Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RollCall #3 #944

Closed
CarlBeek opened this issue Jan 18, 2024 · 12 comments
Closed

RollCall #3 #944

CarlBeek opened this issue Jan 18, 2024 · 12 comments

Comments

@CarlBeek
Copy link

CarlBeek commented Jan 18, 2024

This is a call to discuss a frameworks to help aid with coordination between the various EVM-like L2s. The idea is to establish optional norms and standards for L2s to be able to extend the EVM and related tooling while limiting conflicts with the L1 EVM and preventing a proliferation of mutually incompatible standards among the L2s.

Meeting Info

Agenda

Further discussion

Feel free to add comments to this issue with further items of discussion

@timbeiko
Copy link
Collaborator

On ACDE today, we discussed L2 4844 readiness as a topic to discuss on the call.

@CarlBeek
Copy link
Author

@timbeiko will add 4844 readiness to to the schedule, but specifically what @adietrichs was referring to is a breakout call on 4844 readiness & testing happening next Wednesday entirely focused on 4844.

@terencechain
Copy link
Contributor

Probably worth shouting out: ethereum/consensus-specs#3583
In case anyone copied the wrong trusted setup

@CarlBeek
Copy link
Author

Agreed, @terencechain. I will highlight it!

@leonardoalt
Copy link
Member

Meeting info seems to have a typo, I assume date is Wed Jan 24?

@adietrichs
Copy link
Member

Meeting info seems to have a typo, I assume date is Wed Jan 24?

This might be slightly confusing, but there are two separate calls:

  • the next scheduled RollCall announced here, in 3 weeks
  • the 4844 breakout call announced here, in 8min.

@leonardoalt
Copy link
Member

So today is only the 4844 breakout call? Is the presentation on shared sequencing going to be today or in the next RollCall?

@adietrichs
Copy link
Member

So today is only the 4844 breakout call? Is the presentation on shared sequencing going to be today or in the next RollCall?

Today is only 4844! Sorry for the confusion!

@canercidam
Copy link

Hi! Can we present our new RIP in this RollCall? https://ethereum-magicians.org/t/rip-expose-call-stack-to-contracts/18535
Thanks!

@CarlBeek
Copy link
Author

The recording in case you missed it: https://youtu.be/rwDpX08PiXQ

@CarlBeek CarlBeek mentioned this issue Feb 14, 2024
@abcoathup
Copy link

Notes (from Eth R&D Discord)

image

thegaram33 - EIP-4844 readiness. zkSync reported they’ll roll out the feature on Sepolia this week and they’re soon ready for mainnet. Taiko has also started integration. Arbitrum has submitted the upgrade DAO proposal this week.

  • With 4844 comes the blob transaction mempool (aka blobpool), which is completely separate from the mempool for non-blob transactions. In geth’s implementation, if you already have a pending transaction in the txpool, you cannot submit a transaction into the blobpool ("address already reserved"). koloz reported that this causes challenges since they use the same sender account to submit batches (blob transaction) and validity proofs (normal transaction).
  • derek mentioned that they have ongoing discussions with RPC providers about beacon chain RPC availability and support for archive blob, used for node syncing.
  • Reminder from @CarlBeek to use the correct version of the KZG trusted setup parameters (see link in the agenda).
  • Summary and feedback on breakout calls. Main feedback is that they're useful but could be less frequent. The next one will be in 2 weeks (28 Feb) about shared sequencing, led by @JustinDrake.
  • @canercidam | OpenZeppelin presented RIP-7614, a new precompile RIP, proposed by OpenZeppelin, Forta, and other contributors. The goal is to expose the call stack to contracts, so that dapps can use libraries and on-chain oracles / detection engines to reject malicious transactions.
  • Some concerns raised: Are these mechanisms generally applicable, can they be circumvented? E.g. a freshly created contract could not have been flagged, and if it's created in tx1 and used in tx2 in the same block then we couldn't detect that it's a new contract. Other concerns are about added complexity and zk proving cost.
  • New RIP editor: @ulerdogan.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

8 participants
@leonardoalt @timbeiko @adietrichs @CarlBeek @canercidam @terencechain @abcoathup and others