forked from pingcap/tidb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This is an automated cherry-pick of pingcap#54183
Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io>
- Loading branch information
1 parent
b75a314
commit ba11ef4
Showing
6 changed files
with
927 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,366 @@ | ||
// Copyright 2022 PingCAP, Inc. | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
package core | ||
|
||
import ( | ||
"context" | ||
|
||
"github.com/pingcap/errors" | ||
"github.com/pingcap/tidb/pkg/bindinfo" | ||
"github.com/pingcap/tidb/pkg/domain" | ||
"github.com/pingcap/tidb/pkg/expression" | ||
"github.com/pingcap/tidb/pkg/infoschema" | ||
"github.com/pingcap/tidb/pkg/kv" | ||
"github.com/pingcap/tidb/pkg/metrics" | ||
"github.com/pingcap/tidb/pkg/parser/ast" | ||
"github.com/pingcap/tidb/pkg/planner/core/base" | ||
core_metrics "github.com/pingcap/tidb/pkg/planner/core/metrics" | ||
"github.com/pingcap/tidb/pkg/planner/util/debugtrace" | ||
"github.com/pingcap/tidb/pkg/privilege" | ||
"github.com/pingcap/tidb/pkg/sessionctx" | ||
"github.com/pingcap/tidb/pkg/sessiontxn/staleread" | ||
"github.com/pingcap/tidb/pkg/types" | ||
driver "github.com/pingcap/tidb/pkg/types/parser_driver" | ||
"github.com/pingcap/tidb/pkg/util/chunk" | ||
contextutil "github.com/pingcap/tidb/pkg/util/context" | ||
"github.com/pingcap/tidb/pkg/util/dbterror/plannererrors" | ||
"github.com/pingcap/tidb/pkg/util/kvcache" | ||
) | ||
|
||
// PlanCacheKeyTestIssue43667 is only for test. | ||
type PlanCacheKeyTestIssue43667 struct{} | ||
|
||
// PlanCacheKeyTestIssue46760 is only for test. | ||
type PlanCacheKeyTestIssue46760 struct{} | ||
|
||
// PlanCacheKeyTestIssue47133 is only for test. | ||
type PlanCacheKeyTestIssue47133 struct{} | ||
|
||
// SetParameterValuesIntoSCtx sets these parameters into session context. | ||
func SetParameterValuesIntoSCtx(sctx base.PlanContext, isNonPrep bool, markers []ast.ParamMarkerExpr, params []expression.Expression) error { | ||
vars := sctx.GetSessionVars() | ||
vars.PlanCacheParams.Reset() | ||
for i, usingParam := range params { | ||
val, err := usingParam.Eval(sctx.GetExprCtx().GetEvalCtx(), chunk.Row{}) | ||
if err != nil { | ||
return err | ||
} | ||
if isGetVarBinaryLiteral(sctx, usingParam) { | ||
binVal, convErr := val.ToBytes() | ||
if convErr != nil { | ||
return convErr | ||
} | ||
val.SetBinaryLiteral(binVal) | ||
} | ||
if markers != nil { | ||
param := markers[i].(*driver.ParamMarkerExpr) | ||
param.Datum = val | ||
param.InExecute = true | ||
} | ||
vars.PlanCacheParams.Append(val) | ||
} | ||
if vars.StmtCtx.EnableOptimizerDebugTrace && len(vars.PlanCacheParams.AllParamValues()) > 0 { | ||
vals := vars.PlanCacheParams.AllParamValues() | ||
valStrs := make([]string, len(vals)) | ||
for i, val := range vals { | ||
valStrs[i] = val.String() | ||
} | ||
debugtrace.RecordAnyValuesWithNames(sctx, "Parameter datums for EXECUTE", valStrs) | ||
} | ||
vars.PlanCacheParams.SetForNonPrepCache(isNonPrep) | ||
return nil | ||
} | ||
|
||
func planCachePreprocess(ctx context.Context, sctx sessionctx.Context, isNonPrepared bool, is infoschema.InfoSchema, stmt *PlanCacheStmt, params []expression.Expression) error { | ||
vars := sctx.GetSessionVars() | ||
stmtAst := stmt.PreparedAst | ||
vars.StmtCtx.StmtType = stmtAst.StmtType | ||
|
||
