Verified Environments
To use KAIL smoothly and securely, ensure that your environment is one of the verified environments.
Component |
OS |
CPU |
Compiler |
Build Tool |
Python Interpreter |
|---|---|---|---|---|---|
KAIL_DNN_EXT |
openEuler 22.03 LTS SP3 |
Kunpeng 920 (with NEON support) |
GCC 10.3.1 |
CMake 3.22.0 |
Python 3.9.20 |
KAIL_DNN |
openEuler 22.03 LTS SP3 |
Kunpeng 920 (with SVE 256-bit width support) |
GCC 10.3.1 |
CMake 3.22.0 |
Python 3.9.20 |
openEuler 22.03 LTS SP4 (kernel version later than 5.10.0-228.0.0.127 required for HBM) |
Kunpeng 920 (with SME 512-bit width support) |
GCC 12.3.1/BiSheng Compiler 4.2.0 |
CMake 3.22.0 |
Python 3.9.20 |
- KAIL_DNN is available on new Kunpeng 920 processor models and will exit unexpectedly on any other processors. If a program dynamically loads KAIL, the program exits when KAIL is linked and an undefined result will be generated.
- KAIL is a bottom-layer primitive library. The computing process involves memory read/write and allocation. You must install the OS by yourself and perform OS security hardening. Install only necessary applications or uninstall unnecessary applications that have been installed.
- To prevent buffer overflow attacks, you are advised to use the address space layout randomization (ASLR) technology to randomize the layout of linear areas such as the heap, stack, and shared library mapping to make it more difficult for attackers to predict target addresses and locate code. This technology can be applied to heaps, stacks, and memory mapping areas (mmap base addresses, shared libraries, and vDSO pages).
Enabling method: echo 2 >/proc/sys/kernel/randomize_va_space
Parent topic: Installing and Configuring the Environment