1use crate::{EvmTr, PrecompileProvider};
6use bytecode::Bytecode;
7use context_interface::{
8 journaled_state::{account::JournaledAccountTr, JournalTr},
9 result::InvalidTransaction,
10 transaction::{AccessListItemTr, AuthorizationTr, Transaction, TransactionType},
11 Block, Cfg, ContextTr, Database,
12};
13use core::cmp::Ordering;
14use interpreter::InitialAndFloorGas;
15use primitives::{hardfork::SpecId, AddressMap, HashSet, StorageKey, U256};
16use state::AccountInfo;
17
18pub fn load_accounts<
20 EVM: EvmTr<Precompiles: PrecompileProvider<EVM::Context>>,
21 ERROR: From<<<EVM::Context as ContextTr>::Db as Database>::Error>,
22>(
23 evm: &mut EVM,
24) -> Result<(), ERROR> {
25 let (context, precompiles) = evm.ctx_precompiles();
26
27 let gen_spec = context.cfg().spec();
28 let spec = gen_spec.clone().into();
29 context.journal_mut().set_spec_id(spec);
31 let precompiles_changed = precompiles.set_spec(gen_spec);
32 let empty_warmed_precompiles = context.journal_mut().precompile_addresses().is_empty();
33
34 if precompiles_changed || empty_warmed_precompiles {
35 context
38 .journal_mut()
39 .warm_precompiles(precompiles.warm_addresses());
40 }
41
42 if spec.is_enabled_in(SpecId::SHANGHAI) {
45 let coinbase = context.block().beneficiary();
46 context.journal_mut().warm_coinbase_account(coinbase);
47 }
48
49 let (tx, journal) = context.tx_journal_mut();
51 if tx.tx_type() != TransactionType::Legacy {
53 if let Some(access_list) = tx.access_list() {
54 let mut map: AddressMap<HashSet<StorageKey>> = AddressMap::default();
55 for item in access_list {
56 map.entry(*item.address())
57 .or_default()
58 .extend(item.storage_slots().map(|key| U256::from_be_bytes(key.0)));
59 }
60 journal.warm_access_list(map);
61 }
62 }
63
64 Ok(())
65}
66
67#[inline]
69pub fn validate_account_nonce_and_code_with_components(
70 caller_info: &AccountInfo,
71 tx: impl Transaction,
72 cfg: impl Cfg,
73) -> Result<(), InvalidTransaction> {
74 validate_account_nonce_and_code(
75 caller_info,
76 tx.nonce(),
77 cfg.is_eip3607_disabled(),
78 cfg.is_nonce_check_disabled(),
79 )
80}
81
82#[inline]
84pub fn validate_account_nonce_and_code(
85 caller_info: &AccountInfo,
86 tx_nonce: u64,
87 is_eip3607_disabled: bool,
88 is_nonce_check_disabled: bool,
89) -> Result<(), InvalidTransaction> {
90 if !is_eip3607_disabled {
94 let bytecode = match caller_info.code.as_ref() {
95 Some(code) => code,
96 None => &Bytecode::default(),
97 };
98 if !bytecode.is_empty() && !bytecode.is_eip7702() {
101 return Err(InvalidTransaction::RejectCallerWithCode);
102 }
103 }
104
105 if !is_nonce_check_disabled {
107 let tx = tx_nonce;
108 let state = caller_info.nonce;
109 if tx == u64::MAX && state == u64::MAX {
110 return Err(InvalidTransaction::NonceOverflowInTransaction);
111 }
112 match tx.cmp(&state) {
113 Ordering::Greater => {
114 return Err(InvalidTransaction::NonceTooHigh { tx, state });
115 }
116 Ordering::Less => {
117 return Err(InvalidTransaction::NonceTooLow { tx, state });
118 }
119 _ => {}
120 }
121 }
122 Ok(())
123}
124
125#[inline]
129pub fn calculate_caller_fee(
130 balance: U256,
131 tx: impl Transaction,
132 block: impl Block,
133 cfg: impl Cfg,
134) -> Result<U256, InvalidTransaction> {
135 if cfg.is_fee_charge_disabled() {
138 return Ok(balance);
139 }
140
141 let basefee = block.basefee() as u128;
142 let blob_price = block.blob_gasprice().unwrap_or_default();
143 let is_balance_check_disabled = cfg.is_balance_check_disabled();
144
145 if !is_balance_check_disabled {
146 tx.ensure_enough_balance(balance)?;
147 }
148
149 let effective_balance_spending = tx
150 .effective_balance_spending(basefee, blob_price)
151 .expect("effective balance is always smaller than max balance so it can't overflow");
152
153 let gas_balance_spending = effective_balance_spending - tx.value();
154
155 let mut new_balance = balance.saturating_sub(gas_balance_spending);
157
158 if is_balance_check_disabled {
159 new_balance = new_balance.max(tx.value());
161 }
162
163 Ok(new_balance)
164}
165
166#[inline]
