[673b0d8] | 1 | <?xml version="1.0" encoding="ISO-8859-1"?>
|
---|
[b06ca36] | 2 | <!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
---|
| 3 | "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
|
---|
[673b0d8] | 4 | <!ENTITY % general-entities SYSTEM "../general.ent">
|
---|
| 5 | %general-entities;
|
---|
| 6 | ]>
|
---|
[d781ffb] | 7 |
|
---|
[ce335792] | 8 | <sect1 id="ch-tools-introduction-chroot">
|
---|
[d781ffb] | 9 | <?dbhtml filename="introduction.html"?>
|
---|
[673b0d8] | 10 |
|
---|
[d781ffb] | 11 | <title>Introduction</title>
|
---|
[81fd230] | 12 |
|
---|
[a626665d] | 13 | <warning>
|
---|
| 14 | <para>Please make sure the temporary system is already booted on the
|
---|
| 15 | target machine. All commands in this chapter and the following chapters
|
---|
| 16 | should be executed on the target machine instead of the host distro,
|
---|
| 17 | unless the book explicitly says a command is for the host. Running a
|
---|
| 18 | command for the temporary system on the host can completely destroy the
|
---|
| 19 | host distro.</para>
|
---|
| 20 | </warning>
|
---|
| 21 |
|
---|
[387a32af] | 22 | <para>This chapter shows how to build the last missing bits of the temporary
|
---|
[52ddd6c] | 23 | system: the tools needed to build the various packages. Now
|
---|
[febac51] | 24 | that all circular dependencies have been resolved and the temporary system
|
---|
| 25 | is already bootable, we can boot it on the target machine and it would be
|
---|
| 26 | completely isolated from the host operating system. Then we can continue
|
---|
| 27 | to build on the target machine.</para>
|
---|
[ce335792] | 28 |
|
---|
[febac51] | 29 | <para>For proper operation of the temporary system, some communication
|
---|
[ce335792] | 30 | with the running kernel must be established. This is done through the
|
---|
[a8f3814a] | 31 | so-called <emphasis>Virtual Kernel File Systems</emphasis>, which will be
|
---|
[febac51] | 32 | mounted as soon as possible after boot. You may want to check
|
---|
| 33 | that they are mounted by issuing <command>mount</command>.</para>
|
---|
[ce335792] | 34 |
|
---|
[b1df1d7] | 35 | <para>All commands in this and following chapters are run as &root; on the
|
---|
[febac51] | 36 | target system, fortunately without access to the host system.
|
---|
| 37 | Be careful anyway, as if the storage devices of your target system already
|
---|
[dd61c77] | 38 | contain some important data, it's possible to destroy them with bad
|
---|
| 39 | commands.</para>
|
---|
[cba2d4e] | 40 |
|
---|
[d781ffb] | 41 | </sect1>
|
---|