diff options
author | Chun-Yeow Yeoh <[email protected]> | 2015-04-18 01:30:02 +0800 |
---|---|---|
committer | Johannes Berg <[email protected]> | 2015-04-24 12:22:36 +0200 |
commit | 4292504044a4fd4c5d9155dcb5c7b09ed6cbf611 (patch) | |
tree | 59f1b484852a3ca32dae76175da37f9fc9022790 /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | 5a490510ba5fce8a10746525357a297f8f076bb1 (diff) |
cfg80211: allow the plink state blocking for user managed mesh
wpa_supplicant or authsae handles the mesh peering in user
space, but the plink state is still managed in kernel space.
Currently, there is no implementation by wpa_supplicant or
authsae to block the plink state after it is set to ESTAB.
By applying this patch, we can use the "iw mesh0 station set
<MAC address> plink_action block" to block the peer mesh STA.
This is useful for experimenting purposes.
Signed-off-by: Chun-Yeow Yeoh <[email protected]>
Signed-off-by: Johannes Berg <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions