Here is the tracedump for the sigkill event (changing frequency by remote control). Just in case someone can do something useful with it:

player(79): user memory violation at pc=0x02002d08, lr=0x02002d0c (bad address=0x00000029, code 2)
pc : [<02002d08>] lr : [<02002d0c>]
sp : bd3ffcb0 ip : bd3ffcc0 fp : bd3ffcbc
r10: bd3ffcf8 r9 : bd3ffd08 r8 : bffffe38
r7 : bd3ffd0c r6 : 021e0a08 r5 : 021f43a8 r4 : 021f43a8
r3 : 00000001 r2 : 00000000 r1 : 00000001 r0 : 0225a6b0
Flags: nzCv IRQs on FIQs on Mode USER_32 Segment user
Control: D8E7517D Table: D8E7517D DAC: 00000015
Function entered at [<02002cf4>] from [<02052eac>]
Function entered at [<02052e68>] from [<0206d248>]
r5 = BD3FFCF0 r4 = 021E0A08
Function entered at [<0206d22c>] from [<0206d548>]
r4 = BD3FFD08
Function entered at [<0206d380>] from [<0206d2a4>]
r10 = 020DEA00 r9 = 021E0A08 r8 = 00004C14 r7 = 00000080
r6 = 00000014 r5 = BD3FFD4C r4 = 021E0A08
Function entered at [<0206d294>] from [<020dead4>]
Function entered at [<020dea9c>] from [<020dea8c>]
r5 = 021D40FC r4 = 021E0A08
Function entered at [<020dea00>] from [<0211c970>]
r5 = 021E0A20 r4 = BD3FFE40
Function entered at [<0211c8a8>] from [<0215334c>]
r4 = 00000000
Function entered at [<02151ac0>] from [<0211c6ec>]
r8 = 021E9224 r7 = 021E9210 r6 = 020DEA00 r5 = 00000005
r4 = 00000000
Function entered at [<0211c63c>] from [<0215334c>]
r5 = 00000000 r4 = 00000000
Function entered at [<00000074>] from [<021d1a28>]
Function entered at [<e39ffff4>] from [<eb000a3f>]
Function entered at [<2a00fef4>] from [<2a00ff00>]
Unable to handle kernel paging request at virtual address 2a00fef8
memmap = D8E74000, pgd = c3e74000
*pgd = 00000000, *pmd = 00000000
Internal error: Oops: 2
CPU: 0
pc : [<c00e3d90>] lr : [<c00198f0>]
sp : c2887f44 ip : c2887f00 fp : c2887f90
r10: 00000002 r9 : c3ecd0e0 r8 : 0000000c
r7 : 00000000 r6 : 2a00fef4 r5 : 2a00ff00 r4 : ea000030
r3 : 60000013 r2 : c0104284 r1 : 00000001 r0 : ea000020
Flags: nZCv IRQs on FIQs on Mode SVC_32 Segment user
Control: D8E7517D Table: D8E7517D DAC: 00000015
Process player (pid: 79, stackpage=c2887000)
Stack:
c2887f20: c00198f0 c00e3d90 60000013
c2887f40: ffffffff c3ecd0f8 c3ecc560 c2886000 c2887fb8 00000029 c0011b88 02002d0c
c2887f60: 00000029 00000002 c2887fb8 0000000f 00000029 00000000 00000002 bd3ffd08
c2887f80: bd3ffcf8 c2887fb4 c2887f94 c00120e4 c0011928 c010297c 021f43a8 021e0a08
c2887fa0: bd3ffd0c bffffe38 00000000 c2887fb8 c000a0c8 c001200c 0225a6b0 00000001
c2887fc0: 00000000 00000001 021f43a8 021f43a8 021e0a08 bd3ffd0c bffffe38 bd3ffd08
c2887fe0: bd3ffcf8 bd3ffcbc bd3ffcc0 bd3ffcb0 02002d0c 02002d08 20000010 ffffffff
Backtrace:
Function entered at [<c001191c>] from [<c00120e4>]
r10 = BD3FFCF8 r9 = BD3FFD08 r8 = 00000002 r7 = 00000000
r6 = 00000029 r5 = 0000000F r4 = C2887FB8
Function entered at [<c0012000>] from [<c000a0c8>]
r8 = BFFFFE38 r7 = BD3FFD0C r6 = 021E0A08 r5 = 021F43A8
r4 = C010297C
Code: ebfcd653 e2440010 (e5961004) e1a035a1 e59f20cc