1use alloc::collections::btree_map;
8use core::sync::atomic::Ordering;
9
10use log::warn;
11use net_types::SpecifiedAddr;
12use net_types::ip::{Ip, IpVersionMarker};
13use netstack3_base::{
14 AnyDevice, AtomicInstant, ContextPair, CoreTimerContext, CounterContext, DeviceIdContext,
15 Inspector, InspectorDeviceExt, InstantBindingsTypes, InstantContext, StrongDeviceIdentifier,
16 WeakDeviceIdentifier,
17};
18
19use crate::internal::base::IpLayerForwardingContext;
20use crate::internal::multicast_forwarding::counters::MulticastForwardingCounters;
21use crate::internal::multicast_forwarding::packet_queue::{PacketQueue, QueuedPacket};
22use crate::internal::multicast_forwarding::route::{
23 Action, MulticastRoute, MulticastRouteEntry, MulticastRouteKey, MulticastRouteStats,
24 MulticastRouteTarget,
25};
26use crate::internal::multicast_forwarding::state::{
27 MulticastForwardingEnabledState, MulticastForwardingPendingPacketsContext as _,
28 MulticastForwardingState, MulticastForwardingStateContext, MulticastRouteTableContext as _,
29};
30use crate::internal::multicast_forwarding::{
31 MulticastForwardingBindingsTypes, MulticastForwardingDeviceContext, MulticastForwardingEvent,
32 MulticastForwardingTimerId,
33};
34use crate::{IpLayerBindingsContext, IpLayerIpExt, IpPacketDestination};
35
36#[derive(Debug, Eq, PartialEq)]
38pub struct MulticastForwardingDisabledError {}
39
40trait MulticastForwardingStateExt<
41 I: IpLayerIpExt,
42 D: StrongDeviceIdentifier,
43 BT: MulticastForwardingBindingsTypes,
44>
45{
46 fn try_enabled(
47 &self,
48 ) -> Result<&MulticastForwardingEnabledState<I, D, BT>, MulticastForwardingDisabledError>;
49}
50
51impl<I: IpLayerIpExt, D: StrongDeviceIdentifier, BT: MulticastForwardingBindingsTypes>
52 MulticastForwardingStateExt<I, D, BT> for MulticastForwardingState<I, D, BT>
53{
54 fn try_enabled(
55 &self,
56 ) -> Result<&MulticastForwardingEnabledState<I, D, BT>, MulticastForwardingDisabledError> {
57 self.enabled().ok_or(MulticastForwardingDisabledError {})
58 }
59}
60
61pub struct MulticastForwardingApi<I: Ip, C> {
63 ctx: C,
64 _ip_mark: IpVersionMarker<I>,
65}
66
67impl<I: Ip, C> MulticastForwardingApi<I, C> {
68 pub fn new(ctx: C) -> Self {
70 Self { ctx, _ip_mark: IpVersionMarker::new() }
71 }
72}
73
74impl<I: IpLayerIpExt, C> MulticastForwardingApi<I, C>
75where
76 C: ContextPair,
77 C::CoreContext: MulticastForwardingStateContext<I, C::BindingsContext>
78 + MulticastForwardingDeviceContext<I>
79 + IpLayerForwardingContext<I, C::BindingsContext>
80 + CounterContext<MulticastForwardingCounters<I>>
81 + CoreTimerContext<MulticastForwardingTimerId<I>, C::BindingsContext>,
82 C::BindingsContext:
83 IpLayerBindingsContext<I, <C::CoreContext as DeviceIdContext<AnyDevice>>::DeviceId>,
84{
85 pub(crate) fn core_ctx(&mut self) -> &mut C::CoreContext {
86 let Self { ctx, _ip_mark } = self;
87 ctx.core_ctx()
88 }
89
90 pub(crate) fn contexts(&mut self) -> (&mut C::CoreContext, &mut C::BindingsContext) {
91 let Self { ctx, _ip_mark } = self;
92 ctx.contexts()
93 }
94
95 pub fn enable(&mut self) -> bool {
99 let (core_ctx, bindings_ctx) = self.contexts();
100 core_ctx.with_state_mut(|state, _ctx| match state {
101 MulticastForwardingState::Enabled(_) => false,
102 MulticastForwardingState::Disabled => {
103 *state = MulticastForwardingState::Enabled(MulticastForwardingEnabledState::new::<
104 C::CoreContext,
105 >(bindings_ctx));
106 true
107 }
108 })
109 }
110
111 pub fn disable(&mut self) -> bool {
118 self.core_ctx().with_state_mut(|state, _ctx| match state {
119 MulticastForwardingState::Disabled => false,
120 MulticastForwardingState::Enabled(_) => {
121 *state = MulticastForwardingState::Disabled;
122 true
123 }
124 })
125 }
126
127 pub fn add_multicast_route(
132 &mut self,
133 key: MulticastRouteKey<I>,
134 route: MulticastRoute<<C::CoreContext as DeviceIdContext<AnyDevice>>::DeviceId>,
135 ) -> Result<
136 Option<MulticastRoute<<C::CoreContext as DeviceIdContext<AnyDevice>>::DeviceId>>,
137 MulticastForwardingDisabledError,
138 > {
139 let (core_ctx, bindings_ctx) = self.contexts();
140 let (orig_route, packet_queue_and_new_route) = core_ctx.with_state_mut(|state, ctx| {
141 let state = state.try_enabled()?;
142 ctx.with_route_table_mut(state, |route_table, ctx| {
143 let stats = MulticastRouteStats { last_used: bindings_ctx.now_atomic() };
144 match route_table.entry(key.clone()) {
145 btree_map::Entry::Occupied(mut entry) => {
146 let MulticastRouteEntry { route: orig_route, stats: _ } =
150 entry.insert(MulticastRouteEntry { route, stats });
151 #[cfg(debug_assertions)]
154 ctx.with_pending_table_mut(state, |pending_table| {
155 debug_assert!(!pending_table.contains(&key));
156 });
157 Ok((Some(orig_route), None))
158 }
159 btree_map::Entry::Vacant(entry) => {
160 let MulticastRouteEntry { route: new_route_ref, stats: _ } =
161 entry.insert(MulticastRouteEntry { route, stats });
162 let packet_queue_and_new_route = ctx
163 .with_pending_table_mut(state, |pending_table| {
164 pending_table.remove(&key, bindings_ctx)
165 })
166 .map(|packet_queue| (packet_queue, new_route_ref.clone()));
167 Ok((None, packet_queue_and_new_route))
168 }
169 }
170 })
171 })?;
172
173 if let Some((packet_queue, new_route)) = packet_queue_and_new_route {
174 handle_pending_packets(core_ctx, bindings_ctx, packet_queue, key, new_route)
181 }
182
183 Ok(orig_route)
184 }
185
186 pub fn remove_multicast_route(
190 &mut self,
191 key: &MulticastRouteKey<I>,
192 ) -> Result<
193 Option<MulticastRoute<<C::CoreContext as DeviceIdContext<AnyDevice>>::DeviceId>>,
194 MulticastForwardingDisabledError,
195 > {
196 self.core_ctx().with_state_mut(|state, ctx| {
197 let state = state.try_enabled()?;
198 ctx.with_route_table_mut(state, |route_table, _ctx| {
199 Ok(route_table.remove(key).map(|MulticastRouteEntry { route, stats: _ }| route))
200 })
201 })
202 }
203
204 pub fn remove_references_to_device(
214 &mut self,
215 dev: &<C::CoreContext as DeviceIdContext<AnyDevice>>::WeakDeviceId,
216 ) {
217 self.core_ctx().with_state_mut(|state, ctx| {
218 let Some(state) = state.enabled() else {
219 return;
221 };
222 ctx.with_route_table_mut(state, |route_table, _ctx| {
223 route_table.retain(
224 |_route_key,
225 MulticastRouteEntry {
226 route: MulticastRoute { action, input_interface },
227 stats: _,
228 }| {
229 if dev == &*input_interface {
230 return false;
231 }
232 match action {
233 Action::Forward(targets) => {
234 if targets.iter().all(|target| dev == &target.output_interface) {
237 return false;
238 }
239 if targets.iter().any(|target| dev == &target.output_interface) {
242 *targets = targets
243 .iter()
244 .filter(|target| dev != &target.output_interface)
245 .cloned()
246 .collect();
247 }
248 }
249 }
250 true
251 },
252 )
253 })
254 })
255 }
256
257 pub fn get_route_stats(
259 &mut self,
260 key: &MulticastRouteKey<I>,
261 ) -> Result<
262 Option<MulticastRouteStats<<C::BindingsContext as InstantBindingsTypes>::Instant>>,
263 MulticastForwardingDisabledError,
264 > {
265 self.core_ctx().with_state(|state, ctx| {
266 let state = state.try_enabled()?;
267 ctx.with_route_table(state, |route_table, _ctx| {
268 Ok(route_table.get(key).map(
269 |MulticastRouteEntry { route: _, stats: MulticastRouteStats { last_used } }| {
270 MulticastRouteStats { last_used: last_used.load(Ordering::Relaxed) }
271 },
272 ))
273 })
274 })
275 }
276
277 pub fn inspect<
279 N: Inspector + InspectorDeviceExt<<C::CoreContext as DeviceIdContext<AnyDevice>>::DeviceId>,
280 >(
281 &mut self,
282 inspector: &mut N,
283 ) {
284 self.core_ctx().with_state(|state, ctx| match state {
285 MulticastForwardingState::Disabled => {
286 inspector.record_bool("ForwardingEnabled", false);
287 }
288 MulticastForwardingState::Enabled(state) => {
289 inspector.record_bool("ForwardingEnabled", true);
290 inspector.record_child("Routes", |inspector| {
291 ctx.with_route_table(state, |route_table, _ctx| {
292 for (route_key, route_entry) in route_table.iter() {
293 inspector.record_unnamed_child(|inspector| {
294 inspector.delegate_inspectable(route_key);
295 route_entry.inspect::<_, N>(inspector);
296 })
297 }
298 })
299 });
300 ctx.with_pending_table_mut(state, |pending_table| {
304 inspector.record_inspectable("PendingRoutes", pending_table);
305 });
306 }
307 })
308 }
309}
310
311fn handle_pending_packets<I: IpLayerIpExt, CC, BC>(
314 core_ctx: &mut CC,
315 bindings_ctx: &mut BC,
316 packet_queue: PacketQueue<I, CC::WeakDeviceId, BC>,
317 key: MulticastRouteKey<I>,
318 route: MulticastRoute<CC::DeviceId>,
319) where
320 CC: IpLayerForwardingContext<I, BC>
321 + MulticastForwardingDeviceContext<I>
322 + CounterContext<MulticastForwardingCounters<I>>,
323 BC: IpLayerBindingsContext<I, CC::DeviceId>,
324{
325 let MulticastRoute { input_interface, action } = route;
326
327 if !core_ctx.is_device_multicast_forwarding_enabled(&input_interface) {
332 warn!(
336 "Dropping pending packets for newly installed multicast route: {key:?}. \
337 Multicast forwarding is disabled on input interface: {input_interface:?}"
338 );
339 CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
340 .pending_packet_drops_disabled_dev
341 .increment();
342 return;
343 }
344
345 let MulticastRouteKey { src_addr, dst_addr } = key.clone();
346 let dst_ip: SpecifiedAddr<I::Addr> = dst_addr.into();
347 let src_ip: I::RecvSrcAddr = src_addr.into();
348
349 for QueuedPacket { device, packet, frame_dst } in packet_queue.into_iter() {
350 let device = match device.upgrade() {
351 None => continue,
354 Some(d) => d,
355 };
356 if device != input_interface {
358 CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
359 .pending_packet_drops_wrong_dev
360 .increment();
361 bindings_ctx.on_event(
362 MulticastForwardingEvent::WrongInputInterface {
363 key: key.clone(),
364 actual_input_interface: device.clone(),
365 expected_input_interface: input_interface.clone(),
366 }
367 .into(),
368 );
369 continue;
370 }
371
372 match &action {
380 Action::Forward(targets) => {
381 CounterContext::<MulticastForwardingCounters<I>>::counters(core_ctx)
382 .pending_packet_tx
383 .increment();
384 let packet_iter = core::iter::repeat_n(packet, targets.len());
385 for (mut packet, MulticastRouteTarget { output_interface, min_ttl }) in
386 packet_iter.zip(targets.iter())
387 {
388 let packet_metadata = Default::default();
