Merge tag 'pull-elfcore' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
[linux-block.git] / sound / core / control.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * Routines for driver control interface
c1017a4c 4 * Copyright (c) by Jaroslav Kysela <perex@perex.cz>
1da177e4
LT
5 */
6
1da177e4
LT
7#include <linux/threads.h>
8#include <linux/interrupt.h>
da155d5b 9#include <linux/module.h>
66c6d1ef 10#include <linux/moduleparam.h>
1da177e4
LT
11#include <linux/slab.h>
12#include <linux/vmalloc.h>
13#include <linux/time.h>
88a89037 14#include <linux/mm.h>
fbd3eb7f 15#include <linux/math64.h>
174cd4b1 16#include <linux/sched/signal.h>
1da177e4
LT
17#include <sound/core.h>
18#include <sound/minors.h>
19#include <sound/info.h>
20#include <sound/control.h>
21
66c6d1ef
TS
22// Max allocation size for user controls.
23static int max_user_ctl_alloc_size = 8 * 1024 * 1024;
24module_param_named(max_user_ctl_alloc_size, max_user_ctl_alloc_size, int, 0444);
25MODULE_PARM_DESC(max_user_ctl_alloc_size, "Max allocation size for user controls");
26
5591bf07 27#define MAX_CONTROL_COUNT 1028
1da177e4 28
82e9bae6 29struct snd_kctl_ioctl {
1da177e4
LT
30 struct list_head list; /* list of all ioctls */
31 snd_kctl_ioctl_func_t fioctl;
82e9bae6 32};
1da177e4
LT
33
34static DECLARE_RWSEM(snd_ioctl_rwsem);
3f0638a0 35static DECLARE_RWSEM(snd_ctl_layer_rwsem);
1da177e4
LT
36static LIST_HEAD(snd_control_ioctls);
37#ifdef CONFIG_COMPAT
38static LIST_HEAD(snd_control_compat_ioctls);
39#endif
3f0638a0 40static struct snd_ctl_layer_ops *snd_ctl_layer;
1da177e4
LT
41
42static int snd_ctl_open(struct inode *inode, struct file *file)
43{
1da177e4 44 unsigned long flags;
82e9bae6
TI
45 struct snd_card *card;
46 struct snd_ctl_file *ctl;
23c18d4b 47 int i, err;
1da177e4 48
c5bf68fe 49 err = stream_open(inode, file);
02f4865f
TI
50 if (err < 0)
51 return err;
52
f87135f5 53 card = snd_lookup_minor_data(iminor(inode), SNDRV_DEVICE_TYPE_CONTROL);
1da177e4
LT
54 if (!card) {
55 err = -ENODEV;
56 goto __error1;
57 }
58 err = snd_card_file_add(card, file);
59 if (err < 0) {
60 err = -ENODEV;
61 goto __error1;
62 }
63 if (!try_module_get(card->module)) {
64 err = -EFAULT;
65 goto __error2;
66 }
ca2c0966 67 ctl = kzalloc(sizeof(*ctl), GFP_KERNEL);
1da177e4
LT
68 if (ctl == NULL) {
69 err = -ENOMEM;
70 goto __error;
71 }
72 INIT_LIST_HEAD(&ctl->events);
73 init_waitqueue_head(&ctl->change_sleep);
74 spin_lock_init(&ctl->read_lock);
75 ctl->card = card;
23c18d4b
TI
76 for (i = 0; i < SND_CTL_SUBDEV_ITEMS; i++)
77 ctl->preferred_subdevice[i] = -1;
25d27ede 78 ctl->pid = get_pid(task_pid(current));
1da177e4
LT
79 file->private_data = ctl;
80 write_lock_irqsave(&card->ctl_files_rwlock, flags);
81 list_add_tail(&ctl->list, &card->ctl_files);
82 write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
a0830dbd 83 snd_card_unref(card);
1da177e4
LT
84 return 0;
85
86 __error:
87 module_put(card->module);
88 __error2:
89 snd_card_file_remove(card, file);
90 __error1:
a0830dbd
TI
91 if (card)
92 snd_card_unref(card);
1da177e4
LT
93 return err;
94}
95
82e9bae6 96static void snd_ctl_empty_read_queue(struct snd_ctl_file * ctl)
1da177e4 97{
7507e8da 98 unsigned long flags;
82e9bae6 99 struct snd_kctl_event *cread;
dd5f313b 100
7507e8da 101 spin_lock_irqsave(&ctl->read_lock, flags);
1da177e4
LT
102 while (!list_empty(&ctl->events)) {
103 cread = snd_kctl_event(ctl->events.next);
104 list_del(&cread->list);
105 kfree(cread);
106 }
7507e8da 107 spin_unlock_irqrestore(&ctl->read_lock, flags);
1da177e4
LT
108}
109
110static int snd_ctl_release(struct inode *inode, struct file *file)
111{
112 unsigned long flags;
82e9bae6
TI
113 struct snd_card *card;
114 struct snd_ctl_file *ctl;
115 struct snd_kcontrol *control;
1da177e4
LT
116 unsigned int idx;
117
118 ctl = file->private_data;
1da177e4
LT
119 file->private_data = NULL;
120 card = ctl->card;
121 write_lock_irqsave(&card->ctl_files_rwlock, flags);
122 list_del(&ctl->list);
123 write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
124 down_write(&card->controls_rwsem);
9244b2c3 125 list_for_each_entry(control, &card->controls, list)
1da177e4
LT
126 for (idx = 0; idx < control->count; idx++)
127 if (control->vd[idx].owner == ctl)
128 control->vd[idx].owner = NULL;
1da177e4 129 up_write(&card->controls_rwsem);
4a971e84 130 snd_fasync_free(ctl->fasync);
1da177e4 131 snd_ctl_empty_read_queue(ctl);
25d27ede 132 put_pid(ctl->pid);
1da177e4
LT
133 kfree(ctl);
134 module_put(card->module);
135 snd_card_file_remove(card, file);
136 return 0;
137}
138
12cddbd8
TI
139/**
140 * snd_ctl_notify - Send notification to user-space for a control change
141 * @card: the card to send notification
142 * @mask: the event mask, SNDRV_CTL_EVENT_*
143 * @id: the ctl element id to send notification
144 *
145 * This function adds an event record with the given id and mask, appends
146 * to the list and wakes up the user-space for notification. This can be
147 * called in the atomic context.
148 */
82e9bae6
TI
149void snd_ctl_notify(struct snd_card *card, unsigned int mask,
150 struct snd_ctl_elem_id *id)
1da177e4
LT
151{
152 unsigned long flags;
82e9bae6
TI
153 struct snd_ctl_file *ctl;
154 struct snd_kctl_event *ev;
dd5f313b 155
7eaa943c
TI
156 if (snd_BUG_ON(!card || !id))
157 return;
f388cdcd
TI
158 if (card->shutdown)
159 return;
6564d0ad 160 read_lock_irqsave(&card->ctl_files_rwlock, flags);
8eeaa2f9 161#if IS_ENABLED(CONFIG_SND_MIXER_OSS)
1da177e4
LT
162 card->mixer_oss_change_count++;
163#endif
9244b2c3 164 list_for_each_entry(ctl, &card->ctl_files, list) {
1da177e4
LT
165 if (!ctl->subscribed)
166 continue;
6564d0ad 167 spin_lock(&ctl->read_lock);
9244b2c3 168 list_for_each_entry(ev, &ctl->events, list) {
1da177e4
LT
169 if (ev->id.numid == id->numid) {
170 ev->mask |= mask;
171 goto _found;
172 }
173 }
ca2c0966 174 ev = kzalloc(sizeof(*ev), GFP_ATOMIC);
1da177e4
LT
175 if (ev) {
176 ev->id = *id;
177 ev->mask = mask;
178 list_add_tail(&ev->list, &ctl->events);
179 } else {
bb009457 180 dev_err(card->dev, "No memory available to allocate event\n");
1da177e4
LT
181 }
182 _found:
183 wake_up(&ctl->change_sleep);
6564d0ad 184 spin_unlock(&ctl->read_lock);
4a971e84 185 snd_kill_fasync(ctl->fasync, SIGIO, POLL_IN);
1da177e4 186 }
6564d0ad 187 read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
1da177e4 188}
c0d3fb39
TI
189EXPORT_SYMBOL(snd_ctl_notify);
190
1fa4445f
JK
191/**
192 * snd_ctl_notify_one - Send notification to user-space for a control change
193 * @card: the card to send notification
194 * @mask: the event mask, SNDRV_CTL_EVENT_*
195 * @kctl: the pointer with the control instance
196 * @ioff: the additional offset to the control index
197 *
198 * This function calls snd_ctl_notify() and does additional jobs
199 * like LED state changes.
200 */
201void snd_ctl_notify_one(struct snd_card *card, unsigned int mask,
202 struct snd_kcontrol *kctl, unsigned int ioff)
203{
204 struct snd_ctl_elem_id id = kctl->id;
3f0638a0 205 struct snd_ctl_layer_ops *lops;
1fa4445f
JK
206
207 id.index += ioff;
208 id.numid += ioff;
209 snd_ctl_notify(card, mask, &id);
3f0638a0
JK
210 down_read(&snd_ctl_layer_rwsem);
211 for (lops = snd_ctl_layer; lops; lops = lops->next)
212 lops->lnotify(card, mask, kctl, ioff);
213 up_read(&snd_ctl_layer_rwsem);
1fa4445f
JK
214}
215EXPORT_SYMBOL(snd_ctl_notify_one);
216
1da177e4 217/**
2225e79b
TS
218 * snd_ctl_new - create a new control instance with some elements
219 * @kctl: the pointer to store new control instance
220 * @count: the number of elements in this control
221 * @access: the default access flags for elements in this control
222 * @file: given when locking these elements
1da177e4 223 *
2225e79b
TS
224 * Allocates a memory object for a new control instance. The instance has
225 * elements as many as the given number (@count). Each element has given
226 * access permissions (@access). Each element is locked when @file is given.
1da177e4 227 *
2225e79b 228 * Return: 0 on success, error code on failure
1da177e4 229 */
2225e79b
TS
230static int snd_ctl_new(struct snd_kcontrol **kctl, unsigned int count,
231 unsigned int access, struct snd_ctl_file *file)
1da177e4 232{
1da177e4 233 unsigned int idx;
dd5f313b 234
2225e79b
TS
235 if (count == 0 || count > MAX_CONTROL_COUNT)
236 return -EINVAL;
5591bf07 237
65be9580 238 *kctl = kzalloc(struct_size(*kctl, vd, count), GFP_KERNEL);
ec0e9937 239 if (!*kctl)
2225e79b 240 return -ENOMEM;
2225e79b
TS
241
242 for (idx = 0; idx < count; idx++) {
243 (*kctl)->vd[idx].access = access;
244 (*kctl)->vd[idx].owner = file;
245 }
246 (*kctl)->count = count;
247
248 return 0;
1da177e4
LT
249}
250
251/**
252 * snd_ctl_new1 - create a control instance from the template
253 * @ncontrol: the initialization record
254 * @private_data: the private data to set
255 *
dd5f313b 256 * Allocates a new struct snd_kcontrol instance and initialize from the given
1da177e4
LT
257 * template. When the access field of ncontrol is 0, it's assumed as
258 * READWRITE access. When the count field is 0, it's assumes as one.
259 *
eb7c06e8 260 * Return: The pointer of the newly generated instance, or %NULL on failure.
1da177e4 261 */
82e9bae6
TI
262struct snd_kcontrol *snd_ctl_new1(const struct snd_kcontrol_new *ncontrol,
263 void *private_data)
1da177e4 264{
2225e79b
TS
265 struct snd_kcontrol *kctl;
266 unsigned int count;
1da177e4 267 unsigned int access;
2225e79b 268 int err;
dd5f313b 269
7eaa943c
TI
270 if (snd_BUG_ON(!ncontrol || !ncontrol->info))
271 return NULL;
2225e79b
TS
272
273 count = ncontrol->count;
274 if (count == 0)
275 count = 1;
276
277 access = ncontrol->access;
278 if (access == 0)
279 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
280 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
281 SNDRV_CTL_ELEM_ACCESS_VOLATILE |
282 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
283 SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE |
284 SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND |
fbd3eb7f 285 SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK |
22d8de62 286 SNDRV_CTL_ELEM_ACCESS_LED_MASK |
fbd3eb7f 287 SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK);
2225e79b
TS
288
289 err = snd_ctl_new(&kctl, count, access, NULL);
290 if (err < 0)
291 return NULL;
292
293 /* The 'numid' member is decided when calling snd_ctl_add(). */
294 kctl->id.iface = ncontrol->iface;
295 kctl->id.device = ncontrol->device;
296 kctl->id.subdevice = ncontrol->subdevice;
366840d7 297 if (ncontrol->name) {
75b1a8f9 298 strscpy(kctl->id.name, ncontrol->name, sizeof(kctl->id.name));
2225e79b 299 if (strcmp(ncontrol->name, kctl->id.name) != 0)
bb009457 300 pr_warn("ALSA: Control name '%s' truncated to '%s'\n",
2225e79b 301 ncontrol->name, kctl->id.name);
366840d7 302 }
2225e79b
TS
303 kctl->id.index = ncontrol->index;
304
305 kctl->info = ncontrol->info;
306 kctl->get = ncontrol->get;
307 kctl->put = ncontrol->put;
308 kctl->tlv.p = ncontrol->tlv.p;
309
310 kctl->private_value = ncontrol->private_value;
311 kctl->private_data = private_data;
312
313 return kctl;
1da177e4 314}
c0d3fb39
TI
315EXPORT_SYMBOL(snd_ctl_new1);
316
1da177e4
LT
317/**
318 * snd_ctl_free_one - release the control instance
319 * @kcontrol: the control instance
320 *
321 * Releases the control instance created via snd_ctl_new()
322 * or snd_ctl_new1().
