| dc.contributor.author | Solleza, Franco | |
| dc.contributor.author | Adam, Justus | |
| dc.contributor.author | Crotty, Andrew | |
| dc.contributor.author | Narayan, Akshay | |
| dc.contributor.author | Schwarzkopf, Malte | |
| dc.contributor.author | Tatbul, Nesime | |
| dc.date.accessioned | 2025-12-09T23:04:22Z | |
| dc.date.available | 2025-12-09T23:04:22Z | |
| dc.date.issued | 2025-09-08 | |
| dc.identifier.isbn | 979-8-4007-2084-0 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/164255 | |
| dc.description | eBPF ’25, September 8–11, 2025, Coimbra, Portugal | en_US |
| dc.description.abstract | eBPF allows developers to write safe operating system extensions, but writing these extensions remains challenging because it requires detailed knowledge of both the extension's domain and eBPF's programming interface. Most importantly, the extension must pass the eBPF verifier.
This paper argues that DSLs for extensions should guarantee verifier-safety: valid DSL programs should result in eBPF code that always passes the verifier. This avoids complex debugging and the need for extension developers to be eBPF experts. We show that three existing DSLs for different domains are compatible with verifier-safety. Beyond verifier-safety, practical extension DSLs must also achieve good performance. Inspired by database query optimization, we sketch an approach to creating DSL-specific optimizers capable of maintaining verifier-safety. A preliminary evaluation shows that optimizing verifier-safe extension performance is feasible. | en_US |
| dc.publisher | ACM|3rd Workshop on eBPF and Kernel Extensions | en_US |
| dc.relation.isversionof | https://doi.org/10.1145/3748355.3748368 | en_US |
| dc.rights | Creative Commons Attribution-ShareAlike | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-sa/4.0/ | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | Kernel Extension DSLs Should Be Verifier-Safe! | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Franco Solleza, Justus Adam, Akshay Narayan, Malte Schwarzkopf, Andrew Crotty, and Nesime Tatbul. 2025. Kernel Extension DSLs Should Be Verifier-Safe! In Proceedings of the 3rd Workshop on eBPF and Kernel Extensions (eBPF '25). Association for Computing Machinery, New York, NY, USA, 55–62. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
| dc.identifier.mitlicense | PUBLISHER_POLICY | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2025-10-01T07:55:54Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2025-10-01T07:55:55Z | |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |