aboutsummaryrefslogtreecommitdiff
path: root/templates/custom.cfg
diff options
context:
space:
mode:
Diffstat (limited to 'templates/custom.cfg')
-rw-r--r--templates/custom.cfg64
1 files changed, 58 insertions, 6 deletions
diff --git a/templates/custom.cfg b/templates/custom.cfg
index ffb1401..088ac0c 100644
--- a/templates/custom.cfg
+++ b/templates/custom.cfg
@@ -5,9 +5,27 @@ set menu_color_normal=white/blue
set menu_color_highlight=yellow/red
#
-# Example: imagens stored in the USB stick: just put your images under custom/debian/images.
+# Example: Darkstar with preloaded images:
#
-menuentry 'Example: Darkstar' {
+# - Images stored in the USB stick.
+# - Place your images under custom/debian/images.
+#
+menuentry 'Example: Darkstar using preloaded images' {
+ # This loads the kernel and initramfs using images preloaded into the USB stick.
+ echo "Loading ${volume}..."
+ linux /boot/custom/debian/vmlinuz-3.16.0-4-amd64 root=/dev/mapper/root cryptopts=target=root,source=/dev/mapper/darkstar-root ro quiet
+ echo 'Loading initial ramdisk ...'
+ initrd /boot/custom/debian/initrd.img-3.16.0-4-amd64
+}
+
+#
+# Example: Darkstar with preloaded images and bootimg function:
+#
+# - Images stored in the USB stick.
+# - Place your images under custom/debian/images.
+# - Boots using bootimg function.
+#
+menuentry 'Example: Darkstar using preloaded images and bootimg function' {
set volume=/dev/sda5
set version=3.16.0-4-amd64
set target=sda5_crypt
@@ -17,16 +35,47 @@ menuentry 'Example: Darkstar' {
}
#
-# Example: Full Disk Encryption: images are loaded from encrypted partition.
+# Example: Darkstar with Full Disk Encryption:
+#
+# - Images are loaded directly from encrypted partition.
#
-menuentry 'Example: Darkstar FDE' {
+menuentry 'Example: Darkstar usin Full Disk Encryption' {
+ # Loads luks and lvm modules so you can access kernel
+ # and initrd from inside your encrypted OS!
+ insmod luks
+ insmod lvm
+
+ # This opens the encrypted volume /dev/mapper/darkstar-root
+ # and sets it as the root in the grub shell.
+ cryptomount lvm/darkstar-root
+ set root=(crypto0)
+
+ # This loads the kernel and initramfs
+ echo "Loading ${volume}..."
+ linux /boot/vmlinuz-3.16.0-4-amd64 root=/dev/mapper/root cryptopts=target=root,source=/dev/mapper/darkstar-root ro quiet
+ echo 'Loading initial ramdisk ...'
+ initrd /boot/initrd.img-3.16.0-4-amd64
+}
+
+#
+# Example: Darkstar with Full Disk Encryption and bootfde function:
+#
+# - Images are loaded directly from encrypted partition.
+# - Boots using bootfde function.
+#
+menuentry 'Example: Darkstar usin Full Disk Encryption and bootfe function' {
set volume=darkstar
set version=3.16.0-4-amd64
bootfde ${volume} ${version}
}
#
-# Example: Debian Jessie default whole encrypted install with preloaded images.
+# Example: Debian Jessie default whole encrypted install with preloaded images:
+#
+# - Boots a Debian system that was installed using LVM atop LUKS (default crypt install).
+# - Images stored in the USB stick.
+# - Place your images under custom/debian/images.
+# - Boots using bootimg function.
#
menuentry 'Custom: Jessie with pre-loaded images' {
set volume=UUID=00000000-0000-0000-0000-000000000000
@@ -38,7 +87,10 @@ menuentry 'Custom: Jessie with pre-loaded images' {
}
#
-# Example: Debian Jessie default whole encrypted install with Full Disk Encryption.
+# Example: Debian Jessie default whole encrypted install with Full Disk Encryption:
+#
+# - Boots a Debian system that was installed using LVM atop LUKS (default crypt install).
+# - Images are loaded directly from encrypted partition.
#
menuentry 'Custom: Jessie with Full Disk Encryption' {
set volume=00000000000000000000000000000000