ASSERT_LT
ASSERT_LT(rgn_end, max_addr);
ASSERT_LT(rgn_end, max_addr);
ASSERT_LT(rgn_end, max_addr);
ASSERT_LT(utimer_fd, 0);
ASSERT_LT(ioctl(timer_dev_fd, SNDRV_TIMER_IOCTL_CREATE, NULL), 0);
if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid key size"))
if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid value size 0"))
if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid value too large"))
if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid max entries size"))
if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid flags"))
if (!ASSERT_LT(start, 16, "read"))
ASSERT_LT(err, 0, "bpf_prog_get_fd_by_id");
ASSERT_LT(err, 0, "bpf_map_get_fd_by_id");
ASSERT_LT(err, 0, "bpf_map_get_fd_by_id");
if (!ASSERT_LT(id, nr_base_types, "verify_base_type"))
ASSERT_LT(skel->bss->mss, USHRT_MAX,
if (!ASSERT_LT(link_fd, 0, "fentry_attach_link"))
if (!ASSERT_LT(link_fd, 0, "fexit_attach_link"))
ASSERT_LT(err, 0, "failed_upath_small");
ASSERT_LT(skel->bss->cpu, num_cpus, "num_cpus");
ASSERT_LT(err, 0, "getxattr size bar should fail");
ASSERT_LT(skel->bss->wasted_entries, 10, "check_wasted_entries");
if (!ASSERT_LT(fd, 0, "bpf_map_get_fd_by_id"))
if (!ASSERT_LT(fd, 0, "bpf_map_get_fd_by_id_opts"))
if (!ASSERT_LT(ret, 0, "bpf_map_update_elem"))
ASSERT_LT(fd, 0, "bad_fd");
ASSERT_LT(fd, 0, "bad_fd");
ASSERT_LT(ret, 0, "bpf_prog_get_next_id");
if (!ASSERT_LT(ret, 0, "bpf_prog_get_next_id"))
if (!ASSERT_LT(ret, 0, "bpf_prog_get_next_id"))
ASSERT_LT(fd, 0, "socket(AF_UNIX)");
ASSERT_LT(socket(AF_PACKET, SOCK_RAW, htons(ETH_P_ALL)), 0,
ASSERT_LT(bind(fd, (struct sockaddr *)&sa, sizeof(sa)), 0,
ASSERT_LT(skel->bss->err, 0, "map_push_when_full");
ASSERT_LT(skel->bss->err, 0, "map_peek_when_empty");
ASSERT_LT(skel->bss->err, 0, "map_pop_when_empty");
ASSERT_LT(skel->bss->err, 0, "map_for_each_with_flags");
ASSERT_LT(skel->bss->err, 0, "map_update_existing");
ASSERT_LT(skel->bss->err, 0, "map_delete_non_existing");
ASSERT_LT(cur_ns - prev_ns, delay_tolerance_nsec, "latency");
if (!ASSERT_LT(get_time_ns(), timeout_time_ns, "run_cnt_timeout"))
ASSERT_LT(MIN_SYM_RET, skel->bss->sym_ret, "sym_ret");
if (!ASSERT_LT(n, 0, "client_send on destroyed socket"))
if (!ASSERT_LT(n, 0, "client_send on destroyed socket"))
if (!ASSERT_LT(n, 0, "client_send on destroyed socket"))
if (!ASSERT_LT(cnt, PERF_MAX_STACK_DEPTH, "check_max"))
ASSERT_LT(bpf_prog_stream_read(0, BPF_STREAM_STDOUT, buf, sizeof(buf), &ropts), 0, "error");
ASSERT_LT(bpf_prog_stream_read(prog_fd, 0, buf, sizeof(buf), &ropts), 0, "error");
ASSERT_LT(bpf_prog_stream_read(prog_fd, BPF_STREAM_STDOUT, NULL, sizeof(buf), NULL), 0, "error");
ASSERT_LT(skel->bss->callback_success, skel->bss->callback_scheduled, "callbacks");
ASSERT_LT(now_ns - pkt_ns, 5 * NSEC_PER_SEC,
ASSERT_LT(bpf_program__fd(skel->progs.test_1_turn_off), 0, "prog_fd");
if (!ASSERT_LT(map_fd, 0, "stack_map_wo_token_wo_cap_bpf_should_fail")) {
if (!ASSERT_LT(map_fd, 0, "stack_map_w_token_wo_cap_bpf_should_fail")) {
if (!ASSERT_LT(map_fd, 0, "stack_map_wo_token_w_cap_bpf_should_fail")) {
if (!ASSERT_LT(btf_fd, 0, "no_token_no_cap_should_fail"))
if (!ASSERT_LT(btf_fd, 0, "token_no_cap_should_fail"))
if (!ASSERT_LT(bss->null_data_vprintk_ret, 0, "bss->null_data_vprintk_ret"))
if (!ASSERT_LT(fd2, 0, "socket(fd2)"))
ASSERT_LT(ips[i], t->stop, "addr_stop");
if (!ASSERT_LT(c_max_entries, total_samples, "compare_c_max_entries"))
if (!ASSERT_LT(prog_fd, 0, tag)) {
ASSERT_LT(fd, 0, "btf_load_failure");
if (!ASSERT_LT(ret, 0, "bpf_map_update_elem data_input"))
if (!ASSERT_LT(ret, 0, "bpf_map_update_elem data_input"))
if (!ASSERT_LT(ret, 0, "bpf_map_update_elem data_input"))
if (!ASSERT_LT(ret, 0, "bpf_map_update_elem data_input"))
ASSERT_LT(ret, 0, "bpf_map_update_elem data_input");
if (!ASSERT_LT(ret, 0, name))
if (!ASSERT_LT(ret, 0, "prog load failed")) {
ASSERT_LT(diff, NPACKETS/2,
if (!ASSERT_LT(prog_id, buf + size, "find prog id begin"))
if (!ASSERT_LT(prog_id_end, buf + size, "find prog id end"))
ASSERT_LT(ret, sizeof(self->original_core_pattern));
ASSERT_LT(ret, sizeof(self->original_core_pattern));
ASSERT_LT(ret, sizeof(buf));
ASSERT_LT(0, ret);
ASSERT_LT(ret, sizeof(self->original_core_pattern));
ASSERT_LT(procfd_path_size, sizeof(procfd_path));
ASSERT_LT(fchown(fd_context, 1234, 5678), 0);
ASSERT_LT(fchmod(fd_context, 0777), 0);
ASSERT_LT(execveat(fd_context, "", empty_argv, empty_envp, AT_EMPTY_PATH), 0);
ASSERT_LT(open("/proc/self/fd/500", 0), 0);
ASSERT_LT(fgetxattr(fd, "user.foo", buf, sizeof(buf)), 0);
ASSERT_LT(self->fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(list[cur], list[cur + 1]);
ASSERT_LT(err, 0) TH_LOG("unexpected success while reading HIDIOCGFEATURE: %d", err);
ASSERT_LT(err, 0) TH_LOG("unexpected success while sending hid_hw_output_report: %d", err);
ASSERT_LT(err, 0) TH_LOG("unexpected success while writing to hidraw node: %d", err);
ASSERT_LT(err, 0) TH_LOG("HIDIOCGFEATURE should have failed with invalid report ID");
ASSERT_LT(err, 0) TH_LOG("ioctl read-write with wrong _IOC_NR (0) should have failed");
ASSERT_LT(err, 0) TH_LOG("ioctl read-only with wrong _IOC_NR (0) should have failed");
ASSERT_LT(err, 0) TH_LOG("ioctl read-only with wrong _IOC_NR (0x42) should have failed");
ASSERT_LT(err, 0) TH_LOG("ioctl read-write with wrong _IOC_NR (0x42) should have failed");
ASSERT_LT(err, 0) TH_LOG("ioctl with wrong _IOC_TYPE (I) should have failed");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGFEATURE with wrong _IOC_DIR should have failed");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGFEATURE with wrong _IOC_DIR should have failed");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGRAWNAME with wrong _IOC_DIR should have failed");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGRAWNAME with wrong _IOC_DIR should have failed");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGINPUT should have failed with invalid report ID");
ASSERT_LT(err, 0) TH_LOG("HIDIOCGOUTPUT should have failed with invalid report ID");
ASSERT_LT(sizeof(*info_cmd), info_cmd->argsz);
ASSERT_LT(1, res);
ASSERT_LT(procfd_path_size, sizeof(procfd_path));
ASSERT_LT(0, stdinbak_fd);
ASSERT_LT(sys_open_tree_attr(open_tree_fd, "", AT_EMPTY_PATH, &attr, sizeof(attr)), 0);
ASSERT_LT(sys_open_tree_attr(open_tree_fd, "", AT_EMPTY_PATH, &attr, sizeof(attr)), 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd_tree_subdir, 0);
ASSERT_LT(fd_tree_subdir, 0);
ASSERT_LT(fd_tree_subdir, 0);
ASSERT_LT(sys_mount_setattr(-1, "/mnt/A", AT_RECURSIVE, &attr, sizeof(attr)), 0);
ASSERT_LT(sys_mount_setattr(-1, "/mnt/A", AT_RECURSIVE, &attr, sizeof(attr)), 0);
ASSERT_LT(ret, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(p_fd, 0);
ASSERT_LT(u_fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(ua_fd, 0);
ASSERT_LT(p_fd, 0);
ASSERT_LT(ua_fd, 0);
ASSERT_LT(u_fd, 0);
ASSERT_LT(nsfd, 0);
ASSERT_LT(nsfd, 0);
ASSERT_LT(user_fd, 0);
ASSERT_LT(net_fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(fd2, 0);
ASSERT_LT(parent_fd, 0);
ASSERT_LT(fd, 0);
ASSERT_LT(reopened_fd, 0);
ASSERT_LT(ioctl(sock_fd, SIOCGSKNS), 0);
ASSERT_LT(ioctl(fd, SIOCGSKNS), 0);
ASSERT_LT(ioctl(pipefd[0], SIOCGSKNS), 0);
ASSERT_LT(reopened_fd, 0);
ASSERT_LT(0, self->client);
ASSERT_LT(-1, self->child);
ASSERT_LT(-1, self->child);
ASSERT_LT(-1, self->server);
ASSERT_LT(-1, self->client);
ASSERT_LT(pid, 0);
ASSERT_LT(pidfd, 0);
ASSERT_LT(pidfd, 0) {
ASSERT_LT(pidfd, 0);
ASSERT_LT(pidfd, 0);
ASSERT_LT(pidfd_thread, 0);
ASSERT_LT(fchown(self->child_pidfd, 1234, 5678), 0);
ASSERT_LT(fchmod(self->child_pidfd, 0777), 0);
ASSERT_LT(execveat(self->child_pidfd, "", argv, envp, AT_EMPTY_PATH), 0);
ASSERT_LT(ret, 0);
ASSERT_LT(ret, 0);
ASSERT_LT(0, (rc = sys_ptrace(PTRACE_GET_SYSCALL_INFO,
ASSERT_LT(0, (rc = sys_ptrace(PTRACE_GET_SYSCALL_INFO,
ASSERT_LT(ptrace_stop, ARRAY_SIZE(si) * 2) {
ASSERT_LT(0, ptrace_stop) {
ASSERT_LT(0, (rc = sys_ptrace(PTRACE_GET_SYSCALL_INFO,
ASSERT_LT(0, (rc = sys_ptrace(PTRACE_GET_SYSCALL_INFO,
ASSERT_LT(0, (rc = sys_ptrace(PTRACE_GET_SYSCALL_INFO,
ASSERT_LT(0, page_size);
ASSERT_LT(0, devfd);