323 * Don't call this after the control was added to the card.
324 */
82e9bae6 325void snd_ctl_free_one(struct snd_kcontrol *kcontrol)
1da177e4
LT
326{
327 if (kcontrol) {
328 if (kcontrol->private_free)
329 kcontrol->private_free(kcontrol);
330 kfree(kcontrol);
331 }
332}
c0d3fb39
TI
333EXPORT_SYMBOL(snd_ctl_free_one);
334
0e82e5fa
CL
335static bool snd_ctl_remove_numid_conflict(struct snd_card *card,
336 unsigned int count)
1da177e4 337{
82e9bae6 338 struct snd_kcontrol *kctl;
1da177e4 339
ac902c11
LPC
340 /* Make sure that the ids assigned to the control do not wrap around */
341 if (card->last_numid >= UINT_MAX - count)
342 card->last_numid = 0;
343
9244b2c3 344 list_for_each_entry(kctl, &card->controls, list) {
7c733587 345 if (kctl->id.numid < card->last_numid + 1 + count &&
0e82e5fa
CL
346 kctl->id.numid + kctl->count > card->last_numid + 1) {
347 card->last_numid = kctl->id.numid + kctl->count - 1;
348 return true;
349 }
1da177e4 350 }
0e82e5fa 351 return false;
1da177e4
LT
352}
353
82e9bae6 354static int snd_ctl_find_hole(struct snd_card *card, unsigned int count)
1da177e4 355{
0e82e5fa 356 unsigned int iter = 100000;
1da177e4 357
0e82e5fa 358 while (snd_ctl_remove_numid_conflict(card, count)) {
1da177e4
LT
359 if (--iter == 0) {
360 /* this situation is very unlikely */
bb009457 361 dev_err(card->dev, "unable to allocate new control numid\n");
1da177e4
LT
362 return -ENOMEM;
363 }
1da177e4
LT
364 }
365 return 0;
366}
367
c27e1efb
TI
368/* check whether the given id is contained in the given kctl */
369static bool elem_id_matches(const struct snd_kcontrol *kctl,
370 const struct snd_ctl_elem_id *id)
371{
372 return kctl->id.iface == id->iface &&
373 kctl->id.device == id->device &&
374 kctl->id.subdevice == id->subdevice &&
375 !strncmp(kctl->id.name, id->name, sizeof(kctl->id.name)) &&
376 kctl->id.index <= id->index &&
377 kctl->id.index + kctl->count > id->index;
378}
379
380#ifdef CONFIG_SND_CTL_FAST_LOOKUP
381/* Compute a hash key for the corresponding ctl id
382 * It's for the name lookup, hence the numid is excluded.
383 * The hash key is bound in LONG_MAX to be used for Xarray key.
384 */
385#define MULTIPLIER 37
386static unsigned long get_ctl_id_hash(const struct snd_ctl_elem_id *id)
387{
6ab55ec0 388 int i;
c27e1efb 389 unsigned long h;
c27e1efb
TI
390
391 h = id->iface;
392 h = MULTIPLIER * h + id->device;
393 h = MULTIPLIER * h + id->subdevice;
5934d9a0 394 for (i = 0; i < SNDRV_CTL_ELEM_ID_NAME_MAXLEN && id->name[i]; i++)
6ab55ec0 395 h = MULTIPLIER * h + id->name[i];
c27e1efb
TI
396 h = MULTIPLIER * h + id->index;
397 h &= LONG_MAX;
398 return h;
399}
400
401/* add hash entries to numid and ctl xarray tables */
402static void add_hash_entries(struct snd_card *card,
403 struct snd_kcontrol *kcontrol)
404{
405 struct snd_ctl_elem_id id = kcontrol->id;
406 int i;
407
408 xa_store_range(&card->ctl_numids, kcontrol->id.numid,
409 kcontrol->id.numid + kcontrol->count - 1,
410 kcontrol, GFP_KERNEL);
411
412 for (i = 0; i < kcontrol->count; i++) {
413 id.index = kcontrol->id.index + i;
414 if (xa_insert(&card->ctl_hash, get_ctl_id_hash(&id),
415 kcontrol, GFP_KERNEL)) {
416 /* skip hash for this entry, noting we had collision */
417 card->ctl_hash_collision = true;
418 dev_dbg(card->dev, "ctl_hash collision %d:%s:%d\n",
419 id.iface, id.name, id.index);
420 }
421 }
422}
423
424/* remove hash entries that have been added */
425static void remove_hash_entries(struct snd_card *card,
426 struct snd_kcontrol *kcontrol)
427{
428 struct snd_ctl_elem_id id = kcontrol->id;
429 struct snd_kcontrol *matched;
430 unsigned long h;
431 int i;
432
433 for (i = 0; i < kcontrol->count; i++) {
434 xa_erase(&card->ctl_numids, id.numid);
435 h = get_ctl_id_hash(&id);
436 matched = xa_load(&card->ctl_hash, h);
437 if (matched && (matched == kcontrol ||
438 elem_id_matches(matched, &id)))
439 xa_erase(&card->ctl_hash, h);
440 id.index++;
441 id.numid++;
442 }
443}
444#else /* CONFIG_SND_CTL_FAST_LOOKUP */
445static inline void add_hash_entries(struct snd_card *card,
446 struct snd_kcontrol *kcontrol)
447{
448}
449static inline void remove_hash_entries(struct snd_card *card,
450 struct snd_kcontrol *kcontrol)
451{
452}
453#endif /* CONFIG_SND_CTL_FAST_LOOKUP */
454
3103c08f
TI
455enum snd_ctl_add_mode {
456 CTL_ADD_EXCLUSIVE, CTL_REPLACE, CTL_ADD_ON_REPLACE,
457};
458
459/* add/replace a new kcontrol object; call with card->controls_rwsem locked */
460static int __snd_ctl_add_replace(struct snd_card *card,
461 struct snd_kcontrol *kcontrol,
462 enum snd_ctl_add_mode mode)
e1a7bfe3
TI
463{
464 struct snd_ctl_elem_id id;
465 unsigned int idx;
3103c08f
TI
466 struct snd_kcontrol *old;
467 int err;
e1a7bfe3
TI
468
469 id = kcontrol->id;
470 if (id.index > UINT_MAX - kcontrol->count)
471 return -EINVAL;
472
3103c08f
TI
473 old = snd_ctl_find_id(card, &id);
474 if (!old) {
475 if (mode == CTL_REPLACE)
476 return -EINVAL;
477 } else {
478 if (mode == CTL_ADD_EXCLUSIVE) {
479 dev_err(card->dev,
480 "control %i:%i:%i:%s:%i is already present\n",
481 id.iface, id.device, id.subdevice, id.name,
482 id.index);
483 return -EBUSY;
484 }
485
486 err = snd_ctl_remove(card, old);
487 if (err < 0)
488 return err;
e1a7bfe3
TI
489 }
490
491 if (snd_ctl_find_hole(card, kcontrol->count) < 0)
492 return -ENOMEM;
493
494 list_add_tail(&kcontrol->list, &card->controls);
495 card->controls_count += kcontrol->count;
496 kcontrol->id.numid = card->last_numid + 1;
497 card->last_numid += kcontrol->count;
498
c27e1efb
TI
499 add_hash_entries(card, kcontrol);
500
1fa4445f
JK
501 for (idx = 0; idx < kcontrol->count; idx++)
502 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_ADD, kcontrol, idx);
e1a7bfe3
TI
503
504 return 0;
505}
506
3103c08f
TI
507static int snd_ctl_add_replace(struct snd_card *card,
508 struct snd_kcontrol *kcontrol,
509 enum snd_ctl_add_mode mode)
1da177e4 510{
c6077b30 511 int err = -EINVAL;
1da177e4 512
73e77ba0 513 if (! kcontrol)
c6077b30 514 return err;
7eaa943c
TI
515 if (snd_BUG_ON(!card || !kcontrol->info))
516 goto error;
883a1d49 517
1da177e4 518 down_write(&card->controls_rwsem);
3103c08f 519 err = __snd_ctl_add_replace(card, kcontrol, mode);
1da177e4 520 up_write(&card->controls_rwsem);
e1a7bfe3
TI
521 if (err < 0)
522 goto error;
1da177e4 523 return 0;
c6077b30
TI
524
525 error:
526 snd_ctl_free_one(kcontrol);
527 return err;
1da177e4 528}
3103c08f
TI
529
530/**
531 * snd_ctl_add - add the control instance to the card
532 * @card: the card instance
533 * @kcontrol: the control instance to add
534 *
535 * Adds the control instance created via snd_ctl_new() or
536 * snd_ctl_new1() to the given card. Assigns also an unique
537 * numid used for fast search.
538 *
539 * It frees automatically the control which cannot be added.
540 *
541 * Return: Zero if successful, or a negative error code on failure.
542 *
543 */
544int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
545{
546 return snd_ctl_add_replace(card, kcontrol, CTL_ADD_EXCLUSIVE);
547}
c0d3fb39
TI
548EXPORT_SYMBOL(snd_ctl_add);
549
66b5b972
DP
550/**
551 * snd_ctl_replace - replace the control instance of the card
552 * @card: the card instance
553 * @kcontrol: the control instance to replace
554 * @add_on_replace: add the control if not already added
555 *
556 * Replaces the given control. If the given control does not exist
557 * and the add_on_replace flag is set, the control is added. If the
558 * control exists, it is destroyed first.
559 *
66b5b972 560 * It frees automatically the control which cannot be added or replaced.
eb7c06e8
YB
561 *
562 * Return: Zero if successful, or a negative error code on failure.
66b5b972
DP
563 */
564int snd_ctl_replace(struct snd_card *card, struct snd_kcontrol *kcontrol,
565 bool add_on_replace)
566{
3103c08f
TI
567 return snd_ctl_add_replace(card, kcontrol,
568 add_on_replace ? CTL_ADD_ON_REPLACE : CTL_REPLACE);
66b5b972
DP
569}
570EXPORT_SYMBOL(snd_ctl_replace);
571
c27e1efb
TI
572static int __snd_ctl_remove(struct snd_card *card,
573 struct snd_kcontrol *kcontrol,
574 bool remove_hash)
575{
576 unsigned int idx;
577
578 if (snd_BUG_ON(!card || !kcontrol))
579 return -EINVAL;
580 list_del(&kcontrol->list);
581
582 if (remove_hash)
583 remove_hash_entries(card, kcontrol);
584
585 card->controls_count -= kcontrol->count;
586 for (idx = 0; idx < kcontrol->count; idx++)
587 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_REMOVE, kcontrol, idx);
588 snd_ctl_free_one(kcontrol);
589 return 0;
590}
591
1da177e4
LT
592/**
593 * snd_ctl_remove - remove the control from the card and release it
594 * @card: the card instance
595 * @kcontrol: the control instance to remove
596 *
597 * Removes the control from the card and then releases the instance.
598 * You don't need to call snd_ctl_free_one(). You must be in
599 * the write lock - down_write(&card->controls_rwsem).
eb7c06e8
YB
600 *
601 * Return: 0 if successful, or a negative error code on failure.
1da177e4 602 */
82e9bae6 603int snd_ctl_remove(struct snd_card *card, struct snd_kcontrol *kcontrol)
1da177e4 604{
c27e1efb 605 return __snd_ctl_remove(card, kcontrol, true);
1da177e4 606}
c0d3fb39
TI
607EXPORT_SYMBOL(snd_ctl_remove);
608
1da177e4
LT
609/**
610 * snd_ctl_remove_id - remove the control of the given id and release it
611 * @card: the card instance
612 * @id: the control id to remove
613 *
614 * Finds the control instance with the given id, removes it from the
615 * card list and releases it.
eb7c06e8
YB
616 *
617 * Return: 0 if successful, or a negative error code on failure.
1da177e4 618 */
82e9bae6 619int snd_ctl_remove_id(struct snd_card *card, struct snd_ctl_elem_id *id)
1da177e4 620{
82e9bae6 621 struct snd_kcontrol *kctl;
1da177e4
LT
622 int ret;
623
624 down_write(&card->controls_rwsem);
625 kctl = snd_ctl_find_id(card, id);
626 if (kctl == NULL) {
627 up_write(&card->controls_rwsem);
628 return -ENOENT;
629 }
630 ret = snd_ctl_remove(card, kctl);
631 up_write(&card->controls_rwsem);
632 return ret;
633}
c0d3fb39
TI
634EXPORT_SYMBOL(snd_ctl_remove_id);
635
1da177e4 636/**
f217ac59 637 * snd_ctl_remove_user_ctl - remove and release the unlocked user control
1da177e4
LT
638 * @file: active control handle
639 * @id: the control id to remove
640 *
641 * Finds the control instance with the given id, removes it from the
642 * card list and releases it.
eb7c06e8
YB
643 *
644 * Return: 0 if successful, or a negative error code on failure.
1da177e4 645 */
f217ac59
CL
646static int snd_ctl_remove_user_ctl(struct snd_ctl_file * file,
647 struct snd_ctl_elem_id *id)
1da177e4 648{
82e9bae6
TI
649 struct snd_card *card = file->card;
650 struct snd_kcontrol *kctl;
1da177e4
LT
651 int idx, ret;
652
653 down_write(&card->controls_rwsem);
654 kctl = snd_ctl_find_id(card, id);
655 if (kctl == NULL) {
317b8081
CL
656 ret = -ENOENT;
657 goto error;
1da177e4 658 }
18dd0aa5
CL
659 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER)) {
660 ret = -EINVAL;
661 goto error;
662 }
1da177e4
LT
663 for (idx = 0; idx < kctl->count; idx++)
664 if (kctl->vd[idx].owner != NULL && kctl->vd[idx].owner != file) {
317b8081
CL
665 ret = -EBUSY;
666 goto error;
1da177e4
LT
667 }
668 ret = snd_ctl_remove(card, kctl);
317b8081 669error:
1da177e4
LT
670 up_write(&card->controls_rwsem);
671 return ret;
672}
673
3cbdd753
TI
674/**
675 * snd_ctl_activate_id - activate/inactivate the control of the given id
676 * @card: the card instance
677 * @id: the control id to activate/inactivate
678 * @active: non-zero to activate
679 *
680 * Finds the control instance with the given id, and activate or
681 * inactivate the control together with notification, if changed.
c78497e0 682 * The given ID data is filled with full information.
3cbdd753 683 *
eb7c06e8 684 * Return: 0 if unchanged, 1 if changed, or a negative error code on failure.
3cbdd753
TI
685 */
686int snd_ctl_activate_id(struct snd_card *card, struct snd_ctl_elem_id *id,
687 int active)
688{
689 struct snd_kcontrol *kctl;
690 struct snd_kcontrol_volatile *vd;
691 unsigned int index_offset;
692 int ret;
693
694 down_write(&card->controls_rwsem);
695 kctl = snd_ctl_find_id(card, id);
696 if (kctl == NULL) {
697 ret = -ENOENT;
698 goto unlock;
699 }
31584ed1 700 index_offset = snd_ctl_get_ioff(kctl, id);
3cbdd753
TI
701 vd = &kctl->vd[index_offset];
702 ret = 0;
703 if (active) {
704 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE))
705 goto unlock;
706 vd->access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE;
707 } else {
708 if (vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)
709 goto unlock;
710 vd->access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
711 }
c78497e0 712 snd_ctl_build_ioff(id, kctl, index_offset);
1fa4445f
JK
713 downgrade_write(&card->controls_rwsem);
714 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_INFO, kctl, index_offset);
715 up_read(&card->controls_rwsem);
716 return 1;
717
3cbdd753
TI
718 unlock:
719 up_write(&card->controls_rwsem);
3cbdd753
TI
720 return ret;
721}
722EXPORT_SYMBOL_GPL(snd_ctl_activate_id);
723
1da177e4
LT
724/**
725 * snd_ctl_rename_id - replace the id of a control on the card
726 * @card: the card instance
727 * @src_id: the old id
728 * @dst_id: the new id
729 *
730 * Finds the control with the old id from the card, and replaces the
731 * id with the new one.
732 *
eb7c06e8 733 * Return: Zero if successful, or a negative error code on failure.
1da177e4 734 */
82e9bae6
TI
735int snd_ctl_rename_id(struct snd_card *card, struct snd_ctl_elem_id *src_id,
736 struct snd_ctl_elem_id *dst_id)
1da177e4 737{
82e9bae6 738 struct snd_kcontrol *kctl;
1da177e4
LT
739
740 down_write(&card->controls_rwsem);
741 kctl = snd_ctl_find_id(card, src_id);
742 if (kctl == NULL) {
743 up_write(&card->controls_rwsem);
744 return -ENOENT;
745 }
c27e1efb 746 remove_hash_entries(card, kctl);
1da177e4
LT
747 kctl->id = *dst_id;
748 kctl->id.numid = card->last_numid + 1;
749 card->last_numid += kctl->count;
c27e1efb 750 add_hash_entries(card, kctl);
1da177e4
LT
751 up_write(&card->controls_rwsem);
752 return 0;
753}
c0d3fb39
TI
754EXPORT_SYMBOL(snd_ctl_rename_id);
755
966f015f
MS
756/**
757 * snd_ctl_rename - rename the control on the card
758 * @card: the card instance
759 * @kctl: the control to rename
760 * @name: the new name
761 *
762 * Renames the specified control on the card to the new name.
763 *
764 * Make sure to take the control write lock - down_write(&card->controls_rwsem).
765 */
766void snd_ctl_rename(struct snd_card *card, struct snd_kcontrol *kctl,
767 const char *name)
768{
769 remove_hash_entries(card, kctl);
770
771 if (strscpy(kctl->id.name, name, sizeof(kctl->id.name)) < 0)
772 pr_warn("ALSA: Renamed control new name '%s' truncated to '%s'\n",
773 name, kctl->id.name);
774
775 add_hash_entries(card, kctl);
776}
777EXPORT_SYMBOL(snd_ctl_rename);
778
c27e1efb
TI
779#ifndef CONFIG_SND_CTL_FAST_LOOKUP
780static struct snd_kcontrol *
781snd_ctl_find_numid_slow(struct snd_card *card, unsigned int numid)
782{
783 struct snd_kcontrol *kctl;
784
785 list_for_each_entry(kctl, &card->controls, list) {
786 if (kctl->id.numid <= numid && kctl->id.numid + kctl->count > numid)
787 return kctl;
788 }
789 return NULL;
790}
791#endif /* !CONFIG_SND_CTL_FAST_LOOKUP */
792
1da177e4
LT
793/**
794 * snd_ctl_find_numid - find the control instance with the given number-id
795 * @card: the card instance
796 * @numid: the number-id to search
797 *
798 * Finds the control instance with the given number-id from the card.
799 *
1da177e4
LT
800 * The caller must down card->controls_rwsem before calling this function
801 * (if the race condition can happen).
eb7c06e8
YB
802 *
803 * Return: The pointer of the instance if found, or %NULL if not.
804 *
1da177e4 805 */
82e9bae6 806struct snd_kcontrol *snd_ctl_find_numid(struct snd_card *card, unsigned int numid)
1da177e4 807{
7eaa943c
TI
808 if (snd_BUG_ON(!card || !numid))
809 return NULL;
c27e1efb
TI
810#ifdef CONFIG_SND_CTL_FAST_LOOKUP
811 return xa_load(&card->ctl_numids, numid);
812#else
813 return snd_ctl_find_numid_slow(card, numid);
814#endif
1da177e4 815}
c0d3fb39
TI
816EXPORT_SYMBOL(snd_ctl_find_numid);
817
1da177e4
LT
818/**
819 * snd_ctl_find_id - find the control instance with the given id
820 * @card: the card instance
821 * @id: the id to search
822 *
823 * Finds the control instance with the given id from the card.
824 *
1da177e4
LT
825 * The caller must down card->controls_rwsem before calling this function
826 * (if the race condition can happen).
eb7c06e8
YB
827 *
828 * Return: The pointer of the instance if found, or %NULL if not.
829 *
1da177e4 830 */
82e9bae6
TI
831struct snd_kcontrol *snd_ctl_find_id(struct snd_card *card,
832 struct snd_ctl_elem_id *id)
1da177e4 833{
82e9bae6 834 struct snd_kcontrol *kctl;
1da177e4 835
7eaa943c
TI
836 if (snd_BUG_ON(!card || !id))
837 return NULL;
1da177e4
LT
838 if (id->numid != 0)
839 return snd_ctl_find_numid(card, id->numid);
c27e1efb
TI
840#ifdef CONFIG_SND_CTL_FAST_LOOKUP
841 kctl = xa_load(&card->ctl_hash, get_ctl_id_hash(id));
842 if (kctl && elem_id_matches(kctl, id))
1da177e4 843 return kctl;
c27e1efb
TI
844 if (!card->ctl_hash_collision)
845 return NULL; /* we can rely on only hash table */
846#endif
847 /* no matching in hash table - try all as the last resort */
848 list_for_each_entry(kctl, &card->controls, list)
849 if (elem_id_matches(kctl, id))
850 return kctl;
851
1da177e4
LT
852 return NULL;
853}
c0d3fb39
TI
854EXPORT_SYMBOL(snd_ctl_find_id);
855
82e9bae6 856static int snd_ctl_card_info(struct snd_card *card, struct snd_ctl_file * ctl,
1da177e4
LT
857 unsigned int cmd, void __user *arg)
858{
82e9bae6 859 struct snd_ctl_card_info *info;
1da177e4 860
ca2c0966 861 info = kzalloc(sizeof(*info), GFP_KERNEL);
1da177e4
LT
862 if (! info)
863 return -ENOMEM;
864 down_read(&snd_ioctl_rwsem);
865 info->card = card->number;
75b1a8f9
JP
866 strscpy(info->id, card->id, sizeof(info->id));
867 strscpy(info->driver, card->driver, sizeof(info->driver));
868 strscpy(info->name, card->shortname, sizeof(info->name));
869 strscpy(info->longname, card->longname, sizeof(info->longname));
870 strscpy(info->mixername, card->mixername, sizeof(info->mixername));
871 strscpy(info->components, card->components, sizeof(info->components));
1da177e4 872 up_read(&snd_ioctl_rwsem);
82e9bae6 873 if (copy_to_user(arg, info, sizeof(struct snd_ctl_card_info))) {
1da177e4
LT
874 kfree(info);
875 return -EFAULT;
876 }
877 kfree(info);
878 return 0;
879}
880
82e9bae6 881static int snd_ctl_elem_list(struct snd_card *card,
18d122c0 882 struct snd_ctl_elem_list *list)
1da177e4 883{
82e9bae6 884 struct snd_kcontrol *kctl;
53e7bf45 885 struct snd_ctl_elem_id id;
78fa2c4d 886 unsigned int offset, space, jidx;
53e7bf45 887 int err = 0;
dd5f313b 888
18d122c0
AB
889 offset = list->offset;
890 space = list->space;
4e361d3c 891
53e7bf45 892 down_read(&card->controls_rwsem);
18d122c0
AB
893 list->count = card->controls_count;
894 list->used = 0;
1da177e4 895 if (space > 0) {
53e7bf45
TI
896 list_for_each_entry(kctl, &card->controls, list) {
897 if (offset >= kctl->count) {
898 offset -= kctl->count;
899 continue;
900 }
901 for (jidx = offset; jidx < kctl->count; jidx++) {
902 snd_ctl_build_ioff(&id, kctl, jidx);
18d122c0 903 if (copy_to_user(list->pids + list->used, &id,
53e7bf45
TI
904 sizeof(id))) {
905 err = -EFAULT;
906 goto out;
907 }
18d122c0 908 list->used++;
53e7bf45
TI
909 if (!--space)
910 goto out;
1da177e4 911 }
1da177e4
LT
912 offset = 0;
913 }
1da177e4 914 }
53e7bf45
TI
915 out:
916 up_read(&card->controls_rwsem);
53e7bf45 917 return err;
1da177e4
LT
918}
919
18d122c0
AB
920static int snd_ctl_elem_list_user(struct snd_card *card,
921 struct snd_ctl_elem_list __user *_list)
922{
923 struct snd_ctl_elem_list list;
924 int err;
925
926 if (copy_from_user(&list, _list, sizeof(list)))
927 return -EFAULT;
928 err = snd_ctl_elem_list(card, &list);
929 if (err)
930 return err;
931 if (copy_to_user(_list, &list, sizeof(list)))
932 return -EFAULT;
933
934 return 0;
935}
936
fbd3eb7f
TI
937/* Check whether the given kctl info is valid */
938static int snd_ctl_check_elem_info(struct snd_card *card,
939 const struct snd_ctl_elem_info *info)
940{
941 static const unsigned int max_value_counts[] = {
942 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = 128,
943 [SNDRV_CTL_ELEM_TYPE_INTEGER] = 128,
