getpid 181 anacron/log.c if (getpid() == primary_pid) complain("Aborted"); getpid 195 anacron/log.c if (getpid() == primary_pid) complain("Aborted"); getpid 225 anacron/main.c primary_pid = getpid(); getpid 450 anacron/main.c srandom((unsigned int)(getpid() + tv.tv_usec)); getpid 481 anacron/main.c primary_pid = getpid(); getpid 119 src/cron.c pid_t pid = getpid(); getpid 205 src/cron.c pid_t pid = getpid(); getpid 273 src/cron.c (void) fprintf(stderr, "[%ld] cron started\n", (long) getpid()); getpid 299 src/cron.c log_it("CRON", getpid(), "STARTUP", PACKAGE_VERSION, 0); getpid 306 src/cron.c pid = getpid(); getpid 326 src/cron.c log_it("CRON", getpid(), "No inotify - daemon runs with -i or -c option", getpid 502 src/cron.c pid_t pid = getpid(); getpid 617 src/cron.c Debug(DSCH, ("[%ld] GMToff=%ld\n", (long) getpid(), (long) GMToff)); getpid 632 src/cron.c (long) getpid(), (long) target * SECONDS_PER_MINUTE, getpid 676 src/cron.c Debug(DPROC, ("[%ld] sigchld...no children\n", (long) getpid())); getpid 679 src/cron.c Debug(DPROC, ("[%ld] sigchld...no dead kids\n", (long) getpid())); getpid 684 src/cron.c (long) getpid(), (long) pid, WEXITSTATUS(waiter))); getpid 148 src/crontab.c Pid = getpid(); getpid 76 src/database.c pid_t pid = getpid(); getpid 233 src/database.c log_it(uname, getpid(), "ORPHAN", "no passwd entry", 0); getpid 270 src/database.c log_it(fname, getpid(), "RELOAD", tabname, 0); getpid 339 src/database.c pid_t pid = getpid(); getpid 458 src/database.c pid_t pid = getpid(); getpid 47 src/do_command.c pid_t pid = getpid(); getpid 79 src/do_command.c Debug(DPROC, ("[%ld] child process done, exiting\n", (long) getpid())); getpid 93 src/do_command.c pid_t pid = getpid(); getpid 111 src/do_command.c Debug(DPROC, ("[%ld] child_process('%s')\n", (long) getpid(), e->cmd)); getpid 187 src/do_command.c Debug(DPROC, ("[%ld] grandchild process fork()'ed\n", (long) getpid())); getpid 197 src/do_command.c log_it(usernm, getpid(), "CMD", x, 0); getpid 273 src/do_command.c Debug(DPROC, ("[%ld] child continues, closing pipes\n", (long) getpid())); getpid 299 src/do_command.c (long) getpid())); getpid 345 src/do_command.c (long) getpid())); getpid 364 src/do_command.c (long) getpid())); getpid 385 src/do_command.c (long) getpid(), ch, ch)); getpid 514 src/do_command.c log_it(usernm, getpid(), "CMDOUT", logbuf, 0); getpid 525 src/do_command.c Debug(DPROC, ("[%ld] closing pipe to mail\n", (long) getpid())); getpid 538 src/do_command.c log_it(usernm, getpid(), "CMDOUT", logbuf, 0); getpid 553 src/do_command.c log_it(usernm, getpid(), "MAIL", buf, 0); getpid 558 src/do_command.c Debug(DPROC, ("[%ld] got EOF from grandchild\n", (long) getpid())); getpid 570 src/do_command.c (long) getpid(), children)); getpid 575 src/do_command.c (long) getpid())); getpid 579 src/do_command.c (long) getpid(), (long) child, WEXITSTATUS(waiter))); getpid 596 src/do_command.c log_it(usernm, getpid(), "UNSAFE", s, 0); getpid 129 src/entry.c log_it("CRON", getpid(), "ERROR", "Only privileged user can disable logging", 0); getpid 317 src/entry.c log_it("CRON", getpid(), "ERROR", "bad value of RANDOM_DELAY", 0); getpid 339 src/entry.c log_it("CRON", getpid(), "ERROR", "can't set SHELL", 0); getpid 367 src/entry.c log_it("CRON", getpid(), "ERROR", "can't set PATH", 0); getpid 378 src/entry.c log_it("CRON", getpid(), "ERROR", "can't set LOGNAME", 0); getpid 388 src/entry.c log_it("CRON", getpid(), "ERROR", "can't set USER", 0); getpid 315 src/env.c log_it("CRON", getpid(), "ERROR", "can't set HOME", 0); getpid 62 src/job.c log_it(uname, getpid(), "ERROR", "memory allocation failed", errno); getpid 69 src/job.c log_it(uname, getpid(), "ERROR", "memory