594 lines
21 KiB
Go
594 lines
21 KiB
Go
// Copyright 2018 PingCAP, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package planner
|
|
|
|
import (
|
|
"context"
|
|
"math"
|
|
"math/rand"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/pingcap/errors"
|
|
"github.com/pingcap/failpoint"
|
|
"github.com/pingcap/tidb/pkg/bindinfo"
|
|
"github.com/pingcap/tidb/pkg/domain"
|
|
"github.com/pingcap/tidb/pkg/infoschema"
|
|
"github.com/pingcap/tidb/pkg/kv"
|
|
"github.com/pingcap/tidb/pkg/metrics"
|
|
"github.com/pingcap/tidb/pkg/parser/ast"
|
|
"github.com/pingcap/tidb/pkg/planner/cascades"
|
|
pctx "github.com/pingcap/tidb/pkg/planner/context"
|
|
"github.com/pingcap/tidb/pkg/planner/core"
|
|
"github.com/pingcap/tidb/pkg/planner/util/debugtrace"
|
|
"github.com/pingcap/tidb/pkg/privilege"
|
|
"github.com/pingcap/tidb/pkg/sessionctx"
|
|
"github.com/pingcap/tidb/pkg/sessionctx/variable"
|
|
"github.com/pingcap/tidb/pkg/types"
|
|
"github.com/pingcap/tidb/pkg/util/dbterror/plannererrors"
|
|
"github.com/pingcap/tidb/pkg/util/hint"
|
|
"github.com/pingcap/tidb/pkg/util/intest"
|
|
"github.com/pingcap/tidb/pkg/util/logutil"
|
|
"github.com/pingcap/tidb/pkg/util/topsql"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// IsReadOnly check whether the ast.Node is a read only statement.
|
|
func IsReadOnly(node ast.Node, vars *variable.SessionVars) bool {
|
|
if execStmt, isExecStmt := node.(*ast.ExecuteStmt); isExecStmt {
|
|
prepareStmt, err := core.GetPreparedStmt(execStmt, vars)
|
|
if err != nil {
|
|
logutil.BgLogger().Warn("GetPreparedStmt failed", zap.Error(err))
|
|
return false
|
|
}
|
|
return ast.IsReadOnly(prepareStmt.PreparedAst.Stmt)
|
|
}
|
|
return ast.IsReadOnly(node)
|
|
}
|
|
|
|
// getPlanFromNonPreparedPlanCache tries to get an available cached plan from the NonPrepared Plan Cache for this stmt.
|
|
func getPlanFromNonPreparedPlanCache(ctx context.Context, sctx sessionctx.Context, stmt ast.StmtNode, is infoschema.InfoSchema) (p core.Plan, ns types.NameSlice, ok bool, err error) {
|
|
stmtCtx := sctx.GetSessionVars().StmtCtx
|
|
_, isExplain := stmt.(*ast.ExplainStmt)
|
|
if !sctx.GetSessionVars().EnableNonPreparedPlanCache || // disabled
|
|
stmtCtx.InPreparedPlanBuilding || // already in cached plan rebuilding phase
|
|
stmtCtx.EnableOptimizerCETrace || stmtCtx.EnableOptimizeTrace || // in trace
|
|
stmtCtx.InRestrictedSQL || // is internal SQL
|
|
isExplain || // explain external
|
|
!sctx.GetSessionVars().DisableTxnAutoRetry || // txn-auto-retry
|
|
sctx.GetSessionVars().InMultiStmts || // in multi-stmt
|
|
(stmtCtx.InExplainStmt && stmtCtx.ExplainFormat != types.ExplainFormatPlanCache) { // in explain internal
|
|
return nil, nil, false, nil
|
|
}
|
|
ok, reason := core.NonPreparedPlanCacheableWithCtx(sctx.GetPlanCtx(), stmt, is)
|
|
if !ok {
|
|
if !isExplain && stmtCtx.InExplainStmt && stmtCtx.ExplainFormat == types.ExplainFormatPlanCache {
|
|
stmtCtx.AppendWarning(errors.NewNoStackErrorf("skip non-prepared plan-cache: %s", reason))
|
|
}
|
|
return nil, nil, false, nil
|
|
}
|
|
|
|
paramSQL, paramsVals, err := core.GetParamSQLFromAST(stmt)
|
|
if err != nil {
|
|
return nil, nil, false, err
|
|
}
|
|
if intest.InTest && ctx.Value(core.PlanCacheKeyTestIssue43667{}) != nil { // update the AST in the middle of the process
|
|
ctx.Value(core.PlanCacheKeyTestIssue43667{}).(func(stmt ast.StmtNode))(stmt)
|
|
}
|
|
val := sctx.GetSessionVars().GetNonPreparedPlanCacheStmt(paramSQL)
|
|
paramExprs := core.Params2Expressions(paramsVals)
|
|
|
|
if val == nil {
|
|
// Create a new AST upon this parameterized SQL instead of using the original AST.
