pathname          635 dmtcp_launch.cpp void testStaticallyLinked(const char *pathname)
pathname          637 dmtcp_launch.cpp   if (Util::isStaticallyLinked(pathname)) {
pathname          639 dmtcp_launch.cpp       "*** WARNING:  " ELF_INTERPRETER " --verify " << pathname << " returns\n"
pathname          641 dmtcp_launch.cpp       << "*** This often means that " << pathname << " is\n"
pathname          318 miscwrappers.cpp       SYSCALL_GET_ARGS_3(const char*,pathname,int,flags,mode_t,mode);
pathname          319 miscwrappers.cpp       ret = open(pathname, flags, mode);
pathname          388 nosyscallsreal.c int _real_open (const char *pathname, int flags, ...) {
pathname          397 nosyscallsreal.c   REAL_FUNC_PASSTHROUGH (open) (pathname, flags, mode);
pathname          400 nosyscallsreal.c int _real_open64 (const char *pathname, int flags, ...) {
pathname          409 nosyscallsreal.c   REAL_FUNC_PASSTHROUGH (open) (pathname, flags, mode);
pathname          278 plugin/ipc/event/eventconnection.cpp                                   watch_descriptor.add_watch.pathname,
pathname          285 plugin/ipc/event/eventconnection.cpp           (watch_descriptor.add_watch.pathname)
pathname          316 plugin/ipc/event/eventconnection.cpp                                                      const char *pathname,
pathname          322 plugin/ipc/event/eventconnection.cpp      (wd) (fd) (pathname) (mask);
pathname          323 plugin/ipc/event/eventconnection.cpp    JASSERT(pathname != NULL) .Text("pathname is NULL");
pathname          324 plugin/ipc/event/eventconnection.cpp    if (NULL != pathname) {
pathname          332 plugin/ipc/event/eventconnection.cpp       string_len = strlen(pathname);
pathname          339 plugin/ipc/event/eventconnection.cpp       strncpy(watch_descriptor.add_watch.pathname, pathname, string_len);
pathname          197 plugin/ipc/event/eventconnection.h       void add_watch_descriptors(int wd, int fd, const char *pathname,
pathname          303 plugin/ipc/event/eventwrappers.cpp EXTERNC int inotify_add_watch(int fd, const char *pathname, uint32_t mask)
pathname          306 plugin/ipc/event/eventwrappers.cpp   int ret = _real_inotify_add_watch(fd, pathname, mask);
pathname          312 plugin/ipc/event/eventwrappers.cpp     inotify_con->add_watch_descriptors(ret, fd, pathname, mask);
pathname           58 plugin/ipc/event/util_descriptor.h    char pathname [ MAX_PATH_LEN ];
pathname          214 plugin/pid/pidwrappers.h   int _real_open(const char *pathname, int flags, ...);
pathname          215 plugin/pid/pidwrappers.h   int _real_open64(const char *pathname, int flags, ...);
pathname          803 syscallsreal.c int _real_open(const char *pathname, int flags, ...) {
pathname          812 syscallsreal.c   REAL_FUNC_PASSTHROUGH (open) (pathname, flags, mode);
pathname          827 syscallsreal.c int _real_open64(const char *pathname, int flags, ...) {
pathname          836 syscallsreal.c   REAL_FUNC_PASSTHROUGH (open) (pathname, flags, mode);
pathname          850 syscallsreal.c int _real_openat(int dirfd, const char *pathname, int flags, mode_t mode) {
pathname          851 syscallsreal.c   REAL_FUNC_PASSTHROUGH (openat) (dirfd, pathname, flags, mode);
pathname          855 syscallsreal.c int _real_openat64(int dirfd, const char *pathname, int flags, mode_t mode) {
pathname          856 syscallsreal.c   REAL_FUNC_PASSTHROUGH (openat64) (dirfd, pathname, flags, mode);
pathname          318 syscallwrappers.h   int _real_open(const char *pathname, int flags, ...);
pathname          319 syscallwrappers.h   int _real_open64(const char *pathname, int flags, ...);
pathname          322 syscallwrappers.h   int _real_openat(int dirfd, const char *pathname, int flags, mode_t mode);
pathname          323 syscallwrappers.h   int _real_openat64(int dirfd, const char *pathname, int flags, mode_t mode);
pathname          424 syscallwrappers.h   int _real_unlink(const char *pathname);
pathname           64 util_exec.cpp  static int isdir0700(const char *pathname)
pathname           67 util_exec.cpp    stat(pathname, &st);
pathname           71 util_exec.cpp            && access(pathname, R_OK | W_OK | X_OK) == 0
pathname           75 util_exec.cpp  int Util::safeMkdir(const char *pathname, mode_t mode)
pathname           78 util_exec.cpp    chmod(pathname, 0700);
pathname           79 util_exec.cpp    if (isdir0700(pathname))
pathname           82 util_exec.cpp    unlink(pathname);
pathname           83 util_exec.cpp    rmdir(pathname); // Maybe it was an empty directory
pathname           84 util_exec.cpp    mkdir(pathname, 0700);
pathname           85 util_exec.cpp    return isdir0700(pathname);
pathname          156 util_exec.cpp  int Util::elfType(const char *pathname, bool *isElf, bool *is32bitElf)
pathname          164 util_exec.cpp    expandPathname(pathname, full_path, sizeof(full_path));
pathname          199 util_exec.cpp    char pathname[PATH_MAX];
pathname          200 util_exec.cpp    expandPathname(filename, pathname, sizeof(pathname));
pathname          201 util_exec.cpp    elfType(pathname, &isElf, &is32bitElf);
pathname          210 util_exec.cpp    cmd = cmd + " --verify " + pathname + " > /dev/null";
pathname          263 util_exec.cpp    char pathname[PATH_MAX];
pathname          264 util_exec.cpp    if (expandPathname(filename, pathname, sizeof(pathname)) ==  0) {
pathname          266 util_exec.cpp      if (stat(pathname, &buf) == 0 && (buf.st_mode & S_ISUID ||