944 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = 128,
945 [SNDRV_CTL_ELEM_TYPE_BYTES] = 512,
946 [SNDRV_CTL_ELEM_TYPE_IEC958] = 1,
947 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = 64,
948 };
949
950 if (info->type < SNDRV_CTL_ELEM_TYPE_BOOLEAN ||
951 info->type > SNDRV_CTL_ELEM_TYPE_INTEGER64) {
952 if (card)
953 dev_err(card->dev,
954 "control %i:%i:%i:%s:%i: invalid type %d\n",
955 info->id.iface, info->id.device,
956 info->id.subdevice, info->id.name,
957 info->id.index, info->type);
958 return -EINVAL;
959 }
960 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED &&
961 info->value.enumerated.items == 0) {
962 if (card)
963 dev_err(card->dev,
964 "control %i:%i:%i:%s:%i: zero enum items\n",
965 info->id.iface, info->id.device,
966 info->id.subdevice, info->id.name,
967 info->id.index);
968 return -EINVAL;
969 }
970 if (info->count > max_value_counts[info->type]) {
971 if (card)
972 dev_err(card->dev,
973 "control %i:%i:%i:%s:%i: invalid count %d\n",
974 info->id.iface, info->id.device,
975 info->id.subdevice, info->id.name,
976 info->id.index, info->count);
977 return -EINVAL;
978 }
979
980 return 0;
981}
982
983/* The capacity of struct snd_ctl_elem_value.value.*/
984static const unsigned int value_sizes[] = {
985 [SNDRV_CTL_ELEM_TYPE_BOOLEAN] = sizeof(long),
986 [SNDRV_CTL_ELEM_TYPE_INTEGER] = sizeof(long),
987 [SNDRV_CTL_ELEM_TYPE_ENUMERATED] = sizeof(unsigned int),
988 [SNDRV_CTL_ELEM_TYPE_BYTES] = sizeof(unsigned char),
989 [SNDRV_CTL_ELEM_TYPE_IEC958] = sizeof(struct snd_aes_iec958),
990 [SNDRV_CTL_ELEM_TYPE_INTEGER64] = sizeof(long long),
991};
992
fbd3eb7f
TI
993/* fill the remaining snd_ctl_elem_value data with the given pattern */
994static void fill_remaining_elem_value(struct snd_ctl_elem_value *control,
995 struct snd_ctl_elem_info *info,
996 u32 pattern)
997{
998 size_t offset = value_sizes[info->type] * info->count;
999
afcfbcb3 1000 offset = DIV_ROUND_UP(offset, sizeof(u32));
fbd3eb7f
TI
1001 memset32((u32 *)control->value.bytes.data + offset, pattern,
1002 sizeof(control->value) / sizeof(u32) - offset);
1003}
1004
1005/* check whether the given integer ctl value is valid */
1006static int sanity_check_int_value(struct snd_card *card,
1007 const struct snd_ctl_elem_value *control,
1008 const struct snd_ctl_elem_info *info,
f5e829f9 1009 int i, bool print_error)
fbd3eb7f
TI
1010{
1011 long long lval, lmin, lmax, lstep;
1012 u64 rem;
1013
1014 switch (info->type) {
1015 default:
1016 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1017 lval = control->value.integer.value[i];
1018 lmin = 0;
1019 lmax = 1;
1020 lstep = 0;
1021 break;
1022 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1023 lval = control->value.integer.value[i];
1024 lmin = info->value.integer.min;
1025 lmax = info->value.integer.max;
1026 lstep = info->value.integer.step;
1027 break;
1028 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1029 lval = control->value.integer64.value[i];
1030 lmin = info->value.integer64.min;
1031 lmax = info->value.integer64.max;
1032 lstep = info->value.integer64.step;
1033 break;
1034 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1035 lval = control->value.enumerated.item[i];
1036 lmin = 0;
1037 lmax = info->value.enumerated.items - 1;
1038 lstep = 0;
1039 break;
1040 }
1041
1042 if (lval < lmin || lval > lmax) {
f5e829f9
TI
1043 if (print_error)
1044 dev_err(card->dev,
1045 "control %i:%i:%i:%s:%i: value out of range %lld (%lld/%lld) at count %i\n",
1046 control->id.iface, control->id.device,
1047 control->id.subdevice, control->id.name,
1048 control->id.index, lval, lmin, lmax, i);
fbd3eb7f
TI
1049 return -EINVAL;
1050 }
1051 if (lstep) {
1052 div64_u64_rem(lval, lstep, &rem);
1053 if (rem) {
f5e829f9
TI
1054 if (print_error)
1055 dev_err(card->dev,
1056 "control %i:%i:%i:%s:%i: unaligned value %lld (step %lld) at count %i\n",
1057 control->id.iface, control->id.device,
1058 control->id.subdevice, control->id.name,
1059 control->id.index, lval, lstep, i);
fbd3eb7f
TI
1060 return -EINVAL;
1061 }
1062 }
1063
1064 return 0;
1065}
1066
f5e829f9
TI
1067/* check whether the all input values are valid for the given elem value */
1068static int sanity_check_input_values(struct snd_card *card,
1069 const struct snd_ctl_elem_value *control,
1070 const struct snd_ctl_elem_info *info,
1071 bool print_error)
fbd3eb7f 1072{
f5e829f9 1073 int i, ret;
fbd3eb7f
TI
1074
1075 switch (info->type) {
1076 case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1077 case SNDRV_CTL_ELEM_TYPE_INTEGER:
1078 case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1079 case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1080 for (i = 0; i < info->count; i++) {
f5e829f9
TI
1081 ret = sanity_check_int_value(card, control, info, i,
1082 print_error);
fbd3eb7f
TI
1083 if (ret < 0)
1084 return ret;
1085 }
1086 break;
1087 default:
1088 break;
1089 }
1090
f5e829f9
TI
1091 return 0;
1092}
1093
1094/* perform sanity checks to the given snd_ctl_elem_value object */
1095static int sanity_check_elem_value(struct snd_card *card,
1096 const struct snd_ctl_elem_value *control,
1097 const struct snd_ctl_elem_info *info,
1098 u32 pattern)
1099{
1100 size_t offset;
1101 int ret;
1102 u32 *p;
1103
1104 ret = sanity_check_input_values(card, control, info, true);
1105 if (ret < 0)
1106 return ret;
1107
fbd3eb7f
TI
1108 /* check whether the remaining area kept untouched */
1109 offset = value_sizes[info->type] * info->count;
afcfbcb3 1110 offset = DIV_ROUND_UP(offset, sizeof(u32));
fbd3eb7f
TI
1111 p = (u32 *)control->value.bytes.data + offset;
1112 for (; offset < sizeof(control->value) / sizeof(u32); offset++, p++) {
1113 if (*p != pattern) {
1114 ret = -EINVAL;
1115 break;
1116 }
1117 *p = 0; /* clear the checked area */
1118 }
1119
1120 return ret;
1121}
fbd3eb7f
TI
1122
1123static int __snd_ctl_elem_info(struct snd_card *card,
1124 struct snd_kcontrol *kctl,
1125 struct snd_ctl_elem_info *info,
1126 struct snd_ctl_file *ctl)
1da177e4 1127{
82e9bae6 1128 struct snd_kcontrol_volatile *vd;
1da177e4
LT
1129 unsigned int index_offset;
1130 int result;
dd5f313b 1131
1da177e4
LT
1132#ifdef CONFIG_SND_DEBUG
1133 info->access = 0;
1134#endif
e94fdbd7
TI
1135 result = snd_power_ref_and_wait(card);
1136 if (!result)
1137 result = kctl->info(kctl, info);
1138 snd_power_unref(card);
1da177e4 1139 if (result >= 0) {
7eaa943c 1140 snd_BUG_ON(info->access);
1da177e4
LT
1141 index_offset = snd_ctl_get_ioff(kctl, &info->id);
1142 vd = &kctl->vd[index_offset];
1143 snd_ctl_build_ioff(&info->id, kctl, index_offset);
1144 info->access = vd->access;
1145 if (vd->owner) {
1146 info->access |= SNDRV_CTL_ELEM_ACCESS_LOCK;
1147 if (vd->owner == ctl)
1148 info->access |= SNDRV_CTL_ELEM_ACCESS_OWNER;
25d27ede 1149 info->owner = pid_vnr(vd->owner->pid);
1da177e4
LT
1150 } else {
1151 info->owner = -1;
1152 }
fbd3eb7f
TI
1153 if (!snd_ctl_skip_validation(info) &&
1154 snd_ctl_check_elem_info(card, info) < 0)
1155 result = -EINVAL;
1da177e4 1156 }
fbd3eb7f
TI
1157 return result;
1158}
1159
1160static int snd_ctl_elem_info(struct snd_ctl_file *ctl,
1161 struct snd_ctl_elem_info *info)
1162{
1163 struct snd_card *card = ctl->card;
1164 struct snd_kcontrol *kctl;
1165 int result;
1166
1167 down_read(&card->controls_rwsem);
1168 kctl = snd_ctl_find_id(card, &info->id);
1169 if (kctl == NULL)
1170 result = -ENOENT;
1171 else
1172 result = __snd_ctl_elem_info(card, kctl, info, ctl);
1da177e4
LT
1173 up_read(&card->controls_rwsem);
1174 return result;
1175}
1176
82e9bae6
TI
1177static int snd_ctl_elem_info_user(struct snd_ctl_file *ctl,
1178 struct snd_ctl_elem_info __user *_info)
1da177e4 1179{
82e9bae6 1180 struct snd_ctl_elem_info info;
1da177e4
LT
1181 int result;
1182
1183 if (copy_from_user(&info, _info, sizeof(info)))
1184 return -EFAULT;
7d8e8292
TI
1185 result = snd_ctl_elem_info(ctl, &info);
1186 if (result < 0)
1187 return result;
fbd3eb7f 1188 /* drop internal access flags */
22d8de62
JK
1189 info.access &= ~(SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK|
1190 SNDRV_CTL_ELEM_ACCESS_LED_MASK);
7d8e8292
TI
1191 if (copy_to_user(_info, &info, sizeof(info)))
1192 return -EFAULT;
1da177e4
LT
1193 return result;
1194}
1195
d3bd67cd
TI
1196static int snd_ctl_elem_read(struct snd_card *card,
1197 struct snd_ctl_elem_value *control)
1da177e4 1198{
82e9bae6
TI
1199 struct snd_kcontrol *kctl;
1200 struct snd_kcontrol_volatile *vd;
1da177e4 1201 unsigned int index_offset;
fbd3eb7f
TI
1202 struct snd_ctl_elem_info info;
1203 const u32 pattern = 0xdeadbeef;
1204 int ret;
1da177e4 1205
1da177e4 1206 kctl = snd_ctl_find_id(card, &control->id);
becf9e5d
TS
1207 if (kctl == NULL)
1208 return -ENOENT;
1209
1210 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1211 vd = &kctl->vd[index_offset];
5a23699a 1212 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_READ) || kctl->get == NULL)
becf9e5d
TS
1213 return -EPERM;
1214
1215 snd_ctl_build_ioff(&control->id, kctl, index_offset);
fbd3eb7f 1216
1b7ec514 1217#ifdef CONFIG_SND_CTL_DEBUG
fbd3eb7f
TI
1218 /* info is needed only for validation */
1219 memset(&info, 0, sizeof(info));
1220 info.id = control->id;
1221 ret = __snd_ctl_elem_info(card, kctl, &info, NULL);
1222 if (ret < 0)
1223 return ret;
1224#endif
1225
1226 if (!snd_ctl_skip_validation(&info))
1227 fill_remaining_elem_value(control, &info, pattern);
e94fdbd7
TI
1228 ret = snd_power_ref_and_wait(card);
1229 if (!ret)
1230 ret = kctl->get(kctl, control);
1231 snd_power_unref(card);
fbd3eb7f
TI
1232 if (ret < 0)
1233 return ret;
1234 if (!snd_ctl_skip_validation(&info) &&
1235 sanity_check_elem_value(card, control, &info, pattern) < 0) {
1236 dev_err(card->dev,
1237 "control %i:%i:%i:%s:%i: access overflow\n",
1238 control->id.iface, control->id.device,
1239 control->id.subdevice, control->id.name,
1240 control->id.index);
1241 return -EINVAL;
1242 }
1243 return ret;
1da177e4
LT
1244}
1245
82e9bae6
TI
1246static int snd_ctl_elem_read_user(struct snd_card *card,
1247 struct snd_ctl_elem_value __user *_control)
1da177e4 1248{
82e9bae6 1249 struct snd_ctl_elem_value *control;
1da177e4 1250 int result;
ef44a1ec
LZ
1251
1252 control = memdup_user(_control, sizeof(*control));
1253 if (IS_ERR(control))
1254 return PTR_ERR(control);
1255
7d8e8292
TI
1256 down_read(&card->controls_rwsem);
1257 result = snd_ctl_elem_read(card, control);
1258 up_read(&card->controls_rwsem);
1259 if (result < 0)
1260 goto error;
1261
1262 if (copy_to_user(_control, control, sizeof(*control)))
1263 result = -EFAULT;
1264 error:
1da177e4
LT
1265 kfree(control);
1266 return result;
1267}
1268
d3bd67cd
TI
1269static int snd_ctl_elem_write(struct snd_card *card, struct snd_ctl_file *file,
1270 struct snd_ctl_elem_value *control)
1da177e4 1271{
82e9bae6
TI
1272 struct snd_kcontrol *kctl;
1273 struct snd_kcontrol_volatile *vd;
1da177e4 1274 unsigned int index_offset;
8ace4f3c 1275 int result;
1da177e4 1276
1fa4445f 1277 down_write(&card->controls_rwsem);
1da177e4 1278 kctl = snd_ctl_find_id(card, &control->id);
1fa4445f
JK
1279 if (kctl == NULL) {
1280 up_write(&card->controls_rwsem);
becf9e5d 1281 return -ENOENT;
1fa4445f 1282 }
becf9e5d
TS
1283
1284 index_offset = snd_ctl_get_ioff(kctl, &control->id);
1285 vd = &kctl->vd[index_offset];
1286 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_WRITE) || kctl->put == NULL ||
1287 (file && vd->owner && vd->owner != file)) {
1fa4445f 1288 up_write(&card->controls_rwsem);
becf9e5d 1289 return -EPERM;
1da177e4 1290 }
becf9e5d
TS
1291
1292 snd_ctl_build_ioff(&control->id, kctl, index_offset);
e94fdbd7 1293 result = snd_power_ref_and_wait(card);
f5e829f9
TI
1294 /* validate input values */
1295 if (IS_ENABLED(CONFIG_SND_CTL_INPUT_VALIDATION) && !result) {
1296 struct snd_ctl_elem_info info;
1297
1298 memset(&info, 0, sizeof(info));
1299 info.id = control->id;
1300 result = __snd_ctl_elem_info(card, kctl, &info, NULL);
1301 if (!result)
1302 result = sanity_check_input_values(card, control, &info,
1303 false);
1304 }
e94fdbd7
TI
1305 if (!result)
1306 result = kctl->put(kctl, control);
1307 snd_power_unref(card);
1fa4445f
JK
1308 if (result < 0) {
1309 up_write(&card->controls_rwsem);
becf9e5d 1310 return result;
1fa4445f 1311 }
becf9e5d
TS
1312
1313 if (result > 0) {
1fa4445f
JK
1314 downgrade_write(&card->controls_rwsem);
1315 snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_VALUE, kctl, index_offset);
1316 up_read(&card->controls_rwsem);
1317 } else {
1318 up_write(&card->controls_rwsem);
becf9e5d
TS
1319 }
1320
1321 return 0;
1da177e4
LT
1322}
1323
82e9bae6
TI
1324static int snd_ctl_elem_write_user(struct snd_ctl_file *file,
1325 struct snd_ctl_elem_value __user *_control)
1da177e4 1326{
82e9bae6 1327 struct snd_ctl_elem_value *control;
64649400 1328 struct snd_card *card;
1da177e4
LT
1329 int result;
1330
ef44a1ec
LZ
1331 control = memdup_user(_control, sizeof(*control));
1332 if (IS_ERR(control))
1333 return PTR_ERR(control);
1334
64649400 1335 card = file->card;
7d8e8292 1336 result = snd_ctl_elem_write(card, file, control);
7d8e8292
TI
1337 if (result < 0)
1338 goto error;
1339
1340 if (copy_to_user(_control, control, sizeof(*control)))
1341 result = -EFAULT;
1342 error:
1da177e4
LT
1343 kfree(control);
1344 return result;
1345}
1346
82e9bae6
TI
1347static int snd_ctl_elem_lock(struct snd_ctl_file *file,
1348 struct snd_ctl_elem_id __user *_id)
1da177e4 1349{
82e9bae6
TI
1350 struct snd_card *card = file->card;
1351 struct snd_ctl_elem_id id;
1352 struct snd_kcontrol *kctl;
1353 struct snd_kcontrol_volatile *vd;
1da177e4 1354 int result;
dd5f313b 1355
1da177e4
LT
1356 if (copy_from_user(&id, _id, sizeof(id)))
1357 return -EFAULT;
1358 down_write(&card->controls_rwsem);
1359 kctl = snd_ctl_find_id(card, &id);
1360 if (kctl == NULL) {
1361 result = -ENOENT;
1362 } else {
1363 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1364 if (vd->owner != NULL)
1365 result = -EBUSY;
1366 else {
1367 vd->owner = file;
1da177e4
LT
1368 result = 0;
1369 }
1370 }
1371 up_write(&card->controls_rwsem);
1372 return result;
1373}
1374
82e9bae6
TI
1375static int snd_ctl_elem_unlock(struct snd_ctl_file *file,
1376 struct snd_ctl_elem_id __user *_id)
1da177e4 1377{
82e9bae6
TI
1378 struct snd_card *card = file->card;
1379 struct snd_ctl_elem_id id;
1380 struct snd_kcontrol *kctl;
1381 struct snd_kcontrol_volatile *vd;
1da177e4 1382 int result;
dd5f313b 1383
1da177e4
LT
1384 if (copy_from_user(&id, _id, sizeof(id)))
1385 return -EFAULT;
1386 down_write(&card->controls_rwsem);
1387 kctl = snd_ctl_find_id(card, &id);
1388 if (kctl == NULL) {
1389 result = -ENOENT;
1390 } else {
1391 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1392 if (vd->owner == NULL)
1393 result = -EINVAL;
1394 else if (vd->owner != file)
1395 result = -EPERM;
1396 else {
1397 vd->owner = NULL;
1da177e4
LT
1398 result = 0;
1399 }
1400 }
1401 up_write(&card->controls_rwsem);
1402 return result;
1403}
1404
1405struct user_element {
82e9bae6 1406 struct snd_ctl_elem_info info;
07f4d9d7 1407 struct snd_card *card;
e1c78df1 1408 char *elem_data; /* element data */
1da177e4 1409 unsigned long elem_data_size; /* size of element data in bytes */
8aa9b586
JK
1410 void *tlv_data; /* TLV data */
1411 unsigned long tlv_data_size; /* TLV data size */
1da177e4 1412 void *priv_data; /* private data (like strings for enumerated type) */
1da177e4
LT
1413};
1414
66c6d1ef
TS
1415// check whether the addition (in bytes) of user ctl element may overflow the limit.
1416static bool check_user_elem_overflow(struct snd_card *card, ssize_t add)
1417{
1418 return (ssize_t)card->user_ctl_alloc_size + add > max_user_ctl_alloc_size;
1419}
1420
82e9bae6
TI
1421static int snd_ctl_elem_user_info(struct snd_kcontrol *kcontrol,
1422 struct snd_ctl_elem_info *uinfo)
1da177e4
LT
1423{
1424 struct user_element *ue = kcontrol->private_data;
c378c3b0 1425 unsigned int offset;
1da177e4 1426
c378c3b0 1427 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1da177e4 1428 *uinfo = ue->info;
c378c3b0
TS
1429 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1430
1da177e4
LT
1431 return 0;
1432}
1433
8d448162
CL
1434static int snd_ctl_elem_user_enum_info(struct snd_kcontrol *kcontrol,
1435 struct snd_ctl_elem_info *uinfo)
1436{
1437 struct user_element *ue = kcontrol->private_data;
1438 const char *names;
1439 unsigned int item;
c378c3b0 1440 unsigned int offset;
8d448162
CL
1441
1442 item = uinfo->value.enumerated.item;
1443
c378c3b0 1444 offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
8d448162 1445 *uinfo = ue->info;
c378c3b0 1446 snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
8d448162
CL
1447
1448 item = min(item, uinfo->value.enumerated.items - 1);
1449 uinfo->value.enumerated.item = item;
1450
1451 names = ue->priv_data;
1452 for (; item > 0; --item)
1453 names += strlen(names) + 1;
1454 strcpy(uinfo->value.enumerated.name, names);
1455
1456 return 0;
1457}
1458
82e9bae6
TI
1459static int snd_ctl_elem_user_get(struct snd_kcontrol *kcontrol,
1460 struct snd_ctl_elem_value *ucontrol)
1da177e4
LT
1461{
1462 struct user_element *ue = kcontrol->private_data;
e1c78df1
TS
1463 unsigned int size = ue->elem_data_size;
1464 char *src = ue->elem_data +
1465 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1da177e4 1466
e1c78df1 1467 memcpy(&ucontrol->value, src, size);
1da177e4
LT
1468 return 0;
1469}
1470
82e9bae6
TI
1471static int snd_ctl_elem_user_put(struct snd_kcontrol *kcontrol,
1472 struct snd_ctl_elem_value *ucontrol)
1da177e4
LT
1473{
1474 int change;
1475 struct user_element *ue = kcontrol->private_data;
e1c78df1
TS
1476 unsigned int size = ue->elem_data_size;
1477 char *dst = ue->elem_data +
1478 snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
07f4d9d7 1479
e1c78df1 1480 change = memcmp(&ucontrol->value, dst, size) != 0;
1da177e4 1481 if (change)
e1c78df1 1482 memcpy(dst, &ucontrol->value, size);
1da177e4
LT
1483 return change;
1484}
1485
998f26f4 1486/* called in controls_rwsem write lock */
6d4d41f0
TS
1487static int replace_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1488 unsigned int size)
8aa9b586 1489{
6d4d41f0
TS
1490 struct user_element *ue = kctl->private_data;
1491 unsigned int *container;
b8e2204b 1492 unsigned int mask = 0;
da428828 1493 int i;
6d4d41f0 1494 int change;
8aa9b586 1495
6d4d41f0
TS
1496 if (size > 1024 * 128) /* sane value */
1497 return -EINVAL;
30d8340b 1498
66c6d1ef
TS
1499 // does the TLV size change cause overflow?
1500 if (check_user_elem_overflow(ue->card, (ssize_t)(size - ue->tlv_data_size)))
1501 return -ENOMEM;
1502
88a89037 1503 container = vmemdup_user(buf, size);
6d4d41f0
TS
1504 if (IS_ERR(container))
1505 return PTR_ERR(container);
ef44a1ec 1506
6d4d41f0
TS
1507 change = ue->tlv_data_size != size;
1508 if (!change)
241bc82e 1509 change = memcmp(ue->tlv_data, container, size) != 0;
6d4d41f0 1510 if (!change) {
88a89037 1511 kvfree(container);
6d4d41f0
TS
1512 return 0;
1513 }
30d8340b 1514
b8e2204b
TS
1515 if (ue->tlv_data == NULL) {
1516 /* Now TLV data is available. */
1517 for (i = 0; i < kctl->count; ++i)
1518 kctl->vd[i].access |= SNDRV_CTL_ELEM_ACCESS_TLV_READ;
1519 mask = SNDRV_CTL_EVENT_MASK_INFO;
66c6d1ef
TS
1520 } else {
1521 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1522 ue->tlv_data_size = 0;
1523 kvfree(ue->tlv_data);
b8e2204b
TS
1524 }
1525
6d4d41f0
TS
1526 ue->tlv_data = container;
1527 ue->tlv_data_size = size;
66c6d1ef
TS
1528 // decremented at private_free.
1529 ue->card->user_ctl_alloc_size += size;
07f4d9d7 1530
b8e2204b 1531 mask |= SNDRV_CTL_EVENT_MASK_TLV;
1fa4445f
JK
1532 for (i = 0; i < kctl->count; ++i)
1533 snd_ctl_notify_one(ue->card, mask, kctl, i);
fb8027eb 1534
6d4d41f0
TS
1535 return change;
1536}
30d8340b 1537
6d4d41f0
TS
1538static int read_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1539 unsigned int size)
1540{
1541 struct user_element *ue = kctl->private_data;
1542
1543 if (ue->tlv_data_size == 0 || ue->tlv_data == NULL)
1544 return -ENXIO;
1545
1546 if (size < ue->tlv_data_size)
1547 return -ENOSPC;
1548
1549 if (copy_to_user(buf, ue->tlv_data, ue->tlv_data_size))
1550 return -EFAULT;
1551
1552 return 0;
1553}
1554
1555static int snd_ctl_elem_user_tlv(struct snd_kcontrol *kctl, int op_flag,
1556 unsigned int size, unsigned int __user *buf)
1557{
1558 if (op_flag == SNDRV_CTL_TLV_OP_WRITE)
1559 return replace_user_tlv(kctl, buf, size);
1560 else
1561 return read_user_tlv(kctl, buf, size);
8aa9b586
JK
1562}
1563
998f26f4 1564/* called in controls_rwsem write lock */
8d448162
CL
1565static int snd_ctl_elem_init_enum_names(struct user_element *ue)
1566{
1567 char *names, *p;
1568 size_t buf_len, name_len;
1569 unsigned int i;
447c6f93 1570 const uintptr_t user_ptrval = ue->info.value.enumerated.names_ptr;
8d448162 1571
66c6d1ef
TS
1572 buf_len = ue->info.value.enumerated.names_length;
1573 if (buf_len > 64 * 1024)
8d448162
CL
1574 return -EINVAL;
1575
66c6d1ef
TS
1576 if (check_user_elem_overflow(ue->card, buf_len))
1577 return -ENOMEM;
1578 names = vmemdup_user((const void __user *)user_ptrval, buf_len);
8d448162
CL
1579 if (IS_ERR(names))
1580 return PTR_ERR(names);
1581
1582 /* check that there are enough valid names */
8d448162
CL
1583 p = names;
1584 for (i = 0; i < ue->info.value.enumerated.items; ++i) {
1585 name_len = strnlen(p, buf_len);
1586 if (name_len == 0 || name_len >= 64 || name_len == buf_len) {
59aeaf3f 1587 kvfree(names);
8d448162
CL
1588 return -EINVAL;
1589 }
1590 p += name_len + 1;
1591 buf_len -= name_len + 1;
1592 }
1593
1594 ue->priv_data = names;
1595 ue->info.value.enumerated.names_ptr = 0;
66c6d1ef
TS
1596 // increment the allocation size; decremented again at private_free.
