On Wed, Jan 03, 2018 at 03:55:23PM +0000, foobar wrote: > Luc, thank you for addressing this issue so quickly! > > On Tue, 2 Jan 2018 16:11:16 +0100 > Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx> wrote: > > > Protect the dereference of null base_type. > > I wonder, maybe it would be better not to add this protection so future similar bugs can be found ? When there have been a previous error, a warning is issued and often (but depending on the exact nature of the problem) the returned pointer is null. So it's kinda normal to have such pointer and we need to test them before continuing. So, I really think the patch here is needed. -- Luc -- To unsubscribe from this list: send the line "unsubscribe linux-sparse" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html