Skip to main content

MySQL : can't rmdir './demo/' errno 17

Problem :
"can't rmdir './test/' errno 17"  
Error comes while dropping a database.

Reason :
For maintaining the data present in the databases MySQL maintains directory. These directories have same name as the database name. While executing the "drop database demo;" command for dropping the database if it's not able to delete it's directories then it throws the above exception

Solution :
This issue can be solved by manually deleting the database data related directory from the installed directory.

Where is the data directory present for MySQL database in windows ?
The default location of this directory would be :

C:\Program Files (x86)\MySQL\MySQL Server 5.0\data

Inside data directory you will see folders present for all the databases, in my case it is 'demo' folder. Deleting this folder solves my problem.

Comments

  1. Logisticguru Limited, the professional car transport in Bhubaneswar offer the competitive rate for each service that they usually provide to their customers. They are professional and expert solver who can solve all your problems related to the vehicle transport. They can do the entire job related to relocating a car to a new location including Packing, loading, transporting, unloading and unpacking. With strong and huge business network of 70 destinations nationwide, they offer timely Car delivery by following the safe vehicle shipping process.

    ReplyDelete

Post a Comment

.

Popular posts from this blog

Carnivorous Island from "Life of PI"

Yann Martel described about an floating carnivorous Island for symbolizing that something seemingly good in life can turn out to be harmful, so we should keep going with our journey of life... About the carnivorous Island from movie. In the movie 'Life of PI' after PI struggles to live in the pacific with the Bengal tiger suddenly one morning Pi  found himself at a Island. After spending so many days in the middle of the sea he found himself very lucky to find a Island. After spending some time he thought might be this was the end of his suffering and he can spend rest of his life at that island. He makes h is bed on a tree and sleeps there, in the middle of the night he wakes up and find that there were dead fish in the fresh water where he took swim in the day time. While trying to understand the mystery he plucks a fruit from the same tree and peel it off and finds a human tooth inside that fruit and then he realize that it was an carnivorous Island. The...

Create Table in Liquibase

For creating table using liquibase you can use below code and add it in your liquibase file. <createTable tableName=“employee”>      <column name="id" type="int">      <constraints primaryKey="true" nullable="false"/>   </column>      <column name="first_name" type="varchar(255)"/>   <column name="last_name" type="varchar(255)"/>   <column name="username" type="varchar(255)">      <constraints unique="true" nullable="false"/>   </column> </createTable> The use is pretty simple it's the way it looks : Tag: <createTable></createTable> This is an opening/ending tag for creating a table. These tags will enclose column sub tags which will define columns for the table. Attribute:   tableName : Name of the table which you want to create. (This is a mandatory   ...

Everything you need to know about ShellShock.

Shellshock was a security threat that was identified by Stéphane Chazelas on 12 September 2014 and was disclosed and announced to the public on 24 th September 2014 with the fix ready for distribution. It was assigned the identifier as CVE-2014-6271 . By the way, this is another security bug with cool logo after Heartbleed. 1. What is Shellshock? Shellshock is a name given to a vulnerability in Bash which allows an attacker to execute remote commands on vulnerable system. Bash is a command-line interpreter available on most of the operating systems like Apple’s OSx, windows and present on many versions of Linux. Bash also acts as a parser for the functions given to it.  2. Why is it harmful? Shellshock is significantly harmful for the servers connected to internet. Since, it lets attacker to escalate their privileges and potentially they can gain access to root. This gives access to the attacker as if they are the actual user and they can perform any...