search
HomeDatabaseMysql TutorialCommon MySQL lock types

Common MySQL lock types

Dec 21, 2023 am 08:52 AM
- row lock- Read lock (shared lock)- Write lock (exclusive lock)

MySQL 中常见的锁类型

Common lock types in MySQL require specific code examples

Introduction:
In the database, when multiple clients read the same data at the same time Or when modifying, problems with concurrent operations may occur. In order to ensure the consistency and integrity of data, the database engine uses a lock mechanism to control access to shared data. As a commonly used relational database, MySQL also provides a variety of lock types. This article will introduce common lock types in MySQL and provide specific code examples.

1. Shared Lock
Shared lock (also called read lock) is a lock used for concurrent reading. Multiple clients can acquire shared locks at the same time without blocking each other. Shared locks can ensure the consistency of data read by multiple clients at the same time.

Sample code:

-- Connection 1:
START TRANSACTION;
SELECT * FROM table1 WHERE id = 1 LOCK IN SHARE MODE;
-- Connection 2: (Executed before connection 1 releases the shared lock)
START TRANSACTION;
SELECT * FROM table1 WHERE id = 1 LOCK IN SHARE MODE;

In the above code, both connection 1 and connection 2 After acquiring the shared lock, the data with id=1 in the table1 table can be read at the same time.

2. Exclusive Lock
Exclusive lock (also called write lock) is a lock used for concurrent writing or modification. When multiple clients write or modify the same data at the same time, the exclusive lock can ensure that only one client can write the data, thus ensuring the integrity of the data.

Sample code:

-- Connection 1:
START TRANSACTION;
SELECT * FROM table1 WHERE id = 1 FOR UPDATE;
-- Connection 2:(In Executed before connection 1 releases the exclusive lock)
START TRANSACTION;
SELECT * FROM table1 WHERE id = 1 FOR UPDATE;

In the above code, both connection 1 and connection 2 acquire exclusive locks , only connection 1 can write the data with id=1 in the table1 table.

3. Intention Lock
Intention lock is a lock used to coordinate the relationship between shared locks and exclusive locks. When a transaction acquires a shared lock or exclusive lock on a table, the intention lock can provide a warning mechanism so that other transactions can know the status of the lock. Intention locks are divided into two types, namely intention shared locks (IS) and intention exclusive locks (IX).

Sample code:

-- Connection 1:
START TRANSACTION;
LOCK TABLES table1 READ;
-- Connection 2:(Intent share not released in connection 1 Execute before lock)
START TRANSACTION;
LOCK TABLES table1 READ;

In the above code, connection 1 obtains the intention shared lock, and connection 2 can also obtain the intention shared lock and read the table1 table The data.

4. Row Lock
Row lock is a lock at the data row level. When multiple transactions operate on different rows of the same table at the same time, row locks can ensure that only one transaction can modify a certain row, thereby improving the efficiency of concurrent access.

Sample code:

-- Connection 1:
START TRANSACTION;
SELECT * FROM table1 WHERE id = 1 FOR UPDATE;
-- Connection 2:(In Executed before connection 1 has released the row lock)
START TRANSACTION;
SELECT * FROM table1 WHERE id = 2 FOR UPDATE;

In the above code, connection 1 acquires the row lock and modifies table1 For the data with id=1 in the table, connection 2 waits for connection 1 to release the lock before it can obtain and modify the data with id=2.

Conclusion:
This article introduces the common lock types in MySQL, including shared locks, exclusive locks, intention locks and row locks, and provides specific code examples. Understanding and mastering how locks are used is crucial to ensuring data consistency and integrity. In actual development, it is necessary to select the appropriate lock type based on specific business needs and concurrent access conditions, and use the lock mechanism rationally to ensure the correctness and efficiency of database operations.

The above is the detailed content of Common MySQL lock types. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use