In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix smpprocessorid() call trace for preemptible kernels Correct kernel call trace when calling smpprocessorid() when called in preemptible kernels by using rawsmpprocessorid(). smpprocessorid() checks to see if preemption is disabled and if not, issue an error message followed by a call to dumpstack(). Brief example of call trace: kernel: checkpreemptiondisabled: 436 callbacks suppressed kernel: BUG: using smpprocessorid() in preemptible [00000000] code: kworker/u1025:0/2354 kernel: caller is pqiscsiqueuecommand+0x183/0x310 [smartpqi] kernel: CPU: 129 PID: 2354 Comm: kworker/u1025:0 kernel: ... kernel: Workqueue: writeback wbworkfn (flush-253:0) kernel: Call Trace: kernel: <TASK> kernel: dumpstacklvl+0x34/0x48 kernel: checkpreemptiondisabled+0xdd/0xe0 kernel: pqiscsiqueue_command+0x183/0x310 [smartpqi] kernel: ...