bpf_program__attach_usdt
*link = bpf_program__attach_usdt(prog, -1 /* any process */, path,
bpf_program__attach_usdt(const struct bpf_program *prog,
skel->links.usdt0 = bpf_program__attach_usdt(skel->progs.usdt0, -1, "./uprobe_multi",
skel->links.usdt_pid = bpf_program__attach_usdt(skel->progs.usdt_pid, pid, binary,
skel->links.usdt_extra = bpf_program__attach_usdt(skel->progs.usdt_extra, -1, binary,
link = bpf_program__attach_usdt(skel->progs.test_usdt,
skel->links.usdt0 = bpf_program__attach_usdt(skel->progs.usdt0,
skel->links.usdt_sib = bpf_program__attach_usdt(skel->progs.usdt_sib,
skel->links.usdt3 = bpf_program__attach_usdt(skel->progs.usdt3, -1 /* any pid */,
skel->links.usdt_100 = bpf_program__attach_usdt(skel->progs.usdt_100, -1,
skel->links.usdt_100 = bpf_program__attach_usdt(skel->progs.usdt_100, -1, "/proc/self/exe",
skel->links.usdt_100 = bpf_program__attach_usdt(skel->progs.usdt_100, -1,
l = bpf_program__attach_usdt(skel->progs.urand_read_without_sema,
l = bpf_program__attach_usdt(skel->progs.urand_read_with_sema,
l = bpf_program__attach_usdt(skel->progs.urandlib_read_without_sema,
l = bpf_program__attach_usdt(skel->progs.urandlib_read_with_sema,