diff options
-rw-r--r-- | barebones.mdwn | 32 |
1 files changed, 30 insertions, 2 deletions
diff --git a/barebones.mdwn b/barebones.mdwn index b66cbcb..fec68d2 100644 --- a/barebones.mdwn +++ b/barebones.mdwn @@ -20,7 +20,7 @@ Example: Full Disk Encryption Here is an example of a Full Disk Encryption with an entry loaded into `custom.cfg`: - menuentry darkstar { + menuentry 'darkstar full disk encryption' { # Loads luks and lvm modules so you can access kernel # and initrd from inside your encrypted OS! insmod luks @@ -45,10 +45,38 @@ You may also place custom images into the USB stick -- with the drawback to have cp -r /boot /tmp/bootless/custom/debian - menuentry darkstar { + menuentry 'darkstar: preloaded images' { # This loads the kernel and initramfs using images preloaded into the USB stick. echo "Loading ${volume}..." linux /boot/custom/debian/vmlinuz-3.16.0-4-amd64 root=/dev/mapper/root cryptopts=target=root,source=/dev/mapper/darkstar-root ro quiet echo 'Loading initial ramdisk ...' initrd /boot/custom/debian/initrd.img-3.16.0-4-amd64 } + +Example: builtin bootless functions +----------------------------------- + +The supplied configuration provides two functions, `bootfde` and `bootimg` that simplify the two previous examples into: + + menuentry 'darkstar: full disk encryption' { + bootfde darkstar-root + } + + menuentry 'darkstar: preloaded images' { + bootimg darkstar-root + } + +Create a bootable image +----------------------- + + grub-mkrescue -o output.img /tmp/bootless + +Record the image into the USB stick +----------------------------------- + +*WARNING!* This will irrevocably replace the contents of your USB stick. + +Pay attention to get the right device. If your USB stick is attached to +your computer and reachable through `/dev/sdb`, you just have to run + + sudo dd if=output.img of=/dev/sdb |