Verified Environments
To use KAIL smoothly and securely, ensure that your environment is one of the verified environments.
Component |
OS |
CPU |
Compiler |
Build Tool |
Python Interpreter |
|---|---|---|---|---|---|
KDNN |
openEuler 22.03 LTS SP3 |
Kunpeng 920 7270Z/7280Z processors |
GCC 10.3.1 |
CMake 3.22.0 |
Python 3.9.21 |
openEuler 22.03 LTS SP4 The kernel version is later than 5.10.0-228.0.0.127. |
New Kunpeng 920 processor model |
GCC 12.3.1/BiSheng Compiler 4.2.0 |
CMake 3.22.0 |
Python 3.9.21 |
|
KDNN_EXT |
openEuler 22.03 LTS SP3 |
Kunpeng 920 processor |
GCC 10.3.1 |
CMake 3.22.0 |
Python 3.9.20 |
- KDNN supports the Kunpeng 920 7270Z/7280Z processors and new Kunpeng 920 processor model. Using other processors may cause undefined results.
- KAIL is a low-level primitive library whose computational workflow manages memory read/write and allocation operations. It does not provide or distribute an operating system (OS). Users are responsible for OS installation and its subsequent security. Users must harden the OS based on their specific application scenarios, which includes disabling or removing unnecessary applications.
- To prevent buffer overflow attacks, you are advised to use the address space layout randomization (ASLR) technology to randomize the layout of linear areas such as the heap, stack, and shared library mapping to make it more difficult for attackers to predict target addresses and locate code. This technology can be applied to heaps, stacks, and memory mapping areas (mmap base addresses, shared libraries, and vDSO pages).
Enabling method: echo 2 >/proc/sys/kernel/randomize_va_space
Parent topic: Installing and Configuring the Environment