netstack3_ip/
multicast_forwarding.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! An implementation of multicast forwarding.
6//!
7//! Multicast forwarding is the ability for netstack to forward multicast
8//! packets that arrive on an interface out multiple interfaces (while also
9//! optionally delivering the packet to the host itself if the arrival host has
10//! an interest in the packet).
11//!
12//! Note that multicast forwarding decisions are made by consulting the
13//! multicast routing table, a routing table entirely separate from the unicast
14//! routing table(s).
15
16pub(crate) mod api;
17pub(crate) mod counters;
18pub(crate) mod packet_queue;
19pub(crate) mod route;
20pub(crate) mod state;
21
22use core::sync::atomic::Ordering;
23
24use net_types::ip::{GenericOverIp, Ip, IpVersionMarker};
25use netstack3_base::{
26    AnyDevice, AtomicInstant, CounterContext, DeviceIdContext, EventContext, FrameDestination,
27    HandleableTimer, InstantBindingsTypes, InstantContext, TimerBindingsTypes, TimerContext,
28    WeakDeviceIdentifier,
29};
30use packet_formats::ip::IpPacket;
31use zerocopy::SplitByteSlice;
32
33use crate::internal::multicast_forwarding::counters::MulticastForwardingCounters;
34use crate::internal::multicast_forwarding::packet_queue::QueuePacketOutcome;
35use crate::internal::multicast_forwarding::route::{
36    Action, MulticastRouteEntry, MulticastRouteTargets,
37};
38use crate::multicast_forwarding::{
39    MulticastForwardingPendingPacketsContext, MulticastForwardingState,
40    MulticastForwardingStateContext, MulticastRoute, MulticastRouteKey,
41    MulticastRouteTableContext as _,
42};
43use crate::{IpLayerEvent, IpLayerIpExt};
44
45/// Required types for multicast forwarding provided by Bindings.
46pub trait MulticastForwardingBindingsTypes: InstantBindingsTypes + TimerBindingsTypes {}
47impl<BT: InstantBindingsTypes + TimerBindingsTypes> MulticastForwardingBindingsTypes for BT {}
48
49/// Required functionality for multicast forwarding provided by Bindings.
50pub trait MulticastForwardingBindingsContext<I: IpLayerIpExt, D>:
51    MulticastForwardingBindingsTypes + InstantContext + TimerContext + EventContext<IpLayerEvent<D, I>>
52{
53}
54impl<
55        I: IpLayerIpExt,
56        D,
57        BC: MulticastForwardingBindingsTypes
58            + InstantContext
59            + TimerContext
60            + EventContext<IpLayerEvent<D, I>>,
61    > MulticastForwardingBindingsContext<I, D> for BC
62{
63}
64
65/// Device related functionality required by multicast forwarding.
66pub trait MulticastForwardingDeviceContext<I: IpLayerIpExt>: DeviceIdContext<AnyDevice> {
67    /// True if the given device has multicast forwarding enabled.
68    fn is_device_multicast_forwarding_enabled(&mut self, dev: &Self::DeviceId) -> bool;
69}
70
71/// A timer event for multicast forwarding.
72#[derive(Clone, Debug, Eq, GenericOverIp, Hash, PartialEq)]
73#[generic_over_ip(I, Ip)]
74pub enum MulticastForwardingTimerId<I: Ip> {
75    /// A trigger to perform garbage collection on the pending packets table.
76    PendingPacketsGc(IpVersionMarker<I>),
77}
78
79impl<
80        I: IpLayerIpExt,
81        BC: MulticastForwardingBindingsContext<I, CC::DeviceId>,
82        CC: MulticastForwardingStateContext<I, BC> + CounterContext<MulticastForwardingCounters<I>>,
83    > HandleableTimer<CC, BC> for MulticastForwardingTimerId<I>
84{
85    fn handle(self, core_ctx: &mut CC, bindings_ctx: &mut BC, _: BC::UniqueTimerId) {
86        match self {
87            MulticastForwardingTimerId::PendingPacketsGc(_) => {
88                core_ctx.with_state(|state, ctx| match state {
89                    // Multicast forwarding was disabled after GC was scheduled;
90                    // there are no resources to GC now.