168pub fn validate_against_state_and_deduct_caller<
169 CTX: ContextTr,
170 ERROR: From<InvalidTransaction> + From<<CTX::Db as Database>::Error>,
171>(
172 context: &mut CTX,
173) -> Result<(), ERROR> {
174 let (block, tx, cfg, journal, _, _) = context.all_mut();
175
176 let mut caller = journal.load_account_with_code_mut(tx.caller())?.data;
178
179 validate_account_nonce_and_code_with_components(&caller.account().info, tx, cfg)?;
180
181 let new_balance = calculate_caller_fee(*caller.balance(), tx, block, cfg)?;
182
183 caller.set_balance(new_balance);
184 if tx.kind().is_call() {
185 caller.bump_nonce();
186 }
187 Ok(())
188}
189
190#[inline]
197pub fn apply_eip7702_auth_list<
198 CTX: ContextTr,
199 ERROR: From<InvalidTransaction> + From<<CTX::Db as Database>::Error>,
200>(
201 context: &mut CTX,
202 init_and_floor_gas: &mut InitialAndFloorGas,
203) -> Result<u64, ERROR> {
204 let chain_id = context.cfg().chain_id();
205 let cpsb = context.cfg().cpsb();
206 let is_eip8037 = context.cfg().is_amsterdam_eip8037_enabled();
207 let (tx, journal) = context.tx_journal_mut();
208
209 if tx.tx_type() != TransactionType::Eip7702 {
211 return Ok(0);
212 }
213 let (number_of_refunded_accounts, number_of_refunded_bytecodes) =
214 apply_auth_list::<_, ERROR>(chain_id, tx.authorization_list(), journal)?;
215
216 let params = context.cfg().gas_params();
217
218 if is_eip8037 {
224 init_and_floor_gas.state_refund += params.tx_eip7702_state_refund(
225 number_of_refunded_accounts,
226 number_of_refunded_bytecodes,
227 cpsb,
228 );
229 }
230
231 let regular_gas_refund = params
232 .tx_eip7702_auth_refund_regular()
233 .saturating_mul(number_of_refunded_accounts);
234
235 Ok(regular_gas_refund)
236}
237
238#[inline]
248pub fn apply_auth_list<
249 JOURNAL: JournalTr,
250 ERROR: From<InvalidTransaction> + From<<JOURNAL::Database as Database>::Error>,
251>(
252 chain_id: u64,
253 auth_list: impl Iterator<Item = impl AuthorizationTr>,
254 journal: &mut JOURNAL,
255) -> Result<(u64, u64), ERROR> {
256 let mut refunded_accounts = 0;
257 let mut refunded_bytecodes = 0;
258 for authorization in auth_list {
259 let auth_chain_id = authorization.chain_id();
261 if !auth_chain_id.is_zero() && auth_chain_id != U256::from(chain_id) {
262 continue;
263 }
264
265 if authorization.nonce() == u64::MAX {
267 continue;
268 }
269
270 let Some(authority) = authorization.authority() else {
273 continue;
274 };
275
276 let mut authority_acc = journal.load_account_with_code_mut(authority)?;
279 let authority_acc_info = &authority_acc.account().info;
280
281 if let Some(bytecode) = &authority_acc_info.code {
283 if !bytecode.is_empty() && !bytecode.is_eip7702() {
285 continue;
286 }
287 }
288
289 if authorization.nonce() != authority_acc_info.nonce {
291 continue;
292 }
293
294 if !(authority_acc_info.is_empty()
296 && authority_acc
297 .account()
298 .is_loaded_as_not_existing_not_touched())
299 {
300 refunded_accounts += 1;
301 }
302
303 if !authority_acc_info.is_code_hash_empty_or_zero() || authorization.address().is_zero() {
304 refunded_bytecodes += 1;
305 }
306
307 authority_acc.delegate(authorization.address());
312 }
313
314 Ok((refunded_accounts, refunded_bytecodes))
315}
316
317#[cfg(test)]
318mod tests {
319 use super::validate_account_nonce_and_code;
320 use context_interface::result::InvalidTransaction;
321 use state::AccountInfo;
322
323 #[test]
324 fn rejects_transactions_when_sender_nonce_is_max() {
325 let caller_info = AccountInfo {
326 nonce: u64::MAX,
327 ..AccountInfo::default()
328 };
329
330 let err = validate_account_nonce_and_code(&caller_info, u64::MAX, false, false)
331 .expect_err("nonce-max sender should be rejected before execution");
332
333 assert_eq!(err, InvalidTransaction::NonceOverflowInTransaction);
334 }
335
336 #[test]
337 fn allows_matching_non_max_nonce() {
338 let caller_info = AccountInfo {
339 nonce: 7,
340 ..AccountInfo::default()
341 };
342
343 assert!(validate_account_nonce_and_code(&caller_info, 7, false, false).is_ok());
344 }
345}