Understanding Transaction Bugs in Database Systems
Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs. However, faulty designs and implementations of DBMSs' transaction processing mechanisms can introduce transaction bugs, and lead to seve...
Gespeichert in:
| Veröffentlicht in: | Proceedings / International Conference on Software Engineering S. 2008 - 2020 |
|---|---|
| Hauptverfasser: | , , , , , , , , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
ACM
14.04.2024
|
| Schlagworte: | |
| ISSN: | 1558-1225 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs. However, faulty designs and implementations of DBMSs' transaction processing mechanisms can introduce transaction bugs, and lead to severe consequences, e.g., incorrect database states and DBMS crashes. An in-depth understanding of real-world transaction bugs can significantly promote effective techniques in combating transaction bugs in DBMSs. In this paper, we conduct the first comprehensive study on 140 transaction bugs collected from six widely-used DBMSs, i.e., MySQL, PostgreSQL, SQLite, MariaDB, CockroachDB, and TiDB. We investigate these bugs from their bug manifestations, root causes, bug impacts and bug fixing. Our study reveals many in-teresting findings and provides useful guidance for transaction bug detection, testing, and verification. |
|---|---|
| AbstractList | Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs. However, faulty designs and implementations of DBMSs' transaction processing mechanisms can introduce transaction bugs, and lead to severe consequences, e.g., incorrect database states and DBMS crashes. An in-depth understanding of real-world transaction bugs can significantly promote effective techniques in combating transaction bugs in DBMSs. In this paper, we conduct the first comprehensive study on 140 transaction bugs collected from six widely-used DBMSs, i.e., MySQL, PostgreSQL, SQLite, MariaDB, CockroachDB, and TiDB. We investigate these bugs from their bug manifestations, root causes, bug impacts and bug fixing. Our study reveals many in-teresting findings and provides useful guidance for transaction bug detection, testing, and verification. |
| Author | Wei, Jun Hu, Yixin Zheng, Yingying Gao, Yu Wang, Dong Cui, Ziyu Song, Jiansen Yang, Rui Dou, Wensheng Wang, Tao Xu, Kang Huang, Tao |
| Author_xml | – sequence: 1 givenname: Ziyu surname: Cui fullname: Cui, Ziyu email: cuiziyu20@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 2 givenname: Wensheng surname: Dou fullname: Dou, Wensheng email: wsdou@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 3 givenname: Yu surname: Gao fullname: Gao, Yu email: gaoyu15@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 4 givenname: Dong surname: Wang fullname: Wang, Dong email: wangdong18@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 5 givenname: Jiansen surname: Song fullname: Song, Jiansen email: songjiansen20@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 6 givenname: Yingying surname: Zheng fullname: Zheng, Yingying email: zhengyingying14@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 7 givenname: Tao surname: Wang fullname: Wang, Tao email: wangtao19@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 8 givenname: Rui surname: Yang fullname: Yang, Rui email: yangrui22@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 9 givenname: Kang surname: Xu fullname: Xu, Kang email: xukang21@mails.ucas.ac.cn organization: Nanjing Institute of Software Technology – sequence: 10 givenname: Yixin surname: Hu fullname: Hu, Yixin email: huyx75@mail2.sysu.edu.cn organization: Sun Yat-sen University,Guangzhou,China – sequence: 11 givenname: Jun surname: Wei fullname: Wei, Jun email: wj@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS – sequence: 12 givenname: Tao surname: Huang fullname: Huang, Tao email: tao@otcaix.iscas.ac.cn organization: State Key Lab of Computer Science at ISCAS |
