Instructions to help you setup libreboot grub.cfg (grubtest.cfg) when you don’t use full disk encryption.
Libreboot grub.cfg without hard disk Encryption
Why wouldn’t I use hard disk encryption with libreboot?
I had set up my Thinkpad X200 previously with full disk encryption, then moved on to other tinkering. Months later I decided that I wanted to use this sweet little laptop, and had forgotten the encryption passphrase, rendering this laptop useless.
I didn’t want to make the same mistake, so installed the OS without encryption. The libreboot documentation was awesome for encrypted systems, but I had to monkey around with the grub.cfg to get it to work.
Once I had the OS installed, it was trivial to use the “search partitions for grub.cfg” and boot the OS, but I wanted it to boot into the OS without me selecting anything, by default.
I was pleasantly surprised that commands like “ls” and “cat” worked from grub, after properly setting the root variable and “insmod ext2”.
grub.cfg (or grubtest.cfg)
Libreboot documentation shows this grub.cfg (or grubtest.cfg) for an encrypted system. (Source)
linux /vmlinuz root=/dev/mapper/matrix-rootvolcryptdevice=/dev/mapper/matrix-rootvol:root
I didn’t use encryption so I had to modify grub.cfg (or grubtest.cfg) like this (Your drive’s UUID will be different, so you’ll need to boot into your OS).
linux /vmlinuz root=UUID=f253c5ae-54e6-485b-a3ab-534a35faf536
Was this helpful?
If you found my posts interesting, or I helped you figure something out, please consider tossing me a tiny gratuity for my time, research, to help offset the web hosting/development costs or to buy me a cup of coffee.
* This post may contain affiliate links. This means that I “might” receive a tiny amount of money, if you make a purchase using one of our links. It does not cost you anything extra, and helps us defray the costs of hosting and maintaining this site.