Garrett Wilke (System76) Jan 23, 2024, 1:10 PM MST Hello Richard! You can boot into recovery mode and perform a fsck on the root partition. You will need to decrypt the drive first. First, boot into recovery mode. Power on your system and press SPACE when you see the System76 Logo appear on screen. This will bring up a boot menu. Select "Pop!_OS Recovery" from the menu. Once booted into recovery mode, you need to manually decrypt your drive. Open a terminal from the application launcher and input the following commands to decrypt your disk: sudo cryptsetup luksOpen /dev/nvme0n1p3 cryptdata sudo lvscan sudo vgchange -ay You can now do an fsck on the encrypted disk: sudo fsck -y /dev/mapper/data-root After running the command above, reboot your computer. Your system should perform a fsck on this partition on each boot up. You can verify this by looking at your /etc/fstab file. At
the bottom of your /etc/fstab file, it should show that your encrypted partition gets mounted at /. The very last character on
that line should be a 1 (the 1 defines if it runs the fsck on the partition). You can double check this by booting into your username
(not in recovery mode) and then opening a terminal and running the following command:
cat /etc/fstab You will be looking for the last entry in the file. On my system, it looks like this: UUID=f03a6452-e39f-4029-a105-e22b8c55fce1 / ext4 noatime,errors=remount-ro 0 1 You can see that the last character in that line is a 1 which tells the system to run a fsck check on the system each boot. Thanks, Garrett