Customize kernel parameters during install
This guide covers advanced configuration options for customizing Xen and Linux kernel parameters during Edera installation.
Warning
These options are intended for advanced users. Misconfiguring hypervisor or kernel flags can reduce security or lead to system instability. Only use these options if you fully understand their impact on the kernel and the Edera hypervisor.
For background information, see Speculative execution mitigations
Before you begin
Make sure you meet the following requirements:
- You’re using the
protect-installer
container to install Edera. - You have Docker or another compatible container runtime installed.
- You understand the impact of disabling speculative execution mitigations. These flags are intended for testing or for use in trusted, single-tenant environments.
Recommended settings
There are two main ways to mitigate speculative side-channel attacks in Edera:
- XPTI/KPTI: Page-table isolation at the hypervisor and zone kernel levels.
- SMT control: Disabling simultaneous multithreading (SMT), also known as Hyper-Threading.
For optimal performance, we recommend disabling SMT and turning off XPTI/KPTI.
- On AMD platforms, XPTI and KPTI are not enabled by default, and SMT is generally safe to leave enabled.
How it works
The installer supports two environment variables:
EDERA_PROTECT_INSTALLER_XEN_CMDLINE_APPEND
: Appends flags to the Xen hypervisor boot parameters.EDERA_PROTECT_INSTALLER_LINUX_CMDLINE_APPEND
: Appends flags to the Linux kernel command line for the host.
These values are applied when the system reboots after installation.
Example: Disable speculative execution mitigations
To disable speculative execution mitigations at both the Xen and Linux levels, run the installer with the following options:
$CLIENT run \
--privileged \
--env 'TARGET_DIR=/host' \
--env 'EDERA_PROTECT_INSTALLER_SKIP_REBOOT=true' \
--env "EDERA_PROTECT_INSTALLER_XEN_CMDLINE_APPEND=\"spec-ctrl=no xpti=dom0=on,domU=off\"" \
--env "EDERA_PROTECT_INSTALLER_LINUX_CMDLINE_APPEND=\"mitigations=off nopti\"" \
--volume '/:/host' \
--volume '/root/override.install.sh:/root/install.sh' \
--volume "$HOME/.docker/config.json:/root/.docker/config.json" \
--pid host \
--net host \
${EDERA_REGISTRY}/edera-protect/staging/protect-installer:${TAG}
Flag descriptions
Flag | Description |
---|---|
spec-ctrl=no |
Disables Spectre/Meltdown mitigations in Xen |
xpti=dom0=on,domU=off |
Enables XPTI for dom0 only, reducing overhead for zones |
mitigations=off |
Disables most kernel-level mitigations |
nopti |
Disables Kernel Page Table Isolation (KPTI) in the zone kernel |
Verify kernel parameters
To confirm the flags applied to the host, run the following command from the host:
cat /proc/cmdline