NameLast modifiedSizeLicense

Parent Directory Parent Directory
application/pdf CE-AOSP-RPB-15.12-HiKey-TestReport.pdf 28-Feb-2018 17:29 114.3K open
other MANIFEST 28-Feb-2018 17:29 230 open
other MD5SUMS 28-Feb-2018 17:29 277 open
application/x-tar boot_fat.uefi.img.tar.xz 28-Feb-2018 17:29 5.9M open
folder bootloader -
application/x-tar cache.img.tar.xz 28-Feb-2018 17:29 1.6K open
text installed-files.txt 28-Feb-2018 17:29 79.5K open
other kernel_config 28-Feb-2018 17:29 104.0K open
application/x-sh 28-Feb-2018 17:29 8.3K open
text pinned-manifest.xml 28-Feb-2018 17:29 82.1K open
text source-manifest.xml 28-Feb-2018 17:29 46.4K open
application/x-tar system.img.tar.xz 28-Nov-2018 00:02 261.3M linaro
application/x-tar userdata-8gb.img.tar.xz 28-Feb-2018 17:29 363.3K open
application/x-tar userdata.img.tar.xz 28-Feb-2018 17:29 351.2K open

Install Instructions – CE AOSP RPB 15.12 – HiKey

This guide describes how to get started with the CE AOSP Reference Platform Build, release 15.12, for HiKey.

For more information about the HiKey development board, please check

Image Components

The CE AOSP RPB 15.12 – HiKey build is composed of the following artifacts:

Closed source binaries

The following components requires a closed source binary for better hardware support:

Downloading the pre-built binaries

The build is composed by the traditional Android image files (boot, cache, system and userdata), but to avoid incompatibilities issues with older bootloaders, or different partition tables, it’s also recommended to flash the bootloader.

Bootloader files:


CE AOSP RPB image:


Since system.img requires the user to accept an End User License Agreement covering the rights to download and use the proprietary Mali userspace driver, it needs to be manually downloaded via browser. Please go to and follow the instructions to download the file.

Uncompress the .tar.xz files using your operating system file manager, or with the following command, for each file:

xz --decompress [filename].tar.xz; tar -xvf [filename].tar



To flash the bootloader the recovery mode is required. For more information about the recovery mode, how to enable and use, please go to

Now you need to identify if your device contains 4G or 8G of eMMC (LeMaker produces 2 HiKey versions, one with 4G and another with 8G of storage). The ptable-aosp and userdata files will differ depending on the board you have.

On recovery mode, flash the bootloader with the following command:

sudo python --img1=l-loader.bin -d /dev/ttyUSB0

Then on a 4G compatible device:

sudo fastboot flash ptable ptable-aosp-4g.img

Or the following on a 8G compatible device:

sudo fastboot flash ptable ptable-aosp-8g.img

Then flash UEFI:

sudo fastboot flash fastboot fip.bin

Change ttyUSB0 to the right interface name that gets exported to your host system.

Make sure to reboot the board after updating the partition table (ptable-aosp), otherwise flashing the system image might fail.

Boot, System, Cache and Userdata

Fastboot is required to flash boot, system, cache and userdata.

Flashing boot, cache, system and userdata:

Enable fastboot (either via recovery or by changing the boot jumpers), and then just flash the required files:

sudo fastboot flash boot boot_fat.uefi.img
sudo fastboot flash cache cache.img
sudo fastboot flash system system.img
sudo fastboot flash system system.img
sudo fastboot flash nvme nvme.img

Then on a 4G compatible device:

sudo fastboot flash userdata userdata.img

Or the following on a 8G compatible device:

sudo fastboot flash userdata userdata-8gb.img

Once flashed, make sure recovery mode is not enabled (pin3-pin4 on J15), that you don’t have any sd card in place (since it first tries to boot from sd card, boot order can be changed with sudo fastboot oem bootdevice [emmc|sd]), then just reboot the board and enjoy :-)

Additional resources

For known issues and more information about this release, please check