zpool import Backup (-f) zfs load-key Backup zfs get mountpoint Backup/valhalla if /mnt/Backup/valhalla zfs mount Backup/valhalla toss a back cat over the shoulders and hope it can mount without issues.
dmesg | tail -n 50
dmesg did not spit anything out. I did some digging into /var/log/middlewared and got this:Perhaps you can check the recent messages immediately after (failing) to mount the dataset?
Immediately after a failed mount attempt:
Code:dmesg | tail -n 50
[2023/11/30 19:18:21] (ERROR) ZFSDatasetService.mount():64 - Failed to mount dataset Traceback (most recent call last): File "/usr/lib/python3/dist-packages/middlewared/plugins/zfs_/dataset_actions.py", line 57, in mount with libzfs.ZFS() as zfs: File "libzfs.pyx", line 529, in libzfs.ZFS.__exit__ File "/usr/lib/python3/dist-packages/middlewared/plugins/zfs_/dataset_actions.py", line 60, in mount dataset.mount_recursive() File "libzfs.pyx", line 4095, in libzfs.ZFSDataset.mount_recursive File "libzfs.pyx", line 4116, in libzfs.ZFSDataset._mount_recursive File "libzfs.pyx", line 4113, in libzfs.ZFSDataset._mount_recursive File "libzfs.pyx", line 4110, in libzfs.ZFSDataset._mount_recursive File "libzfs.pyx", line 4089, in libzfs.ZFSDataset.mount libzfs.ZFSException: cannot mount 'Backup/valhalla': Permission denied
13.384829] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.386841] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.387638] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.388890] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.389546] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.392942] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.394081] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.395915] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.397090] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.399487] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.400425] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.401765] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.403119] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.406114] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.406900] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.407583] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.408182] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.409195] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.409994] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.410875] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.411821] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.413660] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.415934] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.416846] pci 0000:00:1f.1: [8086:19dd] type 00 class 0x058000 [ 13.417786] pci 0000:00:1f.1: reg 0x10: [mem 0xfd000000-0xfdffffff 64bit] [ 13.419584] pci 0000:00:1f.1: Adding to iommu group 21 [ 13.420353] pci 0000:00:1f.1: Removing from iommu group 21 [ 13.421149] EDAC MC0: Giving out device to module pnd2_edac controller Pondicherry2: DEV pnd2/dnv (INTERRUPT) [ 13.431781] intel_rapl_common: Found RAPL domain package [ 13.432374] intel_rapl_common: Found RAPL domain core [ 13.432987] intel_rapl_common: Found RAPL domain dram [ 13.501253] ipmi_si IPI0001:01: IPMI kcs interface initialized [ 13.508657] ipmi_ssif: IPMI SSIF Interface driver [ 39.882900] ioatdma: Intel(R) QuickData Technology Driver 5.00 [ 39.904779] NTB Resource Split driver, version 1 [ 39.924747] Software Queue-Pair Transport over NTB, version 4 [ 39.986319] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. [ 40.885163] Adding 16777212k swap on /dev/mapper/sde4. Priority:-2 extents:1 across:16777212k SSFS [ 41.144908] ixgbe 0000:02:00.0: registered PHC device on enp2s0 [ 41.324789] ixgbe 0000:02:00.0 enp2s0: detected SFP+: 3 [ 41.419881] pps pps0: new PPS source ptp1 [ 41.437473] ixgbe 0000:08:00.0: registered PHC device on eno3 [ 41.464808] ixgbe 0000:02:00.0 enp2s0: NIC Link is Up 10 Gbps, Flow Control: RX/TX [ 41.637548] IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0: link becomes ready [ 44.668976] RPC: Registered named UNIX socket transport module. [ 44.669810] RPC: Registered udp transport module. [ 44.670638] RPC: Registered tcp transport module. [ 44.671439] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 45.339205] ixgbe 0000:08:00.0 eno3: NIC Link is Up 1 Gbps, Flow Control: None [ 45.339684] IPv6: ADDRCONF(NETDEV_CHANGE): eno3: link becomes ready
No, the weird part is it shows up in the pool, but I had a check that seems to be (at least for SCALE) normal. It shows being mounted in Backup/.system instead of "LEGACY". So no the .system dataset was not being moved or tinkled with, and I would admit that if I did at this point. The system dataset has not been changed or touched. For some reason it gets inherited into the pool, because after removing the .system directory, the pool needs to be manually unlocked after each reboot I have done so far. So I am sure if the mount point being pointed to Backup/.system was not a "cosmetic" glitch for not showing "LEGACY" and that it does need to reside there.I'm not a fraction as experienced as @winnielinnie but what I may try in your place:
Since for whatever reason the dataset got moved to an encrypted pool (see the symbol in #6), which it should not, I would again see the culprit here. Also moving to boot pool does not seem to work.
0) Backup your current configuration
1) Restore an older configuration from backup *
2) Use any spare HDD / SSD you have lying around, create a pool with it
3) move the systemdataset there
4) reboot
* I do not use keys, probably you should be sure that you exported your config with password seeds ('m not sure about this option)
I am not sure, but if I followed this thread correctly you destroyed .system when it is not clear to me whether the dataset actually resided on boot pool during that time. Because #6 showed it does reside on the backup pool and I interpret #26 as wrongly showing it resides on boot pool. Or did you actually move the set before #26?
But the key (Master Key) is "available", which means the dataset is unlocked and decrypted. So when you replicated to the Backup pool, valhalla inherited the User Key of Backup. (Backup was obviously unlocked at the time of receiving the first stream.)For reasons unknown, the Backup/valhalla dataset (which was encrypted with key X on System X) got snapshot to the Backup system which has key Y. For reasons unknown, Backup pool encrypted valhalla dataset with key Y. Now when you try to mount, key Y is unlocked but there seems to be something that still related to key X.
of course after reboot, the dataset valhalla is still inherited by Backup pool.interesting fact is that it reboots your system without a warning when you change the key.
EDIT: Done over the gui