xref: /illumos-gate/usr/src/cmd/fm/eversholt/common/check.c (revision 1cb875ae88fb9463b368e725c2444776595895cb)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  *
25  * check.c -- routines for checking the prop tree
26  *
27  * this module provides semantic checks on the parse tree.  most of
28  * these checks happen during the construction of the parse tree,
29  * when the various tree_X() routines call the various check_X()
30  * routines.  in a couple of special cases, a check function will
31  * process the parse tree after it has been fully constructed.  these
32  * cases are noted in the comments above the check function.
33  */
34 
35 #include <stdio.h>
36 #include "out.h"
37 #include "stable.h"
38 #include "literals.h"
39 #include "lut.h"
40 #include "tree.h"
41 #include "ptree.h"
42 #include "check.h"
43 
44 static int check_reportlist(enum nodetype t, const char *s, struct node *np);
45 static int check_num(enum nodetype t, const char *s, struct node *np);
46 static int check_quote(enum nodetype t, const char *s, struct node *np);
47 static int check_action(enum nodetype t, const char *s, struct node *np);
48 static int check_num_func(enum nodetype t, const char *s, struct node *np);
49 static int check_fru_asru(enum nodetype t, const char *s, struct node *np);
50 static int check_engine(enum nodetype t, const char *s, struct node *np);
51 static int check_count(enum nodetype t, const char *s, struct node *np);
52 static int check_timeval(enum nodetype t, const char *s, struct node *np);
53 static int check_id(enum nodetype t, const char *s, struct node *np);
54 static int check_serd_method(enum nodetype t, const char *s, struct node *np);
55 static int check_serd_id(enum nodetype t, const char *s, struct node *np);
56 static int check_nork(struct node *np);
57 static void check_cycle_lhs(struct node *stmtnp, struct node *arrow);
58 static void check_cycle_lhs_try(struct node *stmtnp, struct node *lhs,
59     struct node *rhs);
60 static void check_cycle_rhs(struct node *rhs);
61 static void check_proplists_lhs(enum nodetype t, struct node *lhs);
62 
63 static struct {
64 	enum nodetype t;
65 	const char *name;
66 	int required;
67 	int (*checker)(enum nodetype t, const char *s, struct node *np);
68 	int outflags;
69 } Allowednames[] = {
70 	{ T_FAULT, "FITrate", 0, check_num_func, O_ERR },
71 	{ T_FAULT, "FRU", 0, check_fru_asru, O_ERR },
72 	{ T_FAULT, "ASRU", 0, check_fru_asru, O_ERR },
73 	{ T_FAULT, "message", 0, check_num_func, O_ERR },
74 	{ T_FAULT, "retire", 0, check_num_func, O_ERR },
75 	{ T_FAULT, "response", 0, check_num_func, O_ERR },
76 	{ T_FAULT, "action", 0, check_action, O_ERR },
77 	{ T_FAULT, "count", 0, check_count, O_ERR },
78 	{ T_FAULT, "engine", 0, check_engine, O_ERR },
79 	{ T_UPSET, "engine", 0, check_engine, O_ERR },
80 	{ T_DEFECT, "FRU", 0, check_fru_asru, O_ERR },
81 	{ T_DEFECT, "ASRU", 0, check_fru_asru, O_ERR },
82 	{ T_DEFECT, "engine", 0, check_engine, O_ERR },
83 	{ T_DEFECT, "FITrate", 0, check_num_func, O_ERR },
84 	{ T_EREPORT, "poller", 0, check_id, O_ERR },
85 	{ T_EREPORT, "delivery", 0, check_timeval, O_ERR },
86 	{ T_EREPORT, "discard_if_config_unknown", 0, check_num, O_ERR },
87 	{ T_SERD, "N", 1, check_num, O_ERR },
88 	{ T_SERD, "T", 1, check_timeval, O_ERR },
89 	{ T_SERD, "method", 0, check_serd_method, O_ERR },
90 	{ T_SERD, "trip", 0, check_reportlist, O_ERR },
91 	{ T_SERD, "FRU", 0, check_fru_asru, O_ERR },
92 	{ T_SERD, "id", 0, check_serd_id, O_ERR },
93 	{ T_ERROR, "ASRU", 0, check_fru_asru, O_ERR },
94 	{ T_CONFIG, NULL, 0, check_quote, O_ERR },
95 	{ 0, NULL, 0 },
96 };
97 
98 void
99 check_init(void)
100 {
101 	int i;
102 
103 	for (i = 0; Allowednames[i].t; i++)
104 		if (Allowednames[i].name != NULL)
105 			Allowednames[i].name = stable(Allowednames[i].name);
106 }
107 
108 void
109 check_fini(void)
110 {
111 }
112 
113 /*ARGSUSED*/
114 void
115 check_report_combination(struct node *np)
116 {
117 	/* nothing to check for here.  poller is only prop and it is optional */
118 }
119 
120 /*
121  * check_path_iterators -- verify all iterators are explicit
122  */
123 static void
124 check_path_iterators(struct node *np)
125 {
126 	if (np == NULL)
127 		return;
128 
129 	switch (np->t) {
130 		case T_ARROW:
131 			check_path_iterators(np->u.arrow.lhs);
132 			check_path_iterators(np->u.arrow.rhs);
133 			break;
134 
135 		case T_LIST:
136 			check_path_iterators(np->u.expr.left);
137 			check_path_iterators(np->u.expr.right);
138 			break;
139 
140 		case T_EVENT:
141 			check_path_iterators(np->u.event.epname);
142 			break;
143 
144 		case T_NAME:
145 			if (np->u.name.child == NULL)
146 				outfl(O_DIE, np->file, np->line,
147 				    "internal error: check_path_iterators: "
148 				    "unexpected implicit iterator: %s",
149 				    np->u.name.s);
150 			check_path_iterators(np->u.name.next);
151 			break;
152 
153 		default:
154 			outfl(O_DIE, np->file, np->line,
155 			    "internal error: check_path_iterators: "
156 			    "unexpected type: %s",
157 			    ptree_nodetype2str(np->t));
158 	}
159 }
160 
161 void
162 check_arrow(struct node *np)
163 {
164 	ASSERTinfo(np->t == T_ARROW, ptree_nodetype2str(np->t));
165 
166 	if (np->u.arrow.lhs->t != T_ARROW &&
167 	    np->u.arrow.lhs->t != T_LIST &&
168 	    np->u.arrow.lhs->t != T_EVENT) {
169 		outfl(O_ERR,
170 		    np->u.arrow.lhs->file, np->u.arrow.lhs->line,
171 		    "%s not allowed on left-hand side of arrow",
172 		    ptree_nodetype2str(np->u.arrow.lhs->t));
173 	}
174 
175 	if (!check_nork(np->u.arrow.nnp) ||
176 	    !check_nork(np->u.arrow.knp))
177 		outfl(O_ERR, np->file, np->line,
178 		    "counts associated with propagation arrows "
179 		    "must be integers");
180 
181 	check_path_iterators(np);
182 }
183 
184 /*
185  * make sure the nork values are valid.
186  * Nork values must be "A" for all(T_NAME),
187  * a number(T_NUM), or a simple
188  * expression(T_SUB, T_ADD, T_MUL, T_DIV)
189  */
190 static int
191 check_nork(struct node *np)
192 {
193 	int rval = 0;
194 
195 	/* NULL means no nork value which is allowed */
196 	if (np == NULL) {
197 		rval = 1;
198 	}
199 	else
200 	{
201 		/* if the nork is a name it must be A for "All" */
202 		if (np->t == T_NAME)
203 			if (*np->u.name.s == 'A')
204 				return (1);
205 
206 		/*  T_NUM allowed */
207 		if (np->t == T_NUM)
208 			rval = 1;
209 
210 		/*  simple expressions allowed */
211 		if (np->t == T_SUB ||
212 		    np->t == T_ADD ||
213 		    np->t == T_MUL ||
214 		    np->t == T_DIV)
215 			rval = 1;
216 	}
217 
218 	return (rval);
219 }
220 
221 static int
222 check_reportlist(enum nodetype t, const char *s, struct node *np)
223 {
224 	if (np == NULL)
225 		return (1);
226 	else if (np->t == T_EVENT) {
227 		if (np->u.event.ename->u.name.t != N_EREPORT) {
228 			outfl(O_ERR, np->file, np->line,
229 			    "%s %s property must begin with \"ereport.\"",
230 			    ptree_nodetype2str(t), s);
231 		} else if (tree_event2np_lut_lookup(Ereports, np) == NULL) {
232 			outfl(O_ERR, np->file, np->line,
233 			    "%s %s property contains undeclared name",
234 			    ptree_nodetype2str(t), s);
235 		}
236 		check_type_iterator(np);
237 	} else if (np->t == T_LIST) {
238 		(void) check_reportlist(t, s, np->u.expr.left);
239 		(void) check_reportlist(t, s, np->u.expr.right);
240 	}
241 	return (1);
242 }
243 
244 static int
245 check_num(enum nodetype t, const char *s, struct node *np)
246 {
247 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
248 	if (np->t != T_NUM)
249 		outfl(O_ERR, np->file, np->line,
250 		    "%s %s property must be a single number",
251 		    ptree_nodetype2str(t), s);
252 	return (1);
253 }
254 
255 /*ARGSUSED1*/
256 static int
257 check_quote(enum nodetype t, const char *s, struct node *np)
258 {
259 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
260 	if (np->t != T_QUOTE)
261 		outfl(O_ERR, np->file, np->line,
262 		    "%s properties must be quoted strings",
263 		    ptree_nodetype2str(t));
264 	return (1);
265 }
266 
267 static int
268 check_action(enum nodetype t, const char *s, struct node *np)
269 {
270 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
271 
272 	if (np->t != T_FUNC)
273 		outfl(O_ERR, np->file, np->line,
274 		    "%s %s property must be a function or list of functions",
275 		    ptree_nodetype2str(t), s);
276 	return (1);
277 }
278 
279 static int
280 check_num_func(enum nodetype t, const char *s, struct node *np)
281 {
282 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
283 	if (np->t != T_NUM && np->t != T_FUNC)
284 		outfl(O_ERR, np->file, np->line,
285 		    "%s %s property must be a number or function",
286 		    ptree_nodetype2str(t), s);
287 	return (1);
288 }
289 
290 static int
291 check_fru_asru(enum nodetype t, const char *s, struct node *np)
292 {
293 	ASSERT(s != NULL);
294 
295 	/* make sure it is a node type T_NAME? */
296 	if (np->t == T_NAME) {
297 		if (s == L_ASRU) {
298 			if (tree_name2np_lut_lookup_name(ASRUs, np) == NULL)
299 				outfl(O_ERR, np->file, np->line,
300 				    "ASRU property contains undeclared asru");
301 		} else if (s == L_FRU) {
302 			if (tree_name2np_lut_lookup_name(FRUs, np) == NULL)
303 				outfl(O_ERR, np->file, np->line,
304 				    "FRU property contains undeclared fru");
305 		} else {
306 			outfl(O_ERR, np->file, np->line,
307 			    "illegal property name in %s declaration: %s",
308 			    ptree_nodetype2str(t), s);
309 		}
310 		check_type_iterator(np);
311 	} else
312 		outfl(O_ERR, np->file, np->line,
313 		    "illegal type used for %s property: %s",
314 		    s, ptree_nodetype2str(np->t));
315 	return (1);
316 }
317 
318 static int
319 check_engine(enum nodetype t, const char *s, struct node *np)
320 {
321 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
322 	if (np->t != T_EVENT)
323 		outfl(O_ERR, np->file, np->line,
324 		    "%s %s property must be an engine name "
325 		    "(i.e. serd.x or serd.x@a/b)",
326 		    ptree_nodetype2str(t), s);
327 
328 	return (1);
329 }
330 
331 static int
332 check_count(enum nodetype t, const char *s, struct node *np)
333 {
334 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
335 	if (np->t != T_EVENT)
336 		outfl(O_ERR, np->file, np->line,
337 		    "%s %s property must be an engine name "
338 		    "(i.e. stat.x or stat.x@a/b)",
339 		    ptree_nodetype2str(t), s);
340 
341 	/* XXX confirm engine has been declared */
342 	return (1);
343 }
344 
345 static int
346 check_timeval(enum nodetype t, const char *s, struct node *np)
347 {
348 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
349 	if (np->t != T_TIMEVAL)
350 		outfl(O_ERR, np->file, np->line,
351 		    "%s %s property must be a number with time units",
352 		    ptree_nodetype2str(t), s);
353 	return (1);
354 }
355 
356 static int
357 check_id(enum nodetype t, const char *s, struct node *np)
