Language Selection

English French German Italian Portuguese Spanish

“Can’t locate module” Error in Linux and Data Loss

Filed under

When you start your Linux system, at boot time, the process may get terminated and you might come across with the following error message:“Can't Locate Module <module name>”After this error message, the system does not boot and none of your data can be accessed from it. CauseThis error message usually occurs if modprobe, rmmod, or insmod files are not able to find a module. Due to this, the system can not access the required system files to boot and thus shows the error message. è Modprobe- It is a system file that intelligently adds or removes the modules from the Linux kernel. It looks in module directory “/lib/modules/uname –r” for all modules and other files. è Insmod- It is a trivial tool for inserting a module in the Linux kernel. It takes the module from standard input. If this tool tries to link the modules inside the Linux kernel, the error messages are thrown. è Rmmod- It uploads the loadable modules from running Linux kernel. It tries to upload the set of modules from kernel, with restriction that they aren’t in use and that they aren’t referred to by other ones. These system files can’t perform their tasks if they are corrupted. The corruption could be due to virus attack, file system corruption, improper system shutdown and so on. ResolutionIn such critical situations, the only solution to work around this problem is to format the primary partition of your hard drive and reinstall the operating system. It will remove all the errors and will install a new set of data structures and a fresh Linux kernel. Though, formatting will remove the errors, but also delete the data stored on the primary partition. The situations can become worse if you have not partitioned your hard drive and stored all of precious data on it. In such circumstances, you need for a solution which can recover your lost data and can save you and your business. These solutions are available in the form of Linux recovery software. Linux data recovery software is the third party applications, specifically designed to meet different users’ data recovery requirements. The data recovery Linux software are easy to use and thus do not require any sound technical knowledge from user’s side. Stellar Phoenix Linux Data Recovery software is the best ever made and the most comprehensive Linux recovery software which carries out absolute data recovery Linux. You can use this software to perform Linux data recovery for all flavors and can recover all of sorts of lost files.

More in Tux Machines

diff -u: What's New in Kernel Development

Alexander Holler wanted to make it much harder for anyone to recover deleted data. He didn't necessarily want to outwit the limitless resources of our governmental overlords, but he wanted to make data recovery harder for the average hostile attacker. The problem as he saw it was that filesystems often would not actually bother to delete data, so much as they would just decouple the data from the file and make that part of the disk available for use by other files. But the data would still be there, at least for a while, for anyone to recouple into a file again. Alexander posted some patches to implement a new system call that first would overwrite all the data associated with a given file before making that disk space available for use by other files. Since the filesystem knew which blocks on the disk were associated with which files, he reasoned, zeroing out all relevant data would be a trivial operation. Read more

8 Linux Security Improvements In 8 Years

At a time when faith in open source code has been rocked by an outbreak of attacks based on the Shellshock and Heartbleed vulnerabilities, it's time to revisit what we know about Linux security. Linux is so widely used in enterprise IT, and deep inside Internet apps and operations, that any surprises related to Linux security would have painful ramifications. In 2007, Andrew Morton, a no-nonsense colleague of Linus Torvalds known as the "colonel of the kernel," called for developers to spend time removing defects and vulnerabilities. "I would like to see people spend more time fixing bugs and less time on new features. That's my personal opinion," he said in an interview at the time. Read more

Linux from Square One

Despite the fact I have a different view of which distros are best for kids — Qimo (pronounced “kim-o,” as in the last part of eskimo, not “chemo”) tops the list, as it should, but the French distro Doudou (add your own joke here) is unfortunately left out — the link there is informative. So for those who are just getting their proverbial feet wet in Linux, this is a godsend. Read more

Explaining Security Lingo

This post is aimed to clarify certain terms often used in the security community. Let’s start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system that allows an attacker to compromise the security of that particular system. The consequence of such a compromise can impact the confidentiality, integrity, or availability of the attacked system (these three aspects are also the base metrics of the CVSS v2 scoring system that are used to rate vulnerabilities). ISO/IEC 27000, IETF RFC 2828, NIST, and others have very specific definitions of the term vulnerability, each differing slightly. A vulnerability’s attack vector is the actual method of using the discovered flaw to cause harm to the affected software; it can be thought of as the entry point to the system or application. A vulnerability without an attack vector is normally not assigned a CVE number. Read more