VIM3 A14 can't fetch 'extract-yukawa_devices-20241217.tgz'

Hi,

According to A14-AOSP document, need to fetch the vendor patch, but got the fetch error.

ming_hsu@minghsu:~/android/vim3/khadas-aosp-14$ ./device/amlogic/yukawa/fetch-vendor-package.sh
~/android/vim3/khadas-aosp-14 ~/android/vim3/khadas-aosp-14
Vendor package not present: fetching it
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100   146  100   146    0     0     41      0  0:00:03  0:00:03 --:--:--    41
extract-yukawa_devices-20241217.tgz: FAILED
sha512sum: WARNING: 1 computed checksum did NOT match

The URL is not exist, would you please help to check it.

Thanks.

My execution is normal. Is there any omission in your synchronization? Can you ping Google’s website?

xiong@server:/users2/xiong/work/amlogic/khadas-aosp-14$ ./device/amlogic/yukawa/fetch-vendor-package.sh
/users2/xiong/work/amlogic/khadas-aosp-14 /users2/xiong/work/amlogic/khadas-aosp-14
extract-yukawa_devices-20241217.tgz: OK

***** Extracting Firmware Binaries *****

vendor/
vendor/amlogic/
vendor/amlogic/yukawa/
vendor/amlogic/yukawa/bt-wifi-firmware/
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/brcmfmac4359-sdio.txt
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/BCM.hcd
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/version.mk
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/nvram_ap6359.txt
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/fw_bcm4359c0_ag.bin
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/BCM4356A2.hcd
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/vendor.mk
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/brcmfmac4359-sdio.bin
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/fw_bcm4356a2_ag.bin
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/brcmfmac4359-sdio.khadas,vim3l.bin
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/brcmfmac4359-sdio.khadas,vim3l.txt
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/Android.bp
vendor/amlogic/yukawa/bt-wifi-firmware/20241217/nvram_ap6356.txt
vendor/amlogic/yukawa/gpu/
vendor/amlogic/yukawa/gpu/20241217/
vendor/amlogic/yukawa/gpu/20241217/version.mk
vendor/amlogic/yukawa/gpu/20241217/Android.mk
vendor/amlogic/yukawa/gpu/20241217/dvalin_ion/
vendor/amlogic/yukawa/gpu/20241217/dvalin_ion/libGLES_mali_default_8a_32-p-r16p0gralloc1.so
vendor/amlogic/yukawa/gpu/20241217/dvalin_ion/libGLES_mali_default_8a_64-p-r16p0gralloc1.so
vendor/amlogic/yukawa/gpu/20241217/README
vendor/amlogic/yukawa/gpu/20241217/vendor.mk
vendor/amlogic/yukawa/gpu/20241217/END_USER_LICENCE_AGREEMENT.txt
vendor/amlogic/yukawa/gpu/20241217/gondul_ion/
vendor/amlogic/yukawa/gpu/20241217/gondul_ion/libGLES_mali_default_8a_32-p-r16p0gralloc1.so
vendor/amlogic/yukawa/gpu/20241217/gondul_ion/libGLES_mali_default_8a_64-p-r16p0gralloc1.so
vendor/amlogic/yukawa/gpu/20241217/Android.bp
vendor/amlogic/yukawa/video_firmware/
vendor/amlogic/yukawa/video_firmware/20241217/
vendor/amlogic/yukawa/video_firmware/20241217/version.mk
vendor/amlogic/yukawa/video_firmware/20241217/g12a_vp9.bin
vendor/amlogic/yukawa/video_firmware/20241217/gxl_mpeg4_5.bin
vendor/amlogic/yukawa/video_firmware/20241217/gxl_mjpeg.bin
vendor/amlogic/yukawa/video_firmware/20241217/vendor.mk
vendor/amlogic/yukawa/video_firmware/20241217/sm1_hevc_mmu.bin
vendor/amlogic/yukawa/video_firmware/20241217/sm1_vp9_mmu.bin
vendor/amlogic/yukawa/video_firmware/20241217/gxl_mpeg12.bin
vendor/amlogic/yukawa/video_firmware/20241217/g12a_hevc_mmu.bin
vendor/amlogic/yukawa/video_firmware/20241217/g12a_h264.bin
vendor/amlogic/yukawa/bootloader/
vendor/amlogic/yukawa/bootloader/20241217/
vendor/amlogic/yukawa/bootloader/20241217/version.mk
vendor/amlogic/yukawa/bootloader/20241217/u-boot_kvim3_ab.bin
vendor/amlogic/yukawa/bootloader/20241217/README
vendor/amlogic/yukawa/bootloader/20241217/vendor.mk
vendor/amlogic/yukawa/bootloader/20241217/tools/
vendor/amlogic/yukawa/bootloader/20241217/tools/update
vendor/amlogic/yukawa/bootloader/20241217/u-boot_kvim3l_ab.bin
vendor/amlogic/yukawa/bootloader/20241217/u-boot_sei610_ab.bin
vendor/amlogic/yukawa/bootloader/20241217/fip_packages/
vendor/amlogic/yukawa/bootloader/20241217/fip_packages/fip-collect-g12b-kvim3-khadas-vims-pie-20210111-211833.tar.gz
vendor/amlogic/yukawa/bootloader/20241217/fip_packages/fip-collect-g12a-sm1_ac214_v1-amlogic-dev_9.2.1811_21-20191204-161855.tar.gz
vendor/amlogic/yukawa/bootloader/20241217/fip_packages/fip-collect-g12a-g12a_u200_v1-amlogic-dev_9.2.1811_21-20191203-113239.tar.gz
vendor/amlogic/yukawa/bootloader/20241217/fip_packages/fip-collect-g12a-kvim3l-khadas-vims-pie-20210111-211224.tar.gz
vendor/amlogic/yukawa/bootloader/20241217/scripts/
vendor/amlogic/yukawa/bootloader/20241217/scripts/generate-bins-new.sh
vendor/amlogic/yukawa/bootloader/20241217/scripts/collect-khadas_binaries-git-refboard.sh
vendor/amlogic/yukawa/bootloader/20241217/u-boot_sei510.bin

