diff --git a/storage/innobase/fil/fil0fil.cc b/storage/innobase/fil/fil0fil.cc index b757818241d..5b5284d1fa7 100644 --- a/storage/innobase/fil/fil0fil.cc +++ b/storage/innobase/fil/fil0fil.cc @@ -8706,6 +8706,11 @@ bool Fil_system::encryption_rotate_in_a_shard(Fil_shard *shard) { here. */ MDL_ticket *mdl_ticket = nullptr; if (fsp_is_undo_tablespace(space->id)) { + + if (strcmp(space->name, "undo_003") == 0) { + DEBUG_SYNC_C("undo_rotate"); + } + THD *thd = current_thd; while ( acquire_shared_backup_lock(thd, thd->variables.lock_wait_timeout)) { diff --git a/storage/innobase/log/log0ddl.cc b/storage/innobase/log/log0ddl.cc index 5bd6c06590a..cb11c9fab1e 100644 --- a/storage/innobase/log/log0ddl.cc +++ b/storage/innobase/log/log0ddl.cc @@ -1607,6 +1607,10 @@ void Log_DDL::replay_delete_space_log(space_id_t space_id, mutex_exit(&dict_sys->mutex); } + if (fsp_is_undo_tablespace(space_id)) { + DEBUG_SYNC_C("drop_undo"); + } + /* Require the mutex to block key rotation. Please note that here we don't know if this tablespace is encrypted or not, so just acquire the mutex unconditionally. */