In the Linux kernel, the following vulnerability has been resolved: tcp: tcpmakesynack() can be called from process context tcprtxsynack() now could be called in process context as explained in 0a375c822497 ("tcp: tcprtxsynack() can be called from process context"). tcprtxsynack() might call tcpmakesynack(), which will touch per-CPU variables with preemption enabled. This causes the following BUG: BUG: using thiscpuadd() in preemptible [00000000] code: ThriftIO1/5464 caller is tcpmakesynack+0x841/0xac0 Call Trace: <TASK> dumpstacklvl+0x10d/0x1a0 checkpreemptiondisabled+0x104/0x110 tcpmakesynack+0x841/0xac0 tcpv6sendsynack+0x5c/0x450 tcprtxsynack+0xeb/0x1f0 inetrtxsynack+0x34/0x60 tcpcheckreq+0x3af/0x9e0 tcprcvstateprocess+0x59b/0x2030 tcpv6dorcv+0x5f5/0x700 releasesock+0x3a/0xf0 tcpsendmsg+0x33/0x40 syssendmsg+0x2f2/0x490 _syssendmsg+0x184/0x230 dosyscall64+0x3d/0x90 Avoid calling _TCPINCSTATS() with will touch per-cpu variables. Use TCPINCSTATS() which is safe to be called from context switch.