389 crate::internal::base::determine_ip_packet_forwarding_action::<I, _, _>(
390 core_ctx,
391 packet.parse_ip_packet_mut(),
392 packet_metadata,
393 Some(*min_ttl),
394 &input_interface,
395 &output_interface,
396 IpPacketDestination::from_addr(dst_ip),
397 frame_dst,
398 src_ip,
399 dst_ip,
400 )
401 .perform_action_with_buffer(
402 core_ctx,
403 bindings_ctx,
404 packet.into_inner(),
405 );
406 }
407 }
408 }
409 }
410}
411
412#[cfg(test)]
413mod tests {
414 use super::*;
415
416 use alloc::vec;
417 use core::ops::Deref;
418 use core::time::Duration;
419
420 use assert_matches::assert_matches;
421 use ip_test_macro::ip_test;
422 use net_types::MulticastAddr;
423 use netstack3_base::testutil::MultipleDevicesId;
424 use netstack3_base::{FrameDestination, StrongDeviceIdentifier};
425 use packet::ParseBuffer;
426 use test_case::test_case;
427
428 use crate::IpLayerEvent;
429 use crate::internal::multicast_forwarding;
430 use crate::internal::multicast_forwarding::packet_queue::QueuePacketOutcome;
431 use crate::internal::multicast_forwarding::testutil::{SentPacket, TestIpExt};
432 use crate::multicast_forwarding::{MulticastRoute, MulticastRouteKey, MulticastRouteTarget};
433
434 #[ip_test(I)]
435 fn enable_disable<I: IpLayerIpExt>() {
436 let mut api = multicast_forwarding::testutil::new_api::<I>();
437
438 assert_matches!(
439 api.core_ctx().state.multicast_forwarding.borrow().deref(),
440 &MulticastForwardingState::Disabled
441 );
442 assert!(api.enable());
443 assert!(!api.enable());
444 assert_matches!(
445 api.core_ctx().state.multicast_forwarding.borrow().deref(),
446 &MulticastForwardingState::Enabled(_)
447 );
448 assert!(api.disable());
449 assert!(!api.disable());
450 assert_matches!(
451 api.core_ctx().state.multicast_forwarding.borrow().deref(),
452 &MulticastForwardingState::Disabled
453 );
454 }
455
456 #[ip_test(I)]
457 fn add_remove_route<I: TestIpExt>() {
458 let key1 = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
459 let key2 = MulticastRouteKey::new(I::SRC2, I::DST2).unwrap();
460 let forward_to_b = MulticastRoute::new_forward(
461 MultipleDevicesId::A,
462 [MulticastRouteTarget { output_interface: MultipleDevicesId::B, min_ttl: 0 }].into(),
463 )
464 .unwrap();
465 let forward_to_c = MulticastRoute::new_forward(
466 MultipleDevicesId::A,
467 [MulticastRouteTarget { output_interface: MultipleDevicesId::C, min_ttl: 0 }].into(),
468 )
469 .unwrap();
470
471 let mut api = multicast_forwarding::testutil::new_api::<I>();
472
473 assert_eq!(
476 api.add_multicast_route(key1.clone(), forward_to_b.clone()),
477 Err(MulticastForwardingDisabledError {})
478 );
479 assert_eq!(api.remove_multicast_route(&key1), Err(MulticastForwardingDisabledError {}));
480
481 assert!(api.enable());
483 assert_eq!(api.add_multicast_route(key1.clone(), forward_to_b.clone()), Ok(None));
484 assert_eq!(api.remove_multicast_route(&key1), Ok(Some(forward_to_b.clone())));
485
486 assert_eq!(api.remove_multicast_route(&key1), Ok(None));
488
489 assert_eq!(api.add_multicast_route(key1.clone(), forward_to_b.clone()), Ok(None));
492 assert_eq!(
493 api.add_multicast_route(key1.clone(), forward_to_c.clone()),
494 Ok(Some(forward_to_b.clone()))
495 );
496 assert_eq!(api.remove_multicast_route(&key1), Ok(Some(forward_to_c.clone())));
497
498 assert_eq!(api.add_multicast_route(key1.clone(), forward_to_b.clone()), Ok(None));
500 assert_eq!(api.add_multicast_route(key2.clone(), forward_to_c.clone()), Ok(None));
