1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Routines for driver control interface
7 #include <linux/threads.h>
8 #include <linux/interrupt.h>
9 #include <linux/module.h>
10 #include <linux/moduleparam.h>
11 #include <linux/slab.h>
12 #include <linux/vmalloc.h>
13 #include <linux/time.h>
15 #include <linux/math64.h>
16 #include <linux/sched/signal.h>
17 #include <sound/core.h>
18 #include <sound/minors.h>
19 #include <sound/info.h>
20 #include <sound/control.h>
22 // Max allocation size for user controls.
23 static int max_user_ctl_alloc_size = 8 * 1024 * 1024;
24 module_param_named(max_user_ctl_alloc_size, max_user_ctl_alloc_size, int, 0444);
25 MODULE_PARM_DESC(max_user_ctl_alloc_size, "Max allocation size for user controls");
27 #define MAX_CONTROL_COUNT 1028
29 struct snd_kctl_ioctl {
30 struct list_head list; /* list of all ioctls */
31 snd_kctl_ioctl_func_t fioctl;
34 static DECLARE_RWSEM(snd_ioctl_rwsem);
35 static DECLARE_RWSEM(snd_ctl_layer_rwsem);
36 static LIST_HEAD(snd_control_ioctls);
38 static LIST_HEAD(snd_control_compat_ioctls);
40 static struct snd_ctl_layer_ops *snd_ctl_layer;
42 static int snd_ctl_remove_locked(struct snd_card *card,
43 struct snd_kcontrol *kcontrol);
45 static int snd_ctl_open(struct inode *inode, struct file *file)
47 struct snd_card *card;
48 struct snd_ctl_file *ctl;
51 err = stream_open(inode, file);
55 card = snd_lookup_minor_data(iminor(inode), SNDRV_DEVICE_TYPE_CONTROL);
60 err = snd_card_file_add(card, file);
65 if (!try_module_get(card->module)) {
69 ctl = kzalloc(sizeof(*ctl), GFP_KERNEL);
74 INIT_LIST_HEAD(&ctl->events);
75 init_waitqueue_head(&ctl->change_sleep);
76 spin_lock_init(&ctl->read_lock);
78 for (i = 0; i < SND_CTL_SUBDEV_ITEMS; i++)
79 ctl->preferred_subdevice[i] = -1;
80 ctl->pid = get_pid(task_pid(current));
81 file->private_data = ctl;
82 scoped_guard(write_lock_irqsave, &card->ctl_files_rwlock)
83 list_add_tail(&ctl->list, &card->ctl_files);
88 module_put(card->module);
90 snd_card_file_remove(card, file);
97 static void snd_ctl_empty_read_queue(struct snd_ctl_file * ctl)
99 struct snd_kctl_event *cread;
101 guard(spinlock_irqsave)(&ctl->read_lock);
102 while (!list_empty(&ctl->events)) {
103 cread = snd_kctl_event(ctl->events.next);
104 list_del(&cread->list);
109 static int snd_ctl_release(struct inode *inode, struct file *file)
111 struct snd_card *card;
112 struct snd_ctl_file *ctl;
113 struct snd_kcontrol *control;
116 ctl = file->private_data;
117 file->private_data = NULL;
120 scoped_guard(write_lock_irqsave, &card->ctl_files_rwlock)
121 list_del(&ctl->list);
123 scoped_guard(rwsem_write, &card->controls_rwsem) {
124 list_for_each_entry(control, &card->controls, list)
125 for (idx = 0; idx < control->count; idx++)
126 if (control->vd[idx].owner == ctl)
127 control->vd[idx].owner = NULL;
130 snd_fasync_free(ctl->fasync);
131 snd_ctl_empty_read_queue(ctl);
134 module_put(card->module);
135 snd_card_file_remove(card, file);
140 * snd_ctl_notify - Send notification to user-space for a control change
141 * @card: the card to send notification
142 * @mask: the event mask, SNDRV_CTL_EVENT_*
143 * @id: the ctl element id to send notification
145 * This function adds an event record with the given id and mask, appends
146 * to the list and wakes up the user-space for notification. This can be
147 * called in the atomic context.
149 void snd_ctl_notify(struct snd_card *card, unsigned int mask,
150 struct snd_ctl_elem_id *id)
152 struct snd_ctl_file *ctl;
153 struct snd_kctl_event *ev;
155 if (snd_BUG_ON(!card || !id))
160 guard(read_lock_irqsave)(&card->ctl_files_rwlock);
161 #if IS_ENABLED(CONFIG_SND_MIXER_OSS)
162 card->mixer_oss_change_count++;
164 list_for_each_entry(ctl, &card->ctl_files, list) {
165 if (!ctl->subscribed)
167 scoped_guard(spinlock, &ctl->read_lock) {
168 list_for_each_entry(ev, &ctl->events, list) {
169 if (ev->id.numid == id->numid) {
174 ev = kzalloc(sizeof(*ev), GFP_ATOMIC);
178 list_add_tail(&ev->list, &ctl->events);
180 dev_err(card->dev, "No memory available to allocate event\n");
183 wake_up(&ctl->change_sleep);
185 snd_kill_fasync(ctl->fasync, SIGIO, POLL_IN);
188 EXPORT_SYMBOL(snd_ctl_notify);
191 * snd_ctl_notify_one - Send notification to user-space for a control change
192 * @card: the card to send notification
193 * @mask: the event mask, SNDRV_CTL_EVENT_*
194 * @kctl: the pointer with the control instance
195 * @ioff: the additional offset to the control index
197 * This function calls snd_ctl_notify() and does additional jobs
198 * like LED state changes.
200 void snd_ctl_notify_one(struct snd_card *card, unsigned int mask,
201 struct snd_kcontrol *kctl, unsigned int ioff)
203 struct snd_ctl_elem_id id = kctl->id;
204 struct snd_ctl_layer_ops *lops;
208 snd_ctl_notify(card, mask, &id);
209 guard(rwsem_read)(&snd_ctl_layer_rwsem);
210 for (lops = snd_ctl_layer; lops; lops = lops->next)
211 lops->lnotify(card, mask, kctl, ioff);
213 EXPORT_SYMBOL(snd_ctl_notify_one);
216 * snd_ctl_new - create a new control instance with some elements
217 * @kctl: the pointer to store new control instance
218 * @count: the number of elements in this control
219 * @access: the default access flags for elements in this control
220 * @file: given when locking these elements
222 * Allocates a memory object for a new control instance. The instance has
223 * elements as many as the given number (@count). Each element has given
224 * access permissions (@access). Each element is locked when @file is given.
226 * Return: 0 on success, error code on failure
228 static int snd_ctl_new(struct snd_kcontrol **kctl, unsigned int count,
229 unsigned int access, struct snd_ctl_file *file)
233 if (count == 0 || count > MAX_CONTROL_COUNT)
236 *kctl = kzalloc(struct_size(*kctl, vd, count), GFP_KERNEL);
240 for (idx = 0; idx < count; idx++) {
241 (*kctl)->vd[idx].access = access;
242 (*kctl)->vd[idx].owner = file;
244 (*kctl)->count = count;
250 * snd_ctl_new1 - create a control instance from the template
251 * @ncontrol: the initialization record
252 * @private_data: the private data to set
254 * Allocates a new struct snd_kcontrol instance and initialize from the given
255 * template. When the access field of ncontrol is 0, it's assumed as
256 * READWRITE access. When the count field is 0, it's assumes as one.
258 * Return: The pointer of the newly generated instance, or %NULL on failure.
260 struct snd_kcontrol *snd_ctl_new1(const struct snd_kcontrol_new *ncontrol,
263 struct snd_kcontrol *kctl;
268 if (snd_BUG_ON(!ncontrol || !ncontrol->info))
271 count = ncontrol->count;
275 access = ncontrol->access;
277 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
278 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
279 SNDRV_CTL_ELEM_ACCESS_VOLATILE |
280 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
281 SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE |
282 SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND |
283 SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK |
284 SNDRV_CTL_ELEM_ACCESS_LED_MASK |
285 SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK);
287 err = snd_ctl_new(&kctl, count, access, NULL);
291 /* The 'numid' member is decided when calling snd_ctl_add(). */
292 kctl->id.iface = ncontrol->iface;
293 kctl->id.device = ncontrol->device;
294 kctl->id.subdevice = ncontrol->subdevice;
295 if (ncontrol->name) {
296 strscpy(kctl->id.name, ncontrol->name, sizeof(kctl->id.name));
297 if (strcmp(ncontrol->name, kctl->id.name) != 0)
298 pr_warn("ALSA: Control name '%s' truncated to '%s'\n",
299 ncontrol->name, kctl->id.name);
301 kctl->id.index = ncontrol->index;
303 kctl->info = ncontrol->info;
304 kctl->get = ncontrol->get;
305 kctl->put = ncontrol->put;
306 kctl->tlv.p = ncontrol->tlv.p;
308 kctl->private_value = ncontrol->private_value;
309 kctl->private_data = private_data;
313 EXPORT_SYMBOL(snd_ctl_new1);
316 * snd_ctl_free_one - release the control instance
317 * @kcontrol: the control instance
319 * Releases the control instance created via snd_ctl_new()
321 * Don't call this after the control was added to the card.
