root/tests/sys/netpfil/pf/ioctl/validation.c
/*-
 * Copyright (c) 2018   Kristof Provost <kp@FreeBSD.org>
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

#include <sys/param.h>
#include <sys/module.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/socket.h>

#include <net/if.h>
#include <net/pfvar.h>

#include <errno.h>
#include <fcntl.h>
#include <stdio.h>

#include <atf-c.h>

static int dev;

#define COMMON_HEAD() \
        dev = open("/dev/pf", O_RDWR); \
        if (dev == -1) \
                atf_tc_skip("Failed to open /dev/pf");

#define COMMON_CLEANUP() \
        close(dev);

static void
common_init_tbl(struct pfr_table *tbl)
{
        bzero(tbl, sizeof(struct pfr_table));
        strcpy(tbl->pfrt_anchor, "anchor");
        strcpy(tbl->pfrt_name, "name");
        tbl->pfrt_flags = 0;
        tbl->pfrt_fback = 0;
}

ATF_TC_WITH_CLEANUP(addtables);
ATF_TC_HEAD(addtables, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(addtables, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        struct pfr_table tbls[4];
        int flags;

        COMMON_HEAD();

        flags = 0;

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = sizeof(tbl);

        /* Negative size */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRADDTABLES, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRADDTABLES, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 succeeded");

        /* NULL buffer */
        io.pfrio_size = 1;
        io.pfrio_buffer = NULL;
        if (ioctl(dev, DIOCRADDTABLES, &io) == 0)
                atf_tc_fail("Request with NULL buffer succeeded");

        /* This can provoke a memory leak, see r331225. */
        io.pfrio_size = 4;
        for (int i = 0; i < io.pfrio_size; i++)
                common_init_tbl(&tbls[i]);

        io.pfrio_buffer = &tbls;
        ioctl(dev, DIOCRADDTABLES, &io);
}

ATF_TC_CLEANUP(addtables, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(deltables);
ATF_TC_HEAD(deltables, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(deltables, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        int flags;

        COMMON_HEAD();

        flags = 0;

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = sizeof(tbl);

        /* Negative size */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRDELTABLES, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRDELTABLES, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 succeeded");

        /* NULL buffer */
        io.pfrio_size = 1;
        io.pfrio_buffer = NULL;
        if (ioctl(dev, DIOCRDELTABLES, &io) == 0)
                atf_tc_fail("Request with NULL buffer succeeded");
}

ATF_TC_CLEANUP(deltables, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(gettables);
ATF_TC_HEAD(gettables, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(gettables, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        int flags;

        COMMON_HEAD();

        flags = 0;

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = sizeof(tbl);

        /* Negative size. This will succeed, because the kernel will not copy
         * tables than it has. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRGETTABLES, &io) != 0)
                atf_tc_fail("Request with size -1 failed");

        /* Overly large size. See above. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRGETTABLES, &io) != 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(gettables, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(clrtables);
ATF_TC_HEAD(clrtables, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(clrtables, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        int flags;

        COMMON_HEAD();

        flags = 0;

        memset(&io, '/', sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = 0;
        io.pfrio_size = 1;

        if (ioctl(dev, DIOCRCLRTABLES, &io) == 0)
                atf_tc_fail("Request with unterminated anchor name succeeded");
}

ATF_TC_CLEANUP(clrtables, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(gettstats);
ATF_TC_HEAD(gettstats, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(gettstats, tc)
{
        struct pfioc_table io;
        struct pfr_tstats stats;
        int flags;

        COMMON_HEAD();

        flags = 0;

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &stats;
        io.pfrio_esize = sizeof(stats);

        /* Negative size. This will succeed, because the kernel will not copy
         * tables than it has. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRGETTSTATS, &io) != 0)
                atf_tc_fail("Request with size -1 failed");

        /* Overly large size. See above. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRGETTSTATS, &io) != 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(gettstats, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(clrtstats);
ATF_TC_HEAD(clrtstats, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(clrtstats, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        int flags;

        COMMON_HEAD();

        flags = 0;

        common_init_tbl(&tbl);

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = sizeof(tbl);

        /* Negative size. This will succeed, because the kernel will not copy
         * tables than it has. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRCLRTSTATS, &io) != 0)
                atf_tc_fail("Request with size -1 failed ");

        /* Overly large size. See above. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRCLRTSTATS, &io) != 0)
                atf_tc_fail("Request with size 1 << 24 failed");

        io.pfrio_size = sizeof(tbl);
        io.pfrio_buffer = NULL;
        if (ioctl(dev, DIOCRCLRTSTATS, &io) == 0)
                atf_tc_fail("Request with NULL buffer succeeded");
}