358 {
359 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
360 	if (np->t != T_NAME || np->u.name.next || np->u.name.child)
361 		outfl(O_ERR, np->file, np->line,
362 		    "%s %s property must be simple name",
363 		    ptree_nodetype2str(t), s);
364 	return (1);
365 }
366 
367 static int
368 check_serd_method(enum nodetype t, const char *s, struct node *np)
369 {
370 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
371 	if (np->t != T_NAME || np->u.name.next || np->u.name.child ||
372 	    (np->u.name.s != L_volatile &&
373 	    np->u.name.s != L_persistent))
374 		outfl(O_ERR, np->file, np->line,
375 		    "%s %s property must be \"volatile\" or \"persistent\"",
376 		    ptree_nodetype2str(t), s);
377 	return (1);
378 }
379 
380 static int
381 check_serd_id(enum nodetype t, const char *s, struct node *np)
382 {
383 	ASSERTinfo(np != NULL, ptree_nodetype2str(t));
384 	if (np->t != T_GLOBID)
385 		outfl(O_ERR, np->file, np->line,
386 		    "%s %s property must be a global ID",
387 		    ptree_nodetype2str(t), s);
388 	return (1);
389 }
390 
391 void
392 check_stmt_required_properties(struct node *stmtnp)
393 {
394 	struct lut *lutp = stmtnp->u.stmt.lutp;
395 	struct node *np = stmtnp->u.stmt.np;
396 	int i;
397 
398 	for (i = 0; Allowednames[i].t; i++)
399 		if (stmtnp->t == Allowednames[i].t &&
400 		    Allowednames[i].required &&
401 		    tree_s2np_lut_lookup(lutp, Allowednames[i].name) == NULL)
402 			outfl(Allowednames[i].outflags,
403 			    np->file, np->line,
404 			    "%s statement missing property: %s",
405 			    ptree_nodetype2str(stmtnp->t),
406 			    Allowednames[i].name);
407 }
408 
409 void
410 check_stmt_allowed_properties(enum nodetype t,
411     struct node *nvpairnp, struct lut *lutp)
412 {
413 	int i;
414 	const char *s = nvpairnp->u.expr.left->u.name.s;
415 	struct node *np;
416 
417 	for (i = 0; Allowednames[i].t; i++)
418 		if (t == Allowednames[i].t && Allowednames[i].name == NULL) {
419 			/* NULL name means just call checker */
420 			(*Allowednames[i].checker)(t, s,
421 			    nvpairnp->u.expr.right);
422 			return;
423 		} else if (t == Allowednames[i].t && s == Allowednames[i].name)
424 			break;
425 	if (Allowednames[i].name == NULL)
426 		outfl(O_ERR, nvpairnp->file, nvpairnp->line,
427 		    "illegal property name in %s declaration: %s",
428 		    ptree_nodetype2str(t), s);
429 	else if ((np = tree_s2np_lut_lookup(lutp, s)) != NULL) {
430 		/*
431 		 * redeclaring prop is allowed if value is the same
432 		 */
433 		if (np->t != nvpairnp->u.expr.right->t)
434 			outfl(O_ERR, nvpairnp->file, nvpairnp->line,
435 			    "property redeclared (with differnt type) "
436 			    "in %s declaration: %s",
437 			    ptree_nodetype2str(t), s);
438 		switch (np->t) {
439 			case T_NUM:
440 			case T_TIMEVAL:
441 				if (np->u.ull == nvpairnp->u.expr.right->u.ull)
442 					return;
443 				break;
444 
445 			case T_NAME:
446 				if (tree_namecmp(np,
447 				    nvpairnp->u.expr.right) == 0)
448 					return;
449 				break;
450 
451 			case T_EVENT:
452 				if (tree_eventcmp(np,
453 				    nvpairnp->u.expr.right) == 0)
454 					return;
455 				break;
456 
457 			default:
458 				outfl(O_ERR, nvpairnp->file, nvpairnp->line,
459 				    "value for property \"%s\" is an "
460 				    "invalid type: %s",
461 				    nvpairnp->u.expr.left->u.name.s,
462 				    ptree_nodetype2str(np->t));
463 				return;
464 		}
465 		outfl(O_ERR, nvpairnp->file, nvpairnp->line,
466 		    "property redeclared in %s declaration: %s",
467 		    ptree_nodetype2str(t), s);
468 	} else
469 		(*Allowednames[i].checker)(t, s, nvpairnp->u.expr.right);
470 }
471 
472 void
473 check_propnames(enum nodetype t, struct node *np, int from, int to)
474 {
475 	struct node *dnp;
476 	struct lut *lutp;
477 
478 	ASSERT(np != NULL);
479 	ASSERTinfo(np->t == T_EVENT || np->t == T_LIST || np->t == T_ARROW,
480 	    ptree_nodetype2str(np->t));
481 
482 	if (np->t == T_EVENT) {
483 		switch (np->u.event.ename->u.name.t) {
484 		case N_UNSPEC:
485 			outfl(O_ERR, np->file, np->line,
486 			    "name in %s statement must begin with "
487 			    "type (example: \"error.\")",
488 			    ptree_nodetype2str(t));
489 			return;
490 		case N_FAULT:
491 			lutp = Faults;
492 			if (to) {
493 				outfl(O_ERR, np->file, np->line,
494 				    "%s has fault on right side of \"->\"",
495 				    ptree_nodetype2str(t));
496 				return;
497 			}
498 			if (!from) {
499 				outfl(O_DIE, np->file, np->line,
500 				    "internal error: %s has fault without "
501 				    "from flag",
502 				    ptree_nodetype2str(t));
503 			}
504 			break;
505 		case N_UPSET:
506 			lutp = Upsets;
507 			if (to) {
508 				outfl(O_ERR, np->file, np->line,
509 				    "%s has upset on right side of \"->\"",
510 				    ptree_nodetype2str(t));
511 				return;
512 			}
513 			if (!from)
514 				outfl(O_DIE, np->file, np->line,
515 				    "internal error: %s has upset without "
516 				    "from flag",
517 				    ptree_nodetype2str(t));