323 void snd_ctl_free_one(struct snd_kcontrol *kcontrol)
326 if (kcontrol->private_free)
327 kcontrol->private_free(kcontrol);
331 EXPORT_SYMBOL(snd_ctl_free_one);
333 static bool snd_ctl_remove_numid_conflict(struct snd_card *card,
336 struct snd_kcontrol *kctl;
338 /* Make sure that the ids assigned to the control do not wrap around */
339 if (card->last_numid >= UINT_MAX - count)
340 card->last_numid = 0;
342 list_for_each_entry(kctl, &card->controls, list) {
343 if (kctl->id.numid < card->last_numid + 1 + count &&
344 kctl->id.numid + kctl->count > card->last_numid + 1) {
345 card->last_numid = kctl->id.numid + kctl->count - 1;
352 static int snd_ctl_find_hole(struct snd_card *card, unsigned int count)
354 unsigned int iter = 100000;
356 while (snd_ctl_remove_numid_conflict(card, count)) {
358 /* this situation is very unlikely */
359 dev_err(card->dev, "unable to allocate new control numid\n");
366 /* check whether the given id is contained in the given kctl */
367 static bool elem_id_matches(const struct snd_kcontrol *kctl,
368 const struct snd_ctl_elem_id *id)
370 return kctl->id.iface == id->iface &&
371 kctl->id.device == id->device &&
372 kctl->id.subdevice == id->subdevice &&
373 !strncmp(kctl->id.name, id->name, sizeof(kctl->id.name)) &&
374 kctl->id.index <= id->index &&
375 kctl->id.index + kctl->count > id->index;
378 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
379 /* Compute a hash key for the corresponding ctl id
380 * It's for the name lookup, hence the numid is excluded.
381 * The hash key is bound in LONG_MAX to be used for Xarray key.
383 #define MULTIPLIER 37
384 static unsigned long get_ctl_id_hash(const struct snd_ctl_elem_id *id)
390 h = MULTIPLIER * h + id->device;
391 h = MULTIPLIER * h + id->subdevice;
392 for (i = 0; i < SNDRV_CTL_ELEM_ID_NAME_MAXLEN && id->name[i]; i++)
393 h = MULTIPLIER * h + id->name[i];
394 h = MULTIPLIER * h + id->index;
399 /* add hash entries to numid and ctl xarray tables */
400 static void add_hash_entries(struct snd_card *card,
401 struct snd_kcontrol *kcontrol)
403 struct snd_ctl_elem_id id = kcontrol->id;
406 xa_store_range(&card->ctl_numids, kcontrol->id.numid,
407 kcontrol->id.numid + kcontrol->count - 1,
408 kcontrol, GFP_KERNEL);
410 for (i = 0; i < kcontrol->count; i++) {
411 id.index = kcontrol->id.index + i;
412 if (xa_insert(&card->ctl_hash, get_ctl_id_hash(&id),
413 kcontrol, GFP_KERNEL)) {
414 /* skip hash for this entry, noting we had collision */
415 card->ctl_hash_collision = true;
416 dev_dbg(card->dev, "ctl_hash collision %d:%s:%d\n",
417 id.iface, id.name, id.index);
422 /* remove hash entries that have been added */
423 static void remove_hash_entries(struct snd_card *card,
424 struct snd_kcontrol *kcontrol)
426 struct snd_ctl_elem_id id = kcontrol->id;
427 struct snd_kcontrol *matched;
431 for (i = 0; i < kcontrol->count; i++) {
432 xa_erase(&card->ctl_numids, id.numid);
433 h = get_ctl_id_hash(&id);
434 matched = xa_load(&card->ctl_hash, h);
435 if (matched && (matched == kcontrol ||
436 elem_id_matches(matched, &id)))
437 xa_erase(&card->ctl_hash, h);
442 #else /* CONFIG_SND_CTL_FAST_LOOKUP */
443 static inline void add_hash_entries(struct snd_card *card,
444 struct snd_kcontrol *kcontrol)
447 static inline void remove_hash_entries(struct snd_card *card,
448 struct snd_kcontrol *kcontrol)
451 #endif /* CONFIG_SND_CTL_FAST_LOOKUP */
453 enum snd_ctl_add_mode {
454 CTL_ADD_EXCLUSIVE, CTL_REPLACE, CTL_ADD_ON_REPLACE,
457 /* add/replace a new kcontrol object; call with card->controls_rwsem locked */
458 static int __snd_ctl_add_replace(struct snd_card *card,
459 struct snd_kcontrol *kcontrol,
460 enum snd_ctl_add_mode mode)
462 struct snd_ctl_elem_id id;
464 struct snd_kcontrol *old;
467 lockdep_assert_held_write(&card->controls_rwsem);
470 if (id.index > UINT_MAX - kcontrol->count)
473 old = snd_ctl_find_id_locked(card, &id);
475 if (mode == CTL_REPLACE)
478 if (mode == CTL_ADD_EXCLUSIVE) {
480 "control %i:%i:%i:%s:%i is already present\n",
481 id.iface, id.device, id.subdevice, id.name,
486 err = snd_ctl_remove_locked(card, old);
491 if (snd_ctl_find_hole(card, kcontrol->count) < 0)
494 list_add_tail(&kcontrol->list, &card->controls);
495 card->controls_count += kcontrol->count;
496 kcontrol->id.numid = card->last_numid + 1;
497 card->last_numid += kcontrol->count;
499 add_hash_entries(card, kcontrol);
501 for (idx = 0; idx < kcontrol->count; idx++)
502 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_ADD, kcontrol, idx);
507 static int snd_ctl_add_replace(struct snd_card *card,
508 struct snd_kcontrol *kcontrol,
509 enum snd_ctl_add_mode mode)
515 if (snd_BUG_ON(!card || !kcontrol->info))
518 scoped_guard(rwsem_write, &card->controls_rwsem)
519 err = __snd_ctl_add_replace(card, kcontrol, mode);
526 snd_ctl_free_one(kcontrol);
531 * snd_ctl_add - add the control instance to the card
532 * @card: the card instance
533 * @kcontrol: the control instance to add
535 * Adds the control instance created via snd_ctl_new() or
536 * snd_ctl_new1() to the given card. Assigns also an unique
537 * numid used for fast search.
539 * It frees automatically the control which cannot be added.
541 * Return: Zero if successful, or a negative error code on failure.
544 int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
546 return snd_ctl_add_replace(card, kcontrol, CTL_ADD_EXCLUSIVE);
548 EXPORT_SYMBOL(snd_ctl_add);
551 * snd_ctl_replace - replace the control instance of the card
552 * @card: the card instance
553 * @kcontrol: the control instance to replace
554 * @add_on_replace: add the control if not already added
556 * Replaces the given control. If the given control does not exist
557 * and the add_on_replace flag is set, the control is added. If the
558 * control exists, it is destroyed first.
560 * It frees automatically the control which cannot be added or replaced.
562 * Return: Zero if successful, or a negative error code on failure.
564 int snd_ctl_replace(struct snd_card *card, struct snd_kcontrol *kcontrol,
567 return snd_ctl_add_replace(card, kcontrol,
568 add_on_replace ? CTL_ADD_ON_REPLACE : CTL_REPLACE);
570 EXPORT_SYMBOL(snd_ctl_replace);
572 static int __snd_ctl_remove(struct snd_card *card,
573 struct snd_kcontrol *kcontrol,
578 lockdep_assert_held_write(&card->controls_rwsem);
580 if (snd_BUG_ON(!card || !kcontrol))
582 list_del(&kcontrol->list);
585 remove_hash_entries(card, kcontrol);
587 card->controls_count -= kcontrol->count;
588 for (idx = 0; idx < kcontrol->count; idx++)
589 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_REMOVE, kcontrol, idx);
590 snd_ctl_free_one(kcontrol);
594 static inline int snd_ctl_remove_locked(struct snd_card *card,
595 struct snd_kcontrol *kcontrol)
597 return __snd_ctl_remove(card, kcontrol, true);
601 * snd_ctl_remove - remove the control from the card and release it
602 * @card: the card instance
603 * @kcontrol: the control instance to remove
605 * Removes the control from the card and then releases the instance.
606 * You don't need to call snd_ctl_free_one().
607 * Passing NULL to @kcontrol argument is allowed as noop.
609 * Return: 0 if successful, or a negative error code on failure.
611 * Note that this function takes card->controls_rwsem lock internally.
613 int snd_ctl_remove(struct snd_card *card, struct snd_kcontrol *kcontrol)
617 guard(rwsem_write)(&card->controls_rwsem);
618 return snd_ctl_remove_locked(card, kcontrol);
620 EXPORT_SYMBOL(snd_ctl_remove);
623 * snd_ctl_remove_id - remove the control of the given id and release it
624 * @card: the card instance
625 * @id: the control id to remove
627 * Finds the control instance with the given id, removes it from the
628 * card list and releases it.
