我要评分
获取效率
正确性
完整性
易理解

Verified Environments

To use KAIL smoothly and securely, ensure that your environment is one of the verified environments.

Table 1 Verified environments for KAIL

Component

OS

CPU

Compiler

Build Tool

Python Interpreter

KAIL_DNN_EXT

openEuler 22.03 LTS SP3

Kunpeng 920 (with NEON support)

GCC 10.3.1

CMake 3.22.0

Python 3.9.20

KAIL_DNN

openEuler 22.03 LTS SP3

Kunpeng 920 (with SVE 256-bit width support)

GCC 10.3.1

CMake 3.22.0

Python 3.9.20

openEuler 22.03 LTS SP4 (kernel version later than 5.10.0-228.0.0.127 required for HBM)

Kunpeng 920 (with SME 512-bit width support)

GCC 12.3.1/BiSheng Compiler 4.2.0

CMake 3.22.0

Python 3.9.20

  • KAIL_DNN is available on new Kunpeng 920 processor models and will exit unexpectedly on any other processors. If a program dynamically loads KAIL, the program exits when KAIL is linked and an undefined result will be generated.
  • KAIL is a bottom-layer primitive library. The computing process involves memory read/write and allocation. You must install the OS by yourself and perform OS security hardening. Install only necessary applications or uninstall unnecessary applications that have been installed.
  • To prevent buffer overflow attacks, you are advised to use the address space layout randomization (ASLR) technology to randomize the layout of linear areas such as the heap, stack, and shared library mapping to make it more difficult for attackers to predict target addresses and locate code. This technology can be applied to heaps, stacks, and memory mapping areas (mmap base addresses, shared libraries, and vDSO pages).

    Enabling method: echo 2 >/proc/sys/kernel/randomize_va_space