Commit Graph

83020 Commits

Author SHA1 Message Date
Maciej Żenczykowski
ad9ff691c4 BpfHandler: abort on U+ if unexpected cgroup mount path
This is defined here:
http://cs/h/android/platform/superproject/+/master:system/core/libprocessgroup/profiles/cgroups.json?l=27
and has been a constant since
  https://android-review.googlesource.com/c/platform/system/core/+/1324649
was merged back on August 21, 2020 (ie. Android S)

But currently there's no easy way to get at this constant
from mainline code... which means it's very difficult
to do any bpf cgroup attach/detach from mainline.

btw. this appears to also be already hardcoded in:
http://cs/h/android/platform/superproject/+/master:packages/modules/Connectivity/service/src/com/android/server/connectivity/ConnectivityNativeService.java?l=48
as well

Fix: 285432857
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
(cherry picked from https://android-review.googlesource.com/q/commit:65075bb8f8290125fbd0ce8ffc5aaab6bdb3284e)
Merged-In: I99f4a5a26dd10f6ea70bf73114af0d18098de630
Change-Id: I99f4a5a26dd10f6ea70bf73114af0d18098de630
2023-06-02 06:38:57 +00:00
Xinyi Zhou
43529a075d Merge "Check Sdk level before calling the DeviceConfig API" into udc-dev 2023-06-02 06:28:05 +00:00
TreeHugger Robot
ab0ad8d35b Merge "Try to fix and diagnose Perfetto flush errors." into udc-dev 2023-06-02 01:49:09 +00:00
Ryan Zuklie
8e7e8a9284 Try to fix and diagnose Perfetto flush errors.
Around 10% of the traces with Nettrace have "traced_final_flush_failed"
errors. It is believed that Network Tracing isn't writing enough data to
fill one "Chunk" in Perfetto's buffer. Although this should still be
saved by Perfetto, it doesn't seem to be.

This change records the number of packets read from the ring buffer to
understand whether the error coincided with low-data cases. It also
tries to flush the data OnStop to potentially fix the issue.

Bug: 285411033
Test: flash and run trace
(cherry picked from https://android-review.googlesource.com/q/commit:80d705566be6ea8a822eebd088c1f37758fdf0f6)
Merged-In: I92c8d2d8d47d1ed123585e1cfdde802d286f120f
Change-Id: I92c8d2d8d47d1ed123585e1cfdde802d286f120f
2023-06-01 22:43:00 +00:00
Xinyi Zhou
8b31ac8672 Check Sdk level before calling the DeviceConfig API
Test: -m
Ignore-AOSP-First: nearby_not_in_aosp_yet
Bug: 283345506
Change-Id: I6aef6fd9c91eaa73419261ee477099cebc5bdc1a
2023-06-01 13:36:51 -07:00
Remi NGUYEN VAN
77ab56ddc3 Only allow libconnectivity_native usage on U+
No user of the API is expected before U, so limit its usage to U+.

Bug: 262199896
Test: atest
(cherry picked from https://android-review.googlesource.com/q/commit:2c1b9b8e80c6cb017a03211667b51ee5b1234d1c)
Merged-In: I211f459a729c216eb1ba9e3b983042e4afcbd135
Change-Id: I211f459a729c216eb1ba9e3b983042e4afcbd135
2023-05-31 05:50:31 +00:00
Remi NGUYEN VAN
12cfa774f1 Merge "Add MdnsDiscoveryManager constructor without looper" into udc-dev 2023-05-31 03:18:57 +00:00
Lorenzo Colitti
6ad2c673a1 Merge changes from topic "cherrypicker-L34200000960946936:N30500001373342711" into udc-dev
* changes:
  Pass NsdService thread looper to MdnsDiscoveryManager
  Do not process null network packets on all clients
  Only send to downstream ifaces for null network
  Use the ServiceTypeClient network for queries
  Add test for subtype discovery/advertising
  Ensure MdnsDiscoveryManager calls to ServiceTypeClients on looper thread
2023-05-31 03:18:26 +00:00
Treehugger Robot
bb4c717fbb Add MdnsDiscoveryManager constructor without looper
In some use cases for the MdnsDiscoveryManager, providing looper as an
argument to the MdnsDiscoveryManager constructor is not feasible. Adding
a constructor without looper can help to match those use cases. If
constructor without looper is used. The shutDown() must be called as a
part of cleanup process.

