Commit Graph

10985 Commits

Author SHA1 Message Date
Remi NGUYEN VAN
1b5c5f72f9 Merge "Take the multicast lock on mDNS usage" am: 5f921c4292
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2606585

Change-Id: Iecc8f43613314301a81d883d91351a1223893469
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-06 08:46:02 +00:00
Treehugger Robot
1667bfea04 Merge "Update record receipt time on records updated" 2023-06-06 08:34:39 +00:00
Yuyang Huang
86f674187f Update record receipt time on records updated
The receipt time in the MdnsResponse need to be updated every time new
packet is received. And then the record refreshing logic could calculate
remaining TTL correctly.

Bug: 285260665
Test: atest CtsNetTest FrameworksNetTests
Change-Id: Ib7a290ea0ea8e552c71c657696397e8114fcee52
2023-06-06 12:55:27 +09:00
Remi NGUYEN VAN
a8efbe0e32 Take the multicast lock on mDNS usage
When an mDNS request (discovery, advertising, resolving...) is
registered and gets assigned a socket on a wifi network, take the
multicast lock to ensure that it can reliably receive mDNS responses.

This is limited to when the application has importance
FOREGROUND_SERVICE or higher.
NsdManager is not documented to require usage of the multicast lock,
which has caused various reports about its reliability. Taking the lock
while the app is in the foreground should address the large majority of
cases, while limiting battery impact.

Going forward this should allow developers on U+ to not take the
lock themselves, allowing optimizations on devices supporting APF,
where instead of taking the lock APF would let through only select
mDNS packets.

Bug: 284389438
Test: atest
Change-Id: I1ce85220eac4a1529b6716d50727c1c462356846
2023-06-06 11:13:34 +09:00
Aaron Huang
9fe47bee09 Fix a bug where the PAC proxy port is not set correctly.
Test: new test for this behavior in the preliminary change
Test: FrameworksNetTests NetworkStackTests
Fixes: 138810051
Fixes: 140610528
Change-Id: I95a979d232fb60ece2e33e972bf5d66d20357a1f
2023-06-05 20:24:59 +09:00
Maciej Żenczykowski
fb12b4ad40 On U+ require config_networkWakeupPacketMark/Mask to be 0x80000000 am: f310a14d53
Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23560649

Change-Id: I09b9d6caea14179c065ab719c5141a2cc8b27a2c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 10:31:32 +00:00
Treehugger Robot
30e5b6fae0 Merge "On U+ require config_networkWakeupPacketMark/Mask to be 0x80000000" am: c133f6e29c
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2612991

Change-Id: I24f6f99eb7c1a0c196b5167c5df6c16cf0f51d15
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 10:15:05 +00:00
Motomu Utsumi
b0594f1dee Merge changes from topic "cherrypicker-L21100000961067008:N34400001375316978" into udc-dev
* changes:
  Instrument SDK level and change IDs to help testing
  Use "don't actively prefer" timeout when avoiding bad wifi
2023-06-05 10:11:55 +00:00
Motomu Utsumi
15e4b5ccfb Merge changes from topic "cherrypicker-L21100000961067008:N34400001375316978" into udc-dev
* changes:
  Use netd socketDestroy for VPN in T-
  Revert ConnectivityServiceDependencies access modifier
2023-06-05 10:11:55 +00:00
Chalard Jean
03552c4bff Instrument SDK level and change IDs to help testing
This patch mocks the SDK level and/or change IDs to help
developing functionality that depends on these without
having to flash a new device every time.

Test: TH
(cherry picked from https://android-review.googlesource.com/q/commit:df29a85ee70e56a888c82e4e885ab6f775416ff7)
Bug: 284253763
Merged-In: I1011193c99e123a0e5501ed313c9cecbceebdae6
Change-Id: I1011193c99e123a0e5501ed313c9cecbceebdae6
2023-06-05 10:11:45 +00:00
Chalard Jean
1f2b50f21b Use "don't actively prefer" timeout when avoiding bad wifi
Bug: 281970908
Bug: 284253763
Test: ConnectivityServiceTest
(cherry picked from https://android-review.googlesource.com/q/commit:6f6c353baf746cc4cbb6d99d81941f2d70207d39)
Merged-In: I6e99aff77c55805630d878e472f466bd31bba360
Change-Id: I6e99aff77c55805630d878e472f466bd31bba360
2023-06-05 09:48:35 +00:00
Treehugger Robot
c133f6e29c Merge "On U+ require config_networkWakeupPacketMark/Mask to be 0x80000000" 2023-06-05 09:34:47 +00:00
Maciej Żenczykowski
f310a14d53 On U+ require config_networkWakeupPacketMark/Mask to be 0x80000000
See system/netd/include/Fwmark.h which reserves the bottom 21 bits
of skb->mark for netid, etc... so out of necessity these have to be
in the top 11 bits.

