1# Khadas VIM3L (yukawa) 2 3The [Khadas VIM3L](https://www.khadas.com/vim3l) is an extremely hackable development board with an 4Amlogic Armv8.2 SoC and complete upstream support in U-boot, Linux and even 5[AOSP](https://android.googlesource.com/device/amlogic/yukawa/+/refs/heads/master). 6That makes it a compelling target for testing virtualization. 7 8The [prebuilt kernel](https://android.googlesource.com/device/amlogic/yukawa-kernel/+/refs/heads/master) 9in AOSP is currently not GKI, but it is close and kept up to date. 10 11Note that the `yukawa` target has SELinux policy set to `permissive`. 12 13Resources: 14 * [AOSP instructions](https://android.googlesource.com/device/amlogic/yukawa/+/refs/heads/master/sei610/README) 15 for flashing a bootloader with `fastboot` support 16 * [Manufaturer's wiki](https://docs.khadas.com/vim3/index.html) for things like setting up UART 17 and entering recovery mode 18 * [go/vim3l](https://goto.google.com/vim3l) is a more detailed document but only accessible to 19 Google employees 20 21Build Android for the board: 22``` shell 23$ . build/envsetup.sh 24$ lunch yukawa-userdebug 25$ export TARGET_VIM3L=true 26$ export TARGET_KERNEL_USE=5.10 27$ m 28``` 29 30Flash your device and reboot. 31