diff options
| author | Nikolay Borisov <nik.borisov@suse.com> | 2025-11-12 22:05:48 +0300 |
|---|---|---|
| committer | Dave Hansen <dave.hansen@linux.intel.com> | 2026-01-06 20:23:30 +0300 |
| commit | f8c7600d468bdb6e44ed3b3247c6e53f5be5d8de (patch) | |
| tree | 2ffd49d2a0ccb0c5506fa8d3518ff5603793bb6f | |
| parent | 18fe1f58623f8c1fddd21a3d044d668ba9d8b0a9 (diff) | |
| download | linux-f8c7600d468bdb6e44ed3b3247c6e53f5be5d8de.tar.xz | |
x86/tsx: Set default TSX mode to auto
At SUSE we've been releasing our kernels with TSX enabled for the past 6
years and some customers have started to rely on it. Furthermore, the last
known vulnerability concerning TSX was TAA (CVE-2019-11135) and a
significant amount time has passed since then without anyone reporting any
issues. Intel has released numerous processors which do not have the
TAA vulnerability (Cooper/Ice Lake, Sapphire/Emerald/Granite Rappids)
yet TSX remains being disabled by default.
The main aim of this patch is to reduce the divergence between SUSE's
configuration and the upstream by switching the default TSX mode to
auto. I believe this strikes the right balance between keeping it
enabled where appropriate (i.e every machine which doesn't contain the
TAA vulnerability) and disabling it preventively.
Signed-off-by: Nikolay Borisov <nik.borisov@suse.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Link: https://patch.msgid.link/20251112190548.750746-1-nik.borisov@suse.com
| -rw-r--r-- | arch/x86/Kconfig | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 80527299f859..f1c98a973fcd 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1816,7 +1816,7 @@ config ARCH_PKEY_BITS choice prompt "TSX enable mode" depends on CPU_SUP_INTEL - default X86_INTEL_TSX_MODE_OFF + default X86_INTEL_TSX_MODE_AUTO help Intel's TSX (Transactional Synchronization Extensions) feature allows to optimize locking protocols through lock elision which |