| BookMark | eNotzj1PwzAQgGGDQKKUzCwM-QMp57ucHY9QyodUiYF2ri7xpYpEXRSHof8eJJje7dF7bS7SMakxtxYW1tZ8Txw8Ay3IUUDwZ6YIPjQ1gAe0vj43M8vcVBaRr0yR89AC18Te1TQzuE1RxzxJikPal5tRUpZuGo6pfPze53JI5ZNM0krW8uOUJz3kG3PZy2fW4r9zs31ebZav1fr95W35sK4ECX3V9TEiQxTyHaFzii2D2qCijjxJ9K2jyEyWuqi2VdcoOukjBEIbPM3N3Z87qOruaxwOMp529ne-gQboB3FoRmY |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3597503.3639207 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9798400702174 |
| EISSN | 1558-1225 |
| EndPage | 2020 |
| ExternalDocumentID | 10548080 |
| Genre | orig-research |
| GroupedDBID | -~X .4S .DC 29O 5VS 6IE 6IF 6IH 6IK 6IL 6IM 6IN 8US AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS ARCSS AVWKF BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO EDO FEDTE I-F IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a2327-cfdd250da37c3266e2b50e19eae6373ad7b63d55313cde1be68e26afd09321973 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 01:52:39 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a2327-cfdd250da37c3266e2b50e19eae6373ad7b63d55313cde1be68e26afd09321973 |
| OpenAccessLink | https://dl.acm.org/doi/pdf/10.1145/3597503.3639207 |
| PageCount | 13 |
| ParticipantIDs | ieee_primary_10548080 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-April-14 |
| PublicationDateYYYYMMDD | 2024-04-14 |
| PublicationDate_xml | – month: 04 year: 2024 text: 2024-April-14 day: 14 |
| PublicationDecade | 2020 |
| PublicationTitle | Proceedings / International Conference on Software Engineering |
| PublicationTitleAbbrev | ICSE |
| PublicationYear | 2024 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssib054357643 ssib055306466 ssj0006499 |
| Score | 2.3087769 |
| Snippet | Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs.... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 2008 |
| SubjectTerms | Computer bugs Database system Database systems empirical study Semantics Software engineering Testing transaction bug |
| Title | Understanding Transaction Bugs in Database Systems |
| URI | https://ieeexplore.ieee.org/document/10548080 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwFIWvoGJgKo8i3vLAmuJX7GTlUTGgqkOLulWOfYO6pKiv3891mtIyMLBFmRInzvlu7HMuwAOXPjOlKBKRBZtoJ32So9JxM5XOtUFua4fcx7vt97PxOB80ZvXaC4OI9eYz7MbDei0_zPwq_iqjGR7TyTKq0A-tNRuz1vblSUn37V62VGyHY3RkleazbIjtm2wfodNHRSSdctVVJNGS_26uUmtLr_3PqzqBzs6lxwY_-nMKB1idQXvbpoE1s_Yc5GjfwMKGuw7h7Gn1uWDTir24pYt6xpoA8w6Meq_D57ekaZWQOEIim_gyBIKZ4JT1BGQGZZFyFDk6NMoqF2xhVKAxEcoHFAWaDKVxZeDEbyK36gJa1azCS2CEdGWhfVlaR2Wz4K7ANBYVRJJOk-ZdQSeOweRrk4Yx2d7-9R_nb-BYEgjEFRihb6G1nK_wDo78ejldzO_rZ_gNVCqYvQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwFIUtVJBgKo8i3nhgTfErdrLyqIooVYcWdasc-wZ1SVHb8Pu5TlNaBga2KFPixDnfjX3OJeSOCZfonGcRT7yJlBUuSkGqsJlKpUoDM5VD7r1n-v1kPE4HtVm98sIAQLX5DNrhsFrL9zNXhl9lOMNDOlmCFfpurJRgK7vW-vWJUfnNVrpUaIijVaCV-sOske7rdB-u4nuJLB0z2ZYo0oL9bq9SqUun-c_rOiStjU-PDn4U6IjsQHFMmutGDbSetydEjLYtLHS46RFOH8qPBZ0W9MkubVA0WkeYt8io8zx87EZ1s4TIIhSZyOXeI854K41DJNMgspgBT8GClkZabzItPY4Jl84Dz0AnILTNPUOC46mRp6RRzAo4IxShLs-Uy3NjsXDmzGYQh7ICWdIqVL1z0gpjMPlc5WFM1rd_8cf5W7LfHb71Jr2X_uslORCIBWE9hqsr0ljOS7gme-5rOV3Mb6rn-Q16tpwE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%2F+International+Conference+on+Software+Engineering&rft.atitle=Understanding+Transaction+Bugs+in+Database+Systems&rft.au=Cui%2C+Ziyu&rft.au=Dou%2C+Wensheng&rft.au=Gao%2C+Yu&rft.au=Wang%2C+Dong&rft.date=2024-04-14&rft.pub=ACM&rft.eissn=1558-1225&rft.spage=2008&rft.epage=2020&rft_id=info:doi/10.1145%2F3597503.3639207&rft.externalDocID=10548080 |