1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Routines for driver control interface
4 * Copyright (c) by Jaroslav Kysela <perex@perex.cz>
7 #include <linux/threads.h>
8 #include <linux/interrupt.h>
9 #include <linux/module.h>
10 #include <linux/moduleparam.h>
11 #include <linux/slab.h>
12 #include <linux/vmalloc.h>
13 #include <linux/time.h>
15 #include <linux/math64.h>
16 #include <linux/sched/signal.h>
17 #include <sound/core.h>
18 #include <sound/minors.h>
19 #include <sound/info.h>
20 #include <sound/control.h>
22 // Max allocation size for user controls.
23 static int max_user_ctl_alloc_size = 8 * 1024 * 1024;
24 module_param_named(max_user_ctl_alloc_size, max_user_ctl_alloc_size, int, 0444);
25 MODULE_PARM_DESC(max_user_ctl_alloc_size, "Max allocation size for user controls");
27 #define MAX_CONTROL_COUNT 1028
29 struct snd_kctl_ioctl {
30 struct list_head list; /* list of all ioctls */
31 snd_kctl_ioctl_func_t fioctl;
34 static DECLARE_RWSEM(snd_ioctl_rwsem);
35 static DECLARE_RWSEM(snd_ctl_layer_rwsem);
36 static LIST_HEAD(snd_control_ioctls);
38 static LIST_HEAD(snd_control_compat_ioctls);
40 static struct snd_ctl_layer_ops *snd_ctl_layer;
42 static int snd_ctl_remove_locked(struct snd_card *card,
43 struct snd_kcontrol *kcontrol);
45 static int snd_ctl_open(struct inode *inode, struct file *file)
47 struct snd_card *card;
48 struct snd_ctl_file *ctl;
51 err = stream_open(inode, file);
55 card = snd_lookup_minor_data(iminor(inode), SNDRV_DEVICE_TYPE_CONTROL);
60 err = snd_card_file_add(card, file);
65 if (!try_module_get(card->module)) {
69 ctl = kzalloc(sizeof(*ctl), GFP_KERNEL);
74 INIT_LIST_HEAD(&ctl->events);
75 init_waitqueue_head(&ctl->change_sleep);
76 spin_lock_init(&ctl->read_lock);
78 for (i = 0; i < SND_CTL_SUBDEV_ITEMS; i++)
79 ctl->preferred_subdevice[i] = -1;
80 ctl->pid = get_pid(task_pid(current));
81 file->private_data = ctl;
82 scoped_guard(write_lock_irqsave, &card->ctl_files_rwlock)
83 list_add_tail(&ctl->list, &card->ctl_files);
88 module_put(card->module);
90 snd_card_file_remove(card, file);
97 static void snd_ctl_empty_read_queue(struct snd_ctl_file * ctl)
99 struct snd_kctl_event *cread;
101 guard(spinlock_irqsave)(&ctl->read_lock);
102 while (!list_empty(&ctl->events)) {
103 cread = snd_kctl_event(ctl->events.next);
104 list_del(&cread->list);
109 static int snd_ctl_release(struct inode *inode, struct file *file)
111 struct snd_card *card;
112 struct snd_ctl_file *ctl;
113 struct snd_kcontrol *control;
116 ctl = file->private_data;
117 file->private_data = NULL;
120 scoped_guard(write_lock_irqsave, &card->ctl_files_rwlock)
121 list_del(&ctl->list);
123 scoped_guard(rwsem_write, &card->controls_rwsem) {
124 list_for_each_entry(control, &card->controls, list)
125 for (idx = 0; idx < control->count; idx++)
126 if (control->vd[idx].owner == ctl)
127 control->vd[idx].owner = NULL;
130 snd_fasync_free(ctl->fasync);
131 snd_ctl_empty_read_queue(ctl);
134 module_put(card->module);
135 snd_card_file_remove(card, file);
140 * snd_ctl_notify - Send notification to user-space for a control change
141 * @card: the card to send notification
142 * @mask: the event mask, SNDRV_CTL_EVENT_*
143 * @id: the ctl element id to send notification
145 * This function adds an event record with the given id and mask, appends
146 * to the list and wakes up the user-space for notification. This can be
147 * called in the atomic context.
149 void snd_ctl_notify(struct snd_card *card, unsigned int mask,
150 struct snd_ctl_elem_id *id)
152 struct snd_ctl_file *ctl;
153 struct snd_kctl_event *ev;
155 if (snd_BUG_ON(!card || !id))
160 guard(read_lock_irqsave)(&card->ctl_files_rwlock);
161 #if IS_ENABLED(CONFIG_SND_MIXER_OSS)
162 card->mixer_oss_change_count++;
164 list_for_each_entry(ctl, &card->ctl_files, list) {
165 if (!ctl->subscribed)
167 scoped_guard(spinlock, &ctl->read_lock) {
168 list_for_each_entry(ev, &ctl->events, list) {
169 if (ev->id.numid == id->numid) {
174 ev = kzalloc(sizeof(*ev), GFP_ATOMIC);
178 list_add_tail(&ev->list, &ctl->events);
180 dev_err(card->dev, "No memory available to allocate event\n");
183 wake_up(&ctl->change_sleep);
185 snd_kill_fasync(ctl->fasync, SIGIO, POLL_IN);
188 EXPORT_SYMBOL(snd_ctl_notify);
191 * snd_ctl_notify_one - Send notification to user-space for a control change
192 * @card: the card to send notification
193 * @mask: the event mask, SNDRV_CTL_EVENT_*
194 * @kctl: the pointer with the control instance
195 * @ioff: the additional offset to the control index
197 * This function calls snd_ctl_notify() and does additional jobs
198 * like LED state changes.
200 void snd_ctl_notify_one(struct snd_card *card, unsigned int mask,
201 struct snd_kcontrol *kctl, unsigned int ioff)
203 struct snd_ctl_elem_id id = kctl->id;
204 struct snd_ctl_layer_ops *lops;
208 snd_ctl_notify(card, mask, &id);
209 guard(rwsem_read)(&snd_ctl_layer_rwsem);
210 for (lops = snd_ctl_layer; lops; lops = lops->next)
211 lops->lnotify(card, mask, kctl, ioff);
213 EXPORT_SYMBOL(snd_ctl_notify_one);
216 * snd_ctl_new - create a new control instance with some elements
217 * @kctl: the pointer to store new control instance
218 * @count: the number of elements in this control
219 * @access: the default access flags for elements in this control
220 * @file: given when locking these elements
222 * Allocates a memory object for a new control instance. The instance has
223 * elements as many as the given number (@count). Each element has given
224 * access permissions (@access). Each element is locked when @file is given.
226 * Return: 0 on success, error code on failure
228 static int snd_ctl_new(struct snd_kcontrol **kctl, unsigned int count,
229 unsigned int access, struct snd_ctl_file *file)
233 if (count == 0 || count > MAX_CONTROL_COUNT)
236 *kctl = kzalloc(struct_size(*kctl, vd, count), GFP_KERNEL);
240 for (idx = 0; idx < count; idx++) {
241 (*kctl)->vd[idx].access = access;
242 (*kctl)->vd[idx].owner = file;
244 (*kctl)->count = count;
250 * snd_ctl_new1 - create a control instance from the template
251 * @ncontrol: the initialization record
252 * @private_data: the private data to set
254 * Allocates a new struct snd_kcontrol instance and initialize from the given
255 * template. When the access field of ncontrol is 0, it's assumed as
256 * READWRITE access. When the count field is 0, it's assumes as one.
258 * Return: The pointer of the newly generated instance, or %NULL on failure.
260 struct snd_kcontrol *snd_ctl_new1(const struct snd_kcontrol_new *ncontrol,
263 struct snd_kcontrol *kctl;
268 if (snd_BUG_ON(!ncontrol || !ncontrol->info))
271 count = ncontrol->count;
275 access = ncontrol->access;
277 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
278 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
279 SNDRV_CTL_ELEM_ACCESS_VOLATILE |
280 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
281 SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE |
282 SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND |
283 SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK |
284 SNDRV_CTL_ELEM_ACCESS_LED_MASK |
285 SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK);
287 err = snd_ctl_new(&kctl, count, access, NULL);
291 /* The 'numid' member is decided when calling snd_ctl_add(). */
292 kctl->id.iface = ncontrol->iface;
293 kctl->id.device = ncontrol->device;
294 kctl->id.subdevice = ncontrol->subdevice;
295 if (ncontrol->name) {
296 strscpy(kctl->id.name, ncontrol->name, sizeof(kctl->id.name));
297 if (strcmp(ncontrol->name, kctl->id.name) != 0)
298 pr_warn("ALSA: Control name '%s' truncated to '%s'\n",
299 ncontrol->name, kctl->id.name);
301 kctl->id.index = ncontrol->index;
303 kctl->info = ncontrol->info;
304 kctl->get = ncontrol->get;
305 kctl->put = ncontrol->put;
306 kctl->tlv.p = ncontrol->tlv.p;
308 kctl->private_value = ncontrol->private_value;
309 kctl->private_data = private_data;
313 EXPORT_SYMBOL(snd_ctl_new1);
316 * snd_ctl_free_one - release the control instance
317 * @kcontrol: the control instance
319 * Releases the control instance created via snd_ctl_new()
321 * Don't call this after the control was added to the card.
