http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1151
------- Comment #5 from guy@xxxxxxxxxxxx 2006-10-10 07:21 GMT -------
You are assuming correctly that a routine that TShark calls (and that other
programs, such as tcpdump when run with the "-D" flag or without a "-i"
argument, also call) tries to open/bind to eth0 for every IP
address it finds on it.
This is not a feature. I've just checked in a change to libpcap to make it not
do so. You might want to download the libpcap source (one of the "current tar
file" tarballs; make sure inet.c is at least revision 1.70, as that's the first
version with my fix), build it, and then either install it and rebuild
Wireshark with it, or configure it with "./configure --prefix=/usr
--enable-ipv6" and build it with "make shared" and "make install-shared" (this
will replace the libpcap shared library).
The stack trace appears to be for a SIGABRT crash, not a SIGSEGV crash; did you
interrupt TShark with "kill -ABRT" (or "kill -6")?
Do you have a stack trace from the SIGSEGV you get when you type ^C?
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.