Mysql supports 3 types of lock structures
InnoDB lock issue There are two biggest differences between InnoDB and MyISAM: one is that it supports transactions (TRANSACTION); the other is the use of row-level locks. InnoDB row lock mode and locking method InnoDB implements the following two types of row locks.
In addition, in order to allow row locks and table locks to coexist and implement a multi-granularity lock mechanism, InnoDB also has two internally used intention locks (Intention Locks), both of which are table locks.
InnoDB row locks are implemented through index items on the index, which is different from MySQL and Oracle, which implements it by locking the corresponding data rows in the data. This row lock implementation feature of InnoDB means that InnoDB will use row-level locks only when retrieving data through index conditions, otherwise, InnoDB will use table locks! Next-Key Locks
SELECT * FROM emp WHERE empid > 100 FOR UPDATE
When to use table locks? For InnoDB tables, row-level locks should be used in most cases, because transactions and row locks are often the reasons why we choose InnoDB tables. However, in some special transactions, you may also consider using table-level locks. The first situation is: the transaction needs to update most or all of the data, and the table is relatively large. If the default row lock is used, not only will the transaction execution efficiency be low, but it may also cause long lock waits and lock conflicts for other transactions. In this case, you can consider using table locks to speed up the execution of the transaction. The second situation is that the transaction involves multiple tables, which is relatively complex and may cause deadlocks and rollback of a large number of transactions. In this case, you can also consider locking the tables involved in the transaction at one time to avoid deadlock and reduce the database overhead caused by transaction rollback. Of course, there should not be too many of these two types of transactions in the application, otherwise, you should consider using the MyISAM table. (1) Although LOCK TALBES can be used to add table-level locks to InnoDB, it must be noted that table locks are not managed by the InnoDB storage engine layer, but by the upper layer MySQL Server. Only when autocommit=0 and innodb_table_lock=1 (default settings) can the InnoDB layer know the table locks added by MySQL and MySQL Server can perceive the row locks added by InnoDB. In this case, InnoDB can automatically identify deadlocks involving table-level locks; otherwise, InnoDB will not be able to automatically detect and handle such deadlocks. (2) When using LOCAK TABLES to lock InnoDB, be careful to set AUTOCOMMIT to 0, otherwise MySQL will not lock the table. Do not use UNLOCAK TABLES to release the table lock before the end of the transaction, because UNLOCK TABLES will implicitly commit the transaction. COMMIT or ROLLBACK cannot release the table-level lock added by LOCAK TABLES. You must use UNLOCK TABLES to release the table lock. The correct method is shown in the following statement. SET AUTOCOMMIT=0; LOCAK TABLES t1 WRITE, t2 READ, ...; [do something with tables t1 and here]; COMMIT; UNLOCK TABLES; Deadlock In InnoDB, except for transactions consisting of a single SQL statement, locks are acquired gradually, which makes it possible for InnoDB to deadlock.
(1) In an application, if different programs access multiple tables concurrently, you should try to agree to access the tables in the same order. This can greatly reduce the chance of deadlock. If two sessions access the two tables in different orders, the chance of deadlock is very high! But if access is done in the same order, deadlock can be avoided. (2) When the program processes data in batches, if the data is sorted in advance to ensure that each thread processes records in a fixed order, the possibility of deadlock can be greatly reduced. (3) In a transaction, if you want to update a record, you should directly apply for a lock of sufficient level, that is, an exclusive lock, instead of applying for a shared lock first and then applying for an exclusive lock when updating, which may even lead to a deadlock. (4) At the REPEATEABLE-READ isolation level, if two threads simultaneously use SELECT ... ROR UPDATE to add an exclusive lock to the same condition record, both threads will succeed in locking if no record matches the condition. The program finds that the record does not exist yet, so it tries to insert a new record. If two threads do this, a deadlock will occur. In this case, changing the isolation level to READ COMMITTED can avoid the problem. (5) When the isolation level is READ COMMITED, if both threads first execute SELECT...FOR UPDATE, they determine whether there are records that meet the conditions. If not, they insert the records. At this time, only one thread can insert successfully, and the other thread will wait for the lock. When the first thread submits, the second thread will make an error due to the primary key, but although this thread has an error, it will obtain an exclusive lock! At this time, if a third thread applies for an exclusive lock again, a deadlock will occur. In this case, you can directly perform the insert operation and then catch the primary key duplicate exception, or when encountering a primary key duplicate error, always execute ROLLBACK to release the acquired exclusive lock. Differences between MyISAM and InnoDB For MyISAM table locks, there are mainly the following points (1) Shared read locks (S) are compatible with each other, but shared read locks (S) and exclusive write locks (X), as well as exclusive write locks (X) are mutually exclusive, which means that reading and writing are serial. For InnoDB tables, there are the following main points (1) InnoDB's marketing is based on indexes. If data is not accessed through an index, InnoDB will use a table lock. After understanding the lock characteristics of InnoDB, users can reduce lock conflicts and deadlocks through design and SQL adjustment measures, including:
MySql optimistic locking pessimistic locking Pessimistic Lock The characteristic of pessimistic locking is that the lock is acquired first, and then the business operation is performed. In other words, it is "pessimistic" to believe that acquiring the lock is very likely to fail, so it is necessary to ensure that the lock is acquired successfully before performing business operations. The so-called "one lock, two checks, and three updates" usually refers to the use of pessimistic locking. Generally speaking, pessimistic locking on a database requires support from the database itself, that is, pessimistic locking is implemented through the commonly used select ... for update operation. When the database executes select for update, it acquires the row lock of the selected data row. Therefore, if other concurrently executed select for update attempts to select the same row, they will be excluded (need to wait for the row lock to be released), thus achieving the locking effect. The row lock acquired by select for update will be automatically released at the end of the current transaction, so it must be used within a transaction. One thing that needs to be noted here is that different databases have different implementations and support for select for update. For example, Oracle supports select for update no wait, which means that if the lock cannot be obtained, an error is reported immediately instead of waiting. MySQL does not have the no wait option. Another problem with MySQL is that all scanned rows will be locked during the execution of the select for update statement, which can easily cause problems. Therefore, if you use pessimistic locking in MySQL, make sure to use the index instead of a full table scan. Optimistic Locking The characteristic of optimistic locking is to perform business operations first and not take the lock unless it is absolutely necessary. That is, we "optimistically" believe that getting the lock will most likely be successful, so we only need to get the lock at the last step of the business operation that actually updates the data. The implementation of optimistic locking on the database is completely logical and does not require special support from the database. The general approach is to add a version number or timestamp to the data that needs to be locked, and then implement it as follows: 1. SELECT data AS old_data, version AS old_version FROM …; 2. Perform business operations based on the acquired data to obtain new_data and new_version 3. UPDATE SET data = new_data, version = new_version WHERE version = old_version if (updated row > 0) { // Optimistic lock acquisition is successful, operation completed} else { // Optimistic lock acquisition failed, rollback and retry} Concurrency is not allowed when updating the same row within the database. That is, each time the database executes an update statement, it acquires the write lock of the updated row and does not release it until the row is successfully updated. Therefore, before the business operation is performed, the current version number of the data that needs to be locked is obtained, and then when the data is actually updated, the version number is compared again to confirm that it is the same as the previously obtained one, and the version number is updated to confirm that no concurrent modifications have occurred in between. If the update fails, it can be considered that the old version of the data has been modified concurrently and no longer exists. At this time, it is considered that the lock acquisition has failed, and the entire business operation needs to be rolled back and the entire process can be retried as needed.
The above is a detailed explanation of the lock structure in MySQL. For more information about MySQL lock structure, please pay attention to other related articles on 123WORDPRESS.COM! You may also be interested in:
|
<<: Detailed steps for using jib for docker deployment in Spring Cloud
>>: vue+node+socket io realizes multi-person interaction and releases the entire process
Table of contents question: There are 2 tokens in...
Table of contents 1. Environment Introduction 2. ...
The insignificant flex-basis has caused a lot of ...
Table of contents 1. Picture above 2. User does n...
This article collects 20 excellent web page color ...
The four property values of position are: 1.rel...
This article uses examples to illustrate the prin...
background As we all know, after we develop a Jav...
1. Function Introduction sed (Stream EDitor) is a...
Let me first talk about the implementation steps:...
Preface Recently, due to work needs, I need to in...
What is an index? An index is a data structure th...
Common nmcli commands based on RHEL8/CentOS8 # Vi...
MySQL trigger syntax details: A trigger is a spec...
Table of contents Overview Global hook function R...