518 			break;
519 		case N_DEFECT:
520 			lutp = Defects;
521 			if (to) {
522 				outfl(O_ERR, np->file, np->line,
523 				    "%s has defect on right side of \"->\"",
524 				    ptree_nodetype2str(t));
525 				return;
526 			}
527 			if (!from) {
528 				outfl(O_DIE, np->file, np->line,
529 				    "internal error: %s has defect without "
530 				    "from flag",
531 				    ptree_nodetype2str(t));
532 			}
533 			break;
534 		case N_ERROR:
535 			lutp = Errors;
536 			if (!from && !to)
537 				outfl(O_DIE, np->file, np->line,
538 				    "%s has error without from or to flags",
539 				    ptree_nodetype2str(t));
540 			break;
541 		case N_EREPORT:
542 			lutp = Ereports;
543 			if (from) {
544 				outfl(O_ERR, np->file, np->line,
545 				    "%s has report on left side of \"->\"",
546 				    ptree_nodetype2str(t));
547 				return;
548 			}
549 			if (!to)
550 				outfl(O_DIE, np->file, np->line,
551 				    "internal error: %s has report without "
552 				    "to flag",
553 				    ptree_nodetype2str(t));
554 			break;
555 		default:
556 			outfl(O_DIE, np->file, np->line,
557 			    "internal error: check_propnames: "
558 			    "unexpected type: %d", np->u.name.t);
559 		}
560 
561 		if ((dnp = tree_event2np_lut_lookup(lutp, np)) == NULL) {
562 			outfl(O_ERR, np->file, np->line,
563 			    "%s statement contains undeclared event",
564 			    ptree_nodetype2str(t));
565 		} else
566 			dnp->u.stmt.flags |= STMT_REF;
567 		np->u.event.declp = dnp;
568 	} else if (np->t == T_LIST) {
569 		check_propnames(t, np->u.expr.left, from, to);
570 		check_propnames(t, np->u.expr.right, from, to);
571 	} else if (np->t == T_ARROW) {
572 		check_propnames(t, np->u.arrow.lhs, 1, to);
573 		check_propnames(t, np->u.arrow.rhs, from, 1);
574 	}
575 }
576 
577 static struct lut *
578 record_iterators(struct node *np, struct lut *ex)
579 {
580 	if (np == NULL)
581 		return (ex);
582 
583 	switch (np->t) {
584 	case T_ARROW:
585 		ex = record_iterators(np->u.arrow.lhs, ex);
586 		ex = record_iterators(np->u.arrow.rhs, ex);
587 		break;
588 
589 	case T_LIST:
590 		ex = record_iterators(np->u.expr.left, ex);
591 		ex = record_iterators(np->u.expr.right, ex);
592 		break;
593 
594 	case T_EVENT:
595 		ex = record_iterators(np->u.event.epname, ex);
596 		break;
597 
598 	case T_NAME:
599 		if (np->u.name.child && np->u.name.child->t == T_NAME)
600 			ex = lut_add(ex, (void *) np->u.name.child->u.name.s,
601 			    (void *) np, NULL);
602 		ex = record_iterators(np->u.name.next, ex);
603 		break;
604 
605 	default:
606 		outfl(O_DIE, np->file, np->line,
607 		    "record_iterators: internal error: unexpected type: %s",
608 		    ptree_nodetype2str(np->t));
609 	}
610 
611 	return (ex);
612 }
613 
614 void
615 check_exprscope(struct node *np, struct lut *ex)
616 {
617 	if (np == NULL)
618 		return;
619 
620 	switch (np->t) {
621 	case T_EVENT:
622 		check_exprscope(np->u.event.eexprlist, ex);
623 		break;
624 
625 	case T_ARROW:
626 		check_exprscope(np->u.arrow.lhs, ex);
627 		check_exprscope(np->u.arrow.rhs, ex);
628 		break;
629 
630 	case T_NAME:
631 		if (np->u.name.child && np->u.name.child->t == T_NAME) {
632 			if (lut_lookup(ex,
633 			    (void *) np->u.name.child->u.name.s, NULL) == NULL)
634 				outfl(O_ERR, np->file, np->line,
635 				    "constraint contains undefined"
636 				    " iterator: %s",
637 				    np->u.name.child->u.name.s);
638 		}
639 		check_exprscope(np->u.name.next, ex);
640 		break;
641 
642 	case T_QUOTE:
643 	case T_GLOBID:
644 		break;
645 
646 	case T_ASSIGN:
647 	case T_NE:
648 	case T_EQ:
649 	case T_LIST:
650 	case T_AND:
651 	case T_OR:
652 	case T_NOT:
653 	case T_ADD:
654 	case T_SUB:
655 	case T_MUL:
656 	case T_DIV:
657 	case T_MOD:
658 	case T_LT:
659 	case T_LE:
660 	case T_GT:
661 	case T_GE:
662 	case T_BITAND:
663 	case T_BITOR:
664 	case T_BITXOR:
665 	case T_BITNOT:
666 	case T_LSHIFT:
667 	case T_RSHIFT:
668 	case T_CONDIF:
669 	case T_CONDELSE:
670 		check_exprscope(np->u.expr.left, ex);
671 		check_exprscope(np->u.expr.right, ex);
672 		break;
673 
674 	case T_FUNC:
675 		check_exprscope(np->u.func.arglist, ex);
676 		break;
677 
678 	case T_NUM:
679 	case T_TIMEVAL:
680 		break;
681 
682 	default:
683 		outfl(O_DIE, np->file, np->line,
684 		    "check_exprscope: internal error: unexpected type: %s",
685 		    ptree_nodetype2str(np->t));
686 	}
687 }
688 
689 /*
690  * check_propscope -- check constraints for out of scope variable refs
691  */
692 void
693 check_propscope(struct node *np)
694 {
695 	struct lut *ex;
696 
697 	ex = record_iterators(np, NULL);
698 	check_exprscope(np, ex);
699 	lut_free(ex, NULL, NULL);
700 }
701 
702 /*
703  * check_upset_engine -- validate the engine property in an upset statement
704  *
705  * we do this after the full parse tree has been constructed rather than while
706  * building the parse tree because it is inconvenient for the user if we
707  * require SERD engines to be declared before used in an upset "engine"
708  * property.
