1.\" $NetBSD: route.4,v 1.12 2002/05/12 15:48:38 wiz Exp $ 2.\" 3.\" Copyright (c) 1990, 1991, 1993 4.\" The Regents of the University of California. All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. All advertising materials mentioning features or use of this software 15.\" must display the following acknowledgement: 16.\" This product includes software developed by the University of 17.\" California, Berkeley and its contributors. 18.\" 4. Neither the name of the University nor the names of its contributors 19.\" may be used to endorse or promote products derived from this software 20.\" without specific prior written permission. 21.\" 22.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 23.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 26.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32.\" SUCH DAMAGE. 33.\" 34.\" @(#)route.4 8.6 (Berkeley) 4/19/94 35.\" 36.Dd April 19, 1994 37.Dt ROUTE 4 38.Os 39.Sh NAME 40.Nm route 41.Nd kernel packet forwarding database 42.Sh SYNOPSIS 43.Fd #include \*[Lt]sys/socket.h\*[Gt] 44.Fd #include \*[Lt]net/if.h\*[Gt] 45.Fd #include \*[Lt]net/route.h\*[Gt] 46.Ft int 47.Fn socket PF_ROUTE SOCK_RAW "int family" 48.Sh DESCRIPTION 49.Ux 50provides some packet routing facilities. 51The kernel maintains a routing information database, which 52is used in selecting the appropriate network interface when 53transmitting packets. 54.Pp 55A user process (or possibly multiple co-operating processes) 56maintains this database by sending messages over a special kind 57of socket. 58This supplants fixed size 59.Xr ioctl 2 Ns 's 60used in earlier releases. 61Routing table changes may only be carried out by the super user. 62.Pp 63The operating system may spontaneously emit routing messages in response 64to external events, such as receipt of a redirect, or failure to 65locate a suitable route for a request. 66The message types are described in greater detail below. 67.Pp 68Routing database entries come in two flavors: for a specific 69host, or for all hosts on a generic subnetwork (as specified 70by a bit mask and value under the mask. 71The effect of wildcard or default route may be achieved by using 72a mask of all zeros, and there may be hierarchical routes. 73.Pp 74When the system is booted and addresses are assigned 75to the network interfaces, each protocol family 76installs a routing table entry for each interface when it is ready for traffic. 77Normally the protocol specifies the route 78through each interface as a 79.Dq direct 80connection to the destination host 81or network. If the route is direct, the transport layer of 82a protocol family usually requests the packet be sent to the 83same host specified in the packet. Otherwise, the interface 84is requested to address the packet to the gateway listed in the routing entry 85(i.e. the packet is forwarded). 86.Pp 87When routing a packet, 88the kernel will attempt to find 89the most specific route matching the destination. 90(If there are two different mask and value-under-the-mask pairs 91that match, the more specific is the one with more bits in the mask. 92A route to a host is regarded as being supplied with a mask of 93as many ones as there are bits in the destination). 94If no entry is found, the destination is declared to be unreachable, 95and a routing\-miss message is generated if there are any 96listeners on the routing control socket described below. 97.Pp 98A wildcard routing entry is specified with a zero 99destination address value, and a mask of all zeroes. 100Wildcard routes will be used 101when the system fails to find other routes matching the 102destination. The combination of wildcard 103routes and routing redirects can provide an economical 104mechanism for routing traffic. 105.Pp 106One opens the channel for passing routing control messages 107by using the socket call shown in the synopsis above: 108.Pp 109The 110.Fa family 111parameter may be 112.Dv AF_UNSPEC 113which will provide 114routing information for all address families, or can be restricted 115to a specific address family by specifying which one is desired. 116There can be more than one routing socket open per system. 117.Pp 118Messages are formed by a header followed by a small 119number of sockaddrs (now variable length particularly 120in the 121.Tn ISO 122case), interpreted by position, and delimited 123by the new length entry in the sockaddr. 124An example of a message with four addresses might be an 125.Tn ISO 126redirect: 127Destination, Netmask, Gateway, and Author of the redirect. 128The interpretation of which address are present is given by a 129bit mask within the header, and the sequence is least significant 130to most significant bit within the vector. 131.Pp 132Any messages sent to the kernel are returned, and copies are sent 133to all interested listeners. The kernel will provide the process 134ID for the sender, and the sender may use an additional sequence 135field to distinguish between outstanding messages. However, 136message replies may be lost when kernel buffers are exhausted. 137.Pp 138The kernel may reject certain messages, and will indicate this 139by filling in the 140.Ar rtm_errno 141field. 142The routing code returns 143.Dv EEXIST 144if 145requested to duplicate an existing entry, 146.Dv ESRCH 147if 148requested to delete a non-existent entry, 149or 150.Dv ENOBUFS 151if insufficient resources were available 152to install a new route. 153In the current implementation, all routing processes run locally, 154and the values for 155.Ar rtm_errno 156are available through the normal 157.Em errno 158mechanism, even if the routing reply message is lost. 159.Pp 160A process may avoid the expense of reading replies to 161its own messages by issuing a 162.Xr setsockopt 2 163call indicating that the 164.Dv SO_USELOOPBACK 165option 166at the 167.Dv SOL_SOCKET 168level is to be turned off. 169A process may ignore all messages from the routing socket 170by doing a 171.Xr shutdown 2 172system call for further input. 173.Pp 174If a route is in use when it is deleted, 175the routing entry will be marked down and removed from the routing table, 176but the resources associated with it will not 177be reclaimed until all references to it are released. 178User processes can obtain information about the routing 179entry to a specific destination by using a 180.Dv RTM_GET 181message, 182or by reading the 183.Pa /dev/kmem 184device, or by calling 185.Xr sysctl 3 . 186.Pp 187The messages are: 188.Bd -literal 189#define RTM_ADD 0x1 /* Add Route */ 190#define RTM_DELETE 0x2 /* Delete Route */ 191#define RTM_CHANGE 0x3 /* Change Metrics, Flags, or Gateway */ 192#define RTM_GET 0x4 /* Report Information */ 193#define RTM_LOSING 0x5 /* Kernel Suspects Partitioning */ 194#define RTM_REDIRECT 0x6 /* Told to use different route */ 195#define RTM_MISS 0x7 /* Lookup failed on this address */ 196#define RTM_RESOLVE 0xb /* request to resolve dst to LL addr */ 197#define RTM_NEWADDR 0xc /* address being added to iface */ 198#define RTM_DELADDR 0xd /* address being removed from iface */ 199#define RTM_OIFINFO 0xe /* Old (pre-1.5) RTM_IFINFO message */ 200#define RTM_IFINFO 0xf /* iface/link going up/down etc. */ 201#define RTM_IFANNOUNCE 0x10 /* iface arrival/departure */ 202.Ed 203.Pp 204A message header consists of one of the following: 205.Bd -literal 206struct rt_msghdr { 207 u_short rtm_msglen; /* to skip over non-understood messages */ 208 u_char rtm_version; /* future binary compatibility */ 209 u_char rtm_type; /* message type */ 210 u_short rtm_index; /* index for associated ifp */ 211 int rtm_flags; /* flags, incl kern \*[Am] message, e.g. DONE */ 212 int rtm_addrs; /* bitmask identifying sockaddrs in msg */ 213 pid_t rtm_pid; /* identify sender */ 214 int rtm_seq; /* for sender to identify action */ 215 int rtm_errno; /* why failed */ 216 int rtm_use; /* from rtentry */ 217 u_long rtm_inits; /* which metrics we are initializing */ 218 struct rt_metrics rtm_rmx; /* metrics themselves */ 219}; 220 221struct if_msghdr { 222 u_short ifm_msglen; /* to skip over non-understood messages */ 223 u_char ifm_version; /* future binary compatibility */ 224 u_char ifm_type; /* message type */ 225 int ifm_addrs; /* like