In practice the only values that really make sense are either:
  mark == mask == 0 (disabled)
or (mark == mask) being one of the top 11 available bits, for example:
  mark == mask == 0x80000000 (enabled, using top-most bit)
(only a single bit makes sense, as this is really just a boolean signal,
 and only the topmost is known to be used on any real devices)

Let's just force the use of 0x80000000 for ecosystem consistency.

Bug: 284334830
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
(cherry picked from https://android-review.googlesource.com/q/commit:767cf7f1cfc6d612bc8554fef8c354fdd660695b)
Merged-In: I199e9b00de845b3747940426ea6644426ab72e87
Change-Id: I199e9b00de845b3747940426ea6644426ab72e87
2023-06-05 07:44:18 +00:00
Maciej Żenczykowski
cf41fc877a On U+ require config_networkWakeupPacketMark/Mask to be 0x80000000
See system/netd/include/Fwmark.h which reserves the bottom 21 bits
of skb->mark for netid, etc... so out of necessity these have to be
in the top 11 bits.

In practice the only values that really make sense are either:
  mark == mask == 0 (disabled)
or (mark == mask) being one of the top 11 available bits, for example:
  mark == mask == 0x80000000 (enabled, using top-most bit)
(only a single bit makes sense, as this is really just a boolean signal,
 and only the topmost is known to be used on any real devices)

Let's just force the use of 0x80000000 for ecosystem consistency.

Bug: 284334830
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I199e9b00de845b3747940426ea6644426ab72e87
2023-06-05 07:41:00 +00:00
Hansen Kurli
a7ffdb71c2 Merge changes I8fcaa1f0,I8925fbe4,I78394645,Iadf9f060 am: 48e61a4520 am: f42dc9b164 am: 04190fb2a7
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2597608

Change-Id: I6b2c8cd5f98906e134764b295ad4840129686e21
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 06:59:46 +00:00
Hansen Kurli
e15d44755a Merge changes I8fcaa1f0,I8925fbe4,I78394645,Iadf9f060 am: 48e61a4520
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2597608

Change-Id: I58f4ce61a39fe1776b42293adfc441858ada5f34
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 05:36:05 +00:00
Hansen Kurli
48e61a4520 Merge changes I8fcaa1f0,I8925fbe4,I78394645,Iadf9f060
* changes:
  FinalizePausedKeepalive in handleStopAllKeepalives.
  Add tests for pause, resume and stop keepalives.
  Ensure autoKi is not stored when keepalive stops or is not started.
  Add tests for NATT keepalives stopped internally in KeepaliveTracker.
2023-06-05 04:56:16 +00:00
Motomu Utsumi
0ddac8acd2 Merge "Use netd socketDestroy for VPN in T-" am: d8b852fc06 am: fb2ec37ecd am: d54d71ed34
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2614310

Change-Id: I6871fbdee5896c460ba69781140c78541cb8f974
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 04:51:11 +00:00
Motomu Utsumi
e5516ad768 Merge "Use netd socketDestroy for VPN in T-" am: d8b852fc06
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2614310

Change-Id: I432ba6cc8ddb946aec6ad88b7caecb16e115050e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-05 03:45:26 +00:00
Motomu Utsumi
5d718005d6 Use netd socketDestroy for VPN in T-
aosp/2490881 updated to use InetDiagMessage.destroyLiveTcpSocket for all
devices.
But it is possible that netd socketDestory is modified in T- devices.
So this CL revert changes to keep using netd socketDestroy in T-
devices.

Test: atest FrameworksNetTests
Bug: 284253763
(cherry picked from https://android-review.googlesource.com/q/commit:1d137267108a28881e399d62311b1a42a60616fc)
Merged-In: I9b61f10e975d2e38e9829a8c01d3af706e2518ef
Change-Id: I9b61f10e975d2e38e9829a8c01d3af706e2518ef
2023-06-05 03:13:28 +00:00
Motomu Utsumi
ed9c644a61 Revert ConnectivityServiceDependencies access modifier
Address review comment on aosp/2490881

ConnectivityServiceDependencies was made public in aosp/2490881 to
verify destroyLiveTcpSockets call.
This CL reverts that change and updates tests to use mocked
DestroySocketsWrapper to verify destroy sockets call.