323 void snd_ctl_free_one(struct snd_kcontrol *kcontrol)
326 if (kcontrol->private_free)
327 kcontrol->private_free(kcontrol);
331 EXPORT_SYMBOL(snd_ctl_free_one);
333 static bool snd_ctl_remove_numid_conflict(struct snd_card *card,
336 struct snd_kcontrol *kctl;
338 /* Make sure that the ids assigned to the control do not wrap around */
339 if (card->last_numid >= UINT_MAX - count)
340 card->last_numid = 0;
342 list_for_each_entry(kctl, &card->controls, list) {
343 if (kctl->id.numid < card->last_numid + 1 + count &&
344 kctl->id.numid + kctl->count > card->last_numid + 1) {
345 card->last_numid = kctl->id.numid + kctl->count - 1;
352 static int snd_ctl_find_hole(struct snd_card *card, unsigned int count)
354 unsigned int iter = 100000;
356 while (snd_ctl_remove_numid_conflict(card, count)) {
358 /* this situation is very unlikely */
359 dev_err(card->dev, "unable to allocate new control numid\n");
366 /* check whether the given id is contained in the given kctl */
367 static bool elem_id_matches(const struct snd_kcontrol *kctl,
368 const struct snd_ctl_elem_id *id)
370 return kctl->id.iface == id->iface &&
371 kctl->id.device == id->device &&
372 kctl->id.subdevice == id->subdevice &&
373 !strncmp(kctl->id.name, id->name, sizeof(kctl->id.name)) &&
374 kctl->id.index <= id->index &&
375 kctl->id.index + kctl->count > id->index;
378 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
379 /* Compute a hash key for the corresponding ctl id
380 * It's for the name lookup, hence the numid is excluded.
381 * The hash key is bound in LONG_MAX to be used for Xarray key.
383 #define MULTIPLIER 37
384 static unsigned long get_ctl_id_hash(const struct snd_ctl_elem_id *id)
390 h = MULTIPLIER * h + id->device;
391 h = MULTIPLIER * h + id->subdevice;
392 for (i = 0; i < SNDRV_CTL_ELEM_ID_NAME_MAXLEN && id->name[i]; i++)
393 h = MULTIPLIER * h + id->name[i];
394 h = MULTIPLIER * h + id->index;
399 /* add hash entries to numid and ctl xarray tables */
400 static void add_hash_entries(struct snd_card *card,
401 struct snd_kcontrol *kcontrol)
403 struct snd_ctl_elem_id id = kcontrol->id;
406 xa_store_range(&card->ctl_numids, kcontrol->id.numid,
407 kcontrol->id.numid + kcontrol->count - 1,
408 kcontrol, GFP_KERNEL);
410 for (i = 0; i < kcontrol->count; i++) {
411 id.index = kcontrol->id.index + i;
412 if (xa_insert(&card->ctl_hash, get_ctl_id_hash(&id),
413 kcontrol, GFP_KERNEL)) {
414 /* skip hash for this entry, noting we had collision */
415 card->ctl_hash_collision = true;
416 dev_dbg(card->dev, "ctl_hash collision %d:%s:%d\n",
417 id.iface, id.name, id.index);
422 /* remove hash entries that have been added */
423 static void remove_hash_entries(struct snd_card *card,
424 struct snd_kcontrol *kcontrol)
426 struct snd_ctl_elem_id id = kcontrol->id;
427 struct snd_kcontrol *matched;
431 for (i = 0; i < kcontrol->count; i++) {
432 xa_erase(&card->ctl_numids, id.numid);
433 h = get_ctl_id_hash(&id);
434 matched = xa_load(&card->ctl_hash, h);
435 if (matched && (matched == kcontrol ||
436 elem_id_matches(matched, &id)))
437 xa_erase(&card->ctl_hash, h);
442 #else /* CONFIG_SND_CTL_FAST_LOOKUP */
443 static inline void add_hash_entries(struct snd_card *card,
444 struct snd_kcontrol *kcontrol)
447 static inline void remove_hash_entries(struct snd_card *card,
448 struct snd_kcontrol *kcontrol)
451 #endif /* CONFIG_SND_CTL_FAST_LOOKUP */
453 enum snd_ctl_add_mode {
454 CTL_ADD_EXCLUSIVE, CTL_REPLACE, CTL_ADD_ON_REPLACE,
457 /* add/replace a new kcontrol object; call with card->controls_rwsem locked */
458 static int __snd_ctl_add_replace(struct snd_card *card,
459 struct snd_kcontrol *kcontrol,
460 enum snd_ctl_add_mode mode)
462 struct snd_ctl_elem_id id;
464 struct snd_kcontrol *old;
467 lockdep_assert_held_write(&card->controls_rwsem);
470 if (id.index > UINT_MAX - kcontrol->count)
473 old = snd_ctl_find_id_locked(card, &id);
475 if (mode == CTL_REPLACE)
478 if (mode == CTL_ADD_EXCLUSIVE) {
480 "control %i:%i:%i:%s:%i is already present\n",
481 id.iface, id.device, id.subdevice, id.name,
486 err = snd_ctl_remove_locked(card, old);
491 if (snd_ctl_find_hole(card, kcontrol->count) < 0)
494 list_add_tail(&kcontrol->list, &card->controls);
495 card->controls_count += kcontrol->count;
496 kcontrol->id.numid = card->last_numid + 1;
497 card->last_numid += kcontrol->count;
499 add_hash_entries(card, kcontrol);
501 for (idx = 0; idx < kcontrol->count; idx++)
502 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_ADD, kcontrol, idx);
507 static int snd_ctl_add_replace(struct snd_card *card,
508 struct snd_kcontrol *kcontrol,
509 enum snd_ctl_add_mode mode)
515 if (snd_BUG_ON(!card || !kcontrol->info))
518 scoped_guard(rwsem_write, &card->controls_rwsem)
519 err = __snd_ctl_add_replace(card, kcontrol, mode);
526 snd_ctl_free_one(kcontrol);
531 * snd_ctl_add - add the control instance to the card
532 * @card: the card instance
533 * @kcontrol: the control instance to add
535 * Adds the control instance created via snd_ctl_new() or
536 * snd_ctl_new1() to the given card. Assigns also an unique
537 * numid used for fast search.
539 * It frees automatically the control which cannot be added.
541 * Return: Zero if successful, or a negative error code on failure.
544 int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
546 return snd_ctl_add_replace(card, kcontrol, CTL_ADD_EXCLUSIVE);
548 EXPORT_SYMBOL(snd_ctl_add);
551 * snd_ctl_replace - replace the control instance of the card
552 * @card: the card instance
553 * @kcontrol: the control instance to replace
554 * @add_on_replace: add the control if not already added
556 * Replaces the given control. If the given control does not exist
557 * and the add_on_replace flag is set, the control is added. If the
558 * control exists, it is destroyed first.
560 * It frees automatically the control which cannot be added or replaced.
562 * Return: Zero if successful, or a negative error code on failure.
564 int snd_ctl_replace(struct snd_card *card, struct snd_kcontrol *kcontrol,
567 return snd_ctl_add_replace(card, kcontrol,
568 add_on_replace ? CTL_ADD_ON_REPLACE : CTL_REPLACE);
570 EXPORT_SYMBOL(snd_ctl_replace);
572 static int __snd_ctl_remove(struct snd_card *card,
573 struct snd_kcontrol *kcontrol,
578 lockdep_assert_held_write(&card->controls_rwsem);
580 if (snd_BUG_ON(!card || !kcontrol))
582 list_del(&kcontrol->list);
585 remove_hash_entries(card, kcontrol);
587 card->controls_count -= kcontrol->count;
588 for (idx = 0; idx < kcontrol->count; idx++)
589 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_REMOVE, kcontrol, idx);
590 snd_ctl_free_one(kcontrol);
594 static inline int snd_ctl_remove_locked(struct snd_card *card,
595 struct snd_kcontrol *kcontrol)
597 return __snd_ctl_remove(card, kcontrol, true);
601 * snd_ctl_remove - remove the control from the card and release it
602 * @card: the card instance
603 * @kcontrol: the control instance to remove
605 * Removes the control from the card and then releases the instance.
606 * You don't need to call snd_ctl_free_one().
608 * Return: 0 if successful, or a negative error code on failure.
610 * Note that this function takes card->controls_rwsem lock internally.
612 int snd_ctl_remove(struct snd_card *card, struct snd_kcontrol *kcontrol)
614 guard(rwsem_write)(&card->controls_rwsem);
615 return snd_ctl_remove_locked(card, kcontrol);
617 EXPORT_SYMBOL(snd_ctl_remove);
620 * snd_ctl_remove_id - remove the control of the given id and release it
621 * @card: the card instance
622 * @id: the control id to remove
624 * Finds the control instance with the given id, removes it from the
625 * card list and releases it.
