1 | <?xml version="1.0" encoding="ISO-8859-1"?>
|
---|
2 | <!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
---|
3 | "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
|
---|
4 | <!ENTITY % general-entities SYSTEM "../general.ent">
|
---|
5 | %general-entities;
|
---|
6 | ]>
|
---|
7 |
|
---|
8 | <sect1 id="ch-tools-introduction-chroot">
|
---|
9 | <?dbhtml filename="introduction.html"?>
|
---|
10 |
|
---|
11 | <title>Introduction</title>
|
---|
12 |
|
---|
13 | <warning>
|
---|
14 | <para>Please make sure the temporary system is already booted on the
|
---|
15 | target machine. All commands in this chapter and the following chapters
|
---|
16 | should be executed on the target machine instead of the host distro,
|
---|
17 | unless the book explicitly says a command is for the host. Running a
|
---|
18 | command for the temporary system on the host can completely destroy the
|
---|
19 | host distro.</para>
|
---|
20 | </warning>
|
---|
21 |
|
---|
22 | <para>This chapter shows how to build the last missing bits of the temporary
|
---|
23 | system: the tools needed by the build machinery of various packages. Now
|
---|
24 | that all circular dependencies have been resolved and the temporary system
|
---|
25 | is already bootable, we can boot it on the target machine and it would be
|
---|
26 | completely isolated from the host operating system. Then we can continue
|
---|
27 | to build on the target machine.</para>
|
---|
28 |
|
---|
29 | <para>For proper operation of the temporary system, some communication
|
---|
30 | with the running kernel must be established. This is done through the
|
---|
31 | so-called <emphasis>Virtual Kernel File Systems</emphasis>, which must be
|
---|
32 | mounted as soon as possible after boot. You may want to check
|
---|
33 | that they are mounted by issuing <command>mount</command>.</para>
|
---|
34 |
|
---|
35 | <para>All commands in this and following chapters are run as root on the
|
---|
36 | target system, fortunately without access to the host system.
|
---|
37 | Be careful anyway, as if the storage devices of your target system already
|
---|
38 | contain some important data, it's possible to destroy them with badly
|
---|
39 | formed commands.</para>
|
---|
40 |
|
---|
41 | </sect1>
|
---|