Boot issue after luks encryption removal

I finally found the solution after an entire day of troubleshooting, scouring the internet and countless forums.

Apparently somehow my @ subvolume got corrupted and that’s why there was no /etc folder when I chrooted into my system.
To solve this issue, I restored the @ root subvolume from an earlier btrfs snapshot following this guide: [HowTo] Manual rollback with btrfs

Now, on to the main issue of this post.
For anyone removing luks disk encryption using:
cryptsetup reencrypt --decrypt *device_path*
(Removing system encryption - ArchWiki)

You need to update the following to successfuly boot into your system after removing luks disk encryption:

  1. chroot into your system using a live USB.
  2. Delete /etc/crypttab file. Its no longer required.
  3. Edit /etc/fstab and replace the luks entries for /, /home etc with UUID=... (Find the correct UUID of your root partition using lsblk -f command)
  4. Edit /etc/mkinitcpio.conf and remove encrypt from HOOKS=(...), and also comment the FILE=... linking to the crypt lock file. Then regenerate initramfs using mkinitcpio -P command.
  5. Edit /etc/default/grub and remove the luks uuid entry from GRUB_CMDLINE_LINUX_DEFAULT="..."
  6. reinstall grub:
    1. grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=manjaro --recheck
    2. grub-mkconfig -o /boot/grub/grub.cfg
    The above two commands are for efi systems. You can follow this guide for specific details suiting your system. (GRUB/Restore the GRUB Bootloader - Manjaro)
  7. Exit chroot & reboot.

That’s all. Now you can boot into your old system without encryption!

2 Likes