1597 ue->card->user_ctl_alloc_size += ue->info.value.enumerated.names_length;
8d448162
CL
1598
1599 return 0;
1600}
1601
66c6d1ef
TS
1602static size_t compute_user_elem_size(size_t size, unsigned int count)
1603{
1604 return sizeof(struct user_element) + size * count;
1605}
1606
82e9bae6 1607static void snd_ctl_elem_user_free(struct snd_kcontrol *kcontrol)
1da177e4 1608{
8aa9b586 1609 struct user_element *ue = kcontrol->private_data;
8d448162 1610
66c6d1ef
TS
1611 // decrement the allocation size.
1612 ue->card->user_ctl_alloc_size -= compute_user_elem_size(ue->elem_data_size, kcontrol->count);
1613 ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1614 if (ue->priv_data)
1615 ue->card->user_ctl_alloc_size -= ue->info.value.enumerated.names_length;
1616
88a89037 1617 kvfree(ue->tlv_data);
59aeaf3f 1618 kvfree(ue->priv_data);
8aa9b586 1619 kfree(ue);
1da177e4
LT
1620}
1621
82e9bae6
TI
1622static int snd_ctl_elem_add(struct snd_ctl_file *file,
1623 struct snd_ctl_elem_info *info, int replace)
1da177e4 1624{
82e9bae6 1625 struct snd_card *card = file->card;
2225e79b
TS
1626 struct snd_kcontrol *kctl;
1627 unsigned int count;
1da177e4
LT
1628 unsigned int access;
1629 long private_size;
66c6d1ef 1630 size_t alloc_size;
1da177e4 1631 struct user_element *ue;
cab2ed74 1632 unsigned int offset;
2225e79b 1633 int err;
82262a46 1634
be3bb823
TI
1635 if (!*info->id.name)
1636 return -EINVAL;
1637 if (strnlen(info->id.name, sizeof(info->id.name)) >= sizeof(info->id.name))
1638 return -EINVAL;
82262a46 1639
2225e79b 1640 /* Delete a control to replace them if needed. */
82262a46 1641 if (replace) {
2225e79b 1642 info->id.numid = 0;
82262a46
LPC
1643 err = snd_ctl_remove_user_ctl(file, &info->id);
1644 if (err)
1645 return err;
1da177e4 1646 }
82262a46 1647
2225e79b
TS
1648 /* Check the number of elements for this userspace control. */
1649 count = info->owner;
1650 if (count == 0)
1651 count = 1;
1652
1653 /* Arrange access permissions if needed. */
1654 access = info->access;
1655 if (access == 0)
1656 access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
1657 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
1658 SNDRV_CTL_ELEM_ACCESS_INACTIVE |
b8e2204b
TS
1659 SNDRV_CTL_ELEM_ACCESS_TLV_WRITE);
1660
1661 /* In initial state, nothing is available as TLV container. */
1662 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
8aa9b586 1663 access |= SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK;
2225e79b 1664 access |= SNDRV_CTL_ELEM_ACCESS_USER;
4ed56666 1665
2225e79b
TS
1666 /*
1667 * Check information and calculate the size of data specific to
1668 * this userspace control.
1669 */
fbd3eb7f
TI
1670 /* pass NULL to card for suppressing error messages */
1671 err = snd_ctl_check_elem_info(NULL, info);
1672 if (err < 0)
1673 return err;
1674 /* user-space control doesn't allow zero-size data */
1675 if (info->count < 1)
4ed56666 1676 return -EINVAL;
4ed56666 1677 private_size = value_sizes[info->type] * info->count;
66c6d1ef
TS
1678 alloc_size = compute_user_elem_size(private_size, count);
1679
998f26f4
TI
1680 down_write(&card->controls_rwsem);
1681 if (check_user_elem_overflow(card, alloc_size)) {
1682 err = -ENOMEM;
1683 goto unlock;
1684 }
2225e79b
TS
1685
1686 /*
1687 * Keep memory object for this userspace control. After passing this
1688 * code block, the instance should be freed by snd_ctl_free_one().
1689 *
1690 * Note that these elements in this control are locked.
1691 */
1692 err = snd_ctl_new(&kctl, count, access, file);
1693 if (err < 0)
998f26f4 1694 goto unlock;
e79d74ab 1695 memcpy(&kctl->id, &info->id, sizeof(kctl->id));
66c6d1ef
TS
1696 ue = kzalloc(alloc_size, GFP_KERNEL);
1697 if (!ue) {
2225e79b 1698 kfree(kctl);
998f26f4
TI
1699 err = -ENOMEM;
1700 goto unlock;
2225e79b 1701 }
66c6d1ef 1702 kctl->private_data = ue;
2225e79b
TS
1703 kctl->private_free = snd_ctl_elem_user_free;
1704
66c6d1ef
TS
1705 // increment the allocated size; decremented again at private_free.
1706 card->user_ctl_alloc_size += alloc_size;
1707
2225e79b 1708 /* Set private data for this userspace control. */
07f4d9d7 1709 ue->card = card;
1da177e4 1710 ue->info = *info;
86148e84 1711 ue->info.access = 0;
1da177e4
LT
1712 ue->elem_data = (char *)ue + sizeof(*ue);
1713 ue->elem_data_size = private_size;
8d448162
CL
1714 if (ue->info.type == SNDRV_CTL_ELEM_TYPE_ENUMERATED) {
1715 err = snd_ctl_elem_init_enum_names(ue);
1716 if (err < 0) {
2225e79b 1717 snd_ctl_free_one(kctl);
998f26f4 1718 goto unlock;
8d448162
CL
1719 }
1720 }
2225e79b
TS
1721
1722 /* Set callback functions. */
1723 if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED)
1724 kctl->info = snd_ctl_elem_user_enum_info;
1725 else
1726 kctl->info = snd_ctl_elem_user_info;
1727 if (access & SNDRV_CTL_ELEM_ACCESS_READ)
1728 kctl->get = snd_ctl_elem_user_get;
1729 if (access & SNDRV_CTL_ELEM_ACCESS_WRITE)
1730 kctl->put = snd_ctl_elem_user_put;
b8e2204b 1731 if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
2225e79b
TS
1732 kctl->tlv.c = snd_ctl_elem_user_tlv;
1733
1734 /* This function manage to free the instance on failure. */
3103c08f 1735 err = __snd_ctl_add_replace(card, kctl, CTL_ADD_EXCLUSIVE);
e1a7bfe3
TI
1736 if (err < 0) {
1737 snd_ctl_free_one(kctl);
1738 goto unlock;
1739 }
cab2ed74
TS
1740 offset = snd_ctl_get_ioff(kctl, &info->id);
1741 snd_ctl_build_ioff(&info->id, kctl, offset);
1742 /*
1743 * Here we cannot fill any field for the number of elements added by
1744 * this operation because there're no specific fields. The usage of
1745 * 'owner' field for this purpose may cause any bugs to userspace
1746 * applications because the field originally means PID of a process
1747 * which locks the element.
1748 */
e1a7bfe3
TI
1749 unlock:
1750 up_write(&card->controls_rwsem);
95a793c3 1751 return err;
1da177e4
LT
1752}
1753
82e9bae6
TI
1754static int snd_ctl_elem_add_user(struct snd_ctl_file *file,
1755 struct snd_ctl_elem_info __user *_info, int replace)
1da177e4 1756{
82e9bae6 1757 struct snd_ctl_elem_info info;
cab2ed74
TS
1758 int err;
1759
1da177e4
LT
1760 if (copy_from_user(&info, _info, sizeof(info)))
1761 return -EFAULT;
cab2ed74
TS
1762 err = snd_ctl_elem_add(file, &info, replace);
1763 if (err < 0)
1764 return err;
1765 if (copy_to_user(_info, &info, sizeof(info))) {
1766 snd_ctl_remove_user_ctl(file, &info.id);
1767 return -EFAULT;
1768 }
1769
1770 return 0;
1da177e4
LT
1771}
1772
82e9bae6
TI
1773static int snd_ctl_elem_remove(struct snd_ctl_file *file,
1774 struct snd_ctl_elem_id __user *_id)
1da177e4 1775{
82e9bae6 1776 struct snd_ctl_elem_id id;
1da177e4
LT
1777
1778 if (copy_from_user(&id, _id, sizeof(id)))
1779 return -EFAULT;
f217ac59 1780 return snd_ctl_remove_user_ctl(file, &id);
1da177e4
LT
1781}
1782
82e9bae6 1783static int snd_ctl_subscribe_events(struct snd_ctl_file *file, int __user *ptr)
1da177e4
LT
1784{
1785 int subscribe;
1786 if (get_user(subscribe, ptr))
1787 return -EFAULT;
1788 if (subscribe < 0) {
1789 subscribe = file->subscribed;
1790 if (put_user(subscribe, ptr))
1791 return -EFAULT;
1792 return 0;
1793 }
1794 if (subscribe) {
1795 file->subscribed = 1;
1796 return 0;
1797 } else if (file->subscribed) {
1798 snd_ctl_empty_read_queue(file);
1799 file->subscribed = 0;
1800 }
1801 return 0;
1802}
1803
450296f3
TS
1804static int call_tlv_handler(struct snd_ctl_file *file, int op_flag,
1805 struct snd_kcontrol *kctl,
1806 struct snd_ctl_elem_id *id,
1807 unsigned int __user *buf, unsigned int size)
1808{
1809 static const struct {
1810 int op;
1811 int perm;
1812 } pairs[] = {
1813 {SNDRV_CTL_TLV_OP_READ, SNDRV_CTL_ELEM_ACCESS_TLV_READ},
1814 {SNDRV_CTL_TLV_OP_WRITE, SNDRV_CTL_ELEM_ACCESS_TLV_WRITE},
1815 {SNDRV_CTL_TLV_OP_CMD, SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND},
1816 };
1817 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
e94fdbd7 1818 int i, ret;
450296f3
TS
1819
1820 /* Check support of the request for this element. */
1821 for (i = 0; i < ARRAY_SIZE(pairs); ++i) {
1822 if (op_flag == pairs[i].op && (vd->access & pairs[i].perm))
1823 break;
1824 }
1825 if (i == ARRAY_SIZE(pairs))
1826 return -ENXIO;
1827
1828 if (kctl->tlv.c == NULL)
1829 return -ENXIO;
1830
d61fe22c
TS
1831 /* Write and command operations are not allowed for locked element. */
1832 if (op_flag != SNDRV_CTL_TLV_OP_READ &&
1833 vd->owner != NULL && vd->owner != file)
450296f3
TS
1834 return -EPERM;
1835
e94fdbd7
TI
1836 ret = snd_power_ref_and_wait(file->card);
1837 if (!ret)
1838 ret = kctl->tlv.c(kctl, op_flag, size, buf);
1839 snd_power_unref(file->card);
1840 return ret;
450296f3
TS
1841}
1842
1843static int read_tlv_buf(struct snd_kcontrol *kctl, struct snd_ctl_elem_id *id,
1844 unsigned int __user *buf, unsigned int size)
1845{
1846 struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1847 unsigned int len;
1848
1849 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ))
1850 return -ENXIO;
1851
1852 if (kctl->tlv.p == NULL)
1853 return -ENXIO;
1854
1855 len = sizeof(unsigned int) * 2 + kctl->tlv.p[1];
1856 if (size < len)
1857 return -ENOMEM;
1858
1859 if (copy_to_user(buf, kctl->tlv.p, len))
1860 return -EFAULT;
1861
1862 return 0;
1863}
1864
8aa9b586 1865static int snd_ctl_tlv_ioctl(struct snd_ctl_file *file,
450296f3 1866 struct snd_ctl_tlv __user *buf,
8aa9b586 1867 int op_flag)
42750b04 1868{
450296f3 1869 struct snd_ctl_tlv header;
1ba7862f 1870 unsigned int __user *container;
450296f3 1871 unsigned int container_size;
42750b04 1872 struct snd_kcontrol *kctl;
450296f3 1873 struct snd_ctl_elem_id id;
8aa9b586 1874 struct snd_kcontrol_volatile *vd;
42750b04 1875
450296f3 1876 if (copy_from_user(&header, buf, sizeof(header)))
42750b04 1877 return -EFAULT;
450296f3
TS
1878
1879 /* In design of control core, numerical ID starts at 1. */
1880 if (header.numid == 0)
8aa9b586 1881 return -EINVAL;
450296f3
TS
1882
1883 /* At least, container should include type and length fields. */
1884 if (header.length < sizeof(unsigned int) * 2)
c0bcdbdf 1885 return -EINVAL;
450296f3
TS
1886 container_size = header.length;
1887 container = buf->tlv;
4c8099e9 1888
450296f3 1889 kctl = snd_ctl_find_numid(file->card, header.numid);
4c8099e9
TS
1890 if (kctl == NULL)
1891 return -ENOENT;
1892
450296f3
TS
1893 /* Calculate index of the element in this set. */
1894 id = kctl->id;
1895 snd_ctl_build_ioff(&id, kctl, header.numid - id.numid);