Original change: https://r.android.com/2600006

Change-Id: I412157f184decd8af8343977d59a2215fe8ca51e
Fixes: 283914408
Test: atest FrameworksNetTests
Merged-In: I0ab04d67bae127628c6d67c4b8c109201612a54b
2023-05-31 01:42:41 +00:00
Paul Hu
901e5b1332 Pass NsdService thread looper to MdnsDiscoveryManager
MdnsDiscoveryManager should use the same thread that create on
NsdService that is used on other mDns components. Thus, pass that
thread loop to MdnsDiscoveryManager.

Bug: 265787401
Test: atest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:7f0af78c5ee0b783faec38ab4dd7afe0f8a393ec)
Merged-In: Icc23994c3ebc99da6043ed2d93540c44f53a150b
Change-Id: Icc23994c3ebc99da6043ed2d93540c44f53a150b
2023-05-31 01:41:30 +00:00
Remi NGUYEN VAN
574494d7c5 Do not process null network packets on all clients
Packets received from the "null" networks are packets received from
tethering downstream interfaces. They should not be processed by all
MdnsServiceTypeClients; instead they should be processed by
the MdnsServiceTypeClient for the null network.

Bug: 283708537
Test: atest
(cherry picked from https://android-review.googlesource.com/q/commit:0ba206cbd168f5627da84911c0d7e5307e55c431)
Merged-In: Ifef59eca7a24bdfe3650067445d2565869dfa852
Change-Id: Ifef59eca7a24bdfe3650067445d2565869dfa852
2023-05-29 05:56:31 +00:00
Remi NGUYEN VAN
85ff5b1323 Only send to downstream ifaces for null network
When sendMulticastPacket or sendUnicastPacket is called with the null
network, only send the packets to interfaces indexed with null, instead
of all interfaces.

When using MdnsMultinetworkSocketClient sending packets on the null
network means sending on tethered downstream interfaces. When
MdnsSocketClient is used (not used in the Android tree), sending on the
null network sends on all interfaces as MdnsSocketClient does not
support specific networks. This is clarified by explicitly throwing
when a non-null Network is attempted to be used with MdnsSocketClient
(but MdnsSocketClient is only used for tests in the Android tree).

Bug: 283708537
Test: atest
(cherry picked from https://android-review.googlesource.com/q/commit:87c374a37ac8698a98d0c35a3196922c69549cc7)
Merged-In: Ia0186bf8aa2e0fc5878d6071fd23599df8488616
Change-Id: Ia0186bf8aa2e0fc5878d6071fd23599df8488616
2023-05-29 05:56:27 +00:00
Remi NGUYEN VAN
e82a699fc7 Use the ServiceTypeClient network for queries
Instead of the network specified in the MdnsSearchOptions, which is
often null to request searching on all networks, use the
MdnsServiceTypeClient Network to build the queries.

When MdnsSearchOptions.network is null, one MdnsServiceTypeClient is
created for each mDNS-compatible Network. Each MdnsServiceTypeClient
schedules queries with a Network selector. If the Network selector is
null, each MdnsServiceTypeClient will post its queries to all networks.
Instead, it should be the Network of the MdnsServiceTypeClient.

There is one remaining problem when a tethered interface is up: in that
case, there will be one MdnsServiceTypeClient for tethered interfaces
with a null network, which will still broadcast its queries to all
networks. This should be addressed in a follow-up by having
MdnsMultinetworkSocketClient only send queries to interfaces that have a
null network, when the network selector is null (and not all
interfaces).

Bug: 283708537
Test: atest
(cherry picked from https://android-review.googlesource.com/q/commit:404c1bf7877316df27389aa8a1ac855a25a86c20)
Merged-In: If571d7a59c5e55d809eeb1f3d1c4b58684612cdd
Change-Id: If571d7a59c5e55d809eeb1f3d1c4b58684612cdd
2023-05-29 05:56:24 +00:00
Remi NGUYEN VAN
7fd1e98040 Add test for subtype discovery/advertising
Check that advertised subtypes can be found by matching discoveries and
discoveries for the base type, and that discoveries for different
subtypes do not find the service.

