if (packet.v5_packet.pid > 0) {
_cleanup_free_ char *p = NULL;
- get_process_comm(packet.v5_packet.pid, &p);
+ (void) get_process_comm(packet.v5_packet.pid, &p);
log_unit_info(UNIT(a), "Got automount request for %s, triggered by %"PRIu32" (%s)", a->where, packet.v5_packet.pid, strna(p));
} else
log_unit_debug(UNIT(a), "Got direct mount request on %s", a->where);
if (sig == SIGKILL) {
_cleanup_free_ char *s = NULL;
- get_process_comm(pid, &s);
+ (void) get_process_comm(pid, &s);
log_notice("Sending SIGKILL to PID "PID_FMT" (%s).", pid, strna(s));
}
/* Second: identifier and PID */
if (ucred) {
if (!identifier) {
- get_process_comm(ucred->pid, &ident_buf);
+ (void) get_process_comm(ucred->pid, &ident_buf);
identifier = ident_buf;
}
/* Second: identifier and PID */
if (ucred) {
if (!identifier) {
- get_process_comm(ucred->pid, &ident_buf);
+ (void) get_process_comm(ucred->pid, &ident_buf);
identifier = ident_buf;
}
/* Third: identifier and PID */
if (ucred) {
if (!identifier) {
- get_process_comm(ucred->pid, &ident_buf);
+ (void) get_process_comm(ucred->pid, &ident_buf);
identifier = ident_buf;
}
if (ucred) {
if (!identifier) {
- get_process_comm(ucred->pid, &ident_buf);
+ (void) get_process_comm(ucred->pid, &ident_buf);
identifier = ident_buf;
}
printf("\t Leader: %"PRIu32, i.leader);
- get_process_comm(i.leader, &t);
+ (void) get_process_comm(i.leader, &t);
if (t)
printf(" (%s)", t);
ACTION_KEXEC) ? "shutdown" : "sleep"))
continue;
- get_process_comm(pid, &comm);
+ (void) get_process_comm(pid, &comm);
user = uid_to_name(uid);
log_warning("Operation inhibited by \"%s\" (PID "PID_FMT" \"%s\", user %s), reason is \"%s\".",