Automatic verification and triage of query results

ABSTRACT

Techniques are provided for automatic verification of query results obtained from data formatted different from row-major format. Techniques are also provided for automatic triage of query results obtained from data formatted different from row-major format. In an embodiment, the query results may be obtained from querying data formatted in column-major format. In an embodiment, when the query results are determined to be incorrect, a cause of the error in the query results can be automatically identified.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims benefit under 35 U.S.C. § 120 as a Divisional of application Ser. No. 14/935,345 filed Nov. 6, 2015, which is a continuation-in-part of U.S. patent application Ser. No. 14/337,179 filed Jul. 21, 2014, which claims priority to U.S. Provisional Patent Application No. 61/880,852 filed Sep. 21, 2013 and to U.S. Provisional Patent Application No. 61/955,574 filed Mar. 19, 2014, the entire contents of each of which are hereby incorporated by reference in their entirety herein for all purposes.

FIELD OF THE DISCLOSURE

The present disclosure relates to database systems and, more specifically, to facilitating accurate querying of data that resides in memory in one format and on disk in another format.

BACKGROUND

Given that main memory is becoming cheaper and larger, new data formats are needed to speed up query processing when data is stored in memory. Existing formats are designed for disk and, when stored in memory (e.g. in the buffer cache), the formats are not optimal for queries. For example, it is common for database systems to store data persistently in “disk blocks”. Typically, within each disk block, data is arranged in row-major format. That is, the values of all columns of one row are followed by the values of all columns for the next row.

To speed up performance, some of the disk blocks may be cached in a “buffer cache” within volatile memory. Accessing the data from volatile memory is significantly faster than accessing the data from disk. However, even within the volatile memory, the data is still in the format of row-major disk blocks, which is not optimal for certain types of database operations.

In contrast to row-major disk blocks, columnar formats have many attractive advantages for query processing in memory, such as cache locality and compression. Consequently, some database servers now employ new table types for persistently storing data in column-major formats. In column-major format, the data may be read into volatile memory where it can be used to process certain queries more efficiently than would be possible if the data were stored in row-major disk blocks.

Unfortunately, the task of migrating existing databases that persistently store data in row-major disk blocks to use of the new column-major table types is not trivial. Further, after performing such a migration, query processing will be less efficient for the class of queries that can be performed more efficiently on data that is stored in row-major disk blocks.

As an alternative, some database systems keep the data in row-major disk blocks, but employ column store indexes. Column store indexes do not replace existing tables, and therefore do not require the entire database to be migrated to new table structures. Rather, column store indexes act more as a traditional secondary index. For example, such column store indexes are still persisted to disk. Unfortunately, a significant amount of overhead may be required to maintain such indexes as updates are performed on the data indexed thereby.

As yet another alternative, one may replicate a database, where a first replica of the database stores the data in conventional row-major disk blocks, while a second replica stores the data in a column-major format. When a database is replicated in this manner, queries that are most efficiently processed using row-major data may be routed to the first replica, and queries that are most efficiently processed using column-major data may be routed to the second replica.

Unfortunately, this technique does not work well due to the lag that occurs between replicated systems. Specifically, at any given point in time, some changes made at one of the replicas will not yet have been applied to the other replica. Consequently, the lag inherent in the replication mechanism may result in unpredictable artifacts and, possibly, incorrect results.

Further, each transaction generally needs to see its own changes, even before those changes have been committed. However, database changes are not typically replicated until the changes have been committed. Thus, a transaction may be limited to using the replica at which the transaction's uncommitted changes were made, even though the format of the data at the other replica may be more efficient for some operations.

Even when queries are performed on data organized in column-major formats, it is possible that a query failure, such as wrong query results or a processing crash, occurred during the querying process. The end user of the query results may not be aware that a query failure occurred, and inadvertently depend upon inaccurate query results. Although query system administrators may be aware that a query failure occurred, diagnosing the problem in order to properly identify the cause of the problem and to address the problem in a timely manner is not a trivial task. To be proactive, random checks may be performed on querying processes. However, random checks verify the accuracy of only a subset of the queries and do not provide information about the remaining queries.

The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:

FIG. 1 is a block diagram of a database system that concurrently maintains mirror format data in volatile memory and persistent format data on persistent storage, according to an embodiment;

FIG. 2a is a block diagram of a table used for examples;

FIG. 2b is a block diagram of how data items for a table may be concurrently maintained in two formats, one of which is an in-memory format, according to an embodiment;

FIG. 3 is a block diagram that illustrates journals stored in volatile memory in conjunction with mirror format data, according to an embodiment;

FIG. 4 is a block diagram illustrating how the data from a single table may be divided between IMCUs based on row ranges, according to an embodiment;

FIG. 5a is a block diagram illustrating how different database server instances may be assigned to manage different sets of MF data, where the sets are based on row ranges;

FIG. 5b is a block diagram illustrating how different database server instances may be assigned to manage different sets of MF data, where the sets are based on columns;

FIG. 6 is a block diagram illustrating an SMU that stores a changed-row bitmap and a record of bit changes, according to an embodiment;

FIG. 7 is a flowchart illustrating steps for performing a scan operation, according to an embodiment;

FIG. 8 is a block diagram illustrating a structure for implementing a changed-row bitmap, according to an embodiment;

FIGS. 9A-9C are flow diagrams illustrating example techniques for performing self-verification of query results, according to an embodiment;

FIG. 10 is a flow diagram illustrating example techniques for performing automatic triage of incorrect query results, according to an embodiment;

FIGS. 11A-11I depict example block diagrams illustrating example verification and triage determinations, according to some embodiments; and

FIG. 12 is a block diagram illustrating a computer system that may be used to implement the techniques described herein.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.

General Overview

Different data formats have different benefits. Therefore, techniques are described herein for maintaining data persistently in one format, but making that data available to a database server in more than one format. In one embodiment, one of the formats in which the data is made available for query processing is based on the on-disk format, while another of the formats in which the data is made available for query processing is independent of the on-disk format.

The format that corresponds to the on-disk format is referred to herein as the “persistent format” or “PF”. Data that is in the persistent format is referred to herein as PF data. An in-memory format that is independent of the on-disk format is referred to as a “mirror format” or “MF”. Data that is in the mirror format is referred to herein as MF data. For example, in one embodiment, the persistent format is row-major disk blocks, and the mirror format is a column-major format.

According to one embodiment, the mirror format is completely independent of the persistent format. However, the MF data is initially constructed in memory based on the persistently stored PF data, not based on any persistent MF structures. Since persistent MF structures are not required, users of existing databases need not migrate the data or structures in their existing databases to another format. Thus, a conventional database system that uses row-major disk blocks may continue to use those disk blocks to persistently store its data without performing any data migration, while still obtaining the performance benefit that results from having a column-major representation of the data available in volatile memory.

In-memory MF data is maintained transactionally consistent with the PF data. The MF data is transactionally consistent in that any data items provided to a transaction or a query from the MF data will be the same version that would have been provided if the data items were provided from the PF data. Further, that version reflects all changes that were committed before the snapshot time of the transaction, and no changes that were committed after the snapshot time of the transaction. Thus, when a transaction, that made a change to a data item that is mirrored in the MF data, is committed, the change is made visible relative to both the PF data and the MF data. On the other hand, if a transaction that made a change is aborted or rolled back, then the change is rolled back relative to both the PF data and the MF data.

In one embodiment, the same transaction manager that ensures consistency among the reads and writes of the PF data is also used to ensure consistency among the reads and writes of the MF data. Because the MF data is kept current in a transactionally consistent manner, if the in-memory MF data includes the data required by a database operation, then the database operation may be satisfied either from the in-memory MF data, or from the PF data.

The MF data mirrors data that already exists in the PF data. However, while all items in the MF data are mirror versions of corresponding items in the PF data (albeit organized in a different format), not all items in the PF data need be mirrored in the MF data. Thus, the MF data may be a subset of the PF data.

Because not all of the PF data is necessarily mirrored in the MF data, in some situations queries may require data that can only be satisfied by the PF data. For example, if a table has columns A, B and C, and only column A is mirrored in the MF data, then a query that requires values from column B must obtain those values from the PF data.

However, even in those circumstances, the MF data may still be used to (a) satisfy a portion of the query, and/or (b) speed up the retrieval of required data from the PF data. For example, the MF data may be used to identify the specific rows that must be retrieved from the PF data.

According to one embodiment, to reduce overhead, no on-disk copy of the MF data is maintained. In an alternative embodiment, a copy of the MF may be stored, but no attempt is made to keep the on-disk copy of the MF data in sync with updates that are being performed on the PF data. Consequently, after a failure, the in-memory MF data must be reconstructed based on the persistent copy of the PF data.

In some embodiments, the MF data is compressed. The compression can be performed at various compression levels, either specified by the user or based on access patterns.

While examples shall be given hereafter in which the mirror format is columnar, the mirror format may be any format, different from the persistent format, that is useful for running in-memory queries. For example, in an alternative embodiment, the PF format is column-major, while the MF format is row-major. Regardless of the particular mirror format used, the mirror format data is created in memory based on existing PF structures (e.g., tables and indexes) without causing a change to the format of those structures.

General Architecture

FIG. 1 is a block diagram of a database system according to one embodiment. Referring to FIG. 1, database system 100 includes volatile memory 102 and persistent storage 110. Volatile memory 102 generally represents the random access memory used by the database system, and may be implemented by any number of memory devices. Typically, data stored volatile memory 102 is lost when a failure occurs.

Persistent storage 110 generally represents any number of persistent storage devices, such as magnetic disks, FLASH memory, and/or solid state drives. Unlike volatile memory 102, data stored on persistent storage 110 is not lost when a failure occurs. Consequently, after a failure, the data on persistent storage 110 may be used to rebuild the data that was lost in volatile memory 102.

Within volatile memory 102, a database server 120 is executing database commands that are submitted to the database server by one or more database applications (not shown). The data used by those applications is illustrated as PF data 112. PF data 112 resides on persistent storage device 110 in PF data structures 108. The PF structures 108 may be, for example, row-major disk blocks. While row-major disk blocks are used for the purposes of illustration, the PF structures may take any form, such as column-major disk block, hybrid compression units where some data is arranged in column-major format and other data is arranged in row-major format, etc.

The volatile memory 102 further includes a cache 106 of PF data. Within cache 106, the data is stored in a format that is based on the format in which the data resides within the PF data structures 108. For example, if the persistent format is row-major disk blocks, then cache 106 may contain cached copies of row-major disk blocks.

On the other hand, MF data 104 is in a format that is unrelated to the persistent format. For example, in the case where the persistent format is row-major disk blocks, the mirror format may be column-major compression units. Because the mirror format differs from the persistent format, the MF data 104 is produced by performing transformations on the PF data. These transformations occur both when volatile memory 102 is initially populated with MF data 104 (whether at start-up or on-demand), and when volatile memory 102 is re-populated with MF data 104 after a failure.

Significantly, the existence of MF data 104 may be transparent to the database applications that submit database commands to the database server that makes use of the MF data 104. For example, those same applications, designed to interact with database systems that operate exclusively on PF data 112, may interact without modification with a database server that maintains MF data 104 in addition to the PF data 112. Further, transparent to those applications, that database server may use the MF data 104 to more efficiently process some or all of those database commands.

The Mirror Format Data

MF data 104 may mirror all of the PF data 112, or a subset thereof. In one embodiment, a user may specify what portion of the PF data 112 is “in-memory enabled”. The specification may be made at any level of granularity. For example, the specification of what is in-memory enabled may be made at least at the following levels of granularity:

-   -   the entire database     -   specified tables     -   specified columns     -   specified row ranges     -   specified partitions     -   specified segments     -   specified extents

As shall be described hereafter, in-memory enabled data is converted to the mirror format and stored as MF data 104 in volatile memory. Thus, when in-memory enabled data is required by a query, the database server has the option of providing the data from either the PF data 112 or the MF data 104. The conversion and loading may occur at the time the database is started, or in a lazy or on-demand fashion. Data that is not in-memory enabled is not mirrored in the MF data 104. Consequently, when such data is required by a query, the database server does not have the option of obtaining the data from the MF data 104.

For the purpose of explanation, it shall be assumed that PF data structures 108 include the table 200 illustrated in FIG. 2A. Table 200 includes three columns c1-c3, and six rows r1-r6. While the illustration of table 200 in FIG. 2A portrays how the data is logically organized on persistent storage 110, the actual format in which the data is physically stored may be quite different.

Specifically, referring to FIG. 2B, it illustrates how the data that resides in table 200 may be physically organized on persistent storage 110. In the present example, the data for table 200 is stored in three row-major disk blocks 202, 204 and 206. Block 202 stores the values for all columns of row r1, followed by the values for all columns of row r2. Block 204 stores the values for all columns of row r3, followed by the values of all columns of row r4. Finally, block 206 stores the values of all columns of row r5, followed by the values of all columns of row r6.

Copies of some of those disk blocks may be temporarily stored in cache 106. In the example illustrated in FIG. 2B, a cached copy 212 of block 204 resides in cache 106. Cache 106 may be managed using any one of a variety of cache management techniques, and the embodiments described herein are not limited to any particular cache management technique. In general, such techniques attempt to retain in volatile memory 102 copies of the disk blocks that are most likely to be requested in the near future. Consequently, when cache 106 runs out of space, cached copies of disk blocks that are less likely to be requested are replaced by copies of blocks that are more likely to be requested.

In contrast to the data in cache 106, the mirror format data 104 is not formatted in a manner that is based on the persistent format. In the illustrated example, mirror format data 104 includes two column vectors 220 and 222. Each column vector stores a contiguous series of values from a single column of table 200. In the present example, column vector 220 stores values from column 1 of table 200, and column vector 222 stores values from column 3 of table 300. In this example, the MF data 104 mirrors a subset of the PF data because MF data 104 does not include column vectors for column 2 of table 200.

Organization of the MF Data

According to one embodiment, even though the MF data uses a different format than the PF data, the MF data is organized in a manner that corresponds to the organization of the PF data. For example, on persistent storage 110, the PF data may be stored in blocks that reside in extents which, in turn, are organized into segments. Under these circumstances, within volatile memory 102, the MF data 104 may be organized based on the extents and/or segments to which the data belongs. Thus, column vector 220 may be divided into vector portions, each of which corresponds to a particular range of extents and/or segments.

Within the extents, data is typically ordered by rowid. Similarly, in one embodiment, the MF data 104 is ordered based on rowid. For example, the values in column vector 220 are ordered based on the same rowids that are used to order the PF data in blocks 202, 204 and 206. Specifically, rowid r1 immediately precedes rowid r2, so r1c1 immediately precedes r2c1 in column vector 220, and r1c1 to r1 c3 immediately precede r2c1 to r2c3 in block 202.

In alternative embodiments, some or all of the data items in the MF data 104 are not ordered, within the MF data 104, by rowid. Storing the data items in a different order may be useful, for example, if the different ordering produced significantly better compression. As another example, the column vectors may initially be ordered by rowid. However, when new updates are “merged into” the column vectors (as shall be discussed in greater detail hereafter), the updated values may be appended to the end of the existing column vectors to avoid having to decompress and recompress the existing column vectors.

When the data items within the column vectors are not in rowid order, an in-memory index may be built on rowid to quickly locate within the MF data 104 the data items associated with any given rowid.

Whether or not the data items within the column row vectors are ordered based on rowid, a rowid-to-item mapping may be established by maintaining a vector of rowids in conjunction with the column vectors. For example, FIG. 3 illustrates a rowid vector 330 that is maintained in addition to the column vectors 220 and 222. The first value (R1) in the vector of rowids is the rowid of the first data item in each of the column vectors. Similarly, the second value in the vector of rowids (R2) is the rowid of the second data item in each of the column vectors.

In embodiments where the organization of the MF data corresponds to the organization of the PF data, it is easier for the database server to split database operations between the MF data and the PF data. For example, the database server may determine that the MF data is to be used to satisfy a query relative to one range of extents (e.g. extent 1 to extent 10), while PF data is to be used to satisfy the query relative to another range of extents (e.g. extent 11 to extent 20).

Using the MF Data to Satisfy Queries

A conventional database system may operate normally by responding to every query by first searching for the requested data in cache 106. If the data is in cache 106, the data is accessed from cache 106. Otherwise, the needed data is loaded from PF data structures 108 into cache 106, and then accessed from cache 106. However, because the data in both cache 106 and PF data structures 108 is in the persistent format, performing operations based exclusively on the PF data does not always provide the best performance.

Therefore, according to one embodiment, the database server uses the MF data 104 to supply data items required by at least some requested database operations. For example, if a database query requests the values from column 1 of all rows, the database server may obtain those values from the column vector 220 without accessing persistent storage 110. In the absence of MF data 104, the database would only be able to obtain R3C1 and R4C1 without accessing persistent storage 110 (because currently only block 204 is in cache 106). To obtain R1C1 and R2C1, block 202 must be loaded into cache 106, and to obtain R5C1 and R6C1, block 206 must be loaded into cache 106. The time it would take to load blocks 202 and 206 into cache would be significantly more than the time required to obtain the values directly from column vector 220.

Using the MF Data to Evaluate Predicates

Even in situations where the data required by a database operation is not included in the mirror format data 104, the mirror format data 104 may be used to evaluate predicates, and thereby speed up the database operations in the same manner as conventional indexes. For example, assume that table 200 has thousands of rows, and in only three of those rows does column c1 have the value “joe”. Under these circumstances, a database server may receive a database command that requests the values, from column c2, of all rows where c1=“joe”.

In this example, the data that needs to be returned by the database command is from column c2, which is not in the MF data 104. However, the column vector 220 for column 1 may be used to quickly identify the three rows where c1=“joe”. This operation can be performed efficiently because the data items required to evaluate the predicate (values from c1) are stored contiguously in volatile memory. Once those rows have been identified using column vector 220, the database server may retrieve from disk only those blocks needed to obtain the data from those three rows.

Without using the MF data, a conventional index built on column c1 may be used to evaluate the predicate “where c1=joe”. However, some disk I/O may be necessary to use of the conventional index to perform this evaluation, whereas no disk I/O is needed to evaluate the predicate using column vector 220. Further, maintaining such an index can incur significant overhead.

Without using mirror format data 104 or a conventional index, the database server would have to load from persistent storage 110 every disk block that (a) is not already in cache 106, and (b) stores data for table 200. These blocks would have to be loaded merely to compare the values of column c1 against “joe” to identify the three rows for which c2 is required by the database command.

Because MF data 104 may be used for the same function as conventional indexes (i.e. to efficiently identify which rows satisfy criteria specified in a database command), a database system that uses MF data 104 need not have as many conventional indexes as would otherwise be necessary for efficient predicate evaluation. For example, if the MF data 104 includes a column vector for c1 and a column vector for c3, then the database server need not maintain conventional indexes for columns c1 or c3. By reducing the number of conventional indexes that need to be maintained by a database server, the overhead associated with making updates may be significantly reduced.

In-Memory Indexes

As explained above, when a predicate references a column, the column vector for that column may be used to evaluate the predicate. In this way, column vectors may be used instead of conventional indexes. To provide even faster predicate evaluation, in-memory indexes may be used. An in-memory index is an index stored entirely within volatile memory. The nature of the in-memory index may vary based on the characteristics of the data being indexed. For example, if low-cardinality keys are being indexed, the in-memory index may be a binary index. If high-cardinality keys are being indexed, then the in-memory index may be a B-tree. Regardless of the nature of the in-memory index, the entries in the index point to in-memory location of the data items in question, rather than on-disk locations.

Compression

As mentioned above, the MF data may be compressed. However, according to one embodiment, not all MF data need be compressed in the same way, or to the same degree. For example, if it is determined that the data from column c1 of table 200 is used frequently, and the data from column c3 is used infrequently, then the data in column vector 220 may be lightly compressed, or uncompressed, whereas the data in column vector 222 is highly compressed.

The compression algorithm, and the level of compression used by the algorithm, that is used to compress each portion of the MF data may be specified by a user, or may be determined automatically by a database server based on various factors. Possible compression algorithms include, but are not limited to, dictionary-based compression, run-length encoding (RLE), Ozip compression, etc.

The factors used by the database server to determine how each portion of MF data is compressed may include, for example, the frequency with which each portion is accessed, and how much data is in the portion, and how much volatile memory is available. In general, the more frequently a portion of the MF data is accessed, the less compressed the data. As another general rule, the less volatile memory that is available to store the MF data and/or the larger the size of the portion of the MF data, the higher the compression.

Even though data items may be compressed within the MF data, it may not be necessary to decompress the MF data to use it. For example, vector processing operations may be performed directly on compressed values, as described in U.S. patent application Ser. No. 13/708,054, filed Dec. 7, 2012, the entire contents of which are incorporated herein by reference. As also described in that application, it is also possible for the decompression to be performed on-chip after the compressed column vector values have been transferred to the CPU.

In-Memory Compression Units (IMCUs)

In an embodiment in which the MF data is compressed, the MF data may be organized, within volatile memory 102, into “in-memory compression units” (IMCUs). Each IMCU stores a different set of MF data. For example, as illustrated in FIG. 4, IMCU 402 stores half of column vectors 220 and 222, and IMCU 404 stores the other half of column vectors 220 and 222. Specifically, IMCU 402 includes a vector portion 420 that stores half the values from column c1, and a vector portion 422 that stores half the values from column c3. Similarly, IMCU 404 includes a vector portion 424 that stores the other half of the values from column c1, and a vector portion 426 that stores the other half the values from column c3.

In this example, the IMCUs divide the MF data based on the rows to which the data belongs, where IMCU 402 corresponds to rows r1 to r3 of table 200, and IMCU 404 corresponds to rows r4-r6 of table 200. However, this is only one of many different ways that the MF data may be spread among IMCUs. For example, different IMCUs may store MF data for different tables, different partitions of a table, different columns of a table, different segments, different extents, etc.

Metadata for the MF Data

To determine whether the MF data has the data required to process a query, and if so, to find the MF data required to process the query, the database server needs to know which PF data is mirrored in the MF data, and specifically which specific PF data is mirrored by each IMCU. Therefore, according to one embodiment, metadata 430 for the MF data is maintained in volatile memory 102, as illustrated in FIG. 4.

In one embodiment, metadata 430 includes a data-to-IMCU mapping. The data-to-IMCU mapping indicates which data is contained in each IMCU. This indication may be made in a variety of ways, including storing data that indicates, for each IMCU, one or more of the following:

-   -   the table(s) whose data is stored in the IMCU     -   the column(s) whose data is stored in the IMCU     -   the range of rows stored in the IMCU     -   the range of the disk blocks whose data is stored in the IMCU     -   the segments whose data is stored in the IMCU     -   the table partitions whose data is stored in the IMCU     -   the extents whose data is stored in the IMCU     -   the manner in which the data, within the IMCU, has been         compressed     -   the dictionary for decompressing the data stored in the IMCU         (when a dictionary-type encoding has been used to compress the         PF data)

In the situation illustrated in FIG. 4, the data-to-IMCU mapping may indicate, for example, that rows r1-r3 of columns c1 and c3 of table 200 are stored in IMCU 402, and that rows r4-r6 of columns c1 and c3 of table 200 are stored in IMCU 404.

Multi-Instance Environments

In some environments, the same PF data is accessed by multiple database server instances. Such environments are referred to herein as multi-instance environments. In a multi-instance environment, each database server instance may have access to volatile memory that the other database server instances cannot access directly. In such situations, one may populate the volatile memory of each of the database server instances with the same MF data, or may cause different portions of the MF data to be stored in the volatile memories of different database server instances. In the case where different portions of the MF data are stored in the volatile memories of different database server instances, metadata 430 may also include an IMCU-to-instance mapping.

For example, referring to FIG. 5a , it illustrates an embodiment in which IMCU 402 is stored in the volatile memory 502 of one database server instance (instance 1), and IMCU 404 is stored in the volatile memory 504 of another database server instance (instance 2). For the database servers to know where specific portions of the MF data reside, each maintains metadata (530 and 532) to indicate both (a) where IMCUs 402 and 404 reside, and (b) what data they contain.

In FIG. 5a , MF data from the same two columns (c1 and c3) is distributed between two database instances. However, it is also possible to distribute the MF data among database servers on other basis. For example, different instances may have the MF data for different tables, different columns, different partitions, different segments, different extents, etc.

FIG. 5b is a block diagram of a scenario in which the MF data is distributed among the database instances based on column. Specifically, in FIG. 5b , the IMCU 402 stored in the volatile memory 502 of instance 1 includes the entire column vector 220 for column c1, while the IMCU 404 stored in the volatile memory 504 of instance 2 includes the entire column vector 222 for column c3.

Because it is more efficient to access local data than to obtain data from a remote instance, the location of the MF data may be a factor in determining whether to obtain a particular data item from the MF data or the PF data. For example, in the scenario illustrated in FIG. 5b , if a query that is being executed by the database server of instance 1 requires data from column c1, the database server may decide to obtain the data from column vector 220, rather than from the PF data. On the other hand, if the same query being executed by the same database server requires data from column c3, then the database server may decide to obtain the data from the PF data.

When a database server determines that it is more efficient to perform an operation using MF data that resides in a remote instance that to use the PF data, the database server requests the remote instance to perform the operation. For example, in the scenario illustrated in FIG. 5b , if the database server of instance 1 is executing a query with the predicate “where c3=X”, the database server of instance 1 would request the database server of instance 2 to evaluate “where c3=X” using column vector 222. In response to evaluating the predicate, the database server of instance 2 would return to the database server of instance 1 data that indicates which rows satisfy the predicate.

Keeping the Mirror Format Data in Sync

The MF data 104 is only useful if the MF data 104 is kept up to date with all changes being made to the PF data. For example, if a query calls for the current values from column c1, then column vector 220 can only be used if its values are current. Similarly, if a query calls for current values of c2 from rows where c1=“joe”, then column vector 220 can only be used to identify the rows where c1=“joe” if the values in the column vector 220 are current.

Consequently, a mechanism is provided for keeping the mirror format data 104 in sync with the PF data as updates, inserts and deletes are performed on the PF data. Specifically, in one embodiment, the transaction manager of a relational database server, which is conventionally designed to transactionally update the PF data, is modified to concurrently transactionally update the MF data. For example, when the transaction manager updates a particular item in the PF data as part of a transaction, the transaction manager also updates the particular item in the MF data (if the particular item is in the MF data) as part of the same transaction.

By maintaining MF data 104 and the PF data transactionally synchronized, the result set of a query will be the same regardless of whether the query was processed using data items obtained exclusively from the MF data 104, or data items obtained exclusively from the PF data. The result set will also be the same if the query is processed using some data items from MF data 104, and other data items from the PF data.

In-Place Updates to MF Data

For the MF data to remain transactionally consistent with the PF data, changes are made permanent to the MF data at the same time the changes are made permanent to the PF data. For example, when a transaction that changed r1c1 from X to Y commits, r1c1 must be changed from X to Y in both the PF data and the MF data.

In some situations, it is possible to directly update the MF data to reflect a change made by a transaction when the transaction commits. For example, if column vector 220 is either uncompressed, or compressed in a manner that produces fixed-width values, it is possible to directly change the value of r1c1 from X to Y in the column vector 220 when the transaction commits, without otherwise affecting the column vector 220 or incurrent significant overhead.

However, in other situations, it may be necessary to update the MF data implicitly. When updated implicitly, the MF data itself does not necessarily change, but metadata is stored to indicate that the values contained therein have been updated. As shall be described in greater detail hereafter, the metadata used to record implicit updates to the MF data may include journals and changed-row bitmaps.

Journals

In some embodiments, keeping the MF data in sync with updates to the PF data is complicated by the fact that the MF data may be in a compressed format. For example, if column vector 220 is compressed, then directly updating a value within the column vector 220 may require the entire column vector to be decompressed, the update performed, and then the entire column vector to be compressed again. It would not be efficient to perform such operations in response to every update performed on the PF data.

To reduce the amount of decompression and decompression operations required to keep the MF data in sync, one embodiment makes use of journals to make implicit updates to the MF data. In general, journals store information about updates (a) made to the PF data, and (b) not yet made directly to the MF data.

Referring to FIG. 3, it illustrates an embodiment in which journals 304 are maintained in conjunction with column vectors 220 and 222. In the embodiment illustrated in FIG. 3, column vectors 220 and 222 store compressed MF data 302. Because the data within the column vectors 220 and 222 is compressed, a significant amount of overhead would be required to directly update the data within the column vectors 220 and 222.

While journals 304 are also in volatile memory 102, journals 304 generally contain uncompressed data 302 that indicates changes made to the PF data that is not yet reflected in column vectors 220 and 222. For example, if the value of R3C1 of table 200 is updated from X to Y, rather than change the value of R3C1 in column vector 220, an entry is stored in one of journals 304 to indicate that R3C1 has been changed, and to record the new value for R3C1.

Journals 304 include a global journal 310 and numerous private journals. In general, global journal 310 records only those changes that have been made by committed transactions. Before transactions commit, the changes made by the transactions are stored in the private journals, as explained in greater detail hereafter.

Journals 304 may include entries for rows that do not exist in the MF data. For example, assume that the MF data for table 200 is created at time T1, and at time T2 a new row is inserted into table 200. Under these circumstances, an entry for the new row will initially be added to private journal of the transaction that inserted the row, and the entry for the new row will be moved to the global journal for table 200 when that transaction commits.

According to one embodiment, all journals support full transactional semantics (e.g. queries, DMLs, rollback to savepoint, rollback/abort, parallel queries/DMLs, and distributed transactions). In addition, journals can interoperate with the on-disk database system. For example, when the data is purged from an in-memory journal, required changes can be obtained from the PF data on disk, if a query needs them.

Private Journals

As mentioned above, journals 304 are used to store data that indicates (a) changes made to the PF data that (b) are not yet reflected in the MF data stored in IMCUs. Such changes are typically made by database servers as part of transactions. According to one embodiment, in addition to having a single “global” journal, such as journal 310, for all such changes, a separate “private” journal is maintained for each transaction.

For example, FIG. 3 illustrates the situation in which three transactions TX1, TX2 and TX3 are making changes to PF data that is mirrored in the compressed MF data 302. In addition to making the changes to the PF data, the transactions make the same changes to the MF data by storing, in their respective private journals, data that indicates what the changes are.

Similar to the changes made to the PF data, those changes reflected in the private journal of a transaction are not considered permanent until the transaction commits. Consequently, the changes reflected in the private journal of any given transaction will not be visible to other transactions until the given transaction commits. In the example shown in FIG. 3, the contents of journal 312 will be ignored by transactions TX2 and TX3. The contents of journal 314 will be ignored by transactions TX1 and TX3. The contents of journal 316 will be ignored by transactions TX1 and TX2.

Moving Journal Entries Upon Commit

The global journal is visible system-wide, since all changes reflected therein have been committed. Thus, in response to transaction TX1 committing, the changes reflected in the private journal 312 of TX1 are moved to the global journal 130. Similarly, in response to transaction TX2 committing, the changes reflected in the private journal 314 of TX2 are moved to the global journal 130. Likewise, in response to transaction TX3 committing, the changes reflected in the private journal 316 of TX6 are moved to the global journal 130.

As mentioned above, when a transaction commits, the contents of that transaction's private journal are moved to the appropriate global journals. In embodiments where the global journals are maintained on a per-IMCU basis and the private journals are maintained on a per-transaction basis, moving the private journal entries of a committed transaction may involve moving some of the entries to the global journal of one IMCU, and some entries to the global journal of another IMCU.

For example, assume that a transaction modifies a first set of data that maps to a first IMCU, and modifies a second set of data that maps to a second IMCU. Prior to commit, entries for both sets of modifications are stored in the private journal of the transaction. However, when the transaction commits, the entries for modifications to the first set of data are moved to the global journal for the first IMCU, and entries for modifications to the second set of data are moved to the global journal for the second IMCU.

After a transaction's changes are persistently committed to the PF data, the transaction is assigned a commit time. In response to being assigned a commit time, the journal entries of the transaction are updated to reflect the commit time. Once a transaction's journal entries are moved to the appropriate global journals and updated with the commit time of the transaction, the changes reflected in those entries become visible to other transactions.

