• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Khadas VIM3L (yukawa)
2
3The [Khadas VIM3L](https://www.khadas.com/vim3l) is an extremely hackable development board with an
4Amlogic Armv8.2 SoC and complete upstream support in U-boot, Linux and even
5[AOSP](https://android.googlesource.com/device/amlogic/yukawa/+/refs/heads/master).
6That makes it a compelling target for testing virtualization.
7
8The [prebuilt kernel](https://android.googlesource.com/device/amlogic/yukawa-kernel/+/refs/heads/master)
9in AOSP is currently not GKI, but it is close and kept up to date.
10
11Note that the `yukawa` target has SELinux policy set to `permissive`.
12
13Resources:
14  * [AOSP instructions](https://android.googlesource.com/device/amlogic/yukawa/+/refs/heads/master/sei610/README)
15    for flashing a bootloader with `fastboot` support
16  * [Manufaturer's wiki](https://docs.khadas.com/vim3/index.html) for things like setting up UART
17    and entering recovery mode
18  * [go/vim3l](https://goto.google.com/vim3l) is a more detailed document but only accessible to
19    Google employees
20
21Build Android for the board:
22``` shell
23$ . build/envsetup.sh
24$ lunch yukawa-userdebug
25$ export TARGET_VIM3L=true
26$ export TARGET_KERNEL_USE=5.10
27$ m
28```
29
30Flash your device and reboot.
31