Bug 12368

Summary: CONFIG_VMAP_STACK is enabled on aarch64 and x86_64 only
Product: IPFire Reporter: Peter Müller <peter.mueller>
Component: ---Assignee: Peter Müller <peter.mueller>
Status: CLOSED FIXED QA Contact:
Severity: Security    
Priority: Will affect an average number of users CC: peter.mueller
Version: 2   
Hardware: unspecified   
OS: All   
Bug Depends on:    
Bug Blocks: 12361    

Description Peter Müller 2020-04-14 15:27:57 UTC
Quote from https://capsule8.com/blog/kernel-configuration-glossary/:

> Significance: High
> 
> Enable this if you want the use virtually-mapped kernel stacks with guard
> pages. This causes kernel stack overflows to be caught immediately rather than
> causing difficult-to-diagnose corruption.
Comment 1 Peter Müller 2020-06-09 17:27:29 UTC
https://patchwork.ipfire.org/patch/3174/
Comment 2 Peter Müller 2022-04-06 17:25:56 UTC
This has been fixed meanwhile:

$ grep CONFIG_VMAP_STACK *
kernel.config.aarch64-ipfire:CONFIG_VMAP_STACK=y
kernel.config.riscv64-ipfire:CONFIG_VMAP_STACK=y
kernel.config.x86_64-ipfire:CONFIG_VMAP_STACK=y