I was also hit by this issue on a `HP ProBook 635 Aero G7 (2E9E4EA)` with a `AMD Ryzen 7 4700U with Radeon Graphics`.
I found (by experiments) a different solution:
Calling (as root) `/lib/systemd/systemd-sleep suspend` makes the wake up from suspend to work every time (not only the first time), but this does not handle screen locking. Then I did the following (with a passwordless sudo rule for `/lib/systemd/systemd-sleep suspend`):
and this works reliably. Unfortunately, there is a short moment where the plain screen content is visible
after wake up, but the screen is locked almost immediately.
So this is hacky, but **far more** better than before, as I can now use suspend and hibernate :-)
* If the laptop is stolen suspended, the attacker has less than half a second to see what is on the screen, then it is locked
* If the laptop is stolen hibernated, the attacker needs the disk encryption password before the machine really boots.
I was also hit by this issue on a `HP ProBook 635 Aero G7 (2E9E4EA)` with a `AMD Ryzen 7 4700U with Radeon Graphics`.
I found (by experiments) a different solution:
Calling (as root) `/lib/systemd/ systemd- sleep suspend` makes the wake up from suspend to work every time (not only the first time), but this does not handle screen locking. Then I did the following (with a passwordless sudo rule for `/lib/systemd/ systemd- sleep suspend`):
/usr/bin/ xdg-screensaver lock; sudo /lib/systemd/ systemd- sleep suspend
In this configuration, I had back the old buggy behaviour (2nd suspend does not wake up).
I switched now to
sudo /lib/systemd/ systemd- sleep suspend; /usr/bin/ xdg-screensaver lock
and this works reliably. Unfortunately, there is a short moment where the plain screen content is visible
after wake up, but the screen is locked almost immediately.
So this is hacky, but **far more** better than before, as I can now use suspend and hibernate :-)
* If the laptop is stolen suspended, the attacker has less than half a second to see what is on the screen, then it is locked
* If the laptop is stolen hibernated, the attacker needs the disk encryption password before the machine really boots.
Maybe this weird setup helps in debugging.