In the Linux kernel, the following vulnerability has been resolved: bpf: Guard against accessing NULL ptregs in bpfgettaskstack() taskptregs() can return NULL on powerpc for kernel threads. This is then used in __bpfgetstack() to check for user mode, resulting in a kernel oops. Guard against this by checking return value of taskptregs() before trying to obtain the call chain.