ERROR: device 'UUID=3e5e...' not found. Skipping fsck
mount: /new_root: can't find UUID=3ef5....
ERROR: Failed to mount UUID=3ef5...
You are no being dropped to emergency shell.
...
I use
cryptsetup -v luksOpen /dev/<dev> <mapper_name>
for opening the luks.
For completeness, I also share my crypttab and fstab:
# /etc/crypttab: mappings for encrypted partitions.
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/<name> paths for encrypted devices.
#
# See crypttab(5) for the supported syntax.
#
# NOTE: You need not list your root (/) partition here, but it must be set up
# beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies
# to encrypted swap, which should be set up with mkinitcpio-openswap
# for resume support.
#
# <name> <device> <password> <options>
#luks-794e3e8d-403e-4dcf-9547-3a021ef2f604 /dev/disk/by-uuid/794e3e8d-403e-4dcf-9547-3a021ef2f604 /crypto_keyfile.bin luks
#luks-7f38ff02-ee3b-42f0-8f2d-ebb9ba67de56 /dev/disk/by-uuid/7f38ff02-ee3b-42f0-8f2d-ebb9ba67de56 /crypto_keyfile.bin luks
#luks-919c4578-3819-48c3-b125-ed4e33881fe7 /dev/disk/by-uuid/919c4578-3819-48c3-b125-ed4e33881fe7 /crypto_keyfile.bin luks
luks-794e3e8d-403e-4dcf-9547-3a021ef2f604 UUID=794e3e8d-403e-4dcf-9547-3a021ef2f604 /crypto_keyfile.bin luks
luks-7f38ff02-ee3b-42f0-8f2d-ebb9ba67de56 UUID=7f38ff02-ee3b-42f0-8f2d-ebb9ba67de56 /crypto_keyfile.bin luks
luks-919c4578-3819-48c3-b125-ed4e33881fe7 UUID=919c4578-3819-48c3-b125-ed4e33881fe7 /crypto_keyfile.bin luks
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system> <mount point> <type> <options> <dump> <pass>
UUID=CD10-10B9 /boot/efi vfat umask=0077 0 2
/dev/mapper/luks-794e3e8d-403e-4dcf-9547-3a021ef2f604 / ext4 defaults,noatime 0 1
tmpfs /tmp tmpfs defaults,noatime,mode=1777 0 0
/swapfile none swap defaults 0 0
/etc/fstab (END)
yes
so: boot_crypt was what you chose for your <mapper_name>
you can choose whatever name you like - it is just a name, so pick one that is telling you something …
Using manjaro-chroot yields slighty different result, after re-installing and configuring grub. I stuck again at boot, this time, the message fits to my /etc/fstab:
ERROR: device 'UUID=luks-794e...' not found. Skipping fsck
mount: /new_root: can't find UUID=794e....
ERROR: Failed to mount UUID=794e...
You are no being dropped to emergency shell.
...
Perhaps you can try to bring me and perhaps others up to speed?
Without that: I’d still like to help - but can’t - and will refrain from further comments.
But you have a separate (encrypted) /boot partition - or do you not?
You’d have to open this as well, attach it to the / (root) - and then mount the EFI to it.
It is a strange setup that you have - not easily created by the Calamares installer.
Much more custom, implying that you knew what you where doing and why you where doing it when you set this up.
To explain, step by step, could we start with: lsblk -f
after a fresh boot from USB?
From what I saw so far: you have three (3) encrypted partitions.
You should know, which encrypted partition is which
(which is /
which is /boot
which is /whatever).
If you don’t - let’s go from there.
How did we even end up here?
… from a perfectly well and booting system with some “exists in file system” errors
to discussing the intricacies of chroot …?