xref: /openbmc/linux/sound/core/control.c (revision 0e6774ec)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *  Routines for driver control interface
4  *  Copyright (c) by Jaroslav Kysela <perex@perex.cz>
5  */
6 
7 #include <linux/threads.h>
8 #include <linux/interrupt.h>
9 #include <linux/module.h>
10 #include <linux/moduleparam.h>
11 #include <linux/slab.h>
12 #include <linux/vmalloc.h>
13 #include <linux/time.h>
14 #include <linux/mm.h>
15 #include <linux/math64.h>
16 #include <linux/sched/signal.h>
17 #include <sound/core.h>
18 #include <sound/minors.h>
19 #include <sound/info.h>
20 #include <sound/control.h>
21 
22 // Max allocation size for user controls.
23 static int max_user_ctl_alloc_size = 8 * 1024 * 1024;
24 module_param_named(max_user_ctl_alloc_size, max_user_ctl_alloc_size, int, 0444);
25 MODULE_PARM_DESC(max_user_ctl_alloc_size, "Max allocation size for user controls");
26 
27 #define MAX_CONTROL_COUNT	1028
28 
29 struct snd_kctl_ioctl {
30 	struct list_head list;		/* list of all ioctls */
31 	snd_kctl_ioctl_func_t fioctl;
32 };
33 
34 static DECLARE_RWSEM(snd_ioctl_rwsem);
35 static DECLARE_RWSEM(snd_ctl_layer_rwsem);
36 static LIST_HEAD(snd_control_ioctls);
37 #ifdef CONFIG_COMPAT
38 static LIST_HEAD(snd_control_compat_ioctls);
39 #endif
40 static struct snd_ctl_layer_ops *snd_ctl_layer;
41 
42 static int snd_ctl_remove_locked(struct snd_card *card,
43 				 struct snd_kcontrol *kcontrol);
44 
45 static int snd_ctl_open(struct inode *inode, struct file *file)
46 {
47 	unsigned long flags;
48 	struct snd_card *card;
49 	struct snd_ctl_file *ctl;
50 	int i, err;
51 
52 	err = stream_open(inode, file);
53 	if (err < 0)
54 		return err;
55 
56 	card = snd_lookup_minor_data(iminor(inode), SNDRV_DEVICE_TYPE_CONTROL);
57 	if (!card) {
58 		err = -ENODEV;
59 		goto __error1;
60 	}
61 	err = snd_card_file_add(card, file);
62 	if (err < 0) {
63 		err = -ENODEV;
64 		goto __error1;
65 	}
66 	if (!try_module_get(card->module)) {
67 		err = -EFAULT;
68 		goto __error2;
69 	}
70 	ctl = kzalloc(sizeof(*ctl), GFP_KERNEL);
71 	if (ctl == NULL) {
72 		err = -ENOMEM;
73 		goto __error;
74 	}
75 	INIT_LIST_HEAD(&ctl->events);
76 	init_waitqueue_head(&ctl->change_sleep);
77 	spin_lock_init(&ctl->read_lock);
78 	ctl->card = card;
79 	for (i = 0; i < SND_CTL_SUBDEV_ITEMS; i++)
80 		ctl->preferred_subdevice[i] = -1;
81 	ctl->pid = get_pid(task_pid(current));
82 	file->private_data = ctl;
83 	write_lock_irqsave(&card->ctl_files_rwlock, flags);
84 	list_add_tail(&ctl->list, &card->ctl_files);
85 	write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
86 	snd_card_unref(card);
87 	return 0;
88 
89       __error:
90 	module_put(card->module);
91       __error2:
92 	snd_card_file_remove(card, file);
93       __error1:
94 	if (card)
95 		snd_card_unref(card);
96       	return err;
97 }
98 
99 static void snd_ctl_empty_read_queue(struct snd_ctl_file * ctl)
100 {
101 	unsigned long flags;
102 	struct snd_kctl_event *cread;
103 
104 	spin_lock_irqsave(&ctl->read_lock, flags);
105 	while (!list_empty(&ctl->events)) {
106 		cread = snd_kctl_event(ctl->events.next);
107 		list_del(&cread->list);
108 		kfree(cread);
109 	}
110 	spin_unlock_irqrestore(&ctl->read_lock, flags);
111 }
112 
113 static int snd_ctl_release(struct inode *inode, struct file *file)
114 {
115 	unsigned long flags;
116 	struct snd_card *card;
117 	struct snd_ctl_file *ctl;
118 	struct snd_kcontrol *control;
119 	unsigned int idx;
120 
121 	ctl = file->private_data;
122 	file->private_data = NULL;
123 	card = ctl->card;
124 	write_lock_irqsave(&card->ctl_files_rwlock, flags);
125 	list_del(&ctl->list);
126 	write_unlock_irqrestore(&card->ctl_files_rwlock, flags);
127 	down_write(&card->controls_rwsem);
128 	list_for_each_entry(control, &card->controls, list)
129 		for (idx = 0; idx < control->count; idx++)
130 			if (control->vd[idx].owner == ctl)
131 				control->vd[idx].owner = NULL;
132 	up_write(&card->controls_rwsem);
133 	snd_fasync_free(ctl->fasync);
134 	snd_ctl_empty_read_queue(ctl);
135 	put_pid(ctl->pid);
136 	kfree(ctl);
137 	module_put(card->module);
138 	snd_card_file_remove(card, file);
139 	return 0;
140 }
141 
142 /**
143  * snd_ctl_notify - Send notification to user-space for a control change
144  * @card: the card to send notification
145  * @mask: the event mask, SNDRV_CTL_EVENT_*
146  * @id: the ctl element id to send notification
147  *
148  * This function adds an event record with the given id and mask, appends
149  * to the list and wakes up the user-space for notification.  This can be
150  * called in the atomic context.
151  */
152 void snd_ctl_notify(struct snd_card *card, unsigned int mask,
153 		    struct snd_ctl_elem_id *id)
154 {
155 	unsigned long flags;
156 	struct snd_ctl_file *ctl;
157 	struct snd_kctl_event *ev;
158 
159 	if (snd_BUG_ON(!card || !id))
160 		return;
161 	if (card->shutdown)
162 		return;
163 	read_lock_irqsave(&card->ctl_files_rwlock, flags);
164 #if IS_ENABLED(CONFIG_SND_MIXER_OSS)
165 	card->mixer_oss_change_count++;
166 #endif
167 	list_for_each_entry(ctl, &card->ctl_files, list) {
168 		if (!ctl->subscribed)
169 			continue;
170 		spin_lock(&ctl->read_lock);
171 		list_for_each_entry(ev, &ctl->events, list) {
172 			if (ev->id.numid == id->numid) {
173 				ev->mask |= mask;
174 				goto _found;
175 			}
176 		}
177 		ev = kzalloc(sizeof(*ev), GFP_ATOMIC);
178 		if (ev) {
179 			ev->id = *id;
180 			ev->mask = mask;
181 			list_add_tail(&ev->list, &ctl->events);
182 		} else {
183 			dev_err(card->dev, "No memory available to allocate event\n");
184 		}
185 	_found:
186 		wake_up(&ctl->change_sleep);
187 		spin_unlock(&ctl->read_lock);
188 		snd_kill_fasync(ctl->fasync, SIGIO, POLL_IN);
189 	}
190 	read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
191 }
192 EXPORT_SYMBOL(snd_ctl_notify);
193 
194 /**
195  * snd_ctl_notify_one - Send notification to user-space for a control change
196  * @card: the card to send notification
197  * @mask: the event mask, SNDRV_CTL_EVENT_*
198  * @kctl: the pointer with the control instance
199  * @ioff: the additional offset to the control index
200  *
201  * This function calls snd_ctl_notify() and does additional jobs
202  * like LED state changes.
203  */
204 void snd_ctl_notify_one(struct snd_card *card, unsigned int mask,
205 			struct snd_kcontrol *kctl, unsigned int ioff)
206 {
207 	struct snd_ctl_elem_id id = kctl->id;
208 	struct snd_ctl_layer_ops *lops;
209 
210 	id.index += ioff;
211 	id.numid += ioff;
212 	snd_ctl_notify(card, mask, &id);
213 	down_read(&snd_ctl_layer_rwsem);
214 	for (lops = snd_ctl_layer; lops; lops = lops->next)
215 		lops->lnotify(card, mask, kctl, ioff);
216 	up_read(&snd_ctl_layer_rwsem);
217 }
218 EXPORT_SYMBOL(snd_ctl_notify_one);
219 
220 /**
221  * snd_ctl_new - create a new control instance with some elements
222  * @kctl: the pointer to store new control instance
223  * @count: the number of elements in this control
224  * @access: the default access flags for elements in this control
225  * @file: given when locking these elements
226  *
227  * Allocates a memory object for a new control instance. The instance has
228  * elements as many as the given number (@count). Each element has given
229  * access permissions (@access). Each element is locked when @file is given.
230  *
231  * Return: 0 on success, error code on failure
232  */
233 static int snd_ctl_new(struct snd_kcontrol **kctl, unsigned int count,
234 		       unsigned int access, struct snd_ctl_file *file)
235 {
236 	unsigned int idx;
237 
238 	if (count == 0 || count > MAX_CONTROL_COUNT)
239 		return -EINVAL;
240 
241 	*kctl = kzalloc(struct_size(*kctl, vd, count), GFP_KERNEL);
242 	if (!*kctl)
243 		return -ENOMEM;
244 
245 	for (idx = 0; idx < count; idx++) {
246 		(*kctl)->vd[idx].access = access;
247 		(*kctl)->vd[idx].owner = file;
248 	}
249 	(*kctl)->count = count;
250 
251 	return 0;
252 }
253 
254 /**
255  * snd_ctl_new1 - create a control instance from the template
256  * @ncontrol: the initialization record
257  * @private_data: the private data to set
258  *
259  * Allocates a new struct snd_kcontrol instance and initialize from the given
260  * template.  When the access field of ncontrol is 0, it's assumed as
261  * READWRITE access. When the count field is 0, it's assumes as one.
262  *
263  * Return: The pointer of the newly generated instance, or %NULL on failure.
264  */
265 struct snd_kcontrol *snd_ctl_new1(const struct snd_kcontrol_new *ncontrol,
266 				  void *private_data)
267 {
268 	struct snd_kcontrol *kctl;
269 	unsigned int count;
270 	unsigned int access;
271 	int err;
272 
273 	if (snd_BUG_ON(!ncontrol || !ncontrol->info))
274 		return NULL;
275 
276 	count = ncontrol->count;
277 	if (count == 0)
278 		count = 1;
279 
280 	access = ncontrol->access;
281 	if (access == 0)
282 		access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
283 	access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
284 		   SNDRV_CTL_ELEM_ACCESS_VOLATILE |
285 		   SNDRV_CTL_ELEM_ACCESS_INACTIVE |
286 		   SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE |
287 		   SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND |
288 		   SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK |
289 		   SNDRV_CTL_ELEM_ACCESS_LED_MASK |
290 		   SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK);
291 
292 	err = snd_ctl_new(&kctl, count, access, NULL);
293 	if (err < 0)
294 		return NULL;
295 
296 	/* The 'numid' member is decided when calling snd_ctl_add(). */
297 	kctl->id.iface = ncontrol->iface;
298 	kctl->id.device = ncontrol->device;
299 	kctl->id.subdevice = ncontrol->subdevice;
300 	if (ncontrol->name) {
301 		strscpy(kctl->id.name, ncontrol->name, sizeof(kctl->id.name));
302 		if (strcmp(ncontrol->name, kctl->id.name) != 0)
303 			pr_warn("ALSA: Control name '%s' truncated to '%s'\n",
304 				ncontrol->name, kctl->id.name);
305 	}
306 	kctl->id.index = ncontrol->index;
307 
308 	kctl->info = ncontrol->info;
309 	kctl->get = ncontrol->get;
310 	kctl->put = ncontrol->put;
311 	kctl->tlv.p = ncontrol->tlv.p;
312 
313 	kctl->private_value = ncontrol->private_value;
314 	kctl->private_data = private_data;
315 
316 	return kctl;
317 }
318 EXPORT_SYMBOL(snd_ctl_new1);
319 
320 /**
321  * snd_ctl_free_one - release the control instance
322  * @kcontrol: the control instance
323  *
324  * Releases the control instance created via snd_ctl_new()
325  * or snd_ctl_new1().
326  * Don't call this after the control was added to the card.
327  */
328 void snd_ctl_free_one(struct snd_kcontrol *kcontrol)
329 {
330 	if (kcontrol) {
331 		if (kcontrol->private_free)
332 			kcontrol->private_free(kcontrol);
333 		kfree(kcontrol);
334 	}
335 }
336 EXPORT_SYMBOL(snd_ctl_free_one);
337 
338 static bool snd_ctl_remove_numid_conflict(struct snd_card *card,
339 					  unsigned int count)
340 {
341 	struct snd_kcontrol *kctl;
342 
343 	/* Make sure that the ids assigned to the control do not wrap around */
344 	if (card->last_numid >= UINT_MAX - count)
345 		card->last_numid = 0;
346 
347 	list_for_each_entry(kctl, &card->controls, list) {
348 		if (kctl->id.numid < card->last_numid + 1 + count &&
349 		    kctl->id.numid + kctl->count > card->last_numid + 1) {
350 		    	card->last_numid = kctl->id.numid + kctl->count - 1;
351 			return true;
352 		}
353 	}
354 	return false;
355 }
356 
357 static int snd_ctl_find_hole(struct snd_card *card, unsigned int count)
358 {
359 	unsigned int iter = 100000;
360 
361 	while (snd_ctl_remove_numid_conflict(card, count)) {
362 		if (--iter == 0) {
363 			/* this situation is very unlikely */
364 			dev_err(card->dev, "unable to allocate new control numid\n");
365 			return -ENOMEM;
366 		}
367 	}
368 	return 0;
369 }
370 
371 /* check whether the given id is contained in the given kctl */
372 static bool elem_id_matches(const struct snd_kcontrol *kctl,
373 			    const struct snd_ctl_elem_id *id)
374 {
375 	return kctl->id.iface == id->iface &&
376 		kctl->id.device == id->device &&
377 		kctl->id.subdevice == id->subdevice &&
378 		!strncmp(kctl->id.name, id->name, sizeof(kctl->id.name)) &&
379 		kctl->id.index <= id->index &&
380 		kctl->id.index + kctl->count > id->index;
381 }
382 
383 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
384 /* Compute a hash key for the corresponding ctl id
385  * It's for the name lookup, hence the numid is excluded.
386  * The hash key is bound in LONG_MAX to be used for Xarray key.
387  */
388 #define MULTIPLIER	37
389 static unsigned long get_ctl_id_hash(const struct snd_ctl_elem_id *id)
390 {
391 	int i;
392 	unsigned long h;
393 
394 	h = id->iface;
395 	h = MULTIPLIER * h + id->device;
396 	h = MULTIPLIER * h + id->subdevice;
397 	for (i = 0; i < SNDRV_CTL_ELEM_ID_NAME_MAXLEN && id->name[i]; i++)
398 		h = MULTIPLIER * h + id->name[i];
399 	h = MULTIPLIER * h + id->index;
400 	h &= LONG_MAX;
401 	return h;
402 }
403 
404 /* add hash entries to numid and ctl xarray tables */
405 static void add_hash_entries(struct snd_card *card,
406 			     struct snd_kcontrol *kcontrol)
407 {
408 	struct snd_ctl_elem_id id = kcontrol->id;
409 	int i;
410 
411 	xa_store_range(&card->ctl_numids, kcontrol->id.numid,
412 		       kcontrol->id.numid + kcontrol->count - 1,
413 		       kcontrol, GFP_KERNEL);
414 
415 	for (i = 0; i < kcontrol->count; i++) {
416 		id.index = kcontrol->id.index + i;
417 		if (xa_insert(&card->ctl_hash, get_ctl_id_hash(&id),
418 			      kcontrol, GFP_KERNEL)) {
419 			/* skip hash for this entry, noting we had collision */
420 			card->ctl_hash_collision = true;
421 			dev_dbg(card->dev, "ctl_hash collision %d:%s:%d\n",
422 				id.iface, id.name, id.index);
423 		}
424 	}
425 }
426 
427 /* remove hash entries that have been added */
428 static void remove_hash_entries(struct snd_card *card,
429 				struct snd_kcontrol *kcontrol)
430 {
431 	struct snd_ctl_elem_id id = kcontrol->id;
432 	struct snd_kcontrol *matched;
433 	unsigned long h;
434 	int i;
435 
436 	for (i = 0; i < kcontrol->count; i++) {
437 		xa_erase(&card->ctl_numids, id.numid);
438 		h = get_ctl_id_hash(&id);
439 		matched = xa_load(&card->ctl_hash, h);
440 		if (matched && (matched == kcontrol ||
441 				elem_id_matches(matched, &id)))
442 			xa_erase(&card->ctl_hash, h);
443 		id.index++;
444 		id.numid++;
445 	}
446 }
447 #else /* CONFIG_SND_CTL_FAST_LOOKUP */
448 static inline void add_hash_entries(struct snd_card *card,
449 				    struct snd_kcontrol *kcontrol)
450 {
451 }
452 static inline void remove_hash_entries(struct snd_card *card,
453 				       struct snd_kcontrol *kcontrol)
454 {
455 }
456 #endif /* CONFIG_SND_CTL_FAST_LOOKUP */
457 
458 enum snd_ctl_add_mode {
459 	CTL_ADD_EXCLUSIVE, CTL_REPLACE, CTL_ADD_ON_REPLACE,
460 };
461 
462 /* add/replace a new kcontrol object; call with card->controls_rwsem locked */
463 static int __snd_ctl_add_replace(struct snd_card *card,
464 				 struct snd_kcontrol *kcontrol,
465 				 enum snd_ctl_add_mode mode)
466 {
467 	struct snd_ctl_elem_id id;
468 	unsigned int idx;
469 	struct snd_kcontrol *old;
470 	int err;
471 
472 	lockdep_assert_held_write(&card->controls_rwsem);
473 
474 	id = kcontrol->id;
475 	if (id.index > UINT_MAX - kcontrol->count)
476 		return -EINVAL;
477 
478 	old = snd_ctl_find_id_locked(card, &id);
479 	if (!old) {
480 		if (mode == CTL_REPLACE)
481 			return -EINVAL;
482 	} else {
483 		if (mode == CTL_ADD_EXCLUSIVE) {
484 			dev_err(card->dev,
485 				"control %i:%i:%i:%s:%i is already present\n",
486 				id.iface, id.device, id.subdevice, id.name,
487 				id.index);
488 			return -EBUSY;
489 		}
490 
491 		err = snd_ctl_remove_locked(card, old);
492 		if (err < 0)
493 			return err;
494 	}
495 
496 	if (snd_ctl_find_hole(card, kcontrol->count) < 0)
497 		return -ENOMEM;
498 
499 	list_add_tail(&kcontrol->list, &card->controls);
500 	card->controls_count += kcontrol->count;
501 	kcontrol->id.numid = card->last_numid + 1;
502 	card->last_numid += kcontrol->count;
503 
504 	add_hash_entries(card, kcontrol);
505 
506 	for (idx = 0; idx < kcontrol->count; idx++)
507 		snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_ADD, kcontrol, idx);
508 
509 	return 0;
510 }
511 
512 static int snd_ctl_add_replace(struct snd_card *card,
513 			       struct snd_kcontrol *kcontrol,
514 			       enum snd_ctl_add_mode mode)
515 {
516 	int err = -EINVAL;
517 
518 	if (! kcontrol)
519 		return err;
520 	if (snd_BUG_ON(!card || !kcontrol->info))
521 		goto error;
522 
523 	down_write(&card->controls_rwsem);
524 	err = __snd_ctl_add_replace(card, kcontrol, mode);
525 	up_write(&card->controls_rwsem);
526 	if (err < 0)
527 		goto error;
528 	return 0;
529 
530  error:
531 	snd_ctl_free_one(kcontrol);
532 	return err;
533 }
534 
535 /**
536  * snd_ctl_add - add the control instance to the card
537  * @card: the card instance
538  * @kcontrol: the control instance to add
539  *
540  * Adds the control instance created via snd_ctl_new() or
541  * snd_ctl_new1() to the given card. Assigns also an unique
542  * numid used for fast search.
543  *
544  * It frees automatically the control which cannot be added.
545  *
546  * Return: Zero if successful, or a negative error code on failure.
547  *
548  */
549 int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
550 {
551 	return snd_ctl_add_replace(card, kcontrol, CTL_ADD_EXCLUSIVE);
552 }
553 EXPORT_SYMBOL(snd_ctl_add);
554 
555 /**
556  * snd_ctl_replace - replace the control instance of the card
557  * @card: the card instance
558  * @kcontrol: the control instance to replace
559  * @add_on_replace: add the control if not already added
560  *
561  * Replaces the given control.  If the given control does not exist
562  * and the add_on_replace flag is set, the control is added.  If the
563  * control exists, it is destroyed first.
564  *
565  * It frees automatically the control which cannot be added or replaced.
566  *
567  * Return: Zero if successful, or a negative error code on failure.
568  */
569 int snd_ctl_replace(struct snd_card *card, struct snd_kcontrol *kcontrol,
570 		    bool add_on_replace)
571 {
572 	return snd_ctl_add_replace(card, kcontrol,
573 				   add_on_replace ? CTL_ADD_ON_REPLACE : CTL_REPLACE);
574 }
575 EXPORT_SYMBOL(snd_ctl_replace);
576 
577 static int __snd_ctl_remove(struct snd_card *card,
578 			    struct snd_kcontrol *kcontrol,
579 			    bool remove_hash)
580 {
581 	unsigned int idx;
582 
583 	lockdep_assert_held_write(&card->controls_rwsem);
584 
585 	if (snd_BUG_ON(!card || !kcontrol))
586 		return -EINVAL;
587 	list_del(&kcontrol->list);
588 
589 	if (remove_hash)
590 		remove_hash_entries(card, kcontrol);
591 
592 	card->controls_count -= kcontrol->count;
593 	for (idx = 0; idx < kcontrol->count; idx++)
594 		snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_REMOVE, kcontrol, idx);
595 	snd_ctl_free_one(kcontrol);
596 	return 0;
597 }
598 
599 static inline int snd_ctl_remove_locked(struct snd_card *card,
600 					struct snd_kcontrol *kcontrol)
601 {
602 	return __snd_ctl_remove(card, kcontrol, true);
603 }
604 
605 /**
606  * snd_ctl_remove - remove the control from the card and release it
607  * @card: the card instance
608  * @kcontrol: the control instance to remove
609  *
610  * Removes the control from the card and then releases the instance.
611  * You don't need to call snd_ctl_free_one().
612  *
613  * Return: 0 if successful, or a negative error code on failure.
614  *
615  * Note that this function takes card->controls_rwsem lock internally.
616  */
617 int snd_ctl_remove(struct snd_card *card, struct snd_kcontrol *kcontrol)
618 {
619 	int ret;
620 
621 	down_write(&card->controls_rwsem);
622 	ret = snd_ctl_remove_locked(card, kcontrol);
623 	up_write(&card->controls_rwsem);
624 	return ret;
625 }
626 EXPORT_SYMBOL(snd_ctl_remove);
627 
628 /**
629  * snd_ctl_remove_id - remove the control of the given id and release it
630  * @card: the card instance
631  * @id: the control id to remove
632  *
633  * Finds the control instance with the given id, removes it from the
634  * card list and releases it.
635  *
636  * Return: 0 if successful, or a negative error code on failure.
637  */
638 int snd_ctl_remove_id(struct snd_card *card, struct snd_ctl_elem_id *id)
639 {
640 	struct snd_kcontrol *kctl;
641 	int ret;
642 
643 	down_write(&card->controls_rwsem);
644 	kctl = snd_ctl_find_id_locked(card, id);
645 	if (kctl == NULL) {
646 		up_write(&card->controls_rwsem);
647 		return -ENOENT;
648 	}
649 	ret = snd_ctl_remove_locked(card, kctl);
650 	up_write(&card->controls_rwsem);
651 	return ret;
652 }
653 EXPORT_SYMBOL(snd_ctl_remove_id);
654 
655 /**
656  * snd_ctl_remove_user_ctl - remove and release the unlocked user control
657  * @file: active control handle
658  * @id: the control id to remove
659  *
660  * Finds the control instance with the given id, removes it from the
661  * card list and releases it.
662  *
663  * Return: 0 if successful, or a negative error code on failure.