allocation failed", errno); getpid 74 src/job.c log_it(uname, getpid(), "ERROR", "getpwnam() failed - user unknown",errno); getpid 76 src/job.c __FILE__,__LINE__,getpid(),time(NULL),uname,errno,strerror(errno))); getpid 304 src/misc.c pid_t pid = getpid(); getpid 499 src/misc.c log_it("crontab", getpid(), "warning", buf, 0); getpid 509 src/misc.c log_it("crontab", getpid(), "warning", buf, 0); getpid 136 src/popen.c log_it("CRON", getpid(), "EXEC FAILED", program, save_errno); getpid 67 src/security.c log_it("CRON", getpid(), "pam_message", msgm[i]->msg, 0); getpid 84 src/security.c log_it(pw->pw_name, getpid(), "PAM ERROR", pam_strerror(pamh, retcode), 0); \ getpid 107 src/security.c log_it("CRON", getpid(), "ERROR", getpid 130 src/security.c log_it(e->pwd->pw_name, getpid(), "FAILED to authorize user with PAM", getpid 143 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", getpid 149 src/security.c log_it(e->pwd->pw_name, getpid(), "ERROR", getpid 160 src/security.c log_it(e->pwd->pw_name, getpid(), getpid 188 src/security.c log_it(e->pwd->pw_name, getpid(), "INFO", buf, 0); getpid 238 src/security.c pid_t pid = getpid(); getpid 263 src/security.c log_it("CRON", getpid(), "ERROR", "setreuid failed", errno); getpid 268 src/security.c log_it("CRON", getpid(), "ERROR chdir failed", homedir, errno); getpid 288 src/security.c log_it("CRON", getpid(), "ERROR", "Failed to translate security class file", errno); getpid 293 src/security.c log_it("CRON", getpid(), "ERROR", "Failed to translate av perm entrypoint", errno); getpid 321 src/security.c log_it("CRON", getpid(), "ERROR", "Failed to translate security class context", errno); getpid 326 src/security.c log_it("CRON", getpid(), "ERROR", "Failed to translate av perm contains", errno); getpid 361 src/security.c log_it(u->name, getpid(), "context_new FAILED for MLS_LEVEL", getpid 368 src/security.c log_it(u->name, getpid(), getpid 375 src/security.c log_it(u->name, getpid(), "context_str FAILED for MLS_LEVEL", getpid 382 src/security.c log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0); getpid 392 src/security.c log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0); getpid 409 src/security.c log_it(u->name, getpid(), "NULL security context for user", "", 0); getpid 413 src/security.c log_it(u->name, getpid(), getpid 437 src/security.c log_it(u->name, getpid(), "ERROR", msg, 0); getpid 448 src/security.c log_it(u->name, getpid(), "WARNING", msg, 0); getpid 460 src/security.c log_it(u->name, getpid(), "ERROR", msg, 0); getpid 471 src/security.c log_it(u->name, getpid(), "WARNING", msg, 0); getpid 501 src/security.c log_it(name, getpid(), "getseuserbyname FAILED", name, 0); getpid 510 src/security.c log_it(name, getpid(), "getcon FAILED", "", 0); getpid 516 src/security.c log_it(name, getpid(), "context_new FAILED", current_context_str, 0); getpid 537 src/security.c log_it(name, getpid(), "No SELinux security context", tabname, 0); getpid 541 src/security.c log_it(name, getpid(), getpid 550 src/security.c log_it(name, getpid(), "getfilecon FAILED", tabname, 0); getpid 555 src/security.c log_it(name, getpid(), getpid 567 src/security.c log_it(name, getpid(), msg, tabname, 0); getpid 570 src/security.c log_it(name, getpid(), "Unauthorized SELinux context", tabname, 0); getpid 578 src/security.c log_it(name, getpid(), getpid 658 src/security.c log_it("CRON", getpid(), getpid 670 src/security.c log_it("CRON", getpid(), getpid 40 src/user.c log_it ("CRON", getpid (), msg, FileName, 0); getpid 75 src/user.c log_it(uname, getpid (), "FAILED", "fdopen on crontab_fd in load_user", getpid 140 src/user.c log_it(uname, getpid(), "FAILED", "loading cron table",