ATF_TC_CLEANUP(clrtstats, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(settflags);
ATF_TC_HEAD(settflags, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(settflags, tc)
{
        struct pfioc_table io;
        struct pfr_table tbl;
        int flags;

        COMMON_HEAD();

        flags = 0;

        common_init_tbl(&tbl);

        bzero(&io, sizeof(io));
        io.pfrio_flags = flags;
        io.pfrio_buffer = &tbl;
        io.pfrio_esize = sizeof(tbl);

        /* Negative size. This will succeed, because the kernel will not copy
         * tables than it has. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRSETTFLAGS, &io) != 0)
                atf_tc_fail("Request with size -1 failed");

        /* Overly large size. See above. */
        io.pfrio_size = 1 << 28;
        if (ioctl(dev, DIOCRSETTFLAGS, &io) != 0)
                atf_tc_fail("Request with size 1 << 24 failed");

        /* NULL buffer */
        io.pfrio_buffer = NULL;
        if (ioctl(dev, DIOCRSETTFLAGS, &io) != -1)
                atf_tc_fail("Request with NULL buffer succeeded");
}

ATF_TC_CLEANUP(settflags, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(addaddrs);
ATF_TC_HEAD(addaddrs, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(addaddrs, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRADDADDRS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 28;
        if (ioctl(dev, DIOCRADDADDRS, &io) == 0)
                atf_tc_fail("Reuqest with size 1 << 28 failed");
}

ATF_TC_CLEANUP(addaddrs, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(deladdrs);
ATF_TC_HEAD(deladdrs, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(deladdrs, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRDELADDRS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 28;
        if (ioctl(dev, DIOCRDELADDRS, &io) == 0)
                atf_tc_fail("Reuqest with size 1 << 28 failed");
}

ATF_TC_CLEANUP(deladdrs, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(setaddrs);
ATF_TC_HEAD(setaddrs, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(setaddrs, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRSETADDRS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 28;
        if (ioctl(dev, DIOCRSETADDRS, &io) == 0)
                atf_tc_fail("Reuqest with size 1 << 28 failed");
}

ATF_TC_CLEANUP(setaddrs, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(getaddrs);
ATF_TC_HEAD(getaddrs, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(getaddrs, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        common_init_tbl(&io.pfrio_table);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRGETADDRS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRGETADDRS, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(getaddrs, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(getastats);
ATF_TC_HEAD(getastats, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(getastats, tc)
{
        struct pfioc_table io;
        struct pfr_astats astats;

        COMMON_HEAD();

        bzero(&astats, sizeof(astats));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &astats;
        io.pfrio_esize = sizeof(astats);

        common_init_tbl(&io.pfrio_table);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRGETASTATS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRGETASTATS, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(getastats, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(clrastats);
ATF_TC_HEAD(clrastats, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(clrastats, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        common_init_tbl(&io.pfrio_table);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRCLRASTATS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRCLRASTATS, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(clrastats, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(tstaddrs);
ATF_TC_HEAD(tstaddrs, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(tstaddrs, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        common_init_tbl(&io.pfrio_table);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRTSTADDRS, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRTSTADDRS, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(tstaddrs, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(inadefine);
ATF_TC_HEAD(inadefine, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(inadefine, tc)
{
        struct pfioc_table io;
        struct pfr_addr addr;

        COMMON_HEAD();

        bzero(&addr, sizeof(addr));
        bzero(&io, sizeof(io));
        io.pfrio_flags = 0;
        io.pfrio_buffer = &addr;
        io.pfrio_esize = sizeof(addr);

        common_init_tbl(&io.pfrio_table);

        /* Negative size. */
        io.pfrio_size = -1;
        if (ioctl(dev, DIOCRINADEFINE, &io) == 0)
                atf_tc_fail("Request with size -1 succeeded");

        /* Overly large size. */
        io.pfrio_size = 1 << 24;
        if (ioctl(dev, DIOCRINADEFINE, &io) == 0)
                atf_tc_fail("Request with size 1 << 24 failed");
}

ATF_TC_CLEANUP(inadefine, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(igetifaces);
ATF_TC_HEAD(igetifaces, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(igetifaces, tc)
{
        struct pfioc_iface io;
        struct pfi_kif kif;

        COMMON_HEAD();

        bzero(&io, sizeof(io));
        io.pfiio_flags = 0;
        io.pfiio_buffer = &kif;
        io.pfiio_esize = sizeof(kif);