91                    MulticastForwardingState::Disabled => {}
92                    MulticastForwardingState::Enabled(state) => {
93                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
94                            .pending_table_gc
95                            .increment();
96                        let removed_count = ctx.with_pending_table_mut(state, |pending_table| {
97                            pending_table.run_garbage_collection(bindings_ctx)
98                        });
99                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
100                            .pending_packet_drops_gc
101                            .add(removed_count);
102                    }
103                })
104            }
105        }
106    }
107}
108
109/// Events that may be published by the multicast forwarding engine.
110#[derive(Debug, Eq, Hash, PartialEq, GenericOverIp)]
111#[generic_over_ip(I, Ip)]
112pub enum MulticastForwardingEvent<I: IpLayerIpExt, D> {
113    /// A multicast packet was received for which there was no applicable route.
114    MissingRoute {
115        /// The key of the route that's missing.
116        key: MulticastRouteKey<I>,
117        /// The interface on which the packet was received.
118        input_interface: D,
119    },
120    /// A multicast packet was received on an unexpected input interface.
121    WrongInputInterface {
122        /// The key of the route with the unexpected input interface.
123        key: MulticastRouteKey<I>,
124        /// The interface on which the packet was received.
125        actual_input_interface: D,
126        /// The interface on which the packet was expected (as specified in the
127        /// multicast route).
128        expected_input_interface: D,
129    },
130}
131
132impl<I: IpLayerIpExt, D> MulticastForwardingEvent<I, D> {
133    pub(crate) fn map_device<O, F: Fn(D) -> O>(self, map: F) -> MulticastForwardingEvent<I, O> {
134        match self {
135            MulticastForwardingEvent::MissingRoute { key, input_interface } => {
136                MulticastForwardingEvent::MissingRoute {
137                    key,
138                    input_interface: map(input_interface),
139                }
140            }
141            MulticastForwardingEvent::WrongInputInterface {
142                key,
143                actual_input_interface,
144                expected_input_interface,
145            } => MulticastForwardingEvent::WrongInputInterface {
146                key,
147                actual_input_interface: map(actual_input_interface),
148                expected_input_interface: map(expected_input_interface),
149            },
150        }
151    }
152}
153
154impl<I: IpLayerIpExt, D: WeakDeviceIdentifier> MulticastForwardingEvent<I, D> {
155    /// Upgrades the device IDs held by this event.
156    pub fn upgrade_device_id(self) -> Option<MulticastForwardingEvent<I, D::Strong>> {
157        match self {
158            MulticastForwardingEvent::MissingRoute { key, input_interface } => {
159                Some(MulticastForwardingEvent::MissingRoute {
160                    key,
161                    input_interface: input_interface.upgrade()?,
162                })
163            }
164            MulticastForwardingEvent::WrongInputInterface {
165                key,
166                actual_input_interface,
167                expected_input_interface,
168            } => Some(MulticastForwardingEvent::WrongInputInterface {
169                key,
170                actual_input_interface: actual_input_interface.upgrade()?,
171                expected_input_interface: expected_input_interface.upgrade()?,
172            }),
173        }
174    }
175}
176
177/// Query the multicast route table and return the forwarding targets.
178///
179/// `None` may be returned in several situations:
180///   * if multicast forwarding is disabled (either stack-wide or for the
181///     provided `dev`),
182///   * if the packets src/dst addrs are not viable for multicast forwarding
183///     (see the requirements on [`MulticastRouteKey`]), or
184///   * if the route table does not have an entry suitable for this packet.
185///
186/// In the latter case, the packet is stashed in the
187/// [`MulticastForwardingPendingPackets`] table, and a relevant event is
188/// dispatched to bindings.
189///
190/// Note that the returned targets are not synchronized with the multicast route
191/// table and may grow stale if the table is updated.
192pub(crate) fn lookup_multicast_route_or_stash_packet<I, B, CC, BC>(
193    core_ctx: &mut CC,
194    bindings_ctx: &mut BC,
195    packet: &I::Packet<B>,
196    dev: &CC::DeviceId,
197    frame_dst: Option<FrameDestination>,
198) -> Option<MulticastRouteTargets<CC::DeviceId>>
199where
200    I: IpLayerIpExt,
201    B: SplitByteSlice,
202    CC: MulticastForwardingStateContext<I, BC>
203        + MulticastForwardingDeviceContext<I>
204        + CounterContext<MulticastForwardingCounters<I>>,
205    BC: MulticastForwardingBindingsContext<I, CC::DeviceId>,
206{
207    CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx).rx.increment();
208    // Short circuit if the packet's addresses don't constitute a valid
209    // multicast route key (e.g. src is not unicast, or dst is not multicast).
