Loading…
Linaro Connect San Diego 2019 has ended
Linaro Connect resources will be available here during and after Connect!

Booking Private Meetings
Private meetings are booked through san19.skedda.com and your personal calendar (i.e. Google Calendar). View detailed instructions here.

For Speakers
Please add your presentation to your session by attaching a pdf file to your session (under Manage Session > + Add Presentation). We will export these presentations daily and feature on the connect.linaro.org website here. Videos will be uploaded as we receive them (if the video of your session cannot be published please let us know immediately by emailing connect@linaro.org).

Dave’s Puzzle - linaro.co/san19puzzle

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Sunset V (Session 1) [clear filter]
Monday, September 23
 

2:00pm PDT

SAN19-104 LEDGE RP bootstrap
Proposal of this session is to provide technical intro of LEDGE reference platform for different flavours Open Embedded, Debian and Fedora IoT. I will give a link on project source code, discuss how to build it and run it. Describe how we do automatic builds and Continuous Integration. This talk is intended for new contributors for LEDGE reference platform as a first technical guide.

Speakers
avatar for Maxim Uvarov

Maxim Uvarov

Sr. Softwere Engineer (LEDGE, IoT), Linaro
Maxim Uvarov is developer and maintainer in Linaro LEDGE group. Recently Maxim was maintainer of OpenDataPlane (networking API project) in Linaro, kernel maintainer at Oracle and Linux developer in MontaVista. Maxim holds a Ph.D. in Engineering from Moscow State University of Instrument... Read More →


Monday September 23, 2019 2:00pm - 2:25pm PDT
Sunset V (Session 1)

2:30pm PDT

SAN19-105 Integrating UEFI services with ATF and u-boot FIT on mbed Linux
A discussion on proposed adoption of UEFI secure boot and capsule update mechanisms in conjunction with u-boot FIT and ATF root-of trust on a high security Linux system.
- What benefits does adding UEFI secure boot to the mix bring ?
- What benefits does adding UEFI capsule update bring ?
- EFI stub booting ?
- Is grub required ?
- Does the UEFI secure boot method bring additional security over straight u-boot FIT image signing
- Does capsule update provide the right path to isolate user-space Linux from low-level device specific update logic ?

Speakers
avatar for Bryan O'Donoghue

Bryan O'Donoghue

Software engineer, Linaro
Embedded developer, Linux, u-boot, zephyr, ATF, OP-TEE.Linaro member services.



Monday September 23, 2019 2:30pm - 2:55pm PDT
Sunset V (Session 1)

3:00pm PDT

SAN19-110 LCG Lightning talks
LCG has had a lighting talks session for a few Connects now. We talk about portions of our work that don't necessarily fit into a full-sized session, but are interesting for members and attendees nevertheless.

Speakers
avatar for John Stultz

John Stultz

AOSP Devboard/Kernel Developer, Linaro
AOSP devboard and Kernel developer
avatar for Amit Pundir

Amit Pundir

Engineer, Linaro
Engineer at Linaro Ltd.
avatar for Sumit Semwal

Sumit Semwal

LCG Kernel Team Lead, Linaro Limited
Sumit leads a motivated team of kernel engineers who work on everything kernel - and sometimes non-kernel too - within LCG.


Monday September 23, 2019 3:00pm - 3:50pm PDT
Sunset V (Session 1)

4:00pm PDT

SAN19-119 Status update on Qualcomm upstreaming
An update of the progress made since BKK19 in the upstreaming and ongoing efforts related to Qualcomm platforms. Covering current status of Dragonboards and Snapdragon laptops.

Speakers
avatar for Bjorn Andersson

Bjorn Andersson

Principal Engineer, Linaro
Bjorn is Linux kernel subsystem maintainer for remoteproc, rpmsg and hwspinlock and co-maintainer of the Qualcomm SoC. As Principal Engineer at Linaro he's focusing on Qualcomm upstream support in the Linux kernel.


