From 4f36d06f5718d07d10649d5c99c1674c3b6d4337 Mon Sep 17 00:00:00 2001 From: Giulio Date: Sat, 8 Jan 2022 17:20:39 +0100 Subject: [PATCH] Readme.md syntax --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 0540df6..251aa97 100644 --- a/README.md +++ b/README.md @@ -53,25 +53,25 @@ Data loss is extremely probable and firmware corruption is rare but not impossib * Run `mkpassword.sh` to generate a Grub2 password * If desired, change the background image for grub in `resources/background.jpg`. It must be a `1920*1080` JPG of size below 300KB. -### Build coreboot+Grub2 (Step 3) +#### Build coreboot+Grub2 (Step 3) * Run `build.sh` as root and check that it completes successfully *If `build.sh` fails, stop here. It does not make any sense to proceed without a valid firmware image* -### Encrypt /boot (Step 4) +#### Encrypt /boot (Step 4) * Run `encryptboot.sh /dev/sdX` as root. The parameter indicates the target device noted down at Step 1. *If `encryptboot.sh` fails stop here. It does not make any sense to flash coreboot+Grub2 if it is unable to properly boot.* -### Flash the firmware (Step 5) +#### Flash the firmware (Step 5) * Run `flash.sh` as root. *If `flash.sh` fails, do not reboot or turn off your computer. If you believe the failure left your firmware in an unknown state, run `recover.sh`* -### Boot into Qubes and set update hooks (Step 6) +#### Boot into Qubes and set update hooks (Step 6) * Run the following command in `dom0` @@ -80,15 +80,15 @@ Data loss is extremely probable and firmware corruption is rare but not impossib * Copy `resources/00-kernel-xen-symlink.conf` from this repository to `dom0` `/etc/dnf/plugins/post-transaction-actions.d/00-kernel-xen-symlink.conf` Since editing `grub.cfg` requires a re flash, that we would like to avoid, the supplied configuration files boots qubes using some symlinks: - * /boot/vmlinuz-latest - * /boot/initramfs-latest - * /boot/xen-latest-latest + * `/boot/vmlinuz-latest` + * `/boot/initramfs-latest` + * `/boot/xen-latest-latest` Since those names are not standard, in order to be able to update Qubes Linux Kernel and Xen without manual intervention, the aforementioned procedure creates a post transaction hook for `dnf` that automatically updates those symlinks. -### Tun on hardware write protection (Step 7) -### Add glitter to screws and joints (Step 8) +#### Tun on hardware write protection (Step 7) +#### Add glitter to screws and joints (Step 8) ### Community - -### References \ No newline at end of file + * [Purism Forum Thread](https://forums.puri.sm/t/coreboot-with-grub-payload/) + * [Qubes Forum Thread]()