|
|
// Keep the original AST unchanged to avoid any side effect.
|
|
paramStmt, err := core.ParseParameterizedSQL(sctx, paramSQL)
|
|
if err != nil {
|
|
// This can happen rarely, cannot parse the parameterized(restored) SQL successfully, skip the plan cache in this case.
|
|
sctx.GetSessionVars().StmtCtx.AppendWarning(err)
|
|
return nil, nil, false, nil
|
|
}
|
|
// GeneratePlanCacheStmtWithAST may evaluate these parameters so set their values into SCtx in advance.
|
|
if err := core.SetParameterValuesIntoSCtx(sctx.GetPlanCtx(), true, nil, paramExprs); err != nil {
|
|
return nil, nil, false, err
|
|
}
|
|
cachedStmt, _, _, err := core.GeneratePlanCacheStmtWithAST(ctx, sctx, false, paramSQL, paramStmt, is)
|
|
if err != nil {
|
|
return nil, nil, false, err
|
|
}
|
|
sctx.GetSessionVars().AddNonPreparedPlanCacheStmt(paramSQL, cachedStmt)
|
|
val = cachedStmt
|
|
}
|
|
cachedStmt := val.(*core.PlanCacheStmt)
|
|
|
|
cachedPlan, names, err := core.GetPlanFromSessionPlanCache(ctx, sctx, true, is, cachedStmt, paramExprs)
|
|
if err != nil {
|
|
return nil, nil, false, err
|
|
}
|
|
|
|
if intest.InTest && ctx.Value(core.PlanCacheKeyTestIssue47133{}) != nil {
|
|
ctx.Value(core.PlanCacheKeyTestIssue47133{}).(func(names []*types.FieldName))(names)
|
|
}
|
|
|
|
return cachedPlan, names, true, nil
|
|
}
|
|
|
|
// Optimize does optimization and creates a Plan.
|
|
func Optimize(ctx context.Context, sctx sessionctx.Context, node ast.Node, is infoschema.InfoSchema) (plan core.Plan, slice types.NameSlice, retErr error) {
|
|
sessVars := sctx.GetSessionVars()
|
|
pctx := sctx.GetPlanCtx()
|
|
if sessVars.StmtCtx.EnableOptimizerDebugTrace {
|
|
debugtrace.EnterContextCommon(pctx)
|
|
defer debugtrace.LeaveContextCommon(pctx)
|
|
}
|
|
|
|
if !sessVars.InRestrictedSQL && (variable.RestrictedReadOnly.Load() || variable.VarTiDBSuperReadOnly.Load()) {
|
|
allowed, err := allowInReadOnlyMode(pctx, node)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if !allowed {
|
|
return nil, nil, errors.Trace(plannererrors.ErrSQLInReadOnlyMode)
|
|
}
|
|
}
|
|
|
|
if sessVars.SQLMode.HasStrictMode() && !IsReadOnly(node, sessVars) {
|
|
sessVars.StmtCtx.TiFlashEngineRemovedDueToStrictSQLMode = true
|
|
_, hasTiFlashAccess := sessVars.IsolationReadEngines[kv.TiFlash]
|
|
if hasTiFlashAccess {
|
|
delete(sessVars.IsolationReadEngines, kv.TiFlash)
|
|
}
|
|
defer func() {
|
|
sessVars.StmtCtx.TiFlashEngineRemovedDueToStrictSQLMode = false
|
|
if hasTiFlashAccess {
|
|
sessVars.IsolationReadEngines[kv.TiFlash] = struct{}{}
|
|
}
|
|
}()
|
|
}
|
|
|
|
// handle the execute statement
|
|
if execAST, ok := node.(*ast.ExecuteStmt); ok {
|
|
p, names, err := OptimizeExecStmt(ctx, sctx, execAST, is)
|
|
return p, names, err
|
|
}
|
|
|
|
tableHints := hint.ExtractTableHintsFromStmtNode(node, sessVars.StmtCtx)
|
|
originStmtHints, _, warns := hint.ParseStmtHints(tableHints, setVarHintChecker, byte(kv.ReplicaReadFollower))
|
|
sessVars.StmtCtx.StmtHints = originStmtHints
|
|
for _, warn := range warns {
|
|
sessVars.StmtCtx.AppendWarning(warn)
|
|
}
|
|
|
|
defer func() {
|
|
// Override the resource group if the hint is set.
