EIP: 3 Title: Addition of CALLDEPTH opcode Author: Martin Holst Swende <[email protected]> Status: Draft Type: Standards Track Layer: Consensus (hard-fork) Created: 2015-11-19
This is a proposal to add a new opcode, CALLDEPTH
. The CALLDEPTH
opcode would return the remaining available call stack depth.
There is a limit specifying how deep contracts can call other contracts; the call stack. The limit is currently `256`. If a contract invokes another contract (either via `CALL` or `CALLCODE`), the operation will fail if the call stack depth limit has been reached.
This behaviour makes it possible to subject a contract to a "call stack attack" [1]. In such an attack, an attacker first creates a suitable depth of the stack, e.g. by recursive calls. After this step, the attacker invokes the targeted contract. If the targeted calls another contract, that call will fail. If the return value is not properly checked to see if the call was successfull, the consequences could be damaging.
Example:
- Contract `A` want's to be invoked regularly, and pays Ether to the invoker in every block.
- When contract `A` is invoked, it calls contracts `B` and `C`, which consumes a lot of gas. After invocation, contract `A` pays Ether to the caller.
- Malicious user `X` ensures that the stack depth is shallow before invoking A. Both calls to `B` and `C` fail, but `X` can still collect the reward.
- Check return value after invocation.
- Check call stack depth experimentally. A library [2] by Piper Merriam exists for this purpose. This method is quite costly in gas.
[2] https://github.com/pipermerriam/ethereum-stack-depth-lib
The opcode CALLDEPTH
should return the remaining call stack depth. A value of 0
means that the call stack is exhausted, and no further calls can be made.
The actual call stack depth, as well as the call stack depth limit, are present in the EVM during execution, but just not available within the EVM. The implementation should be fairly simple and would provide a cheap and way to protect against call stack attacks.
Not implemented.