As mentioned above, data within an IMCU need not be arranged in rowid order. When not in rowid order, the column vector of rowids (e.g. vector 330) may be used to locate data within an IMCU based on rowid. Specifically, the position of a rowid within vector 330 is the position of the values for the corresponding row within the other vectors 220 and 222. According to one embodiment, even when the data within an IMCU is not arranged in rowid order, the entries in the corresponding private and global journals are organized based on rowid. Thus, when data in an IMCU is invalidated due to an update made to the corresponding PF data, the rowid of the invalidated data is recorded, rather than the position of that data within the IMCU.

Journal Entry Contents

In general, each journal entry contains all information required to determine (a) what data items are in the entry, and (b) what version of those data items does the entry reflect. In one embodiment, each journal entry includes:

-   -   the rowid of the row associated with the entry     -   a timestamp that indicates when the data contained in the row         was “current”     -   values for one or more columns of the corresponding row

With respect to the column values, in one embodiment, each journal entry includes full row images that result from all Data Manipulation Language (DML) operations. In such an embodiment, the journals are initially row-major data stores. However, under certain circumstances (such as when the journals grow too large), the contents of the journal may be converted to a column-major row store. The column-major information in the journals would only need to include values for those columns that are mirrored in the MF data.

In on embodiment, a threshold is established for how many rows a journal may have in row-major format. Once that threshold is exceeded, a conversion operation is triggered for converting some or all of the journal's row-major data to a column-major format. The threshold may be, for example, that a journal may have no more than 1000 rows of row-major data.

Journal Indexes

According to one embodiment, an index, maintained in volatile memory 102, is built on the rowid column of each private journal. In addition to the rowid column, indexes may be built on any other column of the private journals that will improve overall query processing efficiency. These journal indexes may be used, for example, during query processing to perform look-ups, or range-based scans of the journals.

Journal Structure

According to an embodiment, journals are organized, within volatile memory 102, as a series of temporally-ordered extents. For example, assume that the version time for MF data 104 is T1, and that the current system time is time T10. Under these circumstances, journal 310 may be organized into three extents, the first of which includes journal entries for changes made between time T1 and time T3, the second of which includes journal entries for changes made between time T3 and time T6, and the third of which includes journal entries for changes made between time T6 and the current system time.

When structured in this manner, extent pruning may be used to reduce the number of extents that are processed during a table scan. For example, for a table scan performed for a transaction with a snapshot time of T2, only the first extent of journal 310 would need to be scanned. The other journals contain only changes that the transaction is not allowed to see.

On the other hand, for a table scan performed for a transaction with a snapshot time of T7, all three extents of journal 310 would have to be scanned, because all three could contain journal entries for changes that must be seen by the transaction.

Merging Global Journals into the MF Data

As mentioned above, journals are used because it is inefficient to update the MF data directly every time a database operation makes a change to the corresponding PF data. This is particularly true when the MF data is compressed. However, it is also inefficient to allow the journals to grow indefinitely, both because eventually the journals will require too much volatile memory, and because the larger the journals grow, the less efficient it becomes to use the MF data to satisfy queries.

Consequently, according to one embodiment, the content of the global journals is periodically merged into the MF data. When the MF data is compressed, this merger operation typically involves decompressing the MF data, updating the MF data to reflect the most current committed versions of the items contained therein, and then compressing the MF data.

After data has been merged into the MF data contained in a particular IMCU, the metadata associated with the IMCU is updated to indicate a new version timestamp for the IMCU. For example, if the MF data in an IMCU reflected all changes made as of time T1, then prior to the merger the version timestamp for the IMCU would be T1. If the update involves merging into the MF data of the IMCU all changes that were made up to time T3, then after the merger the version timestamp for the IMCU would be updated to T3.

Post-Merger Retention of Global Journal Entries

As shall be described in greater detail hereafter, in some embodiments, changed-row bitmaps may be used to indicate which data items in the MF data have become stale. A data item in the MF data becomes stale when a change (not reflected in the MF data) is committed to the data item. Once the contents of a global journal have been merged into the corresponding MF data, the old entries in the journals may be purged and the changed-row bitmap is updated to reset all bits (thereby indicating that no data items in the newly-merged MF data are stale). However, in some embodiments, rather than purge all old journal entries in response to merging changes into the MF data, some of the old data may be retained in order to continue to use the MF data for transactions whose snapshot-times are before the merger time.

For example, if the post-merger version timestamp for the IMCU is T3, then a transaction with a snapshot time of T2 cannot use the MF data in the IMCU, because that data contains changes that the transaction is not allowed to see. However, if all the journal entries as of time T1 have been retained, it is possible to use those journal entries, in conjunction with the IMCU, to obtain some data items as of time T2. Specifically, for a data item whose journal entries have been retained, a transaction with a snapshot time of T2 would use the version of the data item from the most recent journal entry that precedes T2, the snapshot time of the transaction.

For example, assume that the journal only has a single entry, and the entry indicates that r5c1 was changed at time T3 from X to Y. Consequently, the post-merger IMCU will have value Y for r5c1. However, to provide the correct value to the transaction, the database server inspects the journal to see that the row of r5c1 was changed between the snapshot time T2 and the version time T3 of the IMCU. Based on this information, the database server knows that the value Y for r5c1 is too recent for the transaction to see, and that the transaction must instead see value X for r5c1. Consequently, in the data obtained for the transaction, the database server changes the value of r5c1 Y to X.

Unfortunately, it is not feasible to retain old journal entries indefinitely. Therefore, according to one embodiment, a configuration parameter is provided for specifying the retention policies associated with IMCUs or the database objects to which they correspond. For example, a retention policy may be that, for table 200, journal entries are retained for at least one hour. Thus, for IMCUs that contain data for table 200, when purging journal entries after a merger, only those journal entries that are associated with snapshot times that are less than an hour old are retained. Retaining already-merged journal entries in this manner ensures that transactions that have snapshot times less than an hour old will always be able to obtain the correct version of data items from the MF data.

According to one embodiment, old journal entries are retained until the database server determines that no currently executing queries will need the old journal entries. For example, if changes are merged into an IMCU at time T10, then journal entries, in the global journal of that IMCU, that are associated with changes made before time T10 may automatically be purged by the database server when there are no more currently-running transactions that have snapshot times before T10.

In some embodiments, the journal entries may store only an indication of which row was changed, and when, without storing the actual values involved. In such an embodiment, the pre-merger journal entries are still useful for indicating which values from the post-merger IMCU cannot be used by a transaction. In the example given above, the version of r5c1 that is in the post-merger IMCU cannot be used for a transaction with a snapshot time of T2, because the journal would indicate that r5c1 was changed between the snapshot time T2 and the version time T3 of the post-merger IMCU. Under these circumstances, if the journal does not have the actual pre-update value of r5c1 (i.e. X), the database server may obtain that value from the PF data, and the rest of the values that it needs from the MF data.

Global Journals and Memory Constraints

As explained above, both global and private journals are maintained in volatile memory. Private journals are used to record changes made by transactions that have not yet committed. Global journals, on the other hand, generally record changes made by transactions that have committed.

The more entries that a global journal has, the more volatile memory is consumed. Under some circumstances, there may simply not be enough volatile memory to store excessively large global journals. One way of handling these situations is to purge older extents of the journals.

For example, assume that the global journal of an IMCU has three extents E1, E2 and E3. Assume further that E1 contains entries for transactions that committed between time T1 and time T5, E2 contains entries for transactions that committed between time T5 and time T9, and E3 has journal entries for transactions that committed between time T9 and the current system time.

Assume further that the version time of the IMCU is T5. Under these circumstances, the entries in E1 may be used to “roll back” the values in the IMCU for transactions that have snapshot times between T1 and T5. On the other hand, the entries in E2 and E3 may be used to “roll forward” the values in the IMCU for transactions that have snapshot times after T5.

When faced with memory constraints, the database server may purge extents E1 only, E1 and E3, or E1, E2 and E3, depending on how much memory is needed. Purging an extent has an effect on performance of certain transactions. For example, assume that E1 is purged. After E1 is purged, a transaction with a snapshot time of T3 may require data items that maps to the IMCU. The transaction may obtain data items that did not change between T3 and T5 from the IMCU. Data items that did change between T3 and T5 are obtained from the PF data, because those items were recorded in E1 which has been purged.

Even after the purging of its journals, an IMCU may be used to supply data that did not change between (a) the version time of the IMCU and (b) the snapshot time of the transaction requesting the data. For example, if the IMCU version time is T1, a transaction with a snapshot time of T5 may obtain data items from the IMCU that were not changed between T1 and T5. As shall be described in greater detail hereafter, those changed data items may be identified using a delete vector generated for the transaction.

Snapshot Metadata Units

As mentioned above, metadata is maintained for each IMCU. In one embodiment, a Snapshot Metadata Unit (SMU) is responsible for maintaining at least some of that metadata. Referring to FIG. 6, an IMCU 600 is illustrated with its corresponding SMU 604. In the illustrated embodiment, SMU 604 stores the IMCU version time and a changed-row bitmap 606. The IMCU version time is the time at which the values in the IMCU 600 were current. Changed-row bitmaps shall be described in greater detail hereafter.

Among other things, the SMU for an IMCU captures all updates that affect the MF data contained in the IMCU. Consequently, the SMU for an IMCU may indicate, for example, whether the corresponding IMCU has valid values for a given rowid/snapshot-time combination. As another example, the SMU may generate a list of rowids of all rows for which the corresponding IMCU has invalid values, relative to a given snapshot-time. This list may then be used in conjunction with the rowid column vector to identify the rows for which values must be obtained from other sources (e.g. from journals or from the PF data).

Changed-Row Bitmaps

In one embodiment, the updates captured by an SMU are indicated by a “changed-row bitmap” maintained within the SMU. Referring again to FIG. 6, the changed row bitmap 606 for IMCU 600 is maintained in SMU 604. A changed-row bitmap is a bitmap that indicates the rows (a) for which the corresponding IMCU has values, and (b) that have been changed by transactions that committed since the version timestamp of the IMCU.

For example, when a transaction performs an update to rows r1, r3 and r5 of table 200, the SMU 604 for IMCU 600 updates the changed-row bitmap of IMCU 600 by setting the bits that correspond to rows r1, r3, and r5 because those are the updated rows that fall within the MF data of IMCU 600.

According to one embodiment, when a change is made to data that is mirrored in IMCU 600, the SMU 604 stores a record of which bits of the changed-row bitmap 606 were set, and when. These records are collectively represented in FIG. 6 as record of bit changes 608. For example, if an update made at time T1 modifies row r1, then the bit for row r1 would be set, and a record is stored to indicate that the bit for r1 was set at time T1.

According to one embodiment, the changed-row bitmap is created on an as-needed basis. For example, if the changed-row bitmap is to reflect whether a change has occurred to a million rows, a one million bit data structure is not pro-actively initialized. Instead, data is only stored for row ranges that have at least one bit set. For any range for which no data is stored, all bits are deemed to be “0”.

Referring to FIG. 8, it illustrates a hierarchical structure 800 for representing a changed-row bitmap, according to one embodiment. In the illustrated embodiment, the hierarchical structure 800 has levels that correspond to extents, blocks, and rows. The extent-level information 802 includes a record for each extent in which there is any set bit. Extent-level records link to other extent-level records (not shown), thereby forming a linked list of records for the extents that have one or more set bits.

In addition, the extent records include a pointer to a linked list of block level information 804 for the blocks that reside in the extent. In the illustrated example, the record for extent E1 points to the record for blocks B1, B2, B3 and B4. The block-level record can be the first record in a linked list of block-level records for the blocks that belong to extent E1.

The block-level records, in turn, point to row-level information 806 stored in the form of bitmap pieces. Specifically, in the illustrated embodiment, the record for block B1 points to bitmap piece 850.

Each position in the bitmap piece 850 corresponds to a row whose data items are stored in block B1. In the illustrated embodiment, bitmap piece 850 has six bit positions, which correspond to six rows are stored in B1. For each bit position, bitmap piece 850 includes two bits, one of which is a row-changed bit 820 and the other of which is an in-journal bit 830. For any given row, the row-changed bit indicates that the row changed since data items for the row were stored in the IMCU. The in bit for a row indicates whether the updated values for the row are stored in the IMCU's journal.

Based on the information in data structure 800, the database server may determine whether the current version of a data item resides in the IMCU, in the journals of the IMCU, or in neither. Specifically, if the structure 800 has no information for a given row, then the IMCU has the current version of the data items from the row. The IMCU also has the current version of the data items from the row if the structure 800 has information for the row, and the row-changed bit for the row is “0”. If structure 800 has information for the row, the row-changed bit is set and the in-journal bit is set, then the IMCU does not have the current version of the item, but the journal for the IMCU does have the current version of the item. Finally, if structure 800 has information for the row, the row-changed bit is set, and the in-journal bit is not set, then neither the IMCU nor the journals have the current version of the data item, and the current version must be retrieved from the PF data.

The records of structure 800 are created on an as-needed basis. Thus, if the IMCU is current for all data items in a particular extent, then structure 800 may not have any records for the extent. Similarly, if the IMCU is current for all data items in a particular block, then structure 800 may not have any block level information 804 for that block. By only storing changed-row information for extents/blocks that have been changed or added since the version time of the IMCU, structure 800 may be significantly small than it would otherwise be if bits were pre-allocated for every row.

Using the Record of Bit Changes

For a transaction that requires the most recent version of data items, a set bit in the changed-row bitmap 606 indicates that the MF data has stale data for that row, and therefore the IMCU 600 cannot be used to supply data from that row. However, not all transactions require the most recent version of data items.

For example, in many database systems, transactions are assigned a snapshot time, and return data that reflects the state of the database as of that snapshot time. Specifically, if a transaction is assigned a snapshot time of T3, then the transaction must be provided versions of data items that include all changes that were committed before T3, and no changes that were not committed as of T3 (except for changes that the transaction makes itself). For such transactions, a set bit in the changed-row bitmap 606 does not necessarily indicate that the IMCU 600 cannot be used to be the source for items for the corresponding row. Specifically, such transactions may still use the IMCU 600 to obtain data for a particular row, even though the bit for that row is set in changed-row bitmap 606, if the bit was first set after the snapshot time of the transaction.

For example, assume that the column vectors 220 and 222 contain data as it existed at time T1, as indicated by the IMCU version time stored in SMU 604. At a later time T5, an update operation changes row r1. Specifically, the update changes the value of r1 c1 for X to Y. In response to this update, the changed-row bitmap 606 of IMCU 600 would change from 000000 to 100000, setting the bit that corresponds to row r1 to “1”. In addition, a record is stored within SMU 604 indicating the bit for r1 was changed at T5.

At yet a later time T9, another update operation changes row r3. Specifically, the second update changes the value of r2c3 from A to B. In response to this update, the changed-row bitmap 606 of IMCU 600 would change from 100000 to 101000, setting the bit that corresponds to row r3 to “1”. In addition, a record is stored within SMU 604 indicating that the bit for row r3 was set at time T9.

After these updates have occurred, the database server may execute a transaction that reads the values of columns c1 and c3. If the snapshot time of the transaction is earlier than T5, then the transaction may read all the values from column vector 220 and 222. The database may determine this by comparing the snapshot time of the transaction to the times indicated in the record of bit changes 608. If the snapshot time of the transaction is after the IMCU version time, but before any times in the record of bit changes 608, then all values in the IMCU 600 are valid relative to that transaction.

If the snapshot time of the transaction is after T5 but before T9, then the transaction may read all values from column vectors 220 and 222 except the values from row r1, which must be obtained elsewhere (e.g. from a journal or from the PF data). If the snapshot time of the transaction is after T9, then the transaction may read all values from column vectors 220 and 222 except the values from rows r1 and r3, which must be obtained elsewhere.