664  */
665 static int snd_ctl_remove_user_ctl(struct snd_ctl_file * file,
666 				   struct snd_ctl_elem_id *id)
667 {
668 	struct snd_card *card = file->card;
669 	struct snd_kcontrol *kctl;
670 	int idx, ret;
671 
672 	down_write(&card->controls_rwsem);
673 	kctl = snd_ctl_find_id_locked(card, id);
674 	if (kctl == NULL) {
675 		ret = -ENOENT;
676 		goto error;
677 	}
678 	if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER)) {
679 		ret = -EINVAL;
680 		goto error;
681 	}
682 	for (idx = 0; idx < kctl->count; idx++)
683 		if (kctl->vd[idx].owner != NULL && kctl->vd[idx].owner != file) {
684 			ret = -EBUSY;
685 			goto error;
686 		}
687 	ret = snd_ctl_remove_locked(card, kctl);
688 error:
689 	up_write(&card->controls_rwsem);
690 	return ret;
691 }
692 
693 /**
694  * snd_ctl_activate_id - activate/inactivate the control of the given id
695  * @card: the card instance
696  * @id: the control id to activate/inactivate
697  * @active: non-zero to activate
698  *
699  * Finds the control instance with the given id, and activate or
700  * inactivate the control together with notification, if changed.
701  * The given ID data is filled with full information.
702  *
703  * Return: 0 if unchanged, 1 if changed, or a negative error code on failure.
704  */
705 int snd_ctl_activate_id(struct snd_card *card, struct snd_ctl_elem_id *id,
706 			int active)
707 {
708 	struct snd_kcontrol *kctl;
709 	struct snd_kcontrol_volatile *vd;
710 	unsigned int index_offset;
711 	int ret;
712 
713 	down_write(&card->controls_rwsem);
714 	kctl = snd_ctl_find_id_locked(card, id);
715 	if (kctl == NULL) {
716 		ret = -ENOENT;
717 		goto unlock;
718 	}
719 	index_offset = snd_ctl_get_ioff(kctl, id);
720 	vd = &kctl->vd[index_offset];
721 	ret = 0;
722 	if (active) {
723 		if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE))
724 			goto unlock;
725 		vd->access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE;
726 	} else {
727 		if (vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)
728 			goto unlock;
729 		vd->access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
730 	}
731 	snd_ctl_build_ioff(id, kctl, index_offset);
732 	downgrade_write(&card->controls_rwsem);
733 	snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_INFO, kctl, index_offset);
734 	up_read(&card->controls_rwsem);
735 	return 1;
736 
737  unlock:
738 	up_write(&card->controls_rwsem);
739 	return ret;
740 }
741 EXPORT_SYMBOL_GPL(snd_ctl_activate_id);
742 
743 /**
744  * snd_ctl_rename_id - replace the id of a control on the card
745  * @card: the card instance
746  * @src_id: the old id
747  * @dst_id: the new id
748  *
749  * Finds the control with the old id from the card, and replaces the
750  * id with the new one.
751  *
752  * The function tries to keep the already assigned numid while replacing
753  * the rest.
754  *
755  * Note that this function should be used only in the card initialization
756  * phase.  Calling after the card instantiation may cause issues with
757  * user-space expecting persistent numids.
758  *
759  * Return: Zero if successful, or a negative error code on failure.
760  */
761 int snd_ctl_rename_id(struct snd_card *card, struct snd_ctl_elem_id *src_id,
762 		      struct snd_ctl_elem_id *dst_id)
763 {
764 	struct snd_kcontrol *kctl;
765 	int saved_numid;
766 
767 	down_write(&card->controls_rwsem);
768 	kctl = snd_ctl_find_id_locked(card, src_id);
769 	if (kctl == NULL) {
770 		up_write(&card->controls_rwsem);
771 		return -ENOENT;
772 	}
773 	saved_numid = kctl->id.numid;
774 	remove_hash_entries(card, kctl);
775 	kctl->id = *dst_id;
776 	kctl->id.numid = saved_numid;
777 	add_hash_entries(card, kctl);
778 	up_write(&card->controls_rwsem);
779 	return 0;
780 }
781 EXPORT_SYMBOL(snd_ctl_rename_id);
782 
783 /**
784  * snd_ctl_rename - rename the control on the card
785  * @card: the card instance
786  * @kctl: the control to rename
787  * @name: the new name
788  *
789  * Renames the specified control on the card to the new name.
790  *
791  * Note that this function takes card->controls_rwsem lock internally.
792  */
793 void snd_ctl_rename(struct snd_card *card, struct snd_kcontrol *kctl,
794 		    const char *name)
795 {
796 	down_write(&card->controls_rwsem);
797 	remove_hash_entries(card, kctl);
798 
799 	if (strscpy(kctl->id.name, name, sizeof(kctl->id.name)) < 0)
800 		pr_warn("ALSA: Renamed control new name '%s' truncated to '%s'\n",
801 			name, kctl->id.name);
802 
803 	add_hash_entries(card, kctl);
804 	up_write(&card->controls_rwsem);
805 }
806 EXPORT_SYMBOL(snd_ctl_rename);
807 
808 #ifndef CONFIG_SND_CTL_FAST_LOOKUP
809 static struct snd_kcontrol *
810 snd_ctl_find_numid_slow(struct snd_card *card, unsigned int numid)
811 {
812 	struct snd_kcontrol *kctl;
813 
814 	list_for_each_entry(kctl, &card->controls, list) {
815 		if (kctl->id.numid <= numid && kctl->id.numid + kctl->count > numid)
816 			return kctl;
817 	}
818 	return NULL;
819 }
820 #endif /* !CONFIG_SND_CTL_FAST_LOOKUP */
821 
822 /**
823  * snd_ctl_find_numid_locked - find the control instance with the given number-id
824  * @card: the card instance
825  * @numid: the number-id to search
826  *
827  * Finds the control instance with the given number-id from the card.
828  *
829  * The caller must down card->controls_rwsem before calling this function
830  * (if the race condition can happen).
831  *
832  * Return: The pointer of the instance if found, or %NULL if not.
833  */
834 struct snd_kcontrol *
835 snd_ctl_find_numid_locked(struct snd_card *card, unsigned int numid)
836 {
837 	if (snd_BUG_ON(!card || !numid))
838 		return NULL;
839 	lockdep_assert_held(&card->controls_rwsem);
840 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
841 	return xa_load(&card->ctl_numids, numid);
842 #else
843 	return snd_ctl_find_numid_slow(card, numid);
844 #endif
845 }
846 EXPORT_SYMBOL(snd_ctl_find_numid_locked);
847 
848 /**
849  * snd_ctl_find_numid - find the control instance with the given number-id
850  * @card: the card instance
851  * @numid: the number-id to search
852  *
853  * Finds the control instance with the given number-id from the card.
854  *
855  * Return: The pointer of the instance if found, or %NULL if not.
856  *
857  * Note that this function takes card->controls_rwsem lock internally.
858  */
859 struct snd_kcontrol *snd_ctl_find_numid(struct snd_card *card,
860 					unsigned int numid)
861 {
862 	struct snd_kcontrol *kctl;
863 
864 	down_read(&card->controls_rwsem);
865 	kctl = snd_ctl_find_numid_locked(card, numid);
866 	up_read(&card->controls_rwsem);
867 	return kctl;
868 }
869 EXPORT_SYMBOL(snd_ctl_find_numid);
870 
871 /**
872  * snd_ctl_find_id_locked - find the control instance with the given id
873  * @card: the card instance
874  * @id: the id to search
875  *
876  * Finds the control instance with the given id from the card.
877  *
878  * The caller must down card->controls_rwsem before calling this function
879  * (if the race condition can happen).
880  *
881  * Return: The pointer of the instance if found, or %NULL if not.
882  */
883 struct snd_kcontrol *snd_ctl_find_id_locked(struct snd_card *card,
884 					    const struct snd_ctl_elem_id *id)
885 {
886 	struct snd_kcontrol *kctl;
887 
888 	if (snd_BUG_ON(!card || !id))
889 		return NULL;
890 	lockdep_assert_held(&card->controls_rwsem);
891 	if (id->numid != 0)
892 		return snd_ctl_find_numid_locked(card, id->numid);
893 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
894 	kctl = xa_load(&card->ctl_hash, get_ctl_id_hash(id));
895 	if (kctl && elem_id_matches(kctl, id))
896 		return kctl;
897 	if (!card->ctl_hash_collision)
898 		return NULL; /* we can rely on only hash table */
899 #endif
900 	/* no matching in hash table - try all as the last resort */
901 	list_for_each_entry(kctl, &card->controls, list)
902 		if (elem_id_matches(kctl, id))
903 			return kctl;
904 
905 	return NULL;
906 }
907 EXPORT_SYMBOL(snd_ctl_find_id_locked);
908 
909 /**
910  * snd_ctl_find_id - find the control instance with the given id
911  * @card: the card instance
912  * @id: the id to search
913  *
914  * Finds the control instance with the given id from the card.
915  *
916  * Return: The pointer of the instance if found, or %NULL if not.
917  *
918  * Note that this function takes card->controls_rwsem lock internally.
919  */
920 struct snd_kcontrol *snd_ctl_find_id(struct snd_card *card,
921 				     const struct snd_ctl_elem_id *id)
922 {
923 	struct snd_kcontrol *kctl;
924 
925 	down_read(&card->controls_rwsem);
926 	kctl = snd_ctl_find_id_locked(card, id);
927 	up_read(&card->controls_rwsem);
928 	return kctl;
929 }
930 EXPORT_SYMBOL(snd_ctl_find_id);
931 
932 static int snd_ctl_card_info(struct snd_card *card, struct snd_ctl_file * ctl,
933 			     unsigned int cmd, void __user *arg)
934 {
935 	struct snd_ctl_card_info *info;
936 
937 	info = kzalloc(sizeof(*info), GFP_KERNEL);
938 	if (! info)
939 		return -ENOMEM;
940 	down_read(&snd_ioctl_rwsem);
941 	info->card = card->number;
942 	strscpy(info->id, card->id, sizeof(info->id));
943 	strscpy(info->driver, card->driver, sizeof(info->driver));
944 	strscpy(info->name, card->shortname, sizeof(info->name));
945 	strscpy(info->longname, card->longname, sizeof(info->longname));
946 	strscpy(info->mixername, card->mixername, sizeof(info->mixername));
947 	strscpy(info->components, card->components, sizeof(info->components));
948 	up_read(&snd_ioctl_rwsem);
949 	if (copy_to_user(arg, info, sizeof(struct snd_ctl_card_info))) {
950 		kfree(info);
951 		return -EFAULT;
952 	}
953 	kfree(info);
954 	return 0;
955 }
956 
957 static int snd_ctl_elem_list(struct snd_card *card,
958 			     struct snd_ctl_elem_list *list)
959 {
960 	struct snd_kcontrol *kctl;
961 	struct snd_ctl_elem_id id;
962 	unsigned int offset, space, jidx;
963 	int err = 0;
964 
965 	offset = list->offset;
966 	space = list->space;
967 
968 	down_read(&card->controls_rwsem);
969 	list->count = card->controls_count;
970 	list->used = 0;
971 	if (space > 0) {
972 		list_for_each_entry(kctl, &card->controls, list) {
973 			if (offset >= kctl->count) {
974 				offset -= kctl->count;
975 				continue;
976 			}
977 			for (jidx = offset; jidx < kctl->count; jidx++) {
978 				snd_ctl_build_ioff(&id, kctl, jidx);
979 				if (copy_to_user(list->pids + list->used, &id,
980 						 sizeof(id))) {
981 					err = -EFAULT;
982 					goto out;
983 				}
984 				list->used++;
985 				if (!--space)
986 					goto out;
987 			}
988 			offset = 0;
989 		}
990 	}
991  out:
992 	up_read(&card->controls_rwsem);
993 	return err;
994 }
995 
996 static int snd_ctl_elem_list_user(struct snd_card *card,
997 				  struct snd_ctl_elem_list __user *_list)
998 {
999 	struct snd_ctl_elem_list list;
1000 	int err;
1001 
1002 	if (copy_from_user(&list, _list, sizeof(list)))
1003 		return -EFAULT;
1004 	err = snd_ctl_elem_list(card, &list);
1005 	if (err)
1006 		return err;
1007 	if (copy_to_user(_list, &list, sizeof(list)))
1008 		return -EFAULT;
1009 
1010 	return 0;
1011 }
1012 
1013 /* Check whether the given kctl info is valid */
1014 static int snd_ctl_check_elem_info(struct snd_card *card,
1015 				   const struct snd_ctl_elem_info *info)
1016 {
1017 	static const unsigned int max_value_counts[] = {
1018 		[SNDRV_CTL_ELEM_TYPE_BOOLEAN]	= 128,
1019 		[SNDRV_CTL_ELEM_TYPE_INTEGER]	= 128,
1020 		[SNDRV_CTL_ELEM_TYPE_ENUMERATED] = 128,
1021 		[SNDRV_CTL_ELEM_TYPE_BYTES]	= 512,
1022 		[SNDRV_CTL_ELEM_TYPE_IEC958]	= 1,
1023 		[SNDRV_CTL_ELEM_TYPE_INTEGER64] = 64,
1024 	};
1025 
1026 	if (info->type < SNDRV_CTL_ELEM_TYPE_BOOLEAN ||
1027 	    info->type > SNDRV_CTL_ELEM_TYPE_INTEGER64) {
1028 		if (card)
1029 			dev_err(card->dev,
1030 				"control %i:%i:%i:%s:%i: invalid type %d\n",
1031 				info->id.iface, info->id.device,
1032 				info->id.subdevice, info->id.name,
1033 				info->id.index, info->type);
1034 		return -EINVAL;
1035 	}
1036 	if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED &&
1037 	    info->value.enumerated.items == 0) {
1038 		if (card)
1039 			dev_err(card->dev,
1040 				"control %i:%i:%i:%s:%i: zero enum items\n",
1041 				info->id.iface, info->id.device,
1042 				info->id.subdevice, info->id.name,
1043 				info->id.index);
1044 		return -EINVAL;
1045 	}
1046 	if (info->count > max_value_counts[info->type]) {
1047 		if (card)
1048 			dev_err(card->dev,
1049 				"control %i:%i:%i:%s:%i: invalid count %d\n",
1050 				info->id.iface, info->id.device,
1051 				info->id.subdevice, info->id.name,
1052 				info->id.index, info->count);
1053 		return -EINVAL;
1054 	}
1055 
1056 	return 0;
1057 }
1058 
1059 /* The capacity of struct snd_ctl_elem_value.value.*/
1060 static const unsigned int value_sizes[] = {
1061 	[SNDRV_CTL_ELEM_TYPE_BOOLEAN]	= sizeof(long),
1062 	[SNDRV_CTL_ELEM_TYPE_INTEGER]	= sizeof(long),
1063 	[SNDRV_CTL_ELEM_TYPE_ENUMERATED] = sizeof(unsigned int),
1064 	[SNDRV_CTL_ELEM_TYPE_BYTES]	= sizeof(unsigned char),
1065 	[SNDRV_CTL_ELEM_TYPE_IEC958]	= sizeof(struct snd_aes_iec958),
1066 	[SNDRV_CTL_ELEM_TYPE_INTEGER64] = sizeof(long long),
1067 };
1068 
1069 /* fill the remaining snd_ctl_elem_value data with the given pattern */
1070 static void fill_remaining_elem_value(struct snd_ctl_elem_value *control,
1071 				      struct snd_ctl_elem_info *info,
1072 				      u32 pattern)
1073 {
1074 	size_t offset = value_sizes[info->type] * info->count;
1075 
1076 	offset = DIV_ROUND_UP(offset, sizeof(u32));
1077 	memset32((u32 *)control->value.bytes.data + offset, pattern,
1078 		 sizeof(control->value) / sizeof(u32) - offset);
1079 }
1080 
1081 /* check whether the given integer ctl value is valid */
1082 static int sanity_check_int_value(struct snd_card *card,
1083 				  const struct snd_ctl_elem_value *control,
1084 				  const struct snd_ctl_elem_info *info,
1085 				  int i, bool print_error)
1086 {
1087 	long long lval, lmin, lmax, lstep;
1088 	u64 rem;
1089 
1090 	switch (info->type) {
1091 	default:
1092 	case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1093 		lval = control->value.integer.value[i];
1094 		lmin = 0;
1095 		lmax = 1;
1096 		lstep = 0;
1097 		break;
1098 	case SNDRV_CTL_ELEM_TYPE_INTEGER:
1099 		lval = control->value.integer.value[i];
1100 		lmin = info->value.integer.min;
1101 		lmax = info->value.integer.max;
1102 		lstep = info->value.integer.step;
1103 		break;
1104 	case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1105 		lval = control->value.integer64.value[i];
1106 		lmin = info->value.integer64.min;
1107 		lmax = info->value.integer64.max;
1108 		lstep = info->value.integer64.step;
1109 		break;
1110 	case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1111 		lval = control->value.enumerated.item[i];
1112 		lmin = 0;
1113 		lmax = info->value.enumerated.items - 1;
1114 		lstep = 0;
1115 		break;
1116 	}
1117 
1118 	if (lval < lmin || lval > lmax) {
1119 		if (print_error)
1120 			dev_err(card->dev,
1121 				"control %i:%i:%i:%s:%i: value out of range %lld (%lld/%lld) at count %i\n",
1122 				control->id.iface, control->id.device,
1123 				control->id.subdevice, control->id.name,
1124 				control->id.index, lval, lmin, lmax, i);
1125 		return -EINVAL;
1126 	}
1127 	if (lstep) {
1128 		div64_u64_rem(lval, lstep, &rem);
1129 		if (rem) {
1130 			if (print_error)
1131 				dev_err(card->dev,
1132 					"control %i:%i:%i:%s:%i: unaligned value %lld (step %lld) at count %i\n",
1133 					control->id.iface, control->id.device,
1134 					control->id.subdevice, control->id.name,
1135 					control->id.index, lval, lstep, i);
1136 			return -EINVAL;
1137 		}
1138 	}
1139 
1140 	return 0;
1141 }
1142 
1143 /* check whether the all input values are valid for the given elem value */
1144 static int sanity_check_input_values(struct snd_card *card,
1145 				     const struct snd_ctl_elem_value *control,
1146 				     const struct snd_ctl_elem_info *info,
1147 				     bool print_error)
1148 {
1149 	int i, ret;
1150 
1151 	switch (info->type) {
1152 	case SNDRV_CTL_ELEM_TYPE_BOOLEAN:
1153 	case SNDRV_CTL_ELEM_TYPE_INTEGER:
1154 	case SNDRV_CTL_ELEM_TYPE_INTEGER64:
1155 	case SNDRV_CTL_ELEM_TYPE_ENUMERATED:
1156 		for (i = 0; i < info->count; i++) {
1157 			ret = sanity_check_int_value(card, control, info, i,
1158 						     print_error);
1159 			if (ret < 0)
1160 				return ret;
1161 		}
1162 		break;
1163 	default:
1164 		break;
1165 	}
1166 
1167 	return 0;
1168 }
1169 
1170 /* perform sanity checks to the given snd_ctl_elem_value object */
1171 static int sanity_check_elem_value(struct snd_card *card,
1172 				   const struct snd_ctl_elem_value *control,
1173 				   const struct snd_ctl_elem_info *info,
1174 				   u32 pattern)
1175 {
1176 	size_t offset;
1177 	int ret;
1178 	u32 *p;
1179 
1180 	ret = sanity_check_input_values(card, control, info, true);
1181 	if (ret < 0)
1182 		return ret;
1183 
1184 	/* check whether the remaining area kept untouched */
1185 	offset = value_sizes[info->type] * info->count;
1186 	offset = DIV_ROUND_UP(offset, sizeof(u32));
1187 	p = (u32 *)control->value.bytes.data + offset;
1188 	for (; offset < sizeof(control->value) / sizeof(u32); offset++, p++) {
1189 		if (*p != pattern) {
1190 			ret = -EINVAL;
1191 			break;
1192 		}
1193 		*p = 0; /* clear the checked area */
1194 	}
1195 
1196 	return ret;
1197 }
1198 
1199 static int __snd_ctl_elem_info(struct snd_card *card,
1200 			       struct snd_kcontrol *kctl,
1201 			       struct snd_ctl_elem_info *info,
1202 			       struct snd_ctl_file *ctl)
1203 {
1204 	struct snd_kcontrol_volatile *vd;
1205 	unsigned int index_offset;
1206 	int result;
1207 
1208 #ifdef CONFIG_SND_DEBUG
1209 	info->access = 0;
1210 #endif
1211 	result = snd_power_ref_and_wait(card);
1212 	if (!result)
1213 		result = kctl->info(kctl, info);
1214 	snd_power_unref(card);
1215 	if (result >= 0) {
1216 		snd_BUG_ON(info->access);
1217 		index_offset = snd_ctl_get_ioff(kctl, &info->id);
1218 		vd = &kctl->vd[index_offset];
1219 		snd_ctl_build_ioff(&info->id, kctl, index_offset);
1220 		info->access = vd->access;
1221 		if (vd->owner) {
1222 			info->access |= SNDRV_CTL_ELEM_ACCESS_LOCK;
1223 			if (vd->owner == ctl)
1224 				info->access |= SNDRV_CTL_ELEM_ACCESS_OWNER;
1225 			info->owner = pid_vnr(vd->owner->pid);
1226 		} else {
1227 			info->owner = -1;
1228 		}
1229 		if (!snd_ctl_skip_validation(info) &&
1230 		    snd_ctl_check_elem_info(card, info) < 0)
1231 			result = -EINVAL;
1232 	}
1233 	return result;
1234 }
1235 
1236 static int snd_ctl_elem_info(struct snd_ctl_file *ctl,
1237 			     struct snd_ctl_elem_info *info)
1238 {
1239 	struct snd_card *card = ctl->card;
1240 	struct snd_kcontrol *kctl;
1241 	int result;
1242 
1243 	down_read(&card->controls_rwsem);
1244 	kctl = snd_ctl_find_id_locked(card, &info->id);
1245 	if (kctl == NULL)
1246 		result = -ENOENT;
1247 	else
1248 		result = __snd_ctl_elem_info(card, kctl, info, ctl);
1249 	up_read(&card->controls_rwsem);
1250 	return result;
1251 }
1252 
1253 static int snd_ctl_elem_info_user(struct snd_ctl_file *ctl,
1254 				  struct snd_ctl_elem_info __user *_info)
1255 {
1256 	struct snd_ctl_elem_info info;
1257 	int result;
1258 
1259 	if (copy_from_user(&info, _info, sizeof(info)))
1260 		return -EFAULT;
1261 	result = snd_ctl_elem_info(ctl, &info);
1262 	if (result < 0)
1263 		return result;
1264 	/* drop internal access flags */
1265 	info.access &= ~(SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK|
1266 			 SNDRV_CTL_ELEM_ACCESS_LED_MASK);
1267 	if (copy_to_user(_info, &info, sizeof(info)))
1268 		return -EFAULT;
1269 	return result;
1270 }
1271 
1272 static int snd_ctl_elem_read(struct snd_card *card,
1273 			     struct snd_ctl_elem_value *control)
1274 {
1275 	struct snd_kcontrol *kctl;
1276 	struct snd_kcontrol_volatile *vd;
1277 	unsigned int index_offset;
1278 	struct snd_ctl_elem_info info;
1279 	const u32 pattern = 0xdeadbeef;
1280 	int ret;
1281 
1282 	down_read(&card->controls_rwsem);
1283 	kctl = snd_ctl_find_id_locked(card, &control->id);
1284 	if (kctl == NULL) {
1285 		ret = -ENOENT;
1286 		goto unlock;
1287 	}
1288 
1289 	index_offset = snd_ctl_get_ioff(kctl, &control->id);
1290 	vd = &kctl->vd[index_offset];
1291 	if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_READ) || kctl->get == NULL) {
1292 		ret = -EPERM;
1293 		goto unlock;
1294 	}
1295 
1296 	snd_ctl_build_ioff(&control->id, kctl, index_offset);
1297 
1298 #ifdef CONFIG_SND_CTL_DEBUG
1299 	/* info is needed only for validation */
1300 	memset(&info, 0, sizeof(info));
1301 	info.id = control->id;
1302 	ret = __snd_ctl_elem_info(card, kctl, &info, NULL);
1303 	if (ret < 0)
1304 		goto unlock;
1305 #endif
1306 
1307 	if (!snd_ctl_skip_validation(&info))
1308 		fill_remaining_elem_value(control, &info, pattern);
1309 	ret = snd_power_ref_and_wait(card);
1310 	if (!ret)
1311 		ret = kctl->get(kctl, control);
1312 	snd_power_unref(card);
1313 	if (ret < 0)
1314 		goto unlock;
1315 	if (!snd_ctl_skip_validation(&info) &&
1316 	    sanity_check_elem_value(card, control, &info, pattern) < 0) {
1317 		dev_err(card->dev,
1318 			"control %i:%i:%i:%s:%i: access overflow\n",
1319 			control->id.iface, control->id.device,
1320 			control->id.subdevice, control->id.name,
1321 			control->id.index);
1322 		ret = -EINVAL;
1323 		goto unlock;
1324 	}
1325 unlock:
1326 	up_read(&card->controls_rwsem);
1327 	return ret;
1328 }
1329 
1330 static int snd_ctl_elem_read_user(struct snd_card *card,
1331 				  struct snd_ctl_elem_value __user *_control)
1332 {
1333 	struct snd_ctl_elem_value *control;
1334 	int result;
1335 
1336 	control = memdup_user(_control, sizeof(*control));
1337 	if (IS_ERR(control))
1338 		return PTR_ERR(control);
1339 
1340 	result = snd_ctl_elem_read(card, control);
1341 	if (result < 0)
1342 		goto error;
1343 
1344 	if (copy_to_user(_control, control, sizeof(*control)))
1345 		result = -EFAULT;
1346  error:
1347 	kfree(control);
1348 	return result;
1349 }
1350 
1351 static int snd_ctl_elem_write(struct snd_card *card, struct snd_ctl_file *file,
1352 			      struct snd_ctl_elem_value *control)
1353 {
1354 	struct snd_kcontrol *kctl;
1355 	struct snd_kcontrol_volatile *vd;
1356 	unsigned int index_offset;
1357 	int result;
1358 
1359 	down_write(&card->controls_rwsem);
1360 	kctl = snd_ctl_find_id_locked(card, &control->id);
1361 	if (kctl == NULL) {
1362 		up_write(&card->controls_rwsem);
1363 		return -ENOENT;
1364 	}
1365 
1366 	index_offset = snd_ctl_get_ioff(kctl, &control->id);
1367 	vd = &kctl->vd[index_offset];
1368 	if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_WRITE) || kctl->put == NULL ||
1369 	    (file && vd->owner && vd->owner != file)) {
1370 		up_write(&card->controls_rwsem);
1371 		return -EPERM;
1372 	}
1373 
1374 	snd_ctl_build_ioff(&control->id, kctl, index_offset);
1375 	result = snd_power_ref_and_wait(card);
1376 	/* validate input values */
1377 	if (IS_ENABLED(CONFIG_SND_CTL_INPUT_VALIDATION) && !result) {
1378 		struct snd_ctl_elem_info info;
1379 
1380 		memset(&info, 0, sizeof(info));
1381 		info.id = control->id;
1382 		result = __snd_ctl_elem_info(card, kctl, &info, NULL);
1383 		if (!result)
1384 			result = sanity_check_input_values(card, control, &info,
1385 							   false);
1386 	}
1387 	if (!result)
1388 		result = kctl->put(kctl, control);
1389 	snd_power_unref(card);
1390 	if (result < 0) {
1391 		up_write(&card->controls_rwsem);
1392 		return result;
1393 	}
1394 
1395 	if (result > 0) {
1396 		downgrade_write(&card->controls_rwsem);
1397 		snd_ctl_notify_one(card, SNDRV_CTL_EVENT_MASK_VALUE, kctl, index_offset);
1398 		up_read(&card->controls_rwsem);
1399 	} else {
1400 		up_write(&card->controls_rwsem);
1401 	}
1402 
1403 	return 0;
1404 }
1405 
1406 static int snd_ctl_elem_write_user(struct snd_ctl_file *file,
1407 				   struct snd_ctl_elem_value __user *_control)
1408 {
1409 	struct snd_ctl_elem_value *control;
1410 	struct snd_card *card;
1411 	int result;
1412 
1413 	control = memdup_user(_control, sizeof(*control));
1414 	if (IS_ERR(control))
1415 		return PTR_ERR(control);
1416 
1417 	card = file->card;
1418 	result = snd_ctl_elem_write(card, file, control);
1419 	if (result < 0)
1420 		goto error;
1421 
1422 	if (copy_to_user(_control, control, sizeof(*control)))
1423 		result = -EFAULT;
1424  error:
1425 	kfree(control);
1426 	return result;
1427 }
1428 
1429 static int snd_ctl_elem_lock(struct snd_ctl_file *file,
1430 			     struct snd_ctl_elem_id __user *_id)
1431 {
1432 	struct snd_card *card = file->card;
1433 	struct snd_ctl_elem_id id;
1434 	struct snd_kcontrol *kctl;
1435 	struct snd_kcontrol_volatile *vd;
1436 	int result;
1437 
1438 	if (copy_from_user(&id, _id, sizeof(id)))
1439 		return -EFAULT;
1440 	down_write(&card->controls_rwsem);
1441 	kctl = snd_ctl_find_id_locked(card, &id);
1442 	if (kctl == NULL) {
1443 		result = -ENOENT;
1444 	} else {
1445 		vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1446 		if (vd->owner != NULL)
1447 			result = -EBUSY;
1448 		else {
1449 			vd->owner = file;
1450 			result = 0;
1451 		}
1452 	}
1453 	up_write(&card->controls_rwsem);
1454 	return result;
1455 }
1456 
1457 static int snd_ctl_elem_unlock(struct snd_ctl_file *file,
1458 			       struct snd_ctl_elem_id __user *_id)
1459 {
1460 	struct snd_card *card = file->card;
1461 	struct snd_ctl_elem_id id;
1462 	struct snd_kcontrol *kctl;
1463 	struct snd_kcontrol_volatile *vd;
1464 	int result;
1465 
1466 	if (copy_from_user(&id, _id, sizeof(id)))
1467 		return -EFAULT;
1468 	down_write(&card->controls_rwsem);
1469 	kctl = snd_ctl_find_id_locked(card, &id);
1470 	if (kctl == NULL) {
1471 		result = -ENOENT;
1472 	} else {
1473 		vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1474 		if (vd->owner == NULL)
1475 			result = -EINVAL;
1476 		else if (vd->owner != file)
1477 			result = -EPERM;
1478 		else {
1479 			vd->owner = NULL;
1480 			result = 0;
1481 		}
1482 	}
1483 	up_write(&card->controls_rwsem);
1484 	return result;
1485 }
1486 
1487 struct user_element {
1488 	struct snd_ctl_elem_info info;
1489 	struct snd_card *card;
1490 	char *elem_data;		/* element data */
1491 	unsigned long elem_data_size;	/* size of element data in bytes */
1492 	void *tlv_data;			/* TLV data */
1493 	unsigned long tlv_data_size;	/* TLV data size */
1494 	void *priv_data;		/* private data (like strings for enumerated type) */
1495 };
1496 
1497 // check whether the addition (in bytes) of user ctl element may overflow the limit.
1498 static bool check_user_elem_overflow(struct snd_card *card, ssize_t add)
1499 {
1500 	return (ssize_t)card->user_ctl_alloc_size + add > max_user_ctl_alloc_size;
1501 }
1502 
1503 static int snd_ctl_elem_user_info(struct snd_kcontrol *kcontrol,
1504 				  struct snd_ctl_elem_info *uinfo)
1505 {
1506 	struct user_element *ue = kcontrol->private_data;
1507 	unsigned int offset;
1508 
1509 	offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1510 	*uinfo = ue->info;
1511 	snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1512 
1513 	return 0;
1514 }
1515 
1516 static int snd_ctl_elem_user_enum_info(struct snd_kcontrol *kcontrol,
1517 				       struct snd_ctl_elem_info *uinfo)
1518 {
1519 	struct user_element *ue = kcontrol->private_data;
1520 	const char *names;
1521 	unsigned int item;
1522 	unsigned int offset;
1523 
1524 	item = uinfo->value.enumerated.item;
1525 
1526 	offset = snd_ctl_get_ioff(kcontrol, &uinfo->id);
1527 	*uinfo = ue->info;
1528 	snd_ctl_build_ioff(&uinfo->id, kcontrol, offset);
1529 
1530 	item = min(item, uinfo->value.enumerated.items - 1);
1531 	uinfo->value.enumerated.item = item;
1532 
1533 	names = ue->priv_data;
1534 	for (; item > 0; --item)
1535 		names += strlen(names) + 1;
1536 	strcpy(uinfo->value.enumerated.name, names);
1537 
1538 	return 0;
1539 }
1540 
1541 static int snd_ctl_elem_user_get(struct snd_kcontrol *kcontrol,
1542 				 struct snd_ctl_elem_value *ucontrol)
1543 {
1544 	struct user_element *ue = kcontrol->private_data;
1545 	unsigned int size = ue->elem_data_size;
1546 	char *src = ue->elem_data +
1547 			snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1548 
1549 	memcpy(&ucontrol->value, src, size);
1550 	return 0;
1551 }
1552 
1553 static int snd_ctl_elem_user_put(struct snd_kcontrol *kcontrol,
1554 				 struct snd_ctl_elem_value *ucontrol)
1555 {
1556 	int err, change;
1557 	struct user_element *ue = kcontrol->private_data;
1558 	unsigned int size = ue->elem_data_size;
1559 	char *dst = ue->elem_data +
1560 			snd_ctl_get_ioff(kcontrol, &ucontrol->id) * size;
1561 
1562 	err = sanity_check_input_values(ue->card, ucontrol, &ue->info, false);
1563 	if (err < 0)
1564 		return err;
1565 
1566 	change = memcmp(&ucontrol->value, dst, size) != 0;
1567 	if (change)
1568 		memcpy(dst, &ucontrol->value, size);
1569 	return change;
1570 }
1571 
1572 /* called in controls_rwsem write lock */
1573 static int replace_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1574 			    unsigned int size)
1575 {
1576 	struct user_element *ue = kctl->private_data;
1577 	unsigned int *container;
1578 	unsigned int mask = 0;
1579 	int i;
1580 	int change;
1581 
1582 	lockdep_assert_held_write(&ue->card->controls_rwsem);
1583 
1584 	if (size > 1024 * 128)	/* sane value */
1585 		return -EINVAL;
1586 
1587 	// does the TLV size change cause overflow?
1588 	if (check_user_elem_overflow(ue->card, (ssize_t)(size - ue->tlv_data_size)))
1589 		return -ENOMEM;
1590 
1591 	container = vmemdup_user(buf, size);
1592 	if (IS_ERR(container))
1593 		return PTR_ERR(container);
1594 
1595 	change = ue->tlv_data_size != size;
1596 	if (!change)
1597 		change = memcmp(ue->tlv_data, container, size) != 0;
1598 	if (!change) {
1599 		kvfree(container);
1600 		return 0;
1601 	}
1602 
1603 	if (ue->tlv_data == NULL) {
1604 		/* Now TLV data is available. */
1605 		for (i = 0; i < kctl->count; ++i)
1606 			kctl->vd[i].access |= SNDRV_CTL_ELEM_ACCESS_TLV_READ;
1607 		mask = SNDRV_CTL_EVENT_MASK_INFO;
1608 	} else {
1609 		ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1610 		ue->tlv_data_size = 0;
1611 		kvfree(ue->tlv_data);
1612 	}
1613 
1614 	ue->tlv_data = container;
1615 	ue->tlv_data_size = size;
1616 	// decremented at private_free.
