Which system do you use? Android, Ubuntu, OOWOW or others?
Android
Which version of system do you use? Please provide the version of the system here:
9.0 (built locally from sources the 2025/10/16)
Please describe your issue below:
Basically, we are using Khadas VIM3L as Set Top Boxes for the IPTV solutions we provide. We noticed that sometimes (rarely) after a device reboot, we face continuous ANR of the system process (every 2 or 3 minutes) for a duration between 30 minutes to several hours then, it suddendly ends like it begins. Moreover, this behavior continues even if the device is rebooted, powered off, etc.
Since such incident are usually hard to track, do you want me to provide full logcat ? ANR report ? Anything else ?
Post a console log of your issue below:
02-09 09:05:19.583 3348 3363 W ActivityManager: Timeout executing service: ServiceRecord{e71df53 u0 android/com.android.internal.backup.LocalTransportService}
02-09 09:05:20.009 3348 3363 I chatty : uid=1000 system_server expire 42 lines
02-09 09:05:20.010 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3348 and type kDebuggerdJavaBacktrace
02-09 09:05:20.010 3348 3353 I chatty : uid=1000 system_server expire 6 lines
02-09 09:05:20.213 3214 3214 I /system/bin/tombstoned: received crash request for pid 3348
02-09 09:05:20.213 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3348 and type kDebuggerdJavaBacktrace
02-09 09:05:20.217 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3925 and type kDebuggerdJavaBacktrace
02-09 09:05:20.217 3925 3939 I SubTitleServic: Thread[3,tid=3939,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13440020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.217 3925 3939 I SubTitleServic:
02-09 09:05:20.262 3214 3214 I /system/bin/tombstoned: received crash request for pid 3925
02-09 09:05:20.262 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3925 and type kDebuggerdJavaBacktrace
02-09 09:05:20.262 3925 3939 I SubTitleServic: Wrote stack traces to '[tombstoned]'
02-09 09:05:20.264 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3916 and type kDebuggerdJavaBacktrace
02-09 09:05:20.264 3916 3924 I com.android.se: Thread[3,tid=3924,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13380020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.264 3916 3924 I com.android.se:
02-09 09:05:20.311 3214 3214 I /system/bin/tombstoned: received crash request for pid 3916
02-09 09:05:20.311 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3916 and type kDebuggerdJavaBacktrace
02-09 09:05:20.312 3916 3924 I com.android.se: Wrote stack traces to '[tombstoned]'
02-09 09:05:20.313 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3903 and type kDebuggerdJavaBacktrace
02-09 09:05:20.313 3903 3909 I utmethod.remot: Thread[3,tid=3909,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x132c0020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.313 3903 3909 I utmethod.remot:
02-09 09:05:20.359 3214 3214 I /system/bin/tombstoned: received crash request for pid 3903
02-09 09:05:20.359 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3903 and type kDebuggerdJavaBacktrace
02-09 09:05:20.359 3903 3909 I utmethod.remot: Wrote stack traces to '[tombstoned]'
02-09 09:05:20.360 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3612 and type kDebuggerdJavaBacktrace
02-09 09:05:20.361 3612 3632 I m.android.phon: Thread[3,tid=3632,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13080020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.361 3612 3632 I m.android.phon:
02-09 09:05:20.427 3214 3214 I /system/bin/tombstoned: received crash request for pid 3612
02-09 09:05:20.427 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3612 and type kDebuggerdJavaBacktrace
02-09 09:05:20.427 3612 3632 I m.android.phon: Wrote stack traces to '[tombstoned]'
02-09 09:05:20.428 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3593 and type kDebuggerdJavaBacktrace
02-09 09:05:20.428 3593 3611 I com.droidlogic: Thread[3,tid=3611,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13040020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.428 3593 3611 I com.droidlogic:
02-09 09:05:20.489 3214 3214 I /system/bin/tombstoned: received crash request for pid 3593
02-09 09:05:20.489 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3593 and type kDebuggerdJavaBacktrace
02-09 09:05:20.489 3593 3611 I com.droidlogic: Wrote stack traces to '[tombstoned]'
02-09 09:05:20.490 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3488 and type kDebuggerdJavaBacktrace
02-09 09:05:20.490 3488 3504 I ndroid.systemu: Thread[3,tid=3504,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13900088,"Signal Catcher"]: reacting to signal 3
02-09 09:05:20.491 3488 3504 I ndroid.systemu:
02-09 09:05:21.567 3214 3214 I /system/bin/tombstoned: received crash request for pid 3488
02-09 09:05:21.567 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3488 and type kDebuggerdJavaBacktrace
02-09 09:05:21.568 3488 3504 I ndroid.systemu: Wrote stack traces to '[tombstoned]'
02-09 09:05:21.570 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3028 and type kDebuggerdNativeBacktrace
02-09 09:05:21.593 4043 4043 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:21.594 3214 3214 I /system/bin/tombstoned: received crash request for pid 3028
02-09 09:05:21.594 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3028 and type kDebuggerdNativeBacktrace
02-09 09:05:21.594 4043 4043 I crash_dump64: performing dump of process 3028 (target tid = 3028)
02-09 09:05:21.596 1 1 I init : type=1400 audit(0.0:186): avc: denied { sigchld } for scontext=u:object_r:dhclient_exec:s0 tcontext=u:r:init:s0 tclass=process permissive=1
02-09 09:05:21.598 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3092 and type kDebuggerdNativeBacktrace
02-09 09:05:21.598 3092 3092 I libc : Requested dump for tid 3092 (hdmicecd)
02-09 09:05:21.656 4048 4048 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:21.657 3214 3214 I /system/bin/tombstoned: received crash request for pid 3092
02-09 09:05:21.657 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3092 and type kDebuggerdNativeBacktrace
02-09 09:05:21.657 4048 4048 I crash_dump64: performing dump of process 3092 (target tid = 3092)
02-09 09:05:21.667 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3095 and type kDebuggerdNativeBacktrace
02-09 09:05:21.668 3095 3095 I libc : Requested dump for tid 3095 (systemcontrol)
02-09 09:05:21.690 4053 4053 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:21.690 3214 3214 I /system/bin/tombstoned: received crash request for pid 3095
02-09 09:05:21.691 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3095 and type kDebuggerdNativeBacktrace
02-09 09:05:21.691 4053 4053 I crash_dump64: performing dump of process 3095 (target tid = 3095)
02-09 09:05:21.707 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3125 and type kDebuggerdNativeBacktrace
02-09 09:05:21.707 3125 3125 I libc : Requested dump for tid 3125 (audioserver)
02-09 09:05:21.737 4059 4059 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:21.738 3214 3214 I /system/bin/tombstoned: received crash request for pid 3125
02-09 09:05:21.738 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3125 and type kDebuggerdNativeBacktrace
02-09 09:05:21.738 4059 4059 I crash_dump32: performing dump of process 3125 (target tid = 3125)
02-09 09:05:21.776 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3127 and type kDebuggerdNativeBacktrace
02-09 09:05:21.811 4064 4064 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:21.811 3214 3214 I /system/bin/tombstoned: received crash request for pid 3127
02-09 09:05:21.811 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3127 and type kDebuggerdNativeBacktrace
02-09 09:05:21.811 4064 4064 I crash_dump64: performing dump of process 3127 (target tid = 3127)
02-09 09:05:21.974 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3187 and type kDebuggerdNativeBacktrace
02-09 09:05:21.974 3187 3187 I libc : Requested dump for tid 3187 (cameraserver)
02-09 09:05:22.000 4070 4070 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.001 3214 3214 I /system/bin/tombstoned: received crash request for pid 3187
02-09 09:05:22.001 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3187 and type kDebuggerdNativeBacktrace
02-09 09:05:22.001 4070 4070 I crash_dump32: performing dump of process 3187 (target tid = 3187)
02-09 09:05:22.021 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3188 and type kDebuggerdNativeBacktrace
02-09 09:05:22.021 3188 3188 I libc : Requested dump for tid 3188 (drmserver)
02-09 09:05:22.046 4076 4076 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.047 3214 3214 I /system/bin/tombstoned: received crash request for pid 3188
02-09 09:05:22.047 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3188 and type kDebuggerdNativeBacktrace
02-09 09:05:22.047 4076 4076 I crash_dump32: performing dump of process 3188 (target tid = 3188)
02-09 09:05:22.060 1 1 I init : type=1400 audit(0.0:187): avc: denied { sigchld } for scontext=u:object_r:dhclient_exec:s0 tcontext=u:r:init:s0 tclass=process permissive=1
02-09 09:05:22.064 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3197 and type kDebuggerdNativeBacktrace
02-09 09:05:22.065 3197 3197 I libc : Requested dump for tid 3197 (mediadrmserver)
