Linaro Connect San Diego 2019 has ended
Linaro Connect resources will be available here during and after Connect!

Booking Private Meetings
Private meetings are booked through san19.skedda.com and your personal calendar (i.e. Google Calendar). View detailed instructions here.

For Speakers
Please add your presentation to your session by attaching a pdf file to your session (under Manage Session > + Add Presentation). We will export these presentations daily and feature on the connect.linaro.org website here. Videos will be uploaded as we receive them (if the video of your session cannot be published please let us know immediately by emailing connect@linaro.org).

Dave’s Puzzle - linaro.co/san19puzzle

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

IoT and Embedded [clear filter]
Monday, September 23

2:00pm PDT

SAN19-102 Porting Dual Core STM32 on Zephyr RTOS
Zephyr is already ported on number of STM32 SoC platforms, but so far was limited to run on one core. The introduction of the dual cores STM32H7 series (Providing Cortex-M7 and Cortex-M4) lead us to implement and run Zephyr on the both cores.

This talk will detail the issues and the solutions used by STMicroelectronics to enable Zephyr on the both cores,. It will cover topics like dual core boot, resources sharing and inter-core communications.

avatar for Erwan Gouriou

Erwan Gouriou

Principal Software Engineer, ST Microelectronics / Linaro
Linaro Assignee, STMicroelectronics. After working in various areas of the embedded ecosystem for several years, I've started contributing to Zephyr project 2016. My primary focus is STM32 support for which I'm now subsystem maintainer, but I've also contributed to other areas like... Read More →

Monday September 23, 2019 2:00pm - 2:25pm PDT
Sunset 3 (Session 3)

2:30pm PDT

SAN19-108 OpenAMP: Out-Of-Band Transmission of Large Buffers
OpenAMP's RPMsg channels are limited to small buffers. This talk describes an architecture and implementation for transmitting large buffers using RPMsg.


benjamin levinsky

Software engineer, xilinx
avatar for Ed Mooring

Ed Mooring

Assigned Engineer, Linaro
Ed is relatively new to Linaro and Xilinx, but not to the embedded software industry, having been involved with safety- and security-critical embedded operating systems and hypervisors for the last 15 years.

Monday September 23, 2019 2:30pm - 2:55pm PDT
Sunset 3 (Session 3)

3:30pm PDT

SAN19-115 System Device Trees
Today's heterogeneous SoCs are very hard to configure. Issues like which cores, memory and devices belongs to which operating systems, hypervisors and firmware is done in an ad-hoc, error prone way. System Device Trees will change all that by extending today's device trees, used by Linux, Xen, uboot, etc. to describe the full system and also include configuration information on what belongs where. This talk will describe the issues involved and the proposed solution together with a demo of a prototype.

avatar for Bruce Ashfield

Bruce Ashfield

Principle Systems Engineer, AMD
Bruce has been working professionally with Linux since 2000, and a user since 1995. He currently works as a Principal Systems Engineer for AMD, sending time as maintainer for the Yocto project reference kernel, meta-virtualization and meta-cloud-services layers. He is also the creator... Read More →
avatar for Stefano Stabellini

Stefano Stabellini

Principal Engineer, Xilinx
Stefano Stabellini serves as system software architect and virtualization lead at Xilinx, the world's largest supplier of FPGA solutions. Previously, at Aporeto, he created a virtualization-based security solution for containers and authored several security articles. As Senior Principal... Read More →
avatar for Tomas Evensen

Tomas Evensen

CTO Open Source, Xilinx
Tomas Evensen is Chief Technology Officer, Open Source at Xilinx.In this role he is responsible for the open source software strategy forXilinx All Programmable SoCs. Prior to joining Xilinx, Evensen was ChiefTechnology Officer at Wind River for 7 years, as well as GM for the WindRiver... Read More →

Monday September 23, 2019 3:30pm - 3:55pm PDT
Sunset 3 (Session 3)

4:00pm PDT

SAN19-116 Project Zephyr Security Update
This talk will give an overview of the work by the security subcommittee within the Zephyr project, including the current status of security within the project. It will cover what happens when a vulnerability is reported, as well as ongoing efforts around static analysis.

avatar for David Brown

David Brown

Senior Engineer, Linaro
David Brown is a member of the Linaro IoT and Embedded Group (LITE), as well as the Security Working Group, and has worked on the Linux kernel, with a focus on security for a number of years. Recently, he has been focusing on security as it relates to IoT embedded devices, including... Read More →

