Lines Matching refs:pid

10252 				 uint64_t offset, int pid, size_t ref_ctr_off)  in perf_event_open_probe()  argument
10292 pid < 0 ? -1 : pid /* pid */, in perf_event_open_probe()
10293 pid == -1 ? 0 : -1 /* cpu */, in perf_event_open_probe()
10404 const char *kfunc_name, size_t offset, int pid) in perf_event_kprobe_open_legacy() argument
10433 pid < 0 ? -1 : pid, /* pid */ in perf_event_kprobe_open_legacy()
10434 pid == -1 ? 0 : -1, /* cpu */ in perf_event_kprobe_open_legacy()
11068 const char *binary_path, size_t offset, int pid) in perf_event_uprobe_open_legacy() argument
11094 pid < 0 ? -1 : pid, /* pid */ in perf_event_uprobe_open_legacy()
11095 pid == -1 ? 0 : -1, /* cpu */ in perf_event_uprobe_open_legacy()
11254 pid_t pid, in bpf_program__attach_uprobe_multi() argument
11336 if (pid == 0) in bpf_program__attach_uprobe_multi()
11337 pid = getpid(); in bpf_program__attach_uprobe_multi()
11338 if (pid > 0) in bpf_program__attach_uprobe_multi()
11339 lopts.uprobe_multi.pid = pid; in bpf_program__attach_uprobe_multi()
11367 bpf_program__attach_uprobe_opts(const struct bpf_program *prog, pid_t pid, in bpf_program__attach_uprobe_opts() argument
11449 func_offset, pid, ref_ctr_off); in bpf_program__attach_uprobe_opts()
11464 binary_path, func_offset, pid); in bpf_program__attach_uprobe_opts()
11558 bool retprobe, pid_t pid, in bpf_program__attach_uprobe() argument
11564 return bpf_program__attach_uprobe_opts(prog, pid, binary_path, func_offset, &opts); in bpf_program__attach_uprobe()
11568 pid_t pid, const char *binary_path, in bpf_program__attach_usdt() argument
11612 link = usdt_manager_attach_usdt(obj->usdt_man, prog, pid, binary_path, in bpf_program__attach_usdt()