X2Go Bug report logs - #1534
session.log fills up root filesystem

version graph

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: Nico van Vliet <n.vanvliet@utwente.nl>

Date: Mon, 22 Mar 2021 11:30:02 UTC

Severity: normal

Found in version 4.1.0.3

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1534: ATTN: [POSSIBLE SPAM]  [X2Go-Dev] Bug#1534: session.log fills up root filesystem
Reply-To: David Schumm <david.schumm@seakr.com>, 1534@bugs.x2go.org
Resent-From: David Schumm <david.schumm@seakr.com>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Mon, 22 Mar 2021 13:40:03 +0000
Resent-Message-ID: <handler.1534.B1534.161642030629349@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1534
X-X2Go-PR-Package: x2goserver
X-X2Go-PR-Keywords: 
References: <6133bef7-4c89-20dc-db3d-6555642a7c6f@utwente.nl> <6133bef7-4c89-20dc-db3d-6555642a7c6f@utwente.nl>
Received: via spool by 1534-submit@bugs.x2go.org id=B1534.161642030629349
          (code B ref 1534); Mon, 22 Mar 2021 13:40:03 +0000
Received: (at 1534) by bugs.x2go.org; 22 Mar 2021 13:38:26 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 required=3.0 tests=BAYES_00,SPF_HELO_NONE,
	URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2
Received: from mx4.seakr.com (mx4.seakr.com [4.31.13.39])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 4F6135DAEE
	for <1534@bugs.x2go.org>; Mon, 22 Mar 2021 14:38:12 +0100 (CET)
Received: from mx-scan.seakr.com (mx-scan.seakr.com [192.168.127.25])
	by mx4.seakr.com (Postfix) with ESMTP id 6138F400027A
	for <1534@bugs.x2go.org>; Mon, 22 Mar 2021 07:38:10 -0600 (MDT)
X-ASG-Debug-ID: 1616420290-0799c90f012d37d0001-Ngp5Zj
Received: from msg2.seakr.com (msg2.seakr.com [192.168.100.52]) by mx-scan.seakr.com with ESMTP id FcqRfmOhzRs2PQWC; Mon, 22 Mar 2021 07:38:10 -0600 (MDT)
X-Barracuda-Envelope-From: david.schumm@seakr.com
X-Barracuda-RBL-Trusted-Forwarder: 192.168.100.52
Received: from localhost (localhost [127.0.0.1])
	by msg2.seakr.com (Postfix) with ESMTP id D49D1BF49B;
	Mon, 22 Mar 2021 07:31:29 -0600 (MDT)
Received: from msg2.seakr.com ([127.0.0.1])
	by localhost (msg2.seakr.com [127.0.0.1]) (amavisd-new, port 10032)
	with ESMTP id FnpLcO1iGOvp; Mon, 22 Mar 2021 07:31:29 -0600 (MDT)
Received: from localhost (localhost [127.0.0.1])
	by msg2.seakr.com (Postfix) with ESMTP id 2034ABF49D;
	Mon, 22 Mar 2021 07:31:29 -0600 (MDT)
X-Virus-Scanned: amavisd-new at msg2.seakr.com
Received: from msg2.seakr.com ([127.0.0.1])
	by localhost (msg2.seakr.com [127.0.0.1]) (amavisd-new, port 10026)
	with ESMTP id X6UncelfFNDJ; Mon, 22 Mar 2021 07:31:29 -0600 (MDT)
Received: from msg2.seakr.com (msg2.seakr.com [192.168.100.52])
	by msg2.seakr.com (Postfix) with ESMTP id 03593BF49B;
	Mon, 22 Mar 2021 07:31:29 -0600 (MDT)
From: David Schumm <david.schumm@seakr.com>
X-Barracuda-RBL-Trusted-Forwarder: 192.168.100.52
To: "Nico van Vliet" <n.vanvliet@utwente.nl>,
	<1534@bugs.x2go.org>,
	<submit@bugs.x2go.org>
In-Reply-To: <6133bef7-4c89-20dc-db3d-6555642a7c6f@utwente.nl>
Thread-Topic: ATTN: [POSSIBLE SPAM]  [X2Go-Dev] Bug#1534: session.log fills up root filesystem
X-ASG-Orig-Subj: RE: ATTN: [POSSIBLE SPAM]  [X2Go-Dev] Bug#1534: session.log fills up root filesystem
Date: Mon, 22 Mar 2021 07:31:28 -0600 (MDT)
Message-ID: <000201d71f20$98c327a0$ca4976e0$@seakr.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
X-Mailer: Zimbra 9.0.0_GA_3990 (Zimbra-ZCO/9.0.0.1888 (10.0.19042  en-US) P278c T2dd0 R371)
Thread-Index: AQEMmf+RJF3L70umKb/aZ+skIoCRmawlC5rA
Content-Language: en-us
X-Originating-IP: [192.168.104.233]
X-Barracuda-Connect: msg2.seakr.com[192.168.100.52]
X-Barracuda-Start-Time: 1616420290
X-Barracuda-URL: https://mx-scan.seakr.com:443/cgi-mod/mark.cgi
X-Barracuda-BRTS-Status: 1
X-Virus-Scanned: by bsmtpd at seakr.com
X-Barracuda-Scan-Msg-Size: 2684
X-Barracuda-Spam-Score: 0.00
X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=5.0 tests=
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.88703
	Rule breakdown below
	 pts rule name              description
	---- ---------------------- --------------------------------------------------
Nico,
I ran into this as well,  There's a bug in the 3.5.99.25 library.  I rolled 
back to the previous version until the fix was released.

