In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpusreadlock() in pgnetinit() I have seen the WARNON(smpprocessorid() != cpu) firing in pktgenthreadworker() during tests. We must use cpusreadlock()/cpusreadunlock() around the foreachonlinecpu(cpu) loop. While we are at it use WARNONONCE() to avoid a possible syslog flood.