2016-04-14 18:18:24 +02:00
|
|
|
// Copyright 2015 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2015-10-19 16:08:17 +02:00
|
|
|
package core
|
|
|
|
|
|
|
|
import (
|
2020-12-04 12:22:19 +01:00
|
|
|
"fmt"
|
2021-06-30 15:17:01 +02:00
|
|
|
"math/big"
|
2020-12-04 12:22:19 +01:00
|
|
|
|
2017-04-12 16:38:31 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2017-04-05 01:16:29 +03:00
|
|
|
"github.com/ethereum/go-ethereum/consensus/misc"
|
2015-10-19 16:08:17 +02:00
|
|
|
"github.com/ethereum/go-ethereum/core/state"
|
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
|
|
"github.com/ethereum/go-ethereum/core/vm"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
2016-10-20 13:36:29 +02:00
|
|
|
"github.com/ethereum/go-ethereum/params"
|
2015-10-19 16:08:17 +02:00
|
|
|
)
|
|
|
|
|
2016-03-01 23:32:43 +01:00
|
|
|
// StateProcessor is a basic Processor, which takes care of transitioning
|
|
|
|
// state from one point to another.
|
|
|
|
//
|
|
|
|
// StateProcessor implements Processor.
|
2015-10-19 16:08:17 +02:00
|
|
|
type StateProcessor struct {
|
2017-04-05 01:16:29 +03:00
|
|
|
config *params.ChainConfig // Chain configuration options
|
2024-06-25 04:48:08 -07:00
|
|
|
chain *HeaderChain // Canonical header chain
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
|
|
|
|
2016-03-01 23:32:43 +01:00
|
|
|
// NewStateProcessor initialises a new StateProcessor.
|
2024-06-25 04:48:08 -07:00
|
|
|
func NewStateProcessor(config *params.ChainConfig, chain *HeaderChain) *StateProcessor {
|
2016-03-01 23:32:43 +01:00
|
|
|
return &StateProcessor{
|
|
|
|
config: config,
|
2024-06-25 04:48:08 -07:00
|
|
|
chain: chain,
|
2016-03-01 23:32:43 +01:00
|
|
|
}
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Process processes the state changes according to the Ethereum rules by running
|
|
|
|
// the transaction messages using the statedb and applying any rewards to both
|
|
|
|
// the processor (coinbase) and any included uncles.
|
|
|
|
//
|
|
|
|
// Process returns the receipts and logs accumulated during the process and
|
|
|
|
// returns the amount of gas that was used in the process. If any of the
|
|
|
|
// transactions failed to execute due to insufficient gas it will return an error.
|
2024-09-04 14:33:51 +02:00
|
|
|
func (p *StateProcessor) Process(block *types.Block, statedb *state.StateDB, cfg vm.Config) (*ProcessResult, error) {
|
2015-10-19 16:08:17 +02:00
|
|
|
var (
|
2021-06-30 15:17:01 +02:00
|
|
|
receipts types.Receipts
|
|
|
|
usedGas = new(uint64)
|
|
|
|
header = block.Header()
|
|
|
|
blockHash = block.Hash()
|
|
|
|
blockNumber = block.Number()
|
|
|
|
allLogs []*types.Log
|
|
|
|
gp = new(GasPool).AddGas(block.GasLimit())
|
2015-10-19 16:08:17 +02:00
|
|
|
)
|
2024-03-22 18:53:53 +01:00
|
|
|
|
2018-08-27 16:49:29 +08:00
|
|
|
// Mutate the block and state according to any hard-fork specs
|
2016-07-11 13:55:11 +03:00
|
|
|
if p.config.DAOForkSupport && p.config.DAOForkBlock != nil && p.config.DAOForkBlock.Cmp(block.Number()) == 0 {
|
2017-04-05 01:16:29 +03:00
|
|
|
misc.ApplyDAOHardFork(statedb)
|
2016-07-11 13:55:11 +03:00
|
|
|
}
|
2023-04-21 12:52:02 +03:00
|
|
|
var (
|
2024-06-25 04:48:08 -07:00
|
|
|
context vm.BlockContext
|
2023-04-21 12:52:02 +03:00
|
|
|
signer = types.MakeSigner(p.config, header.Number, header.Time)
|
|
|
|
)
|
2024-10-09 12:24:58 +02:00
|
|
|
|
|
|
|
// Apply pre-execution system calls.
