473,653 Members | 2,948 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

myisamchk Illegal Instruction

Hello, I recently managed to corrupt a table pretty badly. I read the
sections in the documentation about recovering after a crash. None of the
methods worked. All give output similar to the following:
% bin/myisamchk -t ~/tmp -f -o BROKE/EventsBROKE
- recovering (with keycache) MyISAM-table 'BROKE/EventsBROKE.MYI '
Data records: 101333504
bin/myisamchk: error: 127 for record at pos 0
MyISAM-table 'BROKE/EventsBROKE' is not fixed because of errors
Try fixing it by using the --safe-recover (-o) or the --force (-f) option

% bin/myisamchk -t ~/tmp -e BROKE/EventsBROKE
Checking MyISAM file: BROKE/EventsBROKE
Data records: 101333504 Deleted blocks: 86920613
bin/myisamchk: warning: Table is marked as crashed and last repair failed
- check file-size
- check key delete-chain
- check record delete-chain
- check index reference
- check data record references index: 1
- check records and index references
Illegal instruction

The mysql server version is fairly old, 3.23.54 but unfortunatly it can't be
upgraded. The table that is corrupted is large... in the range of 14GB.
I couldn't find a reference to this error in my searches, so I apologise if
this has been covered before, but has anyone encountered these problems
before? And more importantly, were you able to fix it?

_______________ _______________ _______________ _______________ _____
The new MSN 8: smart spam protection and 2 months FREE*
http://join.msn.com/?page=features/junkmail
--
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe: http://lists.mysql.com/my***********...ie.nctu.edu.tw

Jul 19 '05 #1
0 1460

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
1761
by: Ajay Bakhshi | last post by:
Hi, I am getting the following problem on AIX. I create a small shared library. And tried to load it in python. It core dumps with the following message: Segmentation fault (core dumped) At other time with another shared lib I got: Illegal instruction: core dump
0
1285
by: PaT! | last post by:
------=_NextPart_000_00E2_01C34DE9.4541BA40 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Hi, I need a hint how to use myisamchk I use this syntax in a shell but it doesn't work
0
1754
by: PaT! | last post by:
Thnks a lot Patrizio -----Messaggio originale----- Da: Egor Egorov =20 Inviato: luned=EC 21 luglio 2003 14.02 A: mysql@lists.mysql.com Oggetto: Re: myisamchk -R
0
557
by: Paul Mahon | last post by:
Hello, I recently managed to corrupt a table pretty badly. I read the sections in the documentation about recovering after a crash. None of the methods worked. All give output similar to the following: % bin/myisamchk -t ~/tmp -f -o BROKE/EventsBROKE - recovering (with keycache) MyISAM-table 'BROKE/EventsBROKE.MYI' Data records: 101333504 bin/myisamchk: error: 127 for record at pos 0 MyISAM-table 'BROKE/EventsBROKE' is not fixed because...
0
1058
by: Luc Foisy | last post by:
Would anything happen to the database if I ran "myisamchk --silent = /usr/data/mysql/*/*.MYI" when I havent run "FLUSH TABLES" first? As it states in the documentation: If mysqld is running, you must force a sync/close of all tables with = FLUSH TABLES and ensure that no one is using the tables while you are = running myisamchk. In MySQL Version 3.23 the easiest way to avoid this = problem is to use CHECK TABLE instead of myisamchk to...
0
1375
by: nospam | last post by:
I have a ~ 38 GB table (MyISAM) and am using myisamchk -r to recover it. Its been running for several days now (Win2k). When I go to check it, it seems to have slowed down (sometimes hangs without any CPU usage) and if I press the Enter key several times and just fiddle around on the screen (open task manager, etc.) it seems to "wake-up" myisamchk and it begins to check about 1000 recs every 1 to 2 seconds and happily creeps along. ...
9
7073
by: Roshni | last post by:
Hi, I wanted to know how do function pointers sometime access illegal memory access ? Could any one give me an example ? Thanks, Roshni
4
4019
by: Mathias Waack | last post by:
Hi, I've embedded python into a legacy application. It works - most of the time. In some special situations the app crashes executing the "import random". There are two different situations: 1. the sources compiled with gcc 4.1.2 crash with illegal instruction error: (running my application)
8
4792
by: Just another C hacker | last post by:
Hello friends, I'm writing a program in C with some bits in inline asm for efficiency. I'd like to be able to handle illegal instructions from within asm. Here's an example of a standalone asm program, ..data ..text
0
8370
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8283
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
1
8470
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8590
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
6160
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4147
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4291
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2707
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1591
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.