netstack3_ip/
multicast_forwarding.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! An implementation of multicast forwarding.
6//!
7//! Multicast forwarding is the ability for netstack to forward multicast
8//! packets that arrive on an interface out multiple interfaces (while also
9//! optionally delivering the packet to the host itself if the arrival host has
10//! an interest in the packet).
11//!
12//! Note that multicast forwarding decisions are made by consulting the
13//! multicast routing table, a routing table entirely separate from the unicast
14//! routing table(s).
15
16pub(crate) mod api;
17pub(crate) mod counters;
18pub(crate) mod packet_queue;
19pub(crate) mod route;
20pub(crate) mod state;
21
22use core::sync::atomic::Ordering;
23
24use net_types::ip::{GenericOverIp, Ip, IpVersionMarker};
25use netstack3_base::{
26    AnyDevice, AtomicInstant, CounterContext, DeviceIdContext, EventContext, FrameDestination,
27    HandleableTimer, InstantBindingsTypes, InstantContext, TimerBindingsTypes, TimerContext,
28    WeakDeviceIdentifier,
29};
30use packet_formats::ip::IpPacket;
31use zerocopy::SplitByteSlice;
32
33use crate::internal::multicast_forwarding::counters::MulticastForwardingCounters;
34use crate::internal::multicast_forwarding::packet_queue::QueuePacketOutcome;
35use crate::internal::multicast_forwarding::route::{
36    Action, MulticastRouteEntry, MulticastRouteTargets,
37};
38use crate::multicast_forwarding::{
39    MulticastForwardingPendingPacketsContext, MulticastForwardingState,
40    MulticastForwardingStateContext, MulticastRoute, MulticastRouteKey,
41    MulticastRouteTableContext as _,
42};
43use crate::{IpLayerEvent, IpLayerIpExt};
44
45/// Required types for multicast forwarding provided by Bindings.
46pub trait MulticastForwardingBindingsTypes: InstantBindingsTypes + TimerBindingsTypes {}
47impl<BT: InstantBindingsTypes + TimerBindingsTypes> MulticastForwardingBindingsTypes for BT {}
48
49/// Required functionality for multicast forwarding provided by Bindings.
50pub trait MulticastForwardingBindingsContext<I: IpLayerIpExt, D>:
51    MulticastForwardingBindingsTypes + InstantContext + TimerContext + EventContext<IpLayerEvent<D, I>>
52{
53}
54impl<
55    I: IpLayerIpExt,
56    D,
57    BC: MulticastForwardingBindingsTypes
58        + InstantContext
59        + TimerContext
60        + EventContext<IpLayerEvent<D, I>>,
61> MulticastForwardingBindingsContext<I, D> for BC
62{
63}
64
65/// Device related functionality required by multicast forwarding.
66pub trait MulticastForwardingDeviceContext<I: IpLayerIpExt>: DeviceIdContext<AnyDevice> {
67    /// True if the given device has multicast forwarding enabled.
68    fn is_device_multicast_forwarding_enabled(&mut self, dev: &Self::DeviceId) -> bool;
69}
70
71/// A timer event for multicast forwarding.
72#[derive(Clone, Debug, Eq, GenericOverIp, Hash, PartialEq)]
73#[generic_over_ip(I, Ip)]
74pub enum MulticastForwardingTimerId<I: Ip> {
75    /// A trigger to perform garbage collection on the pending packets table.
76    PendingPacketsGc(IpVersionMarker<I>),
77}
78
79impl<
80    I: IpLayerIpExt,
81    BC: MulticastForwardingBindingsContext<I, CC::DeviceId>,
82    CC: MulticastForwardingStateContext<I, BC> + CounterContext<MulticastForwardingCounters<I>>,
83> HandleableTimer<CC, BC> for MulticastForwardingTimerId<I>
84{
85    fn handle(self, core_ctx: &mut CC, bindings_ctx: &mut BC, _: BC::UniqueTimerId) {
86        match self {
87            MulticastForwardingTimerId::PendingPacketsGc(_) => {
88                core_ctx.with_state(|state, ctx| match state {
89                    // Multicast forwarding was disabled after GC was scheduled;
90                    // there are no resources to GC now.