Delete Vectors

In one embodiment, to account for the snapshot time of transactions that read values that are mirrored in IMCU 600, the changed-row bitmap 606 is used in conjunction of the record of bit changes 608 to create a delete vector for each transaction that seeks to read data from IMCU 600. A delete vector is snapshot-time specific, because bits in the delete vector are only set for rows that were updated before the snapshot-time associated with the transaction for which the delete vector is constructed. Stated another way, each delete vector reflects the version of the changed-row bitmap that was current as of the snapshot-time. Thus, the older the snapshot-time associated with a delete vector, the older the version of the changed-row bitmap the delete vector reflects, and thus fewer the number of bits that will be set in the delete vector.

For a transaction with a snapshot time after the version time of the IMCU, a delete vector is made for the transaction by “rolling back” changes that occurred to the changed-row bitmap 606 after the snapshot-time of the transaction. For example, if a transaction has a snapshot time of T5, the database server searches the record of bit changes 608 to identify changes that occurred after time T5. A copy of the changed-row bitmap 606 is made, and within that copy the bits that correspond to the changes that occurred after time T5 are reset to “0”. For transactions with snapshot times before the version time of the IMCU, the delete vector may be generated by making a copy of the changed-row bitmap 606, and within that copy setting to “1” the bits of rows that were changed between the snapshot time of the query and the version time of the IMCU.

Because delete vectors are transaction-specific, at any given time, five distinct transactions may be performing scans of the rows that map to a particular IMCU. Each of the five transactions may have been assigned a different snapshot-time. Consequently, each of the five transactions will have a different delete vector, though all five delete vectors are generated based on the same changed-row bitmap of the SMU that corresponds to the IMCU.

Post-Merge Retention of Pre-Merge Changed-Row Bitmaps

As mentioned above, when changes are merged into an IMCU, all values in the changed-row bitmap of the IMCU are reset to “0” to indicate that no rows have been changed since the new version time of the IMCU (which will be the time at which the IMCU is refreshed/merged). However, rather than simply discard or overwrite the existing changed-row bitmap, a copy of pre-merge changed-row bitmap may be saved. A saved copy of a pre-merge changed-row bitmap is referred to herein as a “retained bitmap”. As shall be described in greater detail hereafter, such retained bitmaps allow a post-merge IMCU to be used to provide data items to transactions that have snapshot times before the merge.

For example, assume that an IMCU is constructed at time T1. From time T1 to time T10, the changes made to the data items in the IMCU are recorded in its global journal, rather than being made directly to the data items themselves within the IMCU. While those changes are being recorded within the journal, the changes are also causing corresponding bits to be set in the changed-row bitmap of the IMCU. At time T10, the changes are merged into the IMCU, causing the version time of the IMCU to change from T1 to T10.

Under these circumstances, the state of the changed-row bitmap immediately before the merger reflects which rows, within the IMCU had changed between time T1 and time T10. By indicating which rows had changed between time T1 and time T10, the changed-row bitmap likewise indicates which rows had not changed between time T1 and time T10. Within the post-merger IMCU, those rows that had not changed between time T1 and time T10 can be provided to transactions that have snapshot times between T1 and T10.

Specifically, a copy of the pre-merge version of the changed-row bitmap is retained after the merger. Along with the retained bitmap, the version timestamp of the pre-merge IMCU is also stored. In the example given above, the retained bitmap would be associated with the version timestamp of T1.

When a transaction (a) requires data items that map to an IMCU, and (b) has a snapshot time that falls between the retrained bitmap time and the current IMCU time, the retained bitmap is used to identify the rows that were not changed between the retained bitmap time and the current IMCU time. Values for the identified rows may be provided to the transaction from the current IMCU. Values for the remaining rows are obtained elsewhere. Specifically, values for the remaining rows may be obtained from the global journal of the IMCU if the relevant journal entries have not yet been purged, or from the PF data.

IMCU Refresh Undo

Rather than store a single retained bitmap in response to the most recent merge, a separate retained bitmap may be stored in response to each merge. The retained bitmaps for a given IMCU may be linked in chronological order. The linked set of retained bitmaps for an IMCU constitutes an “IMCU refresh undo” for the IMCU.

For example, assume that an IMCU was created at time T1, and then refreshed/merged at times T10, T15 and T30. Under these circumstances, the IMCU refresh undo for the IMCU would contain three retained bitmaps RB1, RB2 and RB3. These three retrained bitmaps would be associated with times T1, T10 and T15, respectively.

In the present example, the “0” bits of RB1 indicate the rows that were not changed between times T1 and T10. The “0” bits of RB2 indicate the rows that were not changed between the times T10 and T15. The “0” bits of RB3 indicate the rows that were not changed between the times T15 and T30.

Given any snapshot time, the IMCU refresh undo may be used to identify which rows, within the current IMCU can be provided to a transaction with that snapshot time. For example, for a transaction with the snapshot time T18, the “0” bits in RB3 would indicate which rows can be provided to the transaction from the current IMCU. As another example, for a transaction with the snapshot time of T12, RB2 and RB3 can be combined using a logical OR operation to produce a bitmap that indicates which rows can be provided to the transaction from the current IMCU. As yet another example, for a transaction with the snapshot time of T5, RB1, RB2 and RB3 can be combined using a logical OR operation to produce a bitmap that indicates which rows can be provided to the transaction from the current IMCU.

Thus, given a transaction with the snapshot time of TX, the retained bitmap with the highest timestamp that is below TX is combined, using a logical OR operation, with all more recent retained bitmaps of the same IMCU. The logical “OR” operation produces a bitmap where the “0”s correspond to rows that have not changed since TX and the version time of the current IMCU. Consequently, data items for those rows may be provided by the IMCU.

Transaction Downgrade Based on Memory Constraints

As mentioned above, changes made to items in an IMCU are recorded in journals rather than made directly to the items in the IMCU. The journals are maintained in volatile memory. Unfortunately, long-running transactions that make changes to large numbers of items may cause so many journal entries to be generated that there is insufficient room to store the entries in volatile memory.

Under these circumstances, the journal entries may be flushed to persistent storage to free up space in volatile memory. However, flushing the journal entries to persistent storage, and reading the entries from persistent storage thereafter, incurs a significant performance penalty. Therefore, according to one embodiment, transactions that are generating journal entries in sufficient quantity to cause memory issues are “downgraded”.

According to one embodiment, such transactions are downgraded by pushing their existing private journal entries to the global journal of the IMCU, and ceasing to generate further private journal entries. Although in the global journal of the IMCU, such journal entries are not visible to other transactions because the journal entries are for an uncommitted transaction, and therefore initially associated with an “indeterminate” timestamp. When the downgraded transaction commits, the timestamps of the transaction's entries in the global journal are changed from indeterminate to the commit time of the transaction.

Rather than cease the generation of journal entries when in downgraded mode, transactions may continue to generate journal entries until the size of their private journal once again reaches the specified threshold. At that point, the private journal entries may once again be moved to the global journal, where the entries will not be visible to other transaction due to their indeterminate timestamp. This process of filling the private journal to a threshold, and then moving the entries to the global journal, may be repeated any number of times until the transaction either commits or is rolled back.

Regardless of whether a transaction that is operating in the downgraded mode continues to generate further private journal entries to record its changes, the changes are still recorded in the record of bit changes associated with the IMCU. Once the transaction commits, those bit changes are made to the changed-row bitmap.

By using the changed-row bitmap to record the fact that a change occurred, future transactions will avoid reading stale data items from the IMCU. When the changed-row bitmap indicates that data items associated with a particular row are invalid, transactions that require data items from that row must obtain the data items for a source other than the IMCU. In the case that the changes were made by a downgraded transaction that ceased generating journal entries, the changes will not appear in the global journal, so the data items are retrieved from the PF data.

In one embodiment, not all transactions that are using an IMCU are downgraded at once. Rather, the downgrades are performed on a per-transaction basis, where transactions are only downgraded if they satisfy certain criteria. The criteria may be, for example, that the amount of journal entries that they have generated exceeds a particular threshold.

In general, transactions must see the uncommitted changes that they have made themselves. Consequently, a downgraded transaction that has ceased generating journal entries may have to obtain the values of some data items that the transaction previously changed from the PF data, since no journal entry exists for those changes.

Maintaining Sync without Journals

In the sections above, it is explained that the MF data may be kept in sync with the PF data by recording changes in journals, while leaving the compressed MF data intact until the journals are merged into the compressed MF data. However, in an alternative embodiment, for one or more of the IMCUs, the MF data may be maintained in sync merely by invalidating the data in response to changes made to the corresponding PF data without using journals to record the changes.

In such an embodiment, delete vectors may be generated for a transaction, as described above. For those bits that are not set, the data may be obtained from the appropriate IMCU. For those bits that are set, the data must be retrieved from the PF data, since obtaining data from in-memory journals is not an option when no such journals are maintained.

The benefit of invalidating the MF data without recording the changes in journals is that the processing overhead and memory consumption of maintaining the journals is avoided. However, when data items in the IMCU are too stale to be used to process a transaction, accessing the appropriate version of the data items from the PF data will generally incur more overhead than would be required to obtain the data items from journals. In addition, refreshing the IMCUs in the absence of in-memory journals will also typically incur more overhead, because the changes that need to be merged into the IMCUs must be obtained from the PF data rather than from in-memory journals.

In some embodiments, journals may be maintained for some IMCUs, but not others. In addition, it is possible for the journal of an IMCU to be dropped, and yet continue to use the IMCU for data that has not been invalidated due to changes between the IMCU version time and the snapshot time of the transactions that require the data.

Determining from where to Obtain Data

Because MF data 104 is merely a mirror of some of the PF data (albeit in a different format), all data items contained in MF data 104 are also in the PF data. Therefore, for any query that requires access to data items that are mirrored in the MF data, the database server has the choice of obtaining that data from MF data 104, from the PF data, or partially from the MF data 104 and partially from the PF data.

In general, when the requested data is a row of a table, the location from which to most efficiently retrieve the data is cache 106 (assuming that the persistent format is row-major). If the requested row does not currently reside in cache 106, but the MF data 104 has all columns of the row, then MF data 104 is the location from which to most efficiently retrieve the row. Assuming that MF data 104 is column-major, MF data 104 is less efficient than cache 106 for retrieving a row because, in column-major format, the values for the row must be pieced together from various places within the MF data 104.

If not all of the data for the requested row is in the MF data 104, then at least some of the row must be retrieved from persistent storage 110. Typically, persistent storage 110 is the least efficient location from which to retrieve data, because disk accesses are significantly slower than operations on data stored in volatile memory.

According to one embodiment, the decision of where to the data may be made at any of numerous levels of granularity. For example, the decision of from where to obtain the data may be made on a per-table basis, a per-column basis, a per extent basis, a per segment basis, a per-table-partition basis, etc. Thus, even though all data from column c1 is in column vector 220, the database server may decide to execute a scan by obtaining some of the values of column c1 from column vector 220, and by obtaining the rest of the values of column c1 from the PF data on persistent storage 110.

According to one embodiment, database objects, such as tables, can be “in-memory enabled”. A table that has been in-memory enabled has at least a portion of its data mirrored in the MF data. For example, table 200 is in-memory enabled because data from two of its columns (c1 and c3) are mirrored in mirror format data 104. Specifically, data from column c1 of table 200 is mirrored in column vector 220, and data from column c3 of table 200 is mirrored in column vector 222.

When a table is not mirror-enabled, a scan of the table is performed by reading PF data from cache 106 and/or from persistent storage 110. On the other hand, when a table is mirror-enabled, it may be also possible to get some or all of the table's data from MF data 104. More specifically, it may be possible to obtain data of a mirror-enabled table from any of the following locations:

-   -   the persistently-stored PF data     -   the locally cached PF data     -   the PF data in the cache of another instance     -   the locally stored MF data     -   the MF data stored in the volatile memory of another instance     -   the locally stored MF data updated with information from         journals     -   entirely from the journals     -   MF data stored in the volatile memory of another instance         updated with information from journals     -   any combination of the above.

Further, the data can be obtained without the use of any indexes, with the use of conventional indexes on the PF data, and/or with the use of in-memory indexes. Further, indexes need not be used in conjunction only with the format based upon which the indexes were built. Thus, conventional indexes built on the PF data may be used to identify rows that must be retrieved, and then data for those rows may be retrieved from the MF data. Similarly, an in-memory index may be used to identify rows that must be retrieved, and some or all of those rows may be retrieved from the PF data.

According to one embodiment, a cost-based optimizer is used to determine, for any given database operation, which of the sources (or which combination of these sources) will be used to supply the data needed by the database operation. Additional factors used by the cost-based optimizer include whether conventional and/or in-memory indexes exist for quickly locating the desired data.

Scanning Operations

According to one embodiment, when it is determined that a table scan operation is to obtain at least some of the requested data from MF data 104, a determination is made as to whether the timestamp associated with the MF data 104 is earlier than the snapshot timestamp being used by the scan. In embodiments where the MF data 104 is contained in an IMCU, the determination is made by comparing the IMCU version time, stored in the SMU of the IMCU, to the snapshot time of the transaction associated with the table scan.

If the MF data timestamp is earlier than the snapshot timestamp being used by the scan, then is possible that some of the data in the IMCU is stale relative to that snapshot time. Under these circumstances, it is possible that the required versions of data items that are stale in the IMCU reside in the global journal of the IMCU or the private journal of the transaction. In this case, the journals associated with the IMCU may also be scanned to obtain the correct version of the data that is stale in the IMCU.

Referring to FIG. 6, assume that column vector 220 has the current version of all values from column c1 of table 200 as of time T1. However, at time T3, R3C1 was changed from X to Y. For R3C1, column vector 220 has the old value X, while journal 602 has the new value Y. Thus, when a table scan with a snapshot time of T5 uses IMCU 600 as a source for any of its data, both the compressed MF data in IMCU 600 and the global journal 602 of IMCU 600 are scanned.

In addition to scanning the global journal 602, the private journal of the transaction that is performing the scan is also scanned. For example, if the transaction performing the scan is TX1, then private journal 662 is also scanned.

Thus, any given table scan may involve scanning the compressed MF data in IMCU 600, scanning global and private journals (e.g. journals 602 and 662), and scanning the PF data (some of which may be in cache 106). Each of these scans can be performed independently and in parallel. Thus, in response to a query that requests values from columns c1 and c2 of table 200, the database server may, in parallel, (a) scan column vector 220 for values from c1, (b) scan journal 602 for updated values from c1, (c) scan journal 662 for updated values of c1, and (d) scan the PF data structures 108 to obtain the values for c2 of table 200.

Scanning Operation Example

Referring to FIG. 7, it is a block diagram of the steps performed by a database server in response to a request to scan a table. The table that is being scanned is split into segments, where each segment includes a set of extents, and each extent includes a set of blocks. In this context, database server determines which blocks contain data that needs to be scanned, and whether to scan the blocks from the PF data, or to obtain the data from the MF data.

Specifically, at step 700, the database server determines where the scan operation is “memory-enabled”. An operation is “memory-enabled” if the operation is permitted to obtain some or all of the data it requires from the MF data. The scan operation may automatically be treated as memory-enabled, for example, if the table that is being scanned (the “target table”) is designated as memory-enabled. A table is “memory-enabled” if data from the table is to be mirrored in the MF data. As described elsewhere, data items from a memory-enabled table may be proactively loaded into IMCUs, or may be loaded into IMCUs on an on-demand basis. Even if the target table is designated as memory-enabled, a switch may be provided to designate the scan operation as either memory-enabled or not-memory-enabled. A scan operation may be designated as not-memory-enabled to force the scan to be executed against only the PF data.

According to one embodiment, the memory-enabled designation may be made at any of a number of levels of granularity. For example, the designation may be made on a per-table basis, a per-partition basis, a per-segment basis, or a per-extent basis. For the purpose of illustration, it shall be assumed that the memory-enabled designation is made at the per-extent basis.

Referring again to FIG. 7, if the scan is not memory-enabled, then control passes to step 780 and the scan is performed only against the PF data. After the PF data has been used to perform the scan, the scan operation is done (step 782).

On the other hand, if the scan operation is memory-enabled, then control proceeds to step 702. At step 702, the database server determines the range of blocks that contain data required by the scan. Once the range has been determined, control passes to step 704. For the purpose of illustration, it shall be assumed that blocks B1 to B500 contain the data required by the scan operation.

Step 704 is the beginning of a loop that iterates through each block in the range identified in step 704. If at step 704 it is determined that there are no more blocks to scan, then control passes to step 782 and the scan operation is done. If some blocks have not yet been scanned, then control passes from step 704 to step 706.

At step 706, the database server determines the next block, from the range identified in step 702, to scan. At step 708, it is determined whether the address of the block selected in step 706 maps to an IMCU. If the address maps to an IMCU, then the IMCU stores MF versions of at least some data items from the segment. If the IMCU stores MF versions of data items from the segment, then control passes to step 710. Otherwise, control passes to step 712, where the segment that includes the block is obtained from the PF data.

In one embodiment, upon obtaining the PF version of a segment that is mapped to an IMCU, the database server converts the segment into the in-memory format, and stores the MF data thus produced in the IMCU. Such an embodiment employs on-demand loading, which is described in greater detail hereafter. The conversion and loading of the data into the IMCU may take some time. Therefore, at step 714, the database server determines whether to wait for the data from the segment to be converted and loaded. If the database determines to wait, then the database server waits, and control passes to step 708 when the data from the segment has been converted and loaded into the IMCU. If the database server determines not to wait, the data items are obtained from the PF data (step 720), and control returns to step 704.

As mentioned above, control passes to step 710 when it is determined that the address of the block maps to an IMCU. When the address of the block maps to an IMCU, the IMCU contains an MF version of at least some of the data items in the block. However, the versions of the data items that are contained in the IMCU are not necessarily valid relative to the snapshot time of the scan. Therefore, at step 710, it is determined whether the version of those data items in the IMCU is valid for the transaction that is executing the scan. In one embodiment, determining whether the data in the IMCU is valid involves generating a delete vector for the scan operation based on the snapshot time associated with the scan operation, the changed-row bitmap of the IMCU, and the record of bit changes for the IMCU. As described above, the delete vector is a snapshot-specific bitmap where each set bit indicates that the row corresponding to the bit is invalid relative to the snapshot time.

If, at step 710, it is determined that no data items for the current block are valid in the IMCU, control passes to step 716 where data items are obtained from the PF data until the end of the current extent. Then control passes back to step 704.

If the IMCU has valid versions for at least some of the items, then control passes to step 722. At step 722, the data items for which the IMCU has valid versions are fetched from the IMCU. The data items for which the IMCU does not have valid versions are fetched either from entries in the global journal of the IMCU, or from the PF data. As explained elsewhere, various factors may affect the selection of the source from which to obtain data items. Such factors may include, for example, whether the PF disk block that stores the correct version of the data items currently resides in cache. It is possible that only a subset of the data in a segment is mapped to an IMCU. For example, it may be that only a subset of a table's columns is mapped to an IMCU. Under these circumstances, any data items in the segment that are required by the scan but not mapped to the IMCU must be obtained from the PF data.

If the private journal of the transaction performing the scan has updated versions of any of the data obtained from the IMCU or the global journal, those updated versions are provided in place of any version otherwise obtained. This ensures that the scanning transaction sees its own changes, even though those changes have not been committed.

Even when the delete vector indicates that the IMCU has valid data for all rows, the global journal is checked to identify rows that were inserted after the IMCU was created. If the journal does not contain the actual data items for those rows, then the rows are retrieved from the PF data. Similarly, the private journal of the transaction is checked for rows newly inserted by the transaction, and for data items that have been changed by the transaction.

After fetching all necessary data items, control passes from step 722 back to step 704. At step 704, the loop is repeated until data items required by the scan have been obtained, either from an IMCU, from journal entries, or from the PF data.

When to Create the MF Data

Before MF data may be used to satisfy a query, or to improve performance of a query whose results are ultimately obtained from the PF data, the MF data must be present in volatile memory. Unlike cache 106, mirror format data is not simply a copy of the data that is stored on persistent storage 110. Rather, because the mirror format is not based on the persistent format, volatile memory 102 is initially populated by (a) reading the PF data from persistent storage 110 and (b) converting the PF data thus obtained to the MF format.

The amount of overhead that is required to perform the PF-to-MF conversion will vary from situation to situation, based on how different the mirror format is from the persistent format. For example, if the persistent format is row-major disk blocks that have been compressed one way, and the mirror format is column vectors that are compressed another way, the amount of overhead required to perform the conversion may be extensive.

The decision about when to create the MF data may be based on a variety of factors. For example, if sufficient time is available at system start-up, all of the PF data that has been selected for mirroring may be pre-loaded into volatile memory 102 on start up. As mentioned above, loading the MF data involves reading the corresponding PF data from persistent storage 110 and then converting that PF data into the mirror format.

Pre-Loading the MF Data

In one embodiment, the MF data is pre-loaded into volatile memory at database system start up. The pre-loading may be performed, for example, by background processes before any database operation is executed against the memory-enabled data structures that contain the data items that will be mirrored by the MF data.

The MF data may be created one-IMCU at a time. In multi-instance environment, durably stored metadata may be used to determine which MF data is pre-loaded into which database instance. Such metadata may include, for example, a MF-data-to-IMCU mapping and an IMCU-to-instance mapping.

In a simple example, the MF-data-to-IMCU mapping may indicate that IMCU 402 is to store the column vector 220 for c1, and that IMCU 404 is to store the column vector 222 of column c3. The IMCU-to-instance mapping may indicate that IMCU 402 is to be loaded into the volatile memory 502 of instance 1, while IMCU 404 is to be loaded into the volatile memory 504 of instance 2. Based on these mappings, the MF data would be pre-loaded into volatile memory in the manner illustrated in FIG. 5 b.

On-Demand Loading of MF Data

Rather than simply pre-load the MF data, some or all of the MF data may be generated at the time that the corresponding PF data is accessed by a database operation. For example, assume that database instance 1 is assigned to host the column vectors for columns c1 and c3 of table 200. Rather than construct and load those column vectors on start-up, database instance 1 may initially generate no MF data. Instead, the database instance 1 may wait until a database command requires a scan of table 200. Because no MF data has been created yet, the scan is performed based entirely on the PF data. During that scan, the values needed to construct the column vectors for c1 and c2 will be accessed. Therefore, the column vectors for c1 and c2 may be built at that time without incurring any additional disk accesses.

On-demand loading of MF data may be used in conjunction with pre-loading. For example, some of the MF data that is to be hosted on instance 1 may be created at the time instance 1 is started. Other portions of the MF data may be constructed at the time the data is accessed by queries.

In one embodiment, users may set configuration options to indicate which MF data to pre-load, and which MF data to load on-demand. In an alternative embodiment, the database server automatically determines which portions of the MF data are pre-loaded and which are loaded on-demand. In general, the more frequently a data item is used, the more likely the database server will automatically pre-load the data item into MF data so that even the first database operation that requires the data item has the option of obtaining the data from the MF data.

Persistent Storage of IMCU Images

As mentioned above, the MF data may be created on start-up, on-demand, or any combination thereof. In one embodiment, images of IMCUs may be periodically stored to disk. Such persistently-stored images may be used to re-populate volatile memory 102 with MF data after a crash. The image of any given IMCU will be current as of a “checkpoint time”, which may be when the IMCU image was persistently stored. However, that checkpoint time may be before the time that the crash occurred. Consequently, between the checkpoint time of an IMCU image and the time of the crash, additional changes may have been made to the IMCU. Since those changes are not reflected in the stored image, the IMCU image may be stale.

To use an otherwise stale IMCU image, the IMCU image may first be loaded into volatile memory. The IMCU data thus loaded may be usable, in conjunction with durably stored undo information, for database commands that have snapshot times before the checkpoint time associated with the IMCU image. To be usable with database commands that have snapshot times after the checkpoint time, redo information that was durably stored for the associated PF data prior to the crash may be used to populate the stale journals of the IMCU image with journal entries for the changes that occurred after the checkpoint time of the IMCU.

Depending on how many changes were made after the checkpoint time and before the crash, reconstructing an IMCU using a stale persistently stored image of the IMCU may consume significantly less overhead than completely re-generating the IMCU data from the PF data.

Selecting which PF Data to Mirror

The decision of which PF data to mirror, and when to load it, may be based on a variety of factors. For example, if a system has an enormous amount of volatile memory 102, and a relatively small database, it may be desirable to mirror the entire database. Thus, all PF data would also be mirrored in the MF data. On the other hand, if there is a relatively small amount of volatile memory 102 relative to the size of the database, then it may be optimal to only mirror a very small fraction of the database.

Typically, when not all of the database is to be mirrored, the portion that is selected to be mirrored is based on which portion will most improve overall performance of the system. Typically, mirroring data that is used frequently will provide more benefit than mirroring data that is used less frequently. Thus, if one table, one column of a table, or one partition of a table is access more frequently than other data in the database, that table, column or partition may be selected to be mirrored in volatile memory 102. The selection of which portions of a database to mirror may be made at any level of granularity. For example, the selection may be made on a per-table basis, a per-column basis, a per extent basis, a per segment basis, a per-table-partition basis, etc.

Self-Verification and Automatic Triage Overview

In systems that maintain MF data in addition to the PF data, multiple sources of the same data are available to process some queries. In the foregoing sections, it has been explained that when multiple sources of the same data are available, a database server may select from among the possible sources based on which source will result in the most efficient processing of the requested database operation.

However, rather than select one of the possible sources, a database server may alternatively execute the database operation, in parallel, against each of the two or more sources. For example, a query that selects data from column c1 of table 200 may be answered with MF data from column vector 220, or with PF data from PF data structures 108. Rather than select one or the other, the database server can execute the operation, separately and independently, against both sources. Once finished, the results produced by the various sources may be compared against each other. If the result sets do not match, then an error occurred during the processing of at least one of the operations.

The database server may take any number of possible actions when such an error is detected. For example, in one embodiment, an alert is generated to indicate the occurrence of the error. The alert may indicate what the discrepancy is between the two results sets. Instead of or in addition to generating an alert, the database server may perform additional debugging operations, including but not limited to re-executing the operation turning off or on different database features to determine the feature whose use produces the error.

When the result sets match, the user may have a greater degree of confidence that the results of the operation are accurate. Thus, parallel execution, by the same database instance, of the same operation against multiple sources of the same data (the MF data and the PF data) provides an on-the-fly “double check” to verify the result set of the operation.

Typically, the execution of the database operations against the two sources may be done in parallel, so that performing self-verification has little performance impact on the operation relative to performing the operation only on the PF data. According to one embodiment, self-verification may be enabled at a highly granular level. For example, self-verification may be enabled on a per-session basis. Thus, the additional overhead incurred by self-verification may be incurred in only those sessions a user wishes to “test” for accuracy.

Self-verification operations may also be initiated by the system itself. For example, rather than receive a request from an application to execute a database command, the database system may be configured to identify and select “critical” database commands from those that have already been executed by the database system. During periods of low use, the database server may execute one or more of those selected database commands in the background. The selected database commands are executed in self-verification mode to concurrently produce multiple copies of the result set, one based on the MF data and one based on the PF data. The result sets are compared to ensure that the result sets are identical. If not identical, an error message may be sent to a user and/or recorded in a log. If identical, data may be stored to indicate that the selected database command passed a self-verification test. After passing a threshold number of tests (where the threshold may be 1), the database server may be configured to cease to select the database command for automated background self-verification.

In one embodiment, rather than simply generate an alert when a self-verification test fails, the database command is automatically and repeatedly retested under different conditions. To ensure that the repeats of the operation are as similar as possible to the original operation that produced the self-verification error, the same database operation may be executed with the same snapshot time as was used during the session that encountered the error.

In many database systems, numerous advanced query processing features may have virtual “on-off” switches, where the default state is “on”. During the repeats of a previously-failed self-verification test, those features may be selectively turned on and off. If the self-verification passes when a particular feature is turned off, and fails when the same particular feature is turned on, then there is a likelihood that the error is related to that feature.

Having determined that use of a particular feature causes a self-verification problem with a particular database operation, a quarantine may be enforced. The scope of the quarantine may vary. For example, the database server may automatically turn off the particular feature for all future database commands, for all future database commands that target the same data as the database operation that encountered the error, or for only future executions of the specific database command that encountered the error.

In some embodiments, self-verification of query results obtained using MF data may be performed for each query. The self-verification can be granular enough to identify a particular row of a particular IMCU or journal that caused the incorrect query results and the type of error detected for the particular row. Or the self-verification can be configured to detect the occurrence of an error in the incorrect query results on an IMCU level. In some embodiments, if the row level self-verification creates a volume of verification-information (e.g., row hashes) that exceeds a threshold, the self-verification may be downgraded or converted to an IMCU level self-verification to balance efficient use of resources.

The error detected by self-verification may be further diagnosed to identify the root cause of the error by implementation of automatic triage techniques. In some embodiments, two of the main sources of incorrect query results can be triaged: (1) predicate filtering optimizations for queries that include at least one predicate, and (2) missing DML invalidations for any queries (missing DML invalidations in the transaction manager/SMU). A DML invalidation comprises metadata maintained in the SMU reflecting that a row in the IMCU has changed, and thus, should not be read by a query. In the case of incorrect query results caused by a predicate filtering optimization, the portion(s) of the particular IMCU that triggered the incorrect query results is re-scanned with a predicate filtering optimization successively and individually disabled in a particular order. The re-scanned result is compared with previously scanned result from the query scan to determine which predicate filtering optimization, if any, is the cause of the error. If the query does not include a predicate or none of the predicate filtering optimization is determined to be the cause, then the content of the incorrect row at load time from on-disk is compared to the content of the incorrect row at query time from the IMCU to determine whether a DML error occurred or not on the incorrect row. When the detection of the DML error is coupled with the error code or type identified in the self-verification, the type of missing DML invalidation may be determined. In alternative embodiments, automatic triage may also be performed on incorrect rows from journals instead of IMCUs.

Self-Verification of Query Results

FIGS. 9A-9C depict an example flow diagram 900 illustrating techniques for performing self-verification of query results, according to some embodiments. In an embodiment, the database system 100 is in-memory enabled to perform IMC scans to generate query results. In an embodiment, the database server 120 performs operations depicted in flow diagram 900 in response to a database query in order to verify accuracy of query results corresponding to the database query and, if the query results are found to be inaccurate, identify the source(s) of the error in the querying process. The operations of flow diagram 900 may be repeated for each query to be fulfilled using data organized in columnar format, e.g., MF data 104 in IMCUs. Self-verification may also be referred to as query results verification, query results check, on-disk verification, or the like.

In block 902, the database server 120 receives a query in a compatible database querying language. The query may be simple or complex, such as including compound, nesting, and/or other querying elements. A particular level or type of verification can be enabled by an administrator or user of the database system 100 for the received query. In an embodiment, one of the following types of query results verification may be enabled: no verification, a row level verification, or an IMCU level verification. No verification is also referred to as a disabled state and may be the default. The row level verification is also referred to as a heavyweight verification or granular verification, and may be the default for functional or system tests of the database system 100. The IMCU level verification is also referred to as a lightweight verification.

If the no query results verification type is enabled, then no query results verification is performed. In block 906, the database server 120 scans block(s) of an IMCU containing data requested in the query. For invalid data in the scanned block(s) of the IMCU (e.g., data that has changed since the IMCU was created), journal(s) and/or PF data are scanned to obtain current data in block 908. Additional details about the scanning operations are described in FIG. 7 and the accompanying description. In block 910, a check is performed to see whether all IMCUs containing data requested in the query have been scanned. If there is another IMCU to be scanned (no branch of block 910), then flow diagram 900 returns to block 906 to scan the next relevant IMCU. If all of the IMCUs relevant to the query have been scanned (yes branch of block 910), then flow diagram 900 proceeds to block 912. In block 912, the database server 120 returns query results corresponding to the query.

If the row level verification type is enabled, then the database server 120 executes the query in parallel, one using MF data in IMCUs and another using PF data in the buffer cache, and then compares the results on a per row basis to identify the exact row for which a discrepancy exists, if any. In an embodiment, the query context is cloned into a slave version for performing the verification using the buffer cache and this scan context may be marked as IMC disabled. The verification is performed at the same committed version of the system 100 (e.g., the same system change number (SCN)) as the actual execution of the query.