709  */
710 
711 /*ARGSUSED*/
712 void
713 check_upset_engine(struct node *lhs, struct node *rhs, void *arg)
714 {
715 	enum nodetype t = (enum nodetype)arg;
716 	struct node *engnp;
717 	struct node *declp;
718 
719 	ASSERTeq(rhs->t, t, ptree_nodetype2str);
720 
721 	if ((engnp = tree_s2np_lut_lookup(rhs->u.stmt.lutp, L_engine)) == NULL)
722 		return;
723 
724 	ASSERT(engnp->t == T_EVENT);
725 
726 	if ((declp = tree_event2np_lut_lookup(SERDs, engnp)) == NULL) {
727 		outfl(O_ERR, engnp->file, engnp->line,
728 		    "%s %s property contains undeclared name",
729 		    ptree_nodetype2str(t), L_engine);
730 		return;
731 	}
732 	engnp->u.event.declp = declp;
733 }
734 
735 /*
736  * check_refcount -- see if declared names are used
737  *
738  * this is run after the entire parse tree is constructed, so a refcount
739  * of zero means the name has been declared but otherwise not used.
740  */
741 
742 void
743 check_refcount(struct node *lhs, struct node *rhs, void *arg)
744 {
745 	enum nodetype t = (enum nodetype)arg;
746 
747 	ASSERTeq(rhs->t, t, ptree_nodetype2str);
748 
749 	if (rhs->u.stmt.flags & STMT_REF)
750 		return;
751 
752 	outfl(O_WARN|O_NONL, rhs->file, rhs->line,
753 	    "%s name declared but not used: ", ptree_nodetype2str(t));
754 	ptree_name(O_WARN|O_NONL, lhs);
755 	out(O_WARN, NULL);
756 }
757 
758 /*
759  * set check_cycle_warninglevel only for val >= 0
760  */
761 int
762 check_cycle_level(long long val)
763 {
764 	static int check_cycle_warninglevel = -1;
765 
766 	if (val == 0)
767 		check_cycle_warninglevel = 0;
768 	else if (val > 0)
769 		check_cycle_warninglevel = 1;
770 
771 	return (check_cycle_warninglevel);
772 }
773 
774 /*
775  * check_cycle -- see props from an error have cycles
776  *
777  * this is run after the entire parse tree is constructed, for
778  * each error that has been declared.
779  */
780 
781 /*ARGSUSED*/
782 void
783 check_cycle(struct node *lhs, struct node *rhs, void *arg)
784 {
785 	struct node *np;
786 
787 	ASSERTeq(rhs->t, T_ERROR, ptree_nodetype2str);
788 
789 	if (rhs->u.stmt.flags & STMT_CYCLE)
790 		return;		/* already reported this cycle */
791 
792 	if (rhs->u.stmt.flags & STMT_CYMARK) {
793 #ifdef ESC
794 		int warninglevel;
795 
796 		warninglevel = check_cycle_level(-1);
797 		if (warninglevel <= 0) {
798 			int olevel = O_ERR;
799 
800 			if (warninglevel == 0)
801 				olevel = O_WARN;
802 
803 			out(olevel|O_NONL, "cycle in propagation tree: ");
804 			ptree_name(olevel|O_NONL, rhs->u.stmt.np);
805 			out(olevel, NULL);
806 		}
807 #endif /* ESC */
808 
809 		rhs->u.stmt.flags |= STMT_CYCLE;
810 	}
811 
812 	rhs->u.stmt.flags |= STMT_CYMARK;
813 
814 	/* for each propagation */
815 	for (np = Props; np; np = np->u.stmt.next)
816 		check_cycle_lhs(rhs, np->u.stmt.np);
817 
818 	rhs->u.stmt.flags &= ~STMT_CYMARK;
819 }
820 
821 /*
822  * check_cycle_lhs -- find the lhs of an arrow for cycle checking
823  */
824 
825 static void
826 check_cycle_lhs(struct node *stmtnp, struct node *arrow)
827 {
828 	struct node *trylhs;
829 	struct node *tryrhs;
830 
831 	/* handle cascaded arrows */
832 	switch (arrow->u.arrow.lhs->t) {
833 	case T_ARROW:
834 		/* first recurse left */
835 		check_cycle_lhs(stmtnp, arrow->u.arrow.lhs);
836 
837 		/*
838 		 * return if there's a list of events internal to
839 		 * cascaded props (which is not allowed)
840 		 */
841 		if (arrow->u.arrow.lhs->u.arrow.rhs->t != T_EVENT)
842 			return;
843 
844 		/* then try this arrow (thing cascaded *to*) */
845 		trylhs = arrow->u.arrow.lhs->u.arrow.rhs;
846 		tryrhs = arrow->u.arrow.rhs;
847 		break;
848 
849 	case T_EVENT:
850 	case T_LIST:
851 		trylhs = arrow->u.arrow.lhs;
852 		tryrhs = arrow->u.arrow.rhs;
853 		break;
854 
855 	default:
856 		out(O_DIE, "lhs: unexpected type: %s",
857 		    ptree_nodetype2str(arrow->u.arrow.lhs->t));
858 		/*NOTREACHED*/
859 	}
860 
861 	check_cycle_lhs_try(stmtnp, trylhs, tryrhs);
862 }
863 
864 /*
865  * check_cycle_lhs_try -- try matching an event name on lhs of an arrow
866  */
867 
868 static void
869 check_cycle_lhs_try(struct node *stmtnp, struct node *lhs, struct node *rhs)
870 {
871 	if (lhs->t == T_LIST) {
872 		check_cycle_lhs_try(stmtnp, lhs->u.expr.left, rhs);
873 		check_cycle_lhs_try(stmtnp, lhs->u.expr.right, rhs);
874 		return;
875 	}
876 
877 	ASSERT(lhs->t == T_EVENT);
878 
879 	if (tree_eventcmp(stmtnp->u.stmt.np, lhs) != 0)
880 		return;		/* no match */
881 
882 	check_cycle_rhs(rhs);
883 }
884 
885 /*
886  * check_cycle_rhs -- foreach error on rhs, see if we cycle to a marked error
