filename 1547 dmtcp_coordinator.cpp string filename = RESTART_SCRIPT_BASENAME "." RESTART_SCRIPT_EXT; filename 1558 dmtcp_coordinator.cpp unlink(filename.c_str()); filename 1560 dmtcp_coordinator.cpp (filename) (dirname) (uniqueFilename); filename 1562 dmtcp_coordinator.cpp JWARNING(symlinkat(uniqueFilename.c_str(), dirfd, filename.c_str()) == 0); filename 40 dmtcp_launch.cpp static int testMatlab(const char *filename); filename 42 dmtcp_launch.cpp static bool testSetuid(const char *filename); filename 43 dmtcp_launch.cpp static void testStaticallyLinked(const char *filename); filename 552 dmtcp_launch.cpp static int testMatlab(const char *filename) filename 572 dmtcp_launch.cpp if ( strcmp(filename, "matlab") == 0 && getenv(ENV_VAR_QUIET) == NULL) { filename 616 dmtcp_launch.cpp static bool testSetuid(const char *filename) filename 618 dmtcp_launch.cpp if (Util::isSetuid(filename) && filename 619 dmtcp_launch.cpp strcmp(filename, "screen") != 0 && strstr(filename, "/screen") == NULL) { filename 413 dmtcp_restart.cpp static char first_char(const char *filename) filename 418 dmtcp_restart.cpp fd = open(filename, O_RDONLY); filename 419 dmtcp_restart.cpp JASSERT(fd >= 0) (filename) .Text("ERROR: Cannot open filename"); filename 422 dmtcp_restart.cpp JASSERT(rc == 1) (filename) .Text("ERROR: Error reading from filename"); filename 434 dmtcp_restart.cpp static int open_ckpt_to_read(const char *filename) filename 458 dmtcp_restart.cpp fc = first_char(filename); filename 459 dmtcp_restart.cpp fd = open(filename, O_RDONLY); filename 460 dmtcp_restart.cpp JASSERT(fd>=0)(filename).Text("Failed to open file."); filename 481 dmtcp_restart.cpp JASSERT(pipe(fds) != -1) (filename) filename 207 dmtcpplugin.cpp EXTERNC void dmtcp_set_ckpt_file(const char *filename) filename 209 dmtcpplugin.cpp ProcessInfo::instance().setCkptFilename(filename); filename 214 dmtcpplugin.cpp static string filename; filename 215 dmtcpplugin.cpp filename = ProcessInfo::instance().getCkptFilename(); filename 216 dmtcpplugin.cpp return filename.c_str(); filename 264 execwrappers.cpp char **filename, char ***newArgv) filename 315 execwrappers.cpp *filename = (*newArgv)[0]; filename 317 execwrappers.cpp *filename = (char*)path; filename 336 execwrappers.cpp JTRACE("Will exec filename instead of path") (path) (*filename); filename 369 execwrappers.cpp static string getUpdatedLdPreload(const char* filename, filename 377 execwrappers.cpp Util::elfType(filename, &isElf, &is32bitElf) != -1 && filename 444 execwrappers.cpp static vector<string> patchUserEnv (vector<string> env, const char* filename) filename 487 execwrappers.cpp ldPreloadStr += getUpdatedLdPreload(filename, userPreloadStr.c_str()); filename 499 execwrappers.cpp extern "C" int execve (const char *filename, char *const argv[], filename 503 execwrappers.cpp if (isPerformingCkptRestart() || isBlacklistedProgram(filename) ) { filename 504 execwrappers.cpp return _real_execve(filename, argv, envp); filename 506 execwrappers.cpp JTRACE("execve() wrapper") (filename); filename 517 execwrappers.cpp dmtcpPrepareForExec(filename, argv, &newFilename, &newArgv); filename 519 execwrappers.cpp const vector<string> envStrings = patchUserEnv(env, filename); filename 524 execwrappers.cpp dmtcpProcessFailedExec(filename, newArgv); filename 543 execwrappers.cpp extern "C" int execvp (const char *filename, char *const argv[]) filename 545 execwrappers.cpp if (isPerformingCkptRestart() || isBlacklistedProgram(filename) ) { filename 546 execwrappers.cpp return _real_execvp(filename, argv); filename 548 execwrappers.cpp JTRACE("execvp() wrapper") (filename); filename 556 execwrappers.cpp dmtcpPrepareForExec(filename, argv, &newFilename, &newArgv); filename 557 execwrappers.cpp setenv("LD_PRELOAD", getUpdatedLdPreload(filename, NULL).c_str(), 1); filename 561 execwrappers.cpp dmtcpProcessFailedExec(filename, newArgv); filename 569 execwrappers.cpp extern "C" int execvpe (const char *filename, char *const argv[], filename 572 execwrappers.cpp if (isPerformingCkptRestart() || isBlacklistedProgram(filename)) { filename 573 execwrappers.cpp return _real_execvpe(filename, argv, envp); filename 575 execwrappers.cpp JTRACE("execvpe() wrapper") (filename); filename 586 execwrappers.cpp dmtcpPrepareForExec(filename, argv, &newFilename, &newArgv); filename 588 execwrappers.cpp const vector<string> newEnvStrings = patchUserEnv(env, filename); filename 593 execwrappers.cpp dmtcpProcessFailedExec(filename, newArgv); filename 300 miscwrappers.cpp SYSCALL_GET_ARGS_3(const char*,filename,char* const *,argv,char* const *,envp); filename 301 miscwrappers.cpp ret = execve(filename,argv,envp); filename 518 mtcp/mtcp_util.c char filename[PATH_MAX] = {0}; filename 531 mtcp/mtcp_util.c mtcp_strcpy(filename, area.name); filename 538 mtcp/mtcp_util.c MTCP_ASSERT(mtcp_strcmp(filename, area.name) == 0); filename 559 mtcp/mtcp_util.c MTCP_ASSERT(mtcp_strcmp(filename, area.name) == 0); filename 575 mtcp/mtcp_util.c MTCP_ASSERT(mtcp_strcmp(filename, area.name) == 0); filename 179 nosyscallsreal.c int _real_execve (const char *filename, char *const argv[], filename 182 nosyscallsreal.c REAL_FUNC_PASSTHROUGH (execve) (filename,argv,envp); filename 67 plugin/dl/dlwrappers.cpp void *dlopen(const char *filename, int flag) filename 70 plugin/dl/dlwrappers.cpp void *ret = _real_dlopen(filename, flag); filename 304 plugin/ipc/file/fileconnlist.cpp string filename = Util::removeSuffix(area.name, DELETED_FILE_SUFFIX); filename 433 plugin/ipc/ssh/ssh.cpp extern "C" int execve (const char *filename, char *const argv[], filename 436 plugin/ipc/ssh/ssh.cpp if (jalib::Filesystem::BaseName(filename) != "ssh") { filename 437 plugin/ipc/ssh/ssh.cpp return _real_execve(filename, argv, envp); filename 449 plugin/ipc/ssh/ssh.cpp extern "C" int execvp (const char *filename, char *const argv[]) filename 451 plugin/ipc/ssh/ssh.cpp if (jalib::Filesystem::BaseName(filename) != "ssh") { filename 452 plugin/ipc/ssh/ssh.cpp return _real_execvp(filename, argv); filename 465 plugin/ipc/ssh/ssh.cpp extern "C" int execvpe (const char *filename, char *const argv[], filename 468 plugin/ipc/ssh/ssh.cpp if (jalib::Filesystem::BaseName(filename) != "ssh") { filename 469 plugin/ipc/ssh/ssh.cpp return _real_execvpe(filename, argv, envp); filename 451 processinfo.cpp void ProcessInfo::setCkptFilename(const char *filename) filename 453 processinfo.cpp JASSERT(filename != NULL); filename 454 processinfo.cpp if (filename[0] == '/') { filename 455 processinfo.cpp _ckptDir = jalib::Filesystem::DirName(filename); filename 456 processinfo.cpp _ckptFileName = filename; filename 458 processinfo.cpp _ckptFileName = _ckptDir + "/" + filename; filename 565 processinfo.cpp JTRACE("Serializing ChildPid Table") (_childTable.size()) (o.filename()); filename 392 syscallsreal.c void *_real_dlopen(const char *filename, int flag) { filename 393 syscallsreal.c REAL_FUNC_PASSTHROUGH_TYPED (void*, dlopen) (filename, flag); filename 585 syscallsreal.c int _real_execve (const char *filename, char *const argv[], filename 588 syscallsreal.c REAL_FUNC_PASSTHROUGH (execve) (filename,argv,envp); filename 304 syscallwrappers.h int _real_execve (const char *filename, char *const argv[], char *const envp[]); filename 398 syscallwrappers.h void *_real_dlopen(const char *filename, int flag); filename 196 util_exec.cpp bool Util::isStaticallyLinked(const char *filename) filename 200 util_exec.cpp expandPathname(filename, pathname, sizeof(pathname)); filename 220 util_exec.cpp bool Util::isScreen(const char *filename) filename 222 util_exec.cpp return jalib::Filesystem::BaseName(filename) == "screen" && filename 223 util_exec.cpp isSetuid(filename); filename 261 util_exec.cpp bool Util::isSetuid(const char *filename) filename 264 util_exec.cpp if (expandPathname(filename, pathname, sizeof(pathname)) == 0) { filename 274 util_exec.cpp void Util::patchArgvIfSetuid(const char* filename, char *const origArgv[], filename 277 util_exec.cpp if (isSetuid(filename) == false) return; filename 281 util_exec.cpp expandPathname(filename, realFilename, sizeof (realFilename));