rtm_addrs */ 226 int ifm_flags; /* value of if_flags */ 227 u_short ifm_index; /* index for associated ifp */ 228 struct if_data ifm_data; /* statistics and other data about if */ 229}; 230 231struct ifa_msghdr { 232 u_short ifam_msglen; /* to skip over non-understood messages */ 233 u_char ifam_version; /* future binary compatibility */ 234 u_char ifam_type; /* message type */ 235 int ifam_addrs; /* like rtm_addrs */ 236 int ifam_flags; /* value of ifa_flags */ 237 u_short ifam_index; /* index for associated ifp */ 238 int ifam_metric; /* value of ifa_metric */ 239}; 240 241struct if_announcemsghdr { 242 u_short ifan_msglen; /* to skip over non-understood messages */ 243 u_char ifan_version; /* future binary compatibility */ 244 u_char ifan_type; /* message type */ 245 u_short ifan_index; /* index for associated ifp */ 246 char ifan_name[IFNAMSIZ]; /* if name, e.g. "en0" */ 247 u_short ifan_what; /* what type of announcement */ 248}; 249.Ed 250.Pp 251The 252.Dv RTM_IFINFO 253message uses a 254.Ar if_msghdr 255header, the 256.Dv RTM_NEWADDR 257and 258.Dv RTM_DELADDR 259messages use a 260.Ar ifa_msghdr 261header, 262the 263.Dv RTM_IFANNOUNCE 264message uses a 265.Ar if_announcemsghdr 266header, 267and all other messages use the 268.Ar rt_msghdr 269header. 270.Pp 271The metrics structure is: 272.Bd -literal 273struct rt_metrics { 274 u_long rmx_locks; /* Kernel must leave these values alone */ 275 u_long rmx_mtu; /* MTU for this path */ 276 u_long rmx_hopcount; /* max hops expected */ 277 u_long rmx_expire; /* lifetime for route, e.g. redirect */ 278 u_long rmx_recvpipe; /* inbound delay-bandwith product */ 279 u_long rmx_sendpipe; /* outbound delay-bandwith product */ 280 u_long rmx_ssthresh; /* outbound gateway buffer limit */ 281 u_long rmx_rtt; /* estimated round trip time */ 282 u_long rmx_rttvar; /* estimated rtt variance */ 283 u_long rmx_pksent; /* packets sent using this route */ 284}; 285.Ed 286.Pp 287Flags include the values: 288.Bd -literal 289#define RTF_UP 0x1 /* route usable */ 290#define RTF_GATEWAY 0x2 /* destination is a gateway */ 291#define RTF_HOST 0x4 /* host entry (net otherwise) */ 292#define RTF_REJECT 0x8 /* host or net unreachable */ 293#define RTF_DYNAMIC 0x10 /* created dynamically (by redirect) */ 294#define RTF_MODIFIED 0x20 /* modified dynamically (by redirect) */ 295#define RTF_DONE 0x40 /* message confirmed */ 296#define RTF_MASK 0x80 /* subnet mask present */ 297#define RTF_CLONING 0x100 /* generate new routes on use */ 298#define RTF_XRESOLVE 0x200 /* external daemon resolves name */ 299#define RTF_LLINFO 0x400 /* generated by ARP or ESIS */ 300#define RTF_STATIC 0x800 /* manually added */ 301#define RTF_BLACKHOLE 0x1000 /* just discard pkts (during updates) */ 302#define RTF_CLONED 0x2000 /* this is a cloned route */ 303#define RTF_PROTO2 0x4000 /* protocol specific routing flag */ 304#define RTF_PROTO1 0x8000 /* protocol specific routing flag */ 305.Ed 306.Pp 307Specifiers for metric values in rmx_locks and rtm_inits are: 308.Bd -literal 309#define RTV_MTU 0x1 /* init or lock _mtu */ 310#define RTV_HOPCOUNT 0x2 /* init or lock _hopcount */ 311#define RTV_EXPIRE 0x4 /* init or lock _expire */ 312#define RTV_RPIPE 0x8 /* init or lock _recvpipe */ 313#define RTV_SPIPE 0x10 /* init or lock _sendpipe */ 314#define RTV_SSTHRESH 0x20 /* init or lock _ssthresh */ 315#define RTV_RTT 0x40 /* init or lock _rtt */ 316#define RTV_RTTVAR 0x80 /* init or lock _rttvar */ 317.Ed 318.Pp 319Specifiers for which addresses are present in the messages are: 320.Bd -literal 321#define RTA_DST 0x1 /* destination sockaddr present */ 322#define RTA_GATEWAY 0x2 /* gateway sockaddr present */ 323#define RTA_NETMASK 0x4 /* netmask sockaddr present */ 324#define RTA_GENMASK 0x8 /* cloning mask sockaddr present */ 325#define RTA_IFP 0x10 /* interface name sockaddr present */ 326#define RTA_IFA 0x20 /* interface addr sockaddr present */ 327#define RTA_AUTHOR 0x40 /* sockaddr for author of redirect */ 328#define RTA_BRD 0x80 /* for NEWADDR, broadcast or p-p dest addr */ 329.Ed 330.Sh SEE ALSO 331.Xr socket 2 , 332.Xr sysctl 3 333