I finally found the solution after an entire day of troubleshooting, scouring the internet and countless forums.
Apparently somehow my @ subvolume got corrupted and that’s why there was no /etc folder when I chrooted into my system.
To solve this issue, I restored the @ root subvolume from an earlier btrfs snapshot following this guide: [HowTo] Manual rollback with btrfs
Now, on to the main issue of this post.
For anyone removing luks disk encryption using:
cryptsetup reencrypt --decrypt *device_path*
(Removing system encryption - ArchWiki)
You need to update the following to successfuly boot into your system after removing luks disk encryption:
- chroot into your system using a live USB.
- Delete
/etc/crypttab
file. Its no longer required.- Edit
/etc/fstab
and replace the luks entries for/
,/home
etc withUUID=...
(Find the correct UUID of your root partition usinglsblk -f
command)- Edit
/etc/mkinitcpio.conf
and removeencrypt
fromHOOKS=(...)
, and also comment theFILE=...
linking to the crypt lock file. Then regenerate initramfs usingmkinitcpio -P
command.- Edit
/etc/default/grub
and remove the luks uuid entry fromGRUB_CMDLINE_LINUX_DEFAULT="..."
- reinstall grub:
1.grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=manjaro --recheck
2.grub-mkconfig -o /boot/grub/grub.cfg
The above two commands are for efi systems. You can follow this guide for specific details suiting your system. (GRUB/Restore the GRUB Bootloader - Manjaro)- Exit chroot & reboot.
That’s all. Now you can boot into your old system without encryption!