As today, AGL mostly leverages Wayland IVI-shell as inherited from Genivi. Worse than having technical limitations, the main issue of IVI-Shell is the persistent lack of interest from the Wayland community. As a result, the IVI-shell ailed to gain adoption from any generic software like browsers or well known social/media applications. Since the early days of Wayland, new options appear to better support compositors/wm.
On one hand, Gnome and KDE ship their own flavour of compositor/wm; nevertheless those solutions remain too monolithic and too desktop centric for the embedded world.
On the other hand Wlroots was designed upfront, not as a Wayland compositor/wm but as a foundation to create compositor. Furthermore, because it’s more recent, the authors were able to leverage the lesson learnt from older toolkit as Weston or WLC and created a far more advanced and flexible toolkit.
Download Slides [here]
Demo video [here]
Isolating components of different criticalities is a desirable feature of safety-critical systems used in the automotive industry. IoT.bzh and Kernkonzept therefore cooperated in creating a virtualization Proof-of-Concept that isolates selected components of AGL.
The purpose of this PoC is to split CAN signal processing into two virtual instances of AGL running under the control of the L4Re hypervisor.
The 1st virtual instance runs a minimal AGL realtime(preemptRT) profile and is responsible for CAN data acquisition. The 2nd virtual instance
runs a traditional AGL IVI profile and receives CAN decoded signals directly from AGL application framework through the hypervisor VIRTIO transport layer.
This talk starts by presenting the different components of the architecture used in the PoC. Then it explains how a hypervisor can be used to split AGL into multiple instances and the constrains such an architecture introduces. Finally it proposes some options and remaining work before such a solution gets production ready.
Download pdf slide [here]
This talk presents, the motivation and options chosen by AGL to address automotive cybersecurity. Its first addresses secure functionally targeted by AGL applications security model, then exposes how we extend the model from Linux entertainment to vehicle to cloud, cluster, telematics, ...
This talk remains at the architecture level. It explains targeted security concerns and exposes proposed software architecture but does not aim at digging into specific implementation details.
Download pdf slide [here]
This talk presents options to bring a subsystem of AGL Application Framework into realtime operating systems like AutoSar Foundation, VxWorks, Zephyr, QNX.In order to bridge smaller controllers with AGL systems, current Application Framework should be skimmed down to a portable, OS-independent and realtime enabled core.
To get certified, this small realtime core should be come with 100% code coverage.
It should work on microcontrollers, or on a PREEMPT-RT patched linux. It should have a set of realtime API and communication API with the non realtime world. As an example, the presentation shows how to push CAN data to Infotainment.
PDF presentation available here
- Updated overview of AGL signaling
- Cybersecurity for Connected Vehicle with AGL (Automotive Grade Linux)
- Skim down AGL Application Framework to bridge AGL with hard realtime subsystems
- AGL application design
- 4A (Audio Advanced Architecture) Kickstart with AGL/FF
- Moving AGL toward production with the latest test/monitoring tools.
- From Connected Cars to Connected Boats
- Presentation of AGL
- AGL Development Tools, what's new in FF
- AGL & Real Time: Architecture Options
- Véhicule Connecté Cybersécurité et Open Source
- Projet Etudiant ENSIBS - Analyseurs Statiques de code
- Binding API version 3
- X(cross) Development System update - April 2018
- Vehicle 2 Cloud - Telematics and Data collection - April 2018
- AGL 4a and audio roadmap - April 2018
- Vehicle 2 Cloud - Signaling and Data collection - April 2018
- Industrialisation of applications build in embedded environment
- AGL Audio Advanced Architecture
- IoT.bzh and AGL presentation to ENSIBS' students
- Updated AGL Security Blueprint
- Cybersecurity a fundamental challenge for connected cars
- Deploy AGL OS and SDK as a Binary Packaging Distribution for Developer
- AGL integration of systemd and user management
- The AGL Swiss Knife for Quick Application Prototyping
- X(cross) Development System - make AGL app development easier
- Vehicle to Cloud: Connecting Cars to Non-Automotive Internet Services
- Low level CAN binding for AGL: a generic way to handle CAN signals
- AGL Development Kit - Features and Roadmap
- Vehicule Signaling Leveraging OpenXC
- AGL Security Framework Review
- Homescreen a New AGL Platform Service
- Cybersécurité et Véhicules Connectés
- Ostro Project Analysis
- AGL 2.0 - BSP Development Kit
- Connected cars & Security challenges
- Writing secure HTML5 applications for automotive systems
- Secure Boot - Secure Software Updates
- AGL-2.0 Security Architecture Proposal
- Automotive Grade Linux Security White Paper
- AGL Kickstart on Renesas Porter Board
- SDK for Application - Kickstart
- AGL Software Development Kit
- Leveraging Docker in Automotive projects based on AGL/GENIVI