|
|
if retErr == nil && sessVars.StmtCtx.StmtHints.HasResourceGroup {
|
|
if variable.EnableResourceControl.Load() {
|
|
sessVars.StmtCtx.ResourceGroupName = sessVars.StmtCtx.StmtHints.ResourceGroup
|
|
// if we are in a txn, should update the txn resource name to let the txn
|
|
// commit with the hint resource group.
|
|
if txn, err := sctx.Txn(false); err == nil && txn != nil && txn.Valid() {
|
|
kv.SetTxnResourceGroup(txn, sessVars.StmtCtx.ResourceGroupName)
|
|
}
|
|
} else {
|
|
err := infoschema.ErrResourceGroupSupportDisabled
|
|
sessVars.StmtCtx.AppendWarning(err)
|
|
}
|
|
}
|
|
}()
|
|
|
|
warns = warns[:0]
|
|
for name, val := range sessVars.StmtCtx.StmtHints.SetVars {
|
|
oldV, err := sessVars.SetSystemVarWithOldValAsRet(name, val)
|
|
if err != nil {
|
|
sessVars.StmtCtx.AppendWarning(err)
|
|
}
|
|
sessVars.StmtCtx.AddSetVarHintRestore(name, oldV)
|
|
}
|
|
if len(sessVars.StmtCtx.StmtHints.SetVars) > 0 {
|
|
sessVars.StmtCtx.SetSkipPlanCache(errors.NewNoStackError("SET_VAR is used in the SQL"))
|
|
}
|
|
|
|
if _, isolationReadContainTiKV := sessVars.IsolationReadEngines[kv.TiKV]; isolationReadContainTiKV {
|
|
var fp core.Plan
|
|
if fpv, ok := sctx.Value(core.PointPlanKey).(core.PointPlanVal); ok {
|
|
// point plan is already tried in a multi-statement query.
|
|
fp = fpv.Plan
|
|
} else {
|
|
fp = core.TryFastPlan(pctx, node)
|
|
}
|
|
if fp != nil {
|
|
return fp, fp.OutputNames(), nil
|
|
}
|
|
}
|
|
if err := pctx.AdviseTxnWarmup(); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
enableUseBinding := sessVars.UsePlanBaselines
|
|
stmtNode, isStmtNode := node.(ast.StmtNode)
|
|
binding, match, scope := bindinfo.MatchSQLBinding(sctx, stmtNode)
|
|
var bindings bindinfo.Bindings
|
|
if match {
|
|
bindings = []bindinfo.Binding{binding}
|
|
}
|
|
|
|
useBinding := enableUseBinding && isStmtNode && match
|
|
if sessVars.StmtCtx.EnableOptimizerDebugTrace {
|
|
failpoint.Inject("SetBindingTimeToZero", func(val failpoint.Value) {
|
|
if val.(bool) && bindings != nil {
|
|
bindings = bindings.Copy()
|
|
for i := range bindings {
|
|
bindings[i].CreateTime = types.ZeroTime
|
|
bindings[i].UpdateTime = types.ZeroTime
|
|
}
|
|
}
|
|
})
|
|
debugtrace.RecordAnyValuesWithNames(pctx,
|
|
"Used binding", useBinding,
|
|
"Enable binding", enableUseBinding,
|
|
"IsStmtNode", isStmtNode,
|
|
"Matched", match,
|
|
"Scope", scope,
|
|
"Matched bindings", bindings,
|
|
)
|
|
}
|
|
if isStmtNode {
|
|
// add the extra Limit after matching the bind record
|
|
stmtNode = core.TryAddExtraLimit(sctx, stmtNode)
|
|
node = stmtNode
|
|
}
|
|
|
|
// try to get Plan from the NonPrepared Plan Cache
|
|
if sessVars.EnableNonPreparedPlanCache &&
|
|
isStmtNode &&
|
|
!useBinding { // TODO: support binding
|
|
cachedPlan, names, ok, err := getPlanFromNonPreparedPlanCache(ctx, sctx, stmtNode, is)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if ok {
|
|
return cachedPlan, names, nil
|
|
}
|
|
}
|
|
|
|
var (
|
|
names types.NameSlice
|
|
bestPlan, bestPlanFromBind core.Plan
|
|
chosenBinding bindinfo.Binding
|
|
err error
|
|
)
|
|
if useBinding {
|
|
minCost := math.MaxFloat64
|
|
var bindStmtHints hint.StmtHints
|
|
originHints := hint.CollectHint(stmtNode)
|
|
// bindings must be not nil when coming here, try to find the best binding.
