source: chapter07/introduction.xml@ a626665d

xry111/clfs-ng
Last change on this file since a626665d was a626665d, checked in by Xi Ruoyao <xry111@…>, 9 months ago

cross-ng: final documentation change before pushing

  • Property mode set to 100644
File size: 1.8 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../general.ent">
5 %general-entities;
6]>
7
8<sect1 id="ch-tools-introduction-chroot">
9 <?dbhtml filename="introduction.html"?>
10
11 <title>Introduction</title>
12
13 <warning>
14 <para>Please make sure the temporary system is already booted on the
15 target machine. All commands in this chapter and the following chapters
16 should be executed on the target machine instead of the host distro,
17 unless the book explicitly says a command is for the host. Running a
18 command for the temporary system on the host can completely destroy the
19 host distro.</para>
20 </warning>
21
22 <para>This chapter shows how to build the last missing bits of the temporary
23 system: the tools needed by the build machinery of various packages. Now
24 that all circular dependencies have been resolved and the temporary system
25 is already bootable, we can boot it on the target machine and it would be
26 completely isolated from the host operating system. Then we can continue
27 to build on the target machine.</para>
28
29 <para>For proper operation of the temporary system, some communication
30 with the running kernel must be established. This is done through the
31 so-called <emphasis>Virtual Kernel File Systems</emphasis>, which must be
32 mounted as soon as possible after boot. You may want to check
33 that they are mounted by issuing <command>mount</command>.</para>
34
35 <para>All commands in this and following chapters are run as root on the
36 target system, fortunately without access to the host system.
37 Be careful anyway, as if the storage devices of your target system already
38 contain some important data, it's possible to destroy them with badly
39 formed commands.</para>
40
41</sect1>
Note: See TracBrowser for help on using the repository browser.