1617 	ue->card->user_ctl_alloc_size += size;
1618 
1619 	mask |= SNDRV_CTL_EVENT_MASK_TLV;
1620 	for (i = 0; i < kctl->count; ++i)
1621 		snd_ctl_notify_one(ue->card, mask, kctl, i);
1622 
1623 	return change;
1624 }
1625 
1626 static int read_user_tlv(struct snd_kcontrol *kctl, unsigned int __user *buf,
1627 			 unsigned int size)
1628 {
1629 	struct user_element *ue = kctl->private_data;
1630 
1631 	if (ue->tlv_data_size == 0 || ue->tlv_data == NULL)
1632 		return -ENXIO;
1633 
1634 	if (size < ue->tlv_data_size)
1635 		return -ENOSPC;
1636 
1637 	if (copy_to_user(buf, ue->tlv_data, ue->tlv_data_size))
1638 		return -EFAULT;
1639 
1640 	return 0;
1641 }
1642 
1643 static int snd_ctl_elem_user_tlv(struct snd_kcontrol *kctl, int op_flag,
1644 				 unsigned int size, unsigned int __user *buf)
1645 {
1646 	if (op_flag == SNDRV_CTL_TLV_OP_WRITE)
1647 		return replace_user_tlv(kctl, buf, size);
1648 	else
1649 		return read_user_tlv(kctl, buf, size);
1650 }
1651 
1652 /* called in controls_rwsem write lock */
1653 static int snd_ctl_elem_init_enum_names(struct user_element *ue)
1654 {
1655 	char *names, *p;
1656 	size_t buf_len, name_len;
1657 	unsigned int i;
1658 	const uintptr_t user_ptrval = ue->info.value.enumerated.names_ptr;
1659 
1660 	lockdep_assert_held_write(&ue->card->controls_rwsem);
1661 
1662 	buf_len = ue->info.value.enumerated.names_length;
1663 	if (buf_len > 64 * 1024)
1664 		return -EINVAL;
1665 
1666 	if (check_user_elem_overflow(ue->card, buf_len))
1667 		return -ENOMEM;
1668 	names = vmemdup_user((const void __user *)user_ptrval, buf_len);
1669 	if (IS_ERR(names))
1670 		return PTR_ERR(names);
1671 
1672 	/* check that there are enough valid names */
1673 	p = names;
1674 	for (i = 0; i < ue->info.value.enumerated.items; ++i) {
1675 		name_len = strnlen(p, buf_len);
1676 		if (name_len == 0 || name_len >= 64 || name_len == buf_len) {
1677 			kvfree(names);
1678 			return -EINVAL;
1679 		}
1680 		p += name_len + 1;
1681 		buf_len -= name_len + 1;
1682 	}
1683 
1684 	ue->priv_data = names;
1685 	ue->info.value.enumerated.names_ptr = 0;
1686 	// increment the allocation size; decremented again at private_free.
1687 	ue->card->user_ctl_alloc_size += ue->info.value.enumerated.names_length;
1688 
1689 	return 0;
1690 }
1691 
1692 static size_t compute_user_elem_size(size_t size, unsigned int count)
1693 {
1694 	return sizeof(struct user_element) + size * count;
1695 }
1696 
1697 static void snd_ctl_elem_user_free(struct snd_kcontrol *kcontrol)
1698 {
1699 	struct user_element *ue = kcontrol->private_data;
1700 
1701 	// decrement the allocation size.
1702 	ue->card->user_ctl_alloc_size -= compute_user_elem_size(ue->elem_data_size, kcontrol->count);
1703 	ue->card->user_ctl_alloc_size -= ue->tlv_data_size;
1704 	if (ue->priv_data)
1705 		ue->card->user_ctl_alloc_size -= ue->info.value.enumerated.names_length;
1706 
1707 	kvfree(ue->tlv_data);
1708 	kvfree(ue->priv_data);
1709 	kfree(ue);
1710 }
1711 
1712 static int snd_ctl_elem_add(struct snd_ctl_file *file,
1713 			    struct snd_ctl_elem_info *info, int replace)
1714 {
1715 	struct snd_card *card = file->card;
1716 	struct snd_kcontrol *kctl;
1717 	unsigned int count;
1718 	unsigned int access;
1719 	long private_size;
1720 	size_t alloc_size;
1721 	struct user_element *ue;
1722 	unsigned int offset;
1723 	int err;
1724 
1725 	if (!*info->id.name)
1726 		return -EINVAL;
1727 	if (strnlen(info->id.name, sizeof(info->id.name)) >= sizeof(info->id.name))
1728 		return -EINVAL;
1729 
1730 	/* Delete a control to replace them if needed. */
1731 	if (replace) {
1732 		info->id.numid = 0;
1733 		err = snd_ctl_remove_user_ctl(file, &info->id);
1734 		if (err)
1735 			return err;
1736 	}
1737 
1738 	/* Check the number of elements for this userspace control. */
1739 	count = info->owner;
1740 	if (count == 0)
1741 		count = 1;
1742 
1743 	/* Arrange access permissions if needed. */
1744 	access = info->access;
1745 	if (access == 0)
1746 		access = SNDRV_CTL_ELEM_ACCESS_READWRITE;
1747 	access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE |
1748 		   SNDRV_CTL_ELEM_ACCESS_INACTIVE |
1749 		   SNDRV_CTL_ELEM_ACCESS_TLV_WRITE);
1750 
1751 	/* In initial state, nothing is available as TLV container. */
1752 	if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1753 		access |= SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK;
1754 	access |= SNDRV_CTL_ELEM_ACCESS_USER;
1755 
1756 	/*
1757 	 * Check information and calculate the size of data specific to
1758 	 * this userspace control.
1759 	 */
1760 	/* pass NULL to card for suppressing error messages */
1761 	err = snd_ctl_check_elem_info(NULL, info);
1762 	if (err < 0)
1763 		return err;
1764 	/* user-space control doesn't allow zero-size data */
1765 	if (info->count < 1)
1766 		return -EINVAL;
1767 	private_size = value_sizes[info->type] * info->count;
1768 	alloc_size = compute_user_elem_size(private_size, count);
1769 
1770 	down_write(&card->controls_rwsem);
1771 	if (check_user_elem_overflow(card, alloc_size)) {
1772 		err = -ENOMEM;
1773 		goto unlock;
1774 	}
1775 
1776 	/*
1777 	 * Keep memory object for this userspace control. After passing this
1778 	 * code block, the instance should be freed by snd_ctl_free_one().
1779 	 *
1780 	 * Note that these elements in this control are locked.
1781 	 */
1782 	err = snd_ctl_new(&kctl, count, access, file);
1783 	if (err < 0)
1784 		goto unlock;
1785 	memcpy(&kctl->id, &info->id, sizeof(kctl->id));
1786 	ue = kzalloc(alloc_size, GFP_KERNEL);
1787 	if (!ue) {
1788 		kfree(kctl);
1789 		err = -ENOMEM;
1790 		goto unlock;
1791 	}
1792 	kctl->private_data = ue;
1793 	kctl->private_free = snd_ctl_elem_user_free;
1794 
1795 	// increment the allocated size; decremented again at private_free.
1796 	card->user_ctl_alloc_size += alloc_size;
1797 
1798 	/* Set private data for this userspace control. */
1799 	ue->card = card;
1800 	ue->info = *info;
1801 	ue->info.access = 0;
1802 	ue->elem_data = (char *)ue + sizeof(*ue);
1803 	ue->elem_data_size = private_size;
1804 	if (ue->info.type == SNDRV_CTL_ELEM_TYPE_ENUMERATED) {
1805 		err = snd_ctl_elem_init_enum_names(ue);
1806 		if (err < 0) {
1807 			snd_ctl_free_one(kctl);
1808 			goto unlock;
1809 		}
1810 	}
1811 
1812 	/* Set callback functions. */
1813 	if (info->type == SNDRV_CTL_ELEM_TYPE_ENUMERATED)
1814 		kctl->info = snd_ctl_elem_user_enum_info;
1815 	else
1816 		kctl->info = snd_ctl_elem_user_info;
1817 	if (access & SNDRV_CTL_ELEM_ACCESS_READ)
1818 		kctl->get = snd_ctl_elem_user_get;
1819 	if (access & SNDRV_CTL_ELEM_ACCESS_WRITE)
1820 		kctl->put = snd_ctl_elem_user_put;
1821 	if (access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE)
1822 		kctl->tlv.c = snd_ctl_elem_user_tlv;
1823 
1824 	/* This function manage to free the instance on failure. */
1825 	err = __snd_ctl_add_replace(card, kctl, CTL_ADD_EXCLUSIVE);
1826 	if (err < 0) {
1827 		snd_ctl_free_one(kctl);
1828 		goto unlock;
1829 	}
1830 	offset = snd_ctl_get_ioff(kctl, &info->id);
1831 	snd_ctl_build_ioff(&info->id, kctl, offset);
1832 	/*
1833 	 * Here we cannot fill any field for the number of elements added by
1834 	 * this operation because there're no specific fields. The usage of
1835 	 * 'owner' field for this purpose may cause any bugs to userspace
1836 	 * applications because the field originally means PID of a process
1837 	 * which locks the element.
1838 	 */
1839  unlock:
1840 	up_write(&card->controls_rwsem);
1841 	return err;
1842 }
1843 
1844 static int snd_ctl_elem_add_user(struct snd_ctl_file *file,
1845 				 struct snd_ctl_elem_info __user *_info, int replace)
1846 {
1847 	struct snd_ctl_elem_info info;
1848 	int err;
1849 
1850 	if (copy_from_user(&info, _info, sizeof(info)))
1851 		return -EFAULT;
1852 	err = snd_ctl_elem_add(file, &info, replace);
1853 	if (err < 0)
1854 		return err;
1855 	if (copy_to_user(_info, &info, sizeof(info))) {
1856 		snd_ctl_remove_user_ctl(file, &info.id);
1857 		return -EFAULT;
1858 	}
1859 
1860 	return 0;
1861 }
1862 
1863 static int snd_ctl_elem_remove(struct snd_ctl_file *file,
1864 			       struct snd_ctl_elem_id __user *_id)
1865 {
1866 	struct snd_ctl_elem_id id;
1867 
1868 	if (copy_from_user(&id, _id, sizeof(id)))
1869 		return -EFAULT;
1870 	return snd_ctl_remove_user_ctl(file, &id);
1871 }
1872 
1873 static int snd_ctl_subscribe_events(struct snd_ctl_file *file, int __user *ptr)
1874 {
1875 	int subscribe;
1876 	if (get_user(subscribe, ptr))
1877 		return -EFAULT;
1878 	if (subscribe < 0) {
1879 		subscribe = file->subscribed;
1880 		if (put_user(subscribe, ptr))
1881 			return -EFAULT;
1882 		return 0;
1883 	}
1884 	if (subscribe) {
1885 		file->subscribed = 1;
1886 		return 0;
1887 	} else if (file->subscribed) {
1888 		snd_ctl_empty_read_queue(file);
1889 		file->subscribed = 0;
1890 	}
1891 	return 0;
1892 }
1893 
1894 static int call_tlv_handler(struct snd_ctl_file *file, int op_flag,
1895 			    struct snd_kcontrol *kctl,
1896 			    struct snd_ctl_elem_id *id,
1897 			    unsigned int __user *buf, unsigned int size)
1898 {
1899 	static const struct {
1900 		int op;
1901 		int perm;
1902 	} pairs[] = {
1903 		{SNDRV_CTL_TLV_OP_READ,  SNDRV_CTL_ELEM_ACCESS_TLV_READ},
1904 		{SNDRV_CTL_TLV_OP_WRITE, SNDRV_CTL_ELEM_ACCESS_TLV_WRITE},
1905 		{SNDRV_CTL_TLV_OP_CMD,   SNDRV_CTL_ELEM_ACCESS_TLV_COMMAND},
1906 	};
1907 	struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1908 	int i, ret;
1909 
1910 	/* Check support of the request for this element. */
1911 	for (i = 0; i < ARRAY_SIZE(pairs); ++i) {
1912 		if (op_flag == pairs[i].op && (vd->access & pairs[i].perm))
1913 			break;
1914 	}
1915 	if (i == ARRAY_SIZE(pairs))
1916 		return -ENXIO;
1917 
1918 	if (kctl->tlv.c == NULL)
1919 		return -ENXIO;
1920 
1921 	/* Write and command operations are not allowed for locked element. */
1922 	if (op_flag != SNDRV_CTL_TLV_OP_READ &&
1923 	    vd->owner != NULL && vd->owner != file)
1924 		return -EPERM;
1925 
1926 	ret = snd_power_ref_and_wait(file->card);
1927 	if (!ret)
1928 		ret = kctl->tlv.c(kctl, op_flag, size, buf);
1929 	snd_power_unref(file->card);
1930 	return ret;
1931 }
1932 
1933 static int read_tlv_buf(struct snd_kcontrol *kctl, struct snd_ctl_elem_id *id,
1934 			unsigned int __user *buf, unsigned int size)
1935 {
1936 	struct snd_kcontrol_volatile *vd = &kctl->vd[snd_ctl_get_ioff(kctl, id)];
1937 	unsigned int len;
1938 
1939 	if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ))
1940 		return -ENXIO;
1941 
1942 	if (kctl->tlv.p == NULL)
1943 		return -ENXIO;
1944 
1945 	len = sizeof(unsigned int) * 2 + kctl->tlv.p[1];
1946 	if (size < len)
1947 		return -ENOMEM;
1948 
1949 	if (copy_to_user(buf, kctl->tlv.p, len))
1950 		return -EFAULT;
1951 
1952 	return 0;
1953 }
