From b3d507ff13311a4c2c40a0ff614494084a1eb6e9 Mon Sep 17 00:00:00 2001 From: Monty Date: Sat, 9 Mar 2024 12:09:43 +0200 Subject: [PATCH] Suppressed new warning for rpl_get_lock on amd-freebsd and aarch64-macos --- mysql-test/suite/rpl/t/rpl_get_lock.test | 1 + 1 file changed, 1 insertion(+) diff --git a/mysql-test/suite/rpl/t/rpl_get_lock.test b/mysql-test/suite/rpl/t/rpl_get_lock.test index f0a11e712f6..c6f2f6ec83b 100644 --- a/mysql-test/suite/rpl/t/rpl_get_lock.test +++ b/mysql-test/suite/rpl/t/rpl_get_lock.test @@ -5,6 +5,7 @@ CALL mtr.add_suppression("Unsafe statement written to the binary log using state call mtr.add_suppression("Could not read packet:.* errno: 11 "); # The following one comes from calling dirty_close on client side call mtr.add_suppression("Could not read packet:.* errno: 2 "); +call mtr.add_suppression("Could not read packet:.* errno: 35 "); --enable_query_log let $org_log_warnings=`select @@global.log_warnings`;