https://lists.x2go.org/pipermail/x2go-user/2020-December/006380.html

Dave



-----Original Message-----
From: x2go-dev <x2go-dev-bounces@lists.x2go.org> On Behalf Of Nico van Vliet
Sent: Monday, March 22, 2021 5:28 AM
To: submit@bugs.x2go.org
Subject: ATTN: [POSSIBLE SPAM] [X2Go-Dev] Bug#1534: session.log fills up 
root filesystem

package: x2goserver
version: 4.1.0.3

Cannot write data to system activity file: No space left on device

Just use X2Go client on Windows10 (and possibly others) and suspend and 
reconnect a lot to the server.

X2Go keeps writing to the session.log file. Example:
# ls -l
/tmp/.x2go-deshmane/C-deshmane-79-1615026580_stDXFCE_dp32/session.log
-rw------- 1 deshmane dkdvlp 2037804631 Mar 22 12:25 
/tmp/.x2go-deshmane/C-deshmane-79-1615026580_stDXFCE_dp32/session.log


tail /tmp/.x2go-deshmane/C-deshmane-79-1615026580_stDXFCE_dp32/session.log
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.
nxagentPendingEvents: Returning error with display down.

These messages keep filling up the root filesystem without limit.

Server:

# cat /etc/os-release
NAME="CentOS Linux"
VERSION="7 (Core)"
ID="centos"
ID_LIKE="rhel fedora"
VERSION_ID="7"
PRETTY_NAME="CentOS Linux 7 (Core)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:centos:centos:7"
HOME_URL="https://www.centos.org/"
BUG_REPORT_URL="https://bugs.centos.org/"

CENTOS_MANTISBT_PROJECT="CentOS-7"
CENTOS_MANTISBT_PROJECT_VERSION="7"
REDHAT_SUPPORT_PRODUCT="centos"
REDHAT_SUPPORT_PRODUCT_VERSION="7"


Please remove this message and/or limit size of session.log

Best Regards,
Nico van Vliet



--
___________________________________________________________

Nico van Vliet
Faculty of Engineering Technology
University of Twente
Postbus 217
7500 AE Enschede
Netherlands
email: n.vanvliet@utwente.nl
Tel: +31 53 489 2483
___________________________________________________________
_______________________________________________
x2go-dev mailing list
x2go-dev@lists.x2go.org
https://lists.x2go.org/listinfo/x2go-dev

==
This e-mail may contain SEAKR Engineering (SEAKR) Confidential and Proprietary Information. If this message is not intended for you, you are strictly prohibited from using this message, its contents or attachments in any way. If you have received this message in error, please delete the message from your mailbox. This e-mail may contain export-controlled material and should be handled accordingly.

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Sun Oct 24 22:04:18 2021; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.