Welcome to the Android 14 Beta! Please give us your feedback, and help us make Android 14 the best release yet.

Compatibility framework changes (Android 14)

Figure 1. The App Compatibility Changes screen in developer options lists the changes that you can toggle.

This page describes toggleable changes that are part of the compatibility framework in Android 14. Use this list in conjunction with the developer options and ADB commands to test and debug your app as you prepare to support and target Android 14.

Here are some of the things you can do using the compatibility framework tools:

  • Test targeted changes without actually changing the app's targetSdkVersion. You can use the toggles to force-enable specific targeted behavior changes to evaluate the impact on your existing app.
  • Focus your testing on specific changes only. Rather than having to address all targeted changes at once, the toggles let you disable all targeted changes except the ones you want to test against.
  • Manage toggles through adb. You can use adb commands to enable and disable the toggleable changes in your automated test environment.
  • Debug faster using standard change IDs. Toggleable changes each have a unique ID and name that you can use to quickly debug root cause in log output.

For complete details on using the tools for each of these use cases, see Compatibility framework tools.

Behavior changes included in the compatibility framework

The list in this section describes toggleable changes that are included in the compatibility framework in Android 14.

You can filter the list of changes by their Default State.

Toggleable changes in the compatibility framework in Android 14

ACCESS_SHARED_IDENTITY

Change ID: 259743961
Default State: Enabled for all apps.

Grants access to the launching app's identity if the app opted-in to sharing its identity by launching this activity with an instance of ActivityOptions on which ActivityOptions.setShareIdentityEnabled(boolean) was invoked with a value of true, or if the launched activity's uid is the same as the launching app's. When this change is enabled and one of these requirements is met, the activity can access the launching app's uid and package name with Activity.getLaunchedFromUid() and Activity.getLaunchedFromPackage(), respectively.

ALWAYS_SANDBOX_DISPLAY_APIS

Change ID: 185004937
Default State: Disabled for all apps.

When enabled, applies Display API sandboxing to a package regardless of windowing mode. The Display APIs will always provide the app bounds.

To learn more about this change, see the section in the Android 12 behavior changes page about Display methods that were deprecated.

ANR_PRE_UDC_APIS_ON_SLOW_RESPONSES

Change ID: 258236856
Default State: Enabled for apps that target Android 14 or higher.

When enabled, triggers an "Application Not Responding" (ANR) message when apps are slow to respond on APIs and functionality from Android 13 (API level 33) or lower.

AUTHORITY_ACCESS_CHECK_CHANGE_ID

Change ID: 207133734
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, enables checking for authority access for the calling UID on all sync-related APIs.

CAMERA_MIC_INDICATORS_NOT_PRESENT

Change ID: 162547999
Default State: Disabled for all apps.

Indicates that this device supports camera and microphone indicators. Will be false if present, because the CompatChanges#isChangeEnabled method returns true if the Change ID is not present.

DEFAULT_RESCIND_BAL_FG_PRIVILEGES_BOUND_SERVICE

Change ID: 244637991
Default State: Enabled for apps that target Android 14 or higher.

When an app sends a PendingIntent using PendingIntent#send() or similar methods, the app must now opt in if it wants to grant its own background activity launch privileges to start the pending intent.

To learn more about this change, see the section in the Android 14 behavior changes page about additional restrictions on starting activities from the background.

DETACH_THROWS_ISE_ONLY

Change ID: 236825255
Default State: Enabled for apps that target Android 14 or higher.

Flag to gate correct exception thrown by #detachImage.

#detachImage is documented as throwing IllegalStateException in the event of an error; a native helper method to this threw RuntimeException if the surface was abandoned while detaching the Image.

This previously undocumented exception behavior continues through Android 13 (API level 33).

After Android 13 (API level 33), the native helper method only throws IllegalStateExceptions in accordance with the documentation.

When this change is enabled, #detachImage only throws an IllegalStateException if it runs into errors while detaching the image. Behavior remains unchanged for apps targeting Android 13 (API level 33) and lower.

DOWNSCALED

Change ID: 168419799
Default State: Disabled for all apps.

This change is the gatekeeper of all per-app buffer downscaling changes. Disabling this change prevents the following scaling factors from working:

When this change is enabled for an app package, the app is forcibly resized to the highest enabled scaling factor. For example, 80% is used if both 80% and 70% are enabled.

DOWNSCALE_30

Change ID: 189970040
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 30% vertical and horizontal resolution of the real display.

DOWNSCALE_35

Change ID: 189969749
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 35% vertical and horizontal resolution of the real display.

DOWNSCALE_40

Change ID: 189970038
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 40% vertical and horizontal resolution of the real display.

DOWNSCALE_45

Change ID: 189969782
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 45% vertical and horizontal resolution of the real display.

DOWNSCALE_50

Change ID: 176926741
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 50% vertical and horizontal resolution of the real display.

DOWNSCALE_55

Change ID: 189970036
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 55% vertical and horizontal resolution of the real display.

DOWNSCALE_60

Change ID: 176926771
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 60% vertical and horizontal resolution of the real display.

DOWNSCALE_65

Change ID: 189969744
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 65% vertical and horizontal resolution of the real display.

DOWNSCALE_70

Change ID: 176926829
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 70% vertical and horizontal resolution of the real display.

DOWNSCALE_75

Change ID: 189969779
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 75% vertical and horizontal resolution of the real display.

DOWNSCALE_80

Change ID: 176926753
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 80% vertical and horizontal resolution of the real display.

DOWNSCALE_85

Change ID: 189969734
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 85% vertical and horizontal resolution of the real display.

DOWNSCALE_90

Change ID: 182811243
Default State: Disabled for all apps.

When DOWNSCALED is also enabled, enabling this change for a package forces the app to assume it's running on a display with 90% vertical and horizontal resolution of the real display.

DYNAMIC_RECEIVER_EXPLICIT_EXPORT_REQUIRED

Change ID: 161145287
Default State: Disabled for all apps.

When enabled, requires an app to explicitly set either Context.RECEIVER_EXPORTED or Context.RECEIVER_NOT_EXPORTED when registering a receiver for an unprotected broadcast in code.

To learn more, see the section on Safer exporting of context-registered receivers.

ENABLE_PLATFORM_MDNS_BACKEND

Change ID: 270306772
Default State: Enabled for apps that target Android 14 or higher.

Apps targeting Android 14 or higher use a platform-integrated mDNS implementation as backend, while apps targeting previous versions continue to use a legacy Network service discovery (NSD) backend (with a legacy native daemon as NsdManager backend).

ENABLE_SELF_CERTIFIED_CAPABILITIES_DECLARATION

Change ID: 266524688
Default State: Enabled for apps that target Android 14 or higher.

The self-certified capabilities check is enabled for apps targeting Android 14 or higher. See NetworkCapabilities for more details.

ENFORCE_PACKAGE_VISIBILITY_FILTERING

Change ID: 154726397
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, requires apps to declare package visibility needs in the manifest in order to access the AccountManager APIs.

ENFORCE_READ_ONLY_JAVA_DCL

Change ID: 218865702
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, requires all dynamically-loaded files to be marked as read-only. This prevents files that are dynamically loaded from being unexpectedly overwritten by malicious actors.

ENFORCE_STRICT_QUERY_BUILDER

Change ID: 143231523
Default State: Disabled for all apps.

When enabled, the SQLiteQueryBuilder verifies all CalendarProvider2 query selections against malicious arguments.

FGS_TYPE_CHECK_FOR_INSTANT_APPS

Change ID: 261055255
Default State: Enabled for apps that target Android 14 or higher.

When enabled, instant apps must specify appropriate foreground service types for any services that are declared in the app's manifest file.

To learn more about this change, see the page describing the changes to foreground service types.

FGS_TYPE_NONE_DEPRECATION_CHANGE_ID

Change ID: 255042465
Default State: Enabled for apps that target Android 14 or higher.

When enabled, apps targeting Android 14 and higher that start a foreground service using the deprecated FOREGROUND_SERVICE_TYPE_NONE type results in a warning in the log.

To learn more about this change, see the page describing the changes to foreground service types.

FGS_TYPE_NONE_DISABLED_CHANGE_ID

Change ID: 255038118
Default State: Enabled for apps that target Android 14 or higher.

When enabled, apps targeting Android 14 and higher that start a foreground service using the deprecated FOREGROUND_SERVICE_TYPE_NONE type results in an exception.

To learn more about this change, see the page describing the changes to foreground service types.

FGS_TYPE_PERMISSION_CHANGE_ID

Change ID: 254662522
Default State: Enabled for apps that target Android 14 or higher.

When enabled, apps targeting Android 14 and higher that start a foreground service without the required permissions associated with that foreground service's type results in a SecurityException.

To learn more about this change, see the page describing the changes to foreground service types.

FORCE_DISABLE_HEVC_SUPPORT

Change ID: 174227820
Default State: Disabled for all apps.

Force disable an app from supporting the HEVC media capability. Apps should declare their supported media capabilities in their manifest but this flag can be used to force an app into not supporting HEVC, hence forcing transcoding while accessing media encoded in HEVC. Setting this flag will override any OS level defaults for apps. It is disabled by default, meaning that the OS defaults take precedence. Setting this flag and FORCE_ENABLE_HEVC_SUPPORT is an undefined state and will result in the OS ignoring both flags.

FORCE_ENABLE_HEVC_SUPPORT

Change ID: 174228127
Default State: Disabled for all apps.

Force enable an app to support the HEVC media capability Apps should declare their supported media capabilities in their manifest but this flag can be used to force an app into supporting HEVC, hence avoiding transcoding while accessing media encoded in HEVC. Setting this flag will override any OS level defaults for apps. It is disabled by default, meaning that the OS defaults would take precedence. Setting this flag and FORCE_DISABLE_HEVC_SUPPORT is an undefined state and will result in the OS ignoring both flags.

FORCE_NON_RESIZE_APP

Change ID: 181146395
Default State: Disabled for all apps.

Forces the packages it is applied to to be non-resizable.

FORCE_RESIZE_APP

Change ID: 174042936
Default State: Disabled for all apps.

Forces the packages it is applied to to be resizeable. We only allow resizing in fullscreen windowing mode, but not forcing the app into resizeable multi-windowing mode.

GWP_ASAN

Change ID: 145634846
Default State: Disabled for all apps.

Enables sampled native memory bug detection in apps.

To learn more about using GWP-ASan, see the GWP-ASan guide.

IMPLICIT_INTENTS_ONLY_MATCH_EXPORTED_COMPONENTS

Change ID: 229362273
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, components must be exported in order to invoke them through implicit intents. If a component is not exported and invoked, it will be removed from the list of receivers. This applies specifically to activities and broadcasts.

KEYSTORE_OPERATION_CREATION_MAY_FAIL

Change ID: 169897160
Default State: Disabled for all apps.

When enabled, keystore operation creation might fail according to the new pruning strategy. Keystore used to work under the assumption that the creation of cryptographic operations always succeeds. However, the KeyMint backend has only a limited number of operation slots.

In order to keep up the appearance of "infinite" operation slots, the Keystore daemon would prune least recently used operations if there was no available operation slot. As a result, good operations could be terminated prematurely. This opened up AndroidKeystore up to denial-of-service (DoS) and unintended livelock. For example, if multiple apps woke up at the same time due to power management optimizations and attempted to perform crypto operations, they start terminating each others operations without making any progress.

To break out of livelocks and to discourage DoS attempts, we have changed the pruning strategy for such that it prefers clients that use few operation slots briefly. As a result, single operations that don't linger inactive for more than 5 seconds will almost always conclude unhampered by the pruning strategy. There are still some operations related to file system encryption that can prune even these operations, but those cases are extremely rare. As a side effect of this new pruning strategy operation, creation can now fail if the client has a lower pruning power than all of the existing operations.

Pruning strategy: To find a suitable candidate, we compute the malus for the caller and each existing operation. The malus is the inverse of the pruning power (caller) or pruning resistance (existing operation). For the caller to be able to prune an operation, it must find an operation with a malus higher than its own. For more details on the pruning strategy, see the implementation of operation.rs. On Android 11 (API level 30) and lower, KeyStore2 will poll the Keystore daemon for a free operation slot. For apps targeting Android 11 (API level 30) and lower, it will still look like cipher and signature object initialization always succeeds—however, it may take longer to get an operation. All Android versions benefit from fairer operation slot scheduling and a better chance to successfully conclude an operation.

NATIVE_HEAP_ZERO_INIT

Change ID: 178038272
Default State: Disabled for all apps.

Enable automatic zero-initialization of native heap memory allocations.

NATIVE_MEMTAG_ASYNC

Change ID: 145772972
Default State: Disabled for all apps.

Enable asynchronous (ASYNC) memory tag checking in this process. This flag only affects hardware supporting the ARM Memory Tagging Extension (MTE).

NATIVE_MEMTAG_SYNC

Change ID: 177438394
Default State: Disabled for all apps.

