-
Notifications
You must be signed in to change notification settings - Fork 394
All Core Devs - Execution (ACDE) #210, April 24 #1462
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Discourse Topic ID: 23502
Zoom Meeting: Reusing meeting 88269836469 for series 'acde'.
YouTube Stream Links:
Calendar Event Updated
Telegram Notification
|
we should agree to the EIP-7892 config format EL teams want for the blob parameter config |
Let's discuss SFIing a gas limit increase in Fusaka: ethereum/EIPs#9678 |
Can we discuss RLP Execution Block Size Limit (potentially for Fusaka, as security fix) as without it there is a safe hard blocklimit cap at 100Mgas ethereum/EIPs#9658 and we don't control validators raising gaslimits Post-pectra (with EIP-7623) the max size block is around 104Mgas All-zero calldata ⇒ 10 gas/byte ⇒ 104 857 600 gas for 10 MiB Minus other block overheads; so calldata is currently the limit on safe block gaslimit (without capping block bytes). Above that and CLs won't propagate the blocks However, rather than try to mitigate this in a different way easiest it to cap the EL blocksize; was why enable blocks >10MB that are full of zeros, as they won't be doing any useful work (or they wouldn't be full of zeros) Should be a 1 line check; |
I find the proposal from Vitalik to replace the EVM with RISC-V concerning. We have not even shipped EOF and there are already proposals to replace it. Clients, compilers, debuggers, FV / static analysis tools, etc should not need to integrate these changes if they will likely become obsolete within a few years. The engineering effort to add EOF to those projects will be substantial. Even if there is a future transition that is backwards compatible, people aren't going to pay an order of magnitude or more to use EVM when they can cheaply use RISC-V. |
For EOF I'd like to pitch changing for option D; where we bring back the gas and introspection opcodes; as the dev experience isn't ready for them to be banned (compiling Uniswap, OpenZep and Solady is problematic) Can always bring back the ban as an EOF v2 (as EOF allows versioning); and in that the removal will have to be argued on its own merits. However the dev experience isn't ready for it, today. |
+1000 on Ben’s point above |
Hello everyone - over the past three years I have been working first at Runtime Verification and now at Nethermind on formal verification of EVM bytecode. I have just read some previous discussions (most notably the one in this thread), and would like to offer my perspective, noting that I have only briefly looked at the EOF proposal. From my experience, these are the most important challenges for formal verification of EVM bytecode resulting from Solidity compilation:
If the bytecode does not come from compilation of Solidity code, then further challenges arise, but 2-4 above are quite enough to severely impede scalable formal verification in principle. If EOF does not address any of them, then it is not clear to me how much benefit it would bring to real-world formal verification. |
Closed in favor of #1500 |
All Core Devs - Execution (ACDE)
Agenda
🤖 config
Note: The zoom link will be sent to the facilitator via email
The text was updated successfully, but these errors were encountered: