xry111/clfs-ng
Last change
on this file since febac51 was febac51, checked in by Xi Ruoyao <xry111@…>, 2 years ago |
cross-ng: chapter 7: adjust introduction for cross build
|
-
Property mode
set to
100644
|
File size:
1.4 KB
|
Rev | Line | |
---|
[673b0d8] | 1 | <?xml version="1.0" encoding="ISO-8859-1"?>
|
---|
[b06ca36] | 2 | <!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
---|
| 3 | "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
|
---|
[673b0d8] | 4 | <!ENTITY % general-entities SYSTEM "../general.ent">
|
---|
| 5 | %general-entities;
|
---|
| 6 | ]>
|
---|
[d781ffb] | 7 |
|
---|
[ce335792] | 8 | <sect1 id="ch-tools-introduction-chroot">
|
---|
[d781ffb] | 9 | <?dbhtml filename="introduction.html"?>
|
---|
[673b0d8] | 10 |
|
---|
[d781ffb] | 11 | <title>Introduction</title>
|
---|
[81fd230] | 12 |
|
---|
[387a32af] | 13 | <para>This chapter shows how to build the last missing bits of the temporary
|
---|
[305c970] | 14 | system: the tools needed by the build machinery of various packages. Now
|
---|
[febac51] | 15 | that all circular dependencies have been resolved and the temporary system
|
---|
| 16 | is already bootable, we can boot it on the target machine and it would be
|
---|
| 17 | completely isolated from the host operating system. Then we can continue
|
---|
| 18 | to build on the target machine.</para>
|
---|
[ce335792] | 19 |
|
---|
[febac51] | 20 | <para>For proper operation of the temporary system, some communication
|
---|
[ce335792] | 21 | with the running kernel must be established. This is done through the
|
---|
| 22 | so-called <emphasis>Virtual Kernel File Systems</emphasis>, which must be
|
---|
[febac51] | 23 | mounted as soon as possible after boot. You may want to check
|
---|
| 24 | that they are mounted by issuing <command>mount</command>.</para>
|
---|
[ce335792] | 25 |
|
---|
[febac51] | 26 | <para>All commands in this and following chapters are run as root on the
|
---|
| 27 | target system, fortunately without access to the host system.
|
---|
| 28 | Be careful anyway, as if the storage devices of your target system already
|
---|
| 29 | contain some important data, it's possible to destroy them with badly
|
---|
| 30 | formed commands.</para>
|
---|
[cba2d4e] | 31 |
|
---|
[d781ffb] | 32 | </sect1>
|
---|
Note:
See
TracBrowser
for help on using the repository browser.