Enables synchronous (SYNC) memory tag checking in this process. This flag only affects hardware supporting the ARM Memory Tagging Extension (MTE). If both NATIVE_MEMTAG_ASYNC and this option are enabled, this option takes precedence and MTE is enabled in SYNC mode.

NEVER_SANDBOX_DISPLAY_APIS

Change ID: 184838306
Default State: Disabled for all apps.

When enabled, prevents Display API sandboxing from applying to a letterbox or SCM activity. The Display APIs will continue to provide DisplayArea bounds.

To learn more about this change, see the section in the Android 12 behavior changes page about Display methods that were deprecated.

OVERRIDE_CAMERA_RESIZABLE_AND_SDK_CHECK

Change ID: 191514214
Default State: Disabled for all apps.

When enabled this change id forces the packages it is applied to ignore the current value of android:resizeableActivity as well as target SDK equal to or below M and consider the activity as non-resizeable. In this case, the value of camera rotate and crop will only depend on the needed compensation considering the current display rotation.

OVERRIDE_CAMERA_ROTATE_AND_CROP_DEFAULTS

Change ID: 189229956
Default State: Disabled for all apps.

When enabled this change id forces the packages it is applied to override the default camera rotate and crop behavior and always return CaptureRequest.SCALER_ROTATE_AND_CROP_NONE. The default behavior along with all possible override combinations is discussed in the table below.

OVERRIDE_MIN_ASPECT_RATIO

Change ID: 174042980
Default State: Disabled for all apps.

This change is the gatekeeper of all changes that force a given minimum aspect ratio. Enabling this change allows the following minimum aspect ratios to be applied:

When this change is enabled for an app package, the minimum aspect ratio given in the app's manifest is overridden to the largest enabled aspect ratio unless the app's manifest value is higher.

OVERRIDE_MIN_ASPECT_RATIO_LARGE

Change ID: 180326787
Default State: Disabled for all apps.

When OVERRIDE_MIN_ASPECT_RATIO is also enabled, enabling this change for a package sets the activity's minimum aspect ratio to a large value as defined by OVERRIDE_MIN_ASPECT_RATIO_LARGE_VALUE.

OVERRIDE_MIN_ASPECT_RATIO_MEDIUM

Change ID: 180326845
Default State: Disabled for all apps.

When OVERRIDE_MIN_ASPECT_RATIO is also enabled, enabling this change for a package sets the activity's minimum aspect ratio to a medium value as defined by OVERRIDE_MIN_ASPECT_RATIO_MEDIUM_VALUE.

OVERRIDE_MIN_ASPECT_RATIO_PORTRAIT_ONLY

Change ID: 203647190
Default State: Enabled for all apps.

When OVERRIDE_MIN_ASPECT_RATIO is also enabled, enabling this change for a package limits any other changes that force an activity's minimum aspect ratio to a certain value—such as OVERRIDE_MIN_ASPECT_RATIO_LARGE and OVERRIDE_MIN_ASPECT_RATIO_MEDIUM—to activities that also have a portrait orientation.

RATE_LIMIT_TOASTS

Change ID: 174840628
Default State: This change can't be toggled. It is only logged by the compatibility framework.

Enables rate limiting on the number of Toast.show() calls to prevent overburdening the user with too many toasts in a limited time. Any attempt to show more toasts than allowed in a certain time frame will result in the toast being discarded.

REJECT_NEGATIVE_NETWORK_ESTIMATES

Change ID: 253665015
Default State: Enabled for apps that target Android 14 or higher.

When enabled, requires that estimated network bytes are nonnegative.

REQUIRE_NETWORK_CONSTRAINT_FOR_NETWORK_JOB_WORK_ITEMS

Change ID: 241104082
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, requires the hosting job to specify a network constraint if the included JobWorkItem indicates network usage.

REQUIRE_NETWORK_PERMISSIONS_FOR_CONNECTIVITY_JOBS

Change ID: 271850009
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, requires apps to specify both the INTERNET and ACCESS_NETWORK_STATE permissions when scheduling a job with a connectivity constraint.

THROW_ON_INVALID_DATA_TRANSFER_IMPLEMENTATION

Change ID: 255371817
Default State: Enabled for apps that target Android 14 or higher.

For apps targeting Android 14 and higher, the system throws an exception if an app doesn't properly implement all the necessary data transfer APIs.

USE_EXPERIMENTAL_COMPONENT_ALIAS

Change ID: 196254758
Default State: Disabled for all apps.

When enabled, the system allows the "android" package to use component aliases.