91                    MulticastForwardingState::Disabled => {}
92                    MulticastForwardingState::Enabled(state) => {
93                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
94                            .pending_table_gc
95                            .increment();
96                        let removed_count = ctx.with_pending_table_mut(state, |pending_table| {
97                            pending_table.run_garbage_collection(bindings_ctx)
98                        });
99                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
100                            .pending_packet_drops_gc
101                            .add(removed_count);
102                    }
103                })
104            }
105        }
106    }
107}
108
109/// Events that may be published by the multicast forwarding engine.
110#[derive(Debug, Eq, Hash, PartialEq, GenericOverIp)]
111#[generic_over_ip(I, Ip)]
112pub enum MulticastForwardingEvent<I: IpLayerIpExt, D> {
113    /// A multicast packet was received for which there was no applicable route.
114    MissingRoute {
115        /// The key of the route that's missing.
116        key: MulticastRouteKey<I>,
117        /// The interface on which the packet was received.
118        input_interface: D,
119    },
120    /// A multicast packet was received on an unexpected input interface.
121    WrongInputInterface {
122        /// The key of the route with the unexpected input interface.
123        key: MulticastRouteKey<I>,
124        /// The interface on which the packet was received.
125        actual_input_interface: D,
126        /// The interface on which the packet was expected (as specified in the
127        /// multicast route).
128        expected_input_interface: D,
129    },
130}
131
132impl<I: IpLayerIpExt, D> MulticastForwardingEvent<I, D> {
133    pub(crate) fn map_device<O, F: Fn(D) -> O>(self, map: F) -> MulticastForwardingEvent<I, O> {
134        match self {
135            MulticastForwardingEvent::MissingRoute { key, input_interface } => {
136                MulticastForwardingEvent::MissingRoute {
137                    key,
138                    input_interface: map(input_interface),
139                }
140            }
141            MulticastForwardingEvent::WrongInputInterface {
142                key,
143                actual_input_interface,
144                expected_input_interface,
145            } => MulticastForwardingEvent::WrongInputInterface {
146                key,
147                actual_input_interface: map(actual_input_interface),
148                expected_input_interface: map(expected_input_interface),
149            },
150        }
151    }
152}
153
154impl<I: IpLayerIpExt, D: WeakDeviceIdentifier> MulticastForwardingEvent<I, D> {
155    /// Upgrades the device IDs held by this event.
156    pub fn upgrade_device_id(self) -> Option<MulticastForwardingEvent<I, D::Strong>> {
157        match self {
158            MulticastForwardingEvent::MissingRoute { key, input_interface } => {
159                Some(MulticastForwardingEvent::MissingRoute {
160                    key,
161                    input_interface: input_interface.upgrade()?,
162                })
163            }
164            MulticastForwardingEvent::WrongInputInterface {
165                key,
166                actual_input_interface,
167                expected_input_interface,
168            } => Some(MulticastForwardingEvent::WrongInputInterface {
169                key,
170                actual_input_interface: actual_input_interface.upgrade()?,
171                expected_input_interface: expected_input_interface.upgrade()?,
172            }),
173        }
174    }
175}
176
177/// Query the multicast route table and return the forwarding targets.
178///
179/// `None` may be returned in several situations:
180///   * if multicast forwarding is disabled (either stack-wide or for the
181///     provided `dev`),
182///   * if the packets src/dst addrs are not viable for multicast forwarding
183///     (see the requirements on [`MulticastRouteKey`]), or
184///   * if the route table does not have an entry suitable for this packet.
185///
186/// In the latter case, the packet is stashed in the
187/// [`MulticastForwardingPendingPackets`] table, and a relevant event is
188/// dispatched to bindings.
189///
190/// Note that the returned targets are not synchronized with the multicast route
191/// table and may grow stale if the table is updated.
192pub(crate) fn lookup_multicast_route_or_stash_packet<I, B, CC, BC>(
193    core_ctx: &mut CC,
194    bindings_ctx: &mut BC,
195    packet: &I::Packet<B>,
196    dev: &CC::DeviceId,
197    frame_dst: Option<FrameDestination>,
198) -> Option<MulticastRouteTargets<CC::DeviceId>>
199where
200    I: IpLayerIpExt,
201    B: SplitByteSlice,
202    CC: MulticastForwardingStateContext<I, BC>
203        + MulticastForwardingDeviceContext<I>
204        + CounterContext<MulticastForwardingCounters<I>>,
205    BC: MulticastForwardingBindingsContext<I, CC::DeviceId>,
206{
207    CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx).rx.increment();
208    // Short circuit if the packet's addresses don't constitute a valid
209    // multicast route key (e.g. src is not unicast, or dst is not multicast).