// step 1: check parameter number | ||
if len(stmt.Params) != len(params) { | ||
return errors.Trace(plannererrors.ErrWrongParamCount) | ||
} | ||
|
||
// step 2: set parameter values | ||
if err := SetParameterValuesIntoSCtx(sctx.GetPlanCtx(), isNonPrepared, stmt.Params, params); err != nil { | ||
return errors.Trace(err) | ||
} | ||
|
||
// step 3: add metadata lock and check each table's schema version | ||
schemaNotMatch := false | ||
for i := 0; i < len(stmt.dbName); i++ { | ||
tbl, ok := is.TableByID(stmt.tbls[i].Meta().ID) | ||
if !ok { | ||
tblByName, err := is.TableByName(stmt.dbName[i], stmt.tbls[i].Meta().Name) | ||
if err != nil { | ||
return plannererrors.ErrSchemaChanged.GenWithStack("Schema change caused error: %s", err.Error()) | ||
} | ||
delete(stmt.RelateVersion, stmt.tbls[i].Meta().ID) | ||
stmt.tbls[i] = tblByName | ||
stmt.RelateVersion[tblByName.Meta().ID] = tblByName.Meta().Revision | ||
} | ||
newTbl, err := tryLockMDLAndUpdateSchemaIfNecessary(sctx.GetPlanCtx(), stmt.dbName[i], stmt.tbls[i], is) | ||
if err != nil { | ||
schemaNotMatch = true | ||
continue | ||
} | ||
// The revision of tbl and newTbl may not be the same. | ||
// Example: | ||
// The version of stmt.tbls[i] is taken from the prepare statement and is revision v1. | ||
// When stmt.tbls[i] is locked in MDL, the revision of newTbl is also v1. | ||
// The revision of tbl is v2. The reason may have other statements trigger "tryLockMDLAndUpdateSchemaIfNecessary" before, leading to tbl revision update. | ||
if stmt.tbls[i].Meta().Revision != newTbl.Meta().Revision || (tbl != nil && tbl.Meta().Revision != newTbl.Meta().Revision) { | ||
schemaNotMatch = true | ||
} | ||
stmt.tbls[i] = newTbl | ||
stmt.RelateVersion[newTbl.Meta().ID] = newTbl.Meta().Revision | ||
} | ||
|
||
// step 4: check schema version | ||
if schemaNotMatch || stmt.SchemaVersion != is.SchemaMetaVersion() { | ||
// In order to avoid some correctness issues, we have to clear the | ||
// cached plan once the schema version is changed. | ||
// Cached plan in prepared struct does NOT have a "cache key" with | ||
// schema version like prepared plan cache key | ||
stmt.PointGet.pointPlan = nil | ||
stmt.PointGet.columnNames = nil | ||
stmt.PointGet.pointPlanHints = nil | ||
stmt.PointGet.Executor = nil | ||
stmt.PointGet.ColumnInfos = nil | ||
// If the schema version has changed we need to preprocess it again, | ||
// if this time it failed, the real reason for the error is schema changed. | ||
// Example: | ||
// When running update in prepared statement's schema version distinguished from the one of execute statement | ||
// We should reset the tableRefs in the prepared update statements, otherwise, the ast nodes still hold the old | ||
// tableRefs columnInfo which will cause chaos in logic of trying point get plan. (should ban non-public column) | ||
ret := &PreprocessorReturn{InfoSchema: is} | ||
err := Preprocess(ctx, sctx, stmtAst.Stmt, InPrepare, WithPreprocessorReturn(ret)) | ||
if err != nil { | ||
return plannererrors.ErrSchemaChanged.GenWithStack("Schema change caused error: %s", err.Error()) | ||
} | ||
stmt.SchemaVersion = is.SchemaMetaVersion() | ||
} | ||
|
||
// step 5: handle expiration | ||
// If the lastUpdateTime less than expiredTimeStamp4PC, | ||
// it means other sessions have executed 'admin flush instance plan_cache'. | ||
