How is MySQL transaction isolation achieved?

How is MySQL transaction isolation achieved?

Update, delete, and insert statements will automatically add exclusive locks to the data involved. Select statements will not add any locks by default.

So under what circumstances will the read operation be locked?

  • select ... lock in share mode, add S lock to the read records
  • select ... for update , add X lock to the read records
  • Read records in a transaction and add S locks to the read records
  • When the transaction isolation level is SERIALIZABLE, an S lock is added to the read records.

There are three types of locks in InnoDB:

  • Record Lock: Lock a single record
  • Gap Lock: Gap lock, locks the gap in front of the record and does not allow records to be inserted
  • Next-key Lock: locks both the data and the gap before the data, that is, records are not allowed to be inserted into the data or the gap before the data.

Write a Demo to demonstrate

CREATE TABLE `girl` (
  `id` int(11) NOT NULL,
  `name` varchar(255),
  `age` int(11),
  PRIMARY KEY (`id`)
)ENGINE=InnoDB DEFAULT CHARSET=utf8;
insert into girl values
(1, 'Xi Shi', 20),
(5, 'Wang Zhaojun', 23),
(8, 'Diao Chan', 25),
(10, 'Yang Yuhuan', 26),
(12, 'Chen Yuanyuan', 20);

Record Lock

Locking a single record

For example, add a Record Lock to the data with id value 8, as shown below:

insert image description here

Record Lock also has S lock and X lock, and the compatibility is the same as described before.

The type of lock added during SQL execution is subject to many conditions, such as the transaction isolation level and the index used during execution (such as clustered index, non-clustered index, etc.). Therefore, we will not analyze it in detail, but will give a few simple examples.

-- READ UNCOMMITTED/READ COMMITTED/REPEATABLE READ Use the primary key for equal value query -- Add S-type Record Lock to the record with id=8
select * from girl where id = 8 lock in share mode;

-- READ UNCOMMITTED/READ COMMITTED/REPEATABLE READ Use the primary key for equal value query -- Add X-type Record Lock to the record with id=8
select * from girl where id = 8 for update;

Gap Lock

Lock the gap in front of the record and do not allow records to be inserted

MySQL can solve the phantom read problem through MVCC and locking at the repeatable read isolation level

Current read: Locked snapshot read: MVCC

But how to lock it? Because these phantom records do not exist when the read operation is performed for the first time, we have no way to add Record Lock. At this time, we can solve the problem by adding Gap Lock, that is, locking the gap.

insert image description here

For example, if a transaction adds a gap lock to the record with id=8, it means that other transactions are not allowed to insert new records in the gap before the record with id=8, that is, records with id values ​​in the interval (5, 8) are not allowed to be inserted immediately. Records with id values ​​in the range (5, 8) can only be committed after the transaction with the gap lock is committed.

Let's look at the following SQL locking process

-- REPEATABLE READ uses the primary key for equal value query -- But the primary key value does not exist -- Add Gap Lock to the clustered index record with id=8
SELECT * FROM girl WHERE id = 7 LOCK IN SHARE MODE;

Since the record with id=7 does not exist, in order to prevent phantom reading (avoiding the record with id=7 in the result set obtained by executing the same statement in the same transaction), we need to prevent other transactions from inserting records with id=7 before the current transaction is committed. At this time, we can add a Gap Lock to the record with id=8, that is, other transactions are not allowed to insert new records with id values ​​in the range of (5, 8).

insert image description here

Let me ask you a question. Gap Lock can only lock the gap in front of the record, so how do you lock the gap after the last record?

In fact, MySQL data is stored in pages, and each page has 2 pseudo records

  • Infimum record, indicating the smallest record in the page
  • Upremum record, indicating the largest record in the page

In order to prevent other transactions from inserting records with id values ​​in the interval (12, +∞), we can add a gap lock to the Supremum record on the page where the record with id=12 is located. This will prevent other transactions from inserting new records with id values ​​in the interval (12, +∞).