02-09 09:05:22.087 4082 4082 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.088 3214 3214 I /system/bin/tombstoned: received crash request for pid 3197
02-09 09:05:22.088 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3197 and type kDebuggerdNativeBacktrace
02-09 09:05:22.088 4082 4082 I crash_dump32: performing dump of process 3197 (target tid = 3197)
02-09 09:05:22.102 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3198 and type kDebuggerdNativeBacktrace
02-09 09:05:22.104 3214 3214 I /system/bin/tombstoned: received crash request for pid 3198
02-09 09:05:22.104 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3198 and type kDebuggerdNativeBacktrace
02-09 09:05:22.150 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3199 and type kDebuggerdNativeBacktrace
02-09 09:05:22.151 3199 3199 I libc : Requested dump for tid 3199 (mediametrics)
02-09 09:05:22.173 4088 4088 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.174 3214 3214 I /system/bin/tombstoned: received crash request for pid 3199
02-09 09:05:22.174 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3199 and type kDebuggerdNativeBacktrace
02-09 09:05:22.174 4088 4088 I crash_dump64: performing dump of process 3199 (target tid = 3199)
02-09 09:05:22.184 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3201 and type kDebuggerdNativeBacktrace
02-09 09:05:22.184 3201 3201 I libc : Requested dump for tid 3201 (mediaserver)
02-09 09:05:22.212 4093 4093 I crash_dump32: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.213 3214 3214 I /system/bin/tombstoned: received crash request for pid 3201
02-09 09:05:22.213 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3201 and type kDebuggerdNativeBacktrace
02-09 09:05:22.213 4093 4093 I crash_dump32: performing dump of process 3201 (target tid = 3201)
02-09 09:05:22.233 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3205 and type kDebuggerdNativeBacktrace
02-09 09:05:22.235 3214 3214 I /system/bin/tombstoned: received crash request for pid 3205
02-09 09:05:22.235 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3205 and type kDebuggerdNativeBacktrace
02-09 09:05:22.309 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3458 and type kDebuggerdNativeBacktrace
02-09 09:05:22.309 3458 3458 I libc : Requested dump for tid 3458 (droid.bluetooth)
02-09 09:05:22.365 4098 4098 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdNativeBacktrace
02-09 09:05:22.365 3214 3214 I /system/bin/tombstoned: received crash request for pid 3458
02-09 09:05:22.365 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3458 and type kDebuggerdNativeBacktrace
02-09 09:05:22.366 4098 4098 I crash_dump64: performing dump of process 3458 (target tid = 3458)
02-09 09:05:22.584 3214 3214 I /system/bin/tombstoned: registered intercept for pid 3940 and type kDebuggerdJavaBacktrace
02-09 09:05:22.585 3940 3954 I reamvision.hya: Thread[3,tid=3954,WaitingInMainSignalCatcherLoop,Thread*=0x7331139000,peer=0x13500020,"Signal Catcher"]: reacting to signal 3
02-09 09:05:22.585 3940 3954 I reamvision.hya:
02-09 09:05:23.620 3214 3214 I /system/bin/tombstoned: received crash request for pid 3940
02-09 09:05:23.620 3214 3214 I /system/bin/tombstoned: found intercept fd 512 for pid 3940 and type kDebuggerdJavaBacktrace
02-09 09:05:23.620 3940 3954 I reamvision.hya: Wrote stack traces to '[tombstoned]'
02-09 09:05:23.622 3348 3363 E ActivityManager: ANR in system
02-09 09:05:23.622 3348 3363 E ActivityManager: PID: 3348
02-09 09:05:23.622 3348 3363 E ActivityManager: Reason: executing service android/com.android.internal.backup.LocalTransportService
02-09 09:05:23.622 3348 3363 E ActivityManager: Load: 1.87 / 0.52 / 0.18
02-09 09:05:23.622 3348 3363 E ActivityManager: CPU usage from 9571ms to 0ms ago (2026-02-09 09:05:10.016 to 2026-02-09 09:05:19.587):
02-09 09:05:23.622 3348 3363 E ActivityManager: 12% 3097/android.hardware.audio@2.0-service: 0.8% user + 11% kernel / faults: 39 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 7.6% 3940/com.streamvision.hyas: 4.5% user + 3% kernel / faults: 312 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 3.5% 3127/surfaceflinger: 1.6% user + 1.8% kernel / faults: 341 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 3.4% 3348/system_server: 2.1% user + 1.2% kernel / faults: 46 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 2% 3027/logd: 0.4% user + 1.6% kernel / faults: 3 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 1.3% 3120/android.hardware.sensors@1.0-service: 0.7% user + 0.6% kernel / faults: 278 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 1.1% 7/rcu_preempt: 0% user + 1.1% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.8% 2146/kworker/0:2: 0% user + 0.8% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.6% 