UncleRus / esp-idf-lib

Component library for ESP32-xx and ESP8266

Home Page:https://esp-idf-lib.readthedocs.io/en/latest/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Having issues using the TCA9548 code for my VEML7700

stephmartin16 opened this issue · comments

The issue

Hello everyone,

I am a complete newbie to embedded programming and use the TCA9548 driver for my code. I don't think I am properly addressing the mux so when I go to read the values I get total garbage. I am using the ESP32C6 with the TCA9548A and the VEML7700. I will attach the logs below.

Which SDK are you using?

esp-idf

Which version of SDK are you using?

8.0.100

Which build target have you used?

  • esp32
  • esp32s2
  • esp32s3
  • esp32c2
  • esp8266
  • other

Component causing the issue

TCA9548

Anything in the logs that might be useful for us?

assert failed: xQueueSemaphoreTake queue.c:1653 (( pxQueue ))
Core  0 register dump:
MEPC    : 0x40800514  RA      : 0x4080593a  SP      : 0x4087eb30  GP      : 0x4080b570
TP      : 0x40875f6c  T0      : 0x37363534  T1      : 0x7271706f  T2      : 0x33323130
S0/FP   : 0x0000008a  S1      : 0x00000001  A0      : 0x4087eb6c  A1      : 0x4080b499
A2      : 0x00000001  A3      : 0x00000029  A4      : 0x00000001  A5      : 0x4080d000
A6      : 0x0000000c  A7      : 0x76757473  S2      : 0x00000009  S3      : 0x4087ec7d
S4      : 0x4080b498  S5      : 0x00000001  S6      : 0x00000000  S7      : 0x00000000
S8      : 0x00000000  S9      : 0x00000000  S10     : 0x00000000  S11     : 0x00000000
T3      : 0x6e6d6c6b  T4      : 0x6a696867  T5      : 0x66656463  T6      : 0x62613938
MSTATUS : 0x00001881  MTVEC   : 0x40800001  MCAUSE  : 0x00000007  MTVAL   : 0x00000000
MHARTID : 0x00000000

Core  0 register dump:
MEPC    : 0x40800514  RA      : 0x4080593a  SP      : 0x4087eb30  GP      : 0x4080b570
TP      : 0x40875f6c  T0      : 0x37363534  T1      : 0x7271706f  T2      : 0x33323130
S0/FP   : 0x0000008a  S1      : 0x00000001  A0      : 0x4087eb6c  A1      : 0x4080b499
A2      : 0x00000001  A3      : 0x00000029  A4      : 0x00000001  A5      : 0x4080d000
A6      : 0x0000000c  A7      : 0x76757473  S2      : 0x00000009  S3      : 0x4087ec7d
S4      : 0x4080b498  S5      : 0x00000001  S6      : 0x00000000  S7      : 0x00000000
S8      : 0x00000000  S9      : 0x00000000  S10     : 0x00000000  S11     : 0x00000000
T3      : 0x6e6d6c6b  T4      : 0x6a696867  T5      : 0x66656463  T6      : 0x62613938
MSTATUS : 0x00001881  MTVEC   : 0x40800001  MCAUSE  : 0x00000007  MTVAL   : 0x00000000
MHARTID : 0x00000000

Stack memory:
4087eb30: 0xa5a5a5a5 0xa5a5a5a5 0x4201a014 0x40809de6 0x4080bab4 0x4201a014 0x4080ba98 0x42019ad6
4087eb50: 0x4080bac4 0x4087eb64 0x4080bac8 0x42019f10 0x4080b498 0x33353631 0xa5a5a500 0x65737361
4087eb70: 0x66207472 0x656c6961 0x78203a64 0x75657551 0x6d655365 0x6f687061 0x61546572 0x7120656b
4087eb90: 0x65756575 0x313a632e 0x20333536 0x70202828 0x65755178 0x29206575 0x00000029 0x00000001
4087ebb0: 0x00000004 0x00000001 0x00000001 0x4087ec4c 0x4087ef98 0x00000000 0x00000000 0x00000000
4087ebd0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000001 0x00000000 0x4087dcd0 0x408059cc
4087ebf0: 0x00000000 0x00000000 0x4080eb78 0x408059cc 0x00000000 0x00000000 0x4080eb78 0x40805fc4
4087ec10: 0x00000000 0x00000000 0x00000000 0x00000000 0x40880000 0x4087ef98 0x4087c610 0x400225ca
4087ec30: 0x4087ef78 0x00000000 0x00000000 0x40000000 0x4201b3a0 0x4201b394 0x00000000 0x00000000
4087ec50: 0x00000000 0x4087eccf 0x4087ed14 0x408065b4 0x00000000 0x00000000 0x00000000 0x00000064
4087ec70: 0x4201b3a0 0x4201b394 0x4087ef00 0x4080660c 0x00000000 0x4087eccf 0x4087ed14 0x420074e2
4087ec90: 0x00000000 0x00000000 0x00000000 0x40809b3c 0x00000000 0x00000000 0x00000000 0x00000000
4087ecb0: 0x00000000 0x4087ed14 0x00000000 0x420071f8 0xa5a5a5a5 0x00000000 0x00000000 0x0c000148
4087ecd0: 0x4201b394 0x00000000 0x00000000 0x420066cc 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5
4087ecf0: 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0x40807eca 0x00000000 0x00000000 0x4087ef78
4087ed10: 0x4087ef58 0x00000000 0x00000000 0x00000015 0x00000016 0x00000000 0x000186a0 0x00000000
4087ed30: 0x00000000 0x00000070 0x4087ef00 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ed50: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x40807ed6
4087ed70: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ed90: 0x00000000 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0x00000154 0x4087e710 0x00000065
4087edb0: 0x4080c038 0x4080c038 0x4087eda8 0x4080c030 0x00000013 0x4080d920 0x4080d920 0x4087eda8
4087edd0: 0x00000000 0x00000006 0x4087dda4 0x6b736174 0x6d65765f 0x3037376c 0x00725f30 0x00000000
4087edf0: 0x4087eda0 0x00000006 0x00000001 0x00000000 0x00000000 0x00000000 0x4080d6f8 0x4080d760
4087ee10: 0x4080d7c8 0x00000000 0x00000000 0x00000001 0x00000000 0x00000000 0x00000000 0x4200ecce
4087ee30: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee50: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee70: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee90: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eeb0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eed0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eef0: 0x00000000 0x00000000 0x40000000 0x00000054 0x00000000 0x4087ef00 0x4087eda8 0x00000000
4087ef10: 0x00000000 0x4087ef18 0xffffffff 0x4087ef18 0x4087ef18 0x00000000 0x4087ef2c 0xffffffff



ELF file SHA256: 017a9bd3dd1d9659
0x4001975a: software_reset_cpu in ROM

Stack dump detected
0x40800514: panic_abort at C:/Users/Stephen/esp/esp-idf/components/esp_system/panic.c:452

0x4080593a: __ubsan_include at C:/Users/Stephen/esp/esp-idf/components/esp_system/ubsan.c:313

0x40800001: _vector_table at ??:?

Failed to run gdb_panic_server.py script: Command '['riscv32-esp-elf-gdb', '--batch', '-n', 'C:\\Users\\Stephen\\esp\\esp-idf\\examples\\veml7700-esp-idf-main\\build\\veml7700-esp-idf-main.elf', '-ex', 'target remote | "C:\\Users\\Stephen\\.espressif\\python_env\\idf5.1_py3.11_env\\Scripts\\python.exe" -m "esp_idf_panic_decoder" --target esp32c6 "C:\\Users\\Stephen\\AppData\\Local\\Temp\\tmplhkuk3o4"', '-ex', 'bt']' returned non-zero exit status 1.
b"error starting child process '| C:\\Users\\Stephen\\.espressif\\python_env\\idf5.1_py3.11_env\\Scripts\\python.exe -m esp_idf_panic_decoder --target esp32c6 C:\\Users\\Stephen\\AppData\\Local\\Temp\\tmplhkuk3o4': CreateProcess: No such file or directory\r\nNo stack.\r\n"


ELF file SHA256: 017a9bd3dd1d9659

Additional information or context

I used another open-source driver that I found on GitHub for the sensor created by Kristijan Grozdanovski.

Confirmation

  • This report is not a question nor a request for drivers.