210    let key = MulticastRouteKey::new(packet.src_ip(), packet.dst_ip())?;
211    CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
212        .no_tx_invalid_key
213        .increment();
214
215    // Short circuit if the device has forwarding disabled.
216    if !core_ctx.is_device_multicast_forwarding_enabled(dev) {
217        CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
218            .no_tx_disabled_dev
219            .increment();
220        return None;
221    }
222
223    core_ctx.with_state(|state, ctx| {
224        // Short circuit if forwarding is disabled stack-wide.
225        let Some(state) = state.enabled() else {
226            CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
227                .no_tx_disabled_stack_wide
228                .increment();
229            return None;
230        };
231        ctx.with_route_table(state, |route_table, ctx| {
232            if let Some(MulticastRouteEntry {
233                route: MulticastRoute { input_interface, action },
234                stats,
235            }) = route_table.get(&key)
236            {
237                if dev != input_interface {
238                    CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
239                        .no_tx_wrong_dev
240                        .increment();
241                    bindings_ctx.on_event(
242                        MulticastForwardingEvent::WrongInputInterface {
243                            key,
244                            actual_input_interface: dev.clone(),
245                            expected_input_interface: input_interface.clone(),
246                        }
247                        .into(),
248                    );
249                    return None;
250                }
251
252                stats.last_used.store_max(bindings_ctx.now(), Ordering::Relaxed);
253
254                match action {
255                    Action::Forward(targets) => {
256                        CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
257                            .tx
258                            .increment();
259                        return Some(targets.clone());
260                    }
261                }
262            }
263            CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
264                .pending_packets
265                .increment();
266            match ctx.with_pending_table_mut(state, |pending_table| {
267                pending_table.try_queue_packet(bindings_ctx, key.clone(), packet, dev, frame_dst)
268            }) {
269                QueuePacketOutcome::QueuedInNewQueue => {
270                    bindings_ctx.on_event(
271                        MulticastForwardingEvent::MissingRoute {
272                            key,
273                            input_interface: dev.clone(),
274                        }
275                        .into(),
276                    );
277                }
278                QueuePacketOutcome::QueuedInExistingQueue => {}
279                QueuePacketOutcome::ExistingQueueFull => {
280                    CounterContext::<MulticastForwardingCounters<I>>::counters(ctx)
281                        .pending_packet_drops_queue_full
282                        .increment();
283                }
284            }
285            return None;
286        })
287    })
288}
289
290#[cfg(test)]
291mod testutil {
292    use super::*;
293
294    use alloc::collections::HashSet;
295    use alloc::rc::Rc;
296    use alloc::vec::Vec;
297    use core::cell::RefCell;
298    use derivative::Derivative;
299    use net_declare::{net_ip_v4, net_ip_v6};
300    use net_types::ip::{Ipv4, Ipv4Addr, Ipv6, Ipv6Addr, Mtu};
301    use net_types::{MulticastAddr, SpecifiedAddr};
302    use netstack3_base::testutil::{FakeStrongDeviceId, MultipleDevicesId};
303    use netstack3_base::{
304        CoreTimerContext, CounterContext, CtxPair, FrameDestination, Marks, ResourceCounterContext,
305    };
306    use netstack3_filter::ProofOfEgressCheck;
307    use packet::{BufferMut, InnerPacketBuilder, Serializer};
308    use packet_formats::ip::{IpPacketBuilder, IpProto};
309
310    use crate::device::IpDeviceSendContext;
311    use crate::internal::base::DeviceIpLayerMetadata;
312    use crate::internal::icmp::{IcmpErrorHandler, IcmpHandlerIpExt};
313    use crate::multicast_forwarding::{
314        MulticastForwardingApi, MulticastForwardingEnabledState, MulticastForwardingPendingPackets,
315        MulticastForwardingPendingPacketsContext, MulticastForwardingState, MulticastRouteTable,
316        MulticastRouteTableContext,
317    };
318    use crate::{IpCounters, IpDeviceMtuContext, IpLayerEvent, IpPacketDestination};
319
320    /// An IP extension trait providing constants for various IP addresses.