Next-key Lock

Lock the data and the gap before the data at the same time, that is, no record can be inserted into the data or the gap before the data <br /> So you can understand Next-key Lock=Record Lock+Gap Lock like this

insert image description here

-- REPEATABLE READ uses the primary key for range query -- Add S-type Record Lock to the clustered index record with id=8
-- Add S-type Next-key Lock to all clustered index records with id>8 (including Supremum pseudo records)
SELECT * FROM girl WHERE id >= 8 LOCK IN SHARE MODE;

In order to solve the phantom read problem, it is necessary to prohibit other transactions from inserting records with id>=8, so

  • Add an S-type Record Lock to the clustered index record with id=8
  • Add S-type Next-key Lock to all clustered index records with id>8 (including Supremum pseudo records)

Table lock

Table locks can also be divided into S locks and X locks

When executing select, insert, update, or delete statements on a table, the InnoDB storage engine will not add a table-level S lock or X lock to the table.

When executing some DDL statements such as ALTER TABLE and DROP TABLE on a table, an X lock will be added to the table, so other transactions executing statements such as SELECT INSERT UPDATE DELETE on the table will be blocked.

When the system variables autocommit = 0 and innodb_table_locks = 1, manually obtain the S lock or X lock of table t provided by the InnoDB storage engine. You can write

Add a table-level S lock to table t

lock tables t read

Add a table-level X lock to table t

lock tables t write

If a transaction adds an S lock to a table, then

  • Other transactions can continue to obtain the S lock of the table
  • Other transactions can continue to obtain S locks for certain records in the table.
  • Other transactions cannot continue to obtain the X lock of the table.
  • Other transactions cannot continue to obtain X locks on certain records in the table.

If a transaction adds an X lock to a table, then

  • Other transactions cannot continue to obtain the S lock of the table.
  • Other transactions cannot continue to obtain S locks for certain records in the table.
  • Other transactions cannot continue to obtain the X lock of the table.
  • Other transactions cannot continue to obtain X locks on certain records in the table.

Therefore, you must be careful when modifying online tables, because it will block a large number of transactions . There are many mature methods for modifying online tables, which will not be described in detail.

Isolation Level

Read uncommitted: read the latest record each time without doing special processing Serialization: transactions are executed serially without concurrency

So we focus on the isolation implementation of read committed and repeatable read !

These two isolation levels are implemented through MVCC (Multi-version Concurrency Control). In essence, MySQL stores multiple versions of historical data through undolog, and reads data of a certain historical version according to the rules. In this way, read and write can be parallelized without locks, improving database performance.

So how does undolog store records before modification?

For tables using the InnoDB storage engine, the clustered index record contains the following two necessary hidden columns:

trx_id : Every time a transaction modifies a clustered index record, the transaction id of the transaction is assigned to the trx_id hidden column.

roll_pointer : Every time a clustered index record is modified, the old version is written to the undo log. This hidden column is equivalent to a pointer, through which the information before the record is modified can be found.

If the name of a record is changed from Diao Chan to Wang Zhaojun and Xi Shi, there will be the following records. Multiple records constitute a version chain.

insert image description here

In order to determine which version in the version chain is visible to the current transaction, MySQL designed the concept of ReadView . The 4 important contents are as follows

  • m_ids : A list of active transaction ids in the current system when generating a ReadView
  • min_trx_id : When generating a ReadView, the smallest transaction id currently active in the system, that is, the minimum value in m_ids
  • max_trx_id : The transaction id value that the system should assign to the next transaction when generating a ReadView
  • creator_trx_id : The transaction id of the transaction that generated the ReadView

When records in a table are modified, insert, delete, or update statements are executed, a unique transaction id is assigned to the transaction. Otherwise, the default transaction id value of a transaction is 0.

max_trx_id is not the maximum value in m_ids. Transaction ids are assigned incrementally. For example, there are three transactions with transaction ids 1, 2, and 3. Later, the transaction with transaction id 3 is committed. When a new transaction generates ReadView, the value of m_ids includes 1 and 2, the value of min_trx_id is 1, and the value of max_trx_id is 4.

Please add a description of the image

The execution process is as follows:

  • If the trx_id of the accessed version = creator_id, it means that the current transaction is accessing the record that it has modified, so the version can be accessed by the current transaction.
  • If the trx_id of the accessed version is less than min_trx_id, it means that the transaction that generated the version has been committed before the current transaction generates the ReadView, so the version can be accessed by the current transaction.
  • The trx_id of the accessed version is greater than or equal to max_trx_id, indicating that the transaction that generated this version was opened after the current transaction generated ReadView, and this version cannot be accessed by the current transaction
  • Is the trx_id of the accessed version in the m_ids list?
  • 4.1 Yes, when the ReadView is created, this version is still active and cannot be accessed. Follow the version chain to find the next version of data and continue to perform the above steps to determine visibility. If the last version is not visible, it means that the record is completely invisible to the current transaction.
  • 4.2 No, when the ReadView is created, the transaction that generated the version has been committed and the version can be accessed

OK, now we know the rules for obtaining version visibility, but how do we implement read committed and repeatable read?

In fact, it is very simple, that is, the timing of generating ReadView is different

For example, first create the following table

CREATE TABLE `girl` (
  `id` int(11) NOT NULL,
  `name` varchar(255),
  `age` int(11),
  PRIMARY KEY (`id`)
)ENGINE=InnoDB DEFAULT CHARSET=utf8;

Read Committed

Read Committed (read committed), a ReadView is generated before each read

insert image description here

Below is the process of executing three transactions, one line represents one time point

insert image description here

First analyze the execution process of select at time point 5

  • There are two transactions with transaction IDs 100 and 200 being executed in the system.
  • When executing the select statement, a ReadView is generated, mids=[100,200], min_trx_id=100, max_trx_id=201, creator_trx_id=0 (the select transaction does not perform a change operation, and the transaction id defaults to 0)
  • The name column of the latest version is Xishi. The trx_id value of this version is 100. In the mids list, it does not meet the visibility requirements. Jump to the next version according to roll_pointer
  • The next version of name is Lie Wang Zhaojun. The trx_id value of this version is 100, which is also in the mids list. Therefore, it does not meet the requirements. Continue to jump to the next version
  • The name column of the next version is Diao Chan. The trx_id value of this version is 10, which is less than min_trx_id. Therefore, the name value returned at the end is Diao Chan.

insert image description here

Let's analyze the execution process of select at time point 8 again

  • There is a transaction with transaction ID 200 being executed in the system (transaction with transaction ID 100 has been committed)
  • When executing the select statement, a ReadView is generated, mids=[200], min_trx_id=200, max_trx_id=201, creator_trx_id=0
  • The name column of the latest version is Yang Yuhuan. The trx_id value of this version is 200. In the mids list, it does not meet the visibility requirements. Jump to the next version according to roll_pointer
  • The name column of the next version is Xishi. The trx_id value of this version is 100, which is less than min_trx_id. Therefore, the name value returned at the end is Xishi.

When the transaction with transaction id 200 is committed, the name column obtained by query is Yang Yuhuan.

Repeatable Read

Repeatable Read generates a ReadView when reading data for the first time.

insert image description here

Repeatable read generates ReadView only when reading data for the first time, so the same version is read each time, that is, the name value is always Diao Chan. The specific process has been demonstrated twice above, so I will not repeat it here. I believe you will analyze it yourself.

Reference blog

[1] https://souche.yuque.com/bggh1p/8961260/gyzlaf
[2] https://zhuanlan.zhihu.com/p/35477890

This is the end of this article about how to achieve isolation of MySQL transactions. For more information about isolation of MySQL transactions, please search for previous articles on 123WORDPRESS.COM or continue to browse the following related articles. I hope you will support 123WORDPRESS.COM in the future!

