rxdp 0.3.0

Bindings for interoperating with XDP programs and eBPF maps.
Documentation
# rxdp
Rust bindings for working with XDP programs & eBPF maps.

This library has bindings for some of the common, basic operations needed when working with XDP programs & eBPF maps from user-space. It is built on top of [libbpf-sys](https://github.com/alexforster/libbpf-sys). At the time of writing, it supports only a subset of all the possibe eBPF map types (see tests directory for a good indication of which maps are supported).


## Prerequisites
* Linux OS
* libbpf-sys [dependencies]https://github.com/alexforster/libbpf-sys#building

## Examples
### Create an object from an ELF file
```rust
use rxdp;

let obj_path = "/path/to/elf/file";
let obj = match rxdp::XDPObject::new(obj_path) {
    Ok(obj) => {
        println!("Successfully created object from {}", obj_path);
        obj
    },
    Err(err) => panic!("{:?}", err),
};
```

### Set the pinned maps.
Maps that have already been pinned will be loaded from the fs, provided the map name
matches the name in the fs. Any new maps in the HashSet will set the pin path so that
once the program is loaded, they will get automatically pinned.
```rust
let mut pinned_maps = HashSet::new();
pinned_maps.insert("my_map_name".to_string());
obj.pinned_maps(pinned_maps).unwrap();
```

### Load the object (programs + maps) into the kernel.
This will consume the `XDPObject` created above and return an `XDPLoadedObject`.
```rust
let obj = obj.load().unwrap();
```

### Get a reference to an XDP program and attach it to an interface
```rust
let dev = "eth0";
let flags = rxdp::AttachFlags::SKB_MODE;

let prog = obj.get_program("prog_name").unwrap();
match prog.attach_to_interface(dev, flags) {
    Ok(_) => println!("Successfully attached to {}", dev),
    Err(e) => panic!("{:?}", e),
}
```

### Get access to an underlying eBPF `Map`
```rust
let m: rxdp::Map<u32, u64> = match rxdp::Map::new(&obj, "map_name") {
    Ok(m) => m,
    Err(e) => panic!("{:?}", e),
};
```
**NOTE**: the key/value sizes **MUST** match the key/value sizes defined in the eBPF code, otherwise creating the map will fail.

### Perform map operations
```rust
let key = 0u32;
let value = 1000u64;
m.update(&key, &value, rxdp::MapFlags::BpfAny).unwrap();
let got = m.lookup(&key).unwrap();
assert_eq!(value, got.into_single());

// iterate through all items
for kv in m.items().unwrap() {
    println!("key: {}, value: {}", kv.key, kv.value.into_single());
}
```

### For per-cpu maps, use `PerCpuMap`
```rust
let m: rxdp::PerCpuMap<u32, u64> = rxdp::PerCpuMap::new(&obj, "map_name").unwrap();
```
**NOTE**: the key size **MUST** match the key size defined in the eBPF code, otherwise creating the map will fail.

### Per CPU map operations
Per CPU maps return a `Vec<T>` of results in lookup, one for each possible CPU:
```rust
use rxdp::MapLike;

let key = 0u32;
let value = 1000u64;
m.update(&key, &value, rxdp::MapFlags::BpfAny).unwrap();
let got = m.lookup(&key).unwrap();
assert_eq!(got.into_vec(), vec![value; rxdp::num_cpus()]);

// iterate through all items
for kv in m.items().unwrap() {
    println!("key: {}", kv.key);
    for v in kv.value.into_vec() {
        println!("value: {}", v);
    }
}
```

### Perf event Map
Perf events sent from eBPF can be retrieved via `PerfMap`.
```rust
let (s, r): (Sender<rxdp::PerfEvent<u32>, Receiver<rxdp::PerfEvent<u32>>) = unbounded();
let mut perfmap = rxdp::PerfMap::<u32>::new(&obj, "map_name").unwrap();
perfmap.set_sender(s);

// Spawn a thread that will handle receiving messages
thread::spawn(move || {
    loop {
        r.recv().map_or_else(
            |e| println!("error: {:?}", e),
            |event| println!("event: {:?}", event);,
        );
    }
});

// Poll the map
loop {
    m.poll(10000).unwrap();
}
```

### Batching support (kernel dependent)
If the kernel supports it, you can do batch operations for update/lookups:
```rust
if rxdp::is_batching_supported() {
    let mut next_key = None;
    let r = m.lookup_batch(10u32, next_key).unwrap();
    // do something with r.items...
    next_key = r.next_key;
}
```

## Testing
Running tests requires root access, so it's best to run them in a Docker container:
```sh
make docker-test
```

## Benchmarks
Running benchmarks requires root access, so it's best to run them in a Docker container:
```sh
make docker-bench
```

## Licensing
This crate is released under MIT license and has the following third party dependencies:

|                | Website                                                                        | License                                  | Linkage |
|----------------|--------------------------------------------------------------------------------|------------------------------------------|---------|
| **libbpf-sys** | [github.com/alexforster/libbpf-sys]https://github.com/alexforster/libbpf-sys | `BSD-2-Clause`                           | Static  |
| **libbpf**     | [github.com/libbpf/libbpf]https://github.com/libbpf/libbpf/                  | `LGPL-2.1-only OR BSD-2-Clause`          | Static  |
| **libelf**     | [sourceware.org/elfutils]https://sourceware.org/elfutils/                    | `LGPL-2.1-or-later OR LGPL-3.0-or-later` | Dynamic |
| **zlib**       | [zlib.net]https://www.zlib.net/                                              | `Zlib`                                   | Dynamic |