[pull] master from bnb-chain:master#125
Merged
pull[bot] merged 51 commits intodysnix:masterfrom Mar 13, 2026
Merged
Conversation
Co-authored-by: Gary Rong <garyrong0905@gmail.com> Co-authored-by: MariusVanDerWijden <m.vanderwijden@live.de>:
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
* feat: support bid block size check for BEP-655 * fix: remove osaka check
* BEP-652: Implement EIP-7825:Transaction Gas Limit Cap * fix: improve code
…umber (#3533) * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5 * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5 * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5 * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5 * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5 * eip4844.go: limit Blob Transaction Inclusion by Block Number % 5
* tests: update version of spec-tests * consensus/misc/eip4844: limit BEP-657 check in bsc protocol * tests: update the bpo1 && bpo2 config to fix spec test (#26) --------- Co-authored-by: Eric <45141191+zlacfzy@users.noreply.github.com>
Co-authored-by: NathanBSC <122502194+NathanBSC@users.noreply.github.com>
* fix: fix nodereal builder address * fix: fix puissant builder address * fix: fix comment
Co-authored-by: Cursor <cursoragent@cursor.com>
* READMD: keep latest 3 days history logs * README: fix history.state
Fix ECIES invalid-curve handling in RLPx handshake (reject invalid ephemeral pubkeys early) - Add curve validation in crypto/ecies.GenerateShared to reject invalid public keys before ECDH. - Update RLPx PoC test to assert invalid curve points fail with ErrInvalidPublicKey. Motivation / Context RLPx handshake uses ECIES decryption on unauthenticated network input. Prior to this change, an invalid-curve ephemeral public key would proceed into ECDH and only fail at MAC verification, returning ErrInvalidMessage. This allows an oracle on decrypt success/failure and leaves the code path vulnerable to invalid-curve/small-subgroup attacks. The fix enforces IsOnCurve validation up front.
Fix ECIES invalid-curve handling in RLPx handshake (reject invalid ephemeral pubkeys early) - Add curve validation in crypto/ecies.GenerateShared to reject invalid public keys before ECDH. - Update RLPx PoC test to assert invalid curve points fail with ErrInvalidPublicKey. Motivation / Context RLPx handshake uses ECIES decryption on unauthenticated network input. Prior to this change, an invalid-curve ephemeral public key would proceed into ECDH and only fail at MAC verification, returning ErrInvalidMessage. This allows an oracle on decrypt success/failure and leaves the code path vulnerable to invalid-curve/small-subgroup attacks. The fix enforces IsOnCurve validation up front.
upstream: merge geth v1.16.9
* parlia: use parent snapshot for finalized quorum Use the parent block's snapshot instead of the current block's snapshot when computing the validator quorum for fast finality. The current block's snapshot may reflect epoch changes (validator set transitions) that have not yet taken effect, leading to incorrect quorum thresholds. * parlia: improve GetFinalizedHeader --------- Co-authored-by: allformless <213398294+allformless@users.noreply.github.com>
* feehistory.go: add logs * fix: add MaxBlockHistory && MaxHeaderHistory in FullNodeGPO * fix: remove logs
* fix: si * core/vm: align fields ordering in struct EVM with upstream --------- Co-authored-by: NathanBSC <122502194+NathanBSC@users.noreply.github.com>
…ops (#33245) (#3586) The list iterator previously returned true on parse errors without advancing the input, which could lead to non-advancing infinite loops for callers that do not check Err() inside the loop; to make iteration safe while preserving error visibility, Next() now marks the iterator as finished when readKind fails, returning true for the error step so existing users that check Err() can handle it, and then false on subsequent calls, and the function comment was updated to document this behavior and the need to check Err(). Co-authored-by: radik878 <radikpadik76@gmail.com>
…790) (#3587) All five `revert*Request` functions (account, bytecode, storage, trienode heal, bytecode heal) remove the request from the tracked set but never restore the peer to its corresponding idle pool. When a request times out and no response arrives, the peer is permanently lost from the idle pool, preventing new work from being assigned to it. In normal operation mode (snap-sync full state) this bug is masked by pivot movement (which resets idle pools via new Sync() cycles every ~15 minutes) and peer churn (reconnections re-add peers via Register()). However in scenarios like the one I have running my (partial-stateful node)[ethereum/go-ethereum#33764] with long-running sync cycles and few peers, all peers can eventually leak out of the idle pools, stalling sync entirely. Fix: after deleting from the request map, restore the peer to its idle pool if it is still registered (guards against the peer-drop path where Unregister already removed the peer). This mirrors the pattern used in all five On* response handlers. This only seems to manifest in peer-thirstly scenarios as where I find myself when testing snapsync for the partial-statefull node). Still, thought was at least good to raise this point. Unsure if required to discuss or not Co-authored-by: CPerezz <37264926+CPerezz@users.noreply.github.com>
* core/vm: align super-instruction maxStack with raw bounds * core/vm: align super-instruction minStack with raw bounds (#3588) * core/vm: align super-instruction minStack with raw bounds * core/vm: fix comments --------- Co-authored-by: formless <213398294+allformless@users.noreply.github.com>
* consensus/parlia: increment nonce only when tx is included * consensus/parlia: fix comment * consensus/parlia: bit improve
Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
* params: set Osaka/Mendel time in chapel testnet * changelog: mini adjust
merge: develop to master for v1.7.1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by
pull[bot] (v2.0.0-alpha.4)
Can you help keep this open source service alive? 💖 Please sponsor : )