887  */
888 
889 static void
890 check_cycle_rhs(struct node *rhs)
891 {
892 	struct node *dnp;
893 
894 	if (rhs->t == T_LIST) {
895 		check_cycle_rhs(rhs->u.expr.left);
896 		check_cycle_rhs(rhs->u.expr.right);
897 		return;
898 	}
899 
900 	ASSERT(rhs->t == T_EVENT);
901 
902 	if (rhs->u.event.ename->u.name.t != N_ERROR)
903 		return;
904 
905 	if ((dnp = tree_event2np_lut_lookup(Errors, rhs)) == NULL) {
906 		outfl(O_ERR|O_NONL,
907 		    rhs->file, rhs->line,
908 		    "unexpected undeclared event during cycle check");
909 		ptree_name(O_ERR|O_NONL, rhs);
910 		out(O_ERR, NULL);
911 		return;
912 	}
913 	check_cycle(NULL, dnp, 0);
914 }
915 
916 /*
917  * Force iterators to be simple names, expressions, or numbers
918  */
919 void
920 check_name_iterator(struct node *np)
921 {
922 	if (np->u.name.child->t != T_NUM &&
923 	    np->u.name.child->t != T_NAME &&
924 	    np->u.name.child->t != T_CONDIF &&
925 	    np->u.name.child->t != T_SUB &&
926 	    np->u.name.child->t != T_ADD &&
927 	    np->u.name.child->t != T_MUL &&
928 	    np->u.name.child->t != T_DIV &&
929 	    np->u.name.child->t != T_MOD &&
930 	    np->u.name.child->t != T_LSHIFT &&
931 	    np->u.name.child->t != T_RSHIFT) {
932 		outfl(O_ERR|O_NONL, np->file, np->line,
933 		"invalid iterator: ");
934 		ptree_name_iter(O_ERR|O_NONL, np);
935 		out(O_ERR, NULL);
936 	}
937 }
938 
939 /*
940  * Iterators on a declaration may only be implicit
941  */
942 void
943 check_type_iterator(struct node *np)
944 {
945 	while (np != NULL) {
946 		if (np->t == T_EVENT) {
947 			np = np->u.event.epname;
948 		} else if (np->t == T_NAME) {
949 			if (np->u.name.child != NULL &&
950 			    np->u.name.child->t != T_NUM) {
951 				outfl(O_ERR|O_NONL, np->file, np->line,
952 				    "explicit iterators disallowed "
953 				    "in declarations: ");
954 				ptree_name_iter(O_ERR|O_NONL, np);
955 				out(O_ERR, NULL);
956 			}
957 			np = np->u.name.next;
958 		} else {
959 			break;
960 		}
961 	}
962 }
963 
964 void
965 check_func(struct node *np)
966 {
967 	struct node *arglist = np->u.func.arglist;
968 
969 	ASSERTinfo(np->t == T_FUNC, ptree_nodetype2str(np->t));
970 
971 	if (np->u.func.s == L_within) {
972 		switch (arglist->t) {
973 		case T_NUM:
974 			if (arglist->u.ull != 0ULL) {
975 				outfl(O_ERR, arglist->file, arglist->line,
976 				    "parameter of within must be 0"
977 				    ", \"infinity\" or a time value.");
978 			}
979 			break;
980 
981 		case T_NAME:
982 			if (arglist->u.name.s != L_infinity) {
983 				outfl(O_ERR, arglist->file, arglist->line,
984 				    "parameter of within must be 0"
985 				    ", \"infinity\" or a time value.");
986 			}
987 			break;
988 
989 		case T_LIST:
990 			/*
991 			 * if two parameters, the left or min must be
992 			 * either T_NUM or T_TIMEVAL
993 			 */
994 			if (arglist->u.expr.left->t != T_NUM &&
995 			    arglist->u.expr.left->t != T_TIMEVAL) {
996 				outfl(O_ERR, arglist->file, arglist->line,
997 				    "first parameter of within must be"
998 				    " either a time value or zero.");
999 			}
1000 
1001 			/*
1002 			 * if two parameters, the right or max must
1003 			 * be either T_NUM, T_NAME or T_TIMEVAL
1004 			 */
1005 			if (arglist->u.expr.right->t != T_NUM &&
1006 			    arglist->u.expr.right->t != T_TIMEVAL &&
1007 			    arglist->u.expr.right->t != T_NAME) {
1008 				outfl(O_ERR, arglist->file, arglist->line,
1009 				    "second parameter of within must "
1010 				    "be 0, \"infinity\" or time value.");
1011 			}
1012 
1013 			/*
1014 			 * if right or left is a T_NUM it must
1015 			 * be zero
1016 			 */
1017 			if ((arglist->u.expr.left->t == T_NUM) &&
1018 			    (arglist->u.expr.left->u.ull != 0ULL)) {
1019 				outfl(O_ERR, arglist->file, arglist->line,
1020 				    "within parameter must be "
1021 				    "0 or a time value.");
1022 			}
1023 			if ((arglist->u.expr.right->t == T_NUM) &&
1024 			    (arglist->u.expr.right->u.ull != 0ULL)) {
1025 				outfl(O_ERR, arglist->file, arglist->line,
1026 				    "within parameter must be "
1027 				    "0 or a time value.");
1028 			}
1029 
1030 			/* if right is a T_NAME it must be "infinity" */
1031 			if ((arglist->u.expr.right->t == T_NAME) &&
1032 			    (arglist->u.expr.right->u.name.s != L_infinity)) {
1033 				outfl(O_ERR, arglist->file, arglist->line,
1034 				    "\"infinity\" is the only "
1035 				    "valid name for within parameter.");
1036 			}
1037 
1038 			/*
1039 			 * the first parameter [min] must not be greater
1040 			 * than the second parameter [max].