3327/irq/27-ff660000: 0% user + 0.6% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.5% 1434/kworker/3:1: 0% user + 0.5% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.5% 1916/kthread_di: 0% user + 0.5% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.4% 1797/cfinteractive: 0% user + 0.4% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.4% 2391/kworker/u9:1: 0% user + 0.4% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.4% 3092/hdmicecd: 0.1% user + 0.3% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.3% 3113/android.hardware.graphics.composer@2.2-service: 0.1% user + 0.2% kernel / faults: 36 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.1% 3095/systemcontrol: 0% user + 0.1% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.1% 3180/rild: 0% user + 0.1% kernel / faults: 16 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 0.1% 3344/aml_buf_toggle_: 0% user + 0.1% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 6.1% TOTAL: 2.3% user + 3.8% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: CPU usage from 55ms to 394ms later (2026-02-09 09:05:19.642 to 2026-02-09 09:05:19.981):
02-09 09:05:23.622 3348 3363 E ActivityManager: 27% 3027/logd: 6.9% user + 20% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 24% 3040/logd.auditd: 0% user + 24% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 19% 3348/system_server: 0% user + 19% kernel / faults: 116 minor
02-09 09:05:23.622 3348 3363 E ActivityManager: 19% 3363/ActivityManager: 3.9% user + 15% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 3.5% 3097/android.hardware.audio@2.0-service: 3.5% user + 0% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 3.5% 3324/HwBinder:3097_1: 0% user + 3.5% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 4.4% 3940/com.streamvision.hyas: 4.4% user + 0% kernel
02-09 09:05:23.622 3348 3363 E ActivityManager: 12% TOTAL: 4% user + 8.8% kernel
02-09 09:05:23.648 3348 3365 I ActivityManager: Start proc 4102:com.android.deskclock/u0a32 for broadcast com.android.deskclock/.AlarmInitReceiver
02-09 09:05:23.651 4102 4102 I Zygote : seccomp disabled by setenforce 0
02-09 09:05:23.719 3111 3111 I gralloc : framebuffer hal alread move to hwcomposer
02-09 09:05:23.725 3111 3111 I gralloc : framebuffer hal alread move to hwcomposer
02-09 09:05:23.727 3111 3111 I gralloc : framebuffer hal alread move to hwcomposer
02-09 09:05:23.735 4102 4102 I droid.deskcloc: The ClassLoaderContext is a special shared library.
02-09 09:05:23.735 3348 4107 I chatty : uid=1000 system_server expire 7 lines
02-09 09:05:23.749 3111 3111 I gralloc : framebuffer hal alread move to hwcomposer
02-09 09:05:23.803 4102 4102 I AlarmClock: AlarmInitReceiver android.intent.action.LOCKED_BOOT_COMPLETED
02-09 09:05:23.811 4102 4135 I AlarmClock: Fixing alarm instances
02-09 09:05:23.831 4102 4135 V AlarmClock: AlarmInitReceiver finished
02-09 09:05:23.849 4137 4137 I Zygote : seccomp disabled by setenforce 0
02-09 09:05:23.849 3348 3365 I ActivityManager: Start proc 4137:com.khadas.khadascontrol/1000 for broadcast com.khadas.khadascontrol/.KhadasControlInitReceiver
02-09 09:05:23.894 4137 4137 D KhadasControlInitReceiver: Factory fullpath=/storage/emulated/0/bootup.bmp
02-09 09:05:23.896 3348 3364 W Looper : Slow dispatch took 165ms android.ui h=android.view.Choreographer$FrameHandler c=android.view.Choreographer$FrameDisplayEventReceiver@9c9330c m=0
02-09 09:05:23.899 3127 3875 I chatty : uid=1000(system) Binder:3127_5 expire 4 lines
02-09 09:05:23.899 3111 3111 I gralloc : framebuffer hal alread move to hwcomposer
02-09 09:05:23.912 4155 4155 I Zygote : seccomp disabled by setenforce 0
02-09 09:05:23.916 3348 3365 I ActivityManager: Start proc 4155:android.process.media/u0a2 for broadcast com.android.providers.downloads/.DownloadReceiver
02-09 09:05:23.948 3113 3977 I chatty : uid=1000(system) HwBinder:3113_3 expire 11 lines
02-09 09:05:24.048 4155 4155 D MediaScannerReceiver: action: android.intent.action.MEDIA_MOUNTED path: /storage/emulated/0
02-09 09:05:24.052 3593 3593 I FastBootComplete: action:android.intent.action.BOOT_COMPLETED
02-09 09:05:24.053 3593 3593 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:1531 android.content.ContextWrapper.startService:664 android.content.ContextWrapper.startService:664 com.droidlogic.FastBootComplete.onReceive:27 android.app.ActivityThread.handleReceiver:3379
02-09 09:05:24.055 3593 3593 D BLE_Service: Service onCreate
02-09 09:05:24.058 3925 3925 I SubTitleServiceBroadcastReceiver: [onReceive]action:android.intent.action.BOOT_COMPLETED, subtitleService:null
02-09 09:05:24.059 3925 3925 I SubtitleMiddleClientManager: SubtitleMiddleClientManager....
