From 137f0d20630bc840fac94ee3cb1d1568bf09520d Mon Sep 17 00:00:00 2001 From: Silvio Rhatto Date: Sun, 3 Jul 2016 10:54:46 -0300 Subject: Completes the barebones approach --- barebones.mdwn | 32 ++++++++++++++++++++++++++++++-- 1 file changed, 30 insertions(+), 2 deletions(-) diff --git a/barebones.mdwn b/barebones.mdwn index b66cbcb..fec68d2 100644 --- a/barebones.mdwn +++ b/barebones.mdwn @@ -20,7 +20,7 @@ Example: Full Disk Encryption Here is an example of a Full Disk Encryption with an entry loaded into `custom.cfg`: - menuentry darkstar { + menuentry 'darkstar full disk encryption' { # Loads luks and lvm modules so you can access kernel # and initrd from inside your encrypted OS! insmod luks @@ -45,10 +45,38 @@ You may also place custom images into the USB stick -- with the drawback to have cp -r /boot /tmp/bootless/custom/debian - menuentry darkstar { + menuentry 'darkstar: preloaded images' { # This loads the kernel and initramfs using images preloaded into the USB stick. echo "Loading ${volume}..." linux /boot/custom/debian/vmlinuz-3.16.0-4-amd64 root=/dev/mapper/root cryptopts=target=root,source=/dev/mapper/darkstar-root ro quiet echo 'Loading initial ramdisk ...' initrd /boot/custom/debian/initrd.img-3.16.0-4-amd64 } + +Example: builtin bootless functions +----------------------------------- + +The supplied configuration provides two functions, `bootfde` and `bootimg` that simplify the two previous examples into: + + menuentry 'darkstar: full disk encryption' { + bootfde darkstar-root + } + + menuentry 'darkstar: preloaded images' { + bootimg darkstar-root + } + +Create a bootable image +----------------------- + + grub-mkrescue -o output.img /tmp/bootless + +Record the image into the USB stick +----------------------------------- + +*WARNING!* This will irrevocably replace the contents of your USB stick. + +Pay attention to get the right device. If your USB stick is attached to +your computer and reachable through `/dev/sdb`, you just have to run + + sudo dd if=output.img of=/dev/sdb -- cgit v1.2.3