Rate This Document
Findability
Accuracy
Completeness
Readability

Verified Environments

Table 1 Verified environments for KML

OS

CPU Type

Compiler

openEuler 22.03 LTS SP2

Huawei Kunpeng 920 series processor

GCC 10.3.1

Huawei Kunpeng 920 series processor

BiSheng Compiler 3.0.0

openEuler 22.03 LTS SP1

Huawei Kunpeng 920 series processor

GCC 10.3.1

Huawei Kunpeng 920 series processor

BiSheng Compiler 3.0.0

openEuler 20.03 LTS SP1

Huawei Kunpeng 920 series processor

GCC 7.3.0

Huawei Kunpeng 920 series processor

BiSheng Compiler 2.5.0

Kylin V10 SP3

Huawei Kunpeng 920 series processor

BiSheng Compiler 3.0.0

Ubuntu 18.04

Huawei Kunpeng 920 series processor

GCC 7.3.0

CentOS 7.6

Huawei Kunpeng 920 series processor

GCC for openEuler 1.3.2

CentOS 8.1

Huawei Kunpeng 920 series processor

GCC 9.3.0

  • KML supports only Kunpeng 920 processors and will exit unexpectedly for any other processors. If KML is loaded in dynamic mode, the program exits when KML is linked and an undefined result will be generated.
  • KML does not support GCC 4.8.5.
  • KML is a bottom-layer primitive library. The computing process involves memory read/write and allocation. You must install the OS by yourself and perform OS security hardening. Install only necessary applications or uninstall unnecessary applications that have been installed.
  • To prevent buffer overflow attacks, you are advised to use the address space layout randomization (ASLR) technology to randomize the layout of linear areas such as the heap, stack, and shared library mapping to make it more difficult for attackers to predict target addresses and locate code. This technology can be applied to heaps, stacks, and memory mapping areas (mmap base addresses, shared libraries, and vDSO pages).

    Enabling method: echo 2 >/proc/sys/kernel/randomize_va_space