With USB VM enabled, all USB devices are hidden from dom0 even during
the Linux kernel boot (but not before). If you need to use USB devices
during Qubes OS boot (keyboard, yubikey, anti-evil-maid, ...) and don't
mind rigorously checking nobody has plugged any suspicious USB devices
into your machine before powering it on (as you should be doing anyway),
you can follow the steps outlined below.
There's a Linux kernel command line argument you need to remove from
/etc/default/grub -- find the line starting with "GRUB_CMDLINE_LINUX"
and drop the "rd.qubes.hide_all_usb" argument. Save the changes and
rebuild grub configuration using `sudo grub2-mkconfig -o
/boot/grub2/grub.cfg` and then reboot.
Please note that if you have anti-evil-maid installed, you also need to
re-run `anti-evil-maid-install` script on your AEM device. Unsealing of
your secrets will, as expected, fail during next boot.
Once you reboot without this option, you can use any USB device normally.
Cheers,
Patrik