Monday September 23, 2019 4:00pm - 4:25pm PDT
Sunset 3 (Session 3)

4:30pm PDT

SAN19-121 TF-M remote secure services with Zephyr
Trusted Firmware M (TF-M) is an open source implementation of Platform Security Architecture (PSA) for Arm Cortex M processors. TF-M provides secure services to other cores or non-secure execution environments using PSA APIs on the M profile core. It includes services like secure storage, security audit trails, and crypto, amongst others. PSA Firmware Framework (PSA-FF) compliant APIs are used for inter-process or inter-processor communication with the secure services.

This session will discuss how to run Zephyr on a non-secure core, calling TF-M services on a secure TF-M core. A dual-core Cortex M33 will be used, with OpenAMP as the IPC protocol between the Zephyr and TF-M core. This session will also examine PSA level 1 requirements for PSA certification, such as the use of a secure boot loader.

avatar for Karl Zhang

Karl Zhang

software engineer, arm
Senior Software Engineer of arm, working as Linaro assignee for LITE. Mainly focus on embedded and IoT, v8-m of TF-M.
avatar for Kevin Townsend

Kevin Townsend

Technical Lead, linaro.org
Technical Lead at Linaro specialising in 32-bit ARM-based development, with particular expertise in the ARM Cortex M, Trusted-Firmware M, and embedded security.

Monday September 23, 2019 4:30pm - 4:55pm PDT
Sunset 3 (Session 3)
Tuesday, September 24

4:00pm PDT

LITE Office Hours in Developer Rooms (Palm V)
Open Hours @Developers Rooms is a time slot where the tech lead and the team are scheduled to be in there.

Teams Participating:

LITE in Palm 5

Tuesday September 24, 2019 4:00pm - 5:00pm PDT
Developers Rooms
Wednesday, September 25

11:00am PDT

LITE Office Hours in Developer Rooms (Palm 5)
Open Hours @Developers Rooms is a time slot where the tech lead and the team are scheduled to be in there.

Teams Participating:

LITE in Palm 5

Wednesday September 25, 2019 11:00am - 12:00pm PDT
Palm V (Developer Room)
Thursday, September 26

9:00am PDT

SAN19-406 Secure Runtime Library on IoT Device
While isolation levels greater than 1 are involved in PSA certificate, the existing runtime library for secure partition lacks security consideration and contains its own private data, this prevents secure partition calling these APIs because of potential information leakage.
A new runtime library needs to be available for secure partition with security consideration at the very start of design. The design should not break the isolation requirements listed in the PSA Firmware Framework specification. This runtime library also needs to be sharable for all secure partitions to save storage on IoT device, and it needs to be read-only to avoid tampering. And the most important part, no private data could exist inside of runtime library.
This new runtime library would keep security isolation consideration out of secure partition designers, which make the development environment unified for secure partition developers. And save the size for IoT software since this library is shared.

avatar for Ken Liu

Ken Liu

Staff Software Engineer, Arm
Ken Liu is a software engineer at Arm on security solutions. He has been working in silicon company for over 15 years before joining Arm and focused on network, multi-media, product system and security solutions. He is now a key member engineer of Trusted Firmware M open source p... Read More →
avatar for Edison Ai

Edison Ai

Senior Software Engineer, Arm
Edison is working in CE-OSS Firmware team in ARM company and the workplace is in Shanghai, China. His work is mainly focused on the implementation of Trust Firmware M based on the PSA Firmware Framework.

Thursday September 26, 2019 9:00am - 9:25am PDT
Sunset V (Session 1)

4:00pm PDT

LCG/MMWG Office Hours in Developer Rooms (Royal III)
Open Hours @Developers Rooms is a time slot where the tech lead and the team are scheduled to be in there.

