20.10.2015 Views

Compatibility Definition

2f44OdUf0

2f44OdUf0

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

skipped or omitted.<br />

Every device and every build MUST correctly run the CTS Verifier, as noted above. However, since<br />

many builds are very similar, device implementers are not expected to explicitly run the CTS Verifier<br />

on builds that differ only in trivial ways. Specifically, device implementations that differ from an<br />

implementation that has passed the CTS Verifier only by the set of included locales, branding, etc.<br />

MAY omit the CTS Verifier test.<br />

11. Updatable Software<br />

Device implementations MUST include a mechanism to replace the entirety of the system software.<br />

The mechanism need not perform “live” upgrades—that is, a device restart MAY be required.<br />

Any method can be used, provided that it can replace the entirety of the software preinstalled on the<br />

device. For instance, any of the following approaches will satisfy this requirement:<br />

“Over-the-air (OTA)” downloads with offline update via reboot<br />

“Tethered” updates over USB from a host PC<br />

“Offline” updates via a reboot and update from a file on removable storage<br />

However, if the device implementation includes support for an unmetered data connection such as<br />

802.11 or Bluetooth PAN (Personal Area Network) profile:<br />

Android Automotive implementations SHOULD support OTA downloads with offline update<br />

via reboot.<br />

All other device implementations MUST support OTA downloads with offline update via<br />

reboot.<br />

The update mechanism used MUST support updates without wiping user data. That is, the update<br />

mechanism MUST preserve application private data and application shared data. Note that the<br />

upstream Android software includes an update mechanism that satisfies this requirement.<br />

For device implementations that are launching with Android 6.0 and later, the update mechanism<br />

SHOULD support verifying that the system image is binary identical to expected result following an<br />

OTA. The block-based OTA implementation in the upstream Android Open Source Project, added<br />

since Android 5.1, satisfies this requirement.<br />

If an error is found in a device implementation after it has been released but within its reasonable<br />

product lifetime that is determined in consultation with the Android <strong>Compatibility</strong> Team to affect the<br />

compatibility of third-party applications, the device implementer MUST correct the error via a software<br />

update available that can be applied per the mechanism just described.<br />

Android includes features that allow the Device Owner app (if present) to control the installation of<br />

system updates. To facilitate this, the system update subsystem for devices that report<br />

android.software.device_admin MUST implement the behavior described in the SystemUpdatePolicy<br />

class [ Resources, 138].<br />

12. Document Changelog<br />

The following table contains a summary of the changes to the <strong>Compatibility</strong> <strong>Definition</strong> in this release.<br />

Various<br />

Section<br />

Summary of changes<br />

Replaced instances of the "encouraged" term with "RECOMMENDED"<br />

2. Device Types Update for Android Automotive implementations<br />

3.2.2. Build Parameters Additions for the hardware serial number and for the security patch level of<br />

a build<br />

Page 67 of 74

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!