Bug: 270298713
Test: atest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:d54120344d02ab82df152c44fc855342783c12e1)
Merged-In: I101016399ea29bc5176b7559edf0447f0f7901ce
Change-Id: I101016399ea29bc5176b7559edf0447f0f7901ce
2023-06-05 03:13:20 +00:00
Motomu Utsumi
d8b852fc06 Merge "Use netd socketDestroy for VPN in T-" 2023-06-05 03:04:19 +00:00
Paul Hu
695ab930d6 Update tethered/local only interfaces when no all networks request
If there is no request for all networks, the tethered/local only
interface changes will be ignored. However, these available
interfaces are not used for mDNS when a user requests a socket
with a null network because the interfaces are lost due to the
previous ignore. Therefore, the interface changes should be
retained and will be used for socket creations afterwards.

Bug: 284939720
Test: atest FrameworksNetTests android.net.cts.NsdManagerTest
(cherry picked from https://android-review.googlesource.com/q/commit:bb69412f5b19c72ca5666ceec12f07b5e35df92d)
Merged-In: If830eb53af26f21f497314477b131ce28468a971
Change-Id: If830eb53af26f21f497314477b131ce28468a971
2023-06-05 02:50:13 +00:00
Paul Hu
e2e5cb4afa Use wifi p2p interfaces for mDNS
mDNS is used by wifi p2p in many places. However,
MdnsSocketProvider does not monitor changes to the wifi p2p
connection to get the names of the available wifi p2p interfaces.
This prevents mDNS from registering or discovering services on
the wifi p2p interfaces. Therefore, listen to the wifi p2p change
intent to know the available interfaces and status changes that
can be used by mDNS.

Bug: 284263838
Test: atest FrameworksNetTests android.net.cts.NsdManagerTest
(cherry picked from https://android-review.googlesource.com/q/commit:fbba5e83075fe3f1d96ca28ca00e8734b47e25a0)
Merged-In: If03514f1286c0507e5862372272234dd07eb084d
Change-Id: If03514f1286c0507e5862372272234dd07eb084d
2023-06-05 02:50:10 +00:00
Motomu Utsumi
1d13726710 Use netd socketDestroy for VPN in T-
aosp/2490881 updated to use InetDiagMessage.destroyLiveTcpSocket for all
devices.
But it is possible that netd socketDestory is modified in T- devices.
So this CL revert changes to keep using netd socketDestroy in T-
devices.

Test: atest FrameworksNetTests
Bug: 284253763
Change-Id: I9b61f10e975d2e38e9829a8c01d3af706e2518ef
2023-06-04 23:12:58 +09:00
Paul Hu
35780eb26d Merge changes If830eb53,If03514f1 am: 83bd5a5927 am: 4232f7bf8d am: b45221b7bf
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2606574

Change-Id: I71c17d286e819a34dcbd0124454a371d0bf5bda2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 15:27:35 +00:00
Paul Hu
e441489087 Merge changes If830eb53,If03514f1 am: 83bd5a5927
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2606574

Change-Id: Iebb67de32b9384c43517d8ecd1da3bb5b21d39a1
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 14:00:00 +00:00
Paul Hu
83bd5a5927 Merge changes If830eb53,If03514f1
* changes:
  Update tethered/local only interfaces when no all networks request
  Use wifi p2p interfaces for mDNS
2023-06-02 13:10:51 +00:00
Yuyang Huang
2a31d7dc6b Merge changes from topic "refresh-record" am: c823dc2259 am: 5e5342e3dc am: a1631ae0a8
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2612849

Change-Id: I2dca6b4fdcb00f4b6bc65c1de84dc0f2e440896d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 10:21:40 +00:00
Yuyang Huang
c8478e5d16 Renew the SRV/TXT records if half of TTL passed
As mentioned in RFC6762 7.1. The records only needed to be renewed if
at least half of the TTL passed. Usually A/AAAA records are included in
the response to the SRV record query, they are not refreshed individually.

