Linux Kernel: Prevent Illegal Clock Reduction in Rockchip DWC MSHC MMc Driver
CVE-2025-71200 Published on February 14, 2026
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
When operating in HS200 or HS400 timing modes, reducing the clock frequency
below 52MHz will lead to link broken as the Rockchip DWC MSHC controller
requires maintaining a minimum clock of 52MHz in these modes.
Add a check to prevent illegal clock reduction through debugfs:
root@debian:/# echo 50000000 > /sys/kernel/debug/mmc0/clock
root@debian:/# [ 30.090146] mmc0: running CQE recovery
mmc0: cqhci: Failed to halt
mmc0: cqhci: spurious TCN for tag 0
WARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24
Modules linked in:
CPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT
Hardware name: Rockchip RK3588 EVB1 V10 Board (DT)
Workqueue: kblockd blk_mq_run_work_fn
pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : cqhci_irq+0x254/0x818
lr : cqhci_irq+0x254/0x818
...
Products Associated with CVE-2025-71200
stack.watch emails you whenever new vulnerabilities are published in Linux Kernel or Linux Kernel. Just hit a watch button to start following.
Affected Versions
Linux:- Version c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4 and below 59b8a1ca6df4db2ca250e9eeab74e2b0068d69e9 is affected.
- Version c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4 and below f2677d6e2bbc5ba2030825522d2afd0542b038a3 is affected.
- Version c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4 and below de0ad7156036a50982bcb75a080e4af284502be2 is affected.
- Version c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4 and below 36be050f21dea7a3a76dff5a031da6274e8ee468 is affected.
- Version c6f361cba51c536e7a6af31973c6a4e5d7e4e2e4 and below 3009738a855cf938bbfc9078bec725031ae623a4 is affected.
- Version 6.0 is affected.
- Before 6.0 is unaffected.
- Version 6.1.162, <= 6.1.* is unaffected.
- Version 6.6.122, <= 6.6.* is unaffected.
- Version 6.12.68, <= 6.12.* is unaffected.
- Version 6.18.8, <= 6.18.* is unaffected.
- Version 6.19, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.