Bug: 266167702
Test: atest
(cherry picked from https://android-review.googlesource.com/q/commit:eae8529fc6542691ba2f0c1262f3ab8732e4434b)
Merged-In: I0a8249cca22c1d30baad12bb4e8351a65ce87cb1
Change-Id: I0a8249cca22c1d30baad12bb4e8351a65ce87cb1
2023-05-29 05:56:21 +00:00
Paul Hu
fbd8c14b87 Ensure MdnsDiscoveryManager calls to ServiceTypeClients on looper thread
ServiceTypeClients will store/access services on MdnsServiceCache
in subsequent changes. And MdnsServiceCache can be accessed from
looper thread only. So ensure MdnsDiscoveryManager calls to
ServiceTypeClients on the looper thread.

Bug: 265787401
Test: atest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:bd4140ea913ad031057ff37bea8c2556b4970463)
Merged-In: I05e73140da58c029b49057bb0ccfdb8ed7818dfc
Change-Id: I05e73140da58c029b49057bb0ccfdb8ed7818dfc
2023-05-29 05:56:08 +00:00
Patrick Rohr
7b40e0ccd9 cronet import: do not jarjar J.cronet_tests_N
Cronet tests do not use a jarjar prefix, so do not jarjar their J/N
implementation.

Test: atest NetHttpTests
Bug: 278639767
(cherry picked from https://android-review.googlesource.com/q/commit:311feaff8b4a66b0c8a7bc5ed72f916d666c683e)
Merged-In: Ie4b8bfa13ecbbca014e22d653fa0d39a5554c10e
Change-Id: Ie4b8bfa13ecbbca014e22d653fa0d39a5554c10e
2023-05-26 19:47:43 +00:00
Patrick Rohr
ea96671c8b cronet tests: remove most of NetHttpTestsLibPreJarJar
Since cronet_java_tests (previously cronet_aml_javatests_sources) is now
an android_library directly in external/cronet (to support "mm" in that
folder), the dependencies can be removed.

A form of android_library is still required to wrap cronet_java_tests,
so the AndroidManifest (in this folder) is forwarded properly to the
common coverage test target.

Test: TH
Bug: 278639767
(cherry picked from https://android-review.googlesource.com/q/commit:cc2e2dcb4411e8ae07cede2da27bf5bd6e5505c5)
Merged-In: I25c6371c64e6cfcbb48e9e3f2976d47279791f21
Change-Id: I25c6371c64e6cfcbb48e9e3f2976d47279791f21
2023-05-26 19:47:30 +00:00
Patrick Rohr
49ca266409 cronet: delete option to disable cronet in tm-mainline-prod
With the release cut of the July train and the recent automerger
cutover, tm-mainline-prod is now officially an abandoned branch.

This change deletes (most) infrastructure that was put in place to
disable cronet on tm-mainline-prod.

Test: builds
Bug: 278639767
(cherry picked from https://android-review.googlesource.com/q/commit:2e3e2955b8cf7ba181788140dd62b2dd20e7b600)
Merged-In: I078f2114b736a634f08d8f704c19beb2224ef645
Change-Id: I078f2114b736a634f08d8f704c19beb2224ef645
2023-05-26 19:44:22 +00:00
Treehugger Robot
9656acb850 [automerger skipped] Merge "[DO NOT MERGE] Check Sdk level before calling the DeviceConfig API" into tm-mainline-prod am: ff60f77664 -s ours
am skip reason: subject contains skip directive

Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23246241

Change-Id: I8eb1c7c667975491df74972c78371dc9c9c0a017
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-05-26 02:43:35 +00:00
Xinyi Zhou
6d1cf82d56 [automerger skipped] [DO NOT MERGE] Check Sdk level before calling the DeviceConfig API am: 1d6c526020 -s ours
am skip reason: subject contains skip directive

Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23246241

Change-Id: Ifb7aaeae653a530058542c65d310720b2aaa690f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-05-26 02:43:32 +00:00
Treehugger Robot
ff60f77664 Merge "[DO NOT MERGE] Check Sdk level before calling the DeviceConfig API" into tm-mainline-prod 2023-05-26 01:51:51 +00:00
Mark
bcebde7f18 Support SAP and LOHS enabled at the same time
Use type + scope as key to build cached address map so that
SAP (key: TETHERING_WIFI + INTERNET) and LOHS
(key: TETHERING_WIFI + LOCAL) can use different address.

Bug: 233175023
Test: atest TetheringTests
(cherry picked from https://android-review.googlesource.com/q/commit:49649c9aeac709abaeb345f89b6a3a0e5a279435)
Merged-In: I46a4b3ee919628092b7540202a43d79f407b09b6
Change-Id: I46a4b3ee919628092b7540202a43d79f407b09b6
2023-05-26 00:51:20 +00:00
Mark
fb8771ffb5 Allow SAP and LOHS wifi clients exist at the same time
This change store localOnly wifi clients in its own field so that
tethered and localOnly hotspot clients can exist at the same time.

Currently, there are no tethered and localOnly hotspot clients at
the same time because PrivateAddressCoordinator does not support
SAP + LOHS. A follow-up change will be made to allow this.

When both SAP and LOHS are enabled, the SAP and LOHS clients from
TetheringEventCallback#onClientsChanged are all TETHERING_WIFI.
Currently, there is no way for the listeners to distinguish between
SAP and LOHS clients.

Bug: 233175023
Test: atest TetheringTests
(cherry picked from https://android-review.googlesource.com/q/commit:ae3abdfa4be2e4867d4cad70be15f90ad36a0b32)
Merged-In: I01b0a6abb084f7135f7825e0c5303e49c16a4c39
Change-Id: I01b0a6abb084f7135f7825e0c5303e49c16a4c39
2023-05-26 00:51:17 +00:00
Mark
3203664480 Add mDesiredServingState field in BaseServingState
As the suggestion from:
https://android-review.git.corp.google.com/c/platform/packages/modules/Connectivity/+/2489359/9/Tethering/src/android/net/ip/IpServer.java#b1176

Make BaseServingState an abstract class to prevent it from being used
directly. Additionally, move the handleNewPrefixRequest method into
BaseServingState because it is the only class that uses it.
To avoid TetheredState and LocalHotspotState from having to implement
their own enter function, add the mDesiredInterfaceState field to
BaseServingState.

Bug: 233175023
Test: atest TetheringTests
(cherry picked from https://android-review.googlesource.com/q/commit:3ec851ef03d60308a9ecc57557f378a186bb9ac0)
Merged-In: I03269c37e666345efb0c61039a2bb213f223a5a2
Change-Id: I03269c37e666345efb0c61039a2bb213f223a5a2
2023-05-26 00:51:14 +00:00
Chalard Jean
a8aeef7ae8 Test for not logging meaningless caps changes
Test: this
Bug: 238696406
(cherry picked from https://android-review.googlesource.com/q/commit:16e41d130c99edcd222277381af96f82685579bb)
Merged-In: Ife6500daae58b7f85a7f4c76cd89ce91def5e78c
Change-Id: Ife6500daae58b7f85a7f4c76cd89ce91def5e78c
2023-05-25 02:12:49 +00:00
Chiachang Wang
35eb7bef8e Merge "DO not throw exception for ERROR_NO_SUCH_SLOT error" into udc-dev 2023-05-24 01:30:22 +00:00
Xinyi Zhou
d2f58d0d7e Merge "Fix to correct the filter setting in order Patched from ag/23208840" into udc-dev 2023-05-23 22:07:05 +00:00
Xinyi Zhou
08f7080065 Fix to correct the filter setting in order
Patched from ag/23208840

Bug: 282106309
Test: -m
Ignore-AOSP-First: nearby_not_in_aosp_yet
Change-Id: I5ed80f62d68ed5fb93fa6d182a4c2825cdb6b26d
2023-05-23 19:31:09 +00:00
TreeHugger Robot
7201544850 Merge "Skip all of NetworkAgentTest in instant mode." into udc-dev 2023-05-23 09:52:15 +00:00
Treehugger Robot
d4225bbda7 Merge "Rename KernelVersion.h to KernelUtils.h" into udc-dev 2023-05-23 08:39:25 +00:00
Lorenzo Colitti
ebfc3f62d8 Skip all of NetworkAgentTest in instant mode.
Recently, new test methods were added to NetworkAgentTest which
fail in instant mode because they are not marked @AppModeFull.

Because instant apps can't use NetworkAgent (it's a system API,
and it needs the NETWORK_FACTORY permission which is signature
only), just mark the whole test @AppModeFull so this cannot
happen again.

Bug: 283897713
Test: test is skipped in instant mode
(cherry picked from https://android-review.googlesource.com/q/commit:f1a61ad83de462dcd149ca53f0d417486ca1aec0)
Merged-In: Ib6ff07d9fdc329d3421a077532b8a434323053f8
Change-Id: Ib6ff07d9fdc329d3421a077532b8a434323053f8
Skip all of NetworkAgentTest in instant mode.

Recently, new test methods were added to NetworkAgentTest which
fail in instant mode because they are not marked @AppModeFull.

Because instant apps can't use NetworkAgent (it's a system API,
and it needs the NETWORK_FACTORY permission which is signature
only), just mark the whole test @AppModeFull so this cannot
happen again.

Fix: 283897713
Test: test is skipped in instant mode
Change-Id: Ib6ff07d9fdc329d3421a077532b8a434323053f8
2023-05-23 08:30:51 +00:00
Mark Chien
9427b0e3a5 Merge "Fix entitlement recheck fail in U" into udc-dev 2023-05-23 08:01:41 +00:00
chiachangwang
f2c2344ccd DO not throw exception for ERROR_NO_SUCH_SLOT error
There are multiple independent reasons a keepalive can stop. Some
are software (e.g. the app stops the keepalive) and some are hardware
(e.g. the SIM card gets removed). Therefore, there is a very low
probability that both of these happen at the same time, which would
result in the first stop attempt returning SUCCESS and the second
stop attempt returning NO_SUCH_SLOT. Such a race condition can be
ignored with a log, not to crash the system. Change to wtf log so
that the issue could still be visible since this implies possible
bugs in the system.

Also update the javadoc for SocketKeepalive.ERROR_NO_SUCH_SLOT.

Bug: 281484381
Test: atest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:75673ba5025faa191ae188100b117a4095fab8ab)
Merged-In: I316a2193fc7302b04e074ff0b03dc43946fe5ce6
Change-Id: I316a2193fc7302b04e074ff0b03dc43946fe5ce6
2023-05-23 07:16:21 +00:00
Patrick Rohr
6c0a5d0d32 Rename KernelVersion.h to KernelUtils.h
Test: TH
(cherry picked from https://android-review.googlesource.com/q/commit:a7994902d90b0273bca86196441758ce03af2ca2)
Merged-In: I541d015732179313a34872d3fdbeff636047c49b
Change-Id: I541d015732179313a34872d3fdbeff636047c49b
Bug: 283523051
2023-05-22 08:41:04 +00:00
Maciej Żenczykowski
76f4365d74 LinkProperties: use ordered comparison for P-CSCFs - only on U+ am: 15756bc0b1
Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23367413

Change-Id: I5f4e81155c1b0107371b623db978b370f109587f
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-05-22 08:21:05 +00:00
Maciej Żenczykowski
15756bc0b1 LinkProperties: use ordered comparison for P-CSCFs - only on U+
to make sure a mainline update doesn't break devices in the field

Test: TreeHugger
Bug: 268479036
Signed-off-by: Maciej Żenczykowski <maze@google.com>
(cherry picked from https://android-review.googlesource.com/q/commit:f7939fa8d1c4566d056a8501e610c8fe18ac98f8)
Merged-In: Iadcd861509d31b3ed6352d452a159cd89af479dd
Change-Id: Iadcd861509d31b3ed6352d452a159cd89af479dd
2023-05-22 03:53:39 +00:00
Mark
7e31c3e495 Fix entitlement recheck fail in U
Starting with U, only explicit intents will be allowed to
launch non-exported internal components. Set package name
to entitlement recheck intent so that the intent could be
delivered to tethering itself successfully.

Bug: 278482046
Test: atest TetheringTests
      manual verify entitlement recheck work in U
(cherry picked from https://android-review.googlesource.com/q/commit:e86fb5ef56be064839a639702bbe376448f08bed)
Merged-In: Ife30eee13fe39509ccb5786d2a76fbb7baa022a8
Change-Id: Ife30eee13fe39509ccb5786d2a76fbb7baa022a8
2023-05-22 02:35:35 +00:00
Xinyi Zhou
1d6c526020 [DO NOT MERGE] Check Sdk level before calling the DeviceConfig API
Test: -m
Ignore-AOSP-First: nearby_not_in_aosp_yet
Fix: 273887455
Bug: 283345506
Change-Id: I6aef6fd9c91eaa73419261ee477099cebc5bdc1a
2023-05-19 17:09:26 -07:00
Bill Yi
582f3623c2 [automerger skipped] Import translations. DO NOT MERGE ANYWHERE am: abc446433b -s ours
am skip reason: subject contains skip directive

Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23267615

Change-Id: I2f4d6db114fa1b6513a3ac5e8dc97f604f97c23c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-05-18 01:09:57 +00:00
Bill Yi
36ebae0ad5 [automerger skipped] Import translations. DO NOT MERGE ANYWHERE am: ca829f8c00 -s ours
am skip reason: subject contains skip directive

Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/modules/Connectivity/+/23269636

Change-Id: I19c7e93bd8c7dd8bacf36ec02d4e12aa97e2db52
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-05-17 23:16:09 +00:00
Bill Yi
730b97cd83 Merge "Import translations. DO NOT MERGE ANYWHERE" into udc-dev 2023-05-17 22:08:52 +00:00
Lorenzo Colitti
66e3ede2ee Merge changes from topic "cherrypicker-L76200000960680946:N26500001369291245" into udc-dev
* changes:
  Stop MdnsServiceTypeClient send on socket destroy
  Do not send socket destroyed on unregistration
2023-05-17 08:04:18 +00:00
Chiachang Wang
93ef9b7875 Merge "Stop verifying wifi disconnect on T+ devices" into udc-dev 2023-05-17 06:35:16 +00:00
Motomu Utsumi
8a32db5fbc Merge changes from topic "cherrypicker-L68400000960711014:N74200001369704906" into udc-dev
* changes:
  Fix agents disconnecting in SUSPENDED state.
  Check clatd does not stop when suspended network is disconnected
2023-05-17 06:19:24 +00:00
Treehugger Robot
432a18b7e8 Merge "Immediately create native networks when NetworkAgents register." into udc-dev 2023-05-17 04:39:20 +00:00
chiachangwang
c5c8838270 Stop verifying wifi disconnect on T+ devices
Wifi remembers the wifi enabled state under airplane mode in the
Settings.Secure.WIFI_APM_STATE setting for the airplane mode
enhancement. Wifi will not be disconnected if user enables
the wifi under airplane mode. This behavior breaks the
assumption in testSetAirplaneMode. The test expects to always
receive the WiFi network disconnect after turning airplane
mode on.

The wifi enhancement was done with hidden method which should not
be referred in the cts. The intention of testSetAirplaneMode was
to verify the permission required for setting ariplane mode.
This change should be no harm for original intention.

Bug: 282436851
Test: atest CtsNetTestCases
(cherry picked from https://android-review.googlesource.com/q/commit:c346fc8a0d8330aa7cf033a8554233a90e683164)
Merged-In: I3458679378f0c12c26051f3dac7fcf155c1f469c
Change-Id: I3458679378f0c12c26051f3dac7fcf155c1f469c
2023-05-17 04:14:40 +00:00
wangshengrjxtjcb
9b5334dbad Fix agents disconnecting in SUSPENDED state.
Network state is not changed to disconnected when a networkagent
is disconnected and network state is SUSPENDED.

So the function requiresClat return true. Clat is not stoped.

Bug: 277682237
Test: atest FrameworksNetTests
(cherry picked from https://android-review.googlesource.com/q/commit:fd5d3d90e1da7411104902ddfe859ebd0e4a02fb)
Merged-In: I5edfcf64aca5d2d34325d722dd29fab41bcf2600
Change-Id: I5edfcf64aca5d2d34325d722dd29fab41bcf2600
2023-05-17 02:42:14 +00:00
Motomu Utsumi
f8d29e401e Check clatd does not stop when suspended network is disconnected
Currently, clatd is not stopped when suspended network is disconnected
and aosp/2583410 fixes this issue.
This CL adds test for current behavior, aosp/2583410 can update
testDisconnectSuspendedNetworkStopClatd to call verifyClatdStop instead
of verifyNeverClatdStop

Test: atest FrameworksNetTests
Bug: 277682237
(cherry picked from https://android-review.googlesource.com/q/commit:4a5b06559fc276a06f53134694a0a6548b36b026)
Merged-In: I345e097ce8e114800d77c5f44d38d7ae4938935c
Change-Id: I345e097ce8e114800d77c5f44d38d7ae4938935c
2023-05-17 02:42:07 +00:00
Bill Yi
ca829f8c00 Import translations. DO NOT MERGE ANYWHERE
Auto-generated-cl: translation import
Change-Id: Ia94ca5d2e562362f46942d024b02c7036797451f
2023-05-16 14:24:00 -07:00
Bill Yi
abc446433b Import translations. DO NOT MERGE ANYWHERE
Auto-generated-cl: translation import
Change-Id: I5d43bda306bbee6fcedc0a6b0b84eb3ae8d35da9
2023-05-16 14:21:40 -07:00