|
|
for _, binding := range bindings {
|
|
if !binding.IsBindingEnabled() {
|
|
continue
|
|
}
|
|
if sessVars.StmtCtx.EnableOptimizerDebugTrace {
|
|
core.DebugTraceTryBinding(pctx, binding.Hint)
|
|
}
|
|
hint.BindHint(stmtNode, binding.Hint)
|
|
curStmtHints, _, curWarns := hint.ParseStmtHints(binding.Hint.GetFirstTableHints(), setVarHintChecker, byte(kv.ReplicaReadFollower))
|
|
sessVars.StmtCtx.StmtHints = curStmtHints
|
|
// update session var by hint /set_var/
|
|
for name, val := range sessVars.StmtCtx.StmtHints.SetVars {
|
|
oldV, err := sessVars.SetSystemVarWithOldValAsRet(name, val)
|
|
if err != nil {
|
|
sessVars.StmtCtx.AppendWarning(err)
|
|
}
|
|
sessVars.StmtCtx.AddSetVarHintRestore(name, oldV)
|
|
}
|
|
plan, curNames, cost, err := optimize(ctx, pctx, node, is)
|
|
if err != nil {
|
|
binding.Status = bindinfo.Invalid
|
|
handleInvalidBinding(ctx, pctx, scope, binding)
|
|
continue
|
|
}
|
|
if cost < minCost {
|
|
bindStmtHints, warns, minCost, names, bestPlanFromBind, chosenBinding = curStmtHints, curWarns, cost, curNames, plan, binding
|
|
}
|
|
}
|
|
if bestPlanFromBind == nil {
|
|
sessVars.StmtCtx.AppendWarning(errors.NewNoStackError("no plan generated from bindings"))
|
|
} else {
|
|
bestPlan = bestPlanFromBind
|
|
sessVars.StmtCtx.StmtHints = bindStmtHints
|
|
for _, warn := range warns {
|
|
sessVars.StmtCtx.AppendWarning(warn)
|
|
}
|
|
sessVars.StmtCtx.BindSQL = chosenBinding.BindSQL
|
|
sessVars.FoundInBinding = true
|
|
if sessVars.StmtCtx.InVerboseExplain {
|
|
sessVars.StmtCtx.AppendNote(errors.NewNoStackErrorf("Using the bindSQL: %v", chosenBinding.BindSQL))
|
|
} else {
|
|
sessVars.StmtCtx.AppendExtraNote(errors.NewNoStackErrorf("Using the bindSQL: %v", chosenBinding.BindSQL))
|
|
}
|
|
if len(tableHints) > 0 {
|
|
sessVars.StmtCtx.AppendWarning(errors.NewNoStackErrorf("The system ignores the hints in the current query and uses the hints specified in the bindSQL: %v", chosenBinding.BindSQL))
|
|
}
|
|
}
|
|
// Restore the hint to avoid changing the stmt node.
|
|
hint.BindHint(stmtNode, originHints)
|
|
}
|
|
|
|
if sessVars.StmtCtx.EnableOptimizerDebugTrace && bestPlanFromBind != nil {
|
|
core.DebugTraceBestBinding(pctx, chosenBinding.Hint)
|
|
}
|
|
// No plan found from the bindings, or the bindings are ignored.
|
|
if bestPlan == nil {
|
|
sessVars.StmtCtx.StmtHints = originStmtHints
|
|
bestPlan, names, _, err = optimize(ctx, pctx, node, is)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
|
|
// Add a baseline evolution task if:
|
|
// 1. the returned plan is from bindings;
|
|
// 2. the query is a select statement;
|
|
// 3. the original binding contains no read_from_storage hint;
|
|
// 4. the plan when ignoring bindings contains no tiflash hint;
|
|
// 5. the pending verified binding has not been added already;
|
|
savedStmtHints := sessVars.StmtCtx.StmtHints
|
|
defer func() {
|
|
sessVars.StmtCtx.StmtHints = savedStmtHints
|
|
}()
|
|
if sessVars.EvolvePlanBaselines && bestPlanFromBind != nil &&
|
|
sessVars.SelectLimit == math.MaxUint64 { // do not evolve this query if sql_select_limit is enabled
|
|
// Check bestPlanFromBind firstly to avoid nil stmtNode.
|
|
if _, ok := stmtNode.(*ast.SelectStmt); ok && !bindings[0].Hint.ContainTableHint(hint.HintReadFromStorage) {
|
|
sessVars.StmtCtx.StmtHints = originStmtHints
|
|
defPlan, _, _, err := optimize(ctx, pctx, node, is)
|
|
if err != nil {
|
|
// Ignore this evolution task.
|
|
return bestPlan, names, nil
|
|
}
|
|
defPlanHints := core.GenHintsFromPhysicalPlan(defPlan)
|
|
for _, h := range defPlanHints {
|
|
if h.HintName.String() == hint.HintReadFromStorage {
|
|
return bestPlan, names, nil
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return bestPlan, names, nil
|
|
}
|
|
|
|
// OptimizeForForeignKeyCascade does optimization and creates a Plan for foreign key cascade.
|
|
// Compare to Optimize, OptimizeForForeignKeyCascade only build plan by StmtNode,
|
|
// doesn't consider plan cache and plan binding, also doesn't do privilege check.
|
|
func OptimizeForForeignKeyCascade(ctx context.Context, sctx pctx.PlanContext, node ast.StmtNode, is infoschema.InfoSchema) (core.Plan, error) {
|
|
builder := planBuilderPool.Get().(*core.PlanBuilder)
|
|
defer planBuilderPool.Put(builder.ResetForReuse())
|
|
hintProcessor := hint.NewQBHintHandler(sctx.GetSessionVars().StmtCtx)
|
|
builder.Init(sctx, is, hintProcessor)
|
|
p, err := builder.Build(ctx, node)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := core.CheckTableLock(sctx, is, builder.GetVisitInfo()); err != nil {
|
|
return nil, err
|
|
}
|
|
return p, nil
|
|
}
|
|
|
|
func allowInReadOnlyMode(sctx pctx.PlanContext, node ast.Node) (bool, error) {
|
|
pm := privilege.GetPrivilegeManager(sctx)
|
|
if pm == nil {
|
|
return true, nil
|
|
}
|
|
roles := sctx.GetSessionVars().ActiveRoles
|
|
// allow replication thread
|
|
// NOTE: it is required, whether SEM is enabled or not, only user with explicit RESTRICTED_REPLICA_WRITER_ADMIN granted can ignore the restriction, so we need to surpass the case that if SEM is not enabled, SUPER will has all privileges
|
|
if pm.HasExplicitlyGrantedDynamicPrivilege(roles, "RESTRICTED_REPLICA_WRITER_ADMIN", false) {
|
|
return true, nil
|
|
}
|
|
|
|
switch node.(type) {
|
|
// allow change variables (otherwise can't unset read-only mode)
|
|
case *ast.SetStmt,
|
|
// allow analyze table
|
|
*ast.AnalyzeTableStmt,
|
|
*ast.UseStmt,
|
|
*ast.ShowStmt,
|
|
*ast.CreateBindingStmt,
|
|
*ast.DropBindingStmt,
|
|
*ast.PrepareStmt,
|
|
*ast.BeginStmt,
|
|
*ast.RollbackStmt:
|
|
return true, nil
|
|
case *ast.CommitStmt:
|
|
txn, err := sctx.Txn(true)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if !txn.IsReadOnly() {
|
|
return false, txn.Rollback()
|
|
}
|
|
return true, nil
|
|
}
|
|
|
|
vars := sctx.GetSessionVars()
|
|
return IsReadOnly(node, vars), nil
|
|
}
|
|
|
|
var planBuilderPool = sync.Pool{
|
|
New: func() any {
|
|
return core.NewPlanBuilder()
|
|
},
|
|
}
|
|
|
|
// optimizeCnt is a global variable only used for test.
