|
3 | 3 | verify_stack_after_op = False
|
4 | 4 |
|
5 | 5 | # ######################################
|
6 |
| -import sys |
7 |
| - |
8 |
| -from ethereum import utils |
9 |
| -from ethereum.abi import is_numeric |
10 | 6 | import copy
|
| 7 | +from ethereum import utils |
11 | 8 | from ethereum import opcodes
|
12 |
| -import time |
13 | 9 | from ethereum.slogging import get_logger
|
14 | 10 | from rlp.utils import encode_hex, ascii_chr
|
15 | 11 | from ethereum.utils import to_string
|
@@ -108,12 +104,12 @@ def mem_extend(mem, compustate, op, start, sz):
|
108 | 104 | if sz:
|
109 | 105 | oldsize = len(mem) // 32
|
110 | 106 | old_totalfee = oldsize * opcodes.GMEMORY + \
|
111 |
| - oldsize**2 // opcodes.GQUADRATICMEMDENOM |
| 107 | + oldsize ** 2 // opcodes.GQUADRATICMEMDENOM |
112 | 108 | newsize = utils.ceil32(start + sz) // 32
|
113 | 109 | # if newsize > 524288:
|
114 | 110 | # raise Exception("Memory above 16 MB per call not supported by this VM")
|
115 | 111 | new_totalfee = newsize * opcodes.GMEMORY + \
|
116 |
| - newsize**2 // opcodes.GQUADRATICMEMDENOM |
| 112 | + newsize ** 2 // opcodes.GQUADRATICMEMDENOM |
117 | 113 | if old_totalfee < new_totalfee:
|
118 | 114 | memfee = new_totalfee - old_totalfee
|
119 | 115 | if compustate.gas < memfee:
|
@@ -173,14 +169,11 @@ def vm_execute(ext, msg, code):
|
173 | 169 |
|
174 | 170 | codelen = len(processed_code)
|
175 | 171 |
|
176 |
| - s = time.time() |
177 | 172 | op = None
|
178 | 173 | steps = 0
|
179 | 174 | _prevop = None # for trace only
|
180 | 175 |
|
181 | 176 | while 1:
|
182 |
| - # print('op: ', op, time.time() - s) |
183 |
| - # s = time.time() |
184 | 177 | # stack size limit error
|
185 | 178 | if compustate.pc >= codelen:
|
186 | 179 | return peaceful_exit('CODE OUT OF RANGE', compustate.gas, [])
|
|
0 commit comments