        /* Negative size */
        io.pfiio_size = -1;
        if (ioctl(dev, DIOCIGETIFACES, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");

        /* Overflow size */
        io.pfiio_size = 1 << 31;
        if (ioctl(dev, DIOCIGETIFACES, &io) == 0)
                atf_tc_fail("request with size 1 << 31 succeeded");
}

ATF_TC_CLEANUP(igetifaces, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(cxbegin);
ATF_TC_HEAD(cxbegin, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(cxbegin, tc)
{
        struct pfioc_trans io;
        struct pfioc_trans_e ioe;

        COMMON_HEAD();

        bzero(&io, sizeof(io));
        io.esize = sizeof(ioe);
        io.array = &ioe;

        /* Negative size */
        io.size = -1;
        if (ioctl(dev, DIOCXBEGIN, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");

        /* Overflow size */
        io.size = 1 << 30;
        if (ioctl(dev, DIOCXBEGIN, &io) == 0)
                atf_tc_fail("request with size 1 << 30 succeeded");

        /* NULL buffer */
        io.size = 1;
        io.array = NULL;
        if (ioctl(dev, DIOCXBEGIN, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");
}

ATF_TC_CLEANUP(cxbegin, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(cxrollback);
ATF_TC_HEAD(cxrollback, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(cxrollback, tc)
{
        struct pfioc_trans io;
        struct pfioc_trans_e ioe;

        COMMON_HEAD();

        bzero(&io, sizeof(io));
        io.esize = sizeof(ioe);
        io.array = &ioe;

        /* Negative size */
        io.size = -1;
        if (ioctl(dev, DIOCXROLLBACK, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");

        /* Overflow size */
        io.size = 1 << 30;
        if (ioctl(dev, DIOCXROLLBACK, &io) == 0)
                atf_tc_fail("request with size 1 << 30 succeeded");

        /* NULL buffer */
        io.size = 1;
        io.array = NULL;
        if (ioctl(dev, DIOCXROLLBACK, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");
}

ATF_TC_CLEANUP(cxrollback, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(commit);
ATF_TC_HEAD(commit, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(commit, tc)
{
        struct pfioc_trans io;
        struct pfioc_trans_e ioe;

        COMMON_HEAD();

        bzero(&io, sizeof(io));
        io.esize = sizeof(ioe);
        io.array = &ioe;

        /* Negative size */
        io.size = -1;
        if (ioctl(dev, DIOCXCOMMIT, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");

        /* Overflow size */
        io.size = 1 << 30;
        if (ioctl(dev, DIOCXCOMMIT, &io) == 0)
                atf_tc_fail("request with size 1 << 30 succeeded");

        /* NULL buffer */
        io.size = 1;
        io.array = NULL;
        if (ioctl(dev, DIOCXCOMMIT, &io) == 0)
                atf_tc_fail("request with size -1 succeeded");
}

ATF_TC_CLEANUP(commit, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(getsrcnodes);
ATF_TC_HEAD(getsrcnodes, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(getsrcnodes, tc)
{
        struct pfioc_src_nodes psn;

        COMMON_HEAD();

        bzero(&psn, sizeof(psn));

        psn.psn_len = -1;
        if (ioctl(dev, DIOCGETSRCNODES, &psn) != 0)
                atf_tc_fail("request with size -1 failed");

        psn.psn_len = 1 << 30;
        if (ioctl(dev, DIOCGETSRCNODES, &psn) != 0)
                atf_tc_fail("request with size << 30 failed");

        psn.psn_len = 1 << 31;
        if (ioctl(dev, DIOCGETSRCNODES, &psn) != 0)
                atf_tc_fail("request with size << 30 failed");
}

ATF_TC_CLEANUP(getsrcnodes, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(tag);
ATF_TC_HEAD(tag, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(tag, tc)
{
        struct pfioc_rule rule;

        COMMON_HEAD();

        memset(&rule, 0x42, sizeof(rule));

        rule.ticket = 0;
        rule.pool_ticket = 0;
        rule.anchor[0] = 0;

        rule.rule.return_icmp = 0;
        bzero(&rule.rule.src, sizeof(rule.rule.src));
        bzero(&rule.rule.dst, sizeof(rule.rule.dst));

        rule.rule.ifname[0] = 0;
        rule.rule.action = 0;
        rule.rule.rtableid = 0;

        rule.rule.tagname[0] = 0;

        for (int i = 0; i < 10; i++)
                ioctl(dev, DIOCADDRULE, &rule);
}

ATF_TC_CLEANUP(tag, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(rpool_mtx);
ATF_TC_HEAD(rpool_mtx, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(rpool_mtx, tc)
{
        struct pfioc_rule rule;