630 * Return: 0 if successful, or a negative error code on failure.
632 int snd_ctl_remove_id(struct snd_card *card, struct snd_ctl_elem_id *id)
634 struct snd_kcontrol *kctl;
636 guard(rwsem_write)(&card->controls_rwsem);
637 kctl = snd_ctl_find_id_locked(card, id);
640 return snd_ctl_remove_locked(card, kctl);
642 EXPORT_SYMBOL(snd_ctl_remove_id);
645 * snd_ctl_remove_user_ctl - remove and release the unlocked user control
646 * @file: active control handle
647 * @id: the control id to remove
649 * Finds the control instance with the given id, removes it from the
650 * card list and releases it.
652 * Return: 0 if successful, or a negative error code on failure.
654 static int snd_ctl_remove_user_ctl(struct snd_ctl_file * file,
655 struct snd_ctl_elem_id *id)
657 struct snd_card *card = file->card;
658 struct snd_kcontrol *kctl;
661 guard(rwsem_write)(&card->controls_rwsem);
662 kctl = snd_ctl_find_id_locked(card, id);
665 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER))
667 for (idx = 0; idx < kctl->count; idx++)
668 if (kctl->vd[idx].owner != NULL && kctl->vd[idx].owner != file)
670 return snd_ctl_remove_locked(card, kctl);
674 * snd_ctl_activate_id - activate/inactivate the control of the given id
675 * @card: the card instance
676 * @id: the control id to activate/inactivate
677 * @active: non-zero to activate
679 * Finds the control instance with the given id, and activate or
680 * inactivate the control together with notification, if changed.
681 * The given ID data is filled with full information.
683 * Return: 0 if unchanged, 1 if changed, or a negative error code on failure.
685 int snd_ctl_activate_id(struct snd_card *card, struct snd_ctl_elem_id *id,
688 struct snd_kcontrol *kctl;
689 struct snd_kcontrol_volatile *vd;
690 unsigned int index_offset;
693 down_write(&card->controls_rwsem);
694 kctl = snd_ctl_find_id_locked(card, id);
699 index_offset = snd_ctl_get_ioff(kctl, id);
700 vd = &kctl->vd[index_offset];
703 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE))
705 vd->access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE;
707 if (vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)
709 vd->access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
711 snd_ctl_build_ioff(id, kctl, index_offset);
712 downgrade_write(&card->controls_rwsem);
713 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_INFO, kctl, index_offset);
714 up_read(&card->controls_rwsem);
718 up_write(&card->controls_rwsem);
721 EXPORT_SYMBOL_GPL(snd_ctl_activate_id);
724 * snd_ctl_rename_id - replace the id of a control on the card
725 * @card: the card instance
726 * @src_id: the old id
727 * @dst_id: the new id
729 * Finds the control with the old id from the card, and replaces the
730 * id with the new one.
732 * The function tries to keep the already assigned numid while replacing
735 * Note that this function should be used only in the card initialization
736 * phase. Calling after the card instantiation may cause issues with
737 * user-space expecting persistent numids.
739 * Return: Zero if successful, or a negative error code on failure.
741 int snd_ctl_rename_id(struct snd_card *card, struct snd_ctl_elem_id *src_id,
742 struct snd_ctl_elem_id *dst_id)
744 struct snd_kcontrol *kctl;
747 guard(rwsem_write)(&card->controls_rwsem);
748 kctl = snd_ctl_find_id_locked(card, src_id);
751 saved_numid = kctl->id.numid;
752 remove_hash_entries(card, kctl);
754 kctl->id.numid = saved_numid;
755 add_hash_entries(card, kctl);
758 EXPORT_SYMBOL(snd_ctl_rename_id);
761 * snd_ctl_rename - rename the control on the card
762 * @card: the card instance
763 * @kctl: the control to rename
764 * @name: the new name
766 * Renames the specified control on the card to the new name.
768 * Note that this function takes card->controls_rwsem lock internally.
770 void snd_ctl_rename(struct snd_card *card, struct snd_kcontrol *kctl,
773 guard(rwsem_write)(&card->controls_rwsem);
774 remove_hash_entries(card, kctl);
776 if (strscpy(kctl->id.name, name, sizeof(kctl->id.name)) < 0)
777 pr_warn("ALSA: Renamed control new name '%s' truncated to '%s'\n",
778 name, kctl->id.name);
780 add_hash_entries(card, kctl);
782 EXPORT_SYMBOL(snd_ctl_rename);
784 #ifndef CONFIG_SND_CTL_FAST_LOOKUP
785 static struct snd_kcontrol *
786 snd_ctl_find_numid_slow(struct snd_card *card, unsigned int numid)
788 struct snd_kcontrol *kctl;
790 list_for_each_entry(kctl, &card->controls, list) {
791 if (kctl->id.numid <= numid && kctl->id.numid + kctl->count > numid)
796 #endif /* !CONFIG_SND_CTL_FAST_LOOKUP */
799 * snd_ctl_find_numid_locked - find the control instance with the given number-id
800 * @card: the card instance
801 * @numid: the number-id to search
803 * Finds the control instance with the given number-id from the card.
805 * The caller must down card->controls_rwsem before calling this function
806 * (if the race condition can happen).
808 * Return: The pointer of the instance if found, or %NULL if not.
810 struct snd_kcontrol *
811 snd_ctl_find_numid_locked(struct snd_card *card, unsigned int numid)
813 if (snd_BUG_ON(!card || !numid))
815 lockdep_assert_held(&card->controls_rwsem);
816 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
817 return xa_load(&card->ctl_numids, numid);
819 return snd_ctl_find_numid_slow(card, numid);
822 EXPORT_SYMBOL(snd_ctl_find_numid_locked);
825 * snd_ctl_find_numid - find the control instance with the given number-id
826 * @card: the card instance
827 * @numid: the number-id to search
829 * Finds the control instance with the given number-id from the card.
831 * Return: The pointer of the instance if found, or %NULL if not.
833 * Note that this function takes card->controls_rwsem lock internally.
835 struct snd_kcontrol *snd_ctl_find_numid(struct snd_card *card,
838 guard(rwsem_read)(&card->controls_rwsem);
839 return snd_ctl_find_numid_locked(card, numid);
841 EXPORT_SYMBOL(snd_ctl_find_numid);
844 * snd_ctl_find_id_locked - find the control instance with the given id
845 * @card: the card instance
846 * @id: the id to search
848 * Finds the control instance with the given id from the card.
850 * The caller must down card->controls_rwsem before calling this function
851 * (if the race condition can happen).
853 * Return: The pointer of the instance if found, or %NULL if not.
855 struct snd_kcontrol *snd_ctl_find_id_locked(struct snd_card *card,
856 const struct snd_ctl_elem_id *id)
858 struct snd_kcontrol *kctl;
860 if (snd_BUG_ON(!card || !id))
862 lockdep_assert_held(&card->controls_rwsem);
864 return snd_ctl_find_numid_locked(card, id->numid);
865 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
866 kctl = xa_load(&card->ctl_hash, get_ctl_id_hash(id));
867 if (kctl && elem_id_matches(kctl, id))
869 if (!card->ctl_hash_collision)
870 return NULL; /* we can rely on only hash table */
872 /* no matching in hash table - try all as the last resort */
873 list_for_each_entry(kctl, &card->controls, list)
874 if (elem_id_matches(kctl, id))
879 EXPORT_SYMBOL(snd_ctl_find_id_locked);
882 * snd_ctl_find_id - find the control instance with the given id
883 * @card: the card instance
884 * @id: the id to search
886 * Finds the control instance with the given id from the card.
888 * Return: The pointer of the instance if found, or %NULL if not.
890 * Note that this function takes card->controls_rwsem lock internally.
892 struct snd_kcontrol *snd_ctl_find_id(struct snd_card *card,
893 const struct snd_ctl_elem_id *id)
895 guard(rwsem_read)(&card->controls_rwsem);
896 return snd_ctl_find_id_locked(card, id);
898 EXPORT_SYMBOL(snd_ctl_find_id);
900 static int snd_ctl_card_info(struct snd_card *card, struct snd_ctl_file * ctl,
901 unsigned int cmd, void __user *arg)
903 struct snd_ctl_card_info *info __free(kfree) = NULL;
905 info = kzalloc(sizeof(*info), GFP_KERNEL);
908 scoped_guard(rwsem_read, &snd_ioctl_rwsem) {
909 info->card = card->number;
910 strscpy(info->id, card->id, sizeof(info->id));
911 strscpy(info->driver, card->driver, sizeof(info->driver));
912 strscpy(info->name, card->shortname, sizeof(info->name));
913 strscpy(info->longname, card->longname, sizeof(info->longname));
914 strscpy(info->mixername, card->mixername, sizeof(info->mixername));
915 strscpy(info->components, card->components, sizeof(info->components));
917 if (copy_to_user(arg, info, sizeof(struct snd_ctl_card_info)))
922 static int snd_ctl_elem_list(struct snd_card *card,
923 struct snd_ctl_elem_list *list)
925 struct snd_kcontrol *kctl;
926 struct snd_ctl_elem_id id;
927 unsigned int offset, space, jidx;
929 offset = list->offset;
932 guard(rwsem_read)(&card->controls_rwsem);
933 list->count = card->controls_count;
937 list_for_each_entry(kctl, &card->controls, list) {
938 if (offset >= kctl->count) {
939 offset -= kctl->count;
942 for (jidx = offset; jidx < kctl->count; jidx++) {
943 snd_ctl_build_ioff(&id, kctl, jidx);
944 if (copy_to_user(list->pids + list->used, &id, sizeof(id)))
955 static int snd_ctl_elem_list_user(struct snd_card *card,
956 struct snd_ctl_elem_list __user *_list)
958 struct snd_ctl_elem_list list;
961 if (copy_from_user(&list, _list, sizeof(list)))
963 err = snd_ctl_elem_list(card, &list);
966 if (copy_to_user(_list, &list, sizeof(list)))
972 /* Check whether the given kctl info is valid */
973 static int snd_ctl_check_elem_info(struct snd_card *card,
974 const struct snd_ctl_elem_info *info)
976 static const unsigned int max_value_counts[] = {
977 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = 128,
978 [SNDRV_CTL_ELEM_TYPE_INTEGER] = 128,
979 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = 128,
980 [SNDRV_CTL_ELEM_TYPE_BYTES] = 512,
981 [SNDRV_CTL_ELEM_TYPE_IEC958] = 1,
982 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = 64,
985 if (info->type < SNDRV_CTL_ELEM_TYPE_BOOLEAN ||
986 info->type > SNDRV_CTL_ELEM_TYPE_INTEGER64) {
989 "control %i:%i:%i:%s:%i: invalid type %d\n",
990 info->id.iface, info->id.device,
991 info->id.subdevice, info->id.name,
992 info->id.index, info->type);
995 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED &&
996 info->value.enumerated.items == 0) {
999 "control %i:%i:%i:%s:%i: zero enum items\n",
1000 info->id.iface, info->id.device,
1001 info->id.subdevice, info->id.name,
1005 if (info->count > max_value_counts[info->type]) {
1008 "control %i:%i:%i:%s:%i: invalid count %d\n",
1009 info->id.iface, info->id.device,
1010 info->id.subdevice, info->id.name,
1011 info->id.index, info->count);
1018 /* The capacity of struct snd_ctl_elem_value.value.*/
1019 static const unsigned int value_sizes[] = {
1020 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = sizeof(long),
1021 [SNDRV_CTL_ELEM_TYPE_INTEGER] = sizeof(long),
1022 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = sizeof(unsigned int),
1023 [SNDRV_CTL_ELEM_TYPE_BYTES] = sizeof(unsigned char),
1024 [SNDRV_CTL_ELEM_TYPE_IEC958] = sizeof(struct snd_aes_iec958),
1025 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = sizeof(long long),
1028 /* fill the remaining snd_ctl_elem_value data with the given pattern */
1029 static void fill_remaining_elem_value(struct snd_ctl_elem_value *control,
1030 struct snd_ctl_elem_info *info,
1033 size_t offset = value_sizes[info->type] * info->count;
1035 offset = DIV_ROUND_UP(offset, sizeof(u32));
1036 memset32((u32 *)control->value.bytes.data + offset, pattern,
1037 sizeof(control->value) / sizeof(u32) - offset);
1040 /* check whether the given integer ctl value is valid */
1041 static int sanity_check_int_value(struct snd_card *card,
1042 const struct snd_ctl_elem_value *control,
1043 const struct snd_ctl_elem_info *info,
1044 int i, bool print_error)
1046 long long lval, lmin, lmax, lstep;
1049 switch (info->type) {
1051 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1052 lval = control->value.integer.value[i];
1057 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1058 lval = control->value.integer.value[i];
1059 lmin = info->value.integer.min;
1060 lmax = info->value.integer.max;
1061 lstep = info->value.integer.step;
1063 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1064 lval = control->value.integer64.value[i];
1065 lmin = info->value.integer64.min;
1066 lmax = info->value.integer64.max;
1067 lstep = info->value.integer64.step;
1069 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1070 lval = control->value.enumerated.item[i];
1072 lmax = info->value.enumerated.items - 1;
1077 if (lval < lmin || lval > lmax) {
1080 "control %i:%i:%i:%s:%i: value out of range %lld (%lld/%lld) at count %i\n",
1081 control->id.iface, control->id.device,
1082 control->id.subdevice, control->id.name,
1083 control->id.index, lval, lmin, lmax, i);
1087 div64_u64_rem(lval, lstep, &rem);
1091 "control %i:%i:%i:%s:%i: unaligned value %lld (step %lld) at count %i\n",
1092 control->id.iface, control->id.device,
1093 control->id.subdevice, control->id.name,
1094 control->id.index, lval, lstep, i);
1102 /* check whether the all input values are valid for the given elem value */
1103 static int sanity_check_input_values(struct snd_card *card,
1104 const struct snd_ctl_elem_value *control,
1105 const struct snd_ctl_elem_info *info,
1110 switch (info->type) {
1111 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1112 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1113 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1114 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1115 for (i = 0; i < info->count; i++) {
1116 ret = sanity_check_int_value(card, control, info, i,
1129 /* perform sanity checks to the given snd_ctl_elem_value object */
1130 static int sanity_check_elem_value(struct snd_card *card,
1131 const struct snd_ctl_elem_value *control,
1132 const struct snd_ctl_elem_info *info,
1139 ret = sanity_check_input_values(card, control, info, true);
1143 /* check whether the remaining area kept untouched */
1144 offset = value_sizes[info->type] * info->count;
1145 offset = DIV_ROUND_UP(offset, sizeof(u32));
1146 p = (u32 *)control->value.bytes.data + offset;
1147 for (; offset < sizeof(control->value) / sizeof(u32); offset++, p++) {
1148 if (*p != pattern) {
1152 *p = 0; /* clear the checked area */
1158 static int __snd_ctl_elem_info(struct snd_card *card,
1159 struct snd_kcontrol *kctl,
1160 struct snd_ctl_elem_info *info,
1161 struct snd_ctl_file *ctl)
1163 struct snd_kcontrol_volatile *vd;
1164 unsigned int index_offset;
1167 #ifdef CONFIG_SND_DEBUG
1170 result = snd_power_ref_and_wait(card);
1172 result = kctl->info(kctl, info);
1173 snd_power_unref(card);
1175 snd_BUG_ON(info->access);
1176 index_offset = snd_ctl_get_ioff(kctl, &info->id);
1177 vd = &kctl->vd[index_offset];
1178 snd_ctl_build_ioff(&info->id, kctl, index_offset);
1179 info->access = vd->access;
1181 info->access |= SNDRV_CTL_ELEM_ACCESS_LOCK;
1182 if (vd->owner == ctl)
1183 info->access |= SNDRV_CTL_ELEM_ACCESS_OWNER;
1184 info->owner = pid_vnr(vd->owner->pid);
1188 if (!snd_ctl_skip_validation(info) &&
1189 snd_ctl_check_elem_info(card, info) < 0)
1195 static int snd_ctl_elem_info(struct snd_ctl_file *ctl,
1196 struct snd_ctl_elem_info *info)
1198 struct snd_card *card = ctl->card;
1199 struct snd_kcontrol *kctl;
1201 guard(rwsem_read)(&card->controls_rwsem);
1202 kctl = snd_ctl_find_id_locked(card, &info->id);
1205 return __snd_ctl_elem_info(card, kctl, info, ctl);
1208 static int snd_ctl_elem_info_user(struct snd_ctl_file *ctl,
1209 struct snd_ctl_elem_info __user *_info)
1211 struct snd_ctl_elem_info info;