627 * Return: 0 if successful, or a negative error code on failure.
629 int snd_ctl_remove_id(struct snd_card *card, struct snd_ctl_elem_id *id)
631 struct snd_kcontrol *kctl;
633 guard(rwsem_write)(&card->controls_rwsem);
634 kctl = snd_ctl_find_id_locked(card, id);
637 return snd_ctl_remove_locked(card, kctl);
639 EXPORT_SYMBOL(snd_ctl_remove_id);
642 * snd_ctl_remove_user_ctl - remove and release the unlocked user control
643 * @file: active control handle
644 * @id: the control id to remove
646 * Finds the control instance with the given id, removes it from the
647 * card list and releases it.
649 * Return: 0 if successful, or a negative error code on failure.
651 static int snd_ctl_remove_user_ctl(struct snd_ctl_file * file,
652 struct snd_ctl_elem_id *id)
654 struct snd_card *card = file->card;
655 struct snd_kcontrol *kctl;
658 guard(rwsem_write)(&card->controls_rwsem);
659 kctl = snd_ctl_find_id_locked(card, id);
662 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER))
664 for (idx = 0; idx < kctl->count; idx++)
665 if (kctl->vd[idx].owner != NULL && kctl->vd[idx].owner != file)
667 return snd_ctl_remove_locked(card, kctl);
671 * snd_ctl_activate_id - activate/inactivate the control of the given id
672 * @card: the card instance
673 * @id: the control id to activate/inactivate
674 * @active: non-zero to activate
676 * Finds the control instance with the given id, and activate or
677 * inactivate the control together with notification, if changed.
678 * The given ID data is filled with full information.
680 * Return: 0 if unchanged, 1 if changed, or a negative error code on failure.
682 int snd_ctl_activate_id(struct snd_card *card, struct snd_ctl_elem_id *id,
685 struct snd_kcontrol *kctl;
686 struct snd_kcontrol_volatile *vd;
687 unsigned int index_offset;
690 down_write(&card->controls_rwsem);
691 kctl = snd_ctl_find_id_locked(card, id);
696 index_offset = snd_ctl_get_ioff(kctl, id);
697 vd = &kctl->vd[index_offset];
700 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE))
702 vd->access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE;
704 if (vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)
706 vd->access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
708 snd_ctl_build_ioff(id, kctl, index_offset);
709 downgrade_write(&card->controls_rwsem);
710 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_INFO, kctl, index_offset);
711 up_read(&card->controls_rwsem);
715 up_write(&card->controls_rwsem);
718 EXPORT_SYMBOL_GPL(snd_ctl_activate_id);
721 * snd_ctl_rename_id - replace the id of a control on the card
722 * @card: the card instance
723 * @src_id: the old id
724 * @dst_id: the new id
726 * Finds the control with the old id from the card, and replaces the
727 * id with the new one.
729 * The function tries to keep the already assigned numid while replacing
732 * Note that this function should be used only in the card initialization
733 * phase. Calling after the card instantiation may cause issues with
734 * user-space expecting persistent numids.
736 * Return: Zero if successful, or a negative error code on failure.
738 int snd_ctl_rename_id(struct snd_card *card, struct snd_ctl_elem_id *src_id,
739 struct snd_ctl_elem_id *dst_id)
741 struct snd_kcontrol *kctl;
744 guard(rwsem_write)(&card->controls_rwsem);
745 kctl = snd_ctl_find_id_locked(card, src_id);
748 saved_numid = kctl->id.numid;
749 remove_hash_entries(card, kctl);
751 kctl->id.numid = saved_numid;
752 add_hash_entries(card, kctl);
755 EXPORT_SYMBOL(snd_ctl_rename_id);
758 * snd_ctl_rename - rename the control on the card
759 * @card: the card instance
760 * @kctl: the control to rename
761 * @name: the new name
763 * Renames the specified control on the card to the new name.
765 * Note that this function takes card->controls_rwsem lock internally.
767 void snd_ctl_rename(struct snd_card *card, struct snd_kcontrol *kctl,
770 guard(rwsem_write)(&card->controls_rwsem);
771 remove_hash_entries(card, kctl);
773 if (strscpy(kctl->id.name, name, sizeof(kctl->id.name)) < 0)
774 pr_warn("ALSA: Renamed control new name '%s' truncated to '%s'\n",
775 name, kctl->id.name);
777 add_hash_entries(card, kctl);
779 EXPORT_SYMBOL(snd_ctl_rename);
781 #ifndef CONFIG_SND_CTL_FAST_LOOKUP
782 static struct snd_kcontrol *
783 snd_ctl_find_numid_slow(struct snd_card *card, unsigned int numid)
785 struct snd_kcontrol *kctl;
787 list_for_each_entry(kctl, &card->controls, list) {
788 if (kctl->id.numid <= numid && kctl->id.numid + kctl->count > numid)
793 #endif /* !CONFIG_SND_CTL_FAST_LOOKUP */
796 * snd_ctl_find_numid_locked - find the control instance with the given number-id
797 * @card: the card instance
798 * @numid: the number-id to search
800 * Finds the control instance with the given number-id from the card.
802 * The caller must down card->controls_rwsem before calling this function
803 * (if the race condition can happen).
805 * Return: The pointer of the instance if found, or %NULL if not.
807 struct snd_kcontrol *
808 snd_ctl_find_numid_locked(struct snd_card *card, unsigned int numid)
810 if (snd_BUG_ON(!card || !numid))
812 lockdep_assert_held(&card->controls_rwsem);
813 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
814 return xa_load(&card->ctl_numids, numid);
816 return snd_ctl_find_numid_slow(card, numid);
819 EXPORT_SYMBOL(snd_ctl_find_numid_locked);
822 * snd_ctl_find_numid - find the control instance with the given number-id
823 * @card: the card instance
824 * @numid: the number-id to search
826 * Finds the control instance with the given number-id from the card.
828 * Return: The pointer of the instance if found, or %NULL if not.
830 * Note that this function takes card->controls_rwsem lock internally.
832 struct snd_kcontrol *snd_ctl_find_numid(struct snd_card *card,
835 guard(rwsem_read)(&card->controls_rwsem);
836 return snd_ctl_find_numid_locked(card, numid);
838 EXPORT_SYMBOL(snd_ctl_find_numid);
841 * snd_ctl_find_id_locked - find the control instance with the given id
842 * @card: the card instance
843 * @id: the id to search
845 * Finds the control instance with the given id from the card.
847 * The caller must down card->controls_rwsem before calling this function
848 * (if the race condition can happen).
850 * Return: The pointer of the instance if found, or %NULL if not.
852 struct snd_kcontrol *snd_ctl_find_id_locked(struct snd_card *card,
853 const struct snd_ctl_elem_id *id)
855 struct snd_kcontrol *kctl;
857 if (snd_BUG_ON(!card || !id))
859 lockdep_assert_held(&card->controls_rwsem);
861 return snd_ctl_find_numid_locked(card, id->numid);
862 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
863 kctl = xa_load(&card->ctl_hash, get_ctl_id_hash(id));
864 if (kctl && elem_id_matches(kctl, id))
866 if (!card->ctl_hash_collision)
867 return NULL; /* we can rely on only hash table */
869 /* no matching in hash table - try all as the last resort */
870 list_for_each_entry(kctl, &card->controls, list)
871 if (elem_id_matches(kctl, id))
876 EXPORT_SYMBOL(snd_ctl_find_id_locked);
879 * snd_ctl_find_id - find the control instance with the given id
880 * @card: the card instance
881 * @id: the id to search
883 * Finds the control instance with the given id from the card.
885 * Return: The pointer of the instance if found, or %NULL if not.
887 * Note that this function takes card->controls_rwsem lock internally.