Files extracted successfully.
/users2/xiong/work/amlogic/khadas-aosp-14
xiong@server:/users2/xiong/work/amlogic/khadas-aosp-14$ 

Hi,

For the script “fetch-vendor-package.sh”, looks the URL is “h t t p s://public-amlogic-binaries-baylibre-com/ci/vendor_packages/20241217/extract-yukawa_devices-20241217.tgz”, but website response 404 not found.

From this “VIM3/VIM3L AOSP Android 14.0 Upside Down Cake - #152 by Bhushan_Patil”, looks it’s the same problem.

Thanks.


Q: Can you ping Google’s website?
A: Yes, I can ping the google & public-amlogic-binaries-baylibre-com.

ming_hsu@minghsu:~/work$ ping www.google.com
PING www.google.com (142.250.198.68) 56(84) bytes of data.
64 bytes from lctsaa-ab-in-f4.1e100.net (142.250.198.68): icmp_seq=1 ttl=110 time=4.94 ms
^C
--- www.google.com ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 4.935/4.935/4.935/0.000 ms
ming_hsu@minghsu:~/work$ ping public.amlogic.binaries.baylibre.com
PING binaries.baylibre.com (35.187.164.141) 56(84) bytes of data.
64 bytes from 141.164.187.35.bc.googleusercontent.com (35.187.164.141): icmp_seq=1 ttl=92 time=259 ms
^C
--- binaries.baylibre.com ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 1002ms
rtt min/avg/max/mdev = 258.761/258.761/258.761/0.000 ms

Thanks.

The link below is the complete code. After downloading, check whether the md5 is consistent, and then use the following command to decompress it

cat vim3_aosp_14.tar.gz.a* | tar -xzv

Note that after decompression, do not repo the synchronization code

File shared through the network disk: vim3_AOSP_14
Link: https://pan.baidu.com/s/1nTm73Df3yaTDcuJxaKkdxA?pwd=3a1p Extraction code: 3a1p

1 Like