UncleRus / esp-idf-lib

Component library for ESP32-xx and ESP8266
https://esp-idf-lib.readthedocs.io/en/latest/
1.33k stars 414 forks source link

Having issues using the TCA9548 code for my VEML7700 #595

Closed stephmartin16 closed 5 months ago

stephmartin16 commented 5 months ago

The issue

Hello everyone,

I am a complete newbie to embedded programming and use the TCA9548 driver for my code. I don't think I am properly addressing the mux so when I go to read the values I get total garbage. I am using the ESP32C6 with the TCA9548A and the VEML7700. I will attach the logs below.

Which SDK are you using?

esp-idf

Which version of SDK are you using?

8.0.100

Which build target have you used?

Component causing the issue

TCA9548

Anything in the logs that might be useful for us?

assert failed: xQueueSemaphoreTake queue.c:1653 (( pxQueue ))
Core  0 register dump:
MEPC    : 0x40800514  RA      : 0x4080593a  SP      : 0x4087eb30  GP      : 0x4080b570
TP      : 0x40875f6c  T0      : 0x37363534  T1      : 0x7271706f  T2      : 0x33323130
S0/FP   : 0x0000008a  S1      : 0x00000001  A0      : 0x4087eb6c  A1      : 0x4080b499
A2      : 0x00000001  A3      : 0x00000029  A4      : 0x00000001  A5      : 0x4080d000
A6      : 0x0000000c  A7      : 0x76757473  S2      : 0x00000009  S3      : 0x4087ec7d
S4      : 0x4080b498  S5      : 0x00000001  S6      : 0x00000000  S7      : 0x00000000
S8      : 0x00000000  S9      : 0x00000000  S10     : 0x00000000  S11     : 0x00000000
T3      : 0x6e6d6c6b  T4      : 0x6a696867  T5      : 0x66656463  T6      : 0x62613938
MSTATUS : 0x00001881  MTVEC   : 0x40800001  MCAUSE  : 0x00000007  MTVAL   : 0x00000000
MHARTID : 0x00000000

Core  0 register dump:
MEPC    : 0x40800514  RA      : 0x4080593a  SP      : 0x4087eb30  GP      : 0x4080b570
TP      : 0x40875f6c  T0      : 0x37363534  T1      : 0x7271706f  T2      : 0x33323130
S0/FP   : 0x0000008a  S1      : 0x00000001  A0      : 0x4087eb6c  A1      : 0x4080b499
A2      : 0x00000001  A3      : 0x00000029  A4      : 0x00000001  A5      : 0x4080d000
A6      : 0x0000000c  A7      : 0x76757473  S2      : 0x00000009  S3      : 0x4087ec7d
S4      : 0x4080b498  S5      : 0x00000001  S6      : 0x00000000  S7      : 0x00000000
S8      : 0x00000000  S9      : 0x00000000  S10     : 0x00000000  S11     : 0x00000000
T3      : 0x6e6d6c6b  T4      : 0x6a696867  T5      : 0x66656463  T6      : 0x62613938
MSTATUS : 0x00001881  MTVEC   : 0x40800001  MCAUSE  : 0x00000007  MTVAL   : 0x00000000
MHARTID : 0x00000000