889 struct snd_kcontrol *snd_ctl_find_id(struct snd_card *card,
890 const struct snd_ctl_elem_id *id)
892 guard(rwsem_read)(&card->controls_rwsem);
893 return snd_ctl_find_id_locked(card, id);
895 EXPORT_SYMBOL(snd_ctl_find_id);
897 static int snd_ctl_card_info(struct snd_card *card, struct snd_ctl_file * ctl,
898 unsigned int cmd, void __user *arg)
900 struct snd_ctl_card_info *info __free(kfree) = NULL;
902 info = kzalloc(sizeof(*info), GFP_KERNEL);
905 scoped_guard(rwsem_read, &snd_ioctl_rwsem) {
906 info->card = card->number;
907 strscpy(info->id, card->id, sizeof(info->id));
908 strscpy(info->driver, card->driver, sizeof(info->driver));
909 strscpy(info->name, card->shortname, sizeof(info->name));
910 strscpy(info->longname, card->longname, sizeof(info->longname));
911 strscpy(info->mixername, card->mixername, sizeof(info->mixername));
912 strscpy(info->components, card->components, sizeof(info->components));
914 if (copy_to_user(arg, info, sizeof(struct snd_ctl_card_info)))
919 static int snd_ctl_elem_list(struct snd_card *card,
920 struct snd_ctl_elem_list *list)
922 struct snd_kcontrol *kctl;
923 struct snd_ctl_elem_id id;
924 unsigned int offset, space, jidx;
926 offset = list->offset;
929 guard(rwsem_read)(&card->controls_rwsem);
930 list->count = card->controls_count;
934 list_for_each_entry(kctl, &card->controls, list) {
935 if (offset >= kctl->count) {
936 offset -= kctl->count;
939 for (jidx = offset; jidx < kctl->count; jidx++) {
940 snd_ctl_build_ioff(&id, kctl, jidx);
941 if (copy_to_user(list->pids + list->used, &id, sizeof(id)))
952 static int snd_ctl_elem_list_user(struct snd_card *card,
953 struct snd_ctl_elem_list __user *_list)
955 struct snd_ctl_elem_list list;
958 if (copy_from_user(&list, _list, sizeof(list)))
960 err = snd_ctl_elem_list(card, &list);
963 if (copy_to_user(_list, &list, sizeof(list)))
969 /* Check whether the given kctl info is valid */
970 static int snd_ctl_check_elem_info(struct snd_card *card,
971 const struct snd_ctl_elem_info *info)
973 static const unsigned int max_value_counts[] = {
974 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = 128,
975 [SNDRV_CTL_ELEM_TYPE_INTEGER] = 128,
976 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = 128,
977 [SNDRV_CTL_ELEM_TYPE_BYTES] = 512,
978 [SNDRV_CTL_ELEM_TYPE_IEC958] = 1,
979 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = 64,
982 if (info->type < SNDRV_CTL_ELEM_TYPE_BOOLEAN ||
983 info->type > SNDRV_CTL_ELEM_TYPE_INTEGER64) {
986 "control %i:%i:%i:%s:%i: invalid type %d\n",
987 info->id.iface, info->id.device,
988 info->id.subdevice, info->id.name,
989 info->id.index, info->type);
992 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED &&
993 info->value.enumerated.items == 0) {
996 "control %i:%i:%i:%s:%i: zero enum items\n",
997 info->id.iface, info->id.device,
998 info->id.subdevice, info->id.name,
1002 if (info->count > max_value_counts[info->type]) {
1005 "control %i:%i:%i:%s:%i: invalid count %d\n",
1006 info->id.iface, info->id.device,
1007 info->id.subdevice, info->id.name,
1008 info->id.index, info->count);
1015 /* The capacity of struct snd_ctl_elem_value.value.*/
1016 static const unsigned int value_sizes[] = {
1017 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = sizeof(long),
1018 [SNDRV_CTL_ELEM_TYPE_INTEGER] = sizeof(long),
1019 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = sizeof(unsigned int),
1020 [SNDRV_CTL_ELEM_TYPE_BYTES] = sizeof(unsigned char),
1021 [SNDRV_CTL_ELEM_TYPE_IEC958] = sizeof(struct snd_aes_iec958),
1022 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = sizeof(long long),
1025 /* fill the remaining snd_ctl_elem_value data with the given pattern */
1026 static void fill_remaining_elem_value(struct snd_ctl_elem_value *control,
1027 struct snd_ctl_elem_info *info,
1030 size_t offset = value_sizes[info->type] * info->count;
1032 offset = DIV_ROUND_UP(offset, sizeof(u32));
1033 memset32((u32 *)control->value.bytes.data + offset, pattern,
1034 sizeof(control->value) / sizeof(u32) - offset);
1037 /* check whether the given integer ctl value is valid */
1038 static int sanity_check_int_value(struct snd_card *card,
1039 const struct snd_ctl_elem_value *control,
1040 const struct snd_ctl_elem_info *info,
1041 int i, bool print_error)
1043 long long lval, lmin, lmax, lstep;
1046 switch (info->type) {
1048 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1049 lval = control->value.integer.value[i];
1054 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1055 lval = control->value.integer.value[i];
1056 lmin = info->value.integer.min;
1057 lmax = info->value.integer.max;
1058 lstep = info->value.integer.step;
1060 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1061 lval = control->value.integer64.value[i];
1062 lmin = info->value.integer64.min;
1063 lmax = info->value.integer64.max;
1064 lstep = info->value.integer64.step;
1066 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1067 lval = control->value.enumerated.item[i];
1069 lmax = info->value.enumerated.items - 1;
1074 if (lval < lmin || lval > lmax) {
1077 "control %i:%i:%i:%s:%i: value out of range %lld (%lld/%lld) at count %i\n",
1078 control->id.iface, control->id.device,
1079 control->id.subdevice, control->id.name,
1080 control->id.index, lval, lmin, lmax, i);
1084 div64_u64_rem(lval, lstep, &rem);
1088 "control %i:%i:%i:%s:%i: unaligned value %lld (step %lld) at count %i\n",
1089 control->id.iface, control->id.device,
1090 control->id.subdevice, control->id.name,
1091 control->id.index, lval, lstep, i);
1099 /* check whether the all input values are valid for the given elem value */
1100 static int sanity_check_input_values(struct snd_card *card,
1101 const struct snd_ctl_elem_value *control,
1102 const struct snd_ctl_elem_info *info,
1107 switch (info->type) {
1108 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1109 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1110 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1111 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1112 for (i = 0; i < info->count; i++) {
1113 ret = sanity_check_int_value(card, control, info, i,
1126 /* perform sanity checks to the given snd_ctl_elem_value object */
1127 static int sanity_check_elem_value(struct snd_card *card,
1128 const struct snd_ctl_elem_value *control,
1129 const struct snd_ctl_elem_info *info,
1136 ret = sanity_check_input_values(card, control, info, true);
1140 /* check whether the remaining area kept untouched */
1141 offset = value_sizes[info->type] * info->count;
1142 offset = DIV_ROUND_UP(offset, sizeof(u32));
1143 p = (u32 *)control->value.bytes.data + offset;
1144 for (; offset < sizeof(control->value) / sizeof(u32); offset++, p++) {
1145 if (*p != pattern) {
1149 *p = 0; /* clear the checked area */
1155 static int __snd_ctl_elem_info(struct snd_card *card,
1156 struct snd_kcontrol *kctl,
1157 struct snd_ctl_elem_info *info,
1158 struct snd_ctl_file *ctl)
1160 struct snd_kcontrol_volatile *vd;
1161 unsigned int index_offset;
1164 #ifdef CONFIG_SND_DEBUG
1167 result = snd_power_ref_and_wait(card);
1169 result = kctl->info(kctl, info);
1170 snd_power_unref(card);
1172 snd_BUG_ON(info->access);
1173 index_offset = snd_ctl_get_ioff(kctl, &info->id);
1174 vd = &kctl->vd[index_offset];
1175 snd_ctl_build_ioff(&info->id, kctl, index_offset);
1176 info->access = vd->access;
1178 info->access |= SNDRV_CTL_ELEM_ACCESS_LOCK;
1179 if (vd->owner == ctl)
1180 info->access |= SNDRV_CTL_ELEM_ACCESS_OWNER;
1181 info->owner = pid_vnr(vd->owner->pid);
1185 if (!snd_ctl_skip_validation(info) &&
1186 snd_ctl_check_elem_info(card, info) < 0)
1192 static int snd_ctl_elem_info(struct snd_ctl_file *ctl,
1193 struct snd_ctl_elem_info *info)
1195 struct snd_card *card = ctl->card;
1196 struct snd_kcontrol *kctl;
1198 guard(rwsem_read)(&card->controls_rwsem);
1199 kctl = snd_ctl_find_id_locked(card, &info->id);
1202 return __snd_ctl_elem_info(card, kctl, info, ctl);
1205 static int snd_ctl_elem_info_user(struct snd_ctl_file *ctl,
1206 struct snd_ctl_elem_info __user *_info)
1208 struct snd_ctl_elem_info info;
