Mining/pkg/mining/ttminer_start.go
snider 74bbf14de4 fix: Address networking, memory leak, and segfault issues from code review
Networking/Protocol fixes:
- Add HTTP server timeouts (Read/Write/Idle/ReadHeader) in service.go
- Fix CORS address parsing to use net.SplitHostPort safely
- Add request body size limit middleware (1MB max)
- Enforce MaxConns limit in WebSocket upgrade handler
- Fix WebSocket origin validation to only allow localhost
- Add read/write deadlines to WebSocket connections

Memory leak fixes:
- Add sync.Once to Manager.Stop() to prevent double-close panic
- Fix controller pending map leak by closing response channel
- Add memory reallocation for hashrate history slices when oversized
- Fix LogBuffer to truncate long lines and force reallocation on trim
- Add process wait timeout to prevent goroutine leaks on zombie processes
- Drain HTTP response body on copy error to allow connection reuse

Segfault/panic prevention:
- Add nil check in GetTotalHashrate for stats pointer
- Fix hashrate history slice reallocation to prevent capacity bloat

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2025-12-31 02:26:46 +00:00

189 lines
4.5 KiB
Go

package mining
import (
"errors"
"fmt"
"io"
"log"
"os"
"os/exec"
"strings"
"time"
)
// Start launches the TT-Miner with the given configuration.
func (m *TTMiner) Start(config *Config) error {
m.mu.Lock()
defer m.mu.Unlock()
if m.Running {
return errors.New("miner is already running")
}
// If the binary path isn't set, run CheckInstallation to find it.
if m.MinerBinary == "" {
if _, err := m.CheckInstallation(); err != nil {
return err // Propagate the detailed error from CheckInstallation
}
}
if m.API != nil && config.HTTPPort != 0 {
m.API.ListenPort = config.HTTPPort
} else if m.API != nil && m.API.ListenPort == 0 {
return errors.New("miner API port not assigned")
}
// Build command line arguments for TT-Miner
args := m.buildArgs(config)
log.Printf("Executing TT-Miner command: %s %s", m.MinerBinary, strings.Join(args, " "))
m.cmd = exec.Command(m.MinerBinary, args...)
// Create stdin pipe for console commands
stdinPipe, err := m.cmd.StdinPipe()
if err != nil {
return fmt.Errorf("failed to create stdin pipe: %w", err)
}
m.stdinPipe = stdinPipe
// Always capture output to LogBuffer
if m.LogBuffer != nil {
m.cmd.Stdout = m.LogBuffer
m.cmd.Stderr = m.LogBuffer
}
// Also output to console if requested
if config.LogOutput {
m.cmd.Stdout = io.MultiWriter(m.LogBuffer, os.Stdout)
m.cmd.Stderr = io.MultiWriter(m.LogBuffer, os.Stderr)
}
if err := m.cmd.Start(); err != nil {
stdinPipe.Close()
return fmt.Errorf("failed to start TT-Miner: %w", err)
}
m.Running = true
// Capture cmd locally to avoid race with Stop()
cmd := m.cmd
go func() {
// Use a channel to detect if Wait() completes
done := make(chan error, 1)
go func() {
done <- cmd.Wait()
}()
// Wait with timeout to prevent goroutine leak on zombie processes
var err error
select {
case err = <-done:
// Normal exit
case <-time.After(5 * time.Minute):
// Process didn't exit after 5 minutes - force cleanup
log.Printf("TT-Miner process wait timeout, forcing cleanup")
if cmd.Process != nil {
cmd.Process.Kill()
}
err = <-done // Wait for the inner goroutine to finish
}
m.mu.Lock()
// Only clear if this is still the same command (not restarted)
if m.cmd == cmd {
m.Running = false
m.cmd = nil
}
m.mu.Unlock()
if err != nil {
log.Printf("TT-Miner exited with error: %v", err)
} else {
log.Printf("TT-Miner exited normally")
}
}()
return nil
}
// buildArgs constructs the command line arguments for TT-Miner
func (m *TTMiner) buildArgs(config *Config) []string {
var args []string
// Pool configuration
if config.Pool != "" {
args = append(args, "-P", config.Pool)
}
// Wallet/user configuration
if config.Wallet != "" {
args = append(args, "-u", config.Wallet)
}
// Password
if config.Password != "" {
args = append(args, "-p", config.Password)
} else {
args = append(args, "-p", "x")
}
// Algorithm selection
if config.Algo != "" {
args = append(args, "-a", config.Algo)
}
// API binding for stats collection
if m.API != nil && m.API.Enabled {
args = append(args, "-b", fmt.Sprintf("%s:%d", m.API.ListenHost, m.API.ListenPort))
}
// GPU device selection (if specified)
if config.Devices != "" {
args = append(args, "-d", config.Devices)
}
// Intensity (if specified)
if config.Intensity > 0 {
args = append(args, "-i", fmt.Sprintf("%d", config.Intensity))
}
// Additional CLI arguments
addTTMinerCliArgs(config, &args)
return args
}
// addTTMinerCliArgs adds any additional CLI arguments from config
func addTTMinerCliArgs(config *Config, args *[]string) {
// Add any extra arguments passed via CLIArgs
if config.CLIArgs != "" {
extraArgs := strings.Fields(config.CLIArgs)
for _, arg := range extraArgs {
// Skip potentially dangerous arguments
if isValidCLIArg(arg) {
*args = append(*args, arg)
} else {
log.Printf("Warning: skipping invalid CLI argument: %s", arg)
}
}
}
}
// isValidCLIArg validates CLI arguments to prevent injection or dangerous patterns
func isValidCLIArg(arg string) bool {
// Block shell metacharacters and dangerous patterns
dangerousPatterns := []string{";", "|", "&", "`", "$", "(", ")", "{", "}", "<", ">", "\n", "\r"}
for _, p := range dangerousPatterns {
if strings.Contains(arg, p) {
return false
}
}
// Block arguments that could override security-related settings
blockedArgs := []string{"--api-access-token", "--api-worker-id"}
lowerArg := strings.ToLower(arg)
for _, blocked := range blockedArgs {
if strings.HasPrefix(lowerArg, blocked) {
return false
}
}
return true
}