1041 			 */
1042 			if (arglist->u.expr.left->u.ull >
1043 			    arglist->u.expr.right->u.ull) {
1044 				outfl(O_ERR, arglist->file, arglist->line,
1045 				    "the first value (min) of"
1046 				    " within must be less than"
1047 				    " the second (max) value");
1048 			}
1049 			break;
1050 
1051 		case T_TIMEVAL:
1052 			break; /* no restrictions on T_TIMEVAL */
1053 
1054 		default:
1055 			outfl(O_ERR, arglist->file, arglist->line,
1056 			    "parameter of within must be 0"
1057 			    ", \"infinity\" or a time value.");
1058 		}
1059 	} else if (np->u.func.s == L_call) {
1060 		if (arglist->t != T_QUOTE &&
1061 		    arglist->t != T_LIST &&
1062 		    arglist->t != T_GLOBID &&
1063 		    arglist->t != T_CONDIF &&
1064 		    arglist->t != T_LIST &&
1065 		    arglist->t != T_FUNC)
1066 			outfl(O_ERR, arglist->file, arglist->line,
1067 			    "invalid first argument to call()");
1068 	} else if (np->u.func.s == L_fru) {
1069 		if (arglist->t != T_NAME)
1070 			outfl(O_ERR, arglist->file, arglist->line,
1071 			    "argument to fru() must be a path");
1072 	} else if (np->u.func.s == L_asru) {
1073 		if (arglist->t != T_NAME)
1074 			outfl(O_ERR, arglist->file, arglist->line,
1075 			    "argument to asru() must be a path");
1076 	} else if (np->u.func.s == L_is_connected ||
1077 	    np->u.func.s == L_is_under) {
1078 		if (arglist->t == T_LIST &&
1079 		    (arglist->u.expr.left->t == T_NAME ||
1080 		    (arglist->u.expr.left->t == T_FUNC &&
1081 		    (arglist->u.expr.left->u.func.s == L_fru ||
1082 		    arglist->u.expr.left->u.func.s == L_asru))) &&
1083 		    (arglist->u.expr.right->t == T_NAME ||
1084 		    (arglist->u.expr.right->t == T_FUNC &&
1085 		    (arglist->u.expr.right->u.func.s == L_fru ||
1086 		    arglist->u.expr.right->u.func.s == L_asru)))) {
1087 			if (arglist->u.expr.left->t == T_FUNC)
1088 				check_func(arglist->u.expr.left);
1089 			if (arglist->u.expr.right->t == T_FUNC)
1090 				check_func(arglist->u.expr.right);
1091 		} else {
1092 			outfl(O_ERR, arglist->file, arglist->line,
1093 			    "%s() must have paths or calls to "
1094 			    "fru() and/or asru() as arguments",
1095 			    np->u.func.s);
1096 		}
1097 	} else if (np->u.func.s == L_is_on) {
1098 		if (arglist->t == T_NAME ||
1099 		    (arglist->t == T_FUNC &&
1100 		    (arglist->u.func.s == L_fru ||
1101 		    arglist->u.func.s == L_asru))) {
1102 			if (arglist->t == T_FUNC)
1103 				check_func(arglist);
1104 		} else {
1105 			outfl(O_ERR, arglist->file, arglist->line,
1106 			    "argument to is_on() must be a path or a call to "
1107 			    "fru() or asru()");
1108 		}
1109 	} else if (np->u.func.s == L_is_present) {
1110 		if (arglist->t == T_NAME ||
1111 		    (arglist->t == T_FUNC &&
1112 		    (arglist->u.func.s == L_fru ||
1113 		    arglist->u.func.s == L_asru))) {
1114 			if (arglist->t == T_FUNC)
1115 				check_func(arglist);
1116 		} else {
1117 			outfl(O_ERR, arglist->file, arglist->line,
1118 			    "argument to is_present() must be a path or a call "
1119 			    "to fru() or asru()");
1120 		}
1121 	} else if (np->u.func.s == L_has_fault) {
1122 		if (arglist->t == T_LIST &&
1123 		    (arglist->u.expr.left->t == T_NAME ||
1124 		    (arglist->u.expr.left->t == T_FUNC &&
1125 		    (arglist->u.expr.left->u.func.s == L_fru ||
1126 		    arglist->u.expr.left->u.func.s == L_asru))) &&
1127 		    arglist->u.expr.right->t == T_QUOTE) {
1128 			if (arglist->u.expr.left->t == T_FUNC)
1129 				check_func(arglist->u.expr.left);
1130 		} else {
1131 			outfl(O_ERR, arglist->file, arglist->line,
1132 			    "%s() must have path or call to "
1133 			    "fru() and/or asru() as first argument; "
1134 			    "second argument must be a string", np->u.func.s);
1135 		}
1136 	} else if (np->u.func.s == L_is_type) {
1137 		if (arglist->t == T_NAME ||
1138 		    (arglist->t == T_FUNC &&
1139 		    (arglist->u.func.s == L_fru ||
1140 		    arglist->u.func.s == L_asru))) {
1141 			if (arglist->t == T_FUNC)
1142 				check_func(arglist);
1143 		} else {
1144 			outfl(O_ERR, arglist->file, arglist->line,
1145 			    "argument to is_type() must be a path or a call to "
1146 			    "fru() or asru()");
1147 		}
1148 	} else if (np->u.func.s == L_confcall) {
1149 		if (arglist->t != T_QUOTE &&
1150 		    (arglist->t != T_LIST ||
1151 		    arglist->u.expr.left->t != T_QUOTE))
1152 			outfl(O_ERR, arglist->file, arglist->line,
1153 			    "confcall(): first argument must be a string "
1154 			    "(the name of the operation)");
1155 	} else if (np->u.func.s == L_confprop ||
1156 	    np->u.func.s == L_confprop_defined) {
1157 		if (arglist->t == T_LIST &&
1158 		    (arglist->u.expr.left->t == T_NAME ||
1159 		    (arglist->u.expr.left->t == T_FUNC &&
1160 		    (arglist->u.expr.left->u.func.s == L_fru ||
