For a detailed leak analysis, rerun with: --leak-check=full
-For lists of detected and suppressed errors, rerun with: -s
Use --track-origins=yes to see where uninitialised values come from
+For lists of detected and suppressed errors, rerun with: -s
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
For a detailed leak analysis, rerun with: --leak-check=full
-For lists of detected and suppressed errors, rerun with: -s
Use --track-origins=yes to see where uninitialised values come from
+For lists of detected and suppressed errors, rerun with: -s
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
For a detailed leak analysis, rerun with: --leak-check=full
-For lists of detected and suppressed errors, rerun with: -s
Use --track-origins=yes to see where uninitialised values come from
+For lists of detected and suppressed errors, rerun with: -s
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
For a detailed leak analysis, rerun with: --leak-check=full
-For lists of detected and suppressed errors, rerun with: -s
Use --track-origins=yes to see where uninitialised values come from
+For lists of detected and suppressed errors, rerun with: -s
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)