1214 if (copy_from_user(&info, _info, sizeof(info)))
1216 result = snd_ctl_elem_info(ctl, &info);
1219 /* drop internal access flags */
1220 info.access &= ~(SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK|
1221 SNDRV_CTL_ELEM_ACCESS_LED_MASK);
1222 if (copy_to_user(_info, &info, sizeof(info)))
1227 static int snd_ctl_elem_read(struct snd_card *card,
1228 struct snd_ctl_elem_value *control)
1230 struct snd_kcontrol *kctl;
1231 struct snd_kcontrol_volatile *vd;
1232 unsigned int index_offset;
1233 struct snd_ctl_elem_info info;
1234 const u32 pattern = 0xdeadbeef;
1237 guard(rwsem_read)(&card->controls_rwsem);
1238 kctl = snd_ctl_find_id_locked(card, &control->id);
1242 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1243 vd = &kctl->vd[index_offset];
1244 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_READ) || !kctl->get)
1247 snd_ctl_build_ioff(&control->id, kctl, index_offset);
1249 #ifdef CONFIG_SND_CTL_DEBUG
1250 /* info is needed only for validation */
1251 memset(&info, 0, sizeof(info));
1252 info.id = control->id;
1253 ret = __snd_ctl_elem_info(card, kctl, &info, NULL);
1258 if (!snd_ctl_skip_validation(&info))
1259 fill_remaining_elem_value(control, &info, pattern);
1260 ret = snd_power_ref_and_wait(card);
1262 ret = kctl->get(kctl, control);
1263 snd_power_unref(card);
1266 if (!snd_ctl_skip_validation(&info) &&
1267 sanity_check_elem_value(card, control, &info, pattern) < 0) {
1269 "control %i:%i:%i:%s:%i: access overflow\n",
1270 control->id.iface, control->id.device,
1271 control->id.subdevice, control->id.name,
1278 static int snd_ctl_elem_read_user(struct snd_card *card,
1279 struct snd_ctl_elem_value __user *_control)
1281 struct snd_ctl_elem_value *control __free(kfree) = NULL;
1284 control = memdup_user(_control, sizeof(*control));
1285 if (IS_ERR(control))
1286 return PTR_ERR(no_free_ptr(control));
1288 result = snd_ctl_elem_read(card, control);
1292 if (copy_to_user(_control, control, sizeof(*control)))
1297 static int snd_ctl_elem_write(struct snd_card *card, struct snd_ctl_file *file,
1298 struct snd_ctl_elem_value *control)
1300 struct snd_kcontrol *kctl;
1301 struct snd_kcontrol_volatile *vd;
1302 unsigned int index_offset;
1305 down_write(&card->controls_rwsem);
1306 kctl = snd_ctl_find_id_locked(card, &control->id);
1308 up_write(&card->controls_rwsem);
1312 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1313 vd = &kctl->vd[index_offset];
1314 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_WRITE) || kctl->put == NULL ||
1315 (file && vd->owner && vd->owner != file)) {
1316 up_write(&card->controls_rwsem);
1320 snd_ctl_build_ioff(&control->id, kctl, index_offset);
1321 result = snd_power_ref_and_wait(card);
1322 /* validate input values */
1323 if (IS_ENABLED(CONFIG_SND_CTL_INPUT_VALIDATION) && !result) {
1324 struct snd_ctl_elem_info info;
1326 memset(&info, 0, sizeof(info));
1327 info.id = control->id;
1328 result = __snd_ctl_elem_info(card, kctl, &info, NULL);
1330 result = sanity_check_input_values(card, control, &info,
1334 result = kctl->put(kctl, control);
1335 snd_power_unref(card);
1337 up_write(&card->controls_rwsem);
1342 downgrade_write(&card->controls_rwsem);
1343 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_VALUE, kctl, index_offset);
1344 up_read(&card->controls_rwsem);
1346 up_write(&card->controls_rwsem);
1352 static int snd_ctl_elem_write_user(struct snd_ctl_file *file,
1353 struct snd_ctl_elem_value __user *_control)
1355 struct snd_ctl_elem_value *control __free(kfree) = NULL;
1356 struct snd_card *card;
1359 control = memdup_user(_control, sizeof(*control));
1360 if (IS_ERR(control))
1361 return PTR_ERR(no_free_ptr(control));
1364 result = snd_ctl_elem_write(card, file, control);
1368 if (copy_to_user(_control, control, sizeof(*control)))
1373 static int snd_ctl_elem_lock(struct snd_ctl_file *file,
1374 struct snd_ctl_elem_id __user *_id)
1376 struct snd_card *card = file->card;
1377 struct snd_ctl_elem_id id;
1378 struct snd_kcontrol *kctl;
1379 struct snd_kcontrol_volatile *vd;
1381 if (copy_from_user(&id, _id, sizeof(id)))
1383 guard(rwsem_write)(&card->controls_rwsem);
1384 kctl = snd_ctl_find_id_locked(card, &id);
1387 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1394 static int snd_ctl_elem_unlock(struct snd_ctl_file *file,
1395 struct snd_ctl_elem_id __user *_id)
1397 struct snd_card *card = file->card;
1398 struct snd_ctl_elem_id id;
1399 struct snd_kcontrol *kctl;
1400 struct snd_kcontrol_volatile *vd;
1402 if (copy_from_user(&id, _id, sizeof(id)))
1404 guard(rwsem_write)(&card->controls_rwsem);
1405 kctl = snd_ctl_find_id_locked(card, &id);
1408 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1411 if (vd->owner != file)
1417 struct user_element {
1418 struct snd_ctl_elem_info info;
1419 struct snd_card *card;
1420 char *elem_data; /* element data */
1421 unsigned long elem_data_size; /* size of element data in bytes */
1422 void *tlv_data; /* TLV data */
1423 unsigned long tlv_data_size; /* TLV data size */
1424 void *priv_data; /* private data (like strings for enumerated type) */
1427 // check whether the addition (in bytes) of user ctl element may overflow the limit.
1428 static bool check_user_elem_overflow(struct snd_card *card, ssize_t add)
1430 return (ssize_t)card->user_ctl_alloc_size + add > max_user_ctl_alloc_size;
1433 static int snd_ctl_elem_user_info(struct snd_kcontrol *kcontrol,
1434 struct snd_ctl_elem_info *uinfo)
1436 struct user_element *ue = kcontrol->private_data;
1437 unsigned int offset;
1439 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1441 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1446 static int snd_ctl_elem_user_enum_info(struct snd_kcontrol *kcontrol,
1447 struct snd_ctl_elem_info *uinfo)
1449 struct user_element *ue = kcontrol->private_data;
1452 unsigned int offset;
1454 item = uinfo->value.enumerated.item;
1456 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1458 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1460 item = min(item, uinfo->value.enumerated.items - 1);
1461 uinfo->value.enumerated.item = item;
1463 names = ue->priv_data;
1464 for (; item > 0; --item)
1465 names += strlen(names) + 1;
1466 strcpy(uinfo->value.enumerated.name, names);
1471 static int snd_ctl_elem_user_get(struct snd_kcontrol *kcontrol,
1472 struct snd_ctl_elem_value *ucontrol)
1474 struct user_element *ue = kcontrol->private_data;
1475 unsigned int size = ue->elem_data_size;
1476 char *src = ue->elem_data +
1477 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1479 memcpy(&ucontrol->value, src, size);
1483 static int snd_ctl_elem_user_put(struct snd_kcontrol *kcontrol,
1484 struct snd_ctl_elem_value *ucontrol)
1487 struct user_element *ue = kcontrol->private_data;
1488 unsigned int size = ue->elem_data_size;
1489 char *dst = ue->elem_data +
1490 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1492 err = sanity_check_input_values(ue->card, ucontrol, &ue->info, false);
1496 change = memcmp(&ucontrol->value, dst, size) != 0;
1498 memcpy(dst, &ucontrol->value, size);
1502 /* called in controls_rwsem write lock */
1503 static int replace_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1506 struct user_element *ue = kctl->private_data;
1507 unsigned int *container;
1508 unsigned int mask = 0;
1512 lockdep_assert_held_write(&ue->card->controls_rwsem);
1514 if (size > 1024 * 128) /* sane value */
1517 // does the TLV size change cause overflow?
1518 if (check_user_elem_overflow(ue->card, (ssize_t)(size - ue->tlv_data_size)))
1521 container = vmemdup_user(buf, size);
1522 if (IS_ERR(container))
1523 return PTR_ERR(container);
1525 change = ue->tlv_data_size != size;
1527 change = memcmp(ue->tlv_data, container, size) != 0;
1533 if (ue->tlv_data == NULL) {
1534 /* Now TLV data is available. */
1535 for (i = 0; i < kctl->count; ++i)
1536 kctl->vd[i].access |= SNDRV_CTL_ELEM_ACCESS_TLV_READ;
1537 mask = SNDRV_CTL_EVENT_MASK_INFO;
1539 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1540 ue->tlv_data_size = 0;
1541 kvfree(ue->tlv_data);
1544 ue->tlv_data = container;
1545 ue->tlv_data_size = size;
1546 // decremented at private_free.