You may also be interested in:
  • Detailed explanation of the MySQL MVCC mechanism principle
  • Detailed explanation of MySQL transaction isolation level and MVCC
  • In-depth understanding of Mysql transaction isolation level and locking mechanism issues
  • Solve the problem of MySql8.0 checking transaction isolation level error
  • Analysis of the underlying principle of MySQL multi-version concurrency control MVCC
  • Implementation of MySQL Multi-version Concurrency Control MVCC
  • Mysql MVCC multi-version concurrency control details
  • MYSQL transaction isolation level and MVCC

Concurrent scenarios

I have recently worked on some distributed transaction projects and have a deeper understanding of the isolation of transactions. I will write an article about distributed transactions later. Today, let’s review how the isolation of stand-alone transactions is achieved?

The essence of isolation is to control concurrency , if the SQL statement is executed serially. Then there will be no concept of isolation in the four major characteristics of the database, and there will be no problems such as dirty reads, non-repeatable reads, phantom reads, etc.

There are only four types of concurrent operations on the database: write-write, read-read, read-write, and write-read.

Write-Write

When transaction A updates a record, can transaction B update the same record at the same time?

The answer is definitely no, otherwise it will cause dirty writing problems. So how to avoid dirty writing? The answer is locking

Read-Read

MySQL read operations do not lock by default, so they can be read in parallel.

Read-Write and Write-Read

Based on the different tolerance levels for concurrent operations in various scenarios, MySQL has come up with the concept of isolation . You choose the isolation level based on your business scenario.

√ means it will happen, × means it will not happen

Isolation Level Dirty Read Non-repeatable read Phantom Read
read uncommitted
read committed ×
repeatable read × ×
serializable × × ×

So you see, MySQL controls concurrency through locks and isolation levels.

Locks in MySQL

Row-level locks

InnoDB storage engine has two types of row-level locks:

  • Shared Lock (S lock for short). When a transaction needs to read a record, it needs to first obtain the S lock of the record.
  • Exclusive Lock (X lock for short ). When a transaction wants to modify a record, it needs to obtain the X lock of the record first.

If transaction T1 obtains the S lock of a record, transaction T2 also wants to access this record. If transaction T2 wants to obtain the S lock of this record again, it can succeed. This situation is called lock compatibility. If transaction T2 wants to obtain the X lock of this record again, this operation will be blocked until transaction T1 commits and releases the S lock.

If transaction T1 acquires an X lock on a record, then transaction T2 will be blocked whether it wants to acquire an S lock or an X lock on the record until transaction 1 is committed. This situation is called lock incompatibility.

Multiple transactions can read records at the same time, that is, shared locks are not mutually exclusive, but shared locks will block exclusive locks. Exclusive locks are mutually exclusive

The compatibility relationship between S lock and X lock is as follows

compatibility X-Lock S lock
X-Lock Mutual Exclusion Mutual Exclusion
S lock Mutual Exclusion compatible

<<:  6 tips for web design

>>:  The best way to solve the 1px border on mobile devices (recommended)

Recommend

Perfect solution to MySQL common insufficient memory startup failure

1. If MySQL is not started successfully, check th...

Javascript to achieve drumming effect

This article shares the specific code of Javascri...

Vue3 Vue CLI multi-environment configuration

Table of contents 1. Introduction 2. Switching 1....

isPrototypeOf Function in JavaScript

Table of contents 1. isPrototypeOf() Example 1, O...

Linux uses binary mode to install mysql

This article shares the specific steps of install...

Vue implements three-dimensional column chart based on echarts

The three-dimensional column chart consists of th...

Detailed explanation of the loading rules of the require method in node.js

Loading rules of require method Prioritize loadin...

A brief discussion on DDL and DML in MySQL

Table of contents Preface 1. DDL 1.1 Database Ope...

Implementation of Mysql User Rights Management

1. Introduction to MySQL permissions There are 4 ...

Introduction to MySQL method of deleting table data with foreign key constraints

When deleting a table or a piece of data in MySQL...

Graphical explanation of the underlying principle of JavaScript scope chain

Table of contents Preface Scope 1. What is scope?...

How to display a small icon in front of the browser URL

When you browse many websites, you will find that ...

WeChat applet custom scroll-view example code

Mini Program Custom Scroll-View Scroll Bar Withou...

How to use vite to build vue3 application

1. Installation Tip: There is currently no offici...