From: Ekansh Gupta <quic_ekangupt@xxxxxxxxxxx> commit bfb6b07d2a30ffe98864d8cfc31fc00470063025 upstream. When user is requesting for DSP capability, the process pd type is getting updated to USER_PD which is incorrect as DSP will assume the process which is making the request is a user PD and this will never get updated back to the original value. The actual PD type should not be updated for capability request and it should be serviced by the respective PD on DSP side. Don't change process's PD type for DSP capability request. Fixes: 6c16fd8bdd40 ("misc: fastrpc: Add support to get DSP capabilities") Cc: stable <stable@xxxxxxxxxx> Signed-off-by: Ekansh Gupta <quic_ekangupt@xxxxxxxxxxx> Reviewed-by: Caleb Connolly <caleb.connolly@xxxxxxxxxx> Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@xxxxxxxxxx> Reviewed-by: Dmitry Baryshkov <dmitry.baryshkov@xxxxxxxxxx> Link: https://lore.kernel.org/r/20240628114501.14310-4-srinivas.kandagatla@xxxxxxxxxx Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- drivers/misc/fastrpc.c | 1 - 1 file changed, 1 deletion(-) --- a/drivers/misc/fastrpc.c +++ b/drivers/misc/fastrpc.c @@ -1707,7 +1707,6 @@ static int fastrpc_get_info_from_dsp(str args[1].ptr = (u64)(uintptr_t)&dsp_attr_buf[1]; args[1].length = dsp_attr_buf_len * sizeof(u32); args[1].fd = -1; - fl->pd = USER_PD; return fastrpc_internal_invoke(fl, true, FASTRPC_DSP_UTILITIES_HANDLE, FASTRPC_SCALARS(0, 1, 1), args); Patches currently in stable-queue which might be from quic_ekangupt@xxxxxxxxxxx are queue-6.9/misc-fastrpc-fix-memory-leak-in-audio-daemon-attach-operation.patch queue-6.9/misc-fastrpc-avoid-updating-pd-type-for-capability-request.patch queue-6.9/misc-fastrpc-restrict-untrusted-app-to-attach-to-privileged-pd.patch queue-6.9/misc-fastrpc-fix-dsp-capabilities-request.patch queue-6.9/misc-fastrpc-fix-ownership-reassignment-of-remote-heap.patch queue-6.9/misc-fastrpc-copy-the-complete-capability-structure-to-user.patch