diff options
author | Nick Pelly <npelly@google.com> | 2010-04-08 16:23:32 -0700 |
---|---|---|
committer | Brian Swetland <swetland@google.com> | 2011-03-29 13:57:50 -0700 |
commit | c558cca242139968e07d91e1858df6318cab98af (patch) | |
tree | 652471cd68e70e911b3eb785f018ff4f599dc34e /net | |
parent | 56f853f2f71593c7ee920ccd653c96c4070940c4 (diff) |
Bluetooth: Hack: Don't dereference null pointer.
This avoids the S305 panic during incoming connection.
S305 sends PSM 25 L2CAP connection request before the L2CAP info response.
When we receive that info response we crash on null pointer here.
Bug: 2127637
Change-Id: Ib637516251f46fa9a9c87ac015dc2f27df5a27fd
Signed-off-by: Nick Pelly <npelly@google.com>
Diffstat (limited to 'net')
-rw-r--r-- | net/bluetooth/l2cap.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/net/bluetooth/l2cap.c b/net/bluetooth/l2cap.c index bef0169d8726..ae1e1dcc88f3 100644 --- a/net/bluetooth/l2cap.c +++ b/net/bluetooth/l2cap.c @@ -589,7 +589,8 @@ static void l2cap_conn_start(struct l2cap_conn *conn) struct sock *parent = bt_sk(sk)->parent; rsp.result = cpu_to_le16(L2CAP_CR_PEND); rsp.status = cpu_to_le16(L2CAP_CS_AUTHOR_PEND); - parent->sk_data_ready(parent, 0); + if (parent) + parent->sk_data_ready(parent, 0); } else { sk->sk_state = BT_CONFIG; |