1211 if (copy_from_user(&info, _info, sizeof(info)))
1213 result = snd_ctl_elem_info(ctl, &info);
1216 /* drop internal access flags */
1217 info.access &= ~(SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK|
1218 SNDRV_CTL_ELEM_ACCESS_LED_MASK);
1219 if (copy_to_user(_info, &info, sizeof(info)))
1224 static int snd_ctl_elem_read(struct snd_card *card,
1225 struct snd_ctl_elem_value *control)
1227 struct snd_kcontrol *kctl;
1228 struct snd_kcontrol_volatile *vd;
1229 unsigned int index_offset;
1230 struct snd_ctl_elem_info info;
1231 const u32 pattern = 0xdeadbeef;
1234 guard(rwsem_read)(&card->controls_rwsem);
1235 kctl = snd_ctl_find_id_locked(card, &control->id);
1239 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1240 vd = &kctl->vd[index_offset];
1241 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_READ) || !kctl->get)
1244 snd_ctl_build_ioff(&control->id, kctl, index_offset);
1246 #ifdef CONFIG_SND_CTL_DEBUG
1247 /* info is needed only for validation */
1248 memset(&info, 0, sizeof(info));
1249 info.id = control->id;
1250 ret = __snd_ctl_elem_info(card, kctl, &info, NULL);
1255 if (!snd_ctl_skip_validation(&info))
1256 fill_remaining_elem_value(control, &info, pattern);
1257 ret = snd_power_ref_and_wait(card);
1259 ret = kctl->get(kctl, control);
1260 snd_power_unref(card);
1263 if (!snd_ctl_skip_validation(&info) &&
1264 sanity_check_elem_value(card, control, &info, pattern) < 0) {
1266 "control %i:%i:%i:%s:%i: access overflow\n",
1267 control->id.iface, control->id.device,
1268 control->id.subdevice, control->id.name,
1275 static int snd_ctl_elem_read_user(struct snd_card *card,
1276 struct snd_ctl_elem_value __user *_control)
1278 struct snd_ctl_elem_value *control __free(kfree) = NULL;
1281 control = memdup_user(_control, sizeof(*control));
1282 if (IS_ERR(control))
1283 return PTR_ERR(no_free_ptr(control));
1285 result = snd_ctl_elem_read(card, control);
1289 if (copy_to_user(_control, control, sizeof(*control)))
1294 static int snd_ctl_elem_write(struct snd_card *card, struct snd_ctl_file *file,
1295 struct snd_ctl_elem_value *control)
1297 struct snd_kcontrol *kctl;
1298 struct snd_kcontrol_volatile *vd;
1299 unsigned int index_offset;
1302 down_write(&card->controls_rwsem);
1303 kctl = snd_ctl_find_id_locked(card, &control->id);
1305 up_write(&card->controls_rwsem);
1309 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1310 vd = &kctl->vd[index_offset];
1311 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_WRITE) || kctl->put == NULL ||
1312 (file && vd->owner && vd->owner != file)) {
1313 up_write(&card->controls_rwsem);
1317 snd_ctl_build_ioff(&control->id, kctl, index_offset);
1318 result = snd_power_ref_and_wait(card);
1319 /* validate input values */
1320 if (IS_ENABLED(CONFIG_SND_CTL_INPUT_VALIDATION) && !result) {
1321 struct snd_ctl_elem_info info;
1323 memset(&info, 0, sizeof(info));
1324 info.id = control->id;
1325 result = __snd_ctl_elem_info(card, kctl, &info, NULL);
1327 result = sanity_check_input_values(card, control, &info,
1331 result = kctl->put(kctl, control);
1332 snd_power_unref(card);
1334 up_write(&card->controls_rwsem);
1339 downgrade_write(&card->controls_rwsem);
1340 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_VALUE, kctl, index_offset);
1341 up_read(&card->controls_rwsem);
1343 up_write(&card->controls_rwsem);
1349 static int snd_ctl_elem_write_user(struct snd_ctl_file *file,
1350 struct snd_ctl_elem_value __user *_control)
1352 struct snd_ctl_elem_value *control __free(kfree) = NULL;
1353 struct snd_card *card;
1356 control = memdup_user(_control, sizeof(*control));
1357 if (IS_ERR(control))
1358 return PTR_ERR(no_free_ptr(control));
1361 result = snd_ctl_elem_write(card, file, control);
1365 if (copy_to_user(_control, control, sizeof(*control)))
1370 static int snd_ctl_elem_lock(struct snd_ctl_file *file,
1371 struct snd_ctl_elem_id __user *_id)
1373 struct snd_card *card = file->card;
1374 struct snd_ctl_elem_id id;
1375 struct snd_kcontrol *kctl;
1376 struct snd_kcontrol_volatile *vd;
1378 if (copy_from_user(&id, _id, sizeof(id)))
1380 guard(rwsem_write)(&card->controls_rwsem);
1381 kctl = snd_ctl_find_id_locked(card, &id);
1384 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1391 static int snd_ctl_elem_unlock(struct snd_ctl_file *file,
1392 struct snd_ctl_elem_id __user *_id)
1394 struct snd_card *card = file->card;
1395 struct snd_ctl_elem_id id;
1396 struct snd_kcontrol *kctl;
1397 struct snd_kcontrol_volatile *vd;
1399 if (copy_from_user(&id, _id, sizeof(id)))
1401 guard(rwsem_write)(&card->controls_rwsem);
1402 kctl = snd_ctl_find_id_locked(card, &id);
1405 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1408 if (vd->owner != file)
1414 struct user_element {
1415 struct snd_ctl_elem_info info;
1416 struct snd_card *card;
1417 char *elem_data; /* element data */
1418 unsigned long elem_data_size; /* size of element data in bytes */
1419 void *tlv_data; /* TLV data */
1420 unsigned long tlv_data_size; /* TLV data size */
1421 void *priv_data; /* private data (like strings for enumerated type) */
1424 // check whether the addition (in bytes) of user ctl element may overflow the limit.
1425 static bool check_user_elem_overflow(struct snd_card *card, ssize_t add)
1427 return (ssize_t)card->user_ctl_alloc_size + add > max_user_ctl_alloc_size;
1430 static int snd_ctl_elem_user_info(struct snd_kcontrol *kcontrol,
1431 struct snd_ctl_elem_info *uinfo)
1433 struct user_element *ue = kcontrol->private_data;
1434 unsigned int offset;
1436 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1438 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1443 static int snd_ctl_elem_user_enum_info(struct snd_kcontrol *kcontrol,
1444 struct snd_ctl_elem_info *uinfo)
1446 struct user_element *ue = kcontrol->private_data;
1449 unsigned int offset;
1451 item = uinfo->value.enumerated.item;
1453 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1455 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1457 item = min(item, uinfo->value.enumerated.items - 1);
1458 uinfo->value.enumerated.item = item;
1460 names = ue->priv_data;
1461 for (; item > 0; --item)
1462 names += strlen(names) + 1;
1463 strcpy(uinfo->value.enumerated.name, names);
1468 static int snd_ctl_elem_user_get(struct snd_kcontrol *kcontrol,
1469 struct snd_ctl_elem_value *ucontrol)
1471 struct user_element *ue = kcontrol->private_data;
1472 unsigned int size = ue->elem_data_size;
1473 char *src = ue->elem_data +
1474 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1476 memcpy(&ucontrol->value, src, size);
1480 static int snd_ctl_elem_user_put(struct snd_kcontrol *kcontrol,
1481 struct snd_ctl_elem_value *ucontrol)
1484 struct user_element *ue = kcontrol->private_data;
1485 unsigned int size = ue->elem_data_size;
1486 char *dst = ue->elem_data +
1487 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1489 change = memcmp(&ucontrol->value, dst, size) != 0;
1491 memcpy(dst, &ucontrol->value, size);
1495 /* called in controls_rwsem write lock */
1496 static int replace_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1499 struct user_element *ue = kctl->private_data;
1500 unsigned int *container;
1501 unsigned int mask = 0;
1505 lockdep_assert_held_write(&ue->card->controls_rwsem);
1507 if (size > 1024 * 128) /* sane value */
1510 // does the TLV size change cause overflow?
1511 if (check_user_elem_overflow(ue->card, (ssize_t)(size - ue->tlv_data_size)))
1514 container = vmemdup_user(buf, size);
1515 if (IS_ERR(container))
1516 return PTR_ERR(container);
1518 change = ue->tlv_data_size != size;
1520 change = memcmp(ue->tlv_data, container, size) != 0;
1526 if (ue->tlv_data == NULL) {
1527 /* Now TLV data is available. */
1528 for (i = 0; i < kctl->count; ++i)
1529 kctl->vd[i].access |= SNDRV_CTL_ELEM_ACCESS_TLV_READ;
1530 mask = SNDRV_CTL_EVENT_MASK_INFO;
1532 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1533 ue->tlv_data_size = 0;
1534 kvfree(ue->tlv_data);
1537 ue->tlv_data = container;
1538 ue->tlv_data_size = size;
1539 // decremented at private_free.
1540 ue->card->user_ctl_alloc_size += size;
1542 mask |= SNDRV_CTL_EVENT_MASK_TLV;
1543 for (i = 0; i < kctl->count; ++i)
1544 snd_ctl_notify_one(ue->card, mask, kctl, i);
1549 static int read_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1552 struct user_element *ue = kctl->private_data;
1554 if (ue->tlv_data_size == 0 || ue->tlv_data == NULL)
1557 if (size < ue->tlv_data_size)
1560 if (copy_to_user(buf, ue->tlv_data, ue->tlv_data_size))
1566 static int snd_ctl_elem_user_tlv(struct snd_kcontrol *kctl, int op_flag,
1567 unsigned int size, unsigned int __user *buf)
1569 if (op_flag == SNDRV_CTL_TLV_OP_WRITE)
1570 return replace_user_tlv(kctl, buf, size);
1572 return read_user_tlv(kctl, buf, size);
1575 /* called in controls_rwsem write lock */
1576 static int snd_ctl_elem_init_enum_names(struct user_element *ue)
1579 size_t buf_len, name_len;
1581 const uintptr_t user_ptrval = ue->info.value.enumerated.names_ptr;
1583 lockdep_assert_held_write(&ue->card->controls_rwsem);
1585 buf_len = ue->info.value.enumerated.names_length;
1586 if (buf_len > 64 * 1024)
1589 if (check_user_elem_overflow(ue->card, buf_len))
1591 names = vmemdup_user((const void __user *)user_ptrval, buf_len);
1593 return PTR_ERR(names);
1595 /* check that there are enough valid names */
1597 for (i = 0; i < ue->info.value.enumerated.items; ++i) {
1598 name_len = strnlen(p, buf_len);
1599 if (name_len == 0 || name_len >= 64 || name_len == buf_len) {
1604 buf_len -= name_len + 1;
1607 ue->priv_data = names;
1608 ue->info.value.enumerated.names_ptr = 0;
1609 // increment the allocation size; decremented again at private_free.
1610 ue->card->user_ctl_alloc_size += ue->info.value.enumerated.names_length;
1615 static size_t compute_user_elem_size(size_t size, unsigned int count)
1617 return sizeof(struct user_element) + size * count;
1620 static void snd_ctl_elem_user_free(struct snd_kcontrol *kcontrol)
1622 struct user_element *ue = kcontrol->private_data;
1624 // decrement the allocation size.
1625 ue->card->user_ctl_alloc_size -= compute_user_elem_size(ue->elem_data_size, kcontrol->count);
1626 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1628 ue->card->user_ctl_alloc_size -= ue->info.value.enumerated.names_length;
1630 kvfree(ue->tlv_data);
1631 kvfree(ue->priv_data);
1635 static int snd_ctl_elem_add(struct snd_ctl_file *file,
1636 struct snd_ctl_elem_info *info, int replace)
1638 struct snd_card *card = file->card;
1639 struct snd_kcontrol *kctl;
1641 unsigned int access;
1644 struct user_element *ue;
1645 unsigned int offset;
1648 if (!*info->id.name)
1650 if (strnlen(info->id.name, sizeof(info->id.name)) >= sizeof(info->id.name))
1653 /* Delete a control to replace them if needed. */
1656 err = snd_ctl_remove_user_ctl(file, &info->id);
1661 /* Check the number of elements for this userspace control. */
1662 count = info->owner;
1666 /* Arrange access permissions if needed. */
1667 access = info->access;
1669 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
1670 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
1671 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
1672 SNDRV_CTL_ELEM_ACCESS_TLV_WRITE);
1674 /* In initial state, nothing is available as TLV container. */
1675 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1676 access |= SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK;
1677 access |= SNDRV_CTL_ELEM_ACCESS_USER;
1680 * Check information and calculate the size of data specific to
1681 * this userspace control.
1683 /* pass NULL to card for suppressing error messages */
1684 err = snd_ctl_check_elem_info(NULL, info);
1687 /* user-space control doesn't allow zero-size data */
1688 if (info->count < 1)
1690 private_size = value_sizes[info->type] * info->count;
1691 alloc_size = compute_user_elem_size(private_size, count);
1693 guard(rwsem_write)(&card->controls_rwsem);
1694 if (check_user_elem_overflow(card, alloc_size))
1698 * Keep memory object for this userspace control. After passing this
1699 * code block, the instance should be freed by snd_ctl_free_one().
1701 * Note that these elements in this control are locked.
1703 err = snd_ctl_new(&kctl, count, access, file);
1706 memcpy(&kctl->id, &info->id, sizeof(kctl->id));
1707 ue = kzalloc(alloc_size, GFP_KERNEL);
1712 kctl->private_data = ue;
1713 kctl->private_free = snd_ctl_elem_user_free;
1715 // increment the allocated size; decremented again at private_free.
1716 card->user_ctl_alloc_size += alloc_size;
1718 /* Set private data for this userspace control. */
1721 ue->info.access = 0;
1722 ue->elem_data = (char *)ue + sizeof(*ue);
1723 ue->elem_data_size = private_size;
1724 if (ue->info.type == SNDRV_CTL_ELEM_TYPE_ENUMERATED) {
1725 err = snd_ctl_elem_init_enum_names(ue);
1727 snd_ctl_free_one(kctl);
1732 /* Set callback functions. */
1733 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED)
1734 kctl->info = snd_ctl_elem_user_enum_info;
1736 kctl->info = snd_ctl_elem_user_info;
1737 if (access & SNDRV_CTL_ELEM_ACCESS_READ)
1738 kctl->get = snd_ctl_elem_user_get;
1739 if (access & SNDRV_CTL_ELEM_ACCESS_WRITE)
1740 kctl->put = snd_ctl_elem_user_put;
1741 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1742 kctl->tlv.c = snd_ctl_elem_user_tlv;
1744 /* This function manage to free the instance on failure. */
1745 err = __snd_ctl_add_replace(card, kctl, CTL_ADD_EXCLUSIVE);
1747 snd_ctl_free_one(kctl);
1750 offset = snd_ctl_get_ioff(kctl, &info->id);
1751 snd_ctl_build_ioff(&info->id, kctl, offset);
1753 * Here we cannot fill any field for the number of elements added by
1754 * this operation because there're no specific fields. The usage of
1755 * 'owner' field for this purpose may cause any bugs to userspace
1756 * applications because the field originally means PID of a process
1757 * which locks the element.
1762 static int snd_ctl_elem_add_user(struct snd_ctl_file *file,
1763 struct snd_ctl_elem_info __user *_info, int replace)
1765 struct snd_ctl_elem_info info;
1768 if (copy_from_user(&info, _info, sizeof(info)))
1770 err = snd_ctl_elem_add(file, &info, replace);
1773 if (copy_to_user(_info, &info, sizeof(info))) {
1774 snd_ctl_remove_user_ctl(file, &info.id);
1781 static int snd_ctl_elem_remove(struct snd_ctl_file *file,
1782 struct snd_ctl_elem_id __user *_id)
1784 struct snd_ctl_elem_id id;
1786 if (copy_from_user(&id, _id, sizeof(id)))
1788 return snd_ctl_remove_user_ctl(file, &id);
1791 static int snd_ctl_subscribe_events(struct snd_ctl_file *file, int __user *ptr)
1794 if (get_user(subscribe, ptr))
1796 if (subscribe < 0) {
1797 subscribe = file->subscribed;
1798 if (put_user(subscribe, ptr))
1803 file->subscribed = 1;
1805 } else if (file->subscribed) {
1806 snd_ctl_empty_read_queue(file);
1807 file->subscribed = 0;
1812 static int call_tlv_handler(struct snd_ctl_file *file, int op_flag,
1813 struct snd_kcontrol *kctl,
1814 struct snd_ctl_elem_id *id,
1815 unsigned int __user *buf, unsigned int size)
1817 static const struct {
1821 {SNDRV_CTL_TLV_OP_READ, SNDRV_CTL_ELEM_ACCESS_TLV_READ},
1822 {SNDRV_CTL_TLV_OP_WRITE, SNDRV_CTL_ELEM_ACCESS_TLV_WRITE},
1823 {SNDRV_CTL_TLV_OP_CMD, SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND},
1825 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1828 /* Check support of the request for this element. */
1829 for (i = 0; i < ARRAY_SIZE(pairs); ++i) {
1830 if (op_flag == pairs[i].op && (vd->access & pairs[i].perm))
1833 if (i == ARRAY_SIZE(pairs))
1836 if (kctl->tlv.c == NULL)
1839 /* Write and command operations are not allowed for locked element. */
1840 if (op_flag != SNDRV_CTL_TLV_OP_READ &&
1841 vd->owner != NULL && vd->owner != file)
1844 ret = snd_power_ref_and_wait(file->card);
1846 ret = kctl->tlv.c(kctl, op_flag, size, buf);
1847 snd_power_unref(file->card);
1851 static int read_tlv_buf(struct snd_kcontrol *kctl, struct snd_ctl_elem_id *id,
1852 unsigned int __user *buf, unsigned int size)
1854 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1857 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ))
1860 if (kctl->tlv.p == NULL)
1863 len = sizeof(unsigned int) * 2 + kctl->tlv.p[1];
1867 if (copy_to_user(buf, kctl->tlv.p, len))
1873 static int snd_ctl_tlv_ioctl(struct snd_ctl_file *file,
1874 struct snd_ctl_tlv __user *buf,
1877 struct snd_ctl_tlv header;
1878 unsigned int __user *container;
1879 unsigned int container_size;
1880 struct snd_kcontrol *kctl;
1881 struct snd_ctl_elem_id id;
1882 struct snd_kcontrol_volatile *vd;
1884 lockdep_assert_held(&file->card->controls_rwsem);
1886 if (copy_from_user(&header, buf, sizeof(header)))
1889 /* In design of control core, numerical ID starts at 1. */
1890 if (header.numid == 0)
1893 /* At least, container should include type and length fields. */
1894 if (header.length < sizeof(unsigned int) * 2)
1896 container_size = header.length;
1897 container = buf->tlv;
1899 kctl = snd_ctl_find_numid_locked(file->card, header.numid);
1903 /* Calculate index of the element in this set. */
1905 snd_ctl_build_ioff(&id, kctl, header.numid - id.numid);
1906 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1908 if (vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) {
1909 return call_tlv_handler(file, op_flag, kctl, &id, container,
1912 if (op_flag == SNDRV_CTL_TLV_OP_READ) {
1913 return read_tlv_buf(kctl, &id, container,
1918 /* Not supported. */
1922 static long snd_ctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1924 struct snd_ctl_file *ctl;
1925 struct snd_card *card;
1926 struct snd_kctl_ioctl *p;
1927 void __user *argp = (void __user *)arg;
1928 int __user *ip = argp;
1931 ctl = file->private_data;
1933 if (snd_BUG_ON(!card))
1936 case SNDRV_CTL_IOCTL_PVERSION:
1937 return put_user(SNDRV_CTL_VERSION, ip) ? -EFAULT : 0;
1938 case SNDRV_CTL_IOCTL_CARD_INFO:
1939 return snd_ctl_card_info(card, ctl, cmd, argp);
1940 case SNDRV_CTL_IOCTL_ELEM_LIST:
1941 return snd_ctl_elem_list_user(card, argp);
1942 case SNDRV_CTL_IOCTL_ELEM_INFO:
1943 return snd_ctl_elem_info_user(ctl, argp);
1944 case SNDRV_CTL_IOCTL_ELEM_READ:
1945 return snd_ctl_elem_read_user(card, argp);
1946 case SNDRV_CTL_IOCTL_ELEM_WRITE:
1947 return snd_ctl_elem_write_user(ctl, argp);
1948 case SNDRV_CTL_IOCTL_ELEM_LOCK:
1949 return snd_ctl_elem_lock(ctl, argp);
1950 case SNDRV_CTL_IOCTL_ELEM_UNLOCK:
1951 return snd_ctl_elem_unlock(ctl, argp);
1952 case SNDRV_CTL_IOCTL_ELEM_ADD:
1953 return snd_ctl_elem_add_user(ctl, argp, 0);
1954 case SNDRV_CTL_IOCTL_ELEM_REPLACE:
1955 return snd_ctl_elem_add_user(ctl, argp, 1);
1956 case SNDRV_CTL_IOCTL_ELEM_REMOVE:
1957 return snd_ctl_elem_remove(ctl, argp);
1958 case SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS:
1959 return snd_ctl_subscribe_events(ctl, ip);
1960 case SNDRV_CTL_IOCTL_TLV_READ:
1961 scoped_guard(rwsem_read, &ctl->card->controls_rwsem)
1962 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_READ);
1964 case SNDRV_CTL_IOCTL_TLV_WRITE:
1965 scoped_guard(rwsem_write, &ctl->card->controls_rwsem)
1966 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_WRITE);
1968 case SNDRV_CTL_IOCTL_TLV_COMMAND:
1969 scoped_guard(rwsem_write, &ctl->card->controls_rwsem)
1970 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_CMD);
1972 case SNDRV_CTL_IOCTL_POWER:
1973 return -ENOPROTOOPT;
1974 case SNDRV_CTL_IOCTL_POWER_STATE:
1975 return put_user(SNDRV_CTL_POWER_D0, ip) ? -EFAULT : 0;
1978 guard(rwsem_read)(&snd_ioctl_rwsem);
1979 list_for_each_entry(p, &snd_control_ioctls, list) {
1980 err = p->fioctl(card, ctl, cmd, arg);
1981 if (err != -ENOIOCTLCMD)
1984 dev_dbg(card->dev, "unknown ioctl = 0x%x\n", cmd);
1988 static ssize_t snd_ctl_read(struct file *file, char __user *buffer,
1989 size_t count, loff_t * offset)
1991 struct snd_ctl_file *ctl;
1995 ctl = file->private_data;
1996 if (snd_BUG_ON(!ctl || !ctl->card))
1998 if (!ctl->subscribed)
2000 if (count < sizeof(struct snd_ctl_event))
2002 spin_lock_irq(&ctl->read_lock);
2003 while (count >= sizeof(struct snd_ctl_event)) {
2004 struct snd_ctl_event ev;
2005 struct snd_kctl_event *kev;
2006 while (list_empty(&ctl->events)) {
2007 wait_queue_entry_t wait;
2008 if ((file->f_flags & O_NONBLOCK) != 0 || result > 0) {
2012 init_waitqueue_entry(&wait, current);
2013 add_wait_queue(&ctl->change_sleep, &wait);
2014 set_current_state(TASK_INTERRUPTIBLE);
2015 spin_unlock_irq(&ctl->read_lock);
2017 remove_wait_queue(&ctl->change_sleep, &wait);
2018 if (ctl->card->shutdown)
2020 if (signal_pending(current))
2021 return -ERESTARTSYS;
2022 spin_lock_irq(&ctl->read_lock);
2024 kev = snd_kctl_event(ctl->events.next);
2025 ev.type = SNDRV_CTL_EVENT_ELEM;
2026 ev.data.elem.mask = kev->mask;
2027 ev.data.elem.id = kev->id;
2028 list_del(&kev->list);
2029 spin_unlock_irq(&ctl->read_lock);
2031 if (copy_to_user(buffer, &ev, sizeof(struct snd_ctl_event))) {
2035 spin_lock_irq(&ctl->read_lock);
2036 buffer += sizeof(struct snd_ctl_event);
2037 count -= sizeof(struct snd_ctl_event);
2038 result += sizeof(struct snd_ctl_event);
2041 spin_unlock_irq(&ctl->read_lock);
2043 return result > 0 ? result : err;
2046 static __poll_t snd_ctl_poll(struct file *file, poll_table * wait)
2049 struct snd_ctl_file *ctl;
2051 ctl = file->private_data;
2052 if (!ctl->subscribed)
2054 poll_wait(file, &ctl->change_sleep, wait);
2057 if (!list_empty(&ctl->events))
2058 mask |= EPOLLIN | EPOLLRDNORM;
2064 * register the device-specific control-ioctls.
2065 * called from each device manager like pcm.c, hwdep.c, etc.
2067 static int _snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn, struct list_head *lists)
2069 struct snd_kctl_ioctl *pn;
2071 pn = kzalloc(sizeof(struct snd_kctl_ioctl), GFP_KERNEL);
2075 guard(rwsem_write)(&snd_ioctl_rwsem);
2076 list_add_tail(&pn->list, lists);
2081 * snd_ctl_register_ioctl - register the device-specific control-ioctls
2082 * @fcn: ioctl callback function
2084 * called from each device manager like pcm.c, hwdep.c, etc.
2086 * Return: zero if successful, or a negative error code
2088 int snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn)
2090 return _snd_ctl_register_ioctl(fcn, &snd_control_ioctls);
2092 EXPORT_SYMBOL(snd_ctl_register_ioctl);
2094 #ifdef CONFIG_COMPAT
2096 * snd_ctl_register_ioctl_compat - register the device-specific 32bit compat
2098 * @fcn: ioctl callback function
2100 * Return: zero if successful, or a negative error code
2102 int snd_ctl_register_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2104 return _snd_ctl_register_ioctl(fcn, &snd_control_compat_ioctls);
2106 EXPORT_SYMBOL(snd_ctl_register_ioctl_compat);
2110 * de-register the device-specific control-ioctls.
2112 static int _snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn,
2113 struct list_head *lists)
2115 struct snd_kctl_ioctl *p;
2117 if (snd_BUG_ON(!fcn))
2119 guard(rwsem_write)(&snd_ioctl_rwsem);
2120 list_for_each_entry(p, lists, list) {
2121 if (p->fioctl == fcn) {
2132 * snd_ctl_unregister_ioctl - de-register the device-specific control-ioctls
2133 * @fcn: ioctl callback function to unregister
2135 * Return: zero if successful, or a negative error code
2137 int snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn)
2139 return _snd_ctl_unregister_ioctl(fcn, &snd_control_ioctls);
2141 EXPORT_SYMBOL(snd_ctl_unregister_ioctl);
2143 #ifdef CONFIG_COMPAT
2145 * snd_ctl_unregister_ioctl_compat - de-register the device-specific compat
2146 * 32bit control-ioctls
2147 * @fcn: ioctl callback function to unregister
2149 * Return: zero if successful, or a negative error code
2151 int snd_ctl_unregister_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2153 return _snd_ctl_unregister_ioctl(fcn, &snd_control_compat_ioctls);
2155 EXPORT_SYMBOL(snd_ctl_unregister_ioctl_compat);
2158 static int snd_ctl_fasync(int fd, struct file * file, int on)
2160 struct snd_ctl_file *ctl;
2162 ctl = file->private_data;
2163 return snd_fasync_helper(fd, file, on, &ctl->fasync);
2166 /* return the preferred subdevice number if already assigned;
2167 * otherwise return -1
2169 int snd_ctl_get_preferred_subdevice(struct snd_card *card, int type)
2171 struct snd_ctl_file *kctl;
2174 guard(read_lock_irqsave)(&card->ctl_files_rwlock);
2175 list_for_each_entry(kctl, &card->ctl_files, list) {
2176 if (kctl->pid == task_pid(current)) {
2177 subdevice = kctl->preferred_subdevice[type];
2178 if (subdevice != -1)
2184 EXPORT_SYMBOL_GPL(snd_ctl_get_preferred_subdevice);
2189 #ifdef CONFIG_COMPAT
2190 #include "control_compat.c"
2192 #define snd_ctl_ioctl_compat NULL
2196 * control layers (audio LED etc.)
