BPF_ASSERT 79 sandbox/linux/seccomp-bpf/bpf_tests.h BPF_ASSERT((proc_fd = open("/proc", O_RDONLY | O_DIRECTORY)) >= 0); BPF_ASSERT 80 sandbox/linux/seccomp-bpf/bpf_tests.h BPF_ASSERT(sandbox::SandboxBPF::SupportsSeccompSandbox(proc_fd) == BPF_ASSERT 96 sandbox/linux/seccomp-bpf/bpf_tests.h BPF_ASSERT(seccomp_bpf_is_supported); BPF_ASSERT 81 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(aux); BPF_ASSERT 104 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(test_var == 0); BPF_ASSERT 105 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) == 0); BPF_ASSERT 106 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(test_var == 1); BPF_ASSERT 107 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) == 1); BPF_ASSERT 108 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(test_var == 2); BPF_ASSERT 136 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_nanosleep, &ts, NULL) == -1); BPF_ASSERT 137 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EACCES); BPF_ASSERT 155 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) > 0); BPF_ASSERT 156 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 0); BPF_ASSERT 159 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(getpgid(0) == -1); BPF_ASSERT 160 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOMEM); BPF_ASSERT 194 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) > 0); BPF_ASSERT 195 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 0); BPF_ASSERT 200 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_nanosleep, &ts, NULL) == -1); BPF_ASSERT 201 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOMEM); BPF_ASSERT 204 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(BPF_AUX == kExpectedReturnValue); BPF_ASSERT 242 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(pipe(fds) == 0); BPF_ASSERT 243 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(pipe(fds + 2) == 0); BPF_ASSERT 244 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(dup2(fds[2], fds[0]) == 0); BPF_ASSERT 246 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(write(fds[1], "\x55", 1) == 1); BPF_ASSERT 247 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(write(fds[3], "\xAA", 1) == 1); BPF_ASSERT 248 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(read(fds[0], buf, 1) == 1); BPF_ASSERT 252 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(buf[0] == '\x55'); BPF_ASSERT 256 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(setuid(0) == -1); BPF_ASSERT 257 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 1); BPF_ASSERT 264 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(setgid(0) == -ErrorCode::ERR_MAX_ERRNO); BPF_ASSERT 265 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 0); BPF_ASSERT 268 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(setgid(0) == -1); BPF_ASSERT 269 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ErrorCode::ERR_MAX_ERRNO); BPF_ASSERT 275 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(uname(&uts_buf) == -1); BPF_ASSERT 276 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 42); BPF_ASSERT 319 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getppid, 0) > 0); BPF_ASSERT 320 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 0); BPF_ASSERT 322 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getppid, 1) == -1); BPF_ASSERT 323 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 332 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getppid, 0) == -1); BPF_ASSERT 333 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EINVAL); BPF_ASSERT 335 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getppid, 1) == -1); BPF_ASSERT 336 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 379 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(std::numeric_limits<int>::max() - kExpectedReturnValue - 1 >= BPF_ASSERT 390 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(syscall_number) == -1); BPF_ASSERT 391 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == SysnoToRandomErrno(syscall_number)); BPF_ASSERT 431 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(syscall_number) == -1); BPF_ASSERT 432 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ArmPrivateSysnoToErrno(syscall_number)); BPF_ASSERT 443 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) > 1); BPF_ASSERT 484 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_getpid) == -1); BPF_ASSERT 485 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 486 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(BPF_AUX == 0); BPF_ASSERT 487 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(syscall(__NR_geteuid) == syscall(__NR_getuid)); BPF_ASSERT 488 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(BPF_AUX == 2); BPF_ASSERT 490 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!syscall(__NR_prctl, BPF_ASSERT 496 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(BPF_AUX == 3); BPF_ASSERT 497 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(*name); BPF_ASSERT 541 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT( BPF_ASSERT 545 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT( BPF_ASSERT 550 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!syscall(__NR_prctl, BPF_ASSERT 556 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(*name); BPF_ASSERT 561 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!uname(&uts)); BPF_ASSERT 562 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!strcmp(uts.sysname, "Linux")); BPF_ASSERT 596 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(write(bus_handler_fd_, "\x55", 1) == 1); BPF_ASSERT 608 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(pipe(fds) == 0); BPF_ASSERT 613 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(sigaction(SIGBUS, &sa, NULL) == 0); BPF_ASSERT 616 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(read(fds[0], &c, 1) == 1); BPF_ASSERT 617 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(close(fds[0]) == 0); BPF_ASSERT 618 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(close(fds[1]) == 0); BPF_ASSERT 619 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(c == 0x55); BPF_ASSERT 638 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, &mask1)); BPF_ASSERT 639 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!sigismember(&mask1, SIGUSR2)); BPF_ASSERT 644 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, NULL)); BPF_ASSERT 645 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!sigprocmask(SIG_BLOCK, NULL, &mask2)); BPF_ASSERT 646 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(sigismember(&mask2, SIGUSR2)); BPF_ASSERT 660 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(close(-1) == -1); BPF_ASSERT 661 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EBADF); BPF_ASSERT 670 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxBPF::ForwardSyscall(args) == -EBADF); BPF_ASSERT 671 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == 0); BPF_ASSERT 687 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process() != NULL); BPF_ASSERT 688 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process_->Init(base::Bind(&NoOpCallback))); BPF_ASSERT 703 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(aux); BPF_ASSERT 715 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(static_cast<int>(args.args[0]) == AT_FDCWD); BPF_ASSERT 719 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(false); BPF_ASSERT 749 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(BPF_AUX.initialized()); BPF_ASSERT 751 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process != NULL); BPF_ASSERT 754 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process->Open("/proc/denied", O_RDONLY) == -EPERM); BPF_ASSERT 755 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process->Access("/proc/denied", R_OK) == -EPERM); BPF_ASSERT 756 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process->Open("/proc/allowed", O_RDONLY) == -ENOENT); BPF_ASSERT 757 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(broker_process->Access("/proc/allowed", R_OK) == -ENOENT); BPF_ASSERT 760 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(open("/proc/denied", O_RDONLY) == -1); BPF_ASSERT 761 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 763 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(open("/proc/allowed", O_RDONLY) == -1); BPF_ASSERT 764 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOENT); BPF_ASSERT 768 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(openat(AT_FDCWD, "/proc/denied", O_RDONLY) == -1); BPF_ASSERT 769 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 771 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(openat(AT_FDCWD, "/proc/allowed", O_RDONLY) == -1); BPF_ASSERT 772 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOENT); BPF_ASSERT 775 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(access("/proc/denied", R_OK) == -1); BPF_ASSERT 776 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EPERM); BPF_ASSERT 778 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(access("/proc/allowed", R_OK) == -1); BPF_ASSERT 779 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOENT); BPF_ASSERT 783 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(cpu_info_access == 0); BPF_ASSERT 785 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(cpu_info_fd >= 0); BPF_ASSERT 787 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(read(cpu_info_fd, buf, sizeof(buf)) > 0); BPF_ASSERT 832 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT((fd = open("/proc/self/comm", O_RDWR)) == -1); BPF_ASSERT 833 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == EROFS); BPF_ASSERT 834 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT((fd = open("/proc/self/comm", O_RDONLY)) >= 0); BPF_ASSERT 838 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT((ret = prctl(PR_GET_DUMPABLE)) >= 0); BPF_ASSERT 839 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(prctl(PR_SET_DUMPABLE, 1 - ret) == 0); BPF_ASSERT 840 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(prctl(PR_GET_ENDIAN, &ret) == -1); BPF_ASSERT 841 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(errno == ENOMEM); BPF_ASSERT 1127 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT( BPF_ASSERT 1192 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0x55555555) == -1); BPF_ASSERT 1193 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0xAAAAAAAA) == -2); BPF_ASSERT 1198 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555AAAAAAAAULL) == -1); BPF_ASSERT 1199 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555500000000ULL) == -2); BPF_ASSERT 1200 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555511111111ULL) == -2); BPF_ASSERT 1201 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x11111111AAAAAAAAULL) == -2); BPF_ASSERT 1203 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555) == -2); BPF_ASSERT 1240 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF) == -1); BPF_ASSERT 1241 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, -1) == -1); BPF_ASSERT 1242 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, -1LL) == -1); BPF_ASSERT 1253 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF00000000LL) == -1); BPF_ASSERT 1335 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, (testcase), (arg)) == (expected_value)) BPF_ASSERT 1751 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_create(&thread, NULL, ThreadFnc, &thread_ran)); BPF_ASSERT 1752 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_join(thread, NULL)); BPF_ASSERT 1753 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(thread_ran); BPF_ASSERT 1758 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_attr_init(&attr)); BPF_ASSERT 1759 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED)); BPF_ASSERT 1760 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_create(&thread, &attr, ThreadFnc, &thread_ran)); BPF_ASSERT 1761 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(!pthread_attr_destroy(&attr)); BPF_ASSERT 1765 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(thread_ran); BPF_ASSERT 1773 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_clone, BPF_ASSERT 76 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(arraysize(args.args) == 6); BPF_ASSERT 110 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(SandboxSyscall(__NR_uname, BPF_ASSERT 119 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX.size() == 6); BPF_ASSERT 124 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[0] == static_cast<uint64_t>(syscall_args[0])); BPF_ASSERT 125 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[1] == static_cast<uint64_t>(syscall_args[1])); BPF_ASSERT 126 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[2] == static_cast<uint64_t>(syscall_args[2])); BPF_ASSERT 127 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[3] == static_cast<uint64_t>(syscall_args[3])); BPF_ASSERT 128 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[4] == static_cast<uint64_t>(syscall_args[4])); BPF_ASSERT 129 sandbox/linux/seccomp-bpf/syscall_unittest.cc BPF_ASSERT(BPF_AUX[5] == static_cast<uint64_t>(syscall_args[5]));