From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: In the poll routine, when traversing the xarray, there is a lack of lock protection. Even though the RCU read lock is held, only the radix tree slot is guaranteed to be locked, while the data structures stored in the slot (e.g., ) are not protected. The poll routine traverses the radix tree and references , so the RCU read lock is insufficient in this case; a spinlock is required. 2. Fix Information: - Fix ID: - Fix Description: - Author: Jingbo Xu - Committer: Christian Brauner - Link: 3. Code Changes: - File: - Changes: - Added lock protection: when traversing the xarray, a spinlock is now used in the poll routine to ensure correctness. 4. Change History: - Commit Time: 2024-06-28 14:29:30 +0800 - Committer: Jingbo Xu - Commit Time: 2024-07-03 10:36:16 +0200 - Committer: Christian Brauner This information indicates that the vulnerability relates to the cachefiles module lacking proper lock protection in the poll routine. The issue has been fixed by introducing a spinlock to ensure correct behavior during xarray traversal.