Changeset febac51 for chapter07/introduction.xml
- Timestamp:
- 02/26/2022 03:43:11 PM (2 years ago)
- Branches:
- xry111/clfs-ng
- Children:
- ae636e7
- Parents:
- fa7acfc
- git-author:
- Xi Ruoyao <xry111@…> (08/25/2021 05:30:13 AM)
- git-committer:
- Xi Ruoyao <xry111@…> (02/26/2022 03:43:11 PM)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
chapter07/introduction.xml
rfa7acfc rfebac51 13 13 <para>This chapter shows how to build the last missing bits of the temporary 14 14 system: the tools needed by the build machinery of various packages. Now 15 that all circular dependencies have been resolved, a <quote>chroot</quote> 16 environment, completely isolated from the host operating system (except for 17 the running kernel), can be used for the build.</para> 15 that all circular dependencies have been resolved and the temporary system 16 is already bootable, we can boot it on the target machine and it would be 17 completely isolated from the host operating system. Then we can continue 18 to build on the target machine.</para> 18 19 19 <para>For proper operation of the isolated environment, some communication20 <para>For proper operation of the temporary system, some communication 20 21 with the running kernel must be established. This is done through the 21 22 so-called <emphasis>Virtual Kernel File Systems</emphasis>, which must be 22 mounted when entering the chroot environment. You may want to check23 that they are mounted by issuing <command> findmnt</command>.</para>23 mounted as soon as possible after boot. You may want to check 24 that they are mounted by issuing <command>mount</command>.</para> 24 25 25 <para>Until <xref linkend="ch-tools-chroot"/>, the commands must be 26 run as <systemitem class="username">root</systemitem>, with the 27 <envar>LFS</envar> variable set. After entering chroot, all commands 28 are run as root, fortunately without access to the OS of the computer 29 you built LFS on. Be careful anyway, as it is easy to destroy the whole 30 LFS system with badly formed commands.</para> 26 <para>All commands in this and following chapters are run as root on the 27 target system, fortunately without access to the host system. 28 Be careful anyway, as if the storage devices of your target system already 29 contain some important data, it's possible to destroy them with badly 30 formed commands.</para> 31 31 32 32 </sect1>
Note:
See TracChangeset
for help on using the changeset viewer.