1547 ue->card->user_ctl_alloc_size += size;
1549 mask |= SNDRV_CTL_EVENT_MASK_TLV;
1550 for (i = 0; i < kctl->count; ++i)
1551 snd_ctl_notify_one(ue->card, mask, kctl, i);
1556 static int read_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1559 struct user_element *ue = kctl->private_data;
1561 if (ue->tlv_data_size == 0 || ue->tlv_data == NULL)
1564 if (size < ue->tlv_data_size)
1567 if (copy_to_user(buf, ue->tlv_data, ue->tlv_data_size))
1573 static int snd_ctl_elem_user_tlv(struct snd_kcontrol *kctl, int op_flag,
1574 unsigned int size, unsigned int __user *buf)
1576 if (op_flag == SNDRV_CTL_TLV_OP_WRITE)
1577 return replace_user_tlv(kctl, buf, size);
1579 return read_user_tlv(kctl, buf, size);
1582 /* called in controls_rwsem write lock */
1583 static int snd_ctl_elem_init_enum_names(struct user_element *ue)
1586 size_t buf_len, name_len;
1588 const uintptr_t user_ptrval = ue->info.value.enumerated.names_ptr;
1590 lockdep_assert_held_write(&ue->card->controls_rwsem);
1592 buf_len = ue->info.value.enumerated.names_length;
1593 if (buf_len > 64 * 1024)
1596 if (check_user_elem_overflow(ue->card, buf_len))
1598 names = vmemdup_user((const void __user *)user_ptrval, buf_len);
1600 return PTR_ERR(names);
1602 /* check that there are enough valid names */
1604 for (i = 0; i < ue->info.value.enumerated.items; ++i) {
1605 name_len = strnlen(p, buf_len);
1606 if (name_len == 0 || name_len >= 64 || name_len == buf_len) {
1611 buf_len -= name_len + 1;
1614 ue->priv_data = names;
1615 ue->info.value.enumerated.names_ptr = 0;
1616 // increment the allocation size; decremented again at private_free.
1617 ue->card->user_ctl_alloc_size += ue->info.value.enumerated.names_length;
1622 static size_t compute_user_elem_size(size_t size, unsigned int count)
1624 return sizeof(struct user_element) + size * count;
1627 static void snd_ctl_elem_user_free(struct snd_kcontrol *kcontrol)
1629 struct user_element *ue = kcontrol->private_data;
1631 // decrement the allocation size.
1632 ue->card->user_ctl_alloc_size -= compute_user_elem_size(ue->elem_data_size, kcontrol->count);
1633 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1635 ue->card->user_ctl_alloc_size -= ue->info.value.enumerated.names_length;
1637 kvfree(ue->tlv_data);
1638 kvfree(ue->priv_data);
1642 static int snd_ctl_elem_add(struct snd_ctl_file *file,
1643 struct snd_ctl_elem_info *info, int replace)
1645 struct snd_card *card = file->card;
1646 struct snd_kcontrol *kctl;
1648 unsigned int access;
1651 struct user_element *ue;
1652 unsigned int offset;
1655 if (!*info->id.name)
1657 if (strnlen(info->id.name, sizeof(info->id.name)) >= sizeof(info->id.name))
1660 /* Delete a control to replace them if needed. */
1663 err = snd_ctl_remove_user_ctl(file, &info->id);
1668 /* Check the number of elements for this userspace control. */
1669 count = info->owner;
1673 /* Arrange access permissions if needed. */
1674 access = info->access;
1676 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
1677 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
1678 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
1679 SNDRV_CTL_ELEM_ACCESS_TLV_WRITE);
1681 /* In initial state, nothing is available as TLV container. */
1682 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1683 access |= SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK;
1684 access |= SNDRV_CTL_ELEM_ACCESS_USER;
1687 * Check information and calculate the size of data specific to
1688 * this userspace control.
1690 /* pass NULL to card for suppressing error messages */
1691 err = snd_ctl_check_elem_info(NULL, info);
1694 /* user-space control doesn't allow zero-size data */
1695 if (info->count < 1)
1697 private_size = value_sizes[info->type] * info->count;
1698 alloc_size = compute_user_elem_size(private_size, count);
1700 guard(rwsem_write)(&card->controls_rwsem);
1701 if (check_user_elem_overflow(card, alloc_size))
1705 * Keep memory object for this userspace control. After passing this
1706 * code block, the instance should be freed by snd_ctl_free_one().
1708 * Note that these elements in this control are locked.
1710 err = snd_ctl_new(&kctl, count, access, file);
1713 memcpy(&kctl->id, &info->id, sizeof(kctl->id));
1714 ue = kzalloc(alloc_size, GFP_KERNEL);
1719 kctl->private_data = ue;
1720 kctl->private_free = snd_ctl_elem_user_free;
1722 // increment the allocated size; decremented again at private_free.
1723 card->user_ctl_alloc_size += alloc_size;
1725 /* Set private data for this userspace control. */
1728 ue->info.access = 0;
1729 ue->elem_data = (char *)ue + sizeof(*ue);
1730 ue->elem_data_size = private_size;
1731 if (ue->info.type == SNDRV_CTL_ELEM_TYPE_ENUMERATED) {
1732 err = snd_ctl_elem_init_enum_names(ue);
1734 snd_ctl_free_one(kctl);
1739 /* Set callback functions. */
1740 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED)
1741 kctl->info = snd_ctl_elem_user_enum_info;
1743 kctl->info = snd_ctl_elem_user_info;
1744 if (access & SNDRV_CTL_ELEM_ACCESS_READ)
1745 kctl->get = snd_ctl_elem_user_get;
1746 if (access & SNDRV_CTL_ELEM_ACCESS_WRITE)
1747 kctl->put = snd_ctl_elem_user_put;
1748 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1749 kctl->tlv.c = snd_ctl_elem_user_tlv;
1751 /* This function manage to free the instance on failure. */
1752 err = __snd_ctl_add_replace(card, kctl, CTL_ADD_EXCLUSIVE);
1754 snd_ctl_free_one(kctl);
1757 offset = snd_ctl_get_ioff(kctl, &info->id);
1758 snd_ctl_build_ioff(&info->id, kctl, offset);
1760 * Here we cannot fill any field for the number of elements added by
1761 * this operation because there're no specific fields. The usage of
1762 * 'owner' field for this purpose may cause any bugs to userspace
1763 * applications because the field originally means PID of a process
1764 * which locks the element.
1769 static int snd_ctl_elem_add_user(struct snd_ctl_file *file,
1770 struct snd_ctl_elem_info __user *_info, int replace)
1772 struct snd_ctl_elem_info info;
1775 if (copy_from_user(&info, _info, sizeof(info)))
1777 err = snd_ctl_elem_add(file, &info, replace);
1780 if (copy_to_user(_info, &info, sizeof(info))) {
1781 snd_ctl_remove_user_ctl(file, &info.id);
1788 static int snd_ctl_elem_remove(struct snd_ctl_file *file,
1789 struct snd_ctl_elem_id __user *_id)
1791 struct snd_ctl_elem_id id;
1793 if (copy_from_user(&id, _id, sizeof(id)))
1795 return snd_ctl_remove_user_ctl(file, &id);
1798 static int snd_ctl_subscribe_events(struct snd_ctl_file *file, int __user *ptr)
1801 if (get_user(subscribe, ptr))
1803 if (subscribe < 0) {
1804 subscribe = file->subscribed;
1805 if (put_user(subscribe, ptr))
1810 file->subscribed = 1;
1812 } else if (file->subscribed) {
1813 snd_ctl_empty_read_queue(file);
1814 file->subscribed = 0;
1819 static int call_tlv_handler(struct snd_ctl_file *file, int op_flag,
1820 struct snd_kcontrol *kctl,
1821 struct snd_ctl_elem_id *id,
1822 unsigned int __user *buf, unsigned int size)
1824 static const struct {
1828 {SNDRV_CTL_TLV_OP_READ, SNDRV_CTL_ELEM_ACCESS_TLV_READ},
1829 {SNDRV_CTL_TLV_OP_WRITE, SNDRV_CTL_ELEM_ACCESS_TLV_WRITE},
1830 {SNDRV_CTL_TLV_OP_CMD, SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND},
1832 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1835 /* Check support of the request for this element. */
1836 for (i = 0; i < ARRAY_SIZE(pairs); ++i) {
1837 if (op_flag == pairs[i].op && (vd->access & pairs[i].perm))
1840 if (i == ARRAY_SIZE(pairs))
1843 if (kctl->tlv.c == NULL)
1846 /* Write and command operations are not allowed for locked element. */
1847 if (op_flag != SNDRV_CTL_TLV_OP_READ &&
1848 vd->owner != NULL && vd->owner != file)
1851 ret = snd_power_ref_and_wait(file->card);
1853 ret = kctl->tlv.c(kctl, op_flag, size, buf);
1854 snd_power_unref(file->card);
1858 static int read_tlv_buf(struct snd_kcontrol *kctl, struct snd_ctl_elem_id *id,
1859 unsigned int __user *buf, unsigned int size)
1861 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1864 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ))
1867 if (kctl->tlv.p == NULL)
1870 len = sizeof(unsigned int) * 2 + kctl->tlv.p[1];
1874 if (copy_to_user(buf, kctl->tlv.p, len))
1880 static int snd_ctl_tlv_ioctl(struct snd_ctl_file *file,
1881 struct snd_ctl_tlv __user *buf,