1954 
1955 static int snd_ctl_tlv_ioctl(struct snd_ctl_file *file,
1956 			     struct snd_ctl_tlv __user *buf,
1957                              int op_flag)
1958 {
1959 	struct snd_ctl_tlv header;
1960 	unsigned int __user *container;
1961 	unsigned int container_size;
1962 	struct snd_kcontrol *kctl;
1963 	struct snd_ctl_elem_id id;
1964 	struct snd_kcontrol_volatile *vd;
1965 
1966 	lockdep_assert_held(&file->card->controls_rwsem);
1967 
1968 	if (copy_from_user(&header, buf, sizeof(header)))
1969 		return -EFAULT;
1970 
1971 	/* In design of control core, numerical ID starts at 1. */
1972 	if (header.numid == 0)
1973 		return -EINVAL;
1974 
1975 	/* At least, container should include type and length fields.  */
1976 	if (header.length < sizeof(unsigned int) * 2)
1977 		return -EINVAL;
1978 	container_size = header.length;
1979 	container = buf->tlv;
1980 
1981 	kctl = snd_ctl_find_numid_locked(file->card, header.numid);
1982 	if (kctl == NULL)
1983 		return -ENOENT;
1984 
1985 	/* Calculate index of the element in this set. */
1986 	id = kctl->id;
1987 	snd_ctl_build_ioff(&id, kctl, header.numid - id.numid);
1988 	vd = &kctl->vd[snd_ctl_get_ioff(kctl, &id)];
1989 
1990 	if (vd->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) {
1991 		return call_tlv_handler(file, op_flag, kctl, &id, container,
1992 					container_size);
1993 	} else {
1994 		if (op_flag == SNDRV_CTL_TLV_OP_READ) {
1995 			return read_tlv_buf(kctl, &id, container,
1996 					    container_size);
1997 		}
1998 	}
1999 
2000 	/* Not supported. */
2001 	return -ENXIO;
2002 }
2003 
2004 static long snd_ctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
2005 {
2006 	struct snd_ctl_file *ctl;
2007 	struct snd_card *card;
2008 	struct snd_kctl_ioctl *p;
2009 	void __user *argp = (void __user *)arg;
2010 	int __user *ip = argp;
2011 	int err;
2012 
2013 	ctl = file->private_data;
2014 	card = ctl->card;
2015 	if (snd_BUG_ON(!card))
2016 		return -ENXIO;
2017 	switch (cmd) {
2018 	case SNDRV_CTL_IOCTL_PVERSION:
2019 		return put_user(SNDRV_CTL_VERSION, ip) ? -EFAULT : 0;
2020 	case SNDRV_CTL_IOCTL_CARD_INFO:
2021 		return snd_ctl_card_info(card, ctl, cmd, argp);
2022 	case SNDRV_CTL_IOCTL_ELEM_LIST:
2023 		return snd_ctl_elem_list_user(card, argp);
2024 	case SNDRV_CTL_IOCTL_ELEM_INFO:
2025 		return snd_ctl_elem_info_user(ctl, argp);
2026 	case SNDRV_CTL_IOCTL_ELEM_READ:
2027 		return snd_ctl_elem_read_user(card, argp);
2028 	case SNDRV_CTL_IOCTL_ELEM_WRITE:
2029 		return snd_ctl_elem_write_user(ctl, argp);
2030 	case SNDRV_CTL_IOCTL_ELEM_LOCK:
2031 		return snd_ctl_elem_lock(ctl, argp);
2032 	case SNDRV_CTL_IOCTL_ELEM_UNLOCK:
2033 		return snd_ctl_elem_unlock(ctl, argp);
2034 	case SNDRV_CTL_IOCTL_ELEM_ADD:
2035 		return snd_ctl_elem_add_user(ctl, argp, 0);
2036 	case SNDRV_CTL_IOCTL_ELEM_REPLACE:
2037 		return snd_ctl_elem_add_user(ctl, argp, 1);
2038 	case SNDRV_CTL_IOCTL_ELEM_REMOVE:
2039 		return snd_ctl_elem_remove(ctl, argp);
2040 	case SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS:
2041 		return snd_ctl_subscribe_events(ctl, ip);
2042 	case SNDRV_CTL_IOCTL_TLV_READ:
2043 		down_read(&ctl->card->controls_rwsem);
2044 		err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_READ);
2045 		up_read(&ctl->card->controls_rwsem);
2046 		return err;
2047 	case SNDRV_CTL_IOCTL_TLV_WRITE:
2048 		down_write(&ctl->card->controls_rwsem);
2049 		err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_WRITE);
2050 		up_write(&ctl->card->controls_rwsem);
2051 		return err;
2052 	case SNDRV_CTL_IOCTL_TLV_COMMAND:
2053 		down_write(&ctl->card->controls_rwsem);
2054 		err = snd_ctl_tlv_ioctl(ctl, argp, SNDRV_CTL_TLV_OP_CMD);
2055 		up_write(&ctl->card->controls_rwsem);
2056 		return err;
2057 	case SNDRV_CTL_IOCTL_POWER:
2058 		return -ENOPROTOOPT;
2059 	case SNDRV_CTL_IOCTL_POWER_STATE:
2060 		return put_user(SNDRV_CTL_POWER_D0, ip) ? -EFAULT : 0;
2061 	}
2062 	down_read(&snd_ioctl_rwsem);
2063 	list_for_each_entry(p, &snd_control_ioctls, list) {
2064 		err = p->fioctl(card, ctl, cmd, arg);
2065 		if (err != -ENOIOCTLCMD) {
2066 			up_read(&snd_ioctl_rwsem);
2067 			return err;
2068 		}
2069 	}
2070 	up_read(&snd_ioctl_rwsem);
2071 	dev_dbg(card->dev, "unknown ioctl = 0x%x\n", cmd);
2072 	return -ENOTTY;
2073 }
2074 
2075 static ssize_t snd_ctl_read(struct file *file, char __user *buffer,
2076 			    size_t count, loff_t * offset)
2077 {
2078 	struct snd_ctl_file *ctl;
2079 	int err = 0;
2080 	ssize_t result = 0;
2081 
2082 	ctl = file->private_data;
2083 	if (snd_BUG_ON(!ctl || !ctl->card))
2084 		return -ENXIO;
2085 	if (!ctl->subscribed)
2086 		return -EBADFD;
2087 	if (count < sizeof(struct snd_ctl_event))
2088 		return -EINVAL;
2089 	spin_lock_irq(&ctl->read_lock);
2090 	while (count >= sizeof(struct snd_ctl_event)) {
2091 		struct snd_ctl_event ev;
2092 		struct snd_kctl_event *kev;
2093 		while (list_empty(&ctl->events)) {
2094 			wait_queue_entry_t wait;
2095 			if ((file->f_flags & O_NONBLOCK) != 0 || result > 0) {
2096 				err = -EAGAIN;
2097 				goto __end_lock;
2098 			}
2099 			init_waitqueue_entry(&wait, current);
2100 			add_wait_queue(&ctl->change_sleep, &wait);
2101 			set_current_state(TASK_INTERRUPTIBLE);
2102 			spin_unlock_irq(&ctl->read_lock);
2103 			schedule();
2104 			remove_wait_queue(&ctl->change_sleep, &wait);
2105 			if (ctl->card->shutdown)
2106 				return -ENODEV;
2107 			if (signal_pending(current))
2108 				return -ERESTARTSYS;
2109 			spin_lock_irq(&ctl->read_lock);
2110 		}
2111 		kev = snd_kctl_event(ctl->events.next);
2112 		ev.type = SNDRV_CTL_EVENT_ELEM;
2113 		ev.data.elem.mask = kev->mask;
2114 		ev.data.elem.id = kev->id;
2115 		list_del(&kev->list);
2116 		spin_unlock_irq(&ctl->read_lock);
2117 		kfree(kev);
2118 		if (copy_to_user(buffer, &ev, sizeof(struct snd_ctl_event))) {
2119 			err = -EFAULT;
2120 			goto __end;
2121 		}
2122 		spin_lock_irq(&ctl->read_lock);
2123 		buffer += sizeof(struct snd_ctl_event);
2124 		count -= sizeof(struct snd_ctl_event);
2125 		result += sizeof(struct snd_ctl_event);
2126 	}
2127       __end_lock:
2128 	spin_unlock_irq(&ctl->read_lock);
2129       __end:
2130       	return result > 0 ? result : err;
2131 }
2132 
2133 static __poll_t snd_ctl_poll(struct file *file, poll_table * wait)
2134 {
2135 	__poll_t mask;
2136 	struct snd_ctl_file *ctl;
2137 
2138 	ctl = file->private_data;
2139 	if (!ctl->subscribed)
2140 		return 0;
2141 	poll_wait(file, &ctl->change_sleep, wait);
2142 
2143 	mask = 0;
2144 	if (!list_empty(&ctl->events))
2145 		mask |= EPOLLIN | EPOLLRDNORM;
2146 
2147 	return mask;
2148 }
2149 
2150 /*
2151  * register the device-specific control-ioctls.
2152  * called from each device manager like pcm.c, hwdep.c, etc.
2153  */
2154 static int _snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn, struct list_head *lists)
2155 {
2156 	struct snd_kctl_ioctl *pn;
2157 
2158 	pn = kzalloc(sizeof(struct snd_kctl_ioctl), GFP_KERNEL);
2159 	if (pn == NULL)
2160 		return -ENOMEM;
2161 	pn->fioctl = fcn;
2162 	down_write(&snd_ioctl_rwsem);
2163 	list_add_tail(&pn->list, lists);
2164 	up_write(&snd_ioctl_rwsem);
2165 	return 0;
2166 }
2167 
2168 /**
2169  * snd_ctl_register_ioctl - register the device-specific control-ioctls
2170  * @fcn: ioctl callback function
2171  *
2172  * called from each device manager like pcm.c, hwdep.c, etc.
2173  *
2174  * Return: zero if successful, or a negative error code
2175  */
2176 int snd_ctl_register_ioctl(snd_kctl_ioctl_func_t fcn)
2177 {
2178 	return _snd_ctl_register_ioctl(fcn, &snd_control_ioctls);
2179 }
2180 EXPORT_SYMBOL(snd_ctl_register_ioctl);
2181 
2182 #ifdef CONFIG_COMPAT
2183 /**
2184  * snd_ctl_register_ioctl_compat - register the device-specific 32bit compat
2185  * control-ioctls
2186  * @fcn: ioctl callback function
2187  *
2188  * Return: zero if successful, or a negative error code
2189  */
2190 int snd_ctl_register_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2191 {
2192 	return _snd_ctl_register_ioctl(fcn, &snd_control_compat_ioctls);
2193 }
2194 EXPORT_SYMBOL(snd_ctl_register_ioctl_compat);
2195 #endif
2196 
2197 /*
2198  * de-register the device-specific control-ioctls.
2199  */
2200 static int _snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn,
2201 				     struct list_head *lists)
2202 {
2203 	struct snd_kctl_ioctl *p;
2204 
2205 	if (snd_BUG_ON(!fcn))
2206 		return -EINVAL;
2207 	down_write(&snd_ioctl_rwsem);
2208 	list_for_each_entry(p, lists, list) {
2209 		if (p->fioctl == fcn) {
2210 			list_del(&p->list);
2211 			up_write(&snd_ioctl_rwsem);
2212 			kfree(p);
2213 			return 0;
2214 		}
2215 	}
2216 	up_write(&snd_ioctl_rwsem);
2217 	snd_BUG();
2218 	return -EINVAL;
2219 }
2220 
2221 /**
2222  * snd_ctl_unregister_ioctl - de-register the device-specific control-ioctls
2223  * @fcn: ioctl callback function to unregister
2224  *
2225  * Return: zero if successful, or a negative error code
2226  */
2227 int snd_ctl_unregister_ioctl(snd_kctl_ioctl_func_t fcn)
2228 {
2229 	return _snd_ctl_unregister_ioctl(fcn, &snd_control_ioctls);
2230 }
2231 EXPORT_SYMBOL(snd_ctl_unregister_ioctl);
2232 
2233 #ifdef CONFIG_COMPAT
2234 /**
2235  * snd_ctl_unregister_ioctl_compat - de-register the device-specific compat
2236  * 32bit control-ioctls
2237  * @fcn: ioctl callback function to unregister
2238  *
2239  * Return: zero if successful, or a negative error code
2240  */
2241 int snd_ctl_unregister_ioctl_compat(snd_kctl_ioctl_func_t fcn)
2242 {
2243 	return _snd_ctl_unregister_ioctl(fcn, &snd_control_compat_ioctls);
2244 }
2245 EXPORT_SYMBOL(snd_ctl_unregister_ioctl_compat);
2246 #endif
2247 
2248 static int snd_ctl_fasync(int fd, struct file * file, int on)
2249 {
2250 	struct snd_ctl_file *ctl;
2251 
2252 	ctl = file->private_data;
2253 	return snd_fasync_helper(fd, file, on, &ctl->fasync);
2254 }
2255 
2256 /* return the preferred subdevice number if already assigned;
2257  * otherwise return -1
2258  */
2259 int snd_ctl_get_preferred_subdevice(struct snd_card *card, int type)
2260 {
2261 	struct snd_ctl_file *kctl;
2262 	int subdevice = -1;
2263 	unsigned long flags;
2264 
2265 	read_lock_irqsave(&card->ctl_files_rwlock, flags);
2266 	list_for_each_entry(kctl, &card->ctl_files, list) {
2267 		if (kctl->pid == task_pid(current)) {
2268 			subdevice = kctl->preferred_subdevice[type];
2269 			if (subdevice != -1)
2270 				break;
2271 		}
2272 	}
2273 	read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
2274 	return subdevice;
2275 }
2276 EXPORT_SYMBOL_GPL(snd_ctl_get_preferred_subdevice);
2277 
2278 /*
2279  * ioctl32 compat
2280  */
2281 #ifdef CONFIG_COMPAT
2282 #include "control_compat.c"
2283 #else
2284 #define snd_ctl_ioctl_compat	NULL
2285 #endif
2286 
2287 /*
2288  * control layers (audio LED etc.)
