Hi Minho, * Minho Ban <mhban@xxxxxxxxxxx> [2012-05-21 09:58:19 +0900]: > If l2cap_chan_send is called will null conn it will cause kernel Oops. > This patch checks if conn is valid before entering l2cap_chan_send. chan->conn should be always valid, and if not we have a bug somewhere else in the code and not in l2cap_chan_send(). It could be a locking problem maybe. Also check if you can reproduce this with latest bluetooth-next. Gustavo -- To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html