1896 vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
4c8099e9 1897
8aa9b586 1898 if (vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) {
450296f3
TS
1899 return call_tlv_handler(file, op_flag, kctl, &id, container,
1900 container_size);
8aa9b586 1901 } else {
450296f3
TS
1902 if (op_flag == SNDRV_CTL_TLV_OP_READ) {
1903 return read_tlv_buf(kctl, &id, container,
1904 container_size);
1905 }
8aa9b586 1906 }
4c8099e9 1907
450296f3
TS
1908 /* Not supported. */
1909 return -ENXIO;
42750b04
JK
1910}
1911
1da177e4
LT
1912static long snd_ctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
1913{
82e9bae6
TI
1914 struct snd_ctl_file *ctl;
1915 struct snd_card *card;
82e9bae6 1916 struct snd_kctl_ioctl *p;
1da177e4
LT
1917 void __user *argp = (void __user *)arg;
1918 int __user *ip = argp;
1919 int err;
1920
1921 ctl = file->private_data;
1922 card = ctl->card;
7eaa943c
TI
1923 if (snd_BUG_ON(!card))
1924 return -ENXIO;
1da177e4
LT
1925 switch (cmd) {
1926 case SNDRV_CTL_IOCTL_PVERSION:
1927 return put_user(SNDRV_CTL_VERSION, ip) ? -EFAULT : 0;
1928 case SNDRV_CTL_IOCTL_CARD_INFO:
1929 return snd_ctl_card_info(card, ctl, cmd, argp);
1930 case SNDRV_CTL_IOCTL_ELEM_LIST:
18d122c0 1931 return snd_ctl_elem_list_user(card, argp);
1da177e4
LT
1932 case SNDRV_CTL_IOCTL_ELEM_INFO:
1933 return snd_ctl_elem_info_user(ctl, argp);
1934 case SNDRV_CTL_IOCTL_ELEM_READ:
42750b04 1935 return snd_ctl_elem_read_user(card, argp);
1da177e4
LT
1936 case SNDRV_CTL_IOCTL_ELEM_WRITE:
1937 return snd_ctl_elem_write_user(ctl, argp);
1938 case SNDRV_CTL_IOCTL_ELEM_LOCK:
1939 return snd_ctl_elem_lock(ctl, argp);
1940 case SNDRV_CTL_IOCTL_ELEM_UNLOCK:
1941 return snd_ctl_elem_unlock(ctl, argp);
1942 case SNDRV_CTL_IOCTL_ELEM_ADD:
1943 return snd_ctl_elem_add_user(ctl, argp, 0);
1944 case SNDRV_CTL_IOCTL_ELEM_REPLACE:
1945 return snd_ctl_elem_add_user(ctl, argp, 1);
1946 case SNDRV_CTL_IOCTL_ELEM_REMOVE:
1947 return snd_ctl_elem_remove(ctl, argp);
1948 case SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS:
1949 return snd_ctl_subscribe_events(ctl, ip);
8aa9b586 1950 case SNDRV_CTL_IOCTL_TLV_READ:
4c8099e9
TS
1951 down_read(&ctl->card->controls_rwsem);
1952 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_READ);
1953 up_read(&ctl->card->controls_rwsem);
1954 return err;
8aa9b586 1955 case SNDRV_CTL_IOCTL_TLV_WRITE:
4c8099e9
TS
1956 down_write(&ctl->card->controls_rwsem);
1957 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_WRITE);
1958 up_write(&ctl->card->controls_rwsem);
1959 return err;
8aa9b586 1960 case SNDRV_CTL_IOCTL_TLV_COMMAND:
4c8099e9
TS
1961 down_write(&ctl->card->controls_rwsem);
1962 err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_CMD);
1963 up_write(&ctl->card->controls_rwsem);
1964 return err;
1da177e4 1965 case SNDRV_CTL_IOCTL_POWER:
a381a7a6 1966 return -ENOPROTOOPT;
1da177e4 1967 case SNDRV_CTL_IOCTL_POWER_STATE:
1da177e4 1968 return put_user(SNDRV_CTL_POWER_D0, ip) ? -EFAULT : 0;
1da177e4
LT
1969 }
1970 down_read(&snd_ioctl_rwsem);
9244b2c3 1971 list_for_each_entry(p, &snd_control_ioctls, list) {
1da177e4
LT
1972 err = p->fioctl(card, ctl, cmd, arg);
1973 if (err != -ENOIOCTLCMD) {
1974 up_read(&snd_ioctl_rwsem);
1975 return err;
1976 }
1977 }
1978 up_read(&snd_ioctl_rwsem);
bb009457 1979 dev_dbg(card->dev, "unknown ioctl = 0x%x\n", cmd);
1da177e4
LT
1980 return -ENOTTY;
1981}
1982
82e9bae6
TI
1983static ssize_t snd_ctl_read(struct file *file, char __user *buffer,
1984 size_t count, loff_t * offset)
1da177e4 1985{
82e9bae6 1986 struct snd_ctl_file *ctl;
1da177e4
LT
1987 int err = 0;
1988 ssize_t result = 0;
1989
1990 ctl = file->private_data;
7eaa943c
TI
1991 if (snd_BUG_ON(!ctl || !ctl->card))
1992 return -ENXIO;
1da177e4
LT
1993 if (!ctl->subscribed)
1994 return -EBADFD;
82e9bae6 1995 if (count < sizeof(struct snd_ctl_event))
1da177e4
LT
1996 return -EINVAL;
1997 spin_lock_irq(&ctl->read_lock);
82e9bae6
TI
1998 while (count >= sizeof(struct snd_ctl_event)) {
1999 struct snd_ctl_event ev;
2000 struct snd_kctl_event *kev;
1da177e4 2001 while (list_empty(&ctl->events)) {
ac6424b9 2002 wait_queue_entry_t wait;
1da177e4
LT
2003 if ((file->f_flags & O_NONBLOCK) != 0 || result > 0) {
2004 err = -EAGAIN;
2005 goto __end_lock;
2006 }
2007 init_waitqueue_entry(&wait, current);
2008 add_wait_queue(&ctl->change_sleep, &wait);
2009 set_current_state(TASK_INTERRUPTIBLE);
2010 spin_unlock_irq(&ctl->read_lock);
2011 schedule();
2012 remove_wait_queue(&ctl->change_sleep, &wait);
0914f796
TI
2013 if (ctl->card->shutdown)
2014 return -ENODEV;
1da177e4 2015 if (signal_pending(current))
0e5d720c 2016 return -ERESTARTSYS;
1da177e4
LT
2017 spin_lock_irq(&ctl->read_lock);
2018 }
2019 kev = snd_kctl_event(ctl->events.next);
2020 ev.type = SNDRV_CTL_EVENT_ELEM;
2021 ev.data.elem.mask = kev->mask;
2022 ev.data.elem.id = kev->id;
2023 list_del(&kev->list);
2024 spin_unlock_irq(&ctl->read_lock);
2025 kfree(kev);
82e9bae6 2026 if (copy_to_user(buffer, &ev, sizeof(struct snd_ctl_event))) {
1da177e4
LT
2027 err = -EFAULT;
2028 goto __end;
2029 }
2030 spin_lock_irq(&ctl->read_lock);
82e9bae6
TI
2031 buffer += sizeof(struct snd_ctl_event);
2032 count -= sizeof(struct snd_ctl_event);
2033 result += sizeof(struct snd_ctl_event);
1da177e4
LT
2034 }
2035 __end_lock:
2036 spin_unlock_irq(&ctl->read_lock);
2037 __end:
2038 return result > 0 ? result : err;
2039}
2040
680ef72a 2041static __poll_t snd_ctl_poll(struct file *file, poll_table * wait)
1da177e4 2042{
680ef72a 2043 __poll_t mask;
82e9bae6 2044 struct snd_ctl_file *ctl;
1da177e4
LT
2045
2046 ctl = file->private_data;
2047 if (!ctl->subscribed)
2048 return 0;
2049 poll_wait(file, &ctl->change_sleep, wait);
2050
2051 mask = 0;
2052 if (!list_empty(&ctl->events))
a9a08845 2053 mask |= EPOLLIN | EPOLLRDNORM;
1da177e4
LT
2054
2055 return mask;
2056}
2057
2058/*
2059 * register the device-specific control-ioctls.
2060 * called from each device manager like pcm.c, hwdep.c, etc.
2061 */
2062static int _snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn, struct list_head *lists)
2063{
82e9bae6 2064 struct snd_kctl_ioctl *pn;
1da177e4 2065
82e9bae6 2066 pn = kzalloc(sizeof(struct snd_kctl_ioctl), GFP_KERNEL);
1da177e4
LT
2067 if (pn == NULL)
2068 return -ENOMEM;
2069 pn->fioctl = fcn;
2070 down_write(&snd_ioctl_rwsem);
2071 list_add_tail(&pn->list, lists);
2072 up_write(&snd_ioctl_rwsem);
2073 return 0;
2074}
2075
12cddbd8
TI
2076/**
2077 * snd_ctl_register_ioctl - register the device-specific control-ioctls
2078 * @fcn: ioctl callback function
2079 *
2080 * called from each device manager like pcm.c, hwdep.c, etc.
e8406ebc
TI
2081 *
2082 * Return: zero if successful, or a negative error code
12cddbd8 2083 */
1da177e4
LT
2084int snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn)
2085{
2086 return _snd_ctl_register_ioctl(fcn, &snd_control_ioctls);
2087}
c0d3fb39
TI
2088EXPORT_SYMBOL(snd_ctl_register_ioctl);
2089
1da177e4 2090#ifdef CONFIG_COMPAT
12cddbd8
TI
2091/**
2092 * snd_ctl_register_ioctl_compat - register the device-specific 32bit compat
2093 * control-ioctls
2094 * @fcn: ioctl callback function
e8406ebc
TI
2095 *
2096 * Return: zero if successful, or a negative error code
12cddbd8 2097 */
1da177e4
LT
2098int snd_ctl_register_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2099{
2100 return _snd_ctl_register_ioctl(fcn, &snd_control_compat_ioctls);
2101}
c0d3fb39 2102EXPORT_SYMBOL(snd_ctl_register_ioctl_compat);
1da177e4
LT
2103#endif
2104
2105/*
2106 * de-register the device-specific control-ioctls.
2107 */
82e9bae6
TI
2108static int _snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn,
2109 struct list_head *lists)
1da177e4 2110{
82e9bae6 2111 struct snd_kctl_ioctl *p;
1da177e4 2112
7eaa943c
TI
2113 if (snd_BUG_ON(!fcn))
2114 return -EINVAL;
1da177e4 2115 down_write(&snd_ioctl_rwsem);
9244b2c3 2116 list_for_each_entry(p, lists, list) {
1da177e4
LT
2117 if (p->fioctl == fcn) {
2118 list_del(&p->list);
2119 up_write(&snd_ioctl_rwsem);
2120 kfree(p);
2121 return 0;
2122 }
2123 }
2124 up_write(&snd_ioctl_rwsem);
2125 snd_BUG();
2126 return -EINVAL;
2127}
2128
12cddbd8
TI
2129/**
2130 * snd_ctl_unregister_ioctl - de-register the device-specific control-ioctls
2131 * @fcn: ioctl callback function to unregister
e8406ebc
TI
2132 *
2133 * Return: zero if successful, or a negative error code
12cddbd8 2134 */
1da177e4
LT
2135int snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn)
2136{
2137 return _snd_ctl_unregister_ioctl(fcn, &snd_control_ioctls);
2138}
c0d3fb39
TI
2139EXPORT_SYMBOL(snd_ctl_unregister_ioctl);
2140
1da177e4 2141#ifdef CONFIG_COMPAT
12cddbd8 2142/**
f7b6603c
MCC
2143 * snd_ctl_unregister_ioctl_compat - de-register the device-specific compat
2144 * 32bit control-ioctls
12cddbd8 2145 * @fcn: ioctl callback function to unregister
e8406ebc
TI
2146 *
2147 * Return: zero if successful, or a negative error code
12cddbd8 2148 */
1da177e4
LT
2149int snd_ctl_unregister_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2150{
2151 return _snd_ctl_unregister_ioctl(fcn, &snd_control_compat_ioctls);
2152}
c0d3fb39 2153EXPORT_SYMBOL(snd_ctl_unregister_ioctl_compat);
1da177e4
LT
2154#endif
2155
2156static int snd_ctl_fasync(int fd, struct file * file, int on)
2157{
82e9bae6 2158 struct snd_ctl_file *ctl;
60aa4924 2159
1da177e4 2160 ctl = file->private_data;
4a971e84 2161 return snd_fasync_helper(fd, file, on, &ctl->fasync);
1da177e4
LT
2162}
2163
23c18d4b
TI
2164/* return the preferred subdevice number if already assigned;
2165 * otherwise return -1
2166 */
2167int snd_ctl_get_preferred_subdevice(struct snd_card *card, int type)
2168{
2169 struct snd_ctl_file *kctl;
2170 int subdevice = -1;
6564d0ad 2171 unsigned long flags;
23c18d4b 2172
6564d0ad 2173 read_lock_irqsave(&card->ctl_files_rwlock, flags);
23c18d4b
TI
2174 list_for_each_entry(kctl, &card->ctl_files, list) {
2175 if (kctl->pid == task_pid(current)) {
2176 subdevice = kctl->preferred_subdevice[type];
2177 if (subdevice != -1)
2178 break;
2179 }
2180 }
6564d0ad 2181 read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
23c18d4b
TI
2182 return subdevice;
2183}
2184EXPORT_SYMBOL_GPL(snd_ctl_get_preferred_subdevice);
2185
1da177e4
LT
2186/*
2187 * ioctl32 compat
2188 */
2189#ifdef CONFIG_COMPAT
2190#include "control_compat.c"
2191#else
2192#define snd_ctl_ioctl_compat NULL
2193#endif
2194
3f0638a0
JK
2195/*
2196 * control layers (audio LED etc.)
2197 */
2198
2199/**
2200 * snd_ctl_request_layer - request to use the layer
2201 * @module_name: Name of the kernel module (NULL == build-in)
2202 *
e8406ebc 2203 * Return: zero if successful, or an error code when the module cannot be loaded
3f0638a0
JK
2204 */
2205int snd_ctl_request_layer(const char *module_name)
2206{
2207 struct snd_ctl_layer_ops *lops;
2208
2209 if (module_name == NULL)
2210 return 0;
2211 down_read(&snd_ctl_layer_rwsem);
2212 for (lops = snd_ctl_layer; lops; lops = lops->next)
2213 if (strcmp(lops->module_name, module_name) == 0)
2214 break;
2215 up_read(&snd_ctl_layer_rwsem);
2216 if (lops)
2217 return 0;
2218 return request_module(module_name);
2219}
2220EXPORT_SYMBOL_GPL(snd_ctl_request_layer);
2221
2222/**
2223 * snd_ctl_register_layer - register new control layer
2224 * @lops: operation structure
2225 *
2226 * The new layer can track all control elements and do additional
2227 * operations on top (like audio LED handling).
2228 */
2229void snd_ctl_register_layer(struct snd_ctl_layer_ops *lops)
2230{
2231 struct snd_card *card;
2232 int card_number;
2233
2234 down_write(&snd_ctl_layer_rwsem);
2235 lops->next = snd_ctl_layer;
2236 snd_ctl_layer = lops;
2237 up_write(&snd_ctl_layer_rwsem);
2238 for (card_number = 0; card_number < SNDRV_CARDS; card_number++) {
2239 card = snd_card_ref(card_number);
2240 if (card) {
2241 down_read(&card->controls_rwsem);
2242 lops->lregister(card);
2243 up_read(&card->controls_rwsem);
2244 snd_card_unref(card);
2245 }
2246 }
2247}
2248EXPORT_SYMBOL_GPL(snd_ctl_register_layer);
2249
2250/**
2251 * snd_ctl_disconnect_layer - disconnect control layer
2252 * @lops: operation structure
2253 *
2254 * It is expected that the information about tracked cards
2255 * is freed before this call (the disconnect callback is
2256 * not called here).
2257 */
2258void snd_ctl_disconnect_layer(struct snd_ctl_layer_ops *lops)
2259{
2260 struct snd_ctl_layer_ops *lops2, *prev_lops2;
2261
2262 down_write(&snd_ctl_layer_rwsem);
016c2050 2263 for (lops2 = snd_ctl_layer, prev_lops2 = NULL; lops2; lops2 = lops2->next) {
3f0638a0
JK
2264 if (lops2 == lops) {
2265 if (!prev_lops2)
2266 snd_ctl_layer = lops->next;
2267 else
2268 prev_lops2->next = lops->next;
2269 break;
2270 }
016c2050
JK
2271 prev_lops2 = lops2;
2272 }
3f0638a0
JK
2273 up_write(&snd_ctl_layer_rwsem);
2274}
2275EXPORT_SYMBOL_GPL(snd_ctl_disconnect_layer);
2276
1da177e4
LT
2277/*
2278 * INIT PART
2279 */
2280
9c2e08c5 2281static const struct file_operations snd_ctl_f_ops =
1da177e4
LT
2282{
2283 .owner = THIS_MODULE,
2284 .read = snd_ctl_read,
2285 .open = snd_ctl_open,
2286 .release = snd_ctl_release,
02f4865f 2287 .llseek = no_llseek,
1da177e4
LT
2288 .poll = snd_ctl_poll,
2289 .unlocked_ioctl = snd_ctl_ioctl,
2290 .compat_ioctl = snd_ctl_ioctl_compat,
2291 .fasync = snd_ctl_fasync,
2292};
2293
1da177e4
LT
2294/*
2295 * registration of the control device
2296 */
82e9bae6 2297static int snd_ctl_dev_register(struct snd_device *device)
1da177e4 2298{
82e9bae6 2299 struct snd_card *card = device->device_data;
3f0638a0
JK
2300 struct snd_ctl_layer_ops *lops;
2301 int err;
1da177e4 2302
3f0638a0
JK
2303 err = snd_register_device(SNDRV_DEVICE_TYPE_CONTROL, card, -1,
2304 &snd_ctl_f_ops, card, &card->ctl_dev);
2305 if (err < 0)
2306 return err;
2307 down_read(&card->controls_rwsem);
2308 down_read(&snd_ctl_layer_rwsem);
2309 for (lops = snd_ctl_layer; lops; lops = lops->next)
2310 lops->lregister(card);
2311 up_read(&snd_ctl_layer_rwsem);
2312 up_read(&card->controls_rwsem);
2313 return 0;
1da177e4
LT
2314}
2315
2316/*
2317 * disconnection of the control device
2318 */
82e9bae6 2319static int snd_ctl_dev_disconnect(struct snd_device *device)
1da177e4 2320{
82e9bae6 2321 struct snd_card *card = device->device_data;
82e9bae6 2322 struct snd_ctl_file *ctl;
3f0638a0 2323 struct snd_ctl_layer_ops *lops;
6564d0ad 2324 unsigned long flags;
1da177e4 2325
6564d0ad 2326 read_lock_irqsave(&card->ctl_files_rwlock, flags);
9244b2c3 2327 list_for_each_entry(ctl, &card->ctl_files, list) {
1da177e4 2328 wake_up(&ctl->change_sleep);
4a971e84 2329 snd_kill_fasync(ctl->fasync, SIGIO, POLL_ERR);
1da177e4 2330 }
6564d0ad 2331 read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
c461482c 2332
3f0638a0
JK
2333 down_read(&card->controls_rwsem);
2334 down_read(&snd_ctl_layer_rwsem);
2335 for (lops = snd_ctl_layer; lops; lops = lops->next)
2336 lops->ldisconnect(card);
2337 up_read(&snd_ctl_layer_rwsem);
2338 up_read(&card->controls_rwsem);
2339
40a4b263 2340 return snd_unregister_device(&card->ctl_dev);
1da177e4
LT
2341}
2342
2343/*
2344 * free all controls
2345 */
82e9bae6 2346static int snd_ctl_dev_free(struct snd_device *device)
1da177e4 2347{
82e9bae6
TI
2348 struct snd_card *card = device->device_data;
2349 struct snd_kcontrol *control;
1da177e4
LT
2350
2351 down_write(&card->controls_rwsem);
2352 while (!list_empty(&card->controls)) {
2353 control = snd_kcontrol(card->controls.next);
c27e1efb 2354 __snd_ctl_remove(card, control, false);
1da177e4 2355 }
c27e1efb
TI
2356
2357#ifdef CONFIG_SND_CTL_FAST_LOOKUP
2358 xa_destroy(&card->ctl_numids);
2359 xa_destroy(&card->ctl_hash);
2360#endif
1da177e4 2361 up_write(&card->controls_rwsem);
0fcd9f4b 2362 put_device(&card->ctl_dev);
1da177e4
LT
2363 return 0;
2364}
2365
1da177e4
LT
2366/*
2367 * create control core:
2368 * called from init.c
2369 */
82e9bae6 2370int snd_ctl_create(struct snd_card *card)
1da177e4 2371{
f15ee210 2372 static const struct snd_device_ops ops = {
1da177e4
LT
2373 .dev_free = snd_ctl_dev_free,
2374 .dev_register = snd_ctl_dev_register,
2375 .dev_disconnect = snd_ctl_dev_disconnect,
1da177e4 2376 };
0fcd9f4b 2377 int err;
1da177e4 2378
7eaa943c
TI
2379 if (snd_BUG_ON(!card))
2380 return -ENXIO;
0fcd9f4b
TI
2381 if (snd_BUG_ON(card->number < 0 || card->number >= SNDRV_CARDS))
2382 return -ENXIO;
2383
2384 snd_device_initialize(&card->ctl_dev, card);
2385 dev_set_name(&card->ctl_dev, "controlC%d", card->number);
2386
2387 err = snd_device_new(card, SNDRV_DEV_CONTROL, card, &ops);
2388 if (err < 0)
2389 put_device(&card->ctl_dev);
2390 return err;
1da177e4 2391}
b9ed4f2b
TI
2392
2393/*
9600732b 2394 * Frequently used control callbacks/helpers
b9ed4f2b 2395 */
12cddbd8
TI
2396
2397/**
2398 * snd_ctl_boolean_mono_info - Helper function for a standard boolean info
2399 * callback with a mono channel
2400 * @kcontrol: the kcontrol instance
2401 * @uinfo: info to store
2402 *
2403 * This is a function that can be used as info callback for a standard
2404 * boolean control with a single mono channel.
e8406ebc
TI
2405 *
2406 * Return: Zero (always successful)
12cddbd8 2407 */
b9ed4f2b
TI
2408int snd_ctl_boolean_mono_info(struct snd_kcontrol *kcontrol,
2409 struct snd_ctl_elem_info *uinfo)
2410{
2411 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2412 uinfo->count = 1;
2413 uinfo->value.integer.min = 0;
2414 uinfo->value.integer.max = 1;
2415 return 0;
2416}
b9ed4f2b
TI
2417EXPORT_SYMBOL(snd_ctl_boolean_mono_info);
2418
12cddbd8
TI
2419/**
2420 * snd_ctl_boolean_stereo_info - Helper function for a standard boolean info
2421 * callback with stereo two channels
2422 * @kcontrol: the kcontrol instance
2423 * @uinfo: info to store
2424 *
2425 * This is a function that can be used as info callback for a standard
2426 * boolean control with stereo two channels.
e8406ebc
TI
2427 *
2428 * Return: Zero (always successful)
12cddbd8 2429 */
b9ed4f2b
TI
2430int snd_ctl_boolean_stereo_info(struct snd_kcontrol *kcontrol,
2431 struct snd_ctl_elem_info *uinfo)
2432{
2433 uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2434 uinfo->count = 2;
2435 uinfo->value.integer.min = 0;
2436 uinfo->value.integer.max = 1;
2437 return 0;
2438}
b9ed4f2b 2439EXPORT_SYMBOL(snd_ctl_boolean_stereo_info);
9600732b
CL
2440
2441/**
2442 * snd_ctl_enum_info - fills the info structure for an enumerated control
2443 * @info: the structure to be filled
2444 * @channels: the number of the control's channels; often one
2445 * @items: the number of control values; also the size of @names
2446 * @names: an array containing the names of all control values
2447 *
2448 * Sets all required fields in @info to their appropriate values.
2449 * If the control's accessibility is not the default (readable and writable),
2450 * the caller has to fill @info->access.
eb7c06e8 2451 *
e8406ebc 2452 * Return: Zero (always successful)
9600732b
CL
2453 */
2454int snd_ctl_enum_info(struct snd_ctl_elem_info *info, unsigned int channels,
2455 unsigned int items, const char *const names[])
2456{
2457 info->type = SNDRV_CTL_ELEM_TYPE_ENUMERATED;
2458 info->count = channels;
2459 info->value.enumerated.items = items;
a7e6fb99
TI
2460 if (!items)
2461 return 0;
9600732b
CL
2462 if (info->value.enumerated.item >= items)
2463 info->value.enumerated.item = items - 1;
df803e13
TI
2464 WARN(strlen(names[info->value.enumerated.item]) >= sizeof(info->value.enumerated.name),
2465 "ALSA: too long item name '%s'\n",
2466 names[info->value.enumerated.item]);
75b1a8f9 2467 strscpy(info->value.enumerated.name,
9600732b
CL
2468 names[info->value.enumerated.item],
2469 sizeof(info->value.enumerated.name));
2470 return 0;
2471}
2472EXPORT_SYMBOL(snd_ctl_enum_info);