BPF_ASSERT         79 sandbox/linux/seccomp-bpf/bpf_tests.h       BPF_ASSERT((proc_fd = open("/proc", O_RDONLY | O_DIRECTORY)) >= 0);
BPF_ASSERT         80 sandbox/linux/seccomp-bpf/bpf_tests.h       BPF_ASSERT(sandbox::SandboxBPF::SupportsSeccompSandbox(proc_fd) ==
BPF_ASSERT         96 sandbox/linux/seccomp-bpf/bpf_tests.h         BPF_ASSERT(seccomp_bpf_is_supported);
BPF_ASSERT         81 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(aux);
BPF_ASSERT        104 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(test_var == 0);
BPF_ASSERT        105 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(syscall(__NR_getpid) == 0);
BPF_ASSERT        106 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(test_var == 1);
BPF_ASSERT        107 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(syscall(__NR_getpid) == 1);
BPF_ASSERT        108 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(test_var == 2);
BPF_ASSERT        136 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_nanosleep, &ts, NULL) == -1);
BPF_ASSERT        137 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EACCES);
BPF_ASSERT        155 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getpid) > 0);
BPF_ASSERT        156 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 0);
BPF_ASSERT        159 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(getpgid(0) == -1);
BPF_ASSERT        160 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOMEM);
BPF_ASSERT        194 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getpid) > 0);
BPF_ASSERT        195 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 0);
BPF_ASSERT        200 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_nanosleep, &ts, NULL) == -1);
BPF_ASSERT        201 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOMEM);
BPF_ASSERT        204 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(BPF_AUX == kExpectedReturnValue);
BPF_ASSERT        242 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(pipe(fds) == 0);
BPF_ASSERT        243 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(pipe(fds + 2) == 0);
BPF_ASSERT        244 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(dup2(fds[2], fds[0]) == 0);
BPF_ASSERT        246 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(write(fds[1], "\x55", 1) == 1);
BPF_ASSERT        247 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(write(fds[3], "\xAA", 1) == 1);
BPF_ASSERT        248 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(read(fds[0], buf, 1) == 1);
BPF_ASSERT        252 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(buf[0] == '\x55');
BPF_ASSERT        256 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(setuid(0) == -1);
BPF_ASSERT        257 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 1);
BPF_ASSERT        264 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(setgid(0) == -ErrorCode::ERR_MAX_ERRNO);
BPF_ASSERT        265 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(errno == 0);
BPF_ASSERT        268 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(setgid(0) == -1);
BPF_ASSERT        269 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(errno == ErrorCode::ERR_MAX_ERRNO);
BPF_ASSERT        275 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(uname(&uts_buf) == -1);
BPF_ASSERT        276 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 42);
BPF_ASSERT        319 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getppid, 0) > 0);
BPF_ASSERT        320 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 0);
BPF_ASSERT        322 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getppid, 1) == -1);
BPF_ASSERT        323 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        332 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getppid, 0) == -1);
BPF_ASSERT        333 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EINVAL);
BPF_ASSERT        335 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getppid, 1) == -1);
BPF_ASSERT        336 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        379 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(std::numeric_limits<int>::max() - kExpectedReturnValue - 1 >=
BPF_ASSERT        390 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(syscall(syscall_number) == -1);
BPF_ASSERT        391 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(errno == SysnoToRandomErrno(syscall_number));
BPF_ASSERT        431 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(syscall(syscall_number) == -1);
BPF_ASSERT        432 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(errno == ArmPrivateSysnoToErrno(syscall_number));
BPF_ASSERT        443 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getpid) > 1);
BPF_ASSERT        484 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_getpid) == -1);
BPF_ASSERT        485 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        486 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(BPF_AUX == 0);
BPF_ASSERT        487 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(syscall(__NR_geteuid) == syscall(__NR_getuid));
BPF_ASSERT        488 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(BPF_AUX == 2);
BPF_ASSERT        490 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!syscall(__NR_prctl,
BPF_ASSERT        496 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(BPF_AUX == 3);
BPF_ASSERT        497 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(*name);
BPF_ASSERT        541 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(
BPF_ASSERT        545 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(
BPF_ASSERT        550 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!syscall(__NR_prctl,
BPF_ASSERT        556 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(*name);
BPF_ASSERT        561 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!uname(&uts));
BPF_ASSERT        562 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!strcmp(uts.sysname, "Linux"));
BPF_ASSERT        596 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(write(bus_handler_fd_, "\x55", 1) == 1);
BPF_ASSERT        608 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(pipe(fds) == 0);
BPF_ASSERT        613 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(sigaction(SIGBUS, &sa, NULL) == 0);
BPF_ASSERT        616 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(read(fds[0], &c, 1) == 1);
BPF_ASSERT        617 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(close(fds[0]) == 0);
BPF_ASSERT        618 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(close(fds[1]) == 0);
BPF_ASSERT        619 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(c == 0x55);
BPF_ASSERT        638 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, &mask1));
BPF_ASSERT        639 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!sigismember(&mask1, SIGUSR2));
BPF_ASSERT        644 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, NULL));
BPF_ASSERT        645 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!sigprocmask(SIG_BLOCK, NULL, &mask2));
BPF_ASSERT        646 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(sigismember(&mask2, SIGUSR2));
BPF_ASSERT        660 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(close(-1) == -1);
BPF_ASSERT        661 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EBADF);
BPF_ASSERT        670 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxBPF::ForwardSyscall(args) == -EBADF);
BPF_ASSERT        671 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == 0);
BPF_ASSERT        687 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(broker_process() != NULL);
BPF_ASSERT        688 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(broker_process_->Init(base::Bind(&NoOpCallback)));
BPF_ASSERT        703 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(aux);
BPF_ASSERT        715 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc       BPF_ASSERT(static_cast<int>(args.args[0]) == AT_FDCWD);
BPF_ASSERT        719 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc       BPF_ASSERT(false);
BPF_ASSERT        749 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(BPF_AUX.initialized());
BPF_ASSERT        751 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(broker_process != NULL);
BPF_ASSERT        754 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(broker_process->Open("/proc/denied", O_RDONLY) == -EPERM);
BPF_ASSERT        755 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(broker_process->Access("/proc/denied", R_OK) == -EPERM);
BPF_ASSERT        756 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(broker_process->Open("/proc/allowed", O_RDONLY) == -ENOENT);
BPF_ASSERT        757 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(broker_process->Access("/proc/allowed", R_OK) == -ENOENT);
BPF_ASSERT        760 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(open("/proc/denied", O_RDONLY) == -1);
BPF_ASSERT        761 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        763 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(open("/proc/allowed", O_RDONLY) == -1);
BPF_ASSERT        764 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOENT);
BPF_ASSERT        768 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(openat(AT_FDCWD, "/proc/denied", O_RDONLY) == -1);
BPF_ASSERT        769 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        771 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(openat(AT_FDCWD, "/proc/allowed", O_RDONLY) == -1);
BPF_ASSERT        772 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOENT);
BPF_ASSERT        775 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(access("/proc/denied", R_OK) == -1);
BPF_ASSERT        776 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EPERM);
BPF_ASSERT        778 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(access("/proc/allowed", R_OK) == -1);
BPF_ASSERT        779 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOENT);
BPF_ASSERT        783 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(cpu_info_access == 0);
BPF_ASSERT        785 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(cpu_info_fd >= 0);
BPF_ASSERT        787 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(read(cpu_info_fd, buf, sizeof(buf)) > 0);
BPF_ASSERT        832 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT((fd = open("/proc/self/comm", O_RDWR)) == -1);
BPF_ASSERT        833 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == EROFS);
BPF_ASSERT        834 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT((fd = open("/proc/self/comm", O_RDONLY)) >= 0);
BPF_ASSERT        838 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT((ret = prctl(PR_GET_DUMPABLE)) >= 0);
BPF_ASSERT        839 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(prctl(PR_SET_DUMPABLE, 1 - ret) == 0);
BPF_ASSERT        840 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(prctl(PR_GET_ENDIAN, &ret) == -1);
BPF_ASSERT        841 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(errno == ENOMEM);
BPF_ASSERT       1127 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc     BPF_ASSERT(
BPF_ASSERT       1192 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0x55555555) == -1);
BPF_ASSERT       1193 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0xAAAAAAAA) == -2);
BPF_ASSERT       1198 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555AAAAAAAAULL) == -1);
BPF_ASSERT       1199 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555500000000ULL) == -2);
BPF_ASSERT       1200 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555511111111ULL) == -2);
BPF_ASSERT       1201 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x11111111AAAAAAAAULL) == -2);
BPF_ASSERT       1203 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555) == -2);
BPF_ASSERT       1240 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF) == -1);
BPF_ASSERT       1241 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, -1) == -1);
BPF_ASSERT       1242 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, -1LL) == -1);
BPF_ASSERT       1253 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF00000000LL) == -1);
BPF_ASSERT       1335 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname, (testcase), (arg)) == (expected_value))
BPF_ASSERT       1751 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_create(&thread, NULL, ThreadFnc, &thread_ran));
BPF_ASSERT       1752 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_join(thread, NULL));
BPF_ASSERT       1753 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(thread_ran);
BPF_ASSERT       1758 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_attr_init(&attr));
BPF_ASSERT       1759 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED));
BPF_ASSERT       1760 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_create(&thread, &attr, ThreadFnc, &thread_ran));
BPF_ASSERT       1761 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(!pthread_attr_destroy(&attr));
BPF_ASSERT       1765 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(thread_ran);
BPF_ASSERT       1773 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_clone,
BPF_ASSERT         76 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(arraysize(args.args) == 6);
BPF_ASSERT        110 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(SandboxSyscall(__NR_uname,
BPF_ASSERT        119 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX.size() == 6);
BPF_ASSERT        124 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[0] == static_cast<uint64_t>(syscall_args[0]));
BPF_ASSERT        125 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[1] == static_cast<uint64_t>(syscall_args[1]));
BPF_ASSERT        126 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[2] == static_cast<uint64_t>(syscall_args[2]));
BPF_ASSERT        127 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[3] == static_cast<uint64_t>(syscall_args[3]));
BPF_ASSERT        128 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[4] == static_cast<uint64_t>(syscall_args[4]));
BPF_ASSERT        129 sandbox/linux/seccomp-bpf/syscall_unittest.cc   BPF_ASSERT(BPF_AUX[5] == static_cast<uint64_t>(syscall_args[5]));