// So we need to clear the current session's plan cache. | ||
// And update lastUpdateTime to the newest one. | ||
expiredTimeStamp4PC := domain.GetDomain(sctx).ExpiredTimeStamp4PC() | ||
if stmt.StmtCacheable && expiredTimeStamp4PC.Compare(vars.LastUpdateTime4PC) > 0 { | ||
sctx.GetSessionPlanCache().DeleteAll() | ||
vars.LastUpdateTime4PC = expiredTimeStamp4PC | ||
} | ||
|
||
return nil | ||
} | ||
|
||
// GetPlanFromPlanCache is the entry point of Plan Cache. | ||
// It tries to get a valid cached plan from plan cache. | ||
// If there is no such a plan, it'll call the optimizer to generate a new one. | ||
// isNonPrepared indicates whether to use the non-prepared plan cache or the prepared plan cache. | ||
func GetPlanFromPlanCache(ctx context.Context, sctx sessionctx.Context, | ||
isNonPrepared bool, is infoschema.InfoSchema, stmt *PlanCacheStmt, | ||
params []expression.Expression) (plan base.Plan, names []*types.FieldName, err error) { | ||
if err := planCachePreprocess(ctx, sctx, isNonPrepared, is, stmt, params); err != nil { | ||
return nil, nil, err | ||
} | ||
|
||
var cacheKey string | ||
sessVars := sctx.GetSessionVars() | ||
stmtCtx := sessVars.StmtCtx | ||
cacheEnabled := false | ||
if isNonPrepared { | ||
stmtCtx.SetCacheType(contextutil.SessionNonPrepared) | ||
cacheEnabled = sctx.GetSessionVars().EnableNonPreparedPlanCache // plan-cache might be disabled after prepare. | ||
} else { | ||
stmtCtx.SetCacheType(contextutil.SessionPrepared) | ||
cacheEnabled = sctx.GetSessionVars().EnablePreparedPlanCache | ||
} | ||
if stmt.StmtCacheable && cacheEnabled { | ||
stmtCtx.EnablePlanCache() | ||
} | ||
if stmt.UncacheableReason != "" { | ||
stmtCtx.WarnSkipPlanCache(stmt.UncacheableReason) | ||
} | ||
|
||
var bindSQL string | ||
if stmtCtx.UseCache() { | ||
var ignoreByBinding bool | ||
bindSQL, ignoreByBinding = bindinfo.MatchSQLBindingForPlanCache(sctx, stmt.PreparedAst.Stmt, &stmt.BindingInfo) | ||
if ignoreByBinding { | ||
stmtCtx.SetSkipPlanCache("ignore plan cache by binding") | ||
} | ||
} | ||
|
||
// In rc or for update read, we need the latest schema version to decide whether we need to | ||
// rebuild the plan. So we set this value in rc or for update read. In other cases, let it be 0. | ||
var latestSchemaVersion int64 | ||
|
||
if stmtCtx.UseCache() { | ||
if sctx.GetSessionVars().IsIsolation(ast.ReadCommitted) || stmt.ForUpdateRead { | ||
// In Rc or ForUpdateRead, we should check if the information schema has been changed since | ||
// last time. If it changed, we should rebuild the plan. Here, we use a different and more | ||
// up-to-date schema version which can lead plan cache miss and thus, the plan will be rebuilt. | ||
latestSchemaVersion = domain.GetDomain(sctx).InfoSchema().SchemaMetaVersion() | ||
} | ||
if cacheKey, err = NewPlanCacheKey(sctx.GetSessionVars(), stmt.StmtText, | ||
stmt.StmtDB, stmt.SchemaVersion, latestSchemaVersion, bindSQL, expression.ExprPushDownBlackListReloadTimeStamp.Load(), stmt.RelateVersion); err != nil { | ||
return nil, nil, err | ||
} | ||
} | ||
|
||
var matchOpts *PlanCacheMatchOpts | ||
if stmtCtx.UseCache() { | ||
var cacheVal kvcache.Value | ||
var hit, isPointPlan bool | ||
if stmt.PointGet.pointPlan != nil { // if it's PointGet Plan, no need to use MatchOpts | ||
cacheVal = &PlanCacheValue{ | ||
Plan: stmt.PointGet.pointPlan, | ||