|
|
var optimizeCnt int
|
|
|
|
func optimize(ctx context.Context, sctx pctx.PlanContext, node ast.Node, is infoschema.InfoSchema) (core.Plan, types.NameSlice, float64, error) {
|
|
failpoint.Inject("checkOptimizeCountOne", func(val failpoint.Value) {
|
|
// only count the optimization for SQL with specified text
|
|
if testSQL, ok := val.(string); ok && testSQL == node.OriginalText() {
|
|
optimizeCnt++
|
|
if optimizeCnt > 1 {
|
|
failpoint.Return(nil, nil, 0, errors.New("gofail wrong optimizerCnt error"))
|
|
}
|
|
}
|
|
})
|
|
failpoint.Inject("mockHighLoadForOptimize", func() {
|
|
sqlPrefixes := []string{"select"}
|
|
topsql.MockHighCPULoad(sctx.GetSessionVars().StmtCtx.OriginalSQL, sqlPrefixes, 10)
|
|
})
|
|
sessVars := sctx.GetSessionVars()
|
|
if sessVars.StmtCtx.EnableOptimizerDebugTrace {
|
|
debugtrace.EnterContextCommon(sctx)
|
|
defer debugtrace.LeaveContextCommon(sctx)
|
|
}
|
|
|
|
// build logical plan
|
|
hintProcessor := hint.NewQBHintHandler(sctx.GetSessionVars().StmtCtx)
|
|
node.Accept(hintProcessor)
|
|
defer hintProcessor.HandleUnusedViewHints()
|
|
builder := planBuilderPool.Get().(*core.PlanBuilder)
|
|
defer planBuilderPool.Put(builder.ResetForReuse())
|
|
builder.Init(sctx, is, hintProcessor)
|
|
p, err := buildLogicalPlan(ctx, sctx, node, builder)
|
|
if err != nil {
|
|
return nil, nil, 0, err
|
|
}
|
|
|
|
activeRoles := sessVars.ActiveRoles
|
|
// Check privilege. Maybe it's better to move this to the Preprocess, but
|
|
// we need the table information to check privilege, which is collected
|
|
// into the visitInfo in the logical plan builder.
|
|
if pm := privilege.GetPrivilegeManager(sctx); pm != nil {
|
|
visitInfo := core.VisitInfo4PrivCheck(is, node, builder.GetVisitInfo())
|
|
if err := core.CheckPrivilege(activeRoles, pm, visitInfo); err != nil {
|
|
return nil, nil, 0, err
|
|
}
|
|
}
|
|
|
|
if err := core.CheckTableLock(sctx, is, builder.GetVisitInfo()); err != nil {
|
|
return nil, nil, 0, err
|
|
}
|
|
|
|
names := p.OutputNames()
|
|
|
|
// Handle the non-logical plan statement.
|
|
logic, isLogicalPlan := p.(core.LogicalPlan)
|
|
if !isLogicalPlan {
|
|
return p, names, 0, nil
|
|
}
|
|
|
|
core.RecheckCTE(logic)
|
|
|
|
// Handle the logical plan statement, use cascades planner if enabled.