1161 		    arglist->u.expr.left->u.func.s == L_asru))) &&
1162 		    arglist->u.expr.right->t == T_QUOTE) {
1163 			if (arglist->u.expr.left->t == T_FUNC)
1164 				check_func(arglist->u.expr.left);
1165 		} else {
1166 			outfl(O_ERR, arglist->file, arglist->line,
1167 			    "%s(): first argument must be a path or a call to "
1168 			    "fru() or asru(); "
1169 			    "second argument must be a string", np->u.func.s);
1170 		}
1171 	} else if (np->u.func.s == L_count) {
1172 		if (arglist->t != T_EVENT) {
1173 			outfl(O_ERR, arglist->file, arglist->line,
1174 			    "count(): argument must be an engine name");
1175 		}
1176 	} else if (np->u.func.s == L_defined) {
1177 		if (arglist->t != T_GLOBID)
1178 			outfl(O_ERR, arglist->file, arglist->line,
1179 			    "argument to defined() must be a global");
1180 	} else if (np->u.func.s == L_payloadprop) {
1181 		if (arglist->t != T_QUOTE)
1182 			outfl(O_ERR, arglist->file, arglist->line,
1183 			    "argument to payloadprop() must be a string");
1184 	} else if (np->u.func.s == L_payloadprop_contains) {
1185 		if (arglist->t != T_LIST ||
1186 		    arglist->u.expr.left->t != T_QUOTE ||
1187 		    arglist->u.expr.right == NULL)
1188 			outfl(O_ERR, arglist->file, arglist->line,
1189 			    "args to payloadprop_contains(): must be a quoted "
1190 			    "string (property name) and an expression "
1191 			    "(to match)");
1192 	} else if (np->u.func.s == L_payloadprop_defined) {
1193 		if (arglist->t != T_QUOTE)
1194 			outfl(O_ERR, arglist->file, arglist->line,
1195 			    "arg to payloadprop_defined(): must be a quoted "
1196 			    "string");
1197 	} else if (np->u.func.s == L_setpayloadprop) {
1198 		if (arglist->t == T_LIST &&
1199 		    arglist->u.expr.left->t == T_QUOTE) {
1200 			if (arglist->u.expr.right->t == T_FUNC)
1201 				check_func(arglist->u.expr.right);
1202 		} else {
1203 			outfl(O_ERR, arglist->file, arglist->line,
1204 			    "setpayloadprop(): "
1205 			    "first arg must be a string, "
1206 			    "second arg a value");
1207 		}
1208 	} else if (np->u.func.s == L_setserdn || np->u.func.s == L_setserdt ||
1209 	    np->u.func.s == L_setserdsuffix || np->u.func.s ==
1210 	    L_setserdincrement) {
1211 		if (arglist->t == T_FUNC)
1212 			check_func(arglist);
1213 	} else if (np->u.func.s == L_envprop) {
1214 		if (arglist->t != T_QUOTE)
1215 			outfl(O_ERR, arglist->file, arglist->line,
1216 			    "argument to envprop() must be a string");
1217 	} else
1218 		outfl(O_WARN, np->file, np->line,
1219 		    "possible platform-specific function: %s",
1220 		    np->u.func.s);
1221 }
1222 
1223 void
1224 check_expr(struct node *np)
1225 {
1226 	ASSERT(np != NULL);
1227 
1228 	switch (np->t) {
1229 	case T_ASSIGN:
1230 		ASSERT(np->u.expr.left != NULL);
1231 		if (np->u.expr.left->t != T_GLOBID)
1232 			outfl(O_ERR, np->file, np->line,
1233 			    "assignment only allowed to globals (e.g. $a)");
1234 		break;
1235 	}
1236 }
1237 
1238 void
1239 check_event(struct node *np)
1240 {
1241 	ASSERT(np != NULL);
1242 	ASSERTinfo(np->t == T_EVENT, ptree_nodetype2str(np->t));
1243 
1244 	if (np->u.event.epname == NULL) {
1245 		outfl(O_ERR|O_NONL, np->file, np->line,
1246 		    "pathless events not allowed: ");
1247 		ptree_name(O_ERR|O_NONL, np->u.event.ename);
1248 		out(O_ERR, NULL);
1249 	}
1250 }
1251 
1252 /*
1253  * check for properties that are required on declarations. This
1254  * should be done after all declarations since they can be
1255  * redeclared with a different set of properties.
1256  */
1257 /*ARGSUSED*/
1258 void
1259 check_required_props(struct node *lhs, struct node *rhs, void *arg)
1260 {
1261 	ASSERTeq(rhs->t, (enum nodetype)arg, ptree_nodetype2str);
1262 
1263 	check_stmt_required_properties(rhs);
1264 }
1265 
1266 /*
1267  * check that cascading prop statements do not contain lists internally.
1268  * the first and last event lists in the cascading prop may be single
1269  * events or lists of events.
1270  */
1271 /*ARGSUSED*/
1272 void
1273 check_proplists(enum nodetype t, struct node *np)
1274 {
1275 	ASSERT(np->t == T_ARROW);
1276 	/*
1277 	 * not checking the right hand side of the top level prop
1278 	 * since it is the last part of the propagation and can be
1279 	 * an event or list of events
1280 	 */
1281 	check_proplists_lhs(t, np->u.arrow.lhs);
1282 }
1283 
1284 /*ARGSUSED*/
1285 static void
1286 check_proplists_lhs(enum nodetype t, struct node *lhs)
1287 {
1288 	if (lhs->t == T_ARROW) {
1289 		if (lhs->u.arrow.rhs->t == T_LIST) {
1290 			outfl(O_ERR, lhs->file, lhs->line,
1291 			    "lists are not allowed internally on cascading %s",
1292 			    (t == T_PROP) ? "propagations" : "masks");
1293 		}
1294 		check_proplists_lhs(t, lhs->u.arrow.lhs);
1295 	}
1296 }
1297