OutputColumns: stmt.PointGet.columnNames, | ||
stmtHints: stmt.PointGet.pointPlanHints, | ||
} | ||
isPointPlan, hit = true, true | ||
} else { | ||
matchOpts = GetMatchOpts(sctx, is, stmt, params) | ||
// TODO: consider instance-level plan cache | ||
cacheVal, hit = sctx.GetSessionPlanCache().Get(cacheKey, matchOpts) | ||
} | ||
if hit { | ||
if plan, names, ok, err := adjustCachedPlan(sctx, cacheVal.(*PlanCacheValue), isNonPrepared, isPointPlan, cacheKey, bindSQL, is, stmt); err != nil || ok { | ||
return plan, names, err | ||
} | ||
} | ||
} | ||
if matchOpts == nil { | ||
matchOpts = GetMatchOpts(sctx, is, stmt, params) | ||
} | ||
|
||
return generateNewPlan(ctx, sctx, isNonPrepared, is, stmt, cacheKey, latestSchemaVersion, bindSQL, matchOpts) | ||
} | ||
|
||
func adjustCachedPlan(sctx sessionctx.Context, cachedVal *PlanCacheValue, isNonPrepared, isPointPlan bool, | ||
cacheKey string, bindSQL string, is infoschema.InfoSchema, stmt *PlanCacheStmt) (base.Plan, | ||
[]*types.FieldName, bool, error) { | ||
sessVars := sctx.GetSessionVars() | ||
stmtCtx := sessVars.StmtCtx | ||
if !isPointPlan { // keep the prior behavior | ||
if err := checkPreparedPriv(sctx, stmt, is); err != nil { | ||
return nil, nil, false, err | ||
} | ||
} | ||
for tblInfo, unionScan := range cachedVal.TblInfo2UnionScan { | ||
if !unionScan && tableHasDirtyContent(sctx.GetPlanCtx(), tblInfo) { | ||
// TODO we can inject UnionScan into cached plan to avoid invalidating it, though | ||
// rebuilding the filters in UnionScan is pretty trivial. | ||
sctx.GetSessionPlanCache().Delete(cacheKey) | ||
return nil, nil, false, nil | ||
} | ||
} | ||
if !RebuildPlan4CachedPlan(cachedVal.Plan) { | ||
return nil, nil, false, nil | ||
} | ||
sessVars.FoundInPlanCache = true | ||
if len(bindSQL) > 0 { | ||
// When the `len(bindSQL) > 0`, it means we use the binding. | ||
// So we need to record this. | ||
sessVars.FoundInBinding = true | ||
} | ||
if metrics.ResettablePlanCacheCounterFortTest { | ||
metrics.PlanCacheCounter.WithLabelValues("prepare").Inc() | ||
} else { | ||
core_metrics.GetPlanCacheHitCounter(isNonPrepared).Inc() | ||
} | ||
stmtCtx.SetPlanDigest(stmt.NormalizedPlan, stmt.PlanDigest) | ||
stmtCtx.StmtHints = *cachedVal.stmtHints | ||
return cachedVal.Plan, cachedVal.OutputColumns, true, nil | ||
} | ||
|
||
// generateNewPlan call the optimizer to generate a new plan for current statement | ||
// and try to add it to cache | ||
func generateNewPlan(ctx context.Context, sctx sessionctx.Context, isNonPrepared bool, is infoschema.InfoSchema, | ||
stmt *PlanCacheStmt, cacheKey string, latestSchemaVersion int64, bindSQL string, | ||
matchOpts *PlanCacheMatchOpts) (base.Plan, []*types.FieldName, error) { | ||
stmtAst := stmt.PreparedAst | ||
sessVars := sctx.GetSessionVars() | ||
stmtCtx := sessVars.StmtCtx | ||
|
||
core_metrics.GetPlanCacheMissCounter(isNonPrepared).Inc() | ||
sctx.GetSessionVars().StmtCtx.InPreparedPlanBuilding = true | ||
p, names, err := OptimizeAstNode(ctx, sctx, stmtAst.Stmt, is) | ||
sctx.GetSessionVars().StmtCtx.InPreparedPlanBuilding = false | ||
if err != nil { | ||
return nil, nil, err | ||
} | ||
|
||
// check whether this plan is cacheable. | ||
if stmtCtx.UseCache() { | ||
if cacheable, reason := isPlanCacheable(sctx.GetPlanCtx(), p, len(matchOpts.ParamTypes), len(matchOpts.LimitOffsetAndCount), matchOpts.HasSubQuery); !cacheable { | ||
