From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: During iteration over the xarray in the poll routine, lock protection is missing. Even when holding an RCU read lock, only the radix tree slots are guaranteed to be locked, while the data structures stored in those slots (such as ) are not protected. Since the poll routine iterates over the radix tree and references , the RCU read lock provides insufficient protection in this context. A spinlock is required to ensure proper synchronization. 2. Fix Details: - Fix Commit ID: - Fix Description: 3. Author: - Committer: Jingbo Xu - Commit Time: 2024-06-28 14:29:30 +0800 4. Reviewers: - Reviewer: Jia Zhu - Reviewer: Gao Xiang - Reviewer: Christian Brauner - Reviewer: Sasha Levin 5. Code Changes: - File: - Changes: Added lock protection for the xarray to ensure the radix tree remains locked during iteration. 6. Links: - Upstream Commit: This information indicates that the vulnerability relates to insufficient lock protection in the module when iterating over the xarray during the poll routine. The issue has been fixed and reviewed by multiple reviewers.