BUG: using smp_processor_id() in preemptible [00000000] code: Xorg/1157 caller is kas_spin_lock+0x1b/0x100 [fglrx] Pid: 1157, comm: Xorg Tainted: P 2.6.32-19-preempt #28-Ubuntu Call Trace: [] debug_smp_processor_id+0xd2/0xf0 [] kas_spin_lock+0x1b/0x100 [fglrx] [] KAS_InterlockedList_RemoveAtHead+0x5f/0x180 [fglrx] [] MCIL_InterlockedList+0x10d/0x2a0 [fglrx] [] ? FIFO_Queue_RemoveFromHead+0x40/0x60 [fglrx] [] ? AllocateCallbackEntry+0x21/0x50 [fglrx] [] ? RegisterIRQClient+0xb7/0x200 [fglrx] [] ? IsR6XXDerivatives+0x1b/0x70 [fglrx] [] ? Is_IRQSource_Valid+0x8e/0xb0 [fglrx] [] ? IRQMGR_Access+0xee/0x190 [fglrx] [] ? fireglAsyncioIntHandler+0x0/0x70 [fglrx] [] ? fireglAsyncioIntEnableMsgHandler+0x105/0x1e0 [fglrx] [] ? default_spin_lock_flags+0x9/0x10 [] ? fireglAsyncioIntHandler+0x0/0x70 [fglrx] [] ? getNextMessage+0xab/0x140 [fglrx] [] ? asyncIOHandler+0x74/0xd0 [fglrx] [] ? firegl_asyncio_write+0x198/0x260 [fglrx] [] ? ip_firegl_write+0x60/0xa0 [fglrx] [] ? vfs_write+0xb8/0x1a0 [] ? sys_rt_sigreturn+0x22c/0x240 [] ? sys_write+0x51/0x90 [] ? system_call_fastpath+0x16/0x1b