In the Linux kernel, the following vulnerability has been resolved:
pktgen: use cpusreadlock() in pgnetinit()
I have seen the WARNON(smpprocessorid() != cpu) firing in pktgenthread_worker() during tests.
We must use cpusreadlock()/cpusreadunlock() around the foreachonline_cpu(cpu) loop.
While we are at it use WARNONONCE() to avoid a possible syslog flood.