210    let key = MulticastRouteKey::new(packet.src_ip(), packet.dst_ip())?;
211    CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
212        .no_tx_invalid_key
213        .increment();
214
215    // Short circuit if the device has forwarding disabled.
216    if !core_ctx.is_device_multicast_forwarding_enabled(dev) {
217        CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
218            .no_tx_disabled_dev
219            .increment();
220        return None;
221    }
222
223    core_ctx.with_state(|state, ctx| {
224        // Short circuit if forwarding is disabled stack-wide.
225        let Some(state) = state.enabled() else {
226            CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
227                .no_tx_disabled_stack_wide
228                .increment();
229            return None;
230        };
231        ctx.with_route_table(state, |route_table, ctx| {
232            if let Some(MulticastRouteEntry {
233                route: MulticastRoute { input_interface, action },
234                stats,
235            }) = route_table.get(&key)
236            {
237                if dev != input_interface {
238                    CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
239                        .no_tx_wrong_dev
240                        .increment();
241                    bindings_ctx.on_event(
242                        MulticastForwardingEvent::WrongInputInterface {
243                            key,
244                            actual_input_interface: dev.clone(),
245                            expected_input_interface: input_interface.clone(),
246                        }
247                        .into(),
248                    );
249                    return None;
250                }
251
252                stats.last_used.store_max(bindings_ctx.now(), Ordering::Relaxed);
253
254                match action {
255                    Action::Forward(targets) => {
256                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
257                            .tx
258                            .increment();
259                        return Some(targets.clone());
260                    }
261                }
262            }
263            CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
264                .pending_packets
265                .increment();
266            match ctx.with_pending_table_mut(state, |pending_table| {
267                pending_table.try_queue_packet(bindings_ctx, key.clone(), packet, dev, frame_dst)
268            }) {
269                QueuePacketOutcome::QueuedInNewQueue => {
270                    bindings_ctx.on_event(
271                        MulticastForwardingEvent::MissingRoute {
272                            key,
273                            input_interface: dev.clone(),
274                        }
275                        .into(),
276                    );
277                }
278                QueuePacketOutcome::QueuedInExistingQueue => {}
279                QueuePacketOutcome::ExistingQueueFull => {
280                    CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
281                        .pending_packet_drops_queue_full
282                        .increment();
283                }
284            }
285            return None;
286        })
287    })
288}
289
290#[cfg(test)]
291mod testutil {
292    use super::*;
293
294    use alloc::rc::Rc;
295    use alloc::vec::Vec;
296    use core::cell::RefCell;
297    use derivative::Derivative;
298    use net_declare::{net_ip_v4, net_ip_v6};
299    use net_types::ip::{Ipv4, Ipv4Addr, Ipv6, Ipv6Addr, Mtu};
300    use net_types::{MulticastAddr, SpecifiedAddr};
301    use netstack3_base::testutil::{FakeStrongDeviceId, MultipleDevicesId};
302    use netstack3_base::{
303        CoreTimerContext, CounterContext, CtxPair, FrameDestination, Marks, ResourceCounterContext,
304    };
305    use netstack3_filter::ProofOfEgressCheck;
306    use netstack3_hashmap::HashSet;
307    use packet::{BufferMut, InnerPacketBuilder, PacketBuilder, Serializer};
308    use packet_formats::ip::{IpPacketBuilder, IpProto};
309
310    use crate::device::IpDeviceSendContext;
311    use crate::internal::base::DeviceIpLayerMetadata;
312    use crate::internal::icmp::{IcmpErrorHandler, IcmpHandlerIpExt};
313    use crate::multicast_forwarding::{
314        MulticastForwardingApi, MulticastForwardingEnabledState, MulticastForwardingPendingPackets,
315        MulticastForwardingPendingPacketsContext, MulticastForwardingState, MulticastRouteTable,
316        MulticastRouteTableContext,
317    };
318    use crate::{IpCounters, IpDeviceMtuContext, IpLayerEvent, IpPacketDestination};
319
320    /// An IP extension trait providing constants for various IP addresses.
