xref: /netbsd/share/man/man4/route.4 (revision bf9ec67e)
1.\"	$NetBSD: route.4,v 1.12 2002/05/12 15:48:38 wiz Exp $
2.\"
3.\" Copyright (c) 1990, 1991, 1993
4.\"	The Regents of the University of California.  All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. All advertising materials mentioning features or use of this software
15.\"    must display the following acknowledgement:
16.\"	This product includes software developed by the University of
17.\"	California, Berkeley and its contributors.
18.\" 4. Neither the name of the University nor the names of its contributors
19.\"    may be used to endorse or promote products derived from this software
20.\"    without specific prior written permission.
21.\"
22.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32.\" SUCH DAMAGE.
33.\"
34.\"     @(#)route.4	8.6 (Berkeley) 4/19/94
35.\"
36.Dd April 19, 1994
37.Dt ROUTE 4
38.Os
39.Sh NAME
40.Nm route
41.Nd kernel packet forwarding database
42.Sh SYNOPSIS
43.Fd #include \*[Lt]sys/socket.h\*[Gt]
44.Fd #include \*[Lt]net/if.h\*[Gt]
45.Fd #include \*[Lt]net/route.h\*[Gt]
46.Ft int
47.Fn socket PF_ROUTE SOCK_RAW "int family"
48.Sh DESCRIPTION
49.Ux
50provides some packet routing facilities.
51The kernel maintains a routing information database, which
52is used in selecting the appropriate network interface when
53transmitting packets.
54.Pp
55A user process (or possibly multiple co-operating processes)
56maintains this database by sending messages over a special kind
57of socket.
58This supplants fixed size
59.Xr ioctl 2 Ns 's
60used in earlier releases.
61Routing table changes may only be carried out by the super user.
62.Pp
63The operating system may spontaneously emit routing messages in response
64to external events, such as receipt of a redirect, or failure to
65locate a suitable route for a request.
66The message types are described in greater detail below.
67.Pp
68Routing database entries come in two flavors: for a specific
69host, or for all hosts on a generic subnetwork (as specified
70by a bit mask and value under the mask.
71The effect of wildcard or default route may be achieved by using
72a mask of all zeros, and there may be hierarchical routes.
73.Pp
74When the system is booted and addresses are assigned
75to the network interfaces, each protocol family
76installs a routing table entry for each interface when it is ready for traffic.
77Normally the protocol specifies the route
78through each interface as a
79.Dq direct
80connection to the destination host
81or network.  If the route is direct, the transport layer of
82a protocol family usually requests the packet be sent to the
83same host specified in the packet.  Otherwise, the interface
84is requested to address the packet to the gateway listed in the routing entry
85(i.e. the packet is forwarded).
86.Pp
87When routing a packet,
88the kernel will attempt to find
89the most specific route matching the destination.
90(If there are two different mask and value-under-the-mask pairs
91that match, the more specific is the one with more bits in the mask.
92A route to a host is regarded as being supplied with a mask of
93as many ones as there are bits in the destination).
94If no entry is found, the destination is declared to be unreachable,
95and a routing\-miss message is generated if there are any
96listeners on the routing control socket described below.
97.Pp
98A wildcard routing entry is specified with a zero
99destination address value, and a mask of all zeroes.
100Wildcard routes will be used
101when the system fails to find other routes matching the
102destination.  The combination of wildcard
103routes and routing redirects can provide an economical
104mechanism for routing traffic.
105.Pp
106One opens the channel for passing routing control messages
107by using the socket call shown in the synopsis above:
108.Pp
109The
110.Fa family
111parameter may be
112.Dv AF_UNSPEC
113which will provide
114routing information for all address families, or can be restricted
115to a specific address family by specifying which one is desired.
116There can be more than one routing socket open per system.
117.Pp
118Messages are formed by a header followed by a small
119number of sockaddrs (now variable length particularly
120in the
121.Tn ISO
122case), interpreted by position, and delimited
123by the new length entry in the sockaddr.
124An example of a message with four addresses might be an
125.Tn ISO
126redirect:
127Destination, Netmask, Gateway, and Author of the redirect.
128The interpretation of which address are present is given by a
129bit mask within the header, and the sequence is least significant
130to most significant bit within the vector.
131.Pp
132Any messages sent to the kernel are returned, and copies are sent
133to all interested listeners.  The kernel will provide the process
134ID for the sender, and the sender may use an additional sequence
135field to distinguish between outstanding messages.  However,
136message replies may be lost when kernel buffers are exhausted.
