It makes reliably reboot a JollaC also : /
Congratulation for spotting the culprit file.
For information, the kernel last messages are :
<1>[ 391.826287] Unable to handle kernel NULL pointer dereference at virtual address 00000024
<1>[ 391.826348] pgd = f1108000
<1>[ 391.826372] [00000024] *pgd=00000000
<0>[ 391.826410] Internal error: Oops: 5 [#1] PREEMPT SMP ARM
<6>[ 391.826444] Modules linked in: radio_iris_transport wlan(O)
<6>[ 391.826500] CPU: 3 PID: 8658 Comm: cat Tainted: G W O 3.10.49+0.0.99 #1
<6>[ 391.826546] task: efcaec00 ti: f3a34000 task.ti: f3a34000
<6>[ 391.826589] PC is at debug_read_status+0x38/0x1e0
<6>[ 391.826624] LR is at do_readv_writev+0x118/0x20c
<6>[ 391.826660] pc : [<c05706d8>] lr : [<c0210af8>] psr: 200a0013
<6>[ 391.826660] sp : f3a35b78 ip : c05706b8 fp : f3a35bbc
<6>[ 391.826719] r10: c05706a0 r9 : f380c000 r8 : f0614688
<6>[ 391.826753] r7 : 00000000 r6 : 0000000f r5 : f28536c0 r4 : 00000000
<6>[ 391.826791] r3 : c128db2c r2 : 00000200 r1 : 000080d0 r0 : f5001d00
<6>[ 391.826830] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment kernel
<6>[ 391.826874] Control: 10c5387d Table: b110806a DAC: 00000015
Followed by hexadecimal dump and a backtrace :
<6>[ 391.837815] [<c05706d8>] (debug_read_status+0x38/0x1e0) from [<c0210af8>] (do_readv_writev+0x118/0x20c)
<6>[ 391.837899] [<c0210af8>] (do_readv_writev+0x118/0x20c) from [<c0210c58>] (vfs_readv+0x6c/0x84)
<6>[ 391.837977] [<c0210c58>] (vfs_readv+0x6c/0x84) from [<c0238f10>] (default_file_splice_read+0x198/0x2cc)
<6>[ 391.838060] [<c0238f10>] (default_file_splice_read+0x198/0x2cc) from [<c0237ee8>] (do_splice_to+0x8c/0xa0)
<6>[ 391.838142] [<c0237ee8>] (do_splice_to+0x8c/0xa0) from [<c0237fac>] (splice_direct_to_actor+0xb0/0x1ac)
<6>[ 391.838219] [<c0237fac>] (splice_direct_to_actor+0xb0/0x1ac) from [<c0239400>] (do_splice_direct+0x6c/0x84)
<6>[ 391.838297] [<c0239400>] (do_splice_direct+0x6c/0x84) from [<c02103b4>] (do_sendfile+0x17c/0x314)
<6>[ 391.838373] [<c02103b4>] (do_sendfile+0x17c/0x314) from [<c02111e8>] (SyS_sendfile64+0xd4/0xdc)
<6>[ 391.838449] [<c02111e8>] (SyS_sendfile64+0xd4/0xdc) from [<c0106b00>] (ret_fast_syscall+0x0/0x48)
<0>[ 391.838519] Code: e30810d0 e50b2030 e3a02c02 e5930024 (e5948024)
<4>[ 391.846945] ---[ end trace da227214a82491bb ]---