501 assert_eq!(api.remove_multicast_route(&key1), Ok(Some(forward_to_b)));
502 assert_eq!(api.remove_multicast_route(&key2), Ok(Some(forward_to_c)));
503 }
504
505 #[ip_test(I)]
506 #[test_case(false, true; "forwarding_disabled")]
507 #[test_case(true, false; "forwarding_enabled_and_wrong_dev")]
508 #[test_case(true, true; "forwarding_enabled_and_right_dev")]
509 fn add_route_with_pending_packets<I: TestIpExt>(
510 forwarding_enabled_for_dev: bool,
511 right_dev: bool,
512 ) {
513 const FRAME_DST: Option<FrameDestination> = None;
514 const OUTPUT_DEV: MultipleDevicesId = MultipleDevicesId::C;
515 let right_key = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
516 let wrong_key = MulticastRouteKey::new(I::SRC2, I::DST2).unwrap();
517 let expected_dev = MultipleDevicesId::A;
518 let actual_dev = if right_dev { expected_dev } else { MultipleDevicesId::B };
519
520 let route = MulticastRoute::new_forward(
521 expected_dev,
522 [MulticastRouteTarget { output_interface: OUTPUT_DEV, min_ttl: 0 }].into(),
523 )
524 .unwrap();
525
526 let mut api = multicast_forwarding::testutil::new_api::<I>();
527 assert!(api.enable());
528 api.core_ctx()
529 .state
530 .set_multicast_forwarding_enabled_for_dev(expected_dev, forwarding_enabled_for_dev);
531
532 let (core_ctx, bindings_ctx) = api.contexts();
534 multicast_forwarding::testutil::with_pending_table(core_ctx, |pending_table| {
535 let buf = multicast_forwarding::testutil::new_ip_packet_buf::<I>(I::SRC1, I::DST1);
536 let mut buf_ref = buf.as_ref();
537 let packet = buf_ref.parse::<I::Packet<_>>().expect("parse should succeed");
538 assert_eq!(
539 pending_table.try_queue_packet(
540 bindings_ctx,
541 right_key.clone(),
542 &packet,
543 &actual_dev,
544 FRAME_DST
545 ),
546 QueuePacketOutcome::QueuedInNewQueue,
547 );
548 });
549
550 assert_eq!(api.add_multicast_route(wrong_key, route.clone()), Ok(None));
553 assert!(multicast_forwarding::testutil::with_pending_table(
554 api.core_ctx(),
555 |pending_table| pending_table.contains(&right_key)
556 ));
557
558 assert_eq!(api.add_multicast_route(right_key.clone(), route), Ok(None));
561 assert!(multicast_forwarding::testutil::with_pending_table(
562 api.core_ctx(),
563 |pending_table| !pending_table.contains(&right_key)
564 ));
565
566 let expect_sent_packet = forwarding_enabled_for_dev && right_dev;
567 let mut expected_sent_packets = vec![];
568 if expect_sent_packet {
569 expected_sent_packets.push(SentPacket {
570 dst: MulticastAddr::new(right_key.dst_addr()).unwrap(),
571 device: OUTPUT_DEV,
572 });
573 }
574 assert_eq!(api.core_ctx().state.take_sent_packets(), expected_sent_packets);
575
576 let mut expected_events = vec![];
578 if !right_dev {
579 expected_events.push(IpLayerEvent::MulticastForwarding(
580 MulticastForwardingEvent::WrongInputInterface {
581 key: right_key,
582 actual_input_interface: actual_dev,
583 expected_input_interface: expected_dev,
584 },
585 ));
586 }
587
588 let (_core_ctx, bindings_ctx) = api.contexts();
589 assert_eq!(bindings_ctx.take_events(), expected_events);
590
591 let counters: &MulticastForwardingCounters<I> = api.core_ctx().counters();
593 assert_eq!(counters.pending_packet_tx.get(), if expect_sent_packet { 1 } else { 0 });
594 assert_eq!(
595 counters.pending_packet_drops_disabled_dev.get(),
596 if forwarding_enabled_for_dev { 0 } else { 1 }
597 );
598 assert_eq!(counters.pending_packet_drops_wrong_dev.get(), if right_dev { 0 } else { 1 });
599 }
600
601 #[ip_test(I)]
