> which /init..
Yes.
Is there a way to check that it (and busybox executable) is actually on the built image..? (My understanding is that this is the early rootfs - like initramfs on a PC Linux distro - and on these images, that's embedded in the KERNEL image file.) I tried the binwalk method of extraction, but for every xz file it finds in the KERNEL file, unxz reports it as corrupted.
Code
binwalk /mnt/LEcard/KERNEL
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
36 0x24 Linux kernel ARM boot executable zImage (little-endian), load address: "0x00000000", end address: "0x00855668"
82818 0x14382 SHA256 hash constants, little endian
1001768 0xF4928 Certificate in DER format (x509 v3), header length: 4, sequence length: 4688
4588447 0x46039F Certificate in DER format (x509 v3), header length: 4, sequence length: 773
5235356 0x4FE29C mcrypt 2.5 encrypted data, algorithm: "H", keysize: 3625 bytes, mode: "T",
5486560 0x53B7E0 xz compressed data
5563871 0x54E5DF Unix path: /505V/F505/F707/F717/P8(
6313659 0x6056BB Unix path: /usr/share/plymouth/splash.png
6314139 0x60589B Copyright string: "Copyright (c) 2018-2019 Cosmin Truta%"
6502906 0x6339FA Copyright string: "copyrighted by many authors between 1998-2015."
6519234 0x6379C2 xz compressed data
6579912 0x6466C8 ELF, 32-bit LSB processor-specific, no machine,
6850378 0x68874A Certificate in DER format (x509 v3), header length: 4, sequence length: 5384
7286238 0x6F2DDE ELF, 32-bit LSB processor-specific,
7543244 0x7319CC Certificate in DER format (x509 v3), header length: 4, sequence length: 9476
7864179 0x77FF73 Copyright string: "Copyright (C) 2019 Free Software Foundation, Inc."
8605147 0x834DDB Unix path: /virtual/graphics/fbcon/5
Display More