stmtCtx.SetSkipPlanCache(reason) | ||
} | ||
} | ||
|
||
// put this plan into the plan cache. | ||
if stmtCtx.UseCache() { | ||
// rebuild key to exclude kv.TiFlash when stmt is not read only | ||
if _, isolationReadContainTiFlash := sessVars.IsolationReadEngines[kv.TiFlash]; isolationReadContainTiFlash && !IsReadOnly(stmtAst.Stmt, sessVars) { | ||
delete(sessVars.IsolationReadEngines, kv.TiFlash) | ||
if cacheKey, err = NewPlanCacheKey(sessVars, stmt.StmtText, stmt.StmtDB, | ||
stmt.SchemaVersion, latestSchemaVersion, bindSQL, expression.ExprPushDownBlackListReloadTimeStamp.Load(), stmt.RelateVersion); err != nil { | ||
return nil, nil, err | ||
} | ||
sessVars.IsolationReadEngines[kv.TiFlash] = struct{}{} | ||
} | ||
cached := NewPlanCacheValue(p, names, stmtCtx.TblInfo2UnionScan, matchOpts, &stmtCtx.StmtHints) | ||
stmt.NormalizedPlan, stmt.PlanDigest = NormalizePlan(p) | ||
stmtCtx.SetPlan(p) | ||
stmtCtx.SetPlanDigest(stmt.NormalizedPlan, stmt.PlanDigest) | ||
sctx.GetSessionPlanCache().Put(cacheKey, cached, matchOpts) | ||
if _, ok := p.(*PointGetPlan); ok { | ||
stmt.PointGet.pointPlan = p | ||
stmt.PointGet.columnNames = names | ||
stmt.PointGet.pointPlanHints = stmtCtx.StmtHints.Clone() | ||
} | ||
} | ||
sessVars.FoundInPlanCache = false | ||
return p, names, err | ||
} | ||
|
||
// checkPreparedPriv checks the privilege of the prepared statement | ||
func checkPreparedPriv(sctx sessionctx.Context, stmt *PlanCacheStmt, is infoschema.InfoSchema) error { | ||
if pm := privilege.GetPrivilegeManager(sctx); pm != nil { | ||
visitInfo := VisitInfo4PrivCheck(is, stmt.PreparedAst.Stmt, stmt.VisitInfos) | ||
if err := CheckPrivilege(sctx.GetSessionVars().ActiveRoles, pm, visitInfo); err != nil { | ||
return err | ||
} | ||
} | ||
err := CheckTableLock(sctx, is, stmt.VisitInfos) | ||
return err | ||
} | ||
|
||
// IsSafeToReusePointGetExecutor checks whether this is a PointGet Plan and safe to reuse its executor. | ||
func IsSafeToReusePointGetExecutor(sctx sessionctx.Context, is infoschema.InfoSchema, stmt *PlanCacheStmt) bool { | ||
if staleread.IsStmtStaleness(sctx) { | ||
return false | ||
} | ||
// check auto commit | ||
if !IsAutoCommitTxn(sctx.GetSessionVars()) { | ||
return false | ||
} | ||
if stmt.SchemaVersion != is.SchemaMetaVersion() { | ||
return false | ||
} | ||
return true | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
load("@io_bazel_rules_go//go:def.bzl", "go_library") | ||
|
||
go_library( | ||
name = "testserverclient", | ||
srcs = ["server_client.go"], | ||
importpath = "github.com/pingcap/tidb/pkg/server/internal/testserverclient", | ||
visibility = ["//pkg/server:__subpackages__"], | ||
deps = [ | ||
"//pkg/ddl/util/callback", | ||
"//pkg/domain", | ||
"//pkg/errno", | ||
"//pkg/kv", | ||
"//pkg/metrics", | ||
"//pkg/parser/model", | ||
"//pkg/parser/mysql", | ||
"//pkg/server", | ||
"//pkg/testkit", | ||
"//pkg/testkit/testenv", | ||
"//pkg/util/versioninfo", | ||
"@com_github_go_sql_driver_mysql//:mysql", | ||
"@com_github_pingcap_errors//:errors", | ||
"@com_github_pingcap_failpoint//:failpoint", | ||
"@com_github_pingcap_log//:log", | ||
"@com_github_prometheus_client_model//go", | ||
"@com_github_stretchr_testify//require", | ||
"@org_golang_x_text//encoding/simplifiedchinese", | ||
"@org_uber_go_zap//:zap", | ||
], | ||
) |
Oops, something went wrong.