Teams Participating:

LCG & MMWG in Royal III - IV

Thursday September 26, 2019 4:00pm - 5:00pm PDT
Developers Rooms
Friday, September 27

8:30am PDT

SAN19-503 Video 4 Zephyr
Video acquisition, processing, and rendering are key features for a variety of different embedded applications and they are heavily used in automotive, monitoring and various AI applications. More specifically, I recently had to work on implementing camera support for a microcontroller running Zephyr RTOS. There is no existing support for camera in Zephyr, but like any other component, creating a common and generic subsystem/API benefits the community and encourages video component support work. Several software proposals, including one of my own, are currently under review and maybe even part of Zephyr when you read these words. We will review a few camera basics, the different ways to drive them and how to design a suitable subsystem/API, taking into account scalability, latency and memory footprint. We will conclude with a summary of the current upstream status and the status of any outstanding pull requests.

avatar for Loic Poulain

Loic Poulain

Developer Support Engineer, Linaro
Software engineer member of the Linaro support and solutions team.

Friday September 27, 2019 8:30am - 8:55am PDT
Sunset V (Session 1)

9:00am PDT

SAN19-505 Functional Safety: An Introduction
This session will present an overview of what Functional Safety is, how it is measured and certified and how the Zephyr project is producing the first Open Source safety certified RTOS.

avatar for Vicky Janicki

Vicky Janicki

Engineering Director, LITE, Linaro

Friday September 27, 2019 9:00am - 9:25am PDT
Sunset V (Session 1)

11:00am PDT

SAN19-510 Is Chromium OS favorable for IOT Devices ?
Getting electronic devices onto internet and well connected with each other hasn't been a trivial task for the engineering community, always challenged by end price of the product, software scalability from devices running firmware to complex devices running complete OS distro, lack of fine tuned libraries and framework to introduce security of data, over the air upgrade and configuration and calibration of devices, supporting both head and headless units. Though the industry met the end user demand and floating requirements in time, the challenges continue to exist for next generation devices
where the focus is on integrating multiple key components like
security, networking, graphics, AI and ML libraries and sensor control frameworks into one singe device. While solving the system integration requirements is a key thing the other equal important aspect of ensuring the software is maintained for bug fixes, long term supported, simultaneous support for multiple SOCs and controllers is very much essential.

The end equipment manufacturers have various software options to chose from and each have their own advantages and disadvantages, inbuilt features and support infrastructure. Chromium OS is one of the latest open source software distributions maintained by Google for almost a
decade now has made its way into IOT segments.

In this session we look into the key components in Chromium OS that can help us overcome the software challenges in building next generation IOT devices.

- Chromium OS is initially designed for laptops, desktops and stand alone / all inone boxes, the well integrated software components like browsers, networking, security, boot options and window management can be leveraged as is for IOT devices. We go through few of these components to understand if they meet the IOT requirements.

- Chromium OS is built on Linux, thereby the OS has support for multiple latest SOCs and device drivers for various controllers. We should be discussing if chromium OS has picked up all the latest trends in Linux OS related to Power Management, security, upgraded device driver frameworks, etc.

- In general IOT devices are headless or less UI centric, we explore if chromium OS can be easily configured to boot on a headless unit ?

- Understanding the system requirements, memory requirements and power utilization are few key factors to consider if the OS fits the budget available for the end equipment.

- The new set of IOT devices are now pre-integrated with AI algorithms to help end user for better understanding of the surrounding or indecision making etc. The devices are also self learning with ML algorithms. Its important to know if Chromium OS has frameworks to download AI/ML algorithms or firmware at run time on DSPs or SOCs. Also ensure if there are HALs and APIs to exchange data to/from DSPs or SOCs running AI/ML algorithms.

The topics covered in this session should help us quickly assess if chromium os is favorable for IOT devices or if we were bringing an elephant in the room.

avatar for Khasim Syed Mohammed

Khasim Syed Mohammed

Senior Android Engineer, Linaro Ltd
Senior Software Engineer, Developer services, Linaro. Passionate about building and booting Android on ARM based SOCs for mobile and ARM servers.

Friday September 27, 2019 11:00am - 11:25am PDT
Pacific Room (Keynote)

Filter sessions
Apply filters to sessions.
  • 96Boards
  • AI/Machine Learning
  • Android
  • Automation & CI
  • Autonomous Vehicles
  • Big Data
  • Boot Architecture
  • Data Center
  • Food and Beverage
  • HPC
  • IoT and Embedded
  • IoT Fog/Gateway/Edge Computing
  • Keynote
  • Linux Kernel
  • Multimedia
  • Networking
  • Notices
  • Open Source Development
  • Other
  • Power Management
  • Security
  • Social
  • Tools
  • Validation and CI