getpid            181 anacron/log.c      if (getpid() == primary_pid) complain("Aborted");
getpid            195 anacron/log.c      if (getpid() == primary_pid) complain("Aborted");
getpid            225 anacron/main.c 	primary_pid = getpid();
getpid            450 anacron/main.c     srandom((unsigned int)(getpid() + tv.tv_usec));
getpid            481 anacron/main.c 	primary_pid = getpid();
getpid            119 src/cron.c     	pid_t pid = getpid();
getpid            205 src/cron.c     	pid_t pid = getpid();
getpid            273 src/cron.c     		(void) fprintf(stderr, "[%ld] cron started\n", (long) getpid());
getpid            299 src/cron.c     	log_it("CRON", getpid(), "STARTUP", PACKAGE_VERSION, 0);
getpid            306 src/cron.c     	pid = getpid();
getpid            326 src/cron.c     		log_it("CRON", getpid(), "No inotify - daemon runs with -i or -c option", 
getpid            502 src/cron.c     	pid_t pid = getpid();
getpid            617 src/cron.c     		Debug(DSCH, ("[%ld] GMToff=%ld\n", (long) getpid(), (long) GMToff));
getpid            632 src/cron.c     			(long) getpid(), (long) target * SECONDS_PER_MINUTE,
getpid            676 src/cron.c     			Debug(DPROC, ("[%ld] sigchld...no children\n", (long) getpid()));
getpid            679 src/cron.c     			Debug(DPROC, ("[%ld] sigchld...no dead kids\n", (long) getpid()));
getpid            684 src/cron.c     					(long) getpid(), (long) pid, WEXITSTATUS(waiter)));
getpid            148 src/crontab.c  	Pid = getpid();
getpid             76 src/database.c 	pid_t pid = getpid();
getpid            233 src/database.c 		log_it(uname, getpid(), "ORPHAN", "no passwd entry", 0);
getpid            270 src/database.c 		log_it(fname, getpid(), "RELOAD", tabname, 0);
getpid            339 src/database.c 	pid_t pid = getpid();
getpid            458 src/database.c 	pid_t pid = getpid();
getpid             47 src/do_command.c 	pid_t pid = getpid();
getpid             79 src/do_command.c 		Debug(DPROC, ("[%ld] child process done, exiting\n", (long) getpid()));
getpid             93 src/do_command.c 	pid_t pid = getpid();
getpid            111 src/do_command.c 	Debug(DPROC, ("[%ld] child_process('%s')\n", (long) getpid(), e->cmd));
getpid            187 src/do_command.c 		Debug(DPROC, ("[%ld] grandchild process fork()'ed\n", (long) getpid()));
getpid            197 src/do_command.c 			log_it(usernm, getpid(), "CMD", x, 0);
getpid            273 src/do_command.c 	Debug(DPROC, ("[%ld] child continues, closing pipes\n", (long) getpid()));
getpid            299 src/do_command.c 				(long) getpid()));
getpid            345 src/do_command.c 				(long) getpid()));
getpid            364 src/do_command.c 			(long) getpid()));
getpid            385 src/do_command.c 					(long) getpid(), ch, ch));
getpid            514 src/do_command.c 						log_it(usernm, getpid(), "CMDOUT", logbuf, 0);
getpid            525 src/do_command.c 				Debug(DPROC, ("[%ld] closing pipe to mail\n", (long) getpid()));
getpid            538 src/do_command.c 					log_it(usernm, getpid(), "CMDOUT", logbuf, 0);
getpid            553 src/do_command.c 				log_it(usernm, getpid(), "MAIL", buf, 0);
getpid            558 src/do_command.c 		Debug(DPROC, ("[%ld] got EOF from grandchild\n", (long) getpid()));
getpid            570 src/do_command.c 				(long) getpid(), children));
getpid            575 src/do_command.c 					(long) getpid()));
getpid            579 src/do_command.c 				(long) getpid(), (long) child, WEXITSTATUS(waiter)));
getpid            596 src/do_command.c 		log_it(usernm, getpid(), "UNSAFE", s, 0);
getpid            129 src/entry.c    			log_it("CRON", getpid(), "ERROR", "Only privileged user can disable logging", 0);
getpid            317 src/entry.c    			log_it("CRON", getpid(), "ERROR", "bad value of RANDOM_DELAY", 0);
getpid            339 src/entry.c    			log_it("CRON", getpid(), "ERROR", "can't set SHELL", 0);
getpid            367 src/entry.c    			log_it("CRON", getpid(), "ERROR", "can't set PATH", 0);
getpid            378 src/entry.c    		log_it("CRON", getpid(), "ERROR", "can't set LOGNAME", 0);
getpid            388 src/entry.c    		log_it("CRON", getpid(), "ERROR", "can't set USER", 0);
getpid            315 src/env.c      		log_it("CRON", getpid(), "ERROR", "can't set HOME", 0);
getpid             62 src/job.c      			log_it(uname, getpid(), "ERROR", "memory allocation failed", errno);
getpid             69 src/job.c      			log_it(uname, getpid(), "ERROR", "memory allocation failed", errno);
getpid             74 src/job.c      		log_it(uname, getpid(), "ERROR", "getpwnam() failed - user unknown",errno);
getpid             76 src/job.c      			__FILE__,__LINE__,getpid(),time(NULL),uname,errno,strerror(errno)));
getpid            304 src/misc.c     	pid_t pid = getpid();
getpid            499 src/misc.c     			log_it("crontab", getpid(), "warning", buf, 0);
getpid            509 src/misc.c     			log_it("crontab", getpid(), "warning", buf, 0);
getpid            136 src/popen.c    			log_it("CRON", getpid(), "EXEC FAILED", program, save_errno);
getpid             67 src/security.c 				log_it("CRON", getpid(), "pam_message", msgm[i]->msg, 0);
getpid             84 src/security.c 	log_it(pw->pw_name, getpid(), "PAM ERROR", pam_strerror(pamh, retcode), 0); \
getpid            107 src/security.c 		log_it("CRON", getpid(), "ERROR",
getpid            130 src/security.c 		log_it(e->pwd->pw_name, getpid(), "FAILED to authorize user with PAM",
getpid            143 src/security.c 		log_it(e->pwd->pw_name, getpid(), "ERROR",
getpid            149 src/security.c 		log_it(e->pwd->pw_name, getpid(), "ERROR",
getpid            160 src/security.c 		log_it(e->pwd->pw_name, getpid(),
getpid            188 src/security.c 		log_it(e->pwd->pw_name, getpid(), "INFO", buf, 0);
getpid            238 src/security.c 	pid_t pid = getpid();
getpid            263 src/security.c 		log_it("CRON", getpid(), "ERROR", "setreuid failed", errno);
getpid            268 src/security.c 		log_it("CRON", getpid(), "ERROR chdir failed", homedir, errno);
getpid            288 src/security.c 		log_it("CRON", getpid(), "ERROR", "Failed to translate security class file", errno);
getpid            293 src/security.c 		log_it("CRON", getpid(), "ERROR", "Failed to translate av perm entrypoint", errno);
getpid            321 src/security.c 		log_it("CRON", getpid(), "ERROR", "Failed to translate security class context", errno);
getpid            326 src/security.c 		log_it("CRON", getpid(), "ERROR", "Failed to translate av perm contains", errno);
getpid            361 src/security.c 			log_it(u->name, getpid(), "context_new FAILED for MLS_LEVEL",
getpid            368 src/security.c 			log_it(u->name, getpid(),
getpid            375 src/security.c 			log_it(u->name, getpid(), "context_str FAILED for MLS_LEVEL",
getpid            382 src/security.c 			log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0);
getpid            392 src/security.c 		log_it(u->name, getpid(), "strdup FAILED for MLS_LEVEL", range, 0);
getpid            409 src/security.c 			log_it(u->name, getpid(), "NULL security context for user", "", 0);
getpid            413 src/security.c 			log_it(u->name, getpid(),
getpid            437 src/security.c 					log_it(u->name, getpid(), "ERROR", msg, 0);
getpid            448 src/security.c 					log_it(u->name, getpid(), "WARNING", msg, 0);
getpid            460 src/security.c 				log_it(u->name, getpid(), "ERROR", msg, 0);
getpid            471 src/security.c 				log_it(u->name, getpid(), "WARNING", msg, 0);
getpid            501 src/security.c 			log_it(name, getpid(), "getseuserbyname FAILED", name, 0);
getpid            510 src/security.c 			log_it(name, getpid(), "getcon FAILED", "", 0);
getpid            516 src/security.c 			log_it(name, getpid(), "context_new FAILED", current_context_str, 0);
getpid            537 src/security.c 			log_it(name, getpid(), "No SELinux security context", tabname, 0);
getpid            541 src/security.c 			log_it(name, getpid(),
getpid            550 src/security.c 			log_it(name, getpid(), "getfilecon FAILED", tabname, 0);
getpid            555 src/security.c 			log_it(name, getpid(),
getpid            567 src/security.c 			log_it(name, getpid(), msg, tabname, 0);
getpid            570 src/security.c 			log_it(name, getpid(), "Unauthorized SELinux context", tabname, 0);
getpid            578 src/security.c 			log_it(name, getpid(),
getpid            658 src/security.c 			log_it("CRON", getpid(),
getpid            670 src/security.c 			log_it("CRON", getpid(),
getpid             40 src/user.c     	log_it ("CRON", getpid (), msg, FileName, 0);
getpid             75 src/user.c     		log_it(uname, getpid (), "FAILED", "fdopen on crontab_fd in load_user",
getpid            140 src/user.c     		log_it(uname, getpid(), "FAILED", "loading cron table",