bit-team / backintime

Back In Time - An easy-to-use backup tool for GNU/Linux using rsync in the back
https://backintime.readthedocs.io
GNU General Public License v2.0
2.09k stars 204 forks source link

Error when setting up BIT: Mountpoint not empty #683

Closed benjsec closed 2 years ago

benjsec commented 7 years ago

Hi,

I'm having an issue setting up BackInTime to do an SSH backup, encrypted or not. Each time I enter the settings I get the message:

mountpoint /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint not empty.

It seems to be similar to #505, and I have followed the advice there (ensure there are no BIT processes running and deleting the mnt folder repeatedly). I've also ensured that the remote folder is empty. I can't see anything obvious in the log, so not sure how to do any more debugging myself.

I'm running Mint 18.0 with everything updated.

Thanks in advance for your help

Debug log:

Back In Time
Version: 1.1.12

Back In Time comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions; type `backintime --license' for details.

DEBUG: [common/backintime.py:576 getConfig] config file: /home/ben/.config/backintime/config
DEBUG: [common/backintime.py:577 getConfig] profiles: ['1']
DEBUG: [common/pluginmanager.py:88 PluginManager.load_plugins] Register plugin path /usr/share/backintime/plugins
DEBUG: [common/pluginmanager.py:104 PluginManager.load_plugins] Add plugin qt4plugin.py
DEBUG: [common/pluginmanager.py:104 PluginManager.load_plugins] Add plugin userscriptsplugin.py
DEBUG: [common/pluginmanager.py:104 PluginManager.load_plugins] Add plugin notifyplugin.py
DEBUG: [common/tools.py:611 keyring_supported] Found appropriate keyring 'keyring.backends.Gnome'
DEBUG: [common/tools.py:611 keyring_supported] Found appropriate keyring 'keyring.backends.Gnome'
DEBUG: [common/tools.py:611 keyring_supported] Found appropriate keyring 'keyring.backends.Gnome'
DEBUG: [common/sshtools.py:192 SSH.unlock_ssh_agent] Add private key /home/ben/.ssh/diskstation_rsa to ssh agent
DEBUG: [common/sshtools.py:197 SSH.unlock_ssh_agent] Password available: True
DEBUG: [common/sshtools.py:213 SSH.unlock_ssh_agent] Provide password through temp FIFO
DEBUG: [common/sshtools.py:374 SSH.check_ping_host] Check ping host
DEBUG: [common/sshtools.py:383 SSH.check_ping_host] Host 192.168.11.200 is available
DEBUG: [common/sshtools.py:248 SSH.check_fuse] Check fuse
DEBUG: [common/sshtools.py:258 SSH.check_fuse] Group fuse doesn't exist. Skip test
DEBUG: [common/sshtools.py:179 SSH.unlock_ssh_agent] Remove private key /home/ben/.ssh/diskstation_rsa from ssh agent
DEBUG: [common/sshtools.py:192 SSH.unlock_ssh_agent] Add private key /home/ben/.ssh/diskstation_rsa to ssh agent
DEBUG: [common/sshtools.py:197 SSH.unlock_ssh_agent] Password available: True
DEBUG: [common/sshtools.py:213 SSH.unlock_ssh_agent] Provide password through temp FIFO
DEBUG: [common/sshtools.py:323 SSH.check_known_hosts] Check known hosts file
DEBUG: [common/sshtools.py:330 SSH.check_known_hosts] Host [192.168.11.200]:44 was found in known hosts file
DEBUG: [common/sshtools.py:270 SSH.check_login] Check login
DEBUG: [common/sshtools.py:338 SSH.check_remote_folder] Check remote folder
DEBUG: [common/sshtools.py:351 SSH.check_remote_folder] Call command: ssh -p 44 -o ServerAliveInterval=240 -o IdentityFile=/home/ben/.ssh/diskstation_rsa admin@192.168.11.200 d=0;test -e Backups || d=1;test $d -eq 1 && mkdir Backups; err=$?;test $d -eq 1 && exit $err;test -d Backups || exit 11;test -w Backups || exit 12;test -x Backups || exit 13;exit 20
DEBUG: [common/sshtools.py:356 SSH.check_remote_folder] Command returncode: 20
DEBUG: [common/sshtools.py:398 SSH.check_remote_commands] Check remote commands
DEBUG: [common/sshtools.py:416 SSH.check_remote_commands] Check rsync command: rsync -rtDHh --links --no-p --no-g --no-o --info=progress2 --no-i-r --rsync-path=/bin/rsync --rsh="ssh -p 44  -o IdentityFile=/home/ben/.ssh/diskstation_rsa"  --dry-run --chmod=Du+wx /tmp/tmpbiysjyfc "admin@192.168.11.200:Backups"
              0 100%    0.00kB/s    0:00:00 (xfr#1, to-chk=0/1)
DEBUG: [common/sshtools.py:511 SSH.check_remote_commands] Call command: ssh -p 44 -o ServerAliveInterval=240 -o IdentityFile=/home/ben/.ssh/diskstation_rsa admin@192.168.11.200 tmp=Backups/tmp_72019E ; cleanup(){ test -e $tmp/a && rm $tmp/a >/dev/null 2>&1; test -e $tmp/b && rm $tmp/b >/dev/null 2>&1; test -e smr.lock && rm smr.lock >/dev/null 2>&1; test -e $tmp && rmdir $tmp >/dev/null 2>&1; exit $1; }; test -e $tmp || mkdir $tmp; touch $tmp/a; echo "cp -aRl SOURCE DEST"; cp -aRl $tmp/a $tmp/b >/dev/null; err_cp=$?; test $err_cp -ne 0 && cleanup $err_cp; ls -i $tmp/a; ls -i $tmp/b; echo "chmod u+rw FILE"; chmod u+rw $tmp/a >/dev/null; err_chmod=$?; test $err_chmod -ne 0 && cleanup $err_chmod; echo "find PATH -type f -exec chmod u-wx "{}" \;"; find $tmp -type f -exec chmod u-wx "{}" \; >/dev/null; err_find=$?; test $err_find -ne 0 && cleanup $err_find; find $tmp -type f -exec chmod u-wx "{}" + >/dev/null; err_gnu_find=$?; test $err_gnu_find -ne 0 && echo "gnu_find not supported"; echo "rm -rf PATH"; rm -rf $tmp >/dev/null; err_rm=$?; test $err_rm -ne 0 && cleanup $err_rm; echo "done"
DEBUG: [common/sshtools.py:524 SSH.check_remote_commands] Command stdout: cp -aRl SOURCE DEST
22523 Backups/tmp_72019E/a
22523 Backups/tmp_72019E/b
chmod u+rw FILE
find PATH -type f -exec chmod u-wx {} \;
rm -rf PATH
done

DEBUG: [common/sshtools.py:525 SSH.check_remote_commands] Command stderr: 
DEBUG: [common/sshtools.py:526 SSH.check_remote_commands] Command returncode: 0
DEBUG: [common/encfstools.py:182 EncFS_mount.check_fuse] Check fuse
DEBUG: [common/encfstools.py:192 EncFS_mount.check_fuse] Group fuse doesn't exist. Skip test
DEBUG: [common/encfstools.py:201 EncFS_mount.check_version] Check version
DEBUG: [common/encfstools.py:182 EncFS_SSH.check_fuse] Check fuse
DEBUG: [common/encfstools.py:192 EncFS_SSH.check_fuse] Group fuse doesn't exist. Skip test
DEBUG: [common/encfstools.py:201 EncFS_SSH.check_version] Check version
DEBUG: [common/sshtools.py:244 SSH.unlock_ssh_agent] Private key /home/ben/.ssh/diskstation_rsa is already unlocked in ssh agent
DEBUG: [common/encfstools.py:265 EncFS_SSH.mount] Mount sshfs
DEBUG: [common/mount.py:300 SSH.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/sshtools.py:124 SSH._mount] Call mount command: sshfs -p 44 -o ServerAliveInterval=240 -o IdentityFile=/home/ben/.ssh/diskstation_rsa -o idmap=user admin@192.168.11.200:Backups /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint
INFO: [common/mount.py:213 SSH.mount] mount ssh_encfs: admin@192.168.11.200:Backups on /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint
DEBUG: [common/mount.py:321 SSH.set_mount_lock] Set mount lock /home/ben/.local/share/backintime/mnt/B54A1F96/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 SSH.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:275 EncFS_SSH.mount] Mount temp folder with encfs --reverse to create a new encfs config
DEBUG: [common/mount.py:300 EncFS_mount.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:81 EncFS_mount._mount] Provide password through temp FIFO
DEBUG: [common/encfstools.py:165 EncFS_mount.is_configured] No encfs config in /tmp/tmp28nftbif/.encfs6.xml
DEBUG: [common/tools.py:611 keyring_supported] Found appropriate keyring 'keyring.backends.Gnome'
DEBUG: [common/tools.py:611 keyring_supported] Found appropriate keyring 'keyring.backends.Gnome'
DEBUG: [common/encfstools.py:95 EncFS_mount._mount] Call mount command: encfs --extpass=backintime-askpass --reverse --standard /tmp/tmp28nftbif /home/ben/.local/share/backintime/mnt/8EE1E751/mountpoint
DEBUG: [common/encfstools.py:236 EncFS_mount.backup_config] Create backup of encfs config /tmp/tmp28nftbif/.encfs6.xml to /home/ben/.local/share/backintime/encfsconfig_backup_/.encfs6.xml.201612201218
INFO: [common/mount.py:213 EncFS_mount.mount] mount ssh_encfs: /tmp/tmp28nftbif on /home/ben/.local/share/backintime/mnt/8EE1E751/mountpoint
DEBUG: [common/mount.py:321 EncFS_mount.set_mount_lock] Set mount lock /home/ben/.local/share/backintime/mnt/8EE1E751/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_mount.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/mount.py:300 EncFS_mount.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
INFO: [common/mount.py:244 EncFS_mount.umount] unmount ssh_encfs: /tmp/tmp28nftbif from /home/ben/.local/share/backintime/mnt/8EE1E751/mountpoint
DEBUG: [common/mount.py:339 EncFS_mount.del_mount_lock] Remove mount lock /home/ben/.local/share/backintime/mnt/8EE1E751/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_mount.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:285 EncFS_SSH.mount] Copy new encfs config /tmp/tmp28nftbif/.encfs6.xml to its original place /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint
DEBUG: [common/encfstools.py:289 EncFS_SSH.mount] Mount local filesystem root with encfs --reverse
DEBUG: [common/mount.py:300 EncFS_mount.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:81 EncFS_mount._mount] Provide password through temp FIFO
DEBUG: [common/encfstools.py:161 EncFS_mount.is_configured] Found encfs config in /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint/.encfs6.xml
DEBUG: [common/encfstools.py:95 EncFS_mount._mount] Call mount command: encfs --extpass=backintime-askpass --reverse / /home/ben/.local/share/backintime/mnt/1F6C1DA7/mountpoint
DEBUG: [common/encfstools.py:236 EncFS_mount.backup_config] Create backup of encfs config /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint/.encfs6.xml to /home/ben/.local/share/backintime/encfsconfig_backup_/.encfs6.xml.201612201218
INFO: [common/mount.py:213 EncFS_mount.mount] mount ssh_encfs: / on /home/ben/.local/share/backintime/mnt/1F6C1DA7/mountpoint
DEBUG: [common/mount.py:321 EncFS_mount.set_mount_lock] Set mount lock /home/ben/.local/share/backintime/mnt/1F6C1DA7/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_mount.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:292 EncFS_SSH.mount] Mount encfs
DEBUG: [common/mount.py:300 EncFS_SSH.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:81 EncFS_SSH._mount] Provide password through temp FIFO
DEBUG: [common/encfstools.py:161 EncFS_SSH.is_configured] Found encfs config in /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint/.encfs6.xml
DEBUG: [common/encfstools.py:95 EncFS_SSH._mount] Call mount command: encfs --extpass=backintime-askpass /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint /home/ben/.local/share/backintime/mnt/B94E8EDC/mountpoint
DEBUG: [common/encfstools.py:236 EncFS_SSH.backup_config] Create backup of encfs config /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint/.encfs6.xml to /home/ben/.local/share/backintime/encfsconfig_backup_/.encfs6.xml.201612201218
INFO: [common/mount.py:213 EncFS_SSH.mount] mount ssh_encfs: /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint on /home/ben/.local/share/backintime/mnt/B94E8EDC/mountpoint
DEBUG: [common/mount.py:321 EncFS_SSH.set_mount_lock] Set mount lock /home/ben/.local/share/backintime/mnt/B94E8EDC/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_SSH.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/config.py:375 Config.set_snapshots_path] Check snapshot folder: /home/ben/.local/share/backintime/mnt/tmp_1_18764
DEBUG: [common/config.py:385 Config.set_snapshots_path] Create folder: /home/ben/.local/share/backintime/mnt/tmp_1_18764/backintime/ben-desktop/ben/Documents
DEBUG: [common/sshtools.py:244 SSH.unlock_ssh_agent] Private key /home/ben/.ssh/diskstation_rsa is already unlocked in ssh agent
DEBUG: [common/encfstools.py:303 EncFS_SSH.umount] Unmount encfs
DEBUG: [common/mount.py:300 EncFS_SSH.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
INFO: [common/mount.py:244 EncFS_SSH.umount] unmount ssh_encfs: /home/ben/.local/share/backintime/mnt/B54A1F96/mountpoint from /home/ben/.local/share/backintime/mnt/B94E8EDC/mountpoint
DEBUG: [common/mount.py:339 EncFS_SSH.del_mount_lock] Remove mount lock /home/ben/.local/share/backintime/mnt/B94E8EDC/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_SSH.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:305 EncFS_SSH.umount] Unmount local filesystem root mount encfs --reverse
DEBUG: [common/mount.py:300 EncFS_mount.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
INFO: [common/mount.py:244 EncFS_mount.umount] unmount ssh_encfs: / from /home/ben/.local/share/backintime/mnt/1F6C1DA7/mountpoint
DEBUG: [common/mount.py:339 EncFS_mount.del_mount_lock] Remove mount lock /home/ben/.local/share/backintime/mnt/1F6C1DA7/locks/18764.tmp.lock
DEBUG: [common/mount.py:309 EncFS_mount.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/encfstools.py:307 EncFS_SSH.umount] Unmount sshfs
DEBUG: [common/mount.py:300 SSH.mountprocess_lock_acquire] Acquire mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
DEBUG: [common/mount.py:309 SSH.mountprocess_lock_release] Release mountprocess lock /home/ben/.local/share/backintime/mnt/18764.lock
Germar commented 7 years ago

Sorry, I totally missed your question. Can you please update to current dev version from PPA and try again?

sudo add-apt-repository ppa:bit-team/testing
sudo apt-get update
sudo apt-get install backintime-qt
buhtz commented 2 years ago

@benjsec There is a new forming maintaining team and we do review all issues. Is this problem still relevant for you or did you find a solution?

emtiu commented 2 years ago

Closing as outdated, reporter not responding.