It's called with NULL vap in several places, and the old
ath_beacon_config() had such protection. Without this check, the kernel
panics after association in managed mode.
git-svn-id: http://madwifi-project.org/svn/madwifi/trunk@3064
0192ed92-7a03-0410-a25b-
9323aeb14dbd
struct sk_buff *skb;
avp = ATH_VAP(vap);
- if (avp->av_bcbuf == NULL) {
+ if (avp == NULL || avp->av_bcbuf == NULL) {
DPRINTF(sc, ATH_DEBUG_ANY, "%s: avp=%p av_bcbuf=%p\n",
__func__, avp, avp != NULL ? avp->av_bcbuf : NULL);
return;