Quote from https://capsule8.com/blog/kernel-configuration-glossary/: > Significance: High > > Enable this if you want the use virtually-mapped kernel stacks with guard > pages. This causes kernel stack overflows to be caught immediately rather than > causing difficult-to-diagnose corruption.
https://patchwork.ipfire.org/patch/3174/
This has been fixed meanwhile: $ grep CONFIG_VMAP_STACK * kernel.config.aarch64-ipfire:CONFIG_VMAP_STACK=y kernel.config.riscv64-ipfire:CONFIG_VMAP_STACK=y kernel.config.x86_64-ipfire:CONFIG_VMAP_STACK=y