Preface If someone asks you "What are the characteristics of database transactions?" You may quickly answer atomicity, consistency, isolation, and durability, which are the ACID characteristics. So do you know how InnoDB guarantees these transaction characteristics? If you know this, you can just skip this article (#^.^#) Let me first state the conclusion:
redo log The redo log redo log is divided into two parts: one is the redo log buffer in the memory, which is easy to lose; the other is the redo log file, which is persistent. InnoDB achieves persistence through the Force Log at Commit mechanism. When committing, all transaction logs must first be written to the redo log file for persistence, and the transaction is considered complete only after the commit operation is completed. InnoDB writes the contents of the redo log buffer to the redo log file in the following situations:
To ensure that each log is written to the redo log file, the InnoDB storage engine needs to call an fsync (flush) operation each time the log buffer is written to the redo log file. But this is not absolute. Users can control the strategy of flushing redo logs to disk by modifying the innodb_flush_log_at_trx_commoit parameter, which can be used as an optimization point when committing a large number of transactions.
Rollback log undo log In order to ensure the atomicity of transactions, before operating any data, first back up the data to a place (the place where the data backup is stored is called Undo Log), and then modify the data. If an error occurs or the user executes a ROLLBACK statement, the system can use the backup in the Undo Log to restore the data to the state before the transaction started. Undo log implements multi-version concurrency control (MVCC) to help ensure transaction isolation. The rollback log is different from the redo log. It is a logical log that logically cancels all modifications to the database. When a transaction is rolled back, it is actually doing the reverse of what it did previously. For each INSERT, the InnoDB storage engine performs a DELETE; for each UPDATE, the InnoDB storage engine performs a reverse UPDATE. The undo log cannot be deleted immediately after a transaction is committed, because there may be other transactions that need to use the undo log to obtain the previous version of the row record. When a story task is submitted, the undo log is put into a linked list. Whether the undo log can be deleted depends on the following two situations:
Lock The implementation principle of transaction isolation is lock, so isolation can also be called concurrency control, lock, etc. Transaction isolation requires that the objects of each read-write transaction be separated from the operation objects of other transactions. Furthermore, for example, when operating the LRU list in the buffer pool, deleting, adding, and moving elements in the LRU list, locks must be involved to ensure consistency. Types of locks InnoDB has two main types of locks: row-level locks and intention locks Row-level locks:
Among row-level locks, except for S and S, all others are incompatible. Intention lock:
Explain intention lock
The main purpose of intention locks is to express that a transaction is locking or will lock a row of data. For example, if transaction A wants to apply an X lock to a row of record r, InnoDB will first apply for an IX lock on the table, and then lock the X lock on record r. Before transaction A is completed, transaction B wants to perform a full table operation. At this time, IX at the table level directly tells transaction B to wait without having to determine whether each row in the table has a lock. The value of intention exclusive locks lies in saving InnoDB's lock positioning and processing performance. Also note that intention locks will not block except for full table scans. Locking Algorithm InnoDB has three row lock algorithms:
Here we mainly talk about Next-Key Lock. Next-key Lock locks not a single value but a range. Its purpose is to prevent multiple transactions from inserting records into the same range, thereby causing phantom reads. Note that if a unique index is used, Next-Key Lock will be downgraded to Record Lock, which means that only the index itself is locked, not the range. That is to say, the prerequisite for Next-Key Lock is that the transaction isolation level is RR and the queried index is a non-unique index or a primary key index. Let's explain this in detail using an example. First create a table: CREATE TABLE T (id int ,f_id int,PRIMARY KEY (id), KEY(f_id)) ENGINE=InnoDB DEFAULT CHARSET=utf8 insert into T SELECT 1,1; insert into T SELECT 3,1; insert into T SELECT 5,3; insert into T SELECT 7,6; insert into T SELECT 10,8; Transaction A executes the following statement: SELECT * FROM T WHERE f_id = 3 FOR UPDATE At this time, the SQL statement uses a non-unique index, so Next-Key Locking is used, and there are two indexes, which need to be locked separately. For the clustered index, it only adds Record Lock to the index with id equal to 5. For the auxiliary index, Next-Key Lock is added to lock the range (1,3). It is particularly important to note that the InnoDB storage engine also adds a Gap Lock to the next key value of the auxiliary index, that is, a lock in the range (3.6). Therefore, if you execute the following statements in a new session, an error select * from T where id = 5 lock in share MODE -- cannot be executed, because transaction A has added an X lock to the value of id = 5, and the execution will be blocked. INSERT INTO T SELECT 4,2 -- cannot be executed, the value of the auxiliary index is 2, which is in the range of (1,3), and the execution is blocked. INSERT INTO T SELECT 6,5 -- cannot be executed, the gap lock will lock the range of (3,6), and the execution is blocked. Now imagine that transaction A locks the record with f_id = 5. Normally, there will be a gap lock that locks (5, 6). If there is no gap lock on (5, 6), the user can insert a record with index f_id 5. Then, transaction A will return a different record when querying again, which will lead to phantom reads. Similarly, if our transaction A executes Summarize The above is the full content of this article. I hope that the content of this article will have certain reference learning value for your study or work. Thank you for your support of 123WORDPRESS.COM. You may also be interested in:
|
<<: In-depth explanation of iterators in ECMAScript
>>: Detailed explanation of samba folder sharing server configuration under centos
First, check whether the hard disk device has a d...
1. Development environment vue 2. Computer system...
This axios package is used in the vue3 demo. For ...
This article shares the specific code of Vue to r...
Preface In our daily work, we often need to renam...
Table of contents Determine whether a record alre...
<br />English address: http://developer.yaho...
Command: mysqlhotcopy This command will lock the ...
Let’s take the translation program as an example....
1. Install zabbix-agent on web01 Deploy zabbix wa...
1. Install JDK Check the computer's operating...
Method 1: Use the lsb_release utility The lsb_rel...
When I wrote the Redis book and the Spring Cloud ...
1. Background Use LDAP to centrally manage operat...
<br />I am very happy to participate in this...