] crossover answers
随机推荐
[exercise-7] crossover answers
双向链表—全部操作
对iptables进行常规操作
B - Code Party (girls' competition)
Essai de pénétration (1) - - outils nécessaires, navigation
TCP's three handshakes and four waves
Matlab comprehensive exercise: application in signal and system
Research Report on surgical fluid treatment industry - market status analysis and development prospect prediction
【练习-7】(Uva 10976)Fractions Again?!(分数拆分)
Research Report of peripheral venous catheter (pivc) industry - market status analysis and development prospect prediction
MySQL授予用户指定内容的操作权限
Ball Dropping
STM32 learning record: LED light flashes (register version)
【练习-7】Crossword Answers
Information security - Epic vulnerability log4j vulnerability mechanism and preventive measures
Optimization method of path problem before dynamic planning
树莓派4B安装opencv3.4.0
[exercise -10] unread messages
Research Report on shell heater industry - market status analysis and development prospect forecast
想应聘程序员,您的简历就该这样写【精华总结】