137.Pp
138The kernel may reject certain messages, and will indicate this
139by filling in the
140.Ar rtm_errno
141field.
142The routing code returns
143.Dv EEXIST
144if
145requested to duplicate an existing entry,
146.Dv ESRCH
147if
148requested to delete a non-existent entry,
149or
150.Dv ENOBUFS
151if insufficient resources were available
152to install a new route.
153In the current implementation, all routing processes run locally,
154and the values for
155.Ar rtm_errno
156are available through the normal
157.Em errno
158mechanism, even if the routing reply message is lost.
159.Pp
160A process may avoid the expense of reading replies to
161its own messages by issuing a
162.Xr setsockopt 2
163call indicating that the
164.Dv SO_USELOOPBACK
165option
166at the
167.Dv SOL_SOCKET
168level is to be turned off.
169A process may ignore all messages from the routing socket
170by doing a
171.Xr shutdown 2
172system call for further input.
173.Pp
174If a route is in use when it is deleted,
175the routing entry will be marked down and removed from the routing table,
176but the resources associated with it will not
177be reclaimed until all references to it are released.
178User processes can obtain information about the routing
179entry to a specific destination by using a
180.Dv RTM_GET
181message,
182or by reading the
183.Pa /dev/kmem
184device, or by calling
185.Xr sysctl 3 .
186.Pp
187The messages are:
188.Bd -literal
189#define	RTM_ADD		0x1    /* Add Route */
190#define	RTM_DELETE	0x2    /* Delete Route */
191#define	RTM_CHANGE	0x3    /* Change Metrics, Flags, or Gateway */
192#define	RTM_GET		0x4    /* Report Information */
193#define	RTM_LOSING	0x5    /* Kernel Suspects Partitioning */
194#define	RTM_REDIRECT	0x6    /* Told to use different route */
195#define	RTM_MISS	0x7    /* Lookup failed on this address */
196#define	RTM_RESOLVE	0xb    /* request to resolve dst to LL addr */
197#define	RTM_NEWADDR	0xc    /* address being added to iface */
198#define	RTM_DELADDR	0xd    /* address being removed from iface */
199#define	RTM_OIFINFO	0xe    /* Old (pre-1.5) RTM_IFINFO message */
200#define	RTM_IFINFO	0xf    /* iface/link going up/down etc. */
201#define	RTM_IFANNOUNCE	0x10   /* iface arrival/departure */
202.Ed
203.Pp
204A message header consists of one of the following:
205.Bd -literal
206struct rt_msghdr {
207    u_short rtm_msglen;        /* to skip over non-understood messages */
208    u_char  rtm_version;       /* future binary compatibility */
209    u_char  rtm_type;          /* message type */
210    u_short rtm_index;         /* index for associated ifp */
211    int     rtm_flags;         /* flags, incl kern \*[Am] message, e.g. DONE */
212    int     rtm_addrs;         /* bitmask identifying sockaddrs in msg */
213    pid_t   rtm_pid;           /* identify sender */
214    int     rtm_seq;           /* for sender to identify action */
215    int     rtm_errno;         /* why failed */
216    int     rtm_use;           /* from rtentry */
217    u_long  rtm_inits;         /* which metrics we are initializing */
218    struct  rt_metrics rtm_rmx;	/* metrics themselves */
219};
220
221struct if_msghdr {
222    u_short ifm_msglen;        /* to skip over non-understood messages */
223    u_char  ifm_version;       /* future binary compatibility */
224    u_char  ifm_type;          /* message type */
225    int     ifm_addrs;         /* like rtm_addrs */
226    int     ifm_flags;         /* value of if_flags */
227    u_short ifm_index;         /* index for associated ifp */
228    struct  if_data ifm_data;  /* statistics and other data about if */
229};
230
231struct ifa_msghdr {
232    u_short ifam_msglen;       /* to skip over non-understood messages */
233    u_char  ifam_version;      /* future binary compatibility */
234    u_char  ifam_type;         /* message type */
235    int     ifam_addrs;        /* like rtm_addrs */
236    int     ifam_flags;        /* value of ifa_flags */
237    u_short ifam_index;        /* index for associated ifp */
238    int     ifam_metric;       /* value of ifa_metric */
239};
240
241struct if_announcemsghdr {
242    u_short ifan_msglen;       /* to skip over non-understood messages */
243    u_char  ifan_version;      /* future binary compatibility */
244    u_char  ifan_type;         /* message type */
245    u_short ifan_index;        /* index for associated ifp */
246    char    ifan_name[IFNAMSIZ]; /* if name, e.g. "en0" */
247    u_short ifan_what;         /* what type of announcement */
248};
249.Ed
250.Pp
251The
252.Dv RTM_IFINFO
253message uses a
254.Ar if_msghdr
255header, the
256.Dv RTM_NEWADDR
257and
258.Dv RTM_DELADDR
259messages use a
260.Ar ifa_msghdr
261header,
262the
263.Dv RTM_IFANNOUNCE
264message uses a
265.Ar if_announcemsghdr
266header,
267and all other messages use the
268.Ar rt_msghdr
269header.
270.Pp
271The metrics structure is:
272.Bd -literal
273struct rt_metrics {
274    u_long rmx_locks;          /* Kernel must leave these values alone */
275    u_long rmx_mtu;            /* MTU for this path */
276    u_long rmx_hopcount;       /* max hops expected */
277    u_long rmx_expire;         /* lifetime for route, e.g. redirect */
278    u_long rmx_recvpipe;       /* inbound delay-bandwith product */
279    u_long rmx_sendpipe;       /* outbound delay-bandwith product */
280    u_long rmx_ssthresh;       /* outbound gateway buffer limit */
281    u_long rmx_rtt;            /* estimated round trip time */
282    u_long rmx_rttvar;         /* estimated rtt variance */
283    u_long rmx_pksent;         /* packets sent using this route */
284};
285.Ed
286.Pp
287Flags include the values:
288.Bd -literal
289#define	RTF_UP        0x1      /* route usable */
290#define	RTF_GATEWAY   0x2      /* destination is a gateway */
291#define	RTF_HOST      0x4      /* host entry (net otherwise) */
292#define	RTF_REJECT    0x8      /* host or net unreachable */
293#define	RTF_DYNAMIC   0x10     /* created dynamically (by redirect) */
294#define	RTF_MODIFIED  0x20     /* modified dynamically (by redirect) */
295#define	RTF_DONE      0x40     /* message confirmed */
296#define	RTF_MASK      0x80     /* subnet mask present */
297#define	RTF_CLONING   0x100    /* generate new routes on use */
298#define	RTF_XRESOLVE  0x200    /* external daemon resolves name */
299#define	RTF_LLINFO    0x400    /* generated by ARP or ESIS */
300#define	RTF_STATIC    0x800    /* manually added */
301#define	RTF_BLACKHOLE 0x1000   /* just discard pkts (during updates) */
302#define	RTF_CLONED    0x2000   /* this is a cloned route */
303#define	RTF_PROTO2    0x4000   /* protocol specific routing flag */
304#define	RTF_PROTO1    0x8000   /* protocol specific routing flag */
305.Ed
306.Pp
307Specifiers for metric values in rmx_locks and rtm_inits are:
308.Bd -literal
309#define	RTV_MTU       0x1    /* init or lock _mtu */
310#define	RTV_HOPCOUNT  0x2    /* init or lock _hopcount */
311#define	RTV_EXPIRE    0x4    /* init or lock _expire */
312#define	RTV_RPIPE     0x8    /* init or lock _recvpipe */
313#define	RTV_SPIPE     0x10   /* init or lock _sendpipe */
314#define	RTV_SSTHRESH  0x20   /* init or lock _ssthresh */
315#define	RTV_RTT       0x40   /* init or lock _rtt */
316#define	RTV_RTTVAR    0x80   /* init or lock _rttvar */
317.Ed
318.Pp
319Specifiers for which addresses are present in the messages are:
320.Bd -literal
321#define RTA_DST       0x1    /* destination sockaddr present */
322#define RTA_GATEWAY   0x2    /* gateway sockaddr present */
323#define RTA_NETMASK   0x4    /* netmask sockaddr present */
324#define RTA_GENMASK   0x8    /* cloning mask sockaddr present */
325#define RTA_IFP       0x10   /* interface name sockaddr present */
326#define RTA_IFA       0x20   /* interface addr sockaddr present */
327#define RTA_AUTHOR    0x40   /* sockaddr for author of redirect */
328#define RTA_BRD       0x80   /* for NEWADDR, broadcast or p-p dest addr */
329.Ed
330.Sh SEE ALSO
331.Xr socket 2 ,
332.Xr sysctl 3
333