In the Linux kernel, the following vulnerability has been resolved:
bpf: Guard against accessing NULL ptregs in bpfgettaskstack()
taskptregs() can return NULL on powerpc for kernel threads. This is then used in _bpfgetstack() to check for user mode, resulting in a kernel oops. Guard against this by checking return value of taskpt_regs() before trying to obtain the call chain.