Keyboard don't work once out of suspend mode

Qubes OS version:

Qubes release 4.1

Everything is up to date

Are you using any testing repositories? If so, please list them AND where they are enabled (i.e., dom0, template, or standalone).

No

Affected component(s):

Steps to reproduce the behavior:

→ Put the computer into suspend mode
→ Put the computer out of suspend mode

Expected behavior:

Be able to use the keyboard normally once out of suspend to log in

Actual behavior:

Can’t use my external keyboard to log in once out of suspend mode

Some logs :slight_smile:

Jul 10 15:50:34 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:50:34 dom0 systemd[1]: Started Qubes input proxy sender (keyboard).
Jul 10 15:50:34 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:50:34 dom0 kernel: audit: type=1130 audit(1625925034.245:876): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:50:34 dom0 qubes-input-sender[80448]: 2021-07-10 15:50:34.266 qrexec-client[80448]: qrexec-client.c:184:connect_unix_socket: connect: No such file or directory
Jul 10 15:50:34 dom0 systemd[1]: qubes-input-sender-keyboard@event5.service: Main process exited, code=exited, status=1/FAILURE
Jul 10 15:50:34 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:50:34 dom0 kernel: audit: type=1131 audit(1625925034.272:877): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:50:34 dom0 systemd[1]: qubes-input-sender-keyboard@event5.service: Failed with result 'exit-code'.
Jul 10 15:50:34 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:50:34 dom0 qrexec-policy-daemon[80411]: 2021-07-10 15:50:34.907 qrexec-client[80411]: qrexec-client.c:622:main: Failed to open data vchan connection
Jul 10 15:50:35 dom0 kernel: input: sys-net: Lenovo ThinkPad USB-C Dock Gen2 USB Audio as /devices/virtual/input/input48
Jul 10 15:50:35 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:50:36 dom0 kernel: audit: type=1130 audit(1625925036.081:878): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:50:36 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:50:36 dom0 systemd[1]: Started Qubes input proxy sender (keyboard).
Jul 10 15:50:36 dom0 qubes-input-sender[80486]: 2021-07-10 15:50:36.152 qrexec-client[80486]: qrexec-client.c:184:connect_unix_socket: connect: No such file or directory
Jul 10 15:50:36 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Main process exited, code=exited, status=1/FAILURE
Jul 10 15:50:36 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Failed with result 'exit-code'.
Jul 10 15:50:36 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:50:36 dom0 kernel: audit: type=1131 audit(1625925036.163:879): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:50:41 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:50:43 dom0 qrexec-policy-daemon[80488]: 2021-07-10 15:50:43.571 qrexec-client[80488]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:50:43 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:50:47 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:50:49 dom0 qrexec-policy-daemon[80516]: 2021-07-10 15:50:49.012 qrexec-client[80516]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:51:03 dom0 kernel: input: sys-net: KeyboardName as /devices/virtual/input/input50
Jul 10 15:51:03 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:04 dom0 kernel: input: sys-net: KeyboardName as /devices/virtual/input/input51
Jul 10 15:51:04 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputMouse+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:51:04 dom0 systemd[1]: Started Qubes input proxy sender (keyboard).
Jul 10 15:51:04 dom0 kernel: audit: type=1130 audit(1625925064.681:884): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:04 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:04 dom0 qubes-input-sender[80909]: 2021-07-10 15:51:04.746 qrexec-client[80909]: qrexec-client.c:184:connect_unix_socket: connect: No such file or directory
Jul 10 15:51:04 dom0 systemd[1]: qubes-input-sender-keyboard@event9.service: Main process exited, code=exited, status=1/FAILURE
Jul 10 15:51:04 dom0 systemd[1]: qubes-input-sender-keyboard@event9.service: Failed with result 'exit-code'.
Jul 10 15:51:04 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:04 dom0 kernel: audit: type=1131 audit(1625925064.773:885): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:05 dom0 kernel: input: sys-net: KeyboardName as /devices/virtual/input/input52
Jul 10 15:51:05 dom0 qrexec-policy-daemon[3167]: qrexec: whonix.NewStatus+whonix-ws-15-community: whonix-ws-15-community -> sys-whonix: allowed to sys-whonix
Jul 10 15:51:05 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:05 dom0 systemd[1]: Started Qubes input proxy sender (keyboard).
Jul 10 15:51:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event10 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:05 dom0 kernel: audit: type=1130 audit(1625925065.741:886): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event10 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:05 dom0 qubes-input-sender[80940]: 2021-07-10 15:51:05.762 qrexec-client[80940]: qrexec-client.c:184:connect_unix_socket: connect: No such file or directory
Jul 10 15:51:05 dom0 systemd[1]: qubes-input-sender-keyboard@event10.service: Main process exited, code=exited, status=1/FAILURE
Jul 10 15:51:05 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event10 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:05 dom0 systemd[1]: qubes-input-sender-keyboard@event10.service: Failed with result 'exit-code'.
Jul 10 15:51:05 dom0 kernel: audit: type=1131 audit(1625925065.784:887): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event10 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:06 dom0 systemd-logind[2624]: Failed to open /dev/input/event10: No such file or directory
Jul 10 15:51:06 dom0 qrexec-policy-daemon[80774]: 2021-07-10 15:51:06.513 qrexec-client[80774]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:51:06 dom0 systemd[1]: Started Qubes input proxy sender (mouse).
Jul 10 15:51:06 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event11 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:06 dom0 kernel: audit: type=1130 audit(1625925066.587:888): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event11 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:06 dom0 qubes-input-sender[80955]: 2021-07-10 15:51:06.636 qrexec-client[80955]: qrexec-client.c:184:connect_unix_socket: connect: No such file or directory
Jul 10 15:51:06 dom0 systemd[1]: qubes-input-sender-mouse@event11.service: Main process exited, code=exited, status=1/FAILURE
Jul 10 15:51:06 dom0 systemd[1]: qubes-input-sender-mouse@event11.service: Failed with result 'exit-code'.
Jul 10 15:51:06 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event11 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:06 dom0 kernel: audit: type=1131 audit(1625925066.649:889): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event11 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:07 dom0 systemd[1]: qubes-suspend.service: Stopping timed out. Terminating.
Jul 10 15:51:07 dom0 systemd[1]: qubes-suspend.service: Control process exited, code=killed, status=15/TERM
Jul 10 15:51:07 dom0 systemd[1]: qubes-suspend.service: Failed with result 'timeout'.
Jul 10 15:51:07 dom0 systemd[1]: Stopped Qubes suspend hooks.
Jul 10 15:51:07 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-suspend comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:07 dom0 kernel: audit: type=1131 audit(1625925067.392:890): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-suspend comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 10 15:51:07 dom0 qrexec-policy-daemon[80809]: 2021-07-10 15:51:07.649 qrexec-client[80809]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:51:11 dom0 xscreensaver[9733]: pam_unix(xscreensaver:auth): conversation failed
Jul 10 15:51:11 dom0 xscreensaver[9733]: pam_unix(xscreensaver:auth): auth could not identify password for [user]
Jul 10 15:51:20 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard+: sys-net -> @adminvm: allowed to dom0
Jul 10 15:51:23 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetRandomizedTime+: whonix-ws-15-community -> @adminvm: allowed to dom0
Jul 10 15:51:25 dom0 qrexec-policy-daemon[80969]: 2021-07-10 15:51:25.897 qrexec-client[80969]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:51:27 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:28 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetDate+: sys-whonix -> @default: allowed to dom0
Jul 10 15:51:30 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:30 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetDate: whonix-ws-1 -> @default: denied: denied by policy /etc/qubes-rpc/policy/qubes.GetDate:1
Jul 10 15:51:30 dom0 qrexec-policy-daemon[80994]: 2021-07-10 15:51:30.611 qrexec-client[80994]: qrexec-client.c:448:sigalrm_handler: vchan connection timeout
Jul 10 15:51:30 dom0 qrexec-policy-daemon[3167]: qrexec: whonix.NewStatus+whonix-ws-15-rss: whonix-ws-15-rss -> sys-whonix: allowed to sys-whonix
Jul 10 15:51:30 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:30 dom0 audit[81050]: USER_AUTH pid=81050 uid=1000 auid=1000 ses=2 msg='op=PAM:unix_chkpwd acct="user" exe="/usr/sbin/unix_chkpwd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:30 dom0 kernel: audit: type=1100 audit(1625925090.930:891): pid=81050 uid=1000 auid=1000 ses=2 msg='op=PAM:unix_chkpwd acct="user" exe="/usr/sbin/unix_chkpwd" hostname=? addr=? terminal=? res=success'
Jul 10 15:51:31 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetDate: whonix-ws-15-rss -> @default: denied: denied by policy /etc/qubes-rpc/policy/qubes.GetDate:1
Jul 10 15:51:31 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetDate: whonix-ws-15-community -> @default: denied: denied by policy /etc/qubes-rpc/policy/qubes.GetDate:1
Jul 10 15:51:31 dom0 qrexec-policy-daemon[3167]: qrexec: whonix.NewStatus+whonix-ws-2: whonix-ws-2 -> sys-whonix: allowed to sys-whonix
Jul 10 15:51:31 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:32 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.GetDate: whonix-ws-2 -> @default: denied: denied by policy /etc/qubes-rpc/policy/qubes.GetDate:1
Jul 10 15:51:32 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:32 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:32 dom0 qrexec-policy-daemon[3167]: qrexec: whonix.SdwdateStatus+: sys-whonix -> whonix-ws-1: allowed to whonix-ws-1
Jul 10 15:51:32 dom0 qubesd[3160]: vm.sys-net: sys-net vm's device path name contains unsafe characters. Skipping it.
Jul 10 15:51:32 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard: sys-net -> dom0: error while executing: qrexec-client failed: ['/usr/lib/qubes/qrexec-client', '-d', 'dom0', '-c', 'SOCKET14,sys-net,3', '-E', 'QUBESRPC qubes.InputKeyboard+ sys-net keyword adminvm']
Jul 10 15:51:32 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard: sys-net -> dom0: error while executing: qrexec-client failed: ['/usr/lib/qubes/qrexec-client', '-d', 'dom0', '-c', 'SOCKET16,sys-net,3', '-E', 'QUBESRPC qubes.InputKeyboard+ sys-net keyword adminvm']
Jul 10 15:51:32 dom0 qrexec-policy-daemon[3167]: qrexec: qubes.InputKeyboard: sys-net -> dom0: error while executing: qrexec-client failed: ['/usr/lib/qubes/qrexec-client', '-d', 'dom0', '-c', 'SOCKET17,sys-net,3', '-E', 'QUBESRPC qubes.InputKeyboard+ sys-net keyword adminvm']

Ah, this may be is the reason that if my system is going to suspend mode, it is not coming back at all. Total black screen (on a desktop).

1 Like