02-09 09:05:24.062 3925 3925 I android_os_HwBinder: HwBinder: Starting thread pool for default::vendor.amlogic.hardware.subtitleserver@1.0::ISubtitleServer
02-09 09:05:24.066 3094 3130 I SubtitleServerHal: [setCallback]
02-09 09:05:24.066 3094 3130 I SubtitleServerHal: setCallback cookie:0, client size:1
02-09 09:05:24.066 3925 3925 I SubtitleMiddleClientManager: connect to subtitleserver HIDL service success
02-09 09:05:24.075 3925 3925 I tvsubtitle_tv: load tvsubtitle_tv ok
02-09 09:05:24.080 3127 3127 I chatty : uid=1000(system) /system/bin/surfaceflinger expire 10 lines
02-09 09:05:24.089 3348 3365 I ActivityManager: Start proc 4180:com.wesion.remotesettings/u0a38 for broadcast com.wesion.remotesettings/.RemoteSettingReceiver
02-09 09:05:24.089 4180 4180 I Zygote : seccomp disabled by setenforce 0
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: keyInfo [{
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 20,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "POWER",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "POWER",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 116
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 3,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "UP",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "UP",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 103
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 2,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "DOWN",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "DOWN",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 108
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 14,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "LEFT",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "LEFT",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 105
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 26,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "RIGHT",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "RIGHT",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 106
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 7,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "OK",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "OK",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 232
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 1,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "BACK",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "BACK",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 158
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 91,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "MOUSE",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "MOUSE",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 63
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 13,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "MENU",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "MENU",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 139
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 88,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "Volume Down",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "Volume Down",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 114
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }, {
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 11,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "Volume UP",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "Volume UP",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 115
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: },{
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "irCode": 72,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "isSelect": true,
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "key": "HOME",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "name": "HOME",
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: "scanCode": 102
02-09 09:05:24.136 4180 4180 D IRSettingReceiver: }]
02-09 09:05:24.157 3593 3593 I BLE_Service: mConnRunnable, looking on bonded devices in order to find connection target...
02-09 09:05:24.157 3593 3593 I BLE_Service: connectToBondedDevices><
02-09 09:05:24.158 3593 3593 I BLE_Service: bondedDevices size:0
02-09 09:05:24.475 4155 4177 V MediaProvider: pruneThumbnails
02-09 09:05:24.478 4155 4177 V MediaProvider: /pruneDeadThumbnailFiles...
02-09 09:05:28.791 4102 4128 I droid.deskcloc: Waiting for a blocking GC ProfileSaver
02-09 09:05:28.803 4102 4128 I droid.deskcloc: WaitForGcToComplete blocked ProfileSaver on AddRemoveAppImageSpace for 11.905ms
02-09 09:05:28.927 4137 4154 I s.khadascontro: Waiting for a blocking GC ProfileSaver
02-09 09:05:28.943 4137 4154 I s.khadascontro: WaitForGcToComplete blocked ProfileSaver on AddRemoveAppImageSpace for 15.489ms
02-09 09:05:28.990 4155 4170 I d.process.medi: Waiting for a blocking GC ProfileSaver
02-09 09:05:29.001 4155 4170 I d.process.medi: WaitForGcToComplete blocked ProfileSaver on AddRemoveAppImageSpace for 10.209ms
02-09 09:05:29.163 4180 4195 I .remotesetting: Waiting for a blocking GC ProfileSaver
02-09 09:05:29.184 4180 4195 I .remotesetting: WaitForGcToComplete blocked ProfileSaver on AddRemoveAppImageSpace for 20.557ms
02-09 09:05:29.208 1 1 I init : type=1400 audit(0.0:188): avc: denied { getpgid } for scontext=u:r:init:s0 tcontext=u:object_r:dhclient_exec:s0 tclass=process permissive=1
02-09 09:05:29.208 1 1 I init : type=1400 audit(0.0:189): avc: denied { sigkill } for scontext=u:r:init:s0 tcontext=u:object_r:dhclient_exec:s0 tclass=process permissive=1
02-09 09:05:29.216 1 1 I init : type=1400 audit(0.0:190): avc: denied { sigchld } for scontext=u:object_r:dhclient_exec:s0 tcontext=u:r:init:s0 tclass=process permissive=1
Thanks for your support !