Monday September 23, 2019 4:00pm - 4:50pm PDT
Sunset V (Session 1)
 
Tuesday, September 24
 

8:30am PDT

SAN19-202 Secure boot extensions
LEDGE is trying to implement UEFI secure boot in U-Boot. This is an open discussion explaining the challenges we had to tackle regarding UEFI secure variable storage in both armv7 and armv8 as well as authentication of non EFI payloads (DTB/initramfs etc)

Speakers
avatar for Ilias Apalodimas

Ilias Apalodimas

Tech Lead, Linaro
Linux kernel developer with a taste for networking and performance
avatar for Takahiro Akashi

Takahiro Akashi

Engineer, Socionext Inc.
Linaro Kernel WG engineer
avatar for Pipat Methavanitpong

Pipat Methavanitpong

Firmware Engineer, Socionext Inc.
Develop LEDGE's secure boot reference. Work with EDK2 and OP-TEE. Support SNI DeveloperBox 96boards.


Tuesday September 24, 2019 8:30am - 9:20am PDT
Sunset V (Session 1)

11:00am PDT

SAN19-207 SCMI server in secure world
The System Control and Management Interface (SCMI) is a set of operating system-independent software interfaces that are used in system resources management that has been originally specified to standardize the interface between Application Processors and the power coprocessor. Nevertheless, systems don't always have a dedicated coprocessor for system resources management but still need to safely manage them.The secure world is a good candidate as it uses some of these critical resources. Instead of defining a new custom interface, it has been decided to enable a SCMI server in secure world that will handle system request from all agents of the system being the non secure world of AP or other processors of the system.
This talk will present the SCMI server implementation in secure world, the constraints that have driven the implementation choices, the open items and next features. During the talk, we will have a special focus on the OP-TEE arm32 implementation.

Speakers
avatar for Souvik Chakravarty

Souvik Chakravarty

Principal Software Engineer, Arm Ltd.
Souvik is a Principal Engineer in the Architecture and Technology Group at Arm, where his primary areas of focus are System and Power Management software standards and specifications. Souvik's primary experience is in architecture and development of Power Management stacks on various... Read More →
avatar for Vincent Guittot

Vincent Guittot

Technical Leader, Linaro Ltd
Vincent has worked on developing drivers for various peripherals and coprocessors in mobile phones during 12 years. In 2005, he began to focus on mobile phones that ran Linux then Android and spent the last years of this period to optimize the power consumption of android platforms... Read More →


Tuesday September 24, 2019 11:00am - 11:50am PDT
Sunset V (Session 1)

12:00pm PDT

SAN19-213 A Guide to enabling new Power Management & System Control Models via Arm SCMIv2.0
Continuing from Linaro Connect BKK19, where the Arm SCMI Roadmap was unveiled, we have released SCMI specification version 2.0 in July/August 2019. This version of the specification enables new usage models to cater to Power Management and System Control requirements in Mobile, Embedded and Automotive markets.

Cost sensitive SoC designs may not opt for a stand-alone microcontroller for System Control. For such systems, SCMIv2.0 enables the System Control Firmware to be resident in the secure world. We shall go over the requirements to implement the kernel and firmware code for such systems to comply with SCMI.

SCMIv2.0 introduces the concept of Per-Agent Resource Isolation Domains. Many SoCs today implement multiple PE Clusters where each cluster runs a different OS instance. Such systems require the SoC resources to be partitioned dynamically among the various agents (we may model each such cluster to be a SCMI agent). SCMIv2.0 introduces new commands to achieve this. In our session, we shall talk about how this can be done using the new SCMIv2.0 commands, and the agent-id and transport requirements and semantics for such a model to work. We will also provide an overview how such a model might work for Virtualized Systems. The presentation will cover how newly introduced Power Domain pre-notifications can be used for co-operative Power Management according to user defined policies in such systems.

SCMIv2.0 introduces FastChannels. We will provide an overview of its requirements and how FastChannels can be enabled for latency critical operations. We will also touch upon the Reset Management Protocol which can be used for device resets. Finally we will walk-through the features planned to be introduced in the next version of SCMI.

Speakers
avatar for Souvik Chakravarty

Souvik Chakravarty

Principal Software Engineer, Arm Ltd.
Souvik is a Principal Engineer in the Architecture and Technology Group at Arm, where his primary areas of focus are System and Power Management software standards and specifications. Souvik's primary experience is in architecture and development of Power Management stacks on various... Read More →



Tuesday September 24, 2019 12:00pm - 12:50pm PDT
Sunset V (Session 1)

2:00pm PDT

SAN19-220 Deep dive in the scheduler
This training will present the details of some parts of the scheduler like the task placement during wake up path, the cgroup in the scheduler or how CPU compute capacity is used to balance tasks on the system.
The training will continue from where it stopped at HKG19.

Speakers
avatar for Vincent Guittot

Vincent Guittot

Technical Leader, Linaro Ltd
Vincent has worked on developing drivers for various peripherals and coprocessors in mobile phones during 12 years. In 2005, he began to focus on mobile phones that ran Linux then Android and spent the last years of this period to optimize the power consumption of android platforms... Read More →


Tuesday September 24, 2019 2:00pm - 2:50pm PDT
Sunset V (Session 1)

3:00pm PDT

SAN19-221 Gcc under the hood
This session is a beginner tutorial that explores under the hood of the gcc compiler. In the process we take a look at some useful methods that allow developers to understand how gcc transforms their code into the target machine code.

Speakers
avatar for Siddhesh Poyarekar

Siddhesh Poyarekar

Tech Lead, Linaro
Siddhesh Poyarekar is a toolchain hacker and a Tech Lead at Linaro, managing a team of toolchain wizards. He is a maintainer of the GNU C Library and has been actively involved in server distribution maintenance and performance for over a decade.



Tuesday September 24, 2019 3:00pm - 3:50pm PDT
Sunset V (Session 1)

4:00pm PDT

**Cancelled** SAN19-222 Linux Kernel Mailbox API - 101
Introductory presentation about the concept of Mailbox, some common use-cases and features and limitations of the Mailbox API in Linux kernel.

Speakers
avatar for Jassi Brar

Jassi Brar

Principal Engineer at Linaro, Linux kernel Mailbox API maintainer., Linaro
Linux kernel developer with experience in some, opinion on many and passion for one subsystem.


Tuesday September 24, 2019 4:00pm - 4:50pm PDT
Sunset V (Session 1)

5:00pm PDT

SAN19-223 Using Perf and its friend eBPF on Arm platform
Perf has joined a growing number of tools able to act as userspace interface to eBPF. Not only that but it can also reprise its historic role as the best interface to the Linux performance monitoring sub-system to profile eBPF programs installed by itself or any other eBPF front end.

This session will mainly give updates for latest support for Arm CoreSight and eBPF in perf, and also will see how to Arm CoreSight can be used for eBPF program profiling.

This session will be divided into two main parts; the first part will focus on the updates for Arm CoreSight tracing, includes sample flags and integration perf for test support. In the bottom part, it will discuss the eBPF usage with perf tool: perf uses eBPF program for system call tracing; perf profiles the eBPF program by using the general PMU events and Arm CoreSight event.

This session will be finished within 25 minutes; in the CoreSight hacking session we will concentrate on questions
and demonstrations as the supplement to the presentation.

Speakers
avatar for Leo Yan

Leo Yan

Software Engineer, Linaro Ltd.
Leo now is working for Linaro support and solution engineering team, mainly engage in power management and debugging related training and support for Linaro members. Prior to joining Linaro, Leo worked for two silicon companies for 9 years, had fun on Arm platforms with Linux kernel... Read More →


Tuesday September 24, 2019 5:00pm - 5:50pm PDT
Sunset V (Session 1)
 
Wednesday, September 25
 

11:00am PDT

SAN19-305 The Transformation of Electronic Product Design
Dr. Kruberg will review and predict the future impact of modular software on the Arm ecosystem and cloud based electronic design and manufacturing of next generation electronics.

Speakers
avatar for Gordon Kruberg

Gordon Kruberg

Dream, Design, Deliver
W. GORDON KRUBERG, M.D. - PRESIDENT AND CEO Gordon Kruberg has been President and CEO since founding the company in October 2003. Over the course of his career, Dr. Kruberg has been involved in over thirty US-based companies as a venture investor, member of the board of directors... Read More →


Wednesday September 25, 2019 11:00am - 11:25am PDT
Sunset V (Session 1)

12:00pm PDT

SAN19-307 Robotic Arm Control using Qualcomm RB3
Discussion and showcase around the currently WIP "Robotic Arm Project" using the RB3 Robotics kit from Qualcomm.
The following topics will be covered:
- Servo control
- Object recognition using opencv
- Basic voice control

Speakers
avatar for Sahaj Sarup

Sahaj Sarup

Application Engineer, Linaro
Open source software and hardware enthusiast. Currently working at 96Boards, Linaro as a full-time Maker.


Wednesday September 25, 2019 12:00pm - 12:25pm PDT
Sunset V (Session 1)

12:30pm PDT

SAN19-310 Rapid Prototyping with Click Expansion Boards
The 96Boards Low-speed mezzanine offers several flexible interfaces that make it ideal to connect to a variety of sensors and other components. The Click Mezzanine allows you to connect to MikroElektronika's vast library of 600+ different Click boards. This allows for rapid experimentation and prototyping with a wide variety of interesting components. Please join us as we show case the Click Mezzanine in conjunction with the Ultra96.

Speakers
avatar for Joshua Foster

Joshua Foster

Technical Marketing Engineer, Avnet
Technical Marketing Engineer at Avnet with experience in circuit design, Xilinx SoC's, and FPGA hardware design.



Wednesday September 25, 2019 12:30pm - 12:55pm PDT
Sunset V (Session 1)

2:00pm PDT

SAN19-312 Arm Everywhere: A Demo of an Arm Cloud, Edge, and IoT Infrastructure
In the weeks leading up to ArmTechCon 2018, and then at the event, Drew Henry outlined his vision of a trillion connected devices. Those trillion connected devices will need a significant rethinking of how infrastructure is built and delivered, and the Arm Neoverse initiative was created to address those challenges.

The past 6 months have seen much written on the topic of bringing workloads back from the Cloud, and moving them to the Edge, closer to the end users or to IoT endpoints, and improving the service delivery experience. While there have been many articles, slides, headlines, and conversations about this, no one has yet to demonstrate a full end-to-end working Arm-based implementation. miniNodes is building a complete demonstration of connected Cloud Servers, Edge Servers, and IoT Devices, running entirely on Arm. Environmental data will be captured by IoT endpoints running Arm Mbed, provisioned via Arm Pelion, feeding data to Edge servers, that will in turn connect to an Ampere eMAG server hosted by Packet.com.

More specifically, the IoT endpoints are collecting environmental readings such as temperature, humidity, air quality, particulates, and lightning detection from a series of Raspberry Pi’s distributed across the globe.

Regional 96Boards Edge Servers are collecting data from the IoT endpoints in their assigned zone, and packaging the data for shipment to the cloud server.

An Ampere Cloud server hosted by Packet is doing the large data processing activities, and running Grafana Dashboard for visualization of the IoT data flowing into the system.

The entire collection of systems will be centrally managed and the IoT nodes allow for service provisioning via containers pushed to the devices, no matter their location, due to the Pelion application.

From a presentation perspective, we will talk through the infrastructure build, issues and challenges along the way, and potential use cases. Then we will open up to discussion, to solicit feedback and hopefully find solutions to the challenges faced.

Speakers
avatar for David Tischler

David Tischler

Founder, miniNodes
All things Arm microservers, and the innovative use of Arm technologies in non-traditional compute locations.
avatar for Carl Perry

Carl Perry

Ecosystem Engineer, Packet
Carl has been a veteran of the hosting industry for many years and an avid supporter of alternative architectures to x86



Wednesday September 25, 2019 2:00pm - 2:50pm PDT
Sunset V (Session 1)

3:00pm PDT

SAN19-313 Using Python Overlays to Experiment with Neural Networks
Python Productivity for Zynq, or PYNQ, has the ability to present programmable logic circuits as hardware libraries called overlays. These overlays are analogous to software libraries. A software engineer can select the overlay that best matches their application. The overlay can be accessed through an application programming interface (API). Using existing community overlays, this course will examine how to experiment with neural networks using PYNQ on Ultra96.

Speakers
avatar for Tom Curran

Tom Curran

Sr. Technical Marketing Engineer, Avnet
Tom Curran works on hardware and software for a wide variety of SoC FPGA architecture projects and currently spends most of his time with the Avnet Ultra96 board creating reference designs and training materials for customers as a Sr. Technical Marketing Engineer in the Products... Read More →



Wednesday September 25, 2019 3:00pm - 3:25pm PDT
Sunset V (Session 1)

4:00pm PDT

SAN19-314 Developing with PetaLinux for the Ultra96 Board
This course will describe Linux development using the Xilinx PetaLinux tools for the Ultra96 board. Specific focus will be given to lessons learned in integrating and debugging device drivers.

Speakers
avatar for Tom Curran

Tom Curran

Sr. Technical Marketing Engineer, Avnet
Tom Curran works on hardware and software for a wide variety of SoC FPGA architecture projects and currently spends most of his time with the Avnet Ultra96 board creating reference designs and training materials for customers as a Sr. Technical Marketing Engineer in the Products... Read More →



Wednesday September 25, 2019 4:00pm - 4:50pm PDT
Sunset V (Session 1)
 
Thursday, September 26
 

8:30am PDT

SAN19-402 **Cancelled** Virtualization for OP-TEE
**This Session has been cancelled**
Volodymyr will speak about his work on adding virtualization support to OP-TEE and about OP-TEE mediator in Xen hypervisor.

Speakers
avatar for Volodymyr Babchuk

Volodymyr Babchuk

Senior Embedded Engineer at EPAM Systems, EPAM Systems
Volodymyr is senior embedded software engineer at EPAM Systems. He participates in a project aimed to bring XEN hypervisor into automotive solutions.


Thursday September 26, 2019 8:30am - 8:55am PDT
Sunset V (Session 1)

9:00am PDT

SAN19-406 Secure Runtime Library on IoT Device
While isolation levels greater than 1 are involved in PSA certificate, the existing runtime library for secure partition lacks security consideration and contains its own private data, this prevents secure partition calling these APIs because of potential information leakage.
A new runtime library needs to be available for secure partition with security consideration at the very start of design. The design should not break the isolation requirements listed in the PSA Firmware Framework specification. This runtime library also needs to be sharable for all secure partitions to save storage on IoT device, and it needs to be read-only to avoid tampering. And the most important part, no private data could exist inside of runtime library.
This new runtime library would keep security isolation consideration out of secure partition designers, which make the development environment unified for secure partition developers. And save the size for IoT software since this library is shared.

Speakers
avatar for Ken Liu

Ken Liu

Staff Software Engineer, Arm
Ken Liu is a software engineer at Arm on security solutions. He has been working in silicon company for over 15 years before joining Arm and focused on network, multi-media, product system and security solutions. He is now a key member engineer of Trusted Firmware M open source p... Read More →
avatar for Edison Ai

Edison Ai

Senior Software Engineer, Arm
Edison is working in CE-OSS Firmware team in ARM company and the workplace is in Shanghai, China. His work is mainly focused on the implementation of Trust Firmware M based on the PSA Firmware Framework.



Thursday September 26, 2019 9:00am - 9:25am PDT
Sunset V (Session 1)

11:00am PDT

SAN19-411 Runtime Secure Keys in OP-TEE
Till now all keys stored in OP-TEE secure storage are secured at rest by encrypting it with FEK.
But when these keys are being used for operations these keys are kept in plain format in OP-TEE internal structures.

This is because cryptographic operations in OP-TEE are currently done with software libraries(libtomcypt and mbedTLS), and cryptographic operations are nothing but mathematical operations, so software libraries need private keys in “plain format” for operations.

Keeping these keys in plain format makes them vulnerable to following attacks with respect to confidentiality and integrity which is main objective of Trusted Execution Environment.
- By exploiting any vulnerability in code such as buffer overrun or bugs like Heartbleed.
- Using side channel attacks such as cold boot attack - in which an attacker with physical access to a computer performs a memory dump of a computer's RAM by performing a hard reset of the target machine.

Since nature of hardware-based cryptography ensures that the information stored in hardware is better protected from external attacks, so above issue can be fixed when these keys are backed by some hardware component. We need some mechanism in which the keys doesn’t exist in plain format in secure memory.

Hardware component will export the private keys only in encrypted form to secure memory.
During operations takes private keys in encrypted form and convert them into plain format internally and do operations with them.
Even If attacker gets access to this key in secure memory somehow, will not be able to find out the actual key.

Speakers
avatar for Sahil Malhotra

Sahil Malhotra

Lead Software Engineer, NXP
Having a total experience of 7 years in Embedded Programming. Worked on various areas including PKCS#11, Arm TrustZone, OP-TEE, OpenSSL, Networking.



