Verified Environments
To ensure that you can use KML smoothly and securely, ensure that your environment is one of the verified environments.
OS |
CPU Type |
Compiler |
|---|---|---|
openEuler 22.03 LTS SP2 |
Huawei Kunpeng 920 series processor |
GCC 10.3.1 |
Huawei Kunpeng 920 series processor |
BiSheng Compiler 3.0.0 |
|
openEuler 22.03 LTS SP1 |
Huawei Kunpeng 920 series processor |
GCC 10.3.1 |
Huawei Kunpeng 920 series processor |
BiSheng Compiler 3.0.0 |
|
openEuler 20.03 LTS SP1 |
Huawei Kunpeng 920 series processor |
GCC 7.3.0 |
Huawei Kunpeng 920 series processor |
BiSheng Compiler 2.5.0 |
|
Kylin V10 SP3 |
Huawei Kunpeng 920 series processor |
BiSheng Compiler 3.0.0 |
Ubuntu 18.04 |
Huawei Kunpeng 920 series processor |
GCC 7.3.0 |
CentOS 7.6 |
Huawei Kunpeng 920 series processor |
GCC for openEuler 1.3.2 |
CentOS 8.1 |
Huawei Kunpeng 920 series processor |
GCC 9.3.0 |
- KML supports only Kunpeng 920 processors and will exit unexpectedly for any other processors. If KML is loaded in dynamic mode, the program exits when KML is linked and an undefined result will be generated.
- KML does not support GCC 4.8.5.
- KML is a bottom-layer primitive library. The computing process involves memory read/write and allocation. You must install the OS by yourself and perform OS security hardening. Install only necessary applications or uninstall unnecessary applications that have been installed.
- To prevent buffer overflow attacks, you are advised to use the address space layout randomization (ASLR) technology to randomize the layout of linear areas such as the heap, stack, and shared library mapping to make it more difficult for attackers to predict target addresses and locate code. This technology can be applied to heaps, stacks, and memory mapping areas (mmap base addresses, shared libraries, and vDSO pages).
Enabling method: echo 2 >/proc/sys/kernel/randomize_va_space