In the Linux kernel, the following vulnerability has been resolved: tracing: Add NULL pointer check to triggerdatafree() If triggerdataalloc() fails and returns NULL, eventhisttriggerparse() jumps to the outfree error path. While kfree() safely handles a NULL pointer, triggerdatafree() does not. This causes a NULL pointer dereference in triggerdatafree() when evaluating data->cmdops->setfilter. Fix the problem by adding a NULL pointer check to triggerdatafree(). The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y.