321    pub(crate) trait TestIpExt: IpLayerIpExt {
322        const SRC1: Self::Addr;
323        const SRC2: Self::Addr;
324        const DST1: Self::Addr;
325        const DST2: Self::Addr;
326    }
327
328    impl TestIpExt for Ipv4 {
329        const SRC1: Ipv4Addr = net_ip_v4!("192.0.2.1");
330        const SRC2: Ipv4Addr = net_ip_v4!("192.0.2.2");
331        const DST1: Ipv4Addr = net_ip_v4!("224.0.1.1");
332        const DST2: Ipv4Addr = net_ip_v4!("224.0.1.2");
333    }
334
335    impl TestIpExt for Ipv6 {
336        const SRC1: Ipv6Addr = net_ip_v6!("2001:0DB8::1");
337        const SRC2: Ipv6Addr = net_ip_v6!("2001:0DB8::2");
338        const DST1: Ipv6Addr = net_ip_v6!("ff0e::1");
339        const DST2: Ipv6Addr = net_ip_v6!("ff0e::2");
340    }
341
342    /// Constructs a buffer containing an IP packet with sensible defaults.
343    pub(crate) fn new_ip_packet_buf<I: IpLayerIpExt>(
344        src_addr: I::Addr,
345        dst_addr: I::Addr,
346    ) -> impl AsRef<[u8]> {
347        const TTL: u8 = 255;
348        /// Arbitrary data to put inside of an IP packet.
349        const IP_BODY: [u8; 10] = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9];
350        I::PacketBuilder::new(src_addr, dst_addr, TTL, IpProto::Udp.into())
351            .wrap_body(IP_BODY.into_serializer())
352            .serialize_vec_outer()
353            .unwrap()
354    }
355
356    #[derive(Debug, PartialEq)]
357    pub(crate) struct SentPacket<I: IpLayerIpExt, D> {
358        pub(crate) dst: MulticastAddr<I::Addr>,
359        pub(crate) device: D,
360    }
361
362    #[derive(Derivative)]
363    #[derivative(Default(bound = ""))]
364    pub(crate) struct FakeCoreCtxState<I: IpLayerIpExt, D: FakeStrongDeviceId> {
365        // NB: Hold in an `Rc<RefCell<...>>` to switch to runtime borrow
366        // checking. This allows us to borrow the multicast forwarding state at
367        // the same time as the outer `FakeCoreCtx` is mutably borrowed.
368        pub(crate) multicast_forwarding:
369            Rc<RefCell<MulticastForwardingState<I, D, FakeBindingsCtx<I, D>>>>,
370        // The list of devices that have multicast forwarding enabled.
371        pub(crate) forwarding_enabled_devices: HashSet<D>,
372        // The list of packets sent by the netstack.
373        pub(crate) sent_packets: Vec<SentPacket<I, D>>,
374        stack_wide_counters: IpCounters<I>,
375        per_device_counters: IpCounters<I>,
376        multicast_forwarding_counters: MulticastForwardingCounters<I>,
377    }
378
379    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> FakeCoreCtxState<I, D> {
380        pub(crate) fn set_multicast_forwarding_enabled_for_dev(&mut self, dev: D, enabled: bool) {
381            if enabled {
382                let _: bool = self.forwarding_enabled_devices.insert(dev);
383            } else {
384                let _: bool = self.forwarding_enabled_devices.remove(&dev);
385            }
386        }
387
388        pub(crate) fn take_sent_packets(&mut self) -> Vec<SentPacket<I, D>> {
389            core::mem::take(&mut self.sent_packets)
390        }
391    }
392
393    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> CounterContext<IpCounters<I>>
394        for FakeCoreCtxState<I, D>
395    {
396        fn counters(&self) -> &IpCounters<I> {
397            &self.stack_wide_counters
398        }
399    }
400
401    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> ResourceCounterContext<D, IpCounters<I>>
402        for FakeCoreCtxState<I, D>
403    {
404        fn per_resource_counters(&self, _resource: &D) -> &IpCounters<I> {
405            &self.per_device_counters
406        }
407    }
408
409    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> CounterContext<MulticastForwardingCounters<I>>
410        for FakeCoreCtxState<I, D>
411    {
412        fn counters(&self) -> &MulticastForwardingCounters<I> {
413            &self.multicast_forwarding_counters
414        }
415    }
416
