Lines Matching refs:free

220     error: code overflow" or "double free or corruption" or other memory
392 1. Add pcre[16|32]_jit_free_unused_memory to forcibly free unused JIT
978 recursion). Instead of malloc and free for each heap frame each time a
2320 vector, but for larger vectors malloc() is used. It was failing to free
2744 moved the internal flags into a new 16-bit field to free up more option
3169 17. Under certain error circumstances pcregrep might try to free random memory
3223 or a glibc crash with a message such as "pcretest: free(): invalid next
3556 in some cases to crash with a glibc free() error. This could even happen if
3600 the days when it was an int rather than a uint) to free up another bit for
3618 error: code overflow at offset 49" or "glibc detected double free or
3624 28. Change free() to pcre_free() in pcredemo.c. Apparently this makes a
4130 22. Added some untidy missing memory free() calls in pcretest, to keep
4214 16. Updated pcredemo.c to include calls to free() to release the memory for the
4285 To make it easier for callers to provide specially tailored get/free
4295 obtained and freed by both kinds of malloc/free at match time to be added
4732 pcre_exec(). This saves a malloc/free per call. The default value of
5113 but cannot call free() or pcre_free() directly.
5201 the POSIX wrapper now has to get and free some memory, and copy the results.
5669 containing pointers to malloc() and free() or alternative functions are the
5699 7. Turn the malloc/free funtions variables into pcre_malloc and pcre_free and