summaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorGurpreet Ghai <gghai@codeaurora.org>2016-02-03 15:01:41 +0530
committerGerrit - the friendly Code Review server <code-review@localhost>2016-02-16 05:33:08 -0800
commit0b4dec79909301c0f0a86f1c377af311c15b8f0a (patch)
treeaaec24f6d840b3c703b5b3b42b2cf53c5a66449e /include
parentaf69c1e623a79119e9b8180d23671a661bdb1eab (diff)
downloadandroid_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.tar.gz
android_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.tar.bz2
android_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.zip
Bluetooth: Increasing the size of security service record and
Adding null check to avoid exception after l2cap psm assigned With the number of supported services increased, larger service record array is required. Smaller array is resulting in out of record error causing l2cap deregister. When l2cap deregister happens, it cause socks to cleanup, If another thread gets psm during this time and tries to get sock by id, null is returned. This, causes null pointer exception. Change-Id: I2e77127262119cabf2c372f894427dcdf3350e80 CRs-Fixed: 968880
Diffstat (limited to 'include')
-rw-r--r--include/bt_target.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/include/bt_target.h b/include/bt_target.h
index 029b0a691..b2b6d012d 100644
--- a/include/bt_target.h
+++ b/include/bt_target.h
@@ -530,7 +530,7 @@
/* The number of security records for services. */
#ifndef BTM_SEC_MAX_SERVICE_RECORDS
-#define BTM_SEC_MAX_SERVICE_RECORDS 32
+#define BTM_SEC_MAX_SERVICE_RECORDS 64
#endif
/* If True, force a retrieval of remote device name for each bond in case it's changed */