|
|
if sessVars.GetEnableCascadesPlanner() {
|
|
finalPlan, cost, err := cascades.DefaultOptimizer.FindBestPlan(sctx, logic)
|
|
return finalPlan, names, cost, err
|
|
}
|
|
|
|
beginOpt := time.Now()
|
|
finalPlan, cost, err := core.DoOptimize(ctx, sctx, builder.GetOptFlag(), logic)
|
|
// TODO: capture plan replayer here if it matches sql and plan digest
|
|
|
|
sessVars.DurationOptimization = time.Since(beginOpt)
|
|
return finalPlan, names, cost, err
|
|
}
|
|
|
|
// OptimizeExecStmt to handle the "execute" statement
|
|
func OptimizeExecStmt(ctx context.Context, sctx sessionctx.Context,
|
|
execAst *ast.ExecuteStmt, is infoschema.InfoSchema) (core.Plan, types.NameSlice, error) {
|
|
builder := planBuilderPool.Get().(*core.PlanBuilder)
|
|
defer planBuilderPool.Put(builder.ResetForReuse())
|
|
pctx := sctx.GetPlanCtx()
|
|
builder.Init(pctx, is, nil)
|
|
|
|
p, err := buildLogicalPlan(ctx, pctx, execAst, builder)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
exec, ok := p.(*core.Execute)
|
|
if !ok {
|
|
return nil, nil, errors.Errorf("invalid result plan type, should be Execute")
|
|
}
|
|
plan, names, err := core.GetPlanFromSessionPlanCache(ctx, sctx, false, is, exec.PrepStmt, exec.Params)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
exec.Plan = plan
|
|
exec.SetOutputNames(names)
|
|
exec.Stmt = exec.PrepStmt.PreparedAst.Stmt
|
|
return exec, names, nil
|
|
}
|
|
|
|
func buildLogicalPlan(ctx context.Context, sctx pctx.PlanContext, node ast.Node, builder *core.PlanBuilder) (core.Plan, error) {
|
|
sctx.GetSessionVars().PlanID.Store(0)
|
|
sctx.GetSessionVars().PlanColumnID.Store(0)
|
|
sctx.GetSessionVars().MapScalarSubQ = nil
|
|
sctx.GetSessionVars().MapHashCode2UniqueID4ExtendedCol = nil
|
|
|
|
failpoint.Inject("mockRandomPlanID", func() {
|
|
sctx.GetSessionVars().PlanID.Store(rand.Int31n(1000)) // nolint:gosec
|
|
})
|
|
|
|
// reset fields about rewrite
|
|
sctx.GetSessionVars().RewritePhaseInfo.Reset()
|
|
beginRewrite := time.Now()
|
|
p, err := builder.Build(ctx, node)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
sctx.GetSessionVars().RewritePhaseInfo.DurationRewrite = time.Since(beginRewrite)
|
|
if exec, ok := p.(*core.Execute); ok && exec.PrepStmt != nil {
|
|
sctx.GetSessionVars().StmtCtx.Tables = core.GetDBTableInfo(exec.PrepStmt.VisitInfos)
|
|
} else {
|
|
sctx.GetSessionVars().StmtCtx.Tables = core.GetDBTableInfo(builder.GetVisitInfo())
|
|
}
|
|
return p, nil
|
|
}
|
|
|
|
func handleInvalidBinding(ctx context.Context, sctx pctx.PlanContext, level string, binding bindinfo.Binding) {
|
|
sessionHandle := sctx.Value(bindinfo.SessionBindInfoKeyType).(bindinfo.SessionBindingHandle)
|
|
err := sessionHandle.DropSessionBinding(binding.SQLDigest)
|
|
if err != nil {
|
|
logutil.Logger(ctx).Info("drop session bindings failed")
|
|
}
|
|
if level == metrics.ScopeSession {
|
|
return
|
|
}
|
|
|
|
globalHandle := domain.GetDomain(sctx).BindHandle()
|
|
globalHandle.AddInvalidGlobalBinding(binding)
|
|
}
|
|
|
|
// setVarHintChecker checks whether the variable name in set_var hint is valid.
|
|
func setVarHintChecker(varName, hint string) (ok bool, warning error) {
|
|
sysVar := variable.GetSysVar(varName)
|
|
if sysVar == nil { // no such a variable
|
|
return false, plannererrors.ErrUnresolvedHintName.FastGenByArgs(varName, hint)
|
|
}
|
|
if !sysVar.IsHintUpdatableVerified {
|
|
warning = plannererrors.ErrNotHintUpdatable.FastGenByArgs(varName)
|
|
}
|
|
return true, warning
|
|
}
|
|
|
|
func init() {
|
|
core.OptimizeAstNode = Optimize
|
|
core.IsReadOnly = IsReadOnly
|
|
bindinfo.GetGlobalBindingHandle = func(sctx sessionctx.Context) bindinfo.GlobalBindingHandle {
|
|
return domain.GetDomain(sctx).BindHandle()
|
|
}
|
|
}
|