2289  */
2290 
2291 /**
2292  * snd_ctl_request_layer - request to use the layer
2293  * @module_name: Name of the kernel module (NULL == build-in)
2294  *
2295  * Return: zero if successful, or an error code when the module cannot be loaded
2296  */
2297 int snd_ctl_request_layer(const char *module_name)
2298 {
2299 	struct snd_ctl_layer_ops *lops;
2300 
2301 	if (module_name == NULL)
2302 		return 0;
2303 	down_read(&snd_ctl_layer_rwsem);
2304 	for (lops = snd_ctl_layer; lops; lops = lops->next)
2305 		if (strcmp(lops->module_name, module_name) == 0)
2306 			break;
2307 	up_read(&snd_ctl_layer_rwsem);
2308 	if (lops)
2309 		return 0;
2310 	return request_module(module_name);
2311 }
2312 EXPORT_SYMBOL_GPL(snd_ctl_request_layer);
2313 
2314 /**
2315  * snd_ctl_register_layer - register new control layer
2316  * @lops: operation structure
2317  *
2318  * The new layer can track all control elements and do additional
2319  * operations on top (like audio LED handling).
2320  */
2321 void snd_ctl_register_layer(struct snd_ctl_layer_ops *lops)
2322 {
2323 	struct snd_card *card;
2324 	int card_number;
2325 
2326 	down_write(&snd_ctl_layer_rwsem);
2327 	lops->next = snd_ctl_layer;
2328 	snd_ctl_layer = lops;
2329 	up_write(&snd_ctl_layer_rwsem);
2330 	for (card_number = 0; card_number < SNDRV_CARDS; card_number++) {
2331 		card = snd_card_ref(card_number);
2332 		if (card) {
2333 			down_read(&card->controls_rwsem);
2334 			lops->lregister(card);
2335 			up_read(&card->controls_rwsem);
2336 			snd_card_unref(card);
2337 		}
2338 	}
2339 }
2340 EXPORT_SYMBOL_GPL(snd_ctl_register_layer);
2341 
2342 /**
2343  * snd_ctl_disconnect_layer - disconnect control layer
2344  * @lops: operation structure
2345  *
2346  * It is expected that the information about tracked cards
2347  * is freed before this call (the disconnect callback is
2348  * not called here).
2349  */
2350 void snd_ctl_disconnect_layer(struct snd_ctl_layer_ops *lops)
2351 {
2352 	struct snd_ctl_layer_ops *lops2, *prev_lops2;
2353 
2354 	down_write(&snd_ctl_layer_rwsem);
2355 	for (lops2 = snd_ctl_layer, prev_lops2 = NULL; lops2; lops2 = lops2->next) {
2356 		if (lops2 == lops) {
2357 			if (!prev_lops2)
2358 				snd_ctl_layer = lops->next;
2359 			else
2360 				prev_lops2->next = lops->next;
2361 			break;
2362 		}
2363 		prev_lops2 = lops2;
2364 	}
2365 	up_write(&snd_ctl_layer_rwsem);
2366 }
2367 EXPORT_SYMBOL_GPL(snd_ctl_disconnect_layer);
2368 
2369 /*
2370  *  INIT PART
2371  */
2372 
2373 static const struct file_operations snd_ctl_f_ops =
2374 {
2375 	.owner =	THIS_MODULE,
2376 	.read =		snd_ctl_read,
2377 	.open =		snd_ctl_open,
2378 	.release =	snd_ctl_release,
2379 	.llseek =	no_llseek,
2380 	.poll =		snd_ctl_poll,
2381 	.unlocked_ioctl =	snd_ctl_ioctl,
2382 	.compat_ioctl =	snd_ctl_ioctl_compat,
2383 	.fasync =	snd_ctl_fasync,
2384 };
2385 
2386 /*
2387  * registration of the control device
2388  */
2389 static int snd_ctl_dev_register(struct snd_device *device)
2390 {
2391 	struct snd_card *card = device->device_data;
2392 	struct snd_ctl_layer_ops *lops;
2393 	int err;
2394 
2395 	err = snd_register_device(SNDRV_DEVICE_TYPE_CONTROL, card, -1,
2396 				  &snd_ctl_f_ops, card, card->ctl_dev);
2397 	if (err < 0)
2398 		return err;
2399 	down_read(&card->controls_rwsem);
2400 	down_read(&snd_ctl_layer_rwsem);
2401 	for (lops = snd_ctl_layer; lops; lops = lops->next)
2402 		lops->lregister(card);
2403 	up_read(&snd_ctl_layer_rwsem);
2404 	up_read(&card->controls_rwsem);
2405 	return 0;
2406 }
2407 
2408 /*
2409  * disconnection of the control device
2410  */
2411 static int snd_ctl_dev_disconnect(struct snd_device *device)
2412 {
2413 	struct snd_card *card = device->device_data;
2414 	struct snd_ctl_file *ctl;
2415 	struct snd_ctl_layer_ops *lops;
2416 	unsigned long flags;
2417 
2418 	read_lock_irqsave(&card->ctl_files_rwlock, flags);
2419 	list_for_each_entry(ctl, &card->ctl_files, list) {
2420 		wake_up(&ctl->change_sleep);
2421 		snd_kill_fasync(ctl->fasync, SIGIO, POLL_ERR);
2422 	}
2423 	read_unlock_irqrestore(&card->ctl_files_rwlock, flags);
2424 
2425 	down_read(&card->controls_rwsem);
2426 	down_read(&snd_ctl_layer_rwsem);
2427 	for (lops = snd_ctl_layer; lops; lops = lops->next)
2428 		lops->ldisconnect(card);
2429 	up_read(&snd_ctl_layer_rwsem);
2430 	up_read(&card->controls_rwsem);
2431 
2432 	return snd_unregister_device(card->ctl_dev);
2433 }
2434 
2435 /*
2436  * free all controls
2437  */
2438 static int snd_ctl_dev_free(struct snd_device *device)
2439 {
2440 	struct snd_card *card = device->device_data;
2441 	struct snd_kcontrol *control;
2442 
2443 	down_write(&card->controls_rwsem);
2444 	while (!list_empty(&card->controls)) {
2445 		control = snd_kcontrol(card->controls.next);
2446 		__snd_ctl_remove(card, control, false);
2447 	}
2448 
2449 #ifdef CONFIG_SND_CTL_FAST_LOOKUP
2450 	xa_destroy(&card->ctl_numids);
2451 	xa_destroy(&card->ctl_hash);
2452 #endif
2453 	up_write(&card->controls_rwsem);
2454 	put_device(card->ctl_dev);
2455 	return 0;
2456 }
2457 
2458 /*
2459  * create control core:
2460  * called from init.c
2461  */
2462 int snd_ctl_create(struct snd_card *card)
2463 {
2464 	static const struct snd_device_ops ops = {
2465 		.dev_free = snd_ctl_dev_free,
2466 		.dev_register =	snd_ctl_dev_register,
2467 		.dev_disconnect = snd_ctl_dev_disconnect,
2468 	};
2469 	int err;
2470 
2471 	if (snd_BUG_ON(!card))
2472 		return -ENXIO;
2473 	if (snd_BUG_ON(card->number < 0 || card->number >= SNDRV_CARDS))
2474 		return -ENXIO;
2475 
2476 	err = snd_device_alloc(&card->ctl_dev, card);
2477 	if (err < 0)
2478 		return err;
2479 	dev_set_name(card->ctl_dev, "controlC%d", card->number);
2480 
2481 	err = snd_device_new(card, SNDRV_DEV_CONTROL, card, &ops);
2482 	if (err < 0)
2483 		put_device(card->ctl_dev);
2484 	return err;
2485 }
2486 
2487 /*
2488  * Frequently used control callbacks/helpers
2489  */
2490 
2491 /**
2492  * snd_ctl_boolean_mono_info - Helper function for a standard boolean info
2493  * callback with a mono channel
2494  * @kcontrol: the kcontrol instance
2495  * @uinfo: info to store
2496  *
2497  * This is a function that can be used as info callback for a standard
2498  * boolean control with a single mono channel.
2499  *
2500  * Return: Zero (always successful)
2501  */
2502 int snd_ctl_boolean_mono_info(struct snd_kcontrol *kcontrol,
2503 			      struct snd_ctl_elem_info *uinfo)
2504 {
2505 	uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2506 	uinfo->count = 1;
2507 	uinfo->value.integer.min = 0;
2508 	uinfo->value.integer.max = 1;
2509 	return 0;
2510 }
2511 EXPORT_SYMBOL(snd_ctl_boolean_mono_info);
2512 
2513 /**
2514  * snd_ctl_boolean_stereo_info - Helper function for a standard boolean info
2515  * callback with stereo two channels
2516  * @kcontrol: the kcontrol instance
2517  * @uinfo: info to store
2518  *
2519  * This is a function that can be used as info callback for a standard
2520  * boolean control with stereo two channels.
2521  *
2522  * Return: Zero (always successful)
2523  */
2524 int snd_ctl_boolean_stereo_info(struct snd_kcontrol *kcontrol,
2525 				struct snd_ctl_elem_info *uinfo)
2526 {
2527 	uinfo->type = SNDRV_CTL_ELEM_TYPE_BOOLEAN;
2528 	uinfo->count = 2;
2529 	uinfo->value.integer.min = 0;
2530 	uinfo->value.integer.max = 1;
2531 	return 0;
2532 }
2533 EXPORT_SYMBOL(snd_ctl_boolean_stereo_info);
2534 
2535 /**
2536  * snd_ctl_enum_info - fills the info structure for an enumerated control
2537  * @info: the structure to be filled
2538  * @channels: the number of the control's channels; often one
2539  * @items: the number of control values; also the size of @names
2540  * @names: an array containing the names of all control values
2541  *
2542  * Sets all required fields in @info to their appropriate values.
2543  * If the control's accessibility is not the default (readable and writable),
2544  * the caller has to fill @info->access.
2545  *
2546  * Return: Zero (always successful)
2547  */
2548 int snd_ctl_enum_info(struct snd_ctl_elem_info *info, unsigned int channels,
2549 		      unsigned int items, const char *const names[])
2550 {
2551 	info->type = SNDRV_CTL_ELEM_TYPE_ENUMERATED;
2552 	info->count = channels;
2553 	info->value.enumerated.items = items;
2554 	if (!items)
2555 		return 0;
2556 	if (info->value.enumerated.item >= items)
2557 		info->value.enumerated.item = items - 1;
2558 	WARN(strlen(names[info->value.enumerated.item]) >= sizeof(info->value.enumerated.name),
2559 	     "ALSA: too long item name '%s'\n",
2560 	     names[info->value.enumerated.item]);
2561 	strscpy(info->value.enumerated.name,
2562 		names[info->value.enumerated.item],
2563 		sizeof(info->value.enumerated.name));
2564 	return 0;
2565 }
2566 EXPORT_SYMBOL(snd_ctl_enum_info);
2567