InnoDB存储引擎之MasterThread(二)

2015-02-03 11:40:53 · 作者: · 浏览: 53
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"http://img.blog.csdn.net/20141209120143421" alt="\">

有图可知,主循环进行了1154432次,每秒挂起(sleep)的操作进行了1154432次,10秒一次的活动进行了106465次,background loop进行了90829次,flush loop进行了90829次。
3.InnoDB 1.2.x版本的Master Thread
InnoDB 1.2.x版本中,Master Thread的伪代码如下:
n???贻?ez脂?t不???r丿z脂?沧??于??┺?ky?j??ky???http://www.2cto.com/os/系统的并发性。