417    pub(crate) type FakeBindingsCtx<I, D> = netstack3_base::testutil::FakeBindingsCtx<
418        MulticastForwardingTimerId<I>,
419        IpLayerEvent<D, I>,
420        (),
421        (),
422    >;
423    pub(crate) type FakeCoreCtx<I, D> =
424        netstack3_base::testutil::FakeCoreCtx<FakeCoreCtxState<I, D>, (), D>;
425
426    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
427        MulticastForwardingStateContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
428    {
429        type Ctx<'a> = FakeCoreCtx<I, D>;
430        fn with_state<
431            O,
432            F: FnOnce(
433                &MulticastForwardingState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
434                &mut Self::Ctx<'_>,
435            ) -> O,
436        >(
437            &mut self,
438            cb: F,
439        ) -> O {
440            let state = self.state.multicast_forwarding.clone();
441            let borrow = state.borrow();
442            cb(&borrow, self)
443        }
444        fn with_state_mut<
445            O,
446            F: FnOnce(
447                &mut MulticastForwardingState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
448                &mut Self::Ctx<'_>,
449            ) -> O,
450        >(
451            &mut self,
452            cb: F,
453        ) -> O {
454            let state = self.state.multicast_forwarding.clone();
455            let mut borrow = state.borrow_mut();
456            cb(&mut borrow, self)
457        }
458    }
459
460    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
461        MulticastRouteTableContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
462    {
463        type Ctx<'a> = FakeCoreCtx<I, D>;
464        fn with_route_table<
465            O,
466            F: FnOnce(
467                &MulticastRouteTable<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
468                &mut Self::Ctx<'_>,
469            ) -> O,
470        >(
471            &mut self,
472            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
473            cb: F,
474        ) -> O {
475            let route_table = state.route_table().read();
476            cb(&route_table, self)
477        }
478        fn with_route_table_mut<
479            O,
480            F: FnOnce(
481                &mut MulticastRouteTable<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
482                &mut Self::Ctx<'_>,
483            ) -> O,
484        >(
485            &mut self,
486            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
487            cb: F,
488        ) -> O {
489            let mut route_table = state.route_table().write();
490            cb(&mut route_table, self)
491        }
492    }
493
494    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
495        MulticastForwardingPendingPacketsContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
496    {
497        fn with_pending_table_mut<
498            O,
499            F: FnOnce(
500                &mut MulticastForwardingPendingPackets<I, Self::WeakDeviceId, FakeBindingsCtx<I, D>>,
501            ) -> O,
502        >(
503            &mut self,
504            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
505            cb: F,
506        ) -> O {
507            let mut pending_table = state.pending_table().lock();
508            cb(&mut pending_table)
509        }
510    }
511
512    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> MulticastForwardingDeviceContext<I>
513        for FakeCoreCtx<I, D>
514    {
515        fn is_device_multicast_forwarding_enabled(&mut self, device_id: &Self::DeviceId) -> bool {
516            self.state.forwarding_enabled_devices.contains(device_id)
517        }
518    }
519
520    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
521        CoreTimerContext<MulticastForwardingTimerId<I>, FakeBindingsCtx<I, D>>
522        for FakeCoreCtx<I, D>
523    {
524        fn convert_timer(
525            dispatch_id: MulticastForwardingTimerId<I>,