321    pub(crate) trait TestIpExt: IpLayerIpExt {
322        const SRC1: Self::Addr;
323        const SRC2: Self::Addr;
324        const DST1: Self::Addr;
325        const DST2: Self::Addr;
326    }
327
328    impl TestIpExt for Ipv4 {
329        const SRC1: Ipv4Addr = net_ip_v4!("192.0.2.1");
330        const SRC2: Ipv4Addr = net_ip_v4!("192.0.2.2");
331        const DST1: Ipv4Addr = net_ip_v4!("224.0.1.1");
332        const DST2: Ipv4Addr = net_ip_v4!("224.0.1.2");
333    }
334
335    impl TestIpExt for Ipv6 {
336        const SRC1: Ipv6Addr = net_ip_v6!("2001:0DB8::1");
337        const SRC2: Ipv6Addr = net_ip_v6!("2001:0DB8::2");
338        const DST1: Ipv6Addr = net_ip_v6!("ff0e::1");
339        const DST2: Ipv6Addr = net_ip_v6!("ff0e::2");
340    }
341
342    /// Constructs a buffer containing an IP packet with sensible defaults.
343    pub(crate) fn new_ip_packet_buf<I: IpLayerIpExt>(
344        src_addr: I::Addr,
345        dst_addr: I::Addr,
346    ) -> impl AsRef<[u8]> {
347        const TTL: u8 = 255;
348        /// Arbitrary data to put inside of an IP packet.
349        const IP_BODY: [u8; 10] = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9];
350        IP_BODY
351            .into_serializer()
352            .encapsulate(I::PacketBuilder::new(src_addr, dst_addr, TTL, IpProto::Udp.into()))
353            .serialize_vec_outer()
354            .unwrap()
355    }
356
357    #[derive(Debug, PartialEq)]
358    pub(crate) struct SentPacket<I: IpLayerIpExt, D> {
359        pub(crate) dst: MulticastAddr<I::Addr>,
360        pub(crate) device: D,
361    }
362
363    #[derive(Derivative)]
364    #[derivative(Default(bound = ""))]
365    pub(crate) struct FakeCoreCtxState<I: IpLayerIpExt, D: FakeStrongDeviceId> {
366        // NB: Hold in an `Rc<RefCell<...>>` to switch to runtime borrow
367        // checking. This allows us to borrow the multicast forwarding state at
368        // the same time as the outer `FakeCoreCtx` is mutably borrowed.
369        pub(crate) multicast_forwarding:
370            Rc<RefCell<MulticastForwardingState<I, D, FakeBindingsCtx<I, D>>>>,
371        // The list of devices that have multicast forwarding enabled.
372        pub(crate) forwarding_enabled_devices: HashSet<D>,
373        // The list of packets sent by the netstack.
374        pub(crate) sent_packets: Vec<SentPacket<I, D>>,
375        stack_wide_counters: IpCounters<I>,
376        per_device_counters: IpCounters<I>,
377        multicast_forwarding_counters: MulticastForwardingCounters<I>,
378    }
379
380    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> FakeCoreCtxState<I, D> {
381        pub(crate) fn set_multicast_forwarding_enabled_for_dev(&mut self, dev: D, enabled: bool) {
382            if enabled {
383                let _: bool = self.forwarding_enabled_devices.insert(dev);
384            } else {
385                let _: bool = self.forwarding_enabled_devices.remove(&dev);
386            }
387        }
388
389        pub(crate) fn take_sent_packets(&mut self) -> Vec<SentPacket<I, D>> {
390            core::mem::take(&mut self.sent_packets)
391        }
392    }
393
394    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> CounterContext<IpCounters<I>>
395        for FakeCoreCtxState<I, D>
396    {
397        fn counters(&self) -> &IpCounters<I> {
398            &self.stack_wide_counters
399        }
400    }
401
402    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> ResourceCounterContext<D, IpCounters<I>>
403        for FakeCoreCtxState<I, D>
404    {
405        fn per_resource_counters(&self, _resource: &D) -> &IpCounters<I> {
406            &self.per_device_counters
407        }
408    }
409
410    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> CounterContext<MulticastForwardingCounters<I>>
411        for FakeCoreCtxState<I, D>
412    {
413        fn counters(&self) -> &MulticastForwardingCounters<I> {
414            &self.multicast_forwarding_counters
415        }
416    }
417
418    pub(crate) type FakeBindingsCtx<I, D> = netstack3_base::testutil::FakeBindingsCtx<
419        MulticastForwardingTimerId<I>,
420        IpLayerEvent<D, I>,
421        (),
422        (),
423    >;
424    pub(crate) type FakeCoreCtx<I, D> =
425        netstack3_base::testutil::FakeCoreCtx<FakeCoreCtxState<I, D>, (), D>;
426
427    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
428        MulticastForwardingStateContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
429    {
430        type Ctx<'a> = FakeCoreCtx<I, D>;
431        fn with_state<
432            O,
433            F: FnOnce(
434                &MulticastForwardingState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
435                &mut Self::Ctx<'_>,
436            ) -> O,
437        >(
438            &mut self,
439            cb: F,
440        ) -> O {
441            let state = self.state.multicast_forwarding.clone();
442            let borrow = state.borrow();
443            cb(&borrow, self)
444        }
445        fn with_state_mut<
446            O,
447            F: FnOnce(
448                &mut MulticastForwardingState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
449                &mut Self::Ctx<'_>,
450            ) -> O,
451        >(
452            &mut self,
453            cb: F,
454        ) -> O {
455            let state = self.state.multicast_forwarding.clone();
456            let mut borrow = state.borrow_mut();
457            cb(&mut borrow, self)
458        }
459    }
460
461    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
462        MulticastRouteTableContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
463    {
464        type Ctx<'a> = FakeCoreCtx<I, D>;
465        fn with_route_table<
466            O,
467            F: FnOnce(
468                &MulticastRouteTable<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
469                &mut Self::Ctx<'_>,
470            ) -> O,
471        >(
472            &mut self,
473            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
474            cb: F,
475        ) -> O {
476            let route_table = state.route_table().read();
477            cb(&route_table, self)
478        }
479        fn with_route_table_mut<
480            O,
481            F: FnOnce(
482                &mut MulticastRouteTable<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
483                &mut Self::Ctx<'_>,
484            ) -> O,
485        >(
486            &mut self,
487            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
488            cb: F,
489        ) -> O {
490            let mut route_table = state.route_table().write();
491            cb(&mut route_table, self)
492        }
493    }
494
495    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
496        MulticastForwardingPendingPacketsContext<I, FakeBindingsCtx<I, D>> for FakeCoreCtx<I, D>
497    {
498        fn with_pending_table_mut<
499            O,
500            F: FnOnce(
501                &mut MulticastForwardingPendingPackets<I, Self::WeakDeviceId, FakeBindingsCtx<I, D>>,
502            ) -> O,
503        >(
504            &mut self,
505            state: &MulticastForwardingEnabledState<I, Self::DeviceId, FakeBindingsCtx<I, D>>,
506            cb: F,
507        ) -> O {
508            let mut pending_table = state.pending_table().lock();
509            cb(&mut pending_table)
510        }
511    }
512
513    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> MulticastForwardingDeviceContext<I>
514        for FakeCoreCtx<I, D>
515    {
516        fn is_device_multicast_forwarding_enabled(&mut self, device_id: &Self::DeviceId) -> bool {
517            self.state.forwarding_enabled_devices.contains(device_id)
518        }
519    }
520
521    impl<I: IpLayerIpExt, D: FakeStrongDeviceId>
522        CoreTimerContext<MulticastForwardingTimerId<I>, FakeBindingsCtx<I, D>>
523        for FakeCoreCtx<I, D>
524    {
525        fn convert_timer(
526            dispatch_id: MulticastForwardingTimerId<I>,
527        ) -> MulticastForwardingTimerId<I> {
528            dispatch_id
529        }
530    }
531
532    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IpDeviceSendContext<I, FakeBindingsCtx<I, D>>
533        for FakeCoreCtx<I, D>
534    {
535        fn send_ip_frame<S>(
536            &mut self,
537            _bindings_ctx: &mut FakeBindingsCtx<I, D>,
538            device_id: &D,
539            destination: IpPacketDestination<I, &D>,
540            _ip_layer_metadata: DeviceIpLayerMetadata<FakeBindingsCtx<I, D>>,
541            _body: S,
542            _egress_proof: ProofOfEgressCheck,
543        ) -> Result<(), netstack3_base::SendFrameError<S>>
544        where
545            S: Serializer,
546            S::Buffer: BufferMut,
547        {
548            let dst = match destination {
549                IpPacketDestination::Multicast(dst) => dst,
550                dst => panic!("unexpected sent packet: destination={dst:?}"),
551            };
552            self.state.sent_packets.push(SentPacket { dst, device: device_id.clone() });
553            Ok(())
554        }
555    }
556
557    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IpDeviceMtuContext<I> for FakeCoreCtx<I, D> {
558        fn get_mtu(&mut self, _device_id: &Self::DeviceId) -> Mtu {
559            Mtu::max()
560        }
561    }
562
563    impl<I: IpLayerIpExt, D: FakeStrongDeviceId> IcmpErrorHandler<I, FakeBindingsCtx<I, D>>
564        for FakeCoreCtx<I, D>
565    {
566        fn send_icmp_error_message<B: BufferMut>(
567            &mut self,
568            _bindings_ctx: &mut FakeBindingsCtx<I, D>,
569            _device: &D,
570            _frame_dst: Option<FrameDestination>,
571            _src_ip: <I as IcmpHandlerIpExt>::SourceAddress,
572            _dst_ip: SpecifiedAddr<I::Addr>,
573            _original_packet: B,
574            _error: I::IcmpError,
575            _marks: &Marks,
576        ) {
577            unimplemented!()
578        }
579    }
580
581    pub(crate) fn new_api<I: IpLayerIpExt>() -> MulticastForwardingApi<
582        I,
583        CtxPair<FakeCoreCtx<I, MultipleDevicesId>, FakeBindingsCtx<I, MultipleDevicesId>>,
584    > {
585        MulticastForwardingApi::new(CtxPair::with_core_ctx(FakeCoreCtx::with_state(
586            Default::default(),
587        )))
588    }
589
590    /// A test helper to access the [`MulticastForwardingPendingPackets`] table.
591    ///
592    /// # Panics
593    ///
594    /// Panics if multicast forwarding is disabled.
595    pub(crate) fn with_pending_table<I, O, F, CC, BT>(core_ctx: &mut CC, cb: F) -> O
596    where
597        I: IpLayerIpExt,
598        CC: MulticastForwardingStateContext<I, BT>,
599        BT: MulticastForwardingBindingsTypes,
600        F: FnOnce(&mut MulticastForwardingPendingPackets<I, CC::WeakDeviceId, BT>) -> O,
601    {
602        core_ctx.with_state(|state, ctx| {
603            let state = state.enabled().unwrap();
604            ctx.with_route_table(state, |_routing_table, ctx| {
605                ctx.with_pending_table_mut(state, |pending_table| cb(pending_table))
606            })
607        })
608    }
609}
610
611#[cfg(test)]
612mod tests {
613    use super::*;
614
615    use alloc::vec;
616    use core::time::Duration;
617
618    use ip_test_macro::ip_test;
619    use netstack3_base::testutil::MultipleDevicesId;
620    use packet::ParseBuffer;
621    use test_case::test_case;
622    use testutil::TestIpExt;
623
624    use crate::internal::multicast_forwarding::route::MulticastRouteStats;
625    use crate::multicast_forwarding::MulticastRouteTarget;
626
627    struct LookupTestCase {
628        // Whether multicast forwarding is enabled for the netstack.
629        enabled: bool,
630        // Whether multicast forwarding is enabled for the device.
631        dev_enabled: bool,
632        // Whether the packet has the correct src/dst addrs.
633        right_key: bool,
634        // Whether the packet arrived on the correct device.
635        right_dev: bool,
636    }
637    const LOOKUP_SUCCESS_CASE: LookupTestCase =
638        LookupTestCase { enabled: true, dev_enabled: true, right_key: true, right_dev: true };
639
640    #[ip_test(I)]
641    #[test_case(LOOKUP_SUCCESS_CASE => true; "success")]
642    #[test_case(LookupTestCase{enabled: false, ..LOOKUP_SUCCESS_CASE} => false; "disabled")]
643    #[test_case(LookupTestCase{dev_enabled: false, ..LOOKUP_SUCCESS_CASE} => false; "dev_disabled")]
644    #[test_case(LookupTestCase{right_key: false, ..LOOKUP_SUCCESS_CASE} => false; "wrong_key")]
645    #[test_case(LookupTestCase{right_dev: false, ..LOOKUP_SUCCESS_CASE} => false; "wrong_dev")]
646    fn lookup_route<I: TestIpExt>(test_case: LookupTestCase) -> bool {
647        let LookupTestCase { enabled, dev_enabled, right_key, right_dev } = test_case;
648        const FRAME_DST: Option<FrameDestination> = None;
649        let mut api = testutil::new_api::<I>();
650
651        let expected_key = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
652        let actual_key = if right_key {
653            expected_key.clone()
654        } else {
655            MulticastRouteKey::new(I::SRC2, I::DST2).unwrap()
656        };
657
658        let expected_dev = MultipleDevicesId::A;
659        let actual_dev = if right_dev { expected_dev } else { MultipleDevicesId::B };
660
661        if enabled {
662            assert!(api.enable());
663            // NB: Only attempt to install the route when enabled; Otherwise
664            // installation fails.
665            assert_eq!(
666                api.add_multicast_route(
667                    expected_key.clone(),
668                    MulticastRoute::new_forward(
669                        expected_dev,
670                        [MulticastRouteTarget {
671                            output_interface: MultipleDevicesId::C,
672                            min_ttl: 0
673                        }]
674                        .into()
675                    )
676                    .unwrap()
677                ),
678                Ok(None)
679            );
680        }
681
682        api.core_ctx().state.set_multicast_forwarding_enabled_for_dev(actual_dev, dev_enabled);
683
684        let (core_ctx, bindings_ctx) = api.contexts();
685        let creation_time = bindings_ctx.now();
686        bindings_ctx.timers.instant.sleep(Duration::from_secs(5));
687        let lookup_time = bindings_ctx.now();
688        assert!(lookup_time > creation_time);
689
690        let buf = testutil::new_ip_packet_buf::<I>(actual_key.src_addr(), actual_key.dst_addr());
691        let mut buf_ref = buf.as_ref();
692        let packet = buf_ref.parse::<I::Packet<_>>().expect("parse should succeed");
693
694        let route = lookup_multicast_route_or_stash_packet(
695            core_ctx,
696            bindings_ctx,
697            &packet,
698            &actual_dev,
699            FRAME_DST,
700        );
701
702        // Verify that multicast routing events are generated.
703        let mut expected_events = vec![];
704        if !right_key {
705            expected_events.push(IpLayerEvent::MulticastForwarding(
706                MulticastForwardingEvent::MissingRoute {
707                    key: actual_key.clone(),
708                    input_interface: actual_dev,
709                },
710            ));
711        }
712        if !right_dev {
713            expected_events.push(IpLayerEvent::MulticastForwarding(
714                MulticastForwardingEvent::WrongInputInterface {
715                    key: actual_key,
716                    actual_input_interface: actual_dev,
717                    expected_input_interface: expected_dev,
718                },
719            ));
720        }
721        assert_eq!(bindings_ctx.take_events(), expected_events);
722
723        let lookup_succeeded = route.is_some();
724
725        if enabled {
726            // Verify that on success, the last_used field in stats is updated.
727            let expected_stats = if lookup_succeeded {
728                MulticastRouteStats { last_used: lookup_time }
729            } else {
730                MulticastRouteStats { last_used: creation_time }
731            };
732            assert_eq!(api.get_route_stats(&expected_key), Ok(Some(expected_stats)));
733        }
734
735        // Verify that counters are updated.
736        let counters: &MulticastForwardingCounters<I> = api.core_ctx().counters();
737        assert_eq!(counters.rx.get(), 1);
738        assert_eq!(counters.tx.get(), if lookup_succeeded { 1 } else { 0 });
739        assert_eq!(counters.no_tx_disabled_dev.get(), if dev_enabled { 0 } else { 1 });
740        assert_eq!(counters.no_tx_disabled_stack_wide.get(), if enabled { 0 } else { 1 });
741        assert_eq!(counters.no_tx_wrong_dev.get(), if right_dev { 0 } else { 1 });
742        assert_eq!(counters.pending_packets.get(), if right_key { 0 } else { 1 });
743
744        lookup_succeeded
745    }
746}