mirror of
https://github.com/Zenithsiz/ftmemsim-valgrind.git
synced 2026-02-17 08:04:36 +00:00
Modify .exp files following the new error message.
Change: For counts of detected and suppressed errors, rerun with: -v to For lists of detected and suppressed errors, rerun with: -s
This commit is contained in:
@@ -10,5 +10,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,7 +6,7 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
Unaddressable byte(s) found during client check request
|
||||
at 0x........: test2 (addressable.c:48)
|
||||
@@ -35,7 +35,7 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
HEAP SUMMARY:
|
||||
@@ -44,7 +44,7 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
Process terminating with default action of signal N (SIGSEGV or SIGBUS)
|
||||
@@ -58,7 +58,7 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
Uninitialised byte(s) found during client check request
|
||||
at 0x........: test5 (addressable.c:85)
|
||||
@@ -78,7 +78,7 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
HEAP SUMMARY:
|
||||
@@ -87,5 +87,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -938,5 +938,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 130 errors from 100 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -864,5 +864,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 99 errors from 99 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -21,5 +21,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,5 +19,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -64,5 +64,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 7 errors from 7 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -11,5 +11,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -573,5 +573,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 66 errors from 66 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -573,5 +573,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 66 errors from 66 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -464,5 +464,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 51 errors from 51 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -464,5 +464,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 51 errors from 51 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -20,6 +20,6 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -11,5 +11,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -13,5 +13,5 @@ LEAK SUMMARY:
|
||||
still reachable: 0 bytes in 0 blocks
|
||||
suppressed: 0 bytes in 0 blocks
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -13,5 +13,5 @@ LEAK SUMMARY:
|
||||
still reachable: 0 bytes in 0 blocks
|
||||
suppressed: 0 bytes in 0 blocks
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
All heap blocks were freed -- no leaks are possible
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -13,5 +13,5 @@ LEAK SUMMARY:
|
||||
still reachable: 0 bytes in 0 blocks
|
||||
suppressed: 0 bytes in 0 blocks
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
All heap blocks were freed -- no leaks are possible
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -99,5 +99,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 5 errors from 5 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -129,5 +129,5 @@ HEAP SUMMARY:
|
||||
|
||||
All heap blocks were freed -- no leaks are possible
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -129,5 +129,5 @@ HEAP SUMMARY:
|
||||
|
||||
All heap blocks were freed -- no leaks are possible
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -9,5 +9,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -10,5 +10,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -11,5 +11,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -10,5 +10,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -8,5 +8,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -8,5 +8,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -52,5 +52,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -57,5 +57,5 @@ LEAK SUMMARY:
|
||||
Reachable blocks (those to which a pointer was found) are not shown.
|
||||
To see them, rerun with: --leak-check=full --show-leak-kinds=all
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -7,5 +7,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -25,5 +25,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -24,5 +24,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,5 +19,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -24,5 +24,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -30,5 +30,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 4 errors from 4 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -24,5 +24,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,5 +19,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -24,5 +24,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -15,5 +15,5 @@ HEAP SUMMARY:
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,6 +19,6 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -15,6 +15,6 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,6 +19,6 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
Use --track-origins=yes to see where uninitialised values come from
|
||||
ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -6,5 +6,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -195,5 +195,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -191,5 +191,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -193,5 +193,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -193,5 +193,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -193,5 +193,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -19,5 +19,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
|
||||
|
||||
@@ -20,5 +20,5 @@ HEAP SUMMARY:
|
||||
|
||||
For a detailed leak analysis, rerun with: --leak-check=full
|
||||
|
||||
For counts of detected and suppressed errors, rerun with: -v
|
||||
For lists of detected and suppressed errors, rerun with: -s
|
||||
ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
||||
|
||||
Reference in New Issue
Block a user