]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
hwmon: (tps53679) Fix array access with zero-length block read
authorSanman Pradhan <psanman@juniper.net>
Sun, 29 Mar 2026 17:09:40 +0000 (17:09 +0000)
committerGuenter Roeck <linux@roeck-us.net>
Mon, 30 Mar 2026 02:04:16 +0000 (19:04 -0700)
i2c_smbus_read_block_data() can return 0, indicating a zero-length
read. When this happens, tps53679_identify_chip() accesses buf[ret - 1]
which is buf[-1], reading one byte before the buffer on the stack.

Fix by changing the check from "ret < 0" to "ret <= 0", treating a
zero-length read as an error (-EIO), which prevents the out-of-bounds
array access.

Also fix a typo in the adjacent comment: "if present" instead of
duplicate "if".

Fixes: 75ca1e5875fe ("hwmon: (pmbus/tps53679) Add support for TPS53685")
Signed-off-by: Sanman Pradhan <psanman@juniper.net>
Link: https://lore.kernel.org/r/20260329170925.34581-2-sanman.pradhan@hpe.com
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
drivers/hwmon/pmbus/tps53679.c

index ca2bfa25eb04cce1548cf97f11104445058b0239..3bca543817a6050ca787cbf5a38c9c19f3c2c118 100644 (file)
@@ -103,10 +103,10 @@ static int tps53679_identify_chip(struct i2c_client *client,
        }
 
        ret = i2c_smbus_read_block_data(client, PMBUS_IC_DEVICE_ID, buf);
-       if (ret < 0)
-               return ret;
+       if (ret <= 0)
+               return ret < 0 ? ret : -EIO;
 
-       /* Adjust length if null terminator if present */
+       /* Adjust length if null terminator is present */
        buf_len = (buf[ret - 1] != '\x00' ? ret : ret - 1);
 
        id_len = strlen(id);