In block 914, the database server 120 scans non-IMC data source(s) corresponding to block(s) of an IMCU containing data requested in the query to perform the verification. In an embodiment, the buffer cache portion(s) corresponding to the block(s) of an IMCU containing data requested in the query is scanned. Because the data in the buffer cache is mirrored or duplicated from PF data 112 stored on-disk (e.g., persistent storage 110), the verification operations may be referred to as on-disk verification.

For each passing row of the scanned buffer cache (the portion of each row containing data associated with the query that scanned successfully), a buffer cache row hash is generated and a seen bit is set (e.g., to “1”), in block 916. Each buffer cache row hash comprises a value representative of the data contained in the respective row of the buffer cache. A row hash is an abbreviated representation of the data contained in the respective row. As an example, the buffer cache row hash comprises a four byte hash of all the projected and predicate columns. Each seen bit comprises a value of 0 or 1, for example, to ensure that a unique passing row is scanned once and only once and that a comparison of the row occurs, as discussed in detail below.

Next in block 918, a check is performed to determine whether the number of buffer cache row hashes exceeds a threshold. For example, the threshold may be set to a value of 32,000. In an embodiment, this check is performed as a balance between the benefits of exact row identification and efficient use of resources. For example, it is not unusual for an IMCU or multiple IMCUs to include more than a billion rows. To store row hashes for a very large number of rows (e.g., more than 32,000 rows) may be cumbersome. To be explained in detail below, if the number exceeds the threshold, the verification type may be automatically changed or downgraded to the IMCU level verification. If the number of buffer cache row hashes exceeds the threshold (yes branch of block 918), then flow diagram 900 proceeds to blocks 956 and 964 (the IMCU level verification). Otherwise, the number of buffer cache row hashes is below the threshold (no branch of block 918), and flow diagram 900 proceeds to block 920. In other embodiments, block 918 may be optional if exact row identification is desired and/or resources permit such granularity in the error detection.

In block 920, a check for invalid data in the journal(s) (e.g., in journals 602, 662, 664, and/or 666) for any of the passing rows is performed. If there is no invalid data (no branch of block 920), then the database server 120 generates and stores an IMCU row hash array in block 922. In an embodiment, the IMCU row hash array comprises a table or array of data block address (dba), index into a data block (slot), buffer cache row hash, and set bit for each passing row scanned in block 914. The list of {dba, slot, buffer cache row hash, set bit} for each passing row may be stored and later checked. An example IMCU row hash array is shown below.

dba slot Buffer cache row hash Seen bit A 5 xxxx 0 B 7 yyyy 1

The data block address (dba) comprises a plurality of rows of data. The index into a data block (slot) specifies a particular row of a data block.

In alternative embodiments, the IMCU row hash array comprises a table or array of row identifier, buffer cache row hash, and set bit for each passing row scanned in block 914. The row identifier (also referred to as rowid) is a unique identifier of a particular row and the buffer cache row hash and set bit are those generated in block 916. The list of {rowid, buffer cache row hash, set bit} for each passing row may be stored and later checked in rowid order. An example IMCU row hash array is shown below:

Rowid Buffer cache row hash Seen bit 1234567890 xxxx 1 1234555555 yyyy 1

When there is at least one passing row for which invalid data exists in the journal(s), (yes branch of block 920), then the database server 120 generates and stores two row hash arrays—one array for the valid rows and another array for the invalid rows, in block 924. In an embodiment, each of the row hash arrays comprises a table or array similar to that discussed above for block 922. The array for the valid rows, also referred to as an IMCU row hash array, contains, for each valid row, a data block address (dba), index into a data block (slot), buffer cache row hash, and set bit as generated in block 916. The list of {dba, slot, buffer cache row hash, set bit} for each valid passing row may be stored and later checked. The array for the invalid rows, also referred to as an IMCU invalid row hash array, contains, for each invalid row, a data block address (dba), index into a data block (slot), buffer cache row hash, and set bit as generated in block 916. The list of {dba, slot, buffer cache row hash, set bit} for each invalid passing row may be stored and checked in order or in a random order.

In alternative embodiments, each of the IMCU row hash array and the IMCU invalid row hash array may comprise a row identifier (also referred to as rowid) that is a unique identifier of a particular row and the buffer cache row hash and set bit are those generated in block 916, rather than a data block address (dba), index into a data block (slot), buffer cache row hash, and set bit. The list of {rowid, buffer cache row hash, set bit} for each passing row may be stored and later checked.

In still other embodiments, a single row hash array may be generated instead of two arrays. The single row hash array may include additional information, such as an additional column, to indicate whether the data block address/slot or row associated with each rowid is a valid or invalid row.

Next in block 926, a check is performed to see whether all of the buffer cache portions corresponding to all IMCUs containing data requested in the query have been scanned. If there are more portions of the buffer cache to be scanned, corresponding to another IMCU relevant to the query (no branch of block 926), then flow diagram 900 returns to block 914 to scan another portion of the buffer cache. If all portions of the buffer cache have been scanned for all IMCUs relevant to the query (yes branch of block 926), then flow diagram 900 proceeds to end the buffer cache scanning and associated operations.

Simultaneous with operations of blocks 914-926, blocks 930-954 are also occurring. In block 930, a check similar to that performed in block 918 occurs to confirm that the number of buffer cache row hashes does not exceed a threshold. If the number of buffer cache row hashes exceeds the threshold (yes branch of block 930), then flow diagram 900 proceeds to blocks 956 and 964 (the IMCU level verification). Otherwise, the number of buffer cache row hashes is below the threshold (no branch of block 930), and flow diagram 900 proceeds to block 932. In other embodiments, block 930 may be optional if exact row identification is desired and/or resources permit such granularity in the error detection.

In block 932, the database server 120 scans block(s) of an IMCU containing data requested in the query. The particular IMCU that is scanned is the same IMCU referenced in scanning the buffer cache portion in block 914. Additional details about the IMCU scanning operations are described in FIG. 7 and the accompanying description. Block 932 is similar to block 906.

Next in block 934, the database server 120 generates an in-memory row hash for each passing row (for each row that scanned successfully) of the scanned block(s) of the IMCU from block 932. The passing rows comprise rows of valid data. The invalid data rows will be separately addressed in block 942. In an embodiment, each of the in-memory row hash comprises a value representative of the data contained in the respective row. A row hash is an abbreviated representation of the data contained in the respective row. As an example, the in-memory row hash comprises a four byte hash of all the projected and predicate columns. The in-memory row hashes are configured to convey the same type of information as encoded in the buffer cache row hashes generated in block 916 for the same IMCU.

Each of the in-memory row hashes is compared to a respective buffer cache row hash stored in the IMCU row hash array in block 936. The row identifiers included in the IMCU row array (which only includes information relating to valid rows of the scanned block(s) of a particular IMCU) are matched to the rows associated with the in-memory row hashes in order to compare a particular in-memory row hash generated in block 934 to a corresponding particular on-disk row hash generated in block 916. In order to confirm that a comparison of a particular row occurred, the database server 120 also resets the seen bit associated with the particular row in the IMCU row array. Continuing the example of the seen bit being set to a value of “1” when a corresponding buffer cache row hash is generated, the seen bit is reset or updated to a different value, such as “0,” to indicate that the comparison for the particular row occurred or was “seen” during the verification process.

If each pair of the row hashes compared in block 936 matches each other (yes branch of block 938), then there is no inaccuracy, so far, in the in-memory based querying process. Otherwise, if at least one pair of the row hashes compared in block 936 do not match each other (no branch of block 938), then at least one error is detected in the in-memory querying process and the at least one error can be specifically attributed to a particular row of a particular IMCU.

Upon detection of at least one error, an indication of the error and/or other downstream processes (e.g., automatic triage, quarantine, debugging, and/or reporting functions) are initiated by the database server 120, in block 940. In an embodiment, the first mismatched row triggers at least an error indicator and a dump of the system state at which the error occurred. The error indicator may include, for example, the following parameters: scan data block address (dba), scan slot, expected dba, expected slot, and/or an error code. Example error codes include, but are not limited to, one or more of the following.

Error code Description 1 IMCU row has wrong contents 2 IMCU returns a different row 3 IMCU returns an extra row 4 IMCU missing a row 5 Invalidated row (in journal) has wrong contents 6 Journal (for invalidated row) returns a different row 7 Journal (for invalidated row) returns an extra row 8 Journal (for invalidated row) missing a row 9 Wrong query result detected but rowid is not available

Error codes 1 through 4 indicate an error associated with an IMCU. Error codes 5 through 8 indicate an error associated with journal(s) containing current data for the invalidated row(s) of IMCUs. Error codes 5 through 8 are similar to error codes 1 through 4, respectively, except they are for journals, not IMCUs. Error codes likely to arise in connection with block 938 include any of 1 through 9 in the error code table above.

As discussed in detail below in connection with the automatic triage mechanism, whether the corresponding hashes match or not and/or whether the seen bits in the hash array are updated to “seen” or not indicates the nature of the error. For example, if there is no invalid data in the scanned block(s) of the IMCU (thus, do not need to evaluate journal(s)), all of the seen bits in the IMCU row hash array are updated to “seen,” and a passing row of block(s) in the IMCU row hash array does not match the corresponding passing row of block(s) in the in-memory row hash, then that passing row of block(s) in the IMCU contains incorrect data. Error code 1 is indicated.

As another example, if there is no invalid data in the scanned block(s) of the IMCU (thus, do not need to evaluate journal(s)), one of the seen bit in the IMCU row hash array is not updated to “seen” (there are more passing rows in the IMCU than in the corresponding in-memory data range), and a passing row of block(s) in the IMCU row hash array does not match the corresponding passing row of block(s) in the in-memory row hash (because data from two different passing rows are compared to each other), then the IMCU returned an extra row and/or a different row than in the corresponding in-memory data range for the query. Error codes 2 and/or 3 are indicated.

An example of system state information that may be provided includes, but are not limited to, one or more of the following:

-   -   Verification row vectors     -   IMCU header and contents     -   All scan structures     -   Projected and predicated column information     -   Incorrect row from the IMCU     -   Corresponding row from on-disk and on-disk block dumps     -   Scan environment (identification of the committed version of the         system (SCN), transaction identification number (XID), etc.)     -   Information for in-memory DML changes     -   Redo records for the segment     -   Other information that may be helpful for debugging and/or other         downstream analysis.

In some embodiments, the detection of an error may trigger automatic triage operations. Triage operations are discussed in detail below in connection with FIG. 10.

When each of the row hash pairs match (yes branch of block 938), then scan operations proceed for the invalid data (also referred to as invalidated data). In block 942, the database server 120 scans the journal(s) and/or PF data for invalid data in the scanned block(s) of the IMCU from block 932. Additional details about the journal(s) and/or PF data scanning operations for invalid data are described in FIG. 7 and the accompanying description. Block 942 is similar to block 908.

Next in block 944, the database server 120 generates an in-memory row hash for each passing row (for each row that scanned successfully) of the scanned journal(s) and/or PF data from block 942. The passing rows comprise rows of invalid data. In an embodiment, each of the in-memory row hash comprises a value representative of the data contained in the respective row. A row hash is an abbreviated representation of the data contained in the respective row. As an example, the in-memory row hash comprises a four byte hash of all the projected and predicate columns. The in-memory row hashes are configured to convey the same type of information as encoded in the buffer cache row hashes generated in block 916 for the same IMCU.

Each of the in-memory row hashes is compared to a respective buffer cache row hash stored in the IMCU invalid row hash array in block 946. The row identifiers included in the IMCU invalid row array (which only includes information relating to invalid rows of the scanned journal(s) and/or PF data) are matched to the rows associated with the in-memory row hashes in order to compare a particular in-memory row hash generated in block 944 to a corresponding particular on-disk row hash generated in block 916. In order to confirm that a comparison of a particular row occurred, the database server 120 also resets the seen bit associated with the particular row in the IMCU invalid row array. Continuing the example of the seen bit being set to a value of “1” when a corresponding buffer cache row hash is generated, the seen bit is reset or updated to a different value, such as “0,” to indicate that the comparison for the particular row occurred or was “seen” during the verification process.

If each pair of the row hashes compared in block 946 matches each other (yes branch of block 948), then there is no inaccuracy, so far, in the in-memory based querying process. Otherwise, if at least one pair of the row hashes compared in block 946 do not match each other (no branch of block 948), then at least one error is detected in the in-memory querying process and the at least one error can be specifically attributed to a particular row of a particular IMCU or journal(s).

Similar to the discussion above for block 938, if at least one of the row hash pairs do not match (no branch of block 948), then flow diagram 900 proceeds to block 940 since an error in a particular row has been detected. Block 940 is discussed in detail above. Otherwise all of the row hash pairs match (yes branch of block 948), and no error, so far, has occurred.

The database server 120 checks, in block 950, whether all of the seen bits in the IMCU row hash array and the IMCU invalid row hash array, if applicable, for the particular IMCU, have been reset to a different state (e.g., changed from “1” to “0”) indicative of the respective row hash comparison having occurred.

If at least one of the seen bit is not reset (no branch of block 950), then flow diagram 900 proceeds to block 940. At least one of the seen bit may not be reset if the particular buffer cache row hash corresponding to the non-reset seen bit in the IMCU row hash array or IMCU invalid row hash array was unable to be compared to an in-memory row hash, or there was no corresponding in-memory row hash (because the row does not exist in the IMCU, journal(s), and/or PF data) with which to be compared. For example, error codes 3, 4, 7, or 8 (in the error code table above) may be applicable in such a scenario.

If all of the seen bits are reset (yes branch of block 950), then a check is performed to see whether all IMCUs containing data requested in the query have been scanned, in block 952. If there is another IMCU to be scanned (no branch of block 952), then flow diagram 900 returns to block 932 to scan the next relevant IMCU. If all of the IMCUs relevant to the query have been scanned (yes branch of block 952), then flow diagram 900 proceeds to block 954. In block 954, the database server 120 provides the query results corresponding to the query. No error in the in-memory query results was detected.

As can be seen from the discussion above, row level verification permits identification of inaccurate query results based on detection of symptoms such as, but not limited to, any of the following.

Symptoms Description Mismatch row hash Wrong column contents Mismatch {dba, slot} In-memory scan has extra or missing row depending on rowid order Exceed verification count, In-memory scan has an extra row seen bit not set Seen bit still set when finished In-memory scan missing a row with comparisons

In an embodiment, the row hash generation and comparisons may occur on a per IMCU basis so that the row hash array construct may be created once and reused for each IMCU that is scanned in accordance with fulfillment of the query. The verification state may thus be allocated once and reused for each IMCU relevant to the query. In an embodiment, the row level verification is configured to detect all incorrect rows for the particular query and provide associated error code, system state, and/or other relevant information. In other embodiments, row level verification may stop once an incorrect row is detected for the particular query.

If the IMCU level verification type is enabled, then the database server 120 executes the query in parallel, one using MF data in IMCUs and another using PF data in the buffer cache, and then compares the results on a per IMCU basis to identify the particular IMCU for which an inaccuracy occurred, if any. In an embodiment, the query context is cloned into a slave version for performing the verification using the buffer cache and this scan context may be marked as IMC disabled. The verification is performed at the same committed version of the system 100 (e.g., the same SCN) as the actual execution of the query.

IMCU level verification is generally similar to row level verification except the check is less granular because the check is performed on an IMCU level instead of a row level. Hence, the row hashes of the row level verification are replaced with IMCU hashes for the IMCU level verification, and the comparisons are of the buffer cache IMCU hashes generated using buffer cache data (on-disk data) and the in-memory IMCU hashes generated using the IMCU and/or journal(s) data. While the exact row underlying the error cannot be determined, the exact IMCU (or journal) containing the incorrect row is identifiable.

In block 956, the database server 120 scans non-IMC data source(s) corresponding to block(s) of an IMCU containing data requested in the query to perform the verification. In an embodiment, the buffer cache portion(s) corresponding to the block(s) of an IMCU containing data requested in the query is scanned. Because the data in the buffer cache is data mirrored or duplicated from PF data 112 stored on-disk (e.g., persistent storage 110), the verification operations may be referred to as on-disk verification. Block 956 is similar to block 914.

