(2.4.0-test11, but probably every version)
The name member of the net_device struct is fixed to IFNAMSIZ (16) bytes,
and is accessed using strcpy, strcmp and friends all over the place, which
suggests that the last byte of the name must be a null character. This
must be verified when the name is set. I haven't looked very hard, but
this seems not to be the case.
It is, to my knowledge, not possible for a normal user to create/name a
device, so only root can cause the corruption. Bad enough, but not
As I see it, one (or both) of the following must be done:
1. Find all places where the device name is set and use length checking
functions such as strncpy.
2. Find all places where a device name is used, and use special methods to
copy and add a null character, or use strncpy, strncmp, etc.
...where number one is probably the only realistic solution.
I discovered this when I tried to create a tunnel using more than
IFNAMSIZ-1 (15) characters. It's quite hard to remove that tunnel. I'll go
for the Windows solution and reboot. Sigh!
Btw, does anyone know of a C function that works like strncpy, but does
add a terminating null character, event if the string does not fit, ro
does one have to do str=0 first, and then strncpy(str,src,4)?