Core panic mit custom builds von MicroPython v1.12 auf TTGO T8

Continuing the discussion from MicroPython REPL Timeout auf TTGO/ESP32:

Mit diesem Build bekommt @poesel auf einem TTGO T8 gleich beim Anstarten einen core panic. Konkret handelt es sich um einen

TTGO T8 V1.7 wifi Bluetooth ESP32 WROVER 4MB FLASH PSRAM electronic module

13.67€ |4MB / 16MB FLASH für TTGO T8 V 1,7 wifi Bluetooth ESP32 WROVER 4MB FLASH 8MB PSRAM elektronische modul T8 V 1.7.1 ESP32|Ersatzteile & Zubehör| - AliExpress

I (681) psram: This chip is ESP32-D0WD
I (681) spiram: Found 64MBit SPI RAM device
I (681) spiram: SPI RAM mode: flash 40m sram 40m
I (684) spiram: PSRAM initialized, cache is in low/high (2-core) mode.
I (691) cpu_start: Pro cpu up.
I (695) cpu_start: Application information:
I (700) cpu_start: Compile time:     Feb 25 2020 09:12:06
I (706) cpu_start: ELF file SHA256:  0000000000000000...
I (712) cpu_start: ESP-IDF:          v3.3
I (717) cpu_start: Starting app cpu, entry point is 0x400832f8
I (709) cpu_start: App cpu up.
I (1592) spiram: SPI SRAM memory test OK
I (1593) heap_init: Initializing. RAM available for dynamic allocation:
I (1593) heap_init: At 3FFAE6E0 len 00001920 (6 KiB): DRAM
I (1599) heap_init: At 3FFBA650 len 000259B0 (150 KiB): DRAM
I (1606) heap_init: At 3FFE0440 len 00003AE0 (14 KiB): D/IRAM
I (1612) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
I (1619) heap_init: At 40096AA0 len 00009560 (37 KiB): IRAM
I (1625) cpu_start: Pro cpu start user code
I (301) cpu_start: Chip Revision: 1
W (302) cpu_start: Chip revision is higher than the one configured in menuconfig. Suggest to upgrade it.
I (305) cpu_start: Starting scheduler on PRO CPU.
I (0) cpu_start: Starting scheduler on APP CPU.
assertion "(res == portMUX_FREE_VAL) == (mux->count == 0)" failed: file "/Users/amo/dev/hiveeyes/tools/pycom/esp-idf/components/freertos/portmux_impl.inc.h", line 106, function: vPortCPUAcquireMutexIntsDisabledInternal
Guru Meditation Error: Core  1 panic'ed (Interrupt wdt timeout on CPU1)
Core 1 register dump:
PC      : 0x4008e88c  PS      : 0x00060134  A0      : 0x8008dc22  A1      : 0x3ffc19b0  
A2      : 0x3ffbe57c  A3      : 0x00060123  A4      : 0x00000001  A5      : 0x0000cdcd  
A6      : 0xb33fffff  A7      : 0x3ffae720  A8      : 0x0000cdcd  A9      : 0x3ffc19b0  
A10     : 0x0000abab  A11     : 0x00060123  A12     : 0x00060123  A13     : 0x0000005b  
A14     : 0x3ffba660  A15     : 0x3ffbb5c5  SAR     : 0x00000004  EXCCAUSE: 0x00000006  
EXCVADDR: 0x00000000  LBEG    : 0x4008d155  LEND    : 0x4008d165  LCOUNT  : 0xfffffff6  

ELF file SHA256: 0000000000000000000000000000000000000000000000000000000000000000

Backtrace: 0x4008e88c:0x3ffc19b0 0x4008dc1f:0x3ffc19e0 0x4008dd8e:0x3ffc1a20 0x40086bb2:0x3ffc1a40 0x40086c99:0x3ffc1a70 0x4016b64a:0x3ffc1a90 0x401644ed:0x3ffc1d50 0x40164475:0x3ffc1da0 0x4008e861:0x3ffc1dd0 0x4008f900:0x3ffc1e00 0x4008df99:0x3ffc1e20 0x4008e095:0x3ffc1e60 0x4011f64d:0x3ffc1e80 0x40086ef2:0x3ffc1ea0 0x40087616:0x3ffc1ec0 0x40087ac4:0x3ffc1ee0 0x4011faa9:0x3ffc1f40 0x400fa978:0x3ffc1f70 0x400e4672:0x3ffc1fa0 0x400dfed5:0x3ffc1fd0 0x400dff41:0x3ffc1ff0 0x400f5a05:0x3ffc2010 0x400f61b2:0x3ffc2040 0x400fc0a5:0x3ffc2060 0x400fc0d5:0x3ffc2080 0x400fc1c7:0x3ffc20a0 0x400fd582:0x3ffc20f0 0x400f6032:0x3ffc2110 0x400f5301:0x3ffc2130 0x400f558d:0x3ffc2220 0x400e4665:0x3ffc2260 0x400dfed5:0x3ffc2290 0x400dff41:0x3ffc22b0 0x400eecdd:0x3ffc22d0 0x400e474a:0x3ffc2370 0x400dfed5:0x3ffc23f0 0x400dff02:0x3ffc2410 0x40106826:0x3ffc2430 0x40106acd:0x3ffc24d0 0x400f6f9c:0x3ffc2500 0x4008d461:0x3ffc2530

Core 0 register dump:
PC      : 0x4008e884  PS      : 0x00060434  A0      : 0x8008f6b9  A1      : 0x3ffba410  
A2      : 0x3ffb0368  A3      : 0x00060223  A4      : 0x00000001  A5      : 0x0000abab  
A6      : 0xb33fffff  A7      : 0x00060d23  A8      : 0x0000abab  A9      : 0x3ffba7e0  
A10     : 0x0000cdcd  A11     : 0x3f46db11  A12     : 0x3f46024e  A13     : 0x3f460263  
A14     : 0x0000009d  A15     : 0x3f46db04  SAR     : 0x00000013  EXCCAUSE: 0x00000006  
EXCVADDR: 0x00000000  LBEG    : 0x00000000  LEND    : 0x00000000  LCOUNT  : 0x00000000  

ELF file SHA256: 0000000000000000000000000000000000000000000000000000000000000000

Backtrace: 0x4008e884:0x3ffba410 0x4008f6b6:0x3ffba440 0x4008e005:0x3ffba460 0x4008e095:0x3ffba4a0 0x40086b53:0x3ffba4c0 0x40086c59:0x3ffba500 0x40169255:0x3ffba520 0x401644ed:0x3ffba7e0 0x40164475:0x3ffba830 0x4008d515:0x3ffba860 0x4008d678:0x3ffba880 0x4008e6a4:0x3ffba8a0 0x400901b4:0x3ffba8c0 0x4009016a:0xa5a5a5a5

Ein paar Nachforschungen dazu haben ergeben:

Besonders interessant finde ich jedoch diesen Beitrag, der als Antwort auf o.g. Crash from in ppTask (IDFGH-1194) · Issue #3500 · espressif/esp-idf · GitHub zustande kam: