Lines Matching defs:pid
10708 uint64_t offset, int pid, size_t ref_ctr_off)
10746 /* pid filter is meaningful only for uprobes */
10748 pid < 0 ? -1 : pid /* pid */,
10749 pid == -1 ? 0 : -1 /* cpu */,
10860 const char *kfunc_name, size_t offset, int pid)
10889 pid < 0 ? -1 : pid, /* pid */
10890 pid == -1 ? 0 : -1, /* cpu */
11010 -1 /* pid */, 0 /* ref_ctr_off */);
11022 offset, -1 /* pid */);
11524 const char *binary_path, size_t offset, int pid)
11550 pid < 0 ? -1 : pid, /* pid */
11551 pid == -1 ? 0 : -1, /* cpu */
11720 pid_t pid,
11748 * 1) use only path/func_pattern/pid arguments
11750 * 2) use path/pid with allowed combinations of:
11802 if (pid == 0)
11803 pid = getpid();
11804 if (pid > 0)
11805 lopts.uprobe_multi.pid = pid;
11833 bpf_program__attach_uprobe_opts(const struct bpf_program *prog, pid_t pid,
11915 func_offset, pid, ref_ctr_off);
11930 binary_path, func_offset, pid);
12034 bool retprobe, pid_t pid,
12040 return bpf_program__attach_uprobe_opts(prog, pid, binary_path, func_offset, &opts);
12045 pid_t pid, const char *binary_path,
12089 link = usdt_manager_attach_usdt(obj->usdt_man, prog, pid, binary_path,
12168 pfd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, 0 /* cpu */,
12906 cpu_buf->fd = syscall(__NR_perf_event_open, attr, -1 /* pid */, cpu,