602 fn remove_references_to_device<I: TestIpExt>() {
603 let key1 = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
605 let key2 = MulticastRouteKey::new(I::SRC2, I::DST1).unwrap();
606 let key3 = MulticastRouteKey::new(I::SRC1, I::DST2).unwrap();
607 let key4 = MulticastRouteKey::new(I::SRC2, I::DST2).unwrap();
608
609 const GOOD_DEV1: MultipleDevicesId = MultipleDevicesId::A;
611 const GOOD_DEV2: MultipleDevicesId = MultipleDevicesId::B;
612 const BAD_DEV: MultipleDevicesId = MultipleDevicesId::C;
613 const GOOD_TARGET1: MulticastRouteTarget<MultipleDevicesId> =
614 MulticastRouteTarget { output_interface: GOOD_DEV1, min_ttl: 0 };
615 const GOOD_TARGET2: MulticastRouteTarget<MultipleDevicesId> =
616 MulticastRouteTarget { output_interface: GOOD_DEV2, min_ttl: 0 };
617 const BAD_TARGET: MulticastRouteTarget<MultipleDevicesId> =
618 MulticastRouteTarget { output_interface: BAD_DEV, min_ttl: 0 };
619 let dev_is_input = MulticastRoute::new_forward(BAD_DEV, [GOOD_TARGET1].into()).unwrap();
620 let dev_is_only_output =
621 MulticastRoute::new_forward(GOOD_DEV1, [BAD_TARGET].into()).unwrap();
622 let dev_is_one_output =
623 MulticastRoute::new_forward(GOOD_DEV1, [GOOD_TARGET2, BAD_TARGET].into()).unwrap();
624 let no_ref_to_dev = MulticastRoute::new_forward(GOOD_DEV1, [GOOD_TARGET2].into()).unwrap();
625
626 let mut api = multicast_forwarding::testutil::new_api::<I>();
629 api.remove_references_to_device(&BAD_DEV.downgrade());
630 assert!(api.enable());
631
632 assert_eq!(api.add_multicast_route(key1.clone(), dev_is_input), Ok(None));
638 assert_eq!(api.add_multicast_route(key2.clone(), dev_is_only_output), Ok(None));
639 assert_eq!(api.add_multicast_route(key3.clone(), dev_is_one_output), Ok(None));
640 assert_eq!(api.add_multicast_route(key4.clone(), no_ref_to_dev.clone()), Ok(None));
641 api.remove_references_to_device(&BAD_DEV.downgrade());
642 assert_eq!(api.remove_multicast_route(&key1), Ok(None));
643 assert_eq!(api.remove_multicast_route(&key2), Ok(None));
644 assert_eq!(
646 api.remove_multicast_route(&key3),
647 Ok(Some(MulticastRoute::new_forward(GOOD_DEV1, [GOOD_TARGET2].into()).unwrap()))
648 );
649 assert_eq!(api.remove_multicast_route(&key4), Ok(Some(no_ref_to_dev)));
650 }
651
652 #[ip_test(I)]
653 fn get_route_stats<I: TestIpExt>() {
654 let key = MulticastRouteKey::new(I::SRC1, I::DST1).unwrap();
655
656 let mut api = multicast_forwarding::testutil::new_api::<I>();
657
658 assert_eq!(api.get_route_stats(&key), Err(MulticastForwardingDisabledError {}));
660
661 assert!(api.enable());
663 assert_eq!(api.get_route_stats(&key), Ok(None));
664
665 let route = MulticastRoute::new_forward(
667 MultipleDevicesId::A,
668 [MulticastRouteTarget { output_interface: MultipleDevicesId::B, min_ttl: 0 }].into(),
669 )
670 .unwrap();
671 assert_eq!(api.add_multicast_route(key.clone(), route.clone()), Ok(None));
672 let original_time = api.ctx.bindings_ctx().now();
673 let expected_stats = MulticastRouteStats { last_used: original_time };
674 assert_eq!(api.get_route_stats(&key), Ok(Some(expected_stats)));
675
676 api.ctx.bindings_ctx().timers.instant.sleep(Duration::from_secs(5));
679 let new_time = api.ctx.bindings_ctx().now();
680 assert!(new_time > original_time);
681 let expected_stats = MulticastRouteStats { last_used: new_time };
682 assert_eq!(api.add_multicast_route(key.clone(), route.clone()), Ok(Some(route)));
683 assert_eq!(api.get_route_stats(&key), Ok(Some(expected_stats)));
684 }
685}