Can I customize the GRUB loader to display name?

I’ve tried sticking labels on my laptop in case it is lost & found, but with the heat the detach themselves. So I’m wondering if I could put a message at load time. What I get first is a prompt to type in the local drive’s LUKS password. Is it possible, and how?

$ ls /boot/grub
fonts  grub.cfg  grubenv  i386-pc  locale  themes

Not with LUKS at least. No one would see a message you stick into the bootloader, because LUKS comes first.

rEFInd allows you to set a custom background, plus AFAIK it doesn’t ask for LUKS decryption right away. It’s (rEFInd) not really useful outside of dual booting though.

exactly what @yum13241 says… if grub and “full disk encryption” is used… it will first shoe only thjat password prompzt and after this it loads the grub menu… if ypou would use unenvcrypted /boot partition it would show the grub screen without the need to put password… and there you would be able to set a title over the menu… including email adress or phone number…

@ yum13241 went a step further by saying rEFInd would meet the stated goal. Did I understand it wrong? (I plan to investigate it, but haven’t had time yet).

Latop #2:

$ sudo dmesg | grep -i EFI
[sudo] password for erw1: 
[    0.000000] efi: EFI v2.50 by American Megatrends
[    0.000000] efi: ACPI=0x77720000 ACPI 2.0=0x77720000 SMBIOS=0xf05e0 TPMFinalLog=0x77800000 ESRT=0x77d2e018 SMBIOS 3.0=0xf0600 
[    0.000000] efi: Remove mem39: MMIO range=[0xd0000000-0xd0ffffff] (16MB) from e820 map
[    0.000000] efi: Remove mem40: MMIO range=[0xe0000000-0xefffffff] (256MB) from e820 map
[    0.000000] efi: Not removing mem41: MMIO range=[0xfe042000-0xfe042fff] (4KB) from e820 map
[    0.000000] efi: Not removing mem42: MMIO range=[0xfe043000-0xfe043fff] (4KB) from e820 map
[    0.000000] efi: Not removing mem43: MMIO range=[0xfe044000-0xfe044fff] (4KB) from e820 map
[    0.000000] efi: Not removing mem44: MMIO range=[0xfe900000-0xfe902fff] (12KB) from e820 map
[    0.000000] efi: Not removing mem45: MMIO range=[0xfec00000-0xfec00fff] (4KB) from e820 map
[    0.000000] efi: Not removing mem46: MMIO range=[0xfed01000-0xfed01fff] (4KB) from e820 map
[    0.000000] efi: Not removing mem47: MMIO range=[0xfee00000-0xfee00fff] (4KB) from e820 map
[    0.000000] efi: Remove mem48: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map
[    0.015479] ACPI: UEFI 0x000000007772DDB0 000042 (v01 ALASKA A M I    00000000      00000000)
[    0.015645] ACPI: Reserving UEFI table memory at [mem 0x7772ddb0-0x7772ddf1]
[    0.037265] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6370452778343963 ns
[    0.406410] pci 0000:00:02.0: BAR 2: assigned to efifb
[    0.448576] Registered efivars operations
[    0.874964] efifb: probing for efifb
[    0.874985] efifb: framebuffer at 0x80000000, using 4160k, total 4160k
[    0.874988] efifb: mode is 1366x768x32, linelength=5504, pages=1
[    0.874990] efifb: scrolling: redraw
[    0.874991] efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
[    0.875085] fb0: EFI VGA frame buffer device
[    0.931212] integrity: Loading X.509 certificate: UEFI:db
[    0.931292] integrity: Loaded X.509 cert 'Dell Inc. UEFI DB: 5ddb772dc880660055ba0bc131886bb630a639e7'
[    0.931295] integrity: Loading X.509 certificate: UEFI:db
[    0.931328] integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
[    0.931330] integrity: Loading X.509 certificate: UEFI:db
[    8.582691] systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).

The use of rEFInd for this purpose is definitely on - in fact the author of rEFInd uses a background for showing this use as an example. I don’t personally encrypt, so I can’t verify the timing of the decrypt prompt, but I can’t see how it could show up first in this case!

I’m going to wait for a definitive opinion before spending time on this.

No prob - BTW it might be found on the definitive rEFInd website:

As I mentioned, I didn’t look at the discussion of encryption, but I recall the subject being covered… Good luck!

IMO you should use an unencrypted /boot partition. This would simplify the matter.

rEFInd should work.

Unencrypted boot partition : how would I proceed to do that?

I believe you’d have to recreate it. I’m not an expert when it comes to encrypted installs though.

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.