Stack memory:
4087eb30: 0xa5a5a5a5 0xa5a5a5a5 0x4201a014 0x40809de6 0x4080bab4 0x4201a014 0x4080ba98 0x42019ad6
4087eb50: 0x4080bac4 0x4087eb64 0x4080bac8 0x42019f10 0x4080b498 0x33353631 0xa5a5a500 0x65737361
4087eb70: 0x66207472 0x656c6961 0x78203a64 0x75657551 0x6d655365 0x6f687061 0x61546572 0x7120656b
4087eb90: 0x65756575 0x313a632e 0x20333536 0x70202828 0x65755178 0x29206575 0x00000029 0x00000001
4087ebb0: 0x00000004 0x00000001 0x00000001 0x4087ec4c 0x4087ef98 0x00000000 0x00000000 0x00000000
4087ebd0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000001 0x00000000 0x4087dcd0 0x408059cc
4087ebf0: 0x00000000 0x00000000 0x4080eb78 0x408059cc 0x00000000 0x00000000 0x4080eb78 0x40805fc4
4087ec10: 0x00000000 0x00000000 0x00000000 0x00000000 0x40880000 0x4087ef98 0x4087c610 0x400225ca
4087ec30: 0x4087ef78 0x00000000 0x00000000 0x40000000 0x4201b3a0 0x4201b394 0x00000000 0x00000000
4087ec50: 0x00000000 0x4087eccf 0x4087ed14 0x408065b4 0x00000000 0x00000000 0x00000000 0x00000064
4087ec70: 0x4201b3a0 0x4201b394 0x4087ef00 0x4080660c 0x00000000 0x4087eccf 0x4087ed14 0x420074e2
4087ec90: 0x00000000 0x00000000 0x00000000 0x40809b3c 0x00000000 0x00000000 0x00000000 0x00000000
4087ecb0: 0x00000000 0x4087ed14 0x00000000 0x420071f8 0xa5a5a5a5 0x00000000 0x00000000 0x0c000148
4087ecd0: 0x4201b394 0x00000000 0x00000000 0x420066cc 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5
4087ecf0: 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0x40807eca 0x00000000 0x00000000 0x4087ef78
4087ed10: 0x4087ef58 0x00000000 0x00000000 0x00000015 0x00000016 0x00000000 0x000186a0 0x00000000
4087ed30: 0x00000000 0x00000070 0x4087ef00 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ed50: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x40807ed6
4087ed70: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ed90: 0x00000000 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0xa5a5a5a5 0x00000154 0x4087e710 0x00000065
4087edb0: 0x4080c038 0x4080c038 0x4087eda8 0x4080c030 0x00000013 0x4080d920 0x4080d920 0x4087eda8
4087edd0: 0x00000000 0x00000006 0x4087dda4 0x6b736174 0x6d65765f 0x3037376c 0x00725f30 0x00000000
4087edf0: 0x4087eda0 0x00000006 0x00000001 0x00000000 0x00000000 0x00000000 0x4080d6f8 0x4080d760
4087ee10: 0x4080d7c8 0x00000000 0x00000000 0x00000001 0x00000000 0x00000000 0x00000000 0x4200ecce
4087ee30: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee50: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee70: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087ee90: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eeb0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eed0: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000
4087eef0: 0x00000000 0x00000000 0x40000000 0x00000054 0x00000000 0x4087ef00 0x4087eda8 0x00000000
4087ef10: 0x00000000 0x4087ef18 0xffffffff 0x4087ef18 0x4087ef18 0x00000000 0x4087ef2c 0xffffffff

ELF file SHA256: 017a9bd3dd1d9659
0x4001975a: software_reset_cpu in ROM

Stack dump detected
0x40800514: panic_abort at C:/Users/Stephen/esp/esp-idf/components/esp_system/panic.c:452

0x4080593a: __ubsan_include at C:/Users/Stephen/esp/esp-idf/components/esp_system/ubsan.c:313

0x40800001: _vector_table at ??:?

Failed to run gdb_panic_server.py script: Command '['riscv32-esp-elf-gdb', '--batch', '-n', 'C:\\Users\\Stephen\\esp\\esp-idf\\examples\\veml7700-esp-idf-main\\build\\veml7700-esp-idf-main.elf', '-ex', 'target remote | "C:\\Users\\Stephen\\.espressif\\python_env\\idf5.1_py3.11_env\\Scripts\\python.exe" -m "esp_idf_panic_decoder" --target esp32c6 "C:\\Users\\Stephen\\AppData\\Local\\Temp\\tmplhkuk3o4"', '-ex', 'bt']' returned non-zero exit status 1.
b"error starting child process '| C:\\Users\\Stephen\\.espressif\\python_env\\idf5.1_py3.11_env\\Scripts\\python.exe -m esp_idf_panic_decoder --target esp32c6 C:\\Users\\Stephen\\AppData\\Local\\Temp\\tmplhkuk3o4': CreateProcess: No such file or directory\r\nNo stack.\r\n"

ELF file SHA256: 017a9bd3dd1d9659

Additional information or context

I used another open-source driver that I found on GitHub for the sensor created by Kristijan Grozdanovski.

Confirmation