1
Case Study: Hacking the Lego Mindstorms EV3
Andreas Grapentin
Operating Systems and Middleware Group
2018-11-28
Case Study: Hacking the Lego Mindstorms EV3 Andreas Grapentin - - PowerPoint PPT Presentation
1 Case Study: Hacking the Lego Mindstorms EV3 Andreas Grapentin Operating Systems and Middleware Group 2018-11-28 2 The Mission Control a simple real-time task on the Lego Mindstorms EV3 > without using the installed Operating System 3
1
Andreas Grapentin
Operating Systems and Middleware Group
2018-11-28
2
3
4
5
6
7
8
9
EV3 i n i t i a l i z a t i o n passed ! Booting EV3 EEprom Boot Loader EEprom Version : 0.60 EV3 Flashtype : N25Q128A13B [ . . . ]
10
11
EV3 i n i t i a l i z a t i o n passed ! Booting EV3 EEprom Boot Loader EEprom Version : 0.60 EV3 Flashtype : N25Q128A13B [ . . . ] Hit ’ l ’ to stop autoboot : [ . . . ]
12
U- Boot > printenv bootcmd=i f mmc rescan 0; then i f run loadbootscr ; then run \ b o o t s c r i p t ; e l s e i f run loadimage ; then run mmcargs ; run \ mmcboot ; e l s e run f l a s h a r g s ; run f la sh boo t ; f i ; f i ; e l s e \ run f l a s h a r g s ; run f la shb oo t ; f i loadbootscr=f a t l o a d mmc 0 ${ bootscraddr } boot . scr b o o t s c r i p t=source ${ bootscraddr } loadimage=f a t l o a d mmc 0 ${ loadaddr } uImage mmcboot=bootm ${ loadaddr } [ . . . ]
13
i f sd card i s i n s e r t e d i f boot . scr f i l e e x i s t s
load and source boot . scr e l s e i f uImage f i l e e x i s t s
load and boot from sd card e l s e load and boot from f l a s h f i f i e l s e load and boot from f l a s h f i
14
15
lms2012/open_fjrst/Makefjle: $ (UBOOT)/u - boot . bin : $ (MAKE)
da850_omapl138_evm_config $ (MAKE)
a l l
16
◮ https://github.com/mindboards/ev3sources ◮ https://publishup.uni-potsdam.de/opus4-ubp/frontdoor/deliver/index/docId/ 7063/file/tbhpi90.pdf ◮ https://github.com/ninjastorms/ninjastorms ◮ https://github.com/ninjastorms/toolchain-generator ◮ http://botbench.com/blog/2013/08/15/ev3-creating-console-cable/ ◮ https://www.lego.com/de-de/mindstorms/downloads