In block 958, a buffer cache IMCU hash is generated for the buffer cache portion(s) scanned in block 956. The buffer cache IMCU hash is associated with a particular IMCU. The buffer cache IMCU hash comprises a value representative of the data contained in the buffer cache portion(s) scanned. A buffer cache IMCU hash is an abbreviated representation of the data contained in the respective row. In an embodiment, the buffer cache IMCU hash may comprise a four byte hash of all the projected and predicate columns, similar to a row hash. As with the seen bit set for each row hash in row level verification, a seen bit may also be set (e.g., set to “1”) for the buffer cache IMCU hash. Alternatively, a seen bit may be unnecessary for IMCU level verification.

Next in block 960, a check is performed to see whether all of the buffer cache portions corresponding to all IMCUs containing data requested in the query have been scanned. If there are more portions of the buffer cache to be scanned, corresponding to another IMCU relevant to the query (no branch of block 960), then flow diagram 900 returns to block 956 to scan another portion of the buffer cache. If all portions of the buffer cache have been scanned for all IMCUs relevant to the query (yes branch of block 960), then flow diagram 900 proceeds to end the buffer cache scanning and associated operations.

Simultaneous with operations of blocks 956-960, blocks 962-976 are also occurring. In block 962, the database server 120 scans block(s) of an IMCU containing data requested in the query. The particular IMCU that is scanned is the same IMCU referenced in scanning the buffer cache portion in block 956. Additional details about the IMCU scanning operations are described in FIG. 7 and the accompanying description. Block 962 is similar to block 932.

If the block(s) of the IMCU scanned in block 962 contains invalid data, then current version of the invalid data is obtained by scanning journal(s) and/or PF data in block 964. Block 964 is similar to block 942.

With all of the (current) data contained in the IMCU and, if invalid data exists, the journal(s) and/or PF data as requested in the query scanned, the database server 120 generates an in-memory IMCU hash for the particular IMCU in block 966. The in-memory IMCU hash comprises a value representative of the data scanned from the particular IMCU and, if invalid data exists, the journal(s) and/or PF data in blocks 962 and 964. The in-memory IMCU hash is configured to be compatible for comparison with the buffer cache IMCU hash generated in block 958 for the same IMCU.

Next in block 968, the database server 120 compares the in-memory IMCU hash to the buffer cache IMCU hash for the same IMCU. If the hashes don't match (no branch of block 972), then the database server 120 indicates the occurrence of an error in the particular IMCU and/or initiates downstream operations such as triage, quarantine, debugging, and/or other operations similar to the discussion above for block 940. In an embodiment, error code 9 of the error code table above may be provided as an indication of error. In some embodiments, the detection of an error may trigger automatic triage operations. Triage operations are discussed in detail below in connection with FIG. 10.

If the hash matches (yes branch of block 972), then no error is detected in the particular IMCU. The next IMCU from among a plurality of IMCUs containing data requested in the query, if applicable (no branch of block 974), is scanned next by the flow diagram 900 returning to block 962. Otherwise, all IMCU(s) relevant to the query have been scanned (yes branch of block 974) and with all respective hashes matching, the in-memory query results are accurate. Accordingly, in block 976, database server 120 provides or returns the query results corresponding to the received query.

In an embodiment, the IMCU hash generation and comparison may occur on a per IMCU scanned basis. The verification state may thus be allocated once and reused for each IMCU relevant to the query. In an embodiment, the IMCU level verification is configured to detect all incorrect IMCUs for the particular query and provide associated error code, system state, and/or other relevant information. In other embodiments, IMCU level verification may stop once an incorrect IMCU is detected for the particular query.

Automatic Triage of Query Results

Having detected that a wrong query result occurred, the wrong query result can be triaged or diagnosed to automatically identify the root cause of the wrong result and then prevent the problem from occurring in the future (e.g., applying a quarantine to the cause of the problem). Automatic triage operations determine which code-path introduced the error and aids in refinement of the error detected in the self-verification process into a more module-specific error identification.

In some embodiments, the following conditions exist and/or are confirmed in order for application of automatic triage to the wrong result identified in self-verification:

-   -   Scan environment is the same for the verification scan and the         actual query IMCU scan.     -   If all rows of IMCUs containing data requested in the query are         not verified, the IMCU should be pinned.     -   The dba associated with the incorrect row is mapped to a valid         IMCU.     -   Both of the transaction layer and the space layer have the same         IMCU and SMU addresses.     -   The committed version of the system 100 associated with the scan         (e.g., scan SCN) is greater than or equal to the committed         version of the system 100 associated with the load (e.g., load         SCN) on the SMU.

FIG. 10 depicts an example flow diagram 1000 illustrating techniques for performing automatic triage of an error identified in the query results corresponding to a query, according to some embodiments. The operations of flow diagram 1000 may be automatically initiated in response to detection of an error, such as during the self-verification process in FIGS. 9A-9C, or it may be separately initiated. In an embodiment, the operations of flow diagram 1000 are performed by the database server 120.

In block 1002, the query corresponding to the detected wrong query result is examined to determine whether the query statement includes at least one predicate. If a predicate is present (yes branch of block 1002), then the database server 120 determines whether a particular predicate filtering optimization used to execute the query is responsible for returning the incorrect result. In block 1004, the particular IMCU that triggered to incorrect query result is re-scanned with a particular predicate filtering optimization disabled. In the first iteration of the re-scan, the particular predicate filtering optimization that is disabled can be high performance kernels (HPK) or single instruction multiple data (SIMD). The HPK or SIMD infrastructure provides APIs (e.g., comparisons, decode, set-membership) for efficient expression evaluation over columnar formatted data with any encoding context. In an embodiment, only the portions(s) of the particular IMCU that triggered the incorrect query result is re-scanned rather than re-scanning the entire IMCU.

If the re-scan result is the same as the previous scan result (the scan result from the original query scan) for the same particular IMCU (yes branch of block 1006), then the error was reproduced and the disabled predicate filtering optimization is likely not the cause of the incorrect result. The comparison of the two scan results may comprise generating a hash of each of the scan results and comparing the hashes in some embodiments.

Next, the currently disabled predicate filtering optimization is restored or enabled, and a different particular predicate filtering optimization is disabled in block 1010. In the second iteration of the re-scan, the particular predicate filtering optimization that is disabled can be portable code (Pcode). The Pcode infrastructure includes an expression evaluation engine used on columnar formatted data for database in-memory (DBIM). Pcode enables push-down of significantly complex predicates and also allows for optimizations such as in-list processing and minimum/maximum pruning. Flow diagram 1000 returns to block 1004 to re-scan the particular IMCU with the Pcode predicate filtering optimization disabled.

If the re-scan result is different from the previous scan result for the same particular IMCU (no branch of block 1006), then the disabled predicate filtering optimization is likely the cause of the incorrect result. The database server 120, in block 1008, indicates the particular predicate filtering optimization that was disabled as the cause of the incorrect query result. A predicate filtering optimization-specific assert may be raised.

When flow diagram 1000 returns to block 1004 and performs a re-scan with the Pcode predicate filtering optimization disabled, if the re-scan result is again the same as the previous scan result for the same particular IMCU (yes branch of block 1006), then the Pcode predicate filtering optimization is enabled in block 1010, and in the third iteration of the re-scan, the particular predicate filtering optimization that is disabled can be column-level predicates.

If the re-scan result with the column-level predicates disabled compared to the previous scan result are the same (yes branch of block 1010), then the column-level predicates filtering optimization is also not the cause of the error. In an embodiment, no other predicate filtering optimization exists and/or is not disabled. In this case, no predicate filtering optimization is the cause of the error and flow diagram 1000 proceeds to block 1012.

In blocks 1004-1010, the portion(s) of the particular IMCU that triggered the incorrect query results is re-scanned with a predicate filtering optimization successively and individually disabled in a particular order. In an embodiment, as discussed above, the particular order of the predicate filtering optimization to be disabled in SIMD (or HPK), Pcode, and then column-level predicates. In other embodiment, the particular order of the predicate filtering optimization to be disabled may be different than described above and/or more or fewer predicate filtering optimizations may be included in the particular order. For example, an alternative particular order may be SIMD (or HPK), Pcode, minimum/maximum pruning, and column-level predicates.

If a predicate filtering optimization is not the cause of the incorrect result or the query does not include a predicate (no branch of block 1002), then an analysis is performed to determine whether an error detected in FIGS. 9A-9C is caused by a data manipulation language (DML) error or some other cause (proceeds to block 1012). This is in contrast to blocks 1004-1010, which is analysis to determine whether the way the query was performed or the features of the query caused the incorrect query result.

In block 1012, the database server 120 proceeds to obtain or fetch the content of the incorrect row as of the committed version of the system 100 at load time (load SCN) from the on-disk format, in block 1012. The database server 120 also obtains or fetches the content of the incorrect row as of the committed version of the system 100 at query time (query SCN) from the on-disk format, in block 1014. Next, both content are compared to each other in block 1016.

If the content(s) do not match each other (no branch of block 1018), then the content of the incorrect row is different at load time than at query time and a DML error (also referred to as a DML invalidation) occurred with respect to the incorrect row. In block 1020, a particular type of DML error is identified based on the particular error code (and possible additional information) from the self-verification phase, in accordance with the DML triage table below. In an embodiment, the particular types of DML errors specify a type of defect in the journal(s) in which up-to-date information about invalidated rows of an IMCU are maintained. For example, the journal(s) may not be up-to-date, for whatever reason, with a data update to a row of the IMCU, a deletion of a row of the IMCU, an insertion of a row to the IMCU, and the like.

Conversely, if the content matches each other (yes branch of block 1018), then no DML error occurred on that incorrect row. And in block 1022, a particular type of non-DML error is identified based on the particular error code (and possible additional information) from the self-verification phase, in accordance with the DML triage table below. In an embodiment, non-DML errors can comprise load and/or scan issues and the like.

In blocks 1020 and 1022, database server 120 raises the appropriate assert. In an embodiment, when the error code or type from the self-verification is taken into account for the incorrect query result along with the determination of the presence or absence of a DML error, then a particular type of DML error (a type of missing DML invalidation) or a particular type of non-DML error can be determined in blocks 1020 or 1022, respectively. Examples of the particular types of DML error or non-DML error in accordance with an error code or type from self-verification are shown in the table below.

Additional Non- Error code information DML error DML error 1 Missing update Load/scan issue (IMCU row has invalidation wrong contents) 2 Verification rowid > Missing delete Scan issue (IMCU returns a IMCU rowid invalidation different row) 2 Verification rowid < Missing insert Scan issue (IMCU returns a IMCU rowid invalidation different row) 3 Missing delete Scan issue (IMCU returns an invalidation extra row) 4 Missing insert Scan issue (IMCU missing a invalidation row)

In an embodiment, flow diagram 1000 may be similarly implemented for incorrect rows of data contained in journal(s) instead of IMCUs. For example, rather than re-scanning (portion(s) of) a particular IMCU that triggered the incorrect query result in block 1004, the portion(s) of the journal that triggered the incorrect query result may be re-scanned in the case of the incorrect row coming from a journal and the previous scan result used for comparison with the re-scan is the result of scanning the same portion(s) of the journal during the query. Likewise, the content obtained from the incorrect row in block 1014 may be content from the incorrect row of the journal rather than the particular IMCU.

In some embodiments, when quarantine is enabled and after triage, the incorrect row identifier may be added to a quarantine list or vector. This in turn triggers a scan of quarantines on that segment to determine whether to escalate, quarantine specific IMCUs, whether to make the quarantine persistent, and the like.

FIGS. 11A-11I depict block diagrams illustrating examples of DML error determination according to some embodiments. FIGS. 11A-11C depict a missing update invalidation example, FIGS. 11D-11F depict a missing insert invalidation example, and FIGS. 11G-11I depict a missing delete invalidation example.

In FIG. 11A, an IMCU 1100 contains data from one or more data blocks of on-disk data. In particular, IMCU 1100 includes data associated with rows A1, A2, A4, and A5. As discussed above for the verification phase, the data in each of these rows may be hashed, which is represented as hashes h1, h2, h4, and h5 for rows A1, A2, A4, and A5, respectively. Since IMCU 1100 is not changed after creation, any updates associated with the one or more data blocks on-disk corresponding to IMCU 1100 after IMCU 1100 has been created should be maintained in an SMU 1102. SMU 1102 comprises one or more journals that maintains information about invalidated rows as discussed above. As shown in FIG. 11A, SMU 1102 notes that a change has occurred in each of rows A3 and A4 since IMCU 1100 was created.

A redo log 1104 shows the actual updates that occurred on the one or more data blocks on-disk corresponding to IMCU 1100 after IMCU 1100 was created. Among other things, an update operation occurred (URP) to update data in row A2. However, this update is missing in SMU 1102—note the absence of any mention of row A2 in SMU 1102.

To compare hashes of data contained in the IMCU 1100 and SMU 1102 against corresponding data contained on-disk, hash arrays corresponding to on-disk data such as a valid row array 1106 and an invalid row array 1108 may be constructed as discussed above for the verification phase. For the sake of simplification, the row hash values corresponding to IMCU 1100 and SMU 1102 are shown in IMCU 1100. In FIG. 11B, a hash value 1110 associated with row A1 of IMCU 1100/SMU 1102 is compared against a hash value 1112 associated with row A1 of the on-disk version. Both hash values are the same (i.e., h1) and thus, no error is detected with respect to row A1.

Continuing in successive row order among the valid rows in IMCU 1100, next in FIG. 11C, a hash value 1114 associated with row A2 of IMCU 1100/SMU 1102 is compared against a hash value 1116 associated with row A2 of the on-disk version. The hash values are not the same as each other—hash value h2 in IMCU 1100 (SMU 1102 does not indicate that row A2 is invalidated) while hash value h2U in on-disk. Accordingly, row A2 of IMCU 1100 has the wrong contents (e.g., error code 1) and the incorrect content can be attributed to a defect in the SMU 1102. In particular, due to a missing update invalidation in the SMU 1102.

In FIG. 11D, an IMCU 1120 contains data from one or more data blocks of on-disk data. In particular, IMCU 1120 includes data associated with rows A1, A2, A4, and A5. As discussed above for the verification phase, the data in each of these rows may be hashed, which is represented as hashes h1, h2, h4, and h5 for rows A1, A2, A4, and A5, respectively. Since IMCU 1120 is not changed after creation, any updates associated with the one or more data blocks on-disk corresponding to IMCU 1120 after IMCU 1120 has been created should be maintained in an SMU 1122. SMU 1122 comprises one or more journals that maintains information about invalidated rows as discussed above. As shown in FIG. 11D, SMU 1122 notes that a change has occurred in each of rows A2 and A4 since IMCU 1120 was created.

A redo log 1124 shows the actual updates that occurred on the one or more data blocks on-disk corresponding to IMCU 1120 after IMCU 1120 was created. Among other things, an insert operation occurred (IRP) to insert a new row A3 between rows A2 and A4. However, this insert is missing in SMU 1122—note the absence of any mention of row A3 in SMU 1122.

To compare hashes of data contained in the IMCU 1120 and SMU 1122 against corresponding data contained on-disk, hash arrays corresponding to on-disk data such as a valid row array 1126 and an invalid row array 1128 may be constructed as discussed above for the verification phase. For the sake of simplification, the row hash values corresponding to IMCU 1120 and SMU 1122 are shown in IMCU 1120. In FIG. 11E, a hash value 1130 associated with row A1 of IMCU 1120/SMU 1132 is compared against a hash value 1132 associated with row A1 of the on-disk version. Both hash values are the same (i.e., h1) and thus, no error is detected with respect to row A1.

Continuing in successive row order among the valid rows in IMCU 1120, next in FIG. 11F, a hash value 1134 associated with row A5 of IMCU 1120/SMU 1122 is compared against a hash value 1136 associated with row A3 of the on-disk version. Row A5 of IMCU 1120 is the next valid row after row A1 based on SMU 1122, which specifies that rows A2 and A4 are invalid rows. However, in the valid row array 1126, the next valid row after row A1 is row A3 because SMU 1122 does not specify that row A3 is an invalid row. The hash values are not the same as each other—hash value h5 in IMCU 1120 is different from hash value h3I in on-disk. Accordingly, row A5 of IMCU 1120 is a different row than row A3 (e.g., error code 2) and the verification rowid A3 is less than the IMCU rowid A5. The error is attributable to a missing insert invalidation in the SMU 1122 in accordance with the table discussed above in connection with blocks 1020 and 1022.

