From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Issue: After calling , the NAPIF_STATE_SCHED flag may be cleared, allowing another CPU to start the NAPI thread and access the per-CQ variable . If another thread (e.g., one set by ) sets this variable to a value greater than or equal to the budget, the thread may continue running, potentially causing memory corruption and system crashes. - Solution: Before calling , save the per-CQ work-done variable into a local variable to prevent concurrent threads from corrupting it after the call. 2. Fix Details: - Code Changes: New macros and functions were added to the files and . - Macro Definitions: - - - - Function Modifications: - The function now includes a check for the variable. - The function now includes a check for the variable. 3. Patch Submission Information: - Author: Haiyang Zhang - Commit Time: 2022-12-02 11:43:10 -0800 - Committer: Paolo Abeni - Commit Time: 2022-12-06 11:21:34 +0100 - Patch Description: Fixes concurrency issue with the NAPI work-done variable to ensure reliability of NAPI support. - Patch Link: https://lore.kernel.org/r/1670010190-28595-1.git-send-email-haiyangz@microsoft.com 4. Patch Status: - Status: Merged into the master branch. This information indicates that the patch resolves a concurrency issue with the NAPI work-done variable, ensuring the reliability of NAPI support.