Please make sure the temporary system is already booted on the target machine. All commands in this chapter and the following chapters should be executed on the target machine instead of the host distro, unless the book explicitly says a command is for the host. Running a command for the temporary system on the host can completely destroy the host distro.
This chapter shows how to build the last missing bits of the temporary system: the tools needed to build the various packages. Now that all circular dependencies have been resolved and the temporary system is already bootable, we can boot it on the target machine and it would be completely isolated from the host operating system. Then we can continue to build on the target machine.
For proper operation of the temporary system, some communication with the running kernel must be established. This is done through the so-called Virtual Kernel File Systems, which will be mounted as soon as possible after boot. You may want to check that they are mounted by issuing mount.
All commands in this and following chapters are run as root
on the target system, fortunately without
access to the host system. Be careful anyway, as if the storage
devices of your target system already contains some important data,
it's possible to destroy them with bad commands.