All --
Installed the Official Slackware 5.15.63 Happy Birthday Kernel and vim upgrades and all is well.
I am still checking all my personal .vimrc config files but so far so good
Thanks $1-zillion to Pat and the Team !
-- kjh
I am running the Slackware 5.15.63 Generic Kernel with the ucode for my processor prepended to my initrd.
Code:
uname -msrpn: Linux kjhlt7.kjh.home 5.15.63 x86_64 11th Gen Intel(R) Core(TM) i9-11900K @ 3.50GHz
firmware ...: kernel-firmware-20220815_8413c63-noarch-1
NVidia Blob : NVIDIA-Linux-x86_64-515.65.01.run
VMWare Blob : VMware-Workstation-Full-16.2.3-19376536.x86_64.bundle
No new CPU Vulenrabilities nor Mitigations reported.
Code:
Fri Aug 26 06:01:36 CDT 2022
Linux kjhlt7.kjh.home 5.15.63 #1 SMP PREEMPT Thu Aug 25 20:19:19 CDT 2022 x86_64 11th Gen Intel(R) Core(TM) i9-11900K @ 3.50GHz GenuineIntel GNU/Linux
dmesg
microcode: microcode updated early to revision 0x54, date = 2022-03-17
Linux version 5.15.63 (root@z-mp.slackware.lan) (gcc (GCC) 11.2.0, GNU ld version 2.37-slack15) #1 SMP PREEMPT Thu Aug 25 20:19:19 CDT 2022
Command line: BOOT_IMAGE=/boot/vmlinuz-generic-5.15.63 root=UUID=6c71cd77-2463-408e-a992-ad6064b0651b ro nvidia-drm.modeset=1
DMI: Notebook X170KM-G/X170KM-G, BIOS 1.07.06LS1 01/11/2020
cpuinfo
CPU Name: 11th Gen Intel(R) Core(TM) i9-11900K @ 3.50GHz
Microcode: 0x54
CPU FMS: 06-a7-01
UCode Pkg: intel-microcode-20220809-noarch-1_SBo_kjh ( updated Aug 13 17:02 )
UCode File: /lib/firmware/intel-ucode/06-a7-01 ( updated Aug 13 17:01 )
UCode Info: 001/001: sig 0x000a0671, pf_mask 0x02, 2022-03-17, rev 0x0054, size 103424
CPU bugs: spectre_v1, spectre_v2, spec_store_bypass, swapgs, mmio_stale_data, retbleed, eibrs_pbrsb
vulnerability and mitigation files in /sys/devices/system/cpu/vulnerabilities/
itlb_multihit: Not affected
l1tf: Not affected
mds: Not affected
meltdown: Not affected
mmio_stale_data: Mitigation: Clear CPU buffers; SMT vulnerable
retbleed: Mitigation: Enhanced IBRS
spec_store_bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
spectre_v1: Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2: Mitigation: Enhanced IBRS, IBPB: conditional, RSB filling, PBRSB-eIBRS: SW sequence
srbds: Not affected
tsx_async_abort: Not affected