1

I am running Ubuntu 24.04. In the past, the suspend option gave me some trouble (computer would freeze when waking up), so I disabled the suspend option (but I can't remember how I did it). Basically the power drop-down menu now only says restart, power off, or log out (no suspend).

I changed my mind and I would like to return the suspend option, but it seems like I can't. What I tried:

  1. sudo systemctl suspend - returns Call to Suspend failed: Access denied
  2. I edited etc/systemd/logind.con and removed the # from HandleSuspendKey=suspend, but it changed nothing.
  3. I launched the dconf-editor but it doesn't say anything about a suspend button there.

What am I missing here?

Thanks


Additional info:

  1. cat /proc/cmdline returns:

BOOT_IMAGE=/boot/vmlinuz-6.8.0-51-generic root=UUID=5f3fbfcd-1c25-492f-895e-07db86e20261 ro quiet splash vt.handoff=7

  1. dmesg | grep -i suspend:

dmesg: read kernel buffer failed: Operation not permitted

  1. ls /etc/sysctl.d/:

10-bufferbloat.conf 10-magic-sysrq.conf 10-zeropage.conf 10-console-messages.conf 10-map-count.conf 99-sysctl.conf 10-ipv6-privacy.conf 10-network-security.conf README.sysctl 10-kernel-hardening.conf 10-ptrace.conf

  1. cat /etc/sysctl.d/99-sysctl.conf

# /etc/sysctl.conf - Configuration file for setting system variables
# See /etc/sysctl.d/ for additional system variables.
# See sysctl.conf (5) for information.
#

#kernel.domainname = example.com

Uncomment the following to stop low-level messages on console

#kernel.printk = 3 4 1 3

###################################################################

Functions previously found in netbase

Uncomment the next two lines to enable Spoof protection (reverse-path filter)

Turn on Source Address Verification in all interfaces to

prevent some spoofing attacks

#net.ipv4.conf.default.rp_filter=1 #net.ipv4.conf.all.rp_filter=1

Uncomment the next line to enable TCP/IP SYN cookies

See http://lwn.net/Articles/277146/

Note: This may impact IPv6 TCP sessions too

#net.ipv4.tcp_syncookies=1

Uncomment the next line to enable packet forwarding for IPv4

#net.ipv4.ip_forward=1

Uncomment the next line to enable packet forwarding for IPv6

Enabling this option disables Stateless Address Autoconfiguration

based on Router Advertisements for this host

#net.ipv6.conf.all.forwarding=1

###################################################################

Additional settings - these settings can improve the network

security of the host and prevent against some network attacks

including spoofing attacks and man in the middle attacks through

redirection. Some network environments, however, require that these

settings are disabled so review and enable them as needed.

Do not accept ICMP redirects (prevent MITM attacks)

#net.ipv4.conf.all.accept_redirects = 0 #net.ipv4.conf.default.accept_redirects = 0

or

Accept ICMP redirects only for gateways listed in our default

gateway list (enabled by default)

net.ipv4.conf.all.secure_redirects = 1

Do not send ICMP redirects (we are not a router)

#net.ipv4.conf.all.send_redirects = 0

Log Martian Packets

#net.ipv4.conf.all.log_martians = 1

###################################################################

Magic system request Key

0=disable, 1=enable all, >1 bitmask of sysrq functions

See https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html

for what other values do

#kernel.sysrq=438

Cheshie
  • 1,065

0 Answers0