Ignore:
Timestamp:
02/26/2022 03:43:11 PM (2 years ago)
Author:
Xi Ruoyao <xry111@…>
Branches:
xry111/clfs-ng
Children:
ae636e7
Parents:
fa7acfc
git-author:
Xi Ruoyao <xry111@…> (08/25/2021 05:30:13 AM)
git-committer:
Xi Ruoyao <xry111@…> (02/26/2022 03:43:11 PM)
Message:

cross-ng: chapter 7: adjust introduction for cross build

File:
1 edited

Legend:

Unmodified
Added
Removed
  • chapter07/introduction.xml

    rfa7acfc rfebac51  
    1313  <para>This chapter shows how to build the last missing bits of the temporary
    1414  system: the tools needed by the build machinery of various packages.  Now
    15   that all circular dependencies have been resolved, a <quote>chroot</quote>
    16   environment, completely isolated from the host operating system (except for
    17   the running kernel), can be used for the build.</para>
     15  that all circular dependencies have been resolved and the temporary system
     16  is already bootable, we can boot it on the target machine and it would be
     17  completely isolated from the host operating system.  Then we can continue
     18  to build on the target machine.</para>
    1819
    19   <para>For proper operation of the isolated environment, some communication
     20  <para>For proper operation of the temporary system, some communication
    2021  with the running kernel must be established. This is done through the
    2122  so-called <emphasis>Virtual Kernel File Systems</emphasis>, which must be
    22   mounted when entering the chroot environment. You may want to check
    23   that they are mounted by issuing <command>findmnt</command>.</para>
     23  mounted as soon as possible after boot. You may want to check
     24  that they are mounted by issuing <command>mount</command>.</para>
    2425
    25   <para>Until <xref linkend="ch-tools-chroot"/>, the commands must be
    26   run as <systemitem class="username">root</systemitem>, with the
    27   <envar>LFS</envar> variable set. After entering chroot, all commands
    28   are run as root, fortunately without access to the OS of the computer
    29   you built LFS on. Be careful anyway, as it is easy to destroy the whole
    30   LFS system with badly formed commands.</para>
     26  <para>All commands in this and following chapters are run as root on the
     27  target system, fortunately without access to the host system.
     28  Be careful anyway, as if the storage devices of your target system already
     29  contain some important data, it's possible to destroy them with badly
     30  formed commands.</para>
    3131
    3232</sect1>
Note: See TracChangeset for help on using the changeset viewer.