526        ) -> MulticastForwardingTimerId<I> {
527            dispatch_id
528        }
529    }
530
531    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IpDeviceSendContext<I, FakeBindingsCtx<I, D>>
532        for FakeCoreCtx<I, D>
533    {
534        fn send_ip_frame<S>(
535            &mut self,
536            _bindings_ctx: &mut FakeBindingsCtx<I, D>,
537            device_id: &D,
538            destination: IpPacketDestination<I, &D>,
539            _ip_layer_metadata: DeviceIpLayerMetadata<FakeBindingsCtx<I, D>>,
540            _body: S,
541            _egress_proof: ProofOfEgressCheck,
542        ) -> Result<(), netstack3_base::SendFrameError<S>>
543        where
544            S: Serializer,
545            S::Buffer: BufferMut,
546        {
547            let dst = match destination {
548                IpPacketDestination::Multicast(dst) => dst,
549                dst => panic!("unexpected sent packet: destination={dst:?}"),
550            };
551            self.state.sent_packets.push(SentPacket { dst, device: device_id.clone() });
552            Ok(())
553        }
554    }
555
556    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IpDeviceMtuContext<I> for FakeCoreCtx<I, D> {
557        fn get_mtu(&mut self, _device_id: &Self::DeviceId) -> Mtu {
558            Mtu::max()
559        }
560    }
561
562    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IcmpErrorHandler<I, FakeBindingsCtx<I, D>>
563        for FakeCoreCtx<I, D>
564    {
565        fn send_icmp_error_message<B: BufferMut>(
566            &mut self,
567            _bindings_ctx: &mut FakeBindingsCtx<I, D>,
568            _device: &D,
569            _frame_dst: Option<FrameDestination>,
570            _src_ip: <I as IcmpHandlerIpExt>::SourceAddress,
571            _dst_ip: SpecifiedAddr<I::Addr>,
572            _original_packet: B,
573            _error: I::IcmpError,
574            _marks: &Marks,
575        ) {
576            unimplemented!()
577        }
578    }
579
580    pub(crate) fn new_api<I: IpLayerIpExt>() -> MulticastForwardingApi<
581        I,
582        CtxPair<FakeCoreCtx<I, MultipleDevicesId>, FakeBindingsCtx<I, MultipleDevicesId>>,
583    > {
584        MulticastForwardingApi::new(CtxPair::with_core_ctx(FakeCoreCtx::with_state(
585            Default::default(),
586        )))
587    }
588
589    /// A test helper to access the [`MulticastForwardingPendingPackets`] table.
590    ///
591    /// # Panics
592    ///
593    /// Panics if multicast forwarding is disabled.
594    pub(crate) fn with_pending_table<I, O, F, CC, BT>(core_ctx: &mut CC, cb: F) -> O
595    where
596        I: IpLayerIpExt,
597        CC: MulticastForwardingStateContext<I, BT>,
598        BT: MulticastForwardingBindingsTypes,
599        F: FnOnce(&mut MulticastForwardingPendingPackets<I, CC::WeakDeviceId, BT>) -> O,
600    {
601        core_ctx.with_state(|state, ctx| {
602            let state = state.enabled().unwrap();
603            ctx.with_route_table(state, |_routing_table, ctx| {
604                ctx.with_pending_table_mut(state, |pending_table| cb(pending_table))
605            })
606        })
607    }
608}
609
610#[cfg(test)]
611mod tests {
612    use super::*;
613
614    use alloc::vec;
615    use core::time::Duration;
616
617    use ip_test_macro::ip_test;
618    use netstack3_base::testutil::MultipleDevicesId;
619    use packet::ParseBuffer;
620    use test_case::test_case;
621    use testutil::TestIpExt;
622
623    use crate::internal::multicast_forwarding::route::MulticastRouteStats;
624    use crate::multicast_forwarding::MulticastRouteTarget;
625
626    struct LookupTestCase {
627        // Whether multicast forwarding is enabled for the netstack.
628        enabled: bool,
629        // Whether multicast forwarding is enabled for the device.
630        dev_enabled: bool,
631        // Whether the packet has the correct src/dst addrs.
632        right_key: bool,
633        // Whether the packet arrived on the correct device.
634        right_dev: bool,
635    }
636    const LOOKUP_SUCCESS_CASE: LookupTestCase =
637        LookupTestCase { enabled: true, dev_enabled: true, right_key: true, right_dev: true };
638
639    #[ip_test(I)]
640    #[test_case(LOOKUP_SUCCESS_CASE => true; "success")]
641    #[test_case(LookupTestCase{enabled: false, ..LOOKUP_SUCCESS_CASE} => false; "disabled")]
642    #[test_case(LookupTestCase{dev_enabled: false, ..LOOKUP_SUCCESS_CASE} => false; "dev_disabled")]
643    #[test_case(LookupTestCase{right_key: false, ..LOOKUP_SUCCESS_CASE} => false; "wrong_key")]
644    #[test_case(LookupTestCase{right_dev: false, ..LOOKUP_SUCCESS_CASE} => false; "wrong_dev")]
645    fn lookup_route<I: TestIpExt>(test_case: LookupTestCase) -> bool {
646        let LookupTestCase { enabled, dev_enabled, right_key, right_dev } = test_case;
647        const FRAME_DST: Option<FrameDestination> = None;
648        let mut api = testutil::new_api::<I>();
649
650        let expected_key = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
651        let actual_key = if right_key {
652            expected_key.clone()
653        } else {
654            MulticastRouteKey::new(I::SRC2, I::DST2).unwrap()
655        };
656
657        let expected_dev = MultipleDevicesId::A;
658        let actual_dev = if right_dev { expected_dev } else { MultipleDevicesId::B };
659
660        if enabled {
661            assert!(api.enable());
662            // NB: Only attempt to install the route when enabled; Otherwise
663            // installation fails.
664            assert_eq!(
665                api.add_multicast_route(
666                    expected_key.clone(),
667                    MulticastRoute::new_forward(
668                        expected_dev,
669                        [MulticastRouteTarget {
670                            output_interface: MultipleDevicesId::C,
671                            min_ttl: 0
672                        }]
673                        .into()
674                    )
675                    .unwrap()
676                ),
677                Ok(None)
678            );
679        }
680
681        api.core_ctx().state.set_multicast_forwarding_enabled_for_dev(actual_dev, dev_enabled);
682
683        let (core_ctx, bindings_ctx) = api.contexts();
684        let creation_time = bindings_ctx.now();
685        bindings_ctx.timers.instant.sleep(Duration::from_secs(5));
686        let lookup_time = bindings_ctx.now();
687        assert!(lookup_time > creation_time);
688
689        let buf = testutil::new_ip_packet_buf::<I>(actual_key.src_addr(), actual_key.dst_addr());
690        let mut buf_ref = buf.as_ref();
691        let packet = buf_ref.parse::<I::Packet<_>>().expect("parse should succeed");
692
693        let route = lookup_multicast_route_or_stash_packet(
694            core_ctx,
695            bindings_ctx,
696            &packet,
697            &actual_dev,
698            FRAME_DST,
699        );
700
701        // Verify that multicast routing events are generated.
702        let mut expected_events = vec![];
703        if !right_key {
704            expected_events.push(IpLayerEvent::MulticastForwarding(
705                MulticastForwardingEvent::MissingRoute {
706                    key: actual_key.clone(),
707                    input_interface: actual_dev,
708                },
709            ));
710        }
711        if !right_dev {
712            expected_events.push(IpLayerEvent::MulticastForwarding(
713                MulticastForwardingEvent::WrongInputInterface {
714                    key: actual_key,
715                    actual_input_interface: actual_dev,
716                    expected_input_interface: expected_dev,
717                },
718            ));
719        }
720        assert_eq!(bindings_ctx.take_events(), expected_events);
721
722        let lookup_succeeded = route.is_some();
723
724        if enabled {
725            // Verify that on success, the last_used field in stats is updated.
726            let expected_stats = if lookup_succeeded {
727                MulticastRouteStats { last_used: lookup_time }
728            } else {
729                MulticastRouteStats { last_used: creation_time }
730            };
731            assert_eq!(api.get_route_stats(&expected_key), Ok(Some(expected_stats)));
732        }
733
734        // Verify that counters are updated.
735        let counters: &MulticastForwardingCounters<I> = api.core_ctx().counters();
736        assert_eq!(counters.rx.get(), 1);
737        assert_eq!(counters.tx.get(), if lookup_succeeded { 1 } else { 0 });
738        assert_eq!(counters.no_tx_disabled_dev.get(), if dev_enabled { 0 } else { 1 });
739        assert_eq!(counters.no_tx_disabled_stack_wide.get(), if enabled { 0 } else { 1 });
740        assert_eq!(counters.no_tx_wrong_dev.get(), if right_dev { 0 } else { 1 });
741        assert_eq!(counters.pending_packets.get(), if right_key { 0 } else { 1 });
742
743        lookup_succeeded
744    }
745}