I am in the process of reverse engineering the protocol. I have executed
the Windows 8.1 driver in a VM and have written a short program which
puts the touchpad into the proprietary mode. The code can be found here:

https://github.com/mgottschlag/focaltech-tools

If anybody wants to join me, before a proper driver can be written, the
next step is to decipher the report packet stream - so if anybody wants
to run the program on their machine and try to find out some information
about the packet format, go ahead. I am going to collect my findings in
the github wiki at the link above.

Example output (from a single finger moving to the left):

reset, device id = 00
status: 69 80 80
status: 36 53 03
status: 00 13 0d
status: 0b 03 00
status: 23 bd f8
(the interesting part starts here)
packet: 03 01 00 00 00 00
packet: 06 17 ce 03 b8 10
packet: 06 17 ce 03 b8 10
packet: 06 17 ce 03 b8 10
packet: 06 17 cc 03 b8 20
[...]
packet: 06 15 a4 03 d4 20
packet: 06 15 9a 03 d4 20
packet: 06 15 8d 03 d4 10
packet: 06 15 76 03 d2 10
packet: 03 00 00 00 00 00

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1372609

Title:
  Touchpad detected as mouse on Asus ux303ln laptop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1372609/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to