Bug: 285260665
Bug: 285261577
Test: atest CtsNetTest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:f2cc01dc126ba1bd8c89add0853546ab4627c3aa)
Merged-In: Ifd7140de0d733191256184c5481412e1822d279b
Change-Id: Ifd7140de0d733191256184c5481412e1822d279b
2023-06-02 09:58:32 +00:00
Yuyang Huang
4967af87e2 Turn on removeExpiredService feature
Turn on removeExpiredService feature by: 1) Remove the unnecessary
allowSearchOptionsToRemoveExpiredService flag. 2) Turn on the
removeExpiredService flag in the MdnsSearchOptions.

Bug: 285260665
Test: atest CtsNetTest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:ff96322c4f5e35c53443115e93df0f651a7218e7)
Merged-In: Ib115b40e70b0f81a7877deb73af7d61e2e0c385f
Change-Id: Ib115b40e70b0f81a7877deb73af7d61e2e0c385f
2023-06-02 09:25:46 +00:00
Paul Hu
bb69412f5b Update tethered/local only interfaces when no all networks request
If there is no request for all networks, the tethered/local only
interface changes will be ignored. However, these available
interfaces are not used for mDNS when a user requests a socket
with a null network because the interfaces are lost due to the
previous ignore. Therefore, the interface changes should be
retained and will be used for socket creations afterwards.

Bug: 284939720
Test: atest FrameworksNetTests android.net.cts.NsdManagerTest
Change-Id: If830eb53af26f21f497314477b131ce28468a971
2023-06-02 08:54:41 +00:00
Paul Hu
fbba5e8307 Use wifi p2p interfaces for mDNS
mDNS is used by wifi p2p in many places. However,
MdnsSocketProvider does not monitor changes to the wifi p2p
connection to get the names of the available wifi p2p interfaces.
This prevents mDNS from registering or discovering services on
the wifi p2p interfaces. Therefore, listen to the wifi p2p change
intent to know the available interfaces and status changes that
can be used by mDNS.

Bug: 284263838
Test: atest FrameworksNetTests android.net.cts.NsdManagerTest
Change-Id: If03514f1286c0507e5862372272234dd07eb084d
2023-06-02 08:54:41 +00:00
Yuyang Huang
eb8b9ed0bf Merge changes from topic "refresh-record" am: c823dc2259
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2612849

Change-Id: Ic58041ad28be7ffaca1fba051a2561ba87623094
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 08:51:25 +00:00
Yuyang Huang
c823dc2259 Merge changes from topic "refresh-record"
* changes:
  Renew the SRV/TXT records if half of TTL passed
  Turn on removeExpiredService feature
2023-06-02 08:10:52 +00:00
Yuyang Huang
33f38b35d0 Merge "Update the SDK version to 34 in ConnectivityTestsLatestSdkDefaults" am: 925a81b1dc am: 7dbc6092e4 am: f3639c69d6
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2602187

Change-Id: I345ed73df00176fb6aa4e5e1bad3186101324033
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 07:43:51 +00:00
Mike Yu
55f0f038de Test: Don't let MultinetworkApiTest throw more than one JNI exception
This change fixes the test crash that is caused by ART's JNI failure.
ART's JNI doesn't allow native code to raise another exception while
an exception is pending.

Bug: 282896580
Test: turned off private DNS; used iptables to drop DNS packets;
      ran MultinetworkApiTest; verified no crash happened
Change-Id: Ide9e122f74d9939ce386d07d948a4e487870024f
2023-06-02 07:11:35 +00:00
Yuyang Huang
3e8b1aca9f Merge "Update the SDK version to 34 in ConnectivityTestsLatestSdkDefaults" am: 925a81b1dc
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2602187

Change-Id: Ib137d414de0fa4110afac37de5382744b1dcdcaa
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-02 06:36:54 +00:00
Yuyang Huang
f2cc01dc12 Renew the SRV/TXT records if half of TTL passed
As mentioned in RFC6762 7.1. The records only needed to be renewed if
at least half of the TTL passed. Usually A/AAAA records are included in
the response to the SRV record query, they are not refreshed individually.

Bug: 285261577
Test: atest CtsNetTest FrameworksNetTests
Change-Id: Ifd7140de0d733191256184c5481412e1822d279b
2023-06-02 15:36:09 +09:00
Yuyang Huang
925a81b1dc Merge "Update the SDK version to 34 in ConnectivityTestsLatestSdkDefaults" 2023-06-02 06:22:18 +00:00
Yuyang Huang
ff96322c4f Turn on removeExpiredService feature
Turn on removeExpiredService feature by: 1) Remove the unnecessary
allowSearchOptionsToRemoveExpiredService flag. 2) Turn on the
removeExpiredService flag in the MdnsSearchOptions.

