Index: tests/meta/dumpable.cfa
===================================================================
--- tests/meta/dumpable.cfa	(revision 34831854737ea6010e731cecfe00466ced62cf8a)
+++ tests/meta/dumpable.cfa	(revision 2a906395d123d2094e54beedb446b1bd04d1c902)
@@ -10,6 +10,6 @@
 // Created On       : Wed Jan 05 13:53:22 2022
 // Last Modified By : Peter A. Buhr
-// Last Modified On : Fri Jul 19 07:58:45 2024
-// Update Count     : 10
+// Last Modified On : Sun Mar  2 20:56:32 2025
+// Update Count     : 18
 //
 
@@ -44,7 +44,9 @@
 void check_permission() {
 	char myExe[PATH_MAX];
-	ssize_t n = readlink( "/proc/self/exe", myExe, sizeof(myExe));
+
+	#define exe "/proc/self/exe"
+	ssize_t n = readlink( exe, myExe, sizeof(myExe));
 	if ( n < 0 ) {
-		perror( "readlink(/proc/self/exe ) error" );
+		perror( "readlink( " exe " ) error" );
 		return 1;
 	} // if
@@ -103,9 +105,10 @@
 
 void check_core_pattern() {
+	#define core_pattern "/proc/sys/kernel/core_pattern"
 	int ret;
-	int cp = open( "/proc/sys/kernel/core_pattern", 0, O_RDONLY );
+	int cp = open( core_pattern, 0, O_RDONLY );
 
 	if ( cp < 0 ) {
-		perror( "open(/proc/sys/kernel/core_pattern, O_RDONLY ) error" );
+		perror( "open( " core_pattern ", 0, O_RDONLY ) error" );
 		return;
 	} // if
@@ -128,5 +131,5 @@
 	} finally {
 		ret = close( cp );
-		if ( ret < 0 ) perror( "close( /proc/sys/kernel/core_pattern ) error" );
+		if ( ret < 0 ) perror( "close( " core_pattern " ) error" );
 	} // try
 }
