1.2 KiB
1.2 KiB
Khadas VIM3L (yukawa)
The Khadas VIM3L is an extremely hackable development board with an Amlogic Armv8.2 SoC and complete upstream support in U-boot, Linux and even AOSP. That makes it a compelling target for testing virtualization.
The prebuilt kernel in AOSP is currently not GKI, but it is close and kept up to date.
Note that the yukawa
target has SELinux policy set to permissive
.
Resources:
- AOSP instructions
for flashing a bootloader with
fastboot
support - Manufaturer's wiki for things like setting up UART and entering recovery mode
- go/vim3l is a more detailed document but only accessible to Google employees
Build Android for the board:
$ . build/envsetup.sh
$ lunch yukawa-userdebug
$ export TARGET_VIM3L=true
$ export TARGET_KERNEL_USE=5.4
$ m -j$(nproc)
Flash your device and reboot.