diff options
| author | Chun-Yeow Yeoh <yeohchunyeow@gmail.com> | 2015-04-17 20:30:02 +0300 |
|---|---|---|
| committer | Johannes Berg <johannes.berg@intel.com> | 2015-04-24 13:22:36 +0300 |
| commit | 4292504044a4fd4c5d9155dcb5c7b09ed6cbf611 (patch) | |
| tree | 59f1b484852a3ca32dae76175da37f9fc9022790 /tools/perf/scripts/python/syscall-counts.py | |
| parent | 5a490510ba5fce8a10746525357a297f8f076bb1 (diff) | |
| download | linux-4292504044a4fd4c5d9155dcb5c7b09ed6cbf611.tar.xz | |
cfg80211: allow the plink state blocking for user managed mesh
wpa_supplicant or authsae handles the mesh peering in user
space, but the plink state is still managed in kernel space.
Currently, there is no implementation by wpa_supplicant or
authsae to block the plink state after it is set to ESTAB.
By applying this patch, we can use the "iw mesh0 station set
<MAC address> plink_action block" to block the peer mesh STA.
This is useful for experimenting purposes.
Signed-off-by: Chun-Yeow Yeoh <yeohchunyeow@gmail.com>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions
