diff options
author | Gurpreet Ghai <gghai@codeaurora.org> | 2016-02-03 15:01:41 +0530 |
---|---|---|
committer | Gerrit - the friendly Code Review server <code-review@localhost> | 2016-02-16 05:33:08 -0800 |
commit | 0b4dec79909301c0f0a86f1c377af311c15b8f0a (patch) | |
tree | aaec24f6d840b3c703b5b3b42b2cf53c5a66449e /include | |
parent | af69c1e623a79119e9b8180d23671a661bdb1eab (diff) | |
download | android_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.tar.gz android_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.tar.bz2 android_system_bt-0b4dec79909301c0f0a86f1c377af311c15b8f0a.zip |
Bluetooth: Increasing the size of security service record and
Adding null check to avoid exception after l2cap psm assigned
With the number of supported services increased,
larger service record array is required. Smaller array
is resulting in out of record error causing l2cap
deregister.
When l2cap deregister happens, it cause socks to
cleanup, If another thread gets psm during this time
and tries to get sock by id, null is returned. This,
causes null pointer exception.
Change-Id: I2e77127262119cabf2c372f894427dcdf3350e80
CRs-Fixed: 968880
Diffstat (limited to 'include')
-rw-r--r-- | include/bt_target.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/include/bt_target.h b/include/bt_target.h index 029b0a691..b2b6d012d 100644 --- a/include/bt_target.h +++ b/include/bt_target.h @@ -530,7 +530,7 @@ /* The number of security records for services. */ #ifndef BTM_SEC_MAX_SERVICE_RECORDS -#define BTM_SEC_MAX_SERVICE_RECORDS 32 +#define BTM_SEC_MAX_SERVICE_RECORDS 64 #endif /* If True, force a retrieval of remote device name for each bond in case it's changed */ |