1d6b/0002 and 1d6b/0003 are the (Linux Foundation) root USB hubs for USB2 and USB3.
They don't really physically exist.
If it says that it has loaded whatever.kl and whatever.kcm you need look no further.
You can see what should be hijacked if you look at res/raw/keypad.json in system/framework/framework-res.apk (if you haven't disabled this by modding system/framework/framework.jar).
Spoiler:
Code:
{
"keypad": [
{
"keySet": [
"KEYCODE_BACK"
],
"shortPressAction": "KEYCODE_BACK",
"longPressAction": "toggleFrontLight",
"repeat": false
},
{
"keySet": [
"KEYCODE_MENU"
],
"shortPressAction": "KEYCODE_MENU",
"longPressAction": "fullRefreshScreen",
"repeat": false
},
{
"keySet": [
"KEYCODE_DPAD_CENTER"
],
"shortPressAction": "KEYCODE_DPAD_CENTER",
"longPressAction": "toggleByConf",
"repeat": false
},
{
"keySet": [
"KEYCODE_PAGE_UP"
],
"shortPressAction": "KEYCODE_PAGE_UP",
"longPressAction": "KEYCODE_MENU",
"repeat": false
},
{
"keySet": [
"KEYCODE_PAGE_DOWN"
],
"shortPressAction": "KEYCODE_PAGE_DOWN",
"longPressAction": "fullRefreshScreen",
"repeat": false
},
{
"keySet": [
"KEYCODE_F11"
],
"shortPressAction": "toggleA2",
"longPressAction": "",
"repeat": false
},
{
"keySet": [
"KEYCODE_VOLUME_UP"
],
"shortPressAction": "switchByConf",
"longPressAction": "customSideKeyLongPressUp",
"repeat": false
},
{
"keySet": [
"KEYCODE_VOLUME_DOWN"
],
"shortPressAction": "switchByConf",
"longPressAction": "customSideKeyLongPressDown",
"repeat": false
}
]
}
If you tell me something has been "hijacked", please tell me what the result is. Can you see this in UsbMode.apk? Gaming buttons don't generally generate normal KeyEvents.