From: Michael R. <mc...@sa...> - 2005-01-12 16:55:11
|
-----BEGIN PGP SIGNED MESSAGE----- >>>>> "Blaisorblade" == Blaisorblade <bla...@ya...> writes: Rob> Chapter 5 of current variants of LFS uses the host system to Rob> create a toolchain you can chroot into and build the final Rob> system with. Then in chapter 6, you build the final system in >> I think the use of chroot is a cop-out. Rob> This requires root access (as does creating device nodes, Rob> mounting /proc or loopback devices... A rather large number of >> I use "fakeroot" to do all of that for embedded work that I do... Blaisorblade> What's this? A tool which LD_PRELOAD's a library that intercepts all calls that require root, and "emulates" them. I.e. if a program does "chown(2)", it just remembers that this occured, and when a stat() is made, it returns the "right" answer. (so tar/mkjffs, etc. get the right answer) Used in debian a lot. http://packages.debian.org/testing/utils/fakeroot Blaisorblade> Yes, that's because it turns the console to raw mode (don't ask me why). Because, you'd like to have ^C get passed to the program being run under the UML :-) - -- ] Michael Richardson Xelerance Corporation, Ottawa, ON | firewalls [ ] mcr @ xelerance.com Now doing IPsec training, see |net architect[ ] http://www.sandelman.ca/mcr/ www.xelerance.com/training/ |device driver[ ] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Finger me for keys iQCVAwUBQeVWY4qHRg3pndX9AQEH/wQA1Hkp7/41q61Oh4razESw6WHAmLMiXseB I8TGHI10/o55F8iqN0ePZHOzKFnOxw75/8J10RiPdTWWGnqn3wUh3Fx4LXyzG0Hy /T/YWIErJwc8G7Y5aJrltehTHdtudEKei0Wei99EiCo65JPczSVBY8ZHFYae/wLR 2ueRvZlyZzs= =VIrB -----END PGP SIGNATURE----- |