# # Menu appearance # set menu_color_normal=white/blue set menu_color_highlight=yellow/red # # Example: imagens stored in the USB stick: just put your images under custom/debian/images. # menuentry 'Example: Darkstar' { set volume=/dev/sda5 set version=3.16.0-4-amd64 set target=sda5_crypt set rootfs=darkstar--vg-root set distro=debian bootimg ${volume} ${version} ${source} ${target} ${distro} } # # Example: Full Disk Encryption: images are loaded from encrypted partition. # menuentry 'Example: Darkstar FDE' { set volume=darkstar set version=3.16.0-4-amd64 bootfde ${volume} ${version} } # # Example: Debian Jessie default whole encrypted install with preloaded images. # menuentry 'Custom: Jessie with pre-loaded images' { set volume=UUID=00000000-0000-0000-0000-000000000000 set version=3.16.0-4-amd64 set target=sda5_crypt set rootfs=jessie--vg-root set distro=debian bootimg ${volume} ${version} ${target} ${rootfs} ${distro} } # # Example: Debian Jessie default whole encrypted install with Full Disk Encryption. # menuentry 'Custom: Jessie with Full Disk Encryption' { set volume=00000000000000000000000000000000 set uuid=00000000-0000-0000-0000-000000000000 set version=3.16.0-4-amd64 set target=sda5_crypt set rootfs=jessie--vg-root # Loads luks module you can access kernel and initrd from # the inside your encrypted OS! insmod luks # This opens the encrypted volume /dev/mapper/darkstar-root # and sets it as the root in the grub shell. cryptomount -u ${volume} # Load the LVM module just after loading the encrypted volume # so Grub can detect volumes that are inside it. insmod lvm set root=lvm/${rootfs} # This loads the kernel and initramfs echo "Loading ${volume}..." linux /boot/vmlinuz-${version} root=/dev/mapper/${rootfs} cryptopts=target=${target},source=UUID=${uuid} ro quiet echo 'Loading initial ramdisk ...' initrd /boot/initrd.img-${version} }