summaryrefslogtreecommitdiff
path: root/include
diff options
context:
space:
mode:
authorNikolay Borisov <nik.borisov@suse.com>2025-11-12 21:05:48 +0200
committerDave Hansen <dave.hansen@linux.intel.com>2026-01-06 09:23:30 -0800
commitf8c7600d468bdb6e44ed3b3247c6e53f5be5d8de (patch)
tree2ffd49d2a0ccb0c5506fa8d3518ff5603793bb6f /include
parent18fe1f58623f8c1fddd21a3d044d668ba9d8b0a9 (diff)
x86/tsx: Set default TSX mode to auto
At SUSE we've been releasing our kernels with TSX enabled for the past 6 years and some customers have started to rely on it. Furthermore, the last known vulnerability concerning TSX was TAA (CVE-2019-11135) and a significant amount time has passed since then without anyone reporting any issues. Intel has released numerous processors which do not have the TAA vulnerability (Cooper/Ice Lake, Sapphire/Emerald/Granite Rappids) yet TSX remains being disabled by default. The main aim of this patch is to reduce the divergence between SUSE's configuration and the upstream by switching the default TSX mode to auto. I believe this strikes the right balance between keeping it enabled where appropriate (i.e every machine which doesn't contain the TAA vulnerability) and disabling it preventively. Signed-off-by: Nikolay Borisov <nik.borisov@suse.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Link: https://patch.msgid.link/20251112190548.750746-1-nik.borisov@suse.com
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions