aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--barebones.mdwn32
1 files changed, 30 insertions, 2 deletions
diff --git a/barebones.mdwn b/barebones.mdwn
index b66cbcb..fec68d2 100644
--- a/barebones.mdwn
+++ b/barebones.mdwn
@@ -20,7 +20,7 @@ Example: Full Disk Encryption
Here is an example of a Full Disk Encryption with an entry loaded into `custom.cfg`:
- menuentry darkstar {
+ menuentry 'darkstar full disk encryption' {
# Loads luks and lvm modules so you can access kernel
# and initrd from inside your encrypted OS!
insmod luks
@@ -45,10 +45,38 @@ You may also place custom images into the USB stick -- with the drawback to have
cp -r /boot /tmp/bootless/custom/debian
- menuentry darkstar {
+ menuentry 'darkstar: preloaded images' {
# This loads the kernel and initramfs using images preloaded into the USB stick.
echo "Loading ${volume}..."
linux /boot/custom/debian/vmlinuz-3.16.0-4-amd64 root=/dev/mapper/root cryptopts=target=root,source=/dev/mapper/darkstar-root ro quiet
echo 'Loading initial ramdisk ...'
initrd /boot/custom/debian/initrd.img-3.16.0-4-amd64
}
+
+Example: builtin bootless functions
+-----------------------------------
+
+The supplied configuration provides two functions, `bootfde` and `bootimg` that simplify the two previous examples into:
+
+ menuentry 'darkstar: full disk encryption' {
+ bootfde darkstar-root
+ }
+
+ menuentry 'darkstar: preloaded images' {
+ bootimg darkstar-root
+ }
+
+Create a bootable image
+-----------------------
+
+ grub-mkrescue -o output.img /tmp/bootless
+
+Record the image into the USB stick
+-----------------------------------
+
+*WARNING!* This will irrevocably replace the contents of your USB stick.
+
+Pay attention to get the right device. If your USB stick is attached to
+your computer and reachable through `/dev/sdb`, you just have to run
+
+ sudo dd if=output.img of=/dev/sdb