In FIG. 11G, an IMCU 1140 contains data from one or more data blocks of on-disk data. In particular, IMCU 1140 includes data associated with rows A1, A2, A4, and A5. As discussed above for the verification phase, the data in each of these rows may be hashed, which is represented as hashes h1, h2, h4, and h5 for rows A1, A2, A4, and A5, respectively. Since IMCU 1140 is not changed after creation, any updates associated with the one or more data blocks on-disk corresponding to IMCU 1140 after IMCU 1140 has been created should be maintained in an SMU 1142. SMU 1142 comprises one or more journals that maintains information about invalidated rows as discussed above. As shown in FIG. 11G, SMU 1142 notes that a change has occurred in each of rows A2 and A3 since IMCU 1140 was created.

A redo log 1144 shows the actual updates that occurred on the one or more data blocks on-disk corresponding to IMCU 1140 after IMCU 1140 was created. Among other things, a delete operation occurred (DRP) to delete row A4. However, this delete is missing in SMU 1142—note the absence of any mention of row A4 in SMU 1142.

To compare hashes of data contained in the IMCU 1140 and SMU 1142 against corresponding data contained on-disk, hash arrays corresponding to on-disk data such as a valid row array 1146 and an invalid row array 1148 may be constructed as discussed above for the verification phase. For the sake of simplification, the row hash values corresponding to IMCU 1140 and SMU 1142 are shown in IMCU 1140. In FIG. 11H, a hash value 1150 associated with row A1 of IMCU 1140/SMU 1142 is compared against a hash value 1152 associated with row A1 of the on-disk version. Both hash values are the same (i.e., h1) and thus, no error is detected with respect to row A1.

Continuing in successive row order among the valid rows in IMCU 1140, next in FIG. 11I, a hash value 1154 associated with row A4 of IMCU 1140/SMU 1142 is compared against a hash value 1156 associated with row A5 of the on-disk version. Row A4 of IMCU 1140 is the next valid row after row A1 based on SMU 1142, which specifies that rows A2 and A3 are invalid rows. However, in the valid row array 1146, the next valid row after row A1 is row A5 because SMU 1142 does not specify that row A4 is an invalid row. The hash values are not the same as each other—hash value h4 in IMCU 1140 is different from hash value h5 in on-disk. Accordingly, row A4 of IMCU 1140 is a different row than row A5 (e.g., error code 2) and the verification rowid A5 is greater than the IMCU rowid A4. The error is attributable to a missing delete invalidation in the SMU 1142 in accordance with the table discussed above in connection with blocks 1020 and 1022.

In embodiments of the present disclosure, the order in which one or more analyses is performed to identify the cause of the error may be performed in serial, in parallel, or any order relative to each other. Embodiments of the present disclosure determines whether the error is caused by: (1) an execution issue in the query statement/code, (2a) changes to the data from DML statements (insert, update, and/or delete), or (2b) some aspect of the data format, such as an issue with the data type. As an example, analysis associated with items (1) and (2a) may be performed in parallel with each other if a quicker result is desired. As another example, analysis associated with items (1) and (2b) may be performed in parallel with each other if a quicker result is desired. As another example, if efficient use of resources (e.g., processing resources) is of higher priority than quickness in obtaining results, then items (1), (2a), and/or (2b) may be analyzed sequentially for a given received query.

In this manner, automatic verification and/or triage of query results obtained from column-major formatted data is performed at runtime. Not only are query results provided in response to queries accurate (or more accurate) because they are checked prior to being provided to requesters, but the operations discussed herein permit real-time or near real-time monitoring of data scanning operations, the state of column-major formatted data, and/or other system states pertinent to query result generation. With such monitoring capabilities, system shortcomings can be proactively addressed, accurate diagnostic information is known, and subsequent queries need not be subject to same causes of error. In alternative embodiments, the automatic verification and/or triage functionalities discussed herein may be practiced in a non-runtime environment. For example, it may be performed asynchronously with providing query results to requesters, serving more to “test” a certain number and/or types of query results as opposed to providing real-time checks on query results before the query results are provided to requesters. As another example, the automatic verification and/or triage functionalities may be practiced in a testing, installation, start up, and/or in other non-runtime environments. When IMCUs are created, for example, one or more queries may be run on data contained in them, and are checked using the automatic verification and/or triage mechanisms.

Hardware Overview

According to one embodiment, the techniques described herein are implemented by one or more special-purpose computing devices. The special-purpose computing devices may be hard-wired to perform the techniques, or may include digital electronic devices such as one or more application-specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs) that are persistently programmed to perform the techniques, or may include one or more general purpose hardware processors programmed to perform the techniques pursuant to program instructions in firmware, memory, other storage, or a combination. Such special-purpose computing devices may also combine custom hard-wired logic, ASICs, or FPGAs with custom programming to accomplish the techniques. The special-purpose computing devices may be desktop computer systems, portable computer systems, handheld devices, networking devices or any other device that incorporates hard-wired and/or program logic to implement the techniques.

For example, FIG. 12 is a block diagram that illustrates a computer system 1200 upon which an embodiment of the invention may be implemented. Computer system 1200 includes a bus 1202 or other communication mechanism for communicating information, and a hardware processor 1204 coupled with bus 1202 for processing information. Hardware processor 1204 may be, for example, a general purpose microprocessor.

Computer system 1200 also includes a main memory 1206, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1202 for storing information and instructions to be executed by processor 1204. Main memory 1206 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1204. Such instructions, when stored in non-transitory storage media accessible to processor 1204, render computer system 1200 into a special-purpose machine that is customized to perform the operations specified in the instructions.

Computer system 1200 further includes a read only memory (ROM) 1208 or other static storage device coupled to bus 1202 for storing static information and instructions for processor 1204. A storage device 1210, such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to bus 1202 for storing information and instructions.

Computer system 1200 may be coupled via bus 1202 to a display 1212, such as a cathode ray tube (CRT) or liquid crystal display (LCD), for displaying information to a computer user. An input device 1214, including alphanumeric and other keys, is coupled to bus 1202 for communicating information and command selections to processor 1204. Another type of user input device is cursor control 1216, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1204 and for controlling cursor movement on display 1212. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.

Computer system 1200 may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system causes or programs computer system 1200 to be a special-purpose machine. According to one embodiment, the techniques herein are performed by computer system 1200 in response to processor 1204 executing one or more sequences of one or more instructions contained in main memory 1206. Such instructions may be read into main memory 1206 from another storage medium, such as storage device 1210. Execution of the sequences of instructions contained in main memory 1206 causes processor 1204 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions.

The term “storage media” as used herein refers to any non-transitory media that store data and/or instructions that cause a machine to operate in a specific fashion. Such storage media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or solid-state drives, such as storage device 1210. Volatile media includes dynamic memory, such as main memory 1206. Common forms of storage media include, for example, a floppy disk, a flexible disk, hard disk, solid-state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.

Storage media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between storage media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 1202. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.

Various forms of media may be involved in carrying one or more sequences of one or more instructions to processor 1204 for execution. For example, the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 1200 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 1202. Bus 1202 carries the data to main memory 1206, from which processor 1204 retrieves and executes the instructions. The instructions received by main memory 1206 may optionally be stored on storage device 1210 either before or after execution by processor 1204.

Computer system 1200 also includes a communication interface 1218 coupled to bus 1202. Communication interface 1218 provides a two-way data communication coupling to a network link 1220 that is connected to a local network 1222. For example, communication interface 1218 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 1218 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 1218 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.

Network link 1220 typically provides data communication through one or more networks to other data devices. For example, network link 1220 may provide a connection through local network 1222 to a host computer 1224 or to data equipment operated by an Internet Service Provider (ISP) 1226. ISP 1226 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 1228. Local network 1222 and Internet 1228 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 1220 and through communication interface 1218, which carry the digital data to and from computer system 1200, are example forms of transmission media.

Computer system 1200 can send messages and receive data, including program code, through the network(s), network link 1220 and communication interface 1218. In the Internet example, a server 1230 might transmit a requested code for an application program through Internet 1228, ISP 1226, local network 1222 and communication interface 1218.

The received code may be executed by processor 1204 as it is received, and/or stored in storage device 1110, or other non-volatile storage for later execution.

In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. The sole and exclusive indicator of the scope of the invention, and what is intended by the applicants to be the scope of the invention, is the literal and equivalent scope of the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. 

What is claimed is:
 1. A method comprising: performing a first scan operation, by a computing device that comprises memory, of data organized in column-major format in a first data object stored in the memory of the computing device to obtain an erroneous query result corresponding to a query statement, wherein the query statement includes at least one predicate; disabling a first predicate filtering optimization and performing a second scan operation, by the computing device, of the data organized in the column-major format with the first predicate filtering optimization disabled to obtain a first query result; when the erroneous query result and the first query result are different from each other, indicating, by the computing device, the first predicate filtering optimization as a source of an inaccuracy in the erroneous query result; when the erroneous query result and the first query result are same, enabling the first predicate filtering optimization, disabling a second predicate filtering optimization, and performing a third scan operation, by the computing device, of the data organized in the column-major format with the second predicate filtering optimization disabled to obtain a second query result; when the erroneous query result and the second query result are different from each other, indicating, by the computing device, the second predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 2. The method of claim 1, further comprising: when the erroneous query result and the second query result are the same, enabling the second predicate filtering optimization, disabling a third predicate filtering optimization, and performing a fourth scan operation, by the computing device, of the data organized in the column-major format with the third predicate filtering optimization disabled to obtain a third query result; when the erroneous query result and the third query result are different from each other, indicating the third predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 3. The method of claim 2, wherein the first predicate filtering optimization comprises a single instruction multiple data (SIMD) predicate filtering optimization, the second predicate filtering optimization comprises a portable code (Pcode) predicate filtering optimization, and the third predicate filtering optimization comprises a column-level predicates filtering optimization.
 4. The method of claim 1, further comprising: when the erroneous query result and the second query result are the same as each other, performing a comparison of data associated with an incorrect row as of a committed version at load time to data associated with the incorrect row as of a committed version at query time; when the comparison results in a match, indicating an occurrence of a first type of error; when the comparison does not result in a match, indicating an occurrence of a second type of error.
 5. The method of claim 4, wherein the data in the first data object corresponds to one or more blocks of data organized in a format that is not the column-major format at a first point in time and updates to the one or more blocks of data organized in the format that is not the column-major format after the first point in time are recorded in a record, wherein the first type of error comprises missing information in the record, wherein the missing information is for at least one of a missing update invalidation, a missing delete invalidation, or a missing insert invalidation.
 6. The method of claim 4, wherein the second type of error comprises at least one of a load issue or a scan issue.
 7. The method of claim 1, further comprising in response to determining that the erroneous query result is inaccurate, automatically performing automatic triage and identification of a root cause of the inaccuracy.
 8. One or more non-transitory computer-readable media storing instructions, wherein the instructions include: instructions which, when executed by one or more hardware processors, performing a first scan operation of data organized in column-major format in a first data object stored in memory to obtain an erroneous query result corresponding to a query statement, wherein the query statement includes at least one predicate; instructions which, when executed by the one or more hardware processors, cause, disabling a first predicate filtering optimization and performing a second scan operation of the data organized in the column-major format with the first predicate filtering optimization disabled to obtain a first query result; instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the first query result are different from each other, indicating the first predicate filtering optimization as a source of an inaccuracy in the erroneous query result; instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the first query result are same, enabling the first predicate filtering optimization, disabling a second predicate filtering optimization, and performing a third scan operation of the data organized in the column-major format with the second predicate filtering optimization disabled to obtain a second query result; instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the second query result are different from each other, indicating the second predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 9. The one or more non-transitory computer-readable media of claim 8, wherein the instructions further include: instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the second query result are the same, enabling the second predicate filtering optimization, disabling a third predicate filtering optimization, and performing a fourth scan operation of the data organized in the column-major format with the third predicate filtering optimization disabled to obtain a third query result; instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the third query result are different from each other, indicating the third predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 10. The one or more non-transitory computer-readable media of claim 9, wherein the first predicate filtering optimization comprises a single instruction multiple data (SIMD) predicate filtering optimization, the second predicate filtering optimization comprises a portable code (Pcode) predicate filtering optimization, and the third predicate filtering optimization comprises a column-level predicates filtering optimization.
 11. The one or more non-transitory computer-readable media of claim 8, wherein the instructions further include: instructions which, when executed by the one or more hardware processors, cause, when the erroneous query result and the second query result are the same as each other, performing a comparison of data associated with an incorrect row as of a committed version at load time to data associated with the incorrect row as of a committed version at query time; instructions which, when executed by the one or more hardware processors, cause, when the comparison results in a match, indicating an occurrence of a first type of error; instructions which, when executed by the one or more hardware processors, cause, when the comparison does not result in a match, indicating an occurrence of a second type of error.
 12. The one or more non-transitory computer-readable media of claim 11, wherein the data in the first data object corresponds to one or more blocks of data organized in a format that is not the column-major format at a first point in time and updates to the one or more blocks of data organized in the format that is not the column-major format after the first point in time are recorded in a record, wherein the first type of error comprises missing information in the record, wherein the missing information is for at least one of a missing update invalidation, a missing delete invalidation, or a missing insert invalidation.
 13. The one or more non-transitory computer-readable media of claim 11, wherein the second type of error comprises at least one of a load issue or a scan issue.
 14. The one or more non-transitory computer-readable media of claim 8, wherein the instructions further include: instructions which, when executed by the one or more hardware processors, cause, in response to determining that the erroneous query result is inaccurate, automatically performing automatic triage and identification of a root cause of the inaccuracy.
 15. A system comprising: a memory; one or more processors communicatively coupled to the memory and configured to: perform a first scan operation of data organized in column-major format in a first data object stored in the memory to obtain an erroneous query result corresponding to a query statement, wherein the query statement includes at least one predicate; disable a first predicate filtering optimization and perform a second scan operation of the data organized in the column-major format with the first predicate filtering optimization disabled to obtain a first query result; when the erroneous query result and the first query result are different from each other, indicate the first predicate filtering optimization as a source of an inaccuracy in the erroneous query result; when the erroneous query result and the first query result are same, enable the first predicate filtering optimization, disable a second predicate filtering optimization, and perform a third scan operation of the data organized in the column-major format with the second predicate filtering optimization disabled to obtain a second query result; when the erroneous query result and the second query result are different from each other, indicate the second predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 16. The system of claim 15, wherein the one or more processors are also configured to: when the erroneous query result and the second query result are the same, enable the second predicate filtering optimization, disable a third predicate filtering optimization, and perform a fourth scan operation of the data organized in the column-major format with the third predicate filtering optimization disabled to obtain a third query result; when the erroneous query result and the third query result are different from each other, indicate the third predicate filtering optimization as the source of the inaccuracy in the erroneous query result.
 17. The system of claim 16, wherein the first predicate filtering optimization comprises a single instruction multiple data (SIMD) predicate filtering optimization, the second predicate filtering optimization comprises a portable code (Pcode) predicate filtering optimization, and the third predicate filtering optimization comprises a column-level predicates filtering optimization.
 18. The system of claim 15, wherein the one or more processors are also configured to: when the erroneous query result and the second query result are the same as each other, perform a comparison of data associated with an incorrect row as of a committed version at load time to data associated with the incorrect row as of a committed version at query time; when the comparison results in a match, indicate an occurrence of a first type of error; when the comparison does not result in a match, indicate an occurrence of a second type of error.
 19. The system of claim 18, wherein the data in the first data object corresponds to one or more blocks of data organized in a format that is not the column-major format at a first point in time and updates to the one or more blocks of data organized in the format that is not the column-major format after the first point in time are recorded in a record, wherein the first type of error comprises missing information in the record, wherein the missing information is for at least one of a missing update invalidation, a missing delete invalidation, or a missing insert invalidation.
 20. The system of claim 18, wherein the second type of error comprises at least one of a load issue or a scan issue. 