decorate usernames with <systemitem>

git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@12071 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
This commit is contained in:
Xi Ruoyao 2020-12-26 15:51:54 +00:00
parent ce9b68d158
commit 34fe7e07cd
8 changed files with 31 additions and 18 deletions

View File

@ -57,7 +57,8 @@
host system. If logging in through a graphical display manager, the
user's <filename>.bash_profile</filename> is not normally used when
a virtual terminal is started. In this case, add the export command to
the <filename>.bashrc</filename> file for the user and root. In addition,
the <filename>.bashrc</filename> file for the user and
<systemitem class="username">root</systemitem>. In addition,
some distributions have instructions to not run the <filename>.bashrc</filename>
instructions in a non-interactive bash invocation. Be sure to add the
export command before the test for non-interactive use.</para>

View File

@ -25,9 +25,10 @@
<itemizedlist>
<listitem>
<para>Procedures done as the root user after Section 2.4 need to
have the LFS environment variable set <emphasis>FOR THE ROOT
USER</emphasis>.</para>
<para>Procedures done as the
<systemitem class="username">root</systemitem> user after Section
2.4 need to have the LFS environment variable set
<emphasis>FOR THE ROOT USER</emphasis>.</para>
</listitem>
</itemizedlist>
</sect2>
@ -41,7 +42,8 @@
</listitem>
<listitem>
<para>Threse two chapters must be done as user <emphasis>lfs</emphasis>.
<para>These two chapters <emphasis>must</emphasis> be done as user
<systemitem class="username">lfs</systemitem>.
A <command>su - lfs</command> needs to be done before any task in these
chapters. Failing to do that, you are at risk of installing packages to the
host, and potentially rendering it unusable.</para>
@ -68,18 +70,22 @@
<listitem>
<para>A few operations, from <quote>Changing Ownership</quote> to
<quote>Entering the Chroot Environment</quote> must be done as the
root user, with the LFS environment variable set for the root user.</para>
<systemitem class="username">root</systemitem> user, with the LFS
environment variable set for the
<systemitem class="username">root</systemitem>user.</para>
</listitem>
<listitem>
<para> When entering chroot, the LFS environment variable must be set
for root. The LFS variable is not used afterwards.</para>
for <systemitem class="username">root</systemitem>. The LFS
variable is not used afterwards.</para>
</listitem>
<listitem>
<para> The virtual file systems must be mounted. This can be done
before or after entering chroot by changing to a host virtual terminal
and, as root, running the commands in
and, as <systemitem class="username">root</systemitem>, running the
commands in
<xref linkend='ch-tools-bindmount'/> and
<xref linkend='ch-tools-kernfsmount'/>.</para>
</listitem>

View File

@ -147,10 +147,11 @@ cd build</userinput></screen>
<para>Install the package:</para>
<warning><para>If <envar>LFS</envar> is not properly set, and despite the
recommendations, you are building as root, the next command will install
the newly built glibc to your host system, which most likely will render it
unusable. So double check that the environment is correctly set for user
<systemitem class="username">lfs</systemitem>.</para></warning>
recommendations, you are building as
<systemitem class="username">root</systemitem>, the next command will
install the newly built glibc to your host system, which most likely
will render it unusable. So double check that the environment is
correctly set, before running the following command.</para></warning>
<screen><userinput remap="install">make DESTDIR=$LFS install</userinput></screen>

View File

@ -22,7 +22,8 @@
independent of the host system yet.</para>
<para>Once again, let us recall that improper setting of <envar>LFS</envar>
together with building as root, may render your computer unusable.
together with building as <systemitem class="username">root</systemitem>,
may render your computer unusable.
This whole chapter must be done as user <systemitem
class="username">lfs</systemitem>, with the environment as described in
<xref linkend="ch-preps-settingenviron"/>.</para>

View File

@ -87,7 +87,7 @@ FORCE_UNSAFE_CONFIGURE=1 ./configure \
<term><envar>FORCE_UNSAFE_CONFIGURE=1</envar></term>
<listitem>
<para>This environment variable allows the package to be
built as the root user.
built as the <systemitem class="username">root</systemitem> user.
</para>
</listitem>
</varlistentry>

View File

@ -56,8 +56,10 @@
<term><envar>FORCE_UNSAFE_CONFIGURE=1</envar></term>
<listitem>
<para>This forces the test for <function>mknod</function> to be run
as root. It is generally considered dangerous to run this test as
the root user, but as it is being run on a system that has only been
as <systemitem class="username">root</systemitem>.
It is generally considered dangerous to run this test as
the <systemitem class="username">root</systemitem> user, but as it
is being run on a system that has only been
partially built, overriding it is OK.</para>
</listitem>
</varlistentry>

View File

@ -88,7 +88,8 @@
<para>If desired, run the test suite as a non-root user:</para>
<warning><para>Running the test suite as the root user can be harmful to
<warning><para>Running the test suite as the
<systemitem class="username">root</systemitem> user can be harmful to
your system. To run it, the CONFIG_SCSI_DEBUG option for the kernel must
be available in the currently running system and must be built as a
module. Building it into the kernel will prevent booting. For complete

View File

@ -41,7 +41,8 @@ TTYVTDisallocate=no</literal>
EOF</userinput></screen>
<para>The boot messages can always be reviewed by using the
<userinput>journalctl -b</userinput> command as the root user.</para>
<userinput>journalctl -b</userinput> command as the
<systemitem class="username">root</systemitem> user.</para>
</sect2>