Khadas VIM3L (yukawa)

The Khadas VIM3L is an extremely hackable development board with an Amlogic Armv8.2 SoC and complete upstream support in U-boot, Linux and even AOSP. That makes it a compelling target for testing virtualization.

The prebuilt kernel in AOSP is currently not GKI, but it is close and kept up to date.

Note that the yukawa target has SELinux policy set to permissive.

Resources:

  • AOSP instructions for flashing a bootloader with fastboot support
  • Manufaturer's wiki for things like setting up UART and entering recovery mode
  • go/vim3l is a more detailed document but only accessible to Google employees

Build Android for the board:

$ . build/envsetup.sh
$ lunch yukawa-userdebug
$ export TARGET_VIM3L=true
$ export TARGET_KERNEL_USE=5.10
$ m

Flash your device and reboot.