Revert "Prevent native_init from starting TrafficController"

We are ready to remove traffic controller from netd, so
TrafficController::start() should be called from the system server.

This reverts commit c2984fdca83de11a6a4990576aab1596ef94909b.

Test: atest FrameworksNetTests FrameworksNetIntegrationTests
CtsNetTestCases:android.net.TrafficStatsTest NetworkUsageStatsTest
CtsHostsideNetworkTests

Change-Id: Ic324ad0c064271977ab35d7f55badee00098e196
diff --git a/service/jni/com_android_server_BpfNetMaps.cpp b/service/jni/com_android_server_BpfNetMaps.cpp
index bde52a5..113c449 100644
--- a/service/jni/com_android_server_BpfNetMaps.cpp
+++ b/service/jni/com_android_server_BpfNetMaps.cpp
@@ -39,8 +39,7 @@
 namespace android {
 
 static void native_init(JNIEnv* env, jobject clazz) {
-  // start is still being called by netd
-  Status status = mTc.initMaps();
+  Status status = mTc.start();
    if (!isOk(status)) {
     ALOGE("%s failed", __func__);
   }
diff --git a/service/native/include/TrafficController.h b/service/native/include/TrafficController.h
index 2d89344..ddcf445 100644
--- a/service/native/include/TrafficController.h
+++ b/service/native/include/TrafficController.h
@@ -32,22 +32,14 @@
 using netdutils::StatusOr;
 
 class TrafficController {
-    // TODO: marking this private for right now, as start is already called by
-    // netd. start() calls initMaps(), initPrograms(), and sets up the socket
-    // destroy listener. Both initPrograms() and setting up the socket destroy
-    // listener should only be done once.
+  public:
+    static constexpr char DUMP_KEYWORD[] = "trafficcontroller";
+
     /*
      * Initialize the whole controller
      */
     netdutils::Status start();
 
-  public:
-    static constexpr char DUMP_KEYWORD[] = "trafficcontroller";
-
-    // TODO: marking this public for right now, as start() is already called by
-    // netd.
-    netdutils::Status initMaps() EXCLUDES(mMutex);
-
     int setCounterSet(int counterSetNum, uid_t uid, uid_t callingUid) EXCLUDES(mMutex);
 
     /*
@@ -195,6 +187,8 @@
 
     std::mutex mMutex;
 
+    netdutils::Status initMaps() EXCLUDES(mMutex);
+
     // Keep track of uids that have permission UPDATE_DEVICE_STATS so we don't
     // need to call back to system server for permission check.
     std::set<uid_t> mPrivilegedUser GUARDED_BY(mMutex);