I am in the process of reverse engineering the protocol. I have executed the Windows 8.1 driver in a VM and have written a short program which puts the touchpad into the proprietary mode. The code can be found here:
https://github.com/mgottschlag/focaltech-tools If anybody wants to join me, before a proper driver can be written, the next step is to decipher the report packet stream - so if anybody wants to run the program on their machine and try to find out some information about the packet format, go ahead. I am going to collect my findings in the github wiki at the link above. Example output (from a single finger moving to the left): reset, device id = 00 status: 69 80 80 status: 36 53 03 status: 00 13 0d status: 0b 03 00 status: 23 bd f8 (the interesting part starts here) packet: 03 01 00 00 00 00 packet: 06 17 ce 03 b8 10 packet: 06 17 ce 03 b8 10 packet: 06 17 ce 03 b8 10 packet: 06 17 cc 03 b8 20 [...] packet: 06 15 a4 03 d4 20 packet: 06 15 9a 03 d4 20 packet: 06 15 8d 03 d4 10 packet: 06 15 76 03 d2 10 packet: 03 00 00 00 00 00 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372609 Title: Touchpad detected as mouse on Asus ux303ln laptop To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1372609/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs