More verbose -mspeculative-load-hardening

Hello everyone,

It may not be the best place to ask this but I found nothing on the internet about it.

I’m working on Spectre V1 detection and stumbled upon the mitigation provided by clang, the “-mspeculative-load-hardening” option. I found it really interesting, and my question is the following: is there a way to tweak the compiler to print a message whenever it applies the mitigation, telling the user at which line of its code it applied the patch ?

I have no idea of the difficulty of such a feature, but I’m ready to learn how to do it myself if anybody has time to tell me how to !

Thanks for any help,

milsegv

Hi
I think llvm-dev list (CC’ed) have more visibility in this.

Hi milsegv,

I work on SLH. I haven’t thought about the feature you’d like to see. It sounds pretty interesting. What would you like to use it for? Are you trying to learn more about how SLH works or are you hoping to use this feature for your project? I’m also interested in what you’re working on for Spectre v1 detection if you’d like to share!

I’m not sure how to go from the Machine IR that the SLH pass works on to the original C++ source code, so I can’t give you advice on implementing that in LLVM. Hopefully someone else can chime in who understands the LLVM stack better than me.

If you’d like to get a better understanding of how SLH works:

Have you looked into using the LLVM_DEBUG macro? You can use it to print where you want from the SLH pass.
Check it out here: https://llvm.org/docs/ProgrammersManual.html#the-llvm-debug-macro-and-debug-option You’ll have to add it where you want to see what SLH is doing in the X86SpeculativeLoadHardening.cpp file and rebuild from source to get the new error messages.

Another useful thing for you might be to pass either of these to clang when you enable -mspeculative-load-hardening

  • -mllvm -print-after-all
  • -mllvm -print-after=“x86-slh”

This will let you look at the code before and after the SLH transformations.

If you want to implement this new feature that you want to build on:

One thing about your question to print where SLH applies the mitigation. I’d say the mitigation has multiple parts and it may be easier to understand your problem if you get more granular about what you mean. Do you want to know which loads in the C++ source get hardened? Or which conditions had instrumentation added? There are the instruction sequences that are added to track the predicate state and there are the instruction sequences that are added to mask data dependent loads and probably other parts that I can’t think of off the top of my head. To figure out what you want to print it might be helpful to read this design doc if you haven’t seen it: https://llvm.org/docs/SpeculativeLoadHardening.html.

Another thing to consider about your feature idea is that the output may be noisy depending on what you were hoping for.

SLH tries to mitigate anything that could potentially be a problem and thus it instruments almost every branch, load, and function entry, for example. There isn’t a lot of signal about what is really a gadget among the code instrumented by SLH. It really tries to be comprehensive and to avoid missing anything even when that means protecting things that can’t realistically be used for a Spectre v1 gadget.

Hello !

I’m currently trying to compare every Spectre V1/V1.1/V2 mitigations proposed by researchers and software developers, so I’m not really thinking of some new mitigations …

But publicly available working solutions are scarce, and I stumbled upon clang’s SLH that sounded interesting !

My main interrogation is the following: given a medium/big project, is there an existing tool that detects automatically most of Spectre-related leakage and to warns the developer about it ? I found static analysis tools but couldn’t make them work on a huge project either.

As you said, SLH may be pretty noisy. I looked upon the -mllvm -print-after=“x86-slh” option but as I’m not really familiar with LLVM’s IR it didn’t mean a lot to me haha.

I’m not really sure if a more fine grained detection is possible, grsecurity seem to say that it is in fact doable (they made a GCC plugin, https://grsecurity.net/respectre_announce.php) but I couldn’t put my hands on theirs.

Anyway thanks for your answer !

milsegv

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐

For reporting from the backend, the “optimization remarks” feature might be what you are looking for. I have not used it myself so I should not provide details, but it is enabled from the clang command line with the -R option I believe.

–paulr

Hi milsegv,

Gotcha. Makes sense.

Another option would be to compare the assembly output of a program built with and without the SLH flag. Adding -S to your build command will output the assembly.

A few other Spectre gadget detectors I’ve seen are:

In case you haven’t come across them yet.

Good luck on your search! Feel free to ask any additional questions.

Hi milsegv,

The command line options look like this -x86-slh[suffix] and you pass them to clang with -mllvm -x86-slh[suffix].

So for example: clang <file.cpp> -mllvm --x86-slh-ip

Here’s an example using llc and the -x86-slh-lfence flag: https://github.com/llvm/llvm-project/blob/master/llvm/test/CodeGen/X86/speculative-load-hardening.ll#L3

If you look at llc -help-hidden, that’s another way to find all the SLH flags you can pass. (Use -mllvm before the flag if you are passing the flag to clang.)

Let’s discuss this on the mailing list so future Google searches can find the info in the LLVM Dev List archives. :slight_smile: