LINUX.ORG.RU

История изменений

Исправление punya, (текущая версия) :

там в мануале вот такое написано

First, a virtual file system view is presented to the applications. In practise that means that the file names (paths) which an application uses may be modified before the OS does its operations; applications observe a different file system that what the real file system is. For example, common directories like /bin, /usr/lib and /lib can be changed to point to target-specific directories, which contain files for a different CPU architecture than what the host has.

Second, scratchbox2 makes execution of foreign binaries completely transparent. Target's binaries can be executed on the host just as if they were host's binaries; scratchbox2 will start a CPU transparency method automatically whenever needed (Qemu is typically used for this).

The result is that the development machine appears as a virtual target system to the software development tools, and complex tools (like GNU Autotools) can be used directly.

Scratchbox2 works by intercepting library calls of dynamically linked binaries. It uses a flexible and highly configurable rule engine, when deciding when, what, and how to modify parameters of the intercepted calls; this is completely transparent to the users and applications.

Scratchbox2 2 does not need any special privileges or kernel-level services; it is completely based on features that are available for all ordinary users.

эта штука делает то, что делает chroot, но независимо от ядра. плюс несколько интересных фич. я всетаки предпочитаю chroot. =)

Исходная версия punya, :

там в мануале вот такое написано

First, a virtual file system view is presented to the applications. In practise that means that the file names (paths) which an application uses may be modified before the OS does its operations; applications observe a different file system that what the real file system is. For example, common directories like /bin, /usr/lib and /lib can be changed to point to target-specific directories, which contain files for a different CPU architecture than what the host has.

Second, scratchbox2 makes execution of foreign binaries completely transparent. Target's binaries can be executed on the host just as if they were host's binaries; scratchbox2 will start a CPU transparency method automatically whenever needed (Qemu is typically used for this).

The result is that the development machine appears as a virtual target system to the software development tools, and complex tools (like GNU Autotools) can be used directly.

Scratchbox2 works by intercepting library calls of dynamically linked binaries. It uses a flexible and highly configurable rule engine, when deciding when, what, and how to modify parameters of the intercepted calls; this is completely transparent to the users and applications.

Scratchbox2 2 does not need any special privileges or kernel-level services; it is completely based on features that are available for all ordinary users.

эта штука делает то, что делает chroot, но независимо от ядра. плюс несколько интересных фич. я всетаки предпочитаю chroot.