|
2024-06-25 04:48:08 -07:00
|
|
|
context = NewEVMBlockContext(header, p.chain, nil)
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
|
2024-06-25 04:48:08 -07:00
|
|
|
vmenv := vm.NewEVM(context, vm.TxContext{}, statedb, p.config, cfg)
|
2024-10-24 09:11:47 +02:00
|
|
|
var tracingStateDB = vm.StateDB(statedb)
|
|
|
|
if hooks := cfg.Tracer; hooks != nil {
|
|
|
|
tracingStateDB = state.NewHookedState(statedb, hooks)
|
|
|
|
}
|
2023-08-22 14:33:39 +02:00
|
|
|
if beaconRoot := block.BeaconRoot(); beaconRoot != nil {
|
2024-10-24 09:11:47 +02:00
|
|
|
ProcessBeaconBlockRoot(*beaconRoot, vmenv, tracingStateDB)
|
2023-08-22 14:33:39 +02:00
|
|
|
}
|
2024-08-26 10:39:35 +02:00
|
|
|
if p.config.IsPrague(block.Number(), block.Time()) {
|
2024-10-24 09:11:47 +02:00
|
|
|
ProcessParentBlockHash(block.ParentHash(), vmenv, tracingStateDB)
|
2024-08-26 10:39:35 +02:00
|
|
|
}
|
2024-10-09 12:24:58 +02:00
|
|
|
|
2016-07-11 13:55:11 +03:00
|
|
|
// Iterate over and process the individual transactions
|
2015-10-19 16:08:17 +02:00
|
|
|
for i, tx := range block.Transactions() {
|
2023-04-21 12:52:02 +03:00
|
|
|
msg, err := TransactionToMessage(tx, signer, header.BaseFee)
|
2020-11-13 13:42:19 +01:00
|
|
|
if err != nil {
|
2024-09-04 14:33:51 +02:00
|
|
|
return nil, fmt.Errorf("could not apply tx %d [%v]: %w", i, tx.Hash().Hex(), err)
|
2020-11-13 13:42:19 +01:00
|
|
|
}
|
2022-11-16 01:18:52 -08:00
|
|
|
statedb.SetTxContext(tx.Hash(), i)
|
2024-03-22 18:53:53 +01:00
|
|
|
|
|
|
|
receipt, err := ApplyTransactionWithEVM(msg, p.config, gp, statedb, blockNumber, blockHash, tx, usedGas, vmenv)
|
2015-10-19 16:08:17 +02:00
|
|
|
if err != nil {
|
2024-09-04 14:33:51 +02:00
|
|
|
return nil, fmt.Errorf("could not apply tx %d [%v]: %w", i, tx.Hash().Hex(), err)
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
|
|
|
receipts = append(receipts, receipt)
|
2017-01-05 11:52:10 +01:00
|
|
|
allLogs = append(allLogs, receipt.Logs...)
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
2024-09-04 14:33:51 +02:00
|
|
|
// Read requests if Prague is enabled.
