I finally found the solution after an entire day of troubleshooting, scouring the internet and countless forums.
Apparently somehow my @ subvolume got corrupted and that’s why there was no /etc folder when I chrooted into my system.
To solve this issue, I restored the @ root subvolume from an earlier btrfs snapshot following this guide: [HowTo] Manual rollback with btrfs
Now, on to the main issue of this post.
For anyone removing luks disk encryption using:
cryptsetup reencrypt --decrypt *device_path*
(Removing system encryption - ArchWiki)
You need to update the following to successfuly boot into your system after removing luks disk encryption:
- chroot into your system using a live USB.
- Delete
/etc/crypttabfile. Its no longer required.- Edit
/etc/fstaband replace the luks entries for/,/homeetc withUUID=...(Find the correct UUID of your root partition usinglsblk -fcommand)- Edit
/etc/mkinitcpio.confand removeencryptfromHOOKS=(...), and also comment theFILE=...linking to the crypt lock file. Then regenerate initramfs usingmkinitcpio -Pcommand.- Edit
/etc/default/gruband remove the luks uuid entry fromGRUB_CMDLINE_LINUX_DEFAULT="..."- reinstall grub:
1.grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=manjaro --recheck
2.grub-mkconfig -o /boot/grub/grub.cfg
The above two commands are for efi systems. You can follow this guide for specific details suiting your system. (GRUB/Restore the GRUB Bootloader - Manjaro)- Exit chroot & reboot.
That’s all. Now you can boot into your old system without encryption!