Thursday September 26, 2019 11:00am - 11:25am PDT
Sunset V (Session 1)

11:30am PDT

SAN19-413 TEE based Trusted Keys in Linux
Protecting key confidentiality is essential for many kernel security use-cases such as disk encryption, file encryption and protecting the integrity of file metadata. Trusted and encrypted keys provides a mechanism to export keys to user-space for storage as an encrypted blob and for the user-space to later reload them onto Linux keyring without the user-space knowing the encryption key. The existing Trusted Keys implementation relied on a TPM device but what if you are working on a system without one?

This session will introduce a Trusted Keys implementation which relies on a much simpler trusted application running in a Trusted Execution Environment (TEE) for sealing and unsealing of Trusted Keys using a hardware unique key provided by the TEE.

Speakers
avatar for Sumit Garg

Sumit Garg

Software Engineer, Linaro Ltd.
Currently working as part of Support and Solutions team, Linaro. Responsible for activities related to platform security like OP-TEE, trusted firmware, boot-loaders etc. Also responsible for tool-chain support activities.Contributed in various open source projects like OP-TEE, TF-A... Read More →



Thursday September 26, 2019 11:30am - 11:55am PDT
Sunset V (Session 1)

12:00pm PDT

SAN19-415 DMA-Buf Developments
Cover recent work around DMA-Buf including dma-buf heaps, dma-buf cache management optimizations, ION deprecation, and kernel graphics buffers

Speakers
avatar for John Stultz

John Stultz

AOSP Devboard/Kernel Developer, Linaro
AOSP devboard and Kernel developer
avatar for Sumit Semwal

Sumit Semwal

LCG Kernel Team Lead, Linaro Limited
Sumit leads a motivated team of kernel engineers who work on everything kernel - and sometimes non-kernel too - within LCG.


Thursday September 26, 2019 12:00pm - 12:50pm PDT
Sunset V (Session 1)

2:00pm PDT

SAN19-421 Training: Device power management for idle
ARM platforms often supports sophisticated power management, to for example allow unused parts on a running system, to be put into low power states, which prevents energy from being drained.

However, it can be a rather complicated task to deploy optimized power management support in a driver in the Linux kernel, especially when it comes to idle management. A couple of frameworks are there to help and these comes with corresponding callback functions, that may be assigned on per device basis. The driver developer needs detailed knowledge about these frameworks, especially when the goal is to reach the best possible energy efficient behavior.

In this session, we look into the concepts for system wide suspend and the corresponding low power states, such as suspend to ram, suspend to idle and suspend to disk.

Additionally, for more fine grained power management per device, some best practices are explained of how to deploy support for runtime PM and PM domains (in particular the generic PM domain) .

Speakers
avatar for Ulf Hansson

Ulf Hansson

Senior Kernel Engineer, Linaro
Ulf has a very long experience of using Linux and has been contributing the Linux kernel development for many years by now. He maintains the MMC subsystem and the generic PM domain in the Linux kernel, but also spends lots of time reviewing various changes related to power management... Read More →



Thursday September 26, 2019 2:00pm - 2:50pm PDT
Sunset V (Session 1)

3:00pm PDT

SAN19-423 Git tricks
Share Git tricks which can make working with Git more efficient

Speakers
avatar for Viresh Kumar

Viresh Kumar

Senior Engineer, Linaro
Viresh has been involved with upstream kernel development for over 17 years. He started as maintainer for ST Microelectronics's SPEAr platform in upstream kernel and since then has been involved with Linaro, where he works as Senior Kernel Engineer in the Kernel working group. He... Read More →



Thursday September 26, 2019 3:00pm - 3:50pm PDT
Sunset V (Session 1)

4:00pm PDT

SAN19-424 Event Tracing and Pstore with a pinch of Dynamic debug
Event tracing is one of the powerful debug feature available in Linux Kernel as part of Ftrace. Pstore or Persistent Storage on the other hand is a boon to find the cause for the kernel's dying breath as rightly said by someone and is widely used in production environments. When these two features are combined with a pinch of Dynamic debug, we form a full recipe for debugging problems in Linux Kernel.

This presentation talks about integrating event tracing with pstore to identify and root cause problems by analyzing the last few events before the Kernel says goodbye. In addition to this, we add dynamic debug support to filter out unwanted logs and limit trace to only specific files or directories which help in narrowing down problems to specific subsystems and currently is not supported by Ftrace.