1884 struct snd_ctl_tlv header;
1885 unsigned int __user *container;
1886 unsigned int container_size;
1887 struct snd_kcontrol *kctl;
1888 struct snd_ctl_elem_id id;
1889 struct snd_kcontrol_volatile *vd;
1891 lockdep_assert_held(&file->card->controls_rwsem);
1893 if (copy_from_user(&header, buf, sizeof(header)))
1896 /* In design of control core, numerical ID starts at 1. */
1897 if (header.numid == 0)
1900 /* At least, container should include type and length fields. */
1901 if (header.length < sizeof(unsigned int) * 2)
1903 container_size = header.length;
1904 container = buf->tlv;
1906 kctl = snd_ctl_find_numid_locked(file->card, header.numid);
1910 /* Calculate index of the element in this set. */
1912 snd_ctl_build_ioff(&id, kctl, header.numid - id.numid);
1913 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1915 if (vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) {
1916 return call_tlv_handler(file, op_flag, kctl, &id, container,
1919 if (op_flag == SNDRV_CTL_TLV_OP_READ) {
1920 return read_tlv_buf(kctl, &id, container,
1925 /* Not supported. */
1929 static long snd_ctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1931 struct snd_ctl_file *ctl;
1932 struct snd_card *card;
1933 struct snd_kctl_ioctl *p;
1934 void __user *argp = (void __user *)arg;
1935 int __user *ip = argp;
1938 ctl = file->private_data;
1940 if (snd_BUG_ON(!card))
1943 case SNDRV_CTL_IOCTL_PVERSION:
1944 return put_user(SNDRV_CTL_VERSION, ip) ? -EFAULT : 0;
1945 case SNDRV_CTL_IOCTL_CARD_INFO:
1946 return snd_ctl_card_info(card, ctl, cmd, argp);
1947 case SNDRV_CTL_IOCTL_ELEM_LIST:
1948 return snd_ctl_elem_list_user(card, argp);
1949 case SNDRV_CTL_IOCTL_ELEM_INFO:
1950 return snd_ctl_elem_info_user(ctl, argp);
1951 case SNDRV_CTL_IOCTL_ELEM_READ:
1952 return snd_ctl_elem_read_user(card, argp);
1953 case SNDRV_CTL_IOCTL_ELEM_WRITE:
1954 return snd_ctl_elem_write_user(ctl, argp);
1955 case SNDRV_CTL_IOCTL_ELEM_LOCK:
1956 return snd_ctl_elem_lock(ctl, argp);
1957 case SNDRV_CTL_IOCTL_ELEM_UNLOCK:
1958 return snd_ctl_elem_unlock(ctl, argp);
1959 case SNDRV_CTL_IOCTL_ELEM_ADD:
1960 return snd_ctl_elem_add_user(ctl, argp, 0);
1961 case SNDRV_CTL_IOCTL_ELEM_REPLACE:
1962 return snd_ctl_elem_add_user(ctl, argp, 1);
1963 case SNDRV_CTL_IOCTL_ELEM_REMOVE:
1964 return snd_ctl_elem_remove(ctl, argp);
1965 case SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS:
1966 return snd_ctl_subscribe_events(ctl, ip);
1967 case SNDRV_CTL_IOCTL_TLV_READ:
1968 scoped_guard(rwsem_read, &ctl->card->controls_rwsem)
1969 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_READ);
1971 case SNDRV_CTL_IOCTL_TLV_WRITE:
1972 scoped_guard(rwsem_write, &ctl->card->controls_rwsem)
1973 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_WRITE);
1975 case SNDRV_CTL_IOCTL_TLV_COMMAND:
1976 scoped_guard(rwsem_write, &ctl->card->controls_rwsem)
1977 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_CMD);
1979 case SNDRV_CTL_IOCTL_POWER:
1980 return -ENOPROTOOPT;
1981 case SNDRV_CTL_IOCTL_POWER_STATE:
1982 return put_user(SNDRV_CTL_POWER_D0, ip) ? -EFAULT : 0;
1985 guard(rwsem_read)(&snd_ioctl_rwsem);
1986 list_for_each_entry(p, &snd_control_ioctls, list) {
1987 err = p->fioctl(card, ctl, cmd, arg);
1988 if (err != -ENOIOCTLCMD)
1991 dev_dbg(card->dev, "unknown ioctl = 0x%x\n", cmd);
1995 static ssize_t snd_ctl_read(struct file *file, char __user *buffer,
1996 size_t count, loff_t * offset)
1998 struct snd_ctl_file *ctl;
2002 ctl = file->private_data;
2003 if (snd_BUG_ON(!ctl || !ctl->card))
2005 if (!ctl->subscribed)
2007 if (count < sizeof(struct snd_ctl_event))
2009 spin_lock_irq(&ctl->read_lock);
2010 while (count >= sizeof(struct snd_ctl_event)) {
2011 struct snd_ctl_event ev;
2012 struct snd_kctl_event *kev;
2013 while (list_empty(&ctl->events)) {
2014 wait_queue_entry_t wait;
2015 if ((file->f_flags & O_NONBLOCK) != 0 || result > 0) {
2019 init_waitqueue_entry(&wait, current);
2020 add_wait_queue(&ctl->change_sleep, &wait);
2021 set_current_state(TASK_INTERRUPTIBLE);
2022 spin_unlock_irq(&ctl->read_lock);
2024 remove_wait_queue(&ctl->change_sleep, &wait);
2025 if (ctl->card->shutdown)
2027 if (signal_pending(current))
2028 return -ERESTARTSYS;
2029 spin_lock_irq(&ctl->read_lock);
2031 kev = snd_kctl_event(ctl->events.next);
2032 ev.type = SNDRV_CTL_EVENT_ELEM;
2033 ev.data.elem.mask = kev->mask;
2034 ev.data.elem.id = kev->id;
2035 list_del(&kev->list);
2036 spin_unlock_irq(&ctl->read_lock);
2038 if (copy_to_user(buffer, &ev, sizeof(struct snd_ctl_event))) {
2042 spin_lock_irq(&ctl->read_lock);
2043 buffer += sizeof(struct snd_ctl_event);
2044 count -= sizeof(struct snd_ctl_event);
2045 result += sizeof(struct snd_ctl_event);
2048 spin_unlock_irq(&ctl->read_lock);
2050 return result > 0 ? result : err;
2053 static __poll_t snd_ctl_poll(struct file *file, poll_table * wait)
2056 struct snd_ctl_file *ctl;
2058 ctl = file->private_data;
2059 if (!ctl->subscribed)
2061 poll_wait(file, &ctl->change_sleep, wait);
2064 if (!list_empty(&ctl->events))
2065 mask |= EPOLLIN | EPOLLRDNORM;
2071 * register the device-specific control-ioctls.
2072 * called from each device manager like pcm.c, hwdep.c, etc.
2074 static int _snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn, struct list_head *lists)
2076 struct snd_kctl_ioctl *pn;
2078 pn = kzalloc(sizeof(struct snd_kctl_ioctl), GFP_KERNEL);
2082 guard(rwsem_write)(&snd_ioctl_rwsem);
2083 list_add_tail(&pn->list, lists);
2088 * snd_ctl_register_ioctl - register the device-specific control-ioctls
2089 * @fcn: ioctl callback function
2091 * called from each device manager like pcm.c, hwdep.c, etc.
2093 * Return: zero if successful, or a negative error code
2095 int snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn)
2097 return _snd_ctl_register_ioctl(fcn, &snd_control_ioctls);
2099 EXPORT_SYMBOL(snd_ctl_register_ioctl);
2101 #ifdef CONFIG_COMPAT
2103 * snd_ctl_register_ioctl_compat - register the device-specific 32bit compat
2105 * @fcn: ioctl callback function
2107 * Return: zero if successful, or a negative error code
2109 int snd_ctl_register_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2111 return _snd_ctl_register_ioctl(fcn, &snd_control_compat_ioctls);
2113 EXPORT_SYMBOL(snd_ctl_register_ioctl_compat);
2117 * de-register the device-specific control-ioctls.
2119 static int _snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn,
2120 struct list_head *lists)
2122 struct snd_kctl_ioctl *p;
2124 if (snd_BUG_ON(!fcn))
2126 guard(rwsem_write)(&snd_ioctl_rwsem);
2127 list_for_each_entry(p, lists, list) {
2128 if (p->fioctl == fcn) {
2139 * snd_ctl_unregister_ioctl - de-register the device-specific control-ioctls
2140 * @fcn: ioctl callback function to unregister
2142 * Return: zero if successful, or a negative error code
2144 int snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn)
2146 return _snd_ctl_unregister_ioctl(fcn, &snd_control_ioctls);
2148 EXPORT_SYMBOL(snd_ctl_unregister_ioctl);
2150 #ifdef CONFIG_COMPAT
2152 * snd_ctl_unregister_ioctl_compat - de-register the device-specific compat
2153 * 32bit control-ioctls
2154 * @fcn: ioctl callback function to unregister
2156 * Return: zero if successful, or a negative error code
2158 int snd_ctl_unregister_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2160 return _snd_ctl_unregister_ioctl(fcn, &snd_control_compat_ioctls);
2162 EXPORT_SYMBOL(snd_ctl_unregister_ioctl_compat);
2165 static int snd_ctl_fasync(int fd, struct file * file, int on)
2167 struct snd_ctl_file *ctl;
2169 ctl = file->private_data;
2170 return snd_fasync_helper(fd, file, on, &ctl->fasync);
2173 /* return the preferred subdevice number if already assigned;
2174 * otherwise return -1
2176 int snd_ctl_get_preferred_subdevice(struct snd_card *card, int type)
2178 struct snd_ctl_file *kctl;
2181 guard(read_lock_irqsave)(&card->ctl_files_rwlock);
2182 list_for_each_entry(kctl, &card->ctl_files, list) {
2183 if (kctl->pid == task_pid(current)) {
2184 subdevice = kctl->preferred_subdevice[type];
2185 if (subdevice != -1)
2191 EXPORT_SYMBOL_GPL(snd_ctl_get_preferred_subdevice);
2196 #ifdef CONFIG_COMPAT
2197 #include "control_compat.c"
2199 #define snd_ctl_ioctl_compat NULL
2203 * control layers (audio LED etc.)