        COMMON_HEAD();

        memset(&rule, 0, sizeof(rule));

        rule.ticket = 0;
        rule.pool_ticket = 0;
        rule.anchor[0] = 0;

        rule.rule.return_icmp = 0;
        bzero(&rule.rule.src, sizeof(rule.rule.src));
        bzero(&rule.rule.dst, sizeof(rule.rule.dst));

        rule.rule.ifname[0] = 0;
        rule.rule.action = 0;
        rule.rule.rtableid = 0;

        rule.rule.tagname[0] = 0;
        rule.rule.action = 42;

        ioctl(dev, DIOCADDRULE, &rule);
}

ATF_TC_CLEANUP(rpool_mtx, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(rpool_mtx2);
ATF_TC_HEAD(rpool_mtx2, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(rpool_mtx2, tc)
{
        struct pfioc_rule rule;

        COMMON_HEAD();

        memset(&rule, 0, sizeof(rule));

        rule.pool_ticket = 1000000;
        rule.action = PF_CHANGE_ADD_HEAD;
        rule.rule.af = AF_INET;

        ioctl(dev, DIOCCHANGERULE, &rule);
}

ATF_TC_CLEANUP(rpool_mtx2, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(natlook);
ATF_TC_HEAD(natlook, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pf");
}

ATF_TC_BODY(natlook, tc)
{
        struct pfioc_natlook nl = { 0 };

        COMMON_HEAD();

        nl.af = AF_INET;
        nl.proto = IPPROTO_ICMP;
        nl.saddr.v4.s_addr = 0x01020304;
        nl.daddr.v4.s_addr = 0x05060708;

        /* Invalid direction */
        nl.direction = 42;

        ATF_CHECK_ERRNO(EINVAL, ioctl(dev, DIOCNATLOOK, &nl) == -1);

        /* Invalid af */
        nl.direction = PF_IN;
        nl.af = 99;

        ATF_CHECK_ERRNO(EAFNOSUPPORT, ioctl(dev, DIOCNATLOOK, &nl) == -1);
}

ATF_TC_CLEANUP(natlook, tc)
{
        COMMON_CLEANUP();
}

ATF_TC_WITH_CLEANUP(addstate);
ATF_TC_HEAD(addstate, tc)
{
        atf_tc_set_md_var(tc, "require.user", "root");
        atf_tc_set_md_var(tc, "require.kmods", "pfsync");
}

ATF_TC_BODY(addstate, tc)
{
        struct pfioc_state st;

        COMMON_HEAD();

        memset(&st, 'a', sizeof(st));
        st.state.timeout = PFTM_TCP_FIRST_PACKET;

        ATF_CHECK_ERRNO(EINVAL, ioctl(dev, DIOCADDSTATE, &st) == -1);
}

ATF_TC_CLEANUP(addstate, tc)
{
        COMMON_CLEANUP();
}

ATF_TP_ADD_TCS(tp)
{
        ATF_TP_ADD_TC(tp, addtables);
        ATF_TP_ADD_TC(tp, deltables);
        ATF_TP_ADD_TC(tp, gettables);
        ATF_TP_ADD_TC(tp, clrtables);
        ATF_TP_ADD_TC(tp, getastats);
        ATF_TP_ADD_TC(tp, gettstats);
        ATF_TP_ADD_TC(tp, clrtstats);
        ATF_TP_ADD_TC(tp, settflags);
        ATF_TP_ADD_TC(tp, addaddrs);
        ATF_TP_ADD_TC(tp, deladdrs);
        ATF_TP_ADD_TC(tp, setaddrs);
        ATF_TP_ADD_TC(tp, getaddrs);
        ATF_TP_ADD_TC(tp, clrastats);
        ATF_TP_ADD_TC(tp, tstaddrs);
        ATF_TP_ADD_TC(tp, inadefine);
        ATF_TP_ADD_TC(tp, igetifaces);
        ATF_TP_ADD_TC(tp, cxbegin);
        ATF_TP_ADD_TC(tp, cxrollback);
        ATF_TP_ADD_TC(tp, commit);
        ATF_TP_ADD_TC(tp, getsrcnodes);
        ATF_TP_ADD_TC(tp, tag);
        ATF_TP_ADD_TC(tp, rpool_mtx);
        ATF_TP_ADD_TC(tp, rpool_mtx2);
        ATF_TP_ADD_TC(tp, natlook);
        ATF_TP_ADD_TC(tp, addstate);

        return (atf_no_error());
}