[llvm-dev] How to prevent registers from spilling?

899 views
Skip to first unread message

Stephen Crane via llvm-dev

unread,
Nov 2, 2015, 6:24:33 PM11/2/15
to llvm...@lists.llvm.org
Hi all,

I've been trying to figure out if there is a feasible way to prevent values from ever spilling from registers to the stack. I've looked for code or documentation on how to do this but haven't found anything, apologies if this has already been done.

Recent security research has shown that protection schemes such as CFI (that might otherwise be secure) are undermined by sensitive values spilling to the stack. When security-critical values spill from registers to the stack, they can be read and overwritten by an attacker with arbitrary memory read or write capabilities. See "Losing Control" from CCS 2015 for more details on this sort of attack: https://www.ics.uci.edu/~perl/ccs15_stackdefiler.pdf

I think it would be great if we could allow values or at least virtual regs to be tagged as "security-sensitive" and disallow spilling of these values across their lifetime. I expect that the best way to do this would be to start at the virtual register level and push support up to IR values as well if and only if machine IR turns out to be insufficient.

Is this a good idea? Does something to support register pinning already exist? I'm unfortunately not familiar enough with the register allocators to know how to best support this, although I'm willing to give it a try if people can point me in the right direction.

Thanks,
Stephen

C Bergström

unread,
Nov 2, 2015, 6:30:52 PM11/2/15
to Stephen Crane, llvm...@lists.llvm.org

I don't a real answer for you, but my 1st idea is that it would be an
attribute you could apply to a variable. How you *force* that to never
spill on the backend is an entirely different issue. You'd basically
force a split on a certain variable under certain conditions - would
it be possible - (why not) Unless I'm missing something it would be
hell to schedule though..

There's use cases in HPC and GPGPU codes which may benefit from
something similar, but for different reasons. (Some really hot
variable that you never want spilled for example)
_______________________________________________
LLVM Developers mailing list
llvm...@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev

Smith, Kevin B via llvm-dev

unread,
Nov 2, 2015, 6:47:51 PM11/2/15
to C Bergström, Stephen Crane, llvm...@lists.llvm.org
That breaks the whole IR idea of using alloca to allocate/denote space for local variables, and then optimize those
into SSA values when optimization proves that is OK.

Also, for a lot of things, that attribute is simply impossible to implement. Any value that is live across a call needs to be spilled to memory.
You cannot put an unspillable value in a callee preserved register, because you cannot know whether the callee may save that or not.
And if it is in a caller-save register, then the caller has to spill it if it is live across a call.

Kevin B. Smith

Stephen Crane via llvm-dev

unread,
Nov 2, 2015, 7:08:21 PM11/2/15
to Smith, Kevin B, llvm...@lists.llvm.org, Per Larsen, Andrei Homescu
Thanks, I hadn't thought about the HPC applications. I'm not sure that the requirements for the HPC and security use-cases are compatible. Pinning for performance can tolerate spills if it is still fast, while security uses can tolerate slow rematerialization but not spills. Maybe a shared infrastructure is possible but with variable constraints?

On Mon, Nov 2, 2015 at 3:47 PM, Smith, Kevin B <kevin....@intel.com> wrote:
That breaks the whole IR idea of using alloca to allocate/denote space for local variables, and then optimize those
into SSA values when optimization proves that is OK.

Agreed, but the values I care about (which is not really the HPC use-case) would actually be values internal to the compiler, such as the location of CFI metadata, which are never exposed to the front end. Thus I would be happy with something at the machine IR level, after that abstraction has been lost.
 
Also, for a lot of things, that attribute is simply impossible to implement.  Any value that is live across a call needs to be spilled to memory.
You cannot put an unspillable value in a callee preserved register, because you cannot know whether the callee may save that or not.
And if it is in a caller-save register, then the caller has to spill it if it is live across a call.

Yes, but what about values that can be rematerialized? Of course values that _need_ to be live across calls are out, but I'm more concerned about values that were coalesced, hoisted, and which then get spilled. Maybe prevention of coalescing for sensitive values and explicitly inserting materialization at each use is an option here, although that sounds like teaching a lot of passes about sensitive values, with no guarantee of finding all of them. Wouldn't the register allocator still need to make sure that sensitive values are not present in dead callee-saved registers, so they don't get accidentally spilled by a callee?

- stephen

Robinson, Paul via llvm-dev

unread,
Nov 2, 2015, 7:22:05 PM11/2/15
to Stephen Crane, Smith, Kevin B, Per Larsen, llvm...@lists.llvm.org, Andrei Homescu

Sounds like such a security-sensitive value would need to treat calls as barriers for any kind of reordering.

Also, at the end of the value's live range, it would not have to be merely dead, but dead-and-buried (i.e. overwritten) to avoid scavenging by subsequent callees. Same goes for merely copying the value from one register to another, the source would have to be erased.

--paulr

 

From: llvm-dev [mailto:llvm-dev...@lists.llvm.org] On Behalf Of Stephen Crane via llvm-dev
Sent: Monday, November 02, 2015 4:08 PM
To: Smith, Kevin B
Cc: llvm...@lists.llvm.org; Per Larsen; Andrei Homescu
Subject: Re: [llvm-dev] How to prevent registers from spilling?

 

Thanks, I hadn't thought about the HPC applications. I'm not sure that the requirements for the HPC and security use-cases are compatible. Pinning for performance can tolerate spills if it is still fast, while security uses can tolerate slow rematerialization but not spills. Maybe a shared infrastructure is possible but with variable constraints?

Bruce Hoult via llvm-dev

unread,
Nov 3, 2015, 12:11:33 AM11/3/15
to Stephen Crane, llvm-dev
There are plenty of compilers which allow you to specify that a certain callee-save register is dedicated to holding a particular variable within a particular function or compilation unit. GCC, for example (register int *foo asm ("r12");), or ARM Ltd's compiler.

This doesn't prevent some other library code that you call from temporarily saving and restoring that register.

Usually that is fine for correctness purposes (if you don't have callbacks anyway), but it defeats your purpose.

GCC also has the -ffixed-reg command line option to prevent generated code from using that register at all.


David Chisnall via llvm-dev

unread,
Nov 3, 2015, 4:48:40 AM11/3/15
to Stephen Crane, llvm...@lists.llvm.org
Hi Stephen,

I implemented something like this for MIPS a couple of years ago. A few things:

- Marking variables doesn’t make sense. You don’t know what temporaries will exist that are derived from that variable and can allow an attacker to materialise it. You really want to mark functions as sensitive.

- Preventing spills does not actually buy you anything. A lot of recent attacks exploit signal handlers. If you can deliver a signal in the middle of the sensitive code then all of its registers are spilled in the ucontext. You need to also modify the kernel to zero this region of the stack after signal delivery, at the very least, and also ideally use separate signal stacks with different page table mappings. I seem to recall that this was a possible attack vector for your Oakland paper too, as it will allow unmasking the PC.

- Preventing spills won’t work if you’re not in a leaf function, as you don’t know if the callee will will spill callee-save registers that you’ve put your temporaries in.

The approach that I used made the compiler zero all spill slots in the return path and added a warning if you called a non-sensitive function from a sensitive function and stored zero in all temporary registers and unused argument registers. This is something that you can do entirely in the back end, as long as you have a list of sensitive functions. Other projects got in the way and I never had time to do a proper security evaluation, but the approach seemed sane to the cryptographers that I discussed it with.

David

Reply all
Reply to author
Forward
0 new messages