Fix: lttng: enable-channel: leak of popt arguments
[lttng-tools.git] / src / bin / lttng / uprobe.cpp
index 21b5e90e6b2bcc60173ab9954ac03c84084e3785..c6a2d9429090f3ce2141f0fbdd66ecc51272ff75 100644 (file)
@@ -5,19 +5,19 @@
  *
  */
 
-#include "uprobe.h"
+#include "uprobe.hpp"
 
 #include <sys/types.h>
 #include <sys/stat.h>
 #include <unistd.h>
 
-#include "common/compat/getenv.h"
-#include "common/string-utils/string-utils.h"
-#include "common/utils.h"
-#include "common/path.h"
+#include "common/compat/getenv.hpp"
+#include "common/string-utils/string-utils.hpp"
+#include "common/utils.hpp"
+#include "common/path.hpp"
 #include "lttng/constant.h"
 
-#include "command.h"
+#include "command.hpp"
 
 /*
  * Walk the directories in the PATH environment variable to find the target
@@ -58,7 +58,7 @@ int walk_command_search_path(const char *binary, char *binary_full_path)
         * This char array is used to concatenate path to binary to look for
         * the binary.
         */
-       tentative_binary_path = (char *) zmalloc(LTTNG_PATH_MAX * sizeof(char));
+       tentative_binary_path = calloc<char>(LTTNG_PATH_MAX);
        if (!tentative_binary_path) {
                ret = -1;
                goto alloc_error;
@@ -292,7 +292,7 @@ int parse_userspace_probe_opts(const char *opt,
         */
        if (strchr(unescaped_target_path, '/') == NULL) {
                /* Walk the $PATH variable to find the targeted binary. */
-               real_target_path = (char *) zmalloc(LTTNG_PATH_MAX * sizeof(char));
+               real_target_path = calloc<char>(LTTNG_PATH_MAX);
                if (!real_target_path) {
                        PERROR("Error allocating path buffer");
                        ret = CMD_ERROR;
This page took 0.02382 seconds and 4 git commands to generate.