Repairing boot managers and more in Linux and Windows
Fast Help
If your computer fails to boot, you need a helping hand. Rescatux combines proven repair and rescue tools.
If you have several Linux systems – and possibly a Windows system – on your computer, you probably already have experienced the dubious pleasure of booting into a black hole embellished with an error message, like Error 17: Cannot mount selected partition, or a less than friendly prompt, like grub >
.
For less experienced users, panic sets in about now. Although a Google search finds plenty of tips, without background knowledge, they do not always prove effective. Additionally, you first need to know whether GRUB [1] or GRUB 2 is installed on the computer: The two differ in terms of command syntax, as well as the location and content of their configuration files.
In other words, if you lack the ability to refloat your system with cryptic commands in the GRUB shell, you are well advised to have a rescue system in your drawer for such occasions. This can be, for example, the Ultimate Boot CD [2], which includes Super Grub Disk [3], or a specialized tool for reviving deceased boot managers, such as Rescatux [4].
The Underpinnings
The Debian-based Rescatux rescue system for computers that fail to launch comes from the makers of Super Grub. Weighing in at around 400MB, it fits easily on a CD or a USB stick and can be booted as a Live system from either. Currently, Rescatux is available as the stable version 0.30.2 from November 2012, although a more recent 0.32 beta 1 is also on the project website. For this article, I used the 0.31b5 beta version [5], based on Debian 7.0 "Wheezy," on our lab computer and copied it to a USB stick with dd
.
As a desktop environment, Rescatux uses LXDE [6]. In the program menu, you will find the Debian Firefox variant Iceweasel, the Wicd network manager, the JuffEd text editor, a root terminal, the XChat IRC client, and the XFE file manager.
Rescatux promises simple help for complicated problems – unfortunately, users without a US keyboard layout cannot change the keyboard settings. Changing to any other keyboard layout is impossible – that would require a restart – but a restart resets your settings. Normally, however, you can achieve your targets in Rescatux using the mouse, too.
Another issue I ran into on our lab laptop was that Rescatux initially failed to access the web; Wicd was unable to connect either via cable or via WLAN. To solve this, I had to create an entry for eth0
manually in the /etc/network/interfaces
file and then restart the network. A reason for the refusal was not apparent; a further test on a workstation under VirtualBox immediately set up a wired network.
Rescapp
After starting, the Rescatux graphical interface, called Rescapp, appears on the screen. A menu at the top of the window divides the various rescue tools into categories (Figure 1). The several buttons, including Grub, Filesystem, Password, Windows, and Expert Tools, hide the actual tools.
The associated documentation appears at the bottom of the window to match the context of the selected menu item. It explains in detail what steps Rescatux will take and what information it expects from the user. The button indicated by !!! in the label triggers the associated repair action.
Bootloaders
The most common reason for using Rescatux is likely to be an incorrect setting in the GRUB configuration that prevents a system from booting. A further pitfall could be a lost GRUB – usually caused by the subsequent installation of Microsoft Windows, which tolerates no competition to its own bootloader.
The easiest way to repair systems that do not even show you the normal GRUB boot menu is to reinstall GRUB (Figure 2). In Rescapp, you trigger this in Grub (+) | Restore Grub!!!. The routine lists the available hard disks and asks where it should install GRUB.
In many cases, you just need to rewrite the GRUB configuration, which you can do by selecting Update Grub Configuration. If necessary, you can also specify the boot sequence, as defined in the BIOS.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
-
DebConf24 to be Held in South Korea
Busan will be the location of the latest DebConf running July 28 through August 4
-
Fedora Unleashes Atomic Desktops
Fedora has combined its solid distribution with rpm-ostree system to make it possible to deliver a new family of Fedora spins, called Fedora Atomic Desktops.
-
Bootloader Vulnerability Affects Nearly All Linux Distributions
The developers of shim have released a version to fix numerous security flaws, including one that could enable remote control execution of malicious code under certain circumstances.