|
2024-10-09 12:24:58 +02:00
|
|
|
var requests [][]byte
|
2024-09-04 14:33:51 +02:00
|
|
|
if p.config.IsPrague(block.Number(), block.Time()) {
|
2024-10-11 21:36:13 +02:00
|
|
|
// EIP-6110 deposits
|
2024-10-09 12:24:58 +02:00
|
|
|
depositRequests, err := ParseDepositLogs(allLogs, p.config)
|
2024-09-04 14:33:51 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-10-09 12:24:58 +02:00
|
|
|
requests = append(requests, depositRequests)
|
2024-10-11 21:36:13 +02:00
|
|
|
// EIP-7002 withdrawals
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
withdrawalRequests := ProcessWithdrawalQueue(vmenv, tracingStateDB)
|
2024-10-11 21:36:13 +02:00
|
|
|
requests = append(requests, withdrawalRequests)
|
|
|
|
// EIP-7251 consolidations
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
consolidationRequests := ProcessConsolidationQueue(vmenv, tracingStateDB)
|
2024-10-11 21:36:13 +02:00
|
|
|
requests = append(requests, consolidationRequests)
|
2024-09-04 14:33:51 +02:00
|
|
|
}
|
|
|
|
|
2017-04-05 01:16:29 +03:00
|
|
|
// Finalize the block, applying any consensus engine specific extras (e.g. block rewards)
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
p.chain.engine.Finalize(p.chain, header, tracingStateDB, block.Body())
|
2015-10-19 16:08:17 +02:00
|
|
|
|
2024-09-04 14:33:51 +02:00
|
|
|
return &ProcessResult{
|
|
|
|
Receipts: receipts,
|
|
|
|
Requests: requests,
|
|
|
|
Logs: allLogs,
|
|
|
|
GasUsed: *usedGas,
|
|
|
|
}, nil
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
|
|
|
|
2024-03-22 18:53:53 +01:00
|
|
|
// ApplyTransactionWithEVM attempts to apply a transaction to the given state database
|
|
|
|
// and uses the input parameters for its environment similar to ApplyTransaction. However,
|
|
|
|
// this method takes an already created EVM instance as input.
|
|
|
|
func ApplyTransactionWithEVM(msg *Message, config *params.ChainConfig, gp *GasPool, statedb *state.StateDB, blockNumber *big.Int, blockHash common.Hash, tx *types.Transaction, usedGas *uint64, evm *vm.EVM) (receipt *types.Receipt, err error) {
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
var tracingStateDB = vm.StateDB(statedb)
|
|
|
|
if hooks := evm.Config.Tracer; hooks != nil {
|
|
|
|
tracingStateDB = state.NewHookedState(statedb, hooks)
|
|
|
|
if hooks.OnTxStart != nil {
|
|
|
|
hooks.OnTxStart(evm.GetVMContext(), tx, msg.From)
|
|
|
|
}
|
|
|
|
if hooks.OnTxEnd != nil {
|
|
|
|
defer func() { hooks.OnTxEnd(receipt, err) }()
|
2024-03-22 18:53:53 +01:00
|
|
|
}
|
|
|
|
}
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
|
2021-02-25 07:26:57 -07:00
|
|
|
// Create a new context to be used in the EVM environment.
|
2020-11-13 13:42:19 +01:00
|
|
|
txContext := NewEVMTxContext(msg)
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
evm.Reset(txContext, tracingStateDB)
|
2021-02-25 07:26:57 -07:00
|
|
|
|
|
|
|
// Apply the transaction to the current state (included in the env).
|
2020-11-13 13:42:19 +01:00
|
|
|
result, err := ApplyMessage(evm, msg, gp)
|
2015-10-19 16:08:17 +02:00
|
|
|
if err != nil {
|
2019-09-12 14:22:22 -05:00
|
|
|
return nil, err
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
2021-02-25 07:26:57 -07:00
|
|
|
|
|
|
|
// Update the state with pending changes.
|
2017-07-17 11:34:53 +03:00
|
|
|
var root []byte
|
2021-06-30 15:17:01 +02:00
|
|
|
if config.IsByzantium(blockNumber) {
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
tracingStateDB.Finalise(true)
|
2017-07-17 11:34:53 +03:00
|
|
|
} else {
|
2021-06-30 15:17:01 +02:00
|
|
|
root = statedb.IntermediateRoot(config.IsEIP158(blockNumber)).Bytes()
|
2017-07-17 11:34:53 +03:00
|
|
|
}
|
2020-04-22 16:25:36 +08:00
|
|
|
*usedGas += result.UsedGas
|
2017-07-17 11:34:53 +03:00
|
|
|
|
2024-09-06 11:31:00 +02:00
|
|
|
return MakeReceipt(evm, result, statedb, blockNumber, blockHash, tx, *usedGas, root), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MakeReceipt generates the receipt object for a transaction given its execution result.
|
|
|
|
func MakeReceipt(evm *vm.EVM, result *ExecutionResult, statedb *state.StateDB, blockNumber *big.Int, blockHash common.Hash, tx *types.Transaction, usedGas uint64, root []byte) *types.Receipt {
|
2021-02-25 07:26:57 -07:00
|
|
|
// Create a new receipt for the transaction, storing the intermediate root and gas used
|
|
|
|
// by the tx.
|
2024-09-06 11:31:00 +02:00
|
|
|
receipt := &types.Receipt{Type: tx.Type(), PostState: root, CumulativeGasUsed: usedGas}
|
2021-02-25 07:26:57 -07:00
|
|
|
if result.Failed() {
|
|
|
|
receipt.Status = types.ReceiptStatusFailed
|
|
|
|
} else {
|
|
|
|
receipt.Status = types.ReceiptStatusSuccessful
|
|
|
|
}
|
2015-10-19 16:08:17 +02:00
|
|
|
receipt.TxHash = tx.Hash()
|
2020-04-22 16:25:36 +08:00
|
|
|
receipt.GasUsed = result.UsedGas
|
2021-02-25 07:26:57 -07:00
|
|
|
|
2023-09-11 00:14:20 -06:00
|
|
|
if tx.Type() == types.BlobTxType {
|
|
|
|
receipt.BlobGasUsed = uint64(len(tx.BlobHashes()) * params.BlobTxBlobGasPerBlob)
|
2023-10-02 11:49:29 +02:00
|
|
|
receipt.BlobGasPrice = evm.Context.BlobBaseFee
|
2023-09-11 00:14:20 -06:00
|
|
|
}
|
2023-08-26 04:52:12 +02:00
|
|
|
|
2021-02-25 07:26:57 -07:00
|
|
|
// If the transaction created a contract, store the creation address in the receipt.
|
2024-09-06 11:31:00 +02:00
|
|
|
if tx.To() == nil {
|
2020-11-13 13:42:19 +01:00
|
|
|
receipt.ContractAddress = crypto.CreateAddress(evm.TxContext.Origin, tx.Nonce())
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
2021-02-25 07:26:57 -07:00
|
|
|
|
2024-08-29 14:50:27 +02:00
|
|
|
// Merge the tx-local access event into the "block-local" one, in order to collect
|
|
|
|
// all values, so that the witness can be built.
|
|
|
|
if statedb.GetTrie().IsVerkle() {
|
|
|
|
statedb.AccessEvents().Merge(evm.AccessEvents)
|
|
|
|
}
|
|
|
|
|
2021-02-25 07:26:57 -07:00
|
|
|
// Set the receipt logs and create the bloom filter.
|
2022-12-13 20:54:16 +08:00
|
|
|
receipt.Logs = statedb.GetLogs(tx.Hash(), blockNumber.Uint64(), blockHash)
|
2015-10-19 16:08:17 +02:00
|
|
|
receipt.Bloom = types.CreateBloom(types.Receipts{receipt})
|
2021-06-30 15:17:01 +02:00
|
|
|
receipt.BlockHash = blockHash
|
|
|
|
receipt.BlockNumber = blockNumber
|
2019-03-27 08:39:25 -04:00
|
|
|
receipt.TransactionIndex = uint(statedb.TxIndex())
|
2024-09-06 11:31:00 +02:00
|
|
|
return receipt
|
2015-10-19 16:08:17 +02:00
|
|
|
}
|
2020-11-13 13:42:19 +01:00
|
|
|
|
|
|
|
// ApplyTransaction attempts to apply a transaction to the given state database
|
|
|
|
// and uses the input parameters for its environment. It returns the receipt
|
|
|
|
// for the transaction, gas used and an error if the transaction failed,
|
|
|
|
// indicating the block was invalid.
|
|
|
|
func ApplyTransaction(config *params.ChainConfig, bc ChainContext, author *common.Address, gp *GasPool, statedb *state.StateDB, header *types.Header, tx *types.Transaction, usedGas *uint64, cfg vm.Config) (*types.Receipt, error) {
|
2023-04-21 12:52:02 +03:00
|
|
|
msg, err := TransactionToMessage(tx, types.MakeSigner(config, header.Number, header.Time), header.BaseFee)
|
2020-11-13 13:42:19 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Create a new context to be used in the EVM environment
|
|
|
|
blockContext := NewEVMBlockContext(header, bc, author)
|
2023-10-31 12:39:25 +01:00
|
|
|
txContext := NewEVMTxContext(msg)
|
|
|
|
vmenv := vm.NewEVM(blockContext, txContext, statedb, config, cfg)
|
2024-03-22 18:53:53 +01:00
|
|
|
return ApplyTransactionWithEVM(msg, config, gp, statedb, header.Number, header.Hash(), tx, usedGas, vmenv)
|
2020-11-13 13:42:19 +01:00
|
|
|
}
|
2023-08-22 14:33:39 +02:00
|
|
|
|
|
|
|
// ProcessBeaconBlockRoot applies the EIP-4788 system call to the beacon block root
|
|
|
|
// contract. This method is exported to be used in tests.
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
func ProcessBeaconBlockRoot(beaconRoot common.Hash, vmenv *vm.EVM, statedb vm.StateDB) {
|
2024-08-26 10:39:35 +02:00
|
|
|
if tracer := vmenv.Config.Tracer; tracer != nil {
|
|
|
|
if tracer.OnSystemCallStart != nil {
|
|
|
|
tracer.OnSystemCallStart()
|
|
|
|
}
|
|
|
|
if tracer.OnSystemCallEnd != nil {
|
|
|
|
defer tracer.OnSystemCallEnd()
|
|
|
|
}
|
2024-05-06 07:21:55 -04:00
|
|
|
}
|
2023-08-22 14:33:39 +02:00
|
|
|
msg := &Message{
|
|
|
|
From: params.SystemAddress,
|
|
|
|
GasLimit: 30_000_000,
|
|
|
|
GasPrice: common.Big0,
|
|
|
|
GasFeeCap: common.Big0,
|
|
|
|
GasTipCap: common.Big0,
|
2024-03-15 16:14:31 +08:00
|
|
|
To: ¶ms.BeaconRootsAddress,
|
2023-08-22 14:33:39 +02:00
|
|
|
Data: beaconRoot[:],
|
|
|
|
}
|
|
|
|
vmenv.Reset(NewEVMTxContext(msg), statedb)
|
2024-03-15 16:14:31 +08:00
|
|
|
statedb.AddAddressToAccessList(params.BeaconRootsAddress)
|
2024-01-23 14:51:58 +01:00
|
|
|
_, _, _ = vmenv.Call(vm.AccountRef(msg.From), *msg.To, msg.Data, 30_000_000, common.U2560)
|
2023-08-22 14:33:39 +02:00
|
|
|
statedb.Finalise(true)
|
|
|
|
}
|
2024-08-26 10:39:35 +02:00
|
|
|
|
|
|
|
// ProcessParentBlockHash stores the parent block hash in the history storage contract
|
|
|
|
// as per EIP-2935.
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
func ProcessParentBlockHash(prevHash common.Hash, vmenv *vm.EVM, statedb vm.StateDB) {
|
2024-08-26 10:39:35 +02:00
|
|
|
if tracer := vmenv.Config.Tracer; tracer != nil {
|
|
|
|
if tracer.OnSystemCallStart != nil {
|
|
|
|
tracer.OnSystemCallStart()
|
|
|
|
}
|
|
|
|
if tracer.OnSystemCallEnd != nil {
|
|
|
|
defer tracer.OnSystemCallEnd()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
msg := &Message{
|
|
|
|
From: params.SystemAddress,
|
|
|
|
GasLimit: 30_000_000,
|
|
|
|
GasPrice: common.Big0,
|
|
|
|
GasFeeCap: common.Big0,
|
|
|
|
GasTipCap: common.Big0,
|
|
|
|
To: ¶ms.HistoryStorageAddress,
|
|
|
|
Data: prevHash.Bytes(),
|
|
|
|
}
|
|
|
|
vmenv.Reset(NewEVMTxContext(msg), statedb)
|
|
|
|
statedb.AddAddressToAccessList(params.HistoryStorageAddress)
|
|
|
|
_, _, _ = vmenv.Call(vm.AccountRef(msg.From), *msg.To, msg.Data, 30_000_000, common.U2560)
|
|
|
|
statedb.Finalise(true)
|
|
|
|
}
|
2024-09-04 14:33:51 +02:00
|
|
|
|
2024-10-11 21:36:13 +02:00
|
|
|
// ProcessWithdrawalQueue calls the EIP-7002 withdrawal queue contract.
