In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perfeventoverflow() vs perf_removefromcontext() race Make sure that _perfeventoverflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perfeventexitevent() and friends that will go and free various things the overflow path expects to be present, like the BPF program.