Possible solution:
After some quick Google searching I came across a couple links detailing how Android handles its I/O activity and as suspected as much of Android is based on the Linux kernel touch events and button inputs are handled similarly.
Possible solution 1: Fixing low-level touch input events
Clue from this link: All touch events are pre-coded and lie in the "/dev/input" system folder. Any given input on your phone (buttons, capacitive buttons, and the touchscreen) have a different variable stored in a file called "event" in this folder. For instance a Galaxy Prevail I am looking at has 5 of these files: "event0, event1, event2, event3, event4, and event5"
*I do not know if these files are simply a container or an actual script because they cannot be opened in any text editor or file manager I have*
According to the link, ADB can be used to dump the "action" of all possible touch events in hexa form.
Example: The output of these files looks similar to this
This hexa code is broken down in the link and explained...each of the number sequences means "finger is up" "finger is down" and any associated coordinates can be shown here, too.
How this problem might be fixed: Using Android Commander or a file manager, copy these touch event from a phone with a similar screen size (3.5) and use root to paste them into the folder to see if it fixes the problem.
After some quick Google searching I came across a couple links detailing how Android handles its I/O activity and as suspected as much of Android is based on the Linux kernel touch events and button inputs are handled similarly.
Possible solution 1: Fixing low-level touch input events
Clue from this link: All touch events are pre-coded and lie in the "/dev/input" system folder. Any given input on your phone (buttons, capacitive buttons, and the touchscreen) have a different variable stored in a file called "event" in this folder. For instance a Galaxy Prevail I am looking at has 5 of these files: "event0, event1, event2, event3, event4, and event5"
*I do not know if these files are simply a container or an actual script because they cannot be opened in any text editor or file manager I have*
According to the link, ADB can be used to dump the "action" of all possible touch events in hexa form.
Example: The output of these files looks similar to this
/dev/input/event2: 0003 0030 00000068
/dev/input/event2: 0003 0032 0000000a
/dev/input/event2: 0003 0035 0000022e
/dev/input/event2: 0003 0036 00000039
/dev/input/event2: 0000 0002 00000000
/dev/input/event2: 0003 0012 0000002f
/dev/input/event2: 0003 0014 00000001
/dev/input/event2: 0000 0000 00000000
/dev/input/event2: 0003 0030 00000000
/dev/input/event2: 0003 0032 0000000a
/dev/input/event2: 0003 0035 0000022e
/dev/input/event2: 0003 0036 00000039
/dev/input/event2: 0000 0002 00000000
/dev/input/event2: 0003 0012 00000020
/dev/input/event2: 0003 0014 00000000
/dev/input/event2: 0000 0000 00000000
This hexa code is broken down in the link and explained...each of the number sequences means "finger is up" "finger is down" and any associated coordinates can be shown here, too.
How this problem might be fixed: Using Android Commander or a file manager, copy these touch event from a phone with a similar screen size (3.5) and use root to paste them into the folder to see if it fixes the problem.