Bug: 285260665
Test: atest CtsNetTest FrameworksNetTests
Change-Id: Ib115b40e70b0f81a7877deb73af7d61e2e0c385f
2023-06-02 12:33:55 +09:00
Jean Chalard
cab00afb88 Merge "Add tests for PAC proxies." am: 5e76b40973 am: 4155e6ec97 am: 4ae128e7e1
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/1729152

Change-Id: Ifc4c685e724de1c3727b560d0213b4257f71da54
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-01 21:59:13 +00:00
Sudheer Shanka
dc231ce127 Merge "Avoid hardcoding BATTERY_PLUGGED_ANY constant." am: bdd3ca1ac6 am: 5e24ea8cc5 am: c3f28cb257
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/2609416

Change-Id: I2f29b2eb3677d886a7e1e9245abede416a38268d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-01 21:55:08 +00:00
Steven Moreland
f85847c137 Remove toString test.
This is not a stable format.

Bug: 285376559
Bug: 265470635
Test: N/A
Change-Id: I15b58ff7a50f9f1acc3d5e8f86f9272855183870
2023-06-01 21:34:50 +00:00
Jean Chalard
7bc9f2c8c9 Merge "Add tests for PAC proxies." am: 5e76b40973
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/1729152

Change-Id: I00ec8f93ff1d9d3f7d7608c22880f416605533e8
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-06-01 07:35:16 +00:00
Hansen Kurli
1b71e38673 Ensure public methods are running on handler thread
Store the handler that should be running all the public methods and
use it by comparing its thread with the current thread.

Also refactor the tests to use and run on a test handler thread.

Bug: 273451360
Test: atest FrameworksNetTests
Change-Id: I053f1043a3b518728c4b30b94eec1d33fbfe39c0
2023-06-01 06:58:18 +00:00
Hansen Kurli
9656e23d91 FinalizePausedKeepalive in handleStopAllKeepalives.
In the case that a keepalive is paused and handleStopAllKeepalives is
called, there is no KeepaliveInfo for the paused keepalive and so no
onError callback will be called. The autoKi will also be cleaned up so
no callback will ever called that notifies the keepalive is stopped.

Bug: 281646074
Test: atest FrameworksNetTests
Change-Id: I8fcaa1f07746235326c7ae05d97e20fd27927fea
2023-06-01 06:45:07 +00:00
Hansen Kurli
01d0ef1636 Add tests for pause, resume and stop keepalives.
The tests added verify the following:
1. Stopping the keepalive will cleanup the autoKi.
2. Pausing the keepalive does not cleanup the autoKi and stopping
   a paused keepalive will still call the onStopped callback.
3. A starting error by resuming the keepalive will cleanup the
   autoKi.
4. handleStopAllKeepalives also does the appropriate callback for paused
   keepalives.
5. Stopping a resumed keepalive stops the correct slot when a second
   keepalive is started while the first is paused.

Bug: 281646074
Test: atest FrameworksNetTests
Change-Id: I8925fbe40323dc4584a111d0cf31de016525ef41
2023-06-01 06:44:52 +00:00
Hansen Kurli
0d179a3ff0 Ensure autoKi is not stored when keepalive stops or is not started.
In the cases below, the keepalive is already cleaned up internally in
KeepaliveTracker, but are not be cleaned up in
AutomaticOnOffKeepaliveTracker. This means the mAutomaticOnOffKeepalives
list is storing stopped keepalives and the metrics will still conisder
the keepalive as active.

1. In KeepaliveInfo.start, return whether the keepalive is successfully
   starting(i.e. mStartedState == STARTING). Check for this in
   handleStartKeepalive and return early on failure, without storing the
   autoKi. Also check in handleResumeKeepalive.
2. In handleEventSocketKeepalive, return whether the handleStopKeepalive
   is called, indicating the keepalive is forced to stop and was not
   already STOPPING. This should happen when the state is STARTING but
   the network agent returned an unsuccessful event.
3. In handleCheckKeepalivesStillValid, move the checking logic to
   AutomaticOnOffKeepaliveTracker so the handleStopKeepalive is called.

Bug: 281646074
Test: atest FrameworksNetTests
Change-Id: I7839464534baed43abbd40b321287132da25b978
2023-06-01 06:02:16 +00:00
Jean Chalard
5e76b40973 Merge "Add tests for PAC proxies." 2023-06-01 05:20:37 +00:00