|
|
|
|
// It returns the opaque request data returned by the contract.
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
func ProcessWithdrawalQueue(vmenv *vm.EVM, statedb vm.StateDB) []byte {
|
2024-10-11 21:36:13 +02:00
|
|
|
return processRequestsSystemCall(vmenv, statedb, 0x01, params.WithdrawalQueueAddress)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ProcessConsolidationQueue calls the EIP-7251 consolidation queue contract.
|
|
|
|
// It returns the opaque request data returned by the contract.
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
func ProcessConsolidationQueue(vmenv *vm.EVM, statedb vm.StateDB) []byte {
|
2024-10-11 21:36:13 +02:00
|
|
|
return processRequestsSystemCall(vmenv, statedb, 0x02, params.ConsolidationQueueAddress)
|
|
|
|
}
|
|
|
|
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 08:03:36 +02:00
|
|
|
func processRequestsSystemCall(vmenv *vm.EVM, statedb vm.StateDB, requestType byte, addr common.Address) []byte {
|
2024-10-11 21:36:13 +02:00
|
|
|
if tracer := vmenv.Config.Tracer; tracer != nil {
|
|
|
|
if tracer.OnSystemCallStart != nil {
|
|
|
|
tracer.OnSystemCallStart()
|
|
|
|
}
|
|
|
|
if tracer.OnSystemCallEnd != nil {
|
|
|
|
defer tracer.OnSystemCallEnd()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
msg := &Message{
|
|
|
|
From: params.SystemAddress,
|
|
|
|
GasLimit: 30_000_000,
|
|
|
|
GasPrice: common.Big0,
|
|
|
|
GasFeeCap: common.Big0,
|
|
|
|
GasTipCap: common.Big0,
|
|
|
|
To: &addr,
|
|
|
|
}
|
|
|
|
vmenv.Reset(NewEVMTxContext(msg), statedb)
|
|
|
|
statedb.AddAddressToAccessList(addr)
|
|
|
|
ret, _, _ := vmenv.Call(vm.AccountRef(msg.From), *msg.To, msg.Data, 30_000_000, common.U2560)
|
|
|
|
statedb.Finalise(true)
|
|
|
|
|
|
|
|
// Create withdrawals requestsData with prefix 0x01
|
|
|
|
requestsData := make([]byte, len(ret)+1)
|
|
|
|
requestsData[0] = requestType
|
|
|
|
copy(requestsData[1:], ret)
|
|
|
|
return requestsData
|
|
|
|
}
|
|
|
|
|
2024-09-04 14:33:51 +02:00
|
|
|
// ParseDepositLogs extracts the EIP-6110 deposit values from logs emitted by
|
|
|
|
// BeaconDepositContract.
|
2024-10-09 12:24:58 +02:00
|
|
|
func ParseDepositLogs(logs []*types.Log, config *params.ChainConfig) ([]byte, error) {
|
|
|
|
deposits := make([]byte, 1) // note: first byte is 0x00 (== deposit request type)
|
2024-09-04 14:33:51 +02:00
|
|
|
for _, log := range logs {
|
|
|
|
if log.Address == config.DepositContractAddress {
|
2024-10-09 12:24:58 +02:00
|
|
|
request, err := types.DepositLogToRequest(log.Data)
|
2024-09-04 14:33:51 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to parse deposit data: %v", err)
|
|
|
|
}
|
2024-10-09 12:24:58 +02:00
|
|
|
deposits = append(deposits, request...)
|
2024-09-04 14:33:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return deposits, nil
|
|
|
|
}
|