In the Linux kernel, the following vulnerability has been resolved: bpf: Guard against accessing NULL ptregs in bpfgettaskstack() taskptregs() can return NULL on powerpc for kernel threads. This is then used in _bpfgetstack() to check for user mode, resulting in a kernel oops. Guard against this by checking return value of taskpt_regs() before trying to obtain the call chain.