2207 * snd_ctl_request_layer - request to use the layer
2208 * @module_name: Name of the kernel module (NULL == build-in)
2210 * Return: zero if successful, or an error code when the module cannot be loaded
2212 int snd_ctl_request_layer(const char *module_name)
2214 struct snd_ctl_layer_ops *lops;
2216 if (module_name == NULL)
2218 scoped_guard(rwsem_read, &snd_ctl_layer_rwsem) {
2219 for (lops = snd_ctl_layer; lops; lops = lops->next)
2220 if (strcmp(lops->module_name, module_name) == 0)
2223 return request_module(module_name);
2225 EXPORT_SYMBOL_GPL(snd_ctl_request_layer);
2228 * snd_ctl_register_layer - register new control layer
2229 * @lops: operation structure
2231 * The new layer can track all control elements and do additional
2232 * operations on top (like audio LED handling).
2234 void snd_ctl_register_layer(struct snd_ctl_layer_ops *lops)
2236 struct snd_card *card;
2239 scoped_guard(rwsem_write, &snd_ctl_layer_rwsem) {
2240 lops->next = snd_ctl_layer;
2241 snd_ctl_layer = lops;
2243 for (card_number = 0; card_number < SNDRV_CARDS; card_number++) {
2244 card = snd_card_ref(card_number);
2246 scoped_guard(rwsem_read, &card->controls_rwsem)
2247 lops->lregister(card);
2248 snd_card_unref(card);
2252 EXPORT_SYMBOL_GPL(snd_ctl_register_layer);
2255 * snd_ctl_disconnect_layer - disconnect control layer
2256 * @lops: operation structure
2258 * It is expected that the information about tracked cards
2259 * is freed before this call (the disconnect callback is
2262 void snd_ctl_disconnect_layer(struct snd_ctl_layer_ops *lops)
2264 struct snd_ctl_layer_ops *lops2, *prev_lops2;
2266 guard(rwsem_write)(&snd_ctl_layer_rwsem);
2267 for (lops2 = snd_ctl_layer, prev_lops2 = NULL; lops2; lops2 = lops2->next) {
2268 if (lops2 == lops) {
2270 snd_ctl_layer = lops->next;
2272 prev_lops2->next = lops->next;
2278 EXPORT_SYMBOL_GPL(snd_ctl_disconnect_layer);
2284 static const struct file_operations snd_ctl_f_ops =
2286 .owner = THIS_MODULE,
2287 .read = snd_ctl_read,
2288 .open = snd_ctl_open,
2289 .release = snd_ctl_release,
2290 .llseek = no_llseek,
2291 .poll = snd_ctl_poll,
2292 .unlocked_ioctl = snd_ctl_ioctl,
2293 .compat_ioctl = snd_ctl_ioctl_compat,
2294 .fasync = snd_ctl_fasync,
2297 /* call lops under rwsems; called from snd_ctl_dev_*() below() */
2298 #define call_snd_ctl_lops(_card, _op) \
2300 struct snd_ctl_layer_ops *lops; \
2301 guard(rwsem_read)(&(_card)->controls_rwsem); \
2302 guard(rwsem_read)(&snd_ctl_layer_rwsem); \
2303 for (lops = snd_ctl_layer; lops; lops = lops->next) \
2308 * registration of the control device
2310 static int snd_ctl_dev_register(struct snd_device *device)
2312 struct snd_card *card = device->device_data;
2315 err = snd_register_device(SNDRV_DEVICE_TYPE_CONTROL, card, -1,
2316 &snd_ctl_f_ops, card, card->ctl_dev);
2319 call_snd_ctl_lops(card, lregister);
2324 * disconnection of the control device
2326 static int snd_ctl_dev_disconnect(struct snd_device *device)
2328 struct snd_card *card = device->device_data;
2329 struct snd_ctl_file *ctl;
2331 scoped_guard(read_lock_irqsave, &card->ctl_files_rwlock) {
2332 list_for_each_entry(ctl, &card->ctl_files, list) {
2333 wake_up(&ctl->change_sleep);
2334 snd_kill_fasync(ctl->fasync, SIGIO, POLL_ERR);
2338 call_snd_ctl_lops(card, ldisconnect);
2339 return snd_unregister_device(card->ctl_dev);
2345 static int snd_ctl_dev_free(struct snd_device *device)
2347 struct snd_card *card = device->device_data;
2348 struct snd_kcontrol *control;
2350 scoped_guard(rwsem_write, &card->controls_rwsem) {
2351 while (!list_empty(&card->controls)) {
2352 control = snd_kcontrol(card->controls.next);
2353 __snd_ctl_remove(card, control, false);
2356 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
2357 xa_destroy(&card->ctl_numids);
2358 xa_destroy(&card->ctl_hash);
2361 put_device(card->ctl_dev);
2366 * create control core:
2367 * called from init.c
2369 int snd_ctl_create(struct snd_card *card)
2371 static const struct snd_device_ops ops = {
2372 .dev_free = snd_ctl_dev_free,
2373 .dev_register = snd_ctl_dev_register,
2374 .dev_disconnect = snd_ctl_dev_disconnect,
2378 if (snd_BUG_ON(!card))
2380 if (snd_BUG_ON(card->number < 0 || card->number >= SNDRV_CARDS))
2383 err = snd_device_alloc(&card->ctl_dev, card);
2386 dev_set_name(card->ctl_dev, "controlC%d", card->number);
2388 err = snd_device_new(card, SNDRV_DEV_CONTROL, card, &ops);
2390 put_device(card->ctl_dev);
2395 * Frequently used control callbacks/helpers
2399 * snd_ctl_boolean_mono_info - Helper function for a standard boolean info
2400 * callback with a mono channel
2401 * @kcontrol: the kcontrol instance
2402 * @uinfo: info to store
2404 * This is a function that can be used as info callback for a standard
2405 * boolean control with a single mono channel.
2407 * Return: Zero (always successful)
2409 int snd_ctl_boolean_mono_info(struct snd_kcontrol *kcontrol,
2410 struct snd_ctl_elem_info *uinfo)
2412 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2414 uinfo->value.integer.min = 0;
2415 uinfo->value.integer.max = 1;
2418 EXPORT_SYMBOL(snd_ctl_boolean_mono_info);
2421 * snd_ctl_boolean_stereo_info - Helper function for a standard boolean info
2422 * callback with stereo two channels
2423 * @kcontrol: the kcontrol instance
2424 * @uinfo: info to store
2426 * This is a function that can be used as info callback for a standard
2427 * boolean control with stereo two channels.
2429 * Return: Zero (always successful)
2431 int snd_ctl_boolean_stereo_info(struct snd_kcontrol *kcontrol,
2432 struct snd_ctl_elem_info *uinfo)
2434 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2436 uinfo->value.integer.min = 0;
2437 uinfo->value.integer.max = 1;
2440 EXPORT_SYMBOL(snd_ctl_boolean_stereo_info);
2443 * snd_ctl_enum_info - fills the info structure for an enumerated control
2444 * @info: the structure to be filled
2445 * @channels: the number of the control's channels; often one
2446 * @items: the number of control values; also the size of @names
2447 * @names: an array containing the names of all control values
2449 * Sets all required fields in @info to their appropriate values.
2450 * If the control's accessibility is not the default (readable and writable),
2451 * the caller has to fill @info->access.
2453 * Return: Zero (always successful)
2455 int snd_ctl_enum_info(struct snd_ctl_elem_info *info, unsigned int channels,
2456 unsigned int items, const char *const names[])
2458 info->type = SNDRV_CTL_ELEM_TYPE_ENUMERATED;
2459 info->count = channels;
2460 info->value.enumerated.items = items;
2463 if (info->value.enumerated.item >= items)
2464 info->value.enumerated.item = items - 1;
2465 WARN(strlen(names[info->value.enumerated.item]) >= sizeof(info->value.enumerated.name),
2466 "ALSA: too long item name '%s'\n",
2467 names[info->value.enumerated.item]);
2468 strscpy(info->value.enumerated.name,
2469 names[info->value.enumerated.item],
2470 sizeof(info->value.enumerated.name));
2473 EXPORT_SYMBOL(snd_ctl_enum_info);