2200 * snd_ctl_request_layer - request to use the layer
2201 * @module_name: Name of the kernel module (NULL == build-in)
2203 * Return: zero if successful, or an error code when the module cannot be loaded
2205 int snd_ctl_request_layer(const char *module_name)
2207 struct snd_ctl_layer_ops *lops;
2209 if (module_name == NULL)
2211 scoped_guard(rwsem_read, &snd_ctl_layer_rwsem) {
2212 for (lops = snd_ctl_layer; lops; lops = lops->next)
2213 if (strcmp(lops->module_name, module_name) == 0)
2216 return request_module(module_name);
2218 EXPORT_SYMBOL_GPL(snd_ctl_request_layer);
2221 * snd_ctl_register_layer - register new control layer
2222 * @lops: operation structure
2224 * The new layer can track all control elements and do additional
2225 * operations on top (like audio LED handling).
2227 void snd_ctl_register_layer(struct snd_ctl_layer_ops *lops)
2229 struct snd_card *card;
2232 scoped_guard(rwsem_write, &snd_ctl_layer_rwsem) {
2233 lops->next = snd_ctl_layer;
2234 snd_ctl_layer = lops;
2236 for (card_number = 0; card_number < SNDRV_CARDS; card_number++) {
2237 card = snd_card_ref(card_number);
2239 scoped_guard(rwsem_read, &card->controls_rwsem)
2240 lops->lregister(card);
2241 snd_card_unref(card);
2245 EXPORT_SYMBOL_GPL(snd_ctl_register_layer);
2248 * snd_ctl_disconnect_layer - disconnect control layer
2249 * @lops: operation structure
2251 * It is expected that the information about tracked cards
2252 * is freed before this call (the disconnect callback is
2255 void snd_ctl_disconnect_layer(struct snd_ctl_layer_ops *lops)
2257 struct snd_ctl_layer_ops *lops2, *prev_lops2;
2259 guard(rwsem_write)(&snd_ctl_layer_rwsem);
2260 for (lops2 = snd_ctl_layer, prev_lops2 = NULL; lops2; lops2 = lops2->next) {
2261 if (lops2 == lops) {
2263 snd_ctl_layer = lops->next;
2265 prev_lops2->next = lops->next;
2271 EXPORT_SYMBOL_GPL(snd_ctl_disconnect_layer);
2277 static const struct file_operations snd_ctl_f_ops =
2279 .owner = THIS_MODULE,
2280 .read = snd_ctl_read,
2281 .open = snd_ctl_open,
2282 .release = snd_ctl_release,
2283 .llseek = no_llseek,
2284 .poll = snd_ctl_poll,
2285 .unlocked_ioctl = snd_ctl_ioctl,
2286 .compat_ioctl = snd_ctl_ioctl_compat,
2287 .fasync = snd_ctl_fasync,
2290 /* call lops under rwsems; called from snd_ctl_dev_*() below() */
2291 #define call_snd_ctl_lops(_card, _op) \
2293 struct snd_ctl_layer_ops *lops; \
2294 guard(rwsem_read)(&(_card)->controls_rwsem); \
2295 guard(rwsem_read)(&snd_ctl_layer_rwsem); \
2296 for (lops = snd_ctl_layer; lops; lops = lops->next) \
2301 * registration of the control device
2303 static int snd_ctl_dev_register(struct snd_device *device)
2305 struct snd_card *card = device->device_data;
2308 err = snd_register_device(SNDRV_DEVICE_TYPE_CONTROL, card, -1,
2309 &snd_ctl_f_ops, card, card->ctl_dev);
2312 call_snd_ctl_lops(card, lregister);
2317 * disconnection of the control device
2319 static int snd_ctl_dev_disconnect(struct snd_device *device)
2321 struct snd_card *card = device->device_data;
2322 struct snd_ctl_file *ctl;
2324 scoped_guard(read_lock_irqsave, &card->ctl_files_rwlock) {
2325 list_for_each_entry(ctl, &card->ctl_files, list) {
2326 wake_up(&ctl->change_sleep);
2327 snd_kill_fasync(ctl->fasync, SIGIO, POLL_ERR);
2331 call_snd_ctl_lops(card, ldisconnect);
2332 return snd_unregister_device(card->ctl_dev);
2338 static int snd_ctl_dev_free(struct snd_device *device)
2340 struct snd_card *card = device->device_data;
2341 struct snd_kcontrol *control;
2343 scoped_guard(rwsem_write, &card->controls_rwsem) {
2344 while (!list_empty(&card->controls)) {
2345 control = snd_kcontrol(card->controls.next);
2346 __snd_ctl_remove(card, control, false);
2349 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
2350 xa_destroy(&card->ctl_numids);
2351 xa_destroy(&card->ctl_hash);
2354 put_device(card->ctl_dev);
2359 * create control core:
2360 * called from init.c
2362 int snd_ctl_create(struct snd_card *card)
2364 static const struct snd_device_ops ops = {
2365 .dev_free = snd_ctl_dev_free,
2366 .dev_register = snd_ctl_dev_register,
2367 .dev_disconnect = snd_ctl_dev_disconnect,
2371 if (snd_BUG_ON(!card))
2373 if (snd_BUG_ON(card->number < 0 || card->number >= SNDRV_CARDS))
2376 err = snd_device_alloc(&card->ctl_dev, card);
2379 dev_set_name(card->ctl_dev, "controlC%d", card->number);
2381 err = snd_device_new(card, SNDRV_DEV_CONTROL, card, &ops);
2383 put_device(card->ctl_dev);
2388 * Frequently used control callbacks/helpers
2392 * snd_ctl_boolean_mono_info - Helper function for a standard boolean info
2393 * callback with a mono channel
2394 * @kcontrol: the kcontrol instance
2395 * @uinfo: info to store
2397 * This is a function that can be used as info callback for a standard
2398 * boolean control with a single mono channel.
2400 * Return: Zero (always successful)
2402 int snd_ctl_boolean_mono_info(struct snd_kcontrol *kcontrol,
2403 struct snd_ctl_elem_info *uinfo)
2405 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2407 uinfo->value.integer.min = 0;
2408 uinfo->value.integer.max = 1;
2411 EXPORT_SYMBOL(snd_ctl_boolean_mono_info);
2414 * snd_ctl_boolean_stereo_info - Helper function for a standard boolean info
2415 * callback with stereo two channels
2416 * @kcontrol: the kcontrol instance
2417 * @uinfo: info to store
2419 * This is a function that can be used as info callback for a standard
2420 * boolean control with stereo two channels.
2422 * Return: Zero (always successful)
2424 int snd_ctl_boolean_stereo_info(struct snd_kcontrol *kcontrol,
2425 struct snd_ctl_elem_info *uinfo)
2427 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2429 uinfo->value.integer.min = 0;
2430 uinfo->value.integer.max = 1;
2433 EXPORT_SYMBOL(snd_ctl_boolean_stereo_info);
2436 * snd_ctl_enum_info - fills the info structure for an enumerated control
2437 * @info: the structure to be filled
2438 * @channels: the number of the control's channels; often one
2439 * @items: the number of control values; also the size of @names
2440 * @names: an array containing the names of all control values
2442 * Sets all required fields in @info to their appropriate values.
2443 * If the control's accessibility is not the default (readable and writable),
2444 * the caller has to fill @info->access.
2446 * Return: Zero (always successful)
2448 int snd_ctl_enum_info(struct snd_ctl_elem_info *info, unsigned int channels,
2449 unsigned int items, const char *const names[])
2451 info->type = SNDRV_CTL_ELEM_TYPE_ENUMERATED;
2452 info->count = channels;
2453 info->value.enumerated.items = items;
2456 if (info->value.enumerated.item >= items)
2457 info->value.enumerated.item = items - 1;
2458 WARN(strlen(names[info->value.enumerated.item]) >= sizeof(info->value.enumerated.name),
2459 "ALSA: too long item name '%s'\n",
2460 names[info->value.enumerated.item]);
2461 strscpy(info->value.enumerated.name,
2462 names[info->value.enumerated.item],
2463 sizeof(info->value.enumerated.name));
2466 EXPORT_SYMBOL(snd_ctl_enum_info);