Skip to content

Conversation

@kirdatatjana
Copy link
Contributor

In the previous implementation of spammer, when the max queued limit is hit, processing of any transaction is stopped.
The root cause is in this Reth function. It drops the tx from the sender until the pool is under the limit, which creates a gap in our nonce, and doesn't return any errors.
The PR resolves this issue through an asynchronous status checker for pool size, which will reset the nonce once it detects a mismatch with the expected one.
Note: It can happen that after spamming some tx stay in the pool, but that's because the timeout stopped the algorithm. As soon as the spam runs with the same signer again, they will continue to be processed.

@mpoke mpoke mentioned this pull request Nov 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants