Skip to content

Commit f8c7600

Browse files
Nikolay Borisovhansendc
authored andcommitted
x86/tsx: Set default TSX mode to auto
At SUSE we've been releasing our kernels with TSX enabled for the past 6 years and some customers have started to rely on it. Furthermore, the last known vulnerability concerning TSX was TAA (CVE-2019-11135) and a significant amount time has passed since then without anyone reporting any issues. Intel has released numerous processors which do not have the TAA vulnerability (Cooper/Ice Lake, Sapphire/Emerald/Granite Rappids) yet TSX remains being disabled by default. The main aim of this patch is to reduce the divergence between SUSE's configuration and the upstream by switching the default TSX mode to auto. I believe this strikes the right balance between keeping it enabled where appropriate (i.e every machine which doesn't contain the TAA vulnerability) and disabling it preventively. Signed-off-by: Nikolay Borisov <nik.borisov@suse.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Link: https://patch.msgid.link/20251112190548.750746-1-nik.borisov@suse.com
1 parent 18fe1f5 commit f8c7600

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

arch/x86/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1816,7 +1816,7 @@ config ARCH_PKEY_BITS
18161816
choice
18171817
prompt "TSX enable mode"
18181818
depends on CPU_SUP_INTEL
1819-
default X86_INTEL_TSX_MODE_OFF
1819+
default X86_INTEL_TSX_MODE_AUTO
18201820
help
18211821
Intel's TSX (Transactional Synchronization Extensions) feature
18221822
allows to optimize locking protocols through lock elision which

0 commit comments

Comments
 (0)