Kernel Extension DSLs Should Be Verifier-Safe!
Author(s)
Solleza, Franco; Adam, Justus; Crotty, Andrew; Narayan, Akshay; Schwarzkopf, Malte; Tatbul, Nesime; ... Show more Show less
Download3748355.3748368.pdf (495.0Kb)
Publisher with Creative Commons License
Publisher with Creative Commons License
Creative Commons Attribution
Terms of use
Metadata
Show full item recordAbstract
eBPF allows developers to write safe operating system extensions, but writing these extensions remains challenging because it requires detailed knowledge of both the extension's domain and eBPF's programming interface. Most importantly, the extension must pass the eBPF verifier.
This paper argues that DSLs for extensions should guarantee verifier-safety: valid DSL programs should result in eBPF code that always passes the verifier. This avoids complex debugging and the need for extension developers to be eBPF experts. We show that three existing DSLs for different domains are compatible with verifier-safety. Beyond verifier-safety, practical extension DSLs must also achieve good performance. Inspired by database query optimization, we sketch an approach to creating DSL-specific optimizers capable of maintaining verifier-safety. A preliminary evaluation shows that optimizing verifier-safe extension performance is feasible.
Description
eBPF ’25, September 8–11, 2025, Coimbra, Portugal
Date issued
2025-09-08Department
Massachusetts Institute of Technology. Computer Science and Artificial Intelligence LaboratoryPublisher
ACM|3rd Workshop on eBPF and Kernel Extensions
Citation
Franco Solleza, Justus Adam, Akshay Narayan, Malte Schwarzkopf, Andrew Crotty, and Nesime Tatbul. 2025. Kernel Extension DSLs Should Be Verifier-Safe! In Proceedings of the 3rd Workshop on eBPF and Kernel Extensions (eBPF '25). Association for Computing Machinery, New York, NY, USA, 55–62.
Version: Final published version
ISBN
979-8-4007-2084-0