Luis Correia <luis.f.correia@xxxxxxxxx> writes: Hi Luis; thanks for your replies... more below: > On Thu, Apr 30, 2009 at 14:41, Joerg Pommnitz <pommnitz@xxxxxxxxx> wrote: >> Reading the mail from Ivo >> (http://sourceforge.net/mailarchive/message.php?msg_id=200808082059.11968.IvDoorn%40gmail.com) I found that before I posted and found it discouraging, hence the question. >> I gather that the ACK in question is not from the peer but from the local >> hardware indicating that the frame was actually sent and not lost due to >> some local error. > > According to Ivo, we cannot be totally sure that the device has sent > the frame into the air, so no actual ACK is reported back to mac80211. > > The hostapd hack works, as long as the stations are not very far from > the AP, and thus not 'too many retries' need to be sent. So is the bug really in hostapd? > AFAIK, this is not optimal at all, so I don't go around and say 'it > works'. It may or may not work in your case. Since I would want to make an AP that generally worked, I don't think it would be enough. > If possible, test and report back your findings. I don't currently have a dongle. I'd be happy to buy one and test it (I really don't mind going through a fair number of patch/test/report back cycles, it's just writing code that's not currently something I can do), but not if there's a demarcation dispute as to who owns the bug! -- Jón Fairbairn Jon.Fairbairn@xxxxxxxxxxxx -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html