Skip to main content

Fix a USB Game Controller Disconnecting When Idle

I have a USB game controller that works flawlessly during gameplay, but it keeps disconnecting and reconnecting every ~40 seconds whenever it is left idle. While it is mostly harmless in practice, it is annoying to see the kernel messages are flooded with messages about the game controller.

Many online resources, such as the Arch Wiki, suggest disabling USB autosuspend to fix this. Unfortunately, that didn’t solve the issue in my case. I suspect the controller expects to be continuously polled rather than entering a power-saving state, especially since it immediately tries to reconnect after dropping.

Since I primarily use this controller by passing it through to a VM, I needed a way to manually manage its connection state. Here is the workaround that eventually did the trick:

  • Add the following rule to udev. This ensures the controller is ignored by the host system upon connection. ACTION=="add", SUBSYSTEM=="usb", ATTR{idVendor}=="xxxx", ATTR{idProduct}=="xxxx", PROGRAM="systemctl is-active --quiet my-gaming-vm.service", ATTR{authorized}="0"
    • Note the PROGRAM condition in the udev rule, it is needed because the VM might not grab the device fast enough (e.g. due to a slow boot), in which case the game controller will disconnect and reconnect. In this case we don’t want to write 0 to authorized.
  • Write 1 to <DEV_PATH>/authorized right before booting the VM. This authorizes the controller so it can be successfully forwarded.
  • Write 0 to <DEV_PATH>/authorized after the VM shuts down. This disconnects the driver once again.

How to Find DEV_PATH

In the steps above, <DEV_PATH> refers to the device path of the USB controller. Normally, this can be conveniently found by following the symbolic link in /dev/input/by-id. However, because we are forcefully disconnecting the device by writing to authorized, that standard method won’t work here.

One can find the <DEV_PATH> by traversing and matching /sys/bus/usb/devices/*/{idVendor,idProduct}, but a much cleaner approach is to create a custom symbolic link using udev.

Add the following rule (note that there is no ACTION condition): SUBSYSTEM=="usb", ATTR{idVendor}=="xxxx", ATTR{idProduct}=="xxxx", SYMLINK+="my-controller"

With this rule in place, I can easily obtain the correct device path as: /sys$(udevadm info --query=path --name=/dev/my-controller)

Alternative Solutions (Untested)

  • The xone driver handles device polling differently and may resolve the issue natively.
  • Run cat /dev/input/by-id/my-controller > /dev/null as a background process to keep the device active.
  • Use usbguard to manually allow/deny the device.

Comments

Popular posts from this blog

Exploring Immutable Distros and Declarative Management

My current server setup, based on Debian Stable and Docker, has served me reliably for years. It's stable, familiar, and gets the job done. However, an intriguing article I revisited recently about Fedora CoreOS, rpm-ostree, and OSTree native containers sparked my curiosity and sent me down a rabbit hole exploring alternative approaches to system management. Could there be a better way? Core Goals & Requirements Before diving into new technologies, I wanted to define what "better" means for my use case: The base operating system must update automatically and reliably. Hosted services (applications) should be updatable either automatically or manually, depending on the service. Configuration and data files need to be easy to modify, and crucially, automatically tracked and backed up. Current Setup: Debian Stable + Docker My current infrastructure consists of several servers, all running Debian Stable. System Updates are andled automatically via unattended-upgrades. Se...

Qubes OS: First Impressions

A few days ago, while browsing security topics online, Qubes OS surfaced—whether via YouTube recommendations or search results, I can't recall precisely. Intrigued by its unique approach to security through compartmentalization, I delved into the documentation and watched some demos. My interest was piqued enough that I felt compelled to install it and give it a try firsthand. My overall first impression of Qubes OS is highly positive. Had I discovered it earlier, I might have reconsidered starting my hardware password manager project. Conceptually, Qubes OS is not much different from running a bunch of virtual machines simultaneously. However, its brilliance lies in the seamless desktop integration and the well-designed template system, making it far more user-friendly than a manual VM setup. I was particularly impressed by the concept of disposable VMs for temporary tasks and the clear separation of critical functions like networking (sys-net) and USB handling (sys-usb) into the...

Determine Perspective Lines With Off-page Vanishing Point

In perspective drawing, a vanishing point represents a group of parallel lines, in other words, a direction. For any point on the paper, if we want a line towards the same direction (in the 3d space), we simply draw a line through it and the vanishing point. But sometimes the vanishing point is too far away, such that it is outside the paper/canvas. In this example, we have a point P and two perspective lines L1 and L2. The vanishing point VP is naturally the intersection of L1 and L2. The task is to draw a line through P and VP, without having VP on the paper. I am aware of a few traditional solutions: 1. Use extra pieces of paper such that we can extend L1 and L2 until we see VP. 2. Draw everything in a smaller scale, such that we can see both P and VP on the paper. Draw the line and scale everything back. 3. Draw a perspective grid using the Brewer Method. #1 and #2 might be quite practical. #3 may not guarantee a solution, unless we can measure distances/p...