Show simple item record

dc.contributor.authorSolleza, Franco
dc.contributor.authorAdam, Justus
dc.contributor.authorCrotty, Andrew
dc.contributor.authorNarayan, Akshay
dc.contributor.authorSchwarzkopf, Malte
dc.contributor.authorTatbul, Nesime
dc.date.accessioned2025-12-09T23:04:22Z
dc.date.available2025-12-09T23:04:22Z
dc.date.issued2025-09-08
dc.identifier.isbn979-8-4007-2084-0
dc.identifier.urihttps://hdl.handle.net/1721.1/164255
dc.descriptioneBPF ’25, September 8–11, 2025, Coimbra, Portugalen_US
dc.description.abstracteBPF allows developers to write safe operating system extensions, but writing these extensions remains challenging because it requires detailed knowledge of both the extension's domain and eBPF's programming interface. Most importantly, the extension must pass the eBPF verifier. This paper argues that DSLs for extensions should guarantee verifier-safety: valid DSL programs should result in eBPF code that always passes the verifier. This avoids complex debugging and the need for extension developers to be eBPF experts. We show that three existing DSLs for different domains are compatible with verifier-safety. Beyond verifier-safety, practical extension DSLs must also achieve good performance. Inspired by database query optimization, we sketch an approach to creating DSL-specific optimizers capable of maintaining verifier-safety. A preliminary evaluation shows that optimizing verifier-safe extension performance is feasible.en_US
dc.publisherACM|3rd Workshop on eBPF and Kernel Extensionsen_US
dc.relation.isversionofhttps://doi.org/10.1145/3748355.3748368en_US
dc.rightsCreative Commons Attribution-ShareAlikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleKernel Extension DSLs Should Be Verifier-Safe!en_US
dc.typeArticleen_US
dc.identifier.citationFranco Solleza, Justus Adam, Akshay Narayan, Malte Schwarzkopf, Andrew Crotty, and Nesime Tatbul. 2025. Kernel Extension DSLs Should Be Verifier-Safe! In Proceedings of the 3rd Workshop on eBPF and Kernel Extensions (eBPF '25). Association for Computing Machinery, New York, NY, USA, 55–62.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.identifier.mitlicensePUBLISHER_POLICY
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2025-10-01T07:55:54Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2025-10-01T07:55:55Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record