Speakers
avatar for Sai Prakash Ranjan

Sai Prakash Ranjan

Linux Kernel Engineer, Qualcomm
Linux Kernel Engineer at Qualcomm working on Debug features, SMMU, QDSS and several other misc areas, formerly Sony.



Thursday September 26, 2019 4:00pm - 4:50pm PDT
Sunset V (Session 1)
 
Friday, September 27
 

8:30am PDT

SAN19-503 Video 4 Zephyr
Video acquisition, processing, and rendering are key features for a variety of different embedded applications and they are heavily used in automotive, monitoring and various AI applications. More specifically, I recently had to work on implementing camera support for a microcontroller running Zephyr RTOS. There is no existing support for camera in Zephyr, but like any other component, creating a common and generic subsystem/API benefits the community and encourages video component support work. Several software proposals, including one of my own, are currently under review and maybe even part of Zephyr when you read these words. We will review a few camera basics, the different ways to drive them and how to design a suitable subsystem/API, taking into account scalability, latency and memory footprint. We will conclude with a summary of the current upstream status and the status of any outstanding pull requests.

Speakers
avatar for Loic Poulain

Loic Poulain

Developer Support Engineer, Linaro
Software engineer member of the Linaro support and solutions team.


Friday September 27, 2019 8:30am - 8:55am PDT
Sunset V (Session 1)

9:00am PDT

SAN19-505 Functional Safety: An Introduction
This session will present an overview of what Functional Safety is, how it is measured and certified and how the Zephyr project is producing the first Open Source safety certified RTOS.

Speakers
avatar for Vicky Janicki

Vicky Janicki

Engineering Director, LITE, Linaro


Friday September 27, 2019 9:00am - 9:25am PDT
Sunset V (Session 1)

11:00am PDT

SAN19-512 "Driving" innovation on Arm: lessons learned porting open-source autonomous driving stack
As Autonomous Driving (AD) technologies roll out from development to deployment, vendors are demanding production-ready embedded solutions. Arm IP becomes a natural choice, combining high performance general-purpose compute with custom workload-specific acceleration in a reduced power envelope. However, porting existing AD software stacks to another platform is not without pitfalls. In this presentation, we discuss the challenges faced – with emphasis on hardware acceleration of neural networks – porting the open-source Autoware AD stack to an Arm-based system.

Speakers
avatar for LIYOU ZHOU

LIYOU ZHOU

Senior Software Engineer, Arm Ltd.
Liyou is a software engineer working on Accelerating open-source self-driving software stack with Arm hardware and software IP. Liyou has previously worked in IoT developing end to end secure firmware update solution. Liyou is also active in the developer community, presented at... Read More →



Friday September 27, 2019 11:00am - 11:25am PDT
Sunset V (Session 1)

11:30am PDT

SAN19-515 BoF: I just want to ride around in robo taxis, what can I do to help?
In this session, we will have an informal discussion about what we can do as an open-source community to advance the autonomous driving technology. Topics could include

- What technology is missing, creating a barrier to new entrants to the AD space?
- How to accelerate the move from RnD to Production grade solutions?
- What role could Linaro and its partners play in this space?

Speakers
avatar for LIYOU ZHOU

LIYOU ZHOU

Senior Software Engineer, Arm Ltd.
Liyou is a software engineer working on Accelerating open-source self-driving software stack with Arm hardware and software IP. Liyou has previously worked in IoT developing end to end secure firmware update solution. Liyou is also active in the developer community, presented at... Read More →


Friday September 27, 2019 11:30am - 11:55am PDT
Sunset V (Session 1)
 


Filter sessions
Apply filters to sessions.
  • 96Boards
  • AI/Machine Learning
  • Android
  • Automation & CI
  • Autonomous Vehicles
  • Big Data
  • Boot Architecture
  • Data Center
  • Food and Beverage
  • HPC
  • IoT and Embedded
  • IoT Fog/Gateway/Edge Computing
  • Keynote
  • Linux Kernel
  • Multimedia
  • Networking
  • Notices
  • Open Source Development
  • Other
  • Power Management
  • Security
  • Social
  • Tools
  • Validation and CI