i am using reff board unifi ap ac pro. my kernel is 4.14.90 master branch.Kernel is getting dump frequently where device is working in router mode. i found crashlogs in /sys/kernel/debug. Please help me to understand these logs.
Modules: mtd_rw@869a1000+440 ath9k@86fe0000+1813b ath9k_common@86e90000+2f0d pppoe@86cf0000+2150 ppp_async@86cea000+1b50 l2tp_ppp@86fdc000+36e0 batman_adv@86800000+34d4c ath9k_hw@86f80000+5516c ath10k_pci@86cd0000+606f ath10k_core@86d80000+4e9a8 ath@86cc8000+4a53 pppox@86cc5000+5ca ppp_generic@86c50000+58a2 nf_conntrack_ipv6@86c58000+12a0 mac80211@86e00000+86921 iptable_nat@86d5c000+350 ipt_REJECT@86c63000+450 ipt_MASQUERADE@86c95000+330 ebtable_nat@86c61000+3f0 ebtable_filter@86c5e000+3f0 ebtable_broute@877d2000+390 cfg80211@86d00000+5af16 xt_time@877d5000+770 xt_tcpudp@877da000+770 xt_tcpmss@877d7000+4b0 xt_statistic@877d4000+3d0 xt_state@877ce000+350 xt_recent@877ca000+1c20 xt_nat@877c9000+690 xt_multiport@877c7000+570 xt_mark@877c4000+330 xt_mac@877be000+2f0 xt_limit@877c0000+530 xt_length@877bd000+350 xt_hl@876ed000+3b0 xt_helper@877b9000+3f0 xt_ecn@87771000+5d0 xt_dscp@875d3000+470 xt_coova@877a8000+16b0xt_conntrack@875be000+9b0 xt_connmark@875eb000+4d0 xt_connlimit@877ab000+f60 xt_connbytes@877bb000+6d0 xt_comment@877b5000+270 xt_TCPMSS@877ad000+b50 xt_REDIRECT@877b4000+350 xt_LOG@877b1000+390 xt_HL@87774000+5b0 xt_FLOWOFFLOAD@877aa000+b60 xt_DSCP@877a7000+650 xt_CT@8777f000+a90 xt_CLASSIFY@8776b000+2d0 slhc@8777c000+147b nft_set_rbtree@8776f000+b50 nft_set_hash@87778000+34d0 nft_reject_ipv6@8776c000+2f0 nft_reject_ipv4@8776a000+2f0 nft_reject_inet@87756000+4d0 nft_reject@87757000+481 nft_redir_ipv4@8774c000+310 nft_redir@8775c000+492 nft_quota@87797000+710 nft_numgen@876d8000+6c0 nft_nat@8772f000+850 nft_meta@8775a000+1017 nft_masq_ipv4@87796000+350 nft_masq@87741000+48f nft_log@87744000+690 nft_limit@87745000+df0 nft_exthdr@87723000+d50 nft_ct@8773c000+14d0 nft_counter@87763000+730 nft_chain_route_ipv6@87735000+450 nft_chain_route_ipv4@8774e000+390 nft_chain_nat_ipv4@87753000+2d0 nf_tables_ipv6@8774f000+2f0 nf_tables_ipv4@87749000+2b0 nf_tables_inet@87728000+350 nf_tables@87780000+10c69 nf_reject_ipv4@87736000+963 nf_nat_redirect@8772b000+63b nf_nat_masquerade_ipv4@87737000+6bc nf_conntrack_ipv4@8773e000+11d0 nf_nat_ipv4@8771d000+db1 nf_nat@8772c000+254b nf_log_ipv4@8771f000+db0 nf_flow_table_hw@87712000+8d0 nf_flow_table@87724000+36df nf_defrag_ipv6@87718000+13fe nf_defrag_ipv4@8770e000+4f6 nf_conntrack_rtcache@87711000+ab0 libcrc32c@8770d000+2f7 iptable_raw@876ea000+2f0 iptable_mangle@876a4000+430 iptable_filter@876e9000+310 ipt_ECN@87701000+5f0 ip_tables@87704000+278d ebtables@87708000+3f75 ebt_vlan@876fa000+430 ebt_stp@876f9000+7d0 ebt_snat@876e5000+3d0 ebt_redirect@876ef000+3f0 ebt_pkttype@876f2000+2b0 ebt_nflog@876e8000+310 ebt_mark_m@876e6000+2d0 ebt_mark@876b5000+330 ebt_log@876dd000+850 ebt_limit@876d9000+430 ebt_ip@87696000+5b0 ebt_dnat@876b7000+470 ebt_arpreply@876b0000+530 ebt_arp@87691000+6f0 ebt_among@87693000+a90ebt_802_3@8769e000+350 crc_ccitt@876cf000+46b compat@876bc000+227e br_netfilter@876e0000+2fb5 sch_cake@876d0000+7220 nf_conntrack@876c0000+e1a8 act_skbedit@87695000+a20 act_mirred@87690000+e80 em_u32@8761d000+2b0 cls_u32@87698000+22a0 cls_tcindex@8768a000+1530 cls_flow@8767e000+1690 cls_route@87688000+14d0 cls_fw@8764e000+f90 sch_tbf@8764c000+1730 sch_htb@87684000+3780 sch_hfsc@87680000+3a90 sch_ingress@87637000+550 ledtrig_gpio@87647000+790 xt_set@8761e000+1bb0 ip_set_list_set@87618000+1c90 ip_set_hash_netiface@87670000+6270 ip_set_hash_netport@87668000+6190 ip_set_hash_netnet@87660000+6770 ip_set_hash_net@87658000+5bd0 ip_set_hash_netportnet@87650000+6c50 ip_set_hash_mac@87648000+28f0 ip_set_hash_ipportnet@87640000+6790 ip_set_hash_ipportip@87638000+54f0 ip_set_hash_ipport@87630000+50d0 ip_set_hash_ipmark@87628000+4df0 ip_set_hash_ip@87620000+4d30 ip_set_bitmap_port@87612000+1810 ip_set_bitmap_ipmac@875e6000+1b90 ip_set_bitmap_ip@87610000+1af0 ip_set@87608000+586a nfnetlink@875da000+1207 ip6t_REJECT@875f0000+490 nf_reject_ipv6@875ee000+aa8 nf_log_ipv6@875f2000+1070 nf_log_common@875ed000+b8f ip6table_mangle@875e4000+530 ip6table_filter@875de000+310 ip6_tables@875e8000+2721 x_tables@875e0000+366f ifb@8758b000+c70 l2tp_netlink@875c0000+21cc l2tp_core@875c4000+368a udp_tunnel@875ad000+b8f ip6_udp_tunnel@87590000+6b7 tun@875b8000+5511 ledtrig_transient@87425000+6f0 ehci_platform@87fe5000+fb0 ehci_hcd@87fd0000+8b57 gpio_button_hotplug@87fe0000+1310 usbcore@87400000+20074 nls_base@87fc0000+1480 usb_common@87fb7000+67e crc16@87fbd000+467 crc32c_generic@87faa000+5f0 crypto_hash@87fb4000+2772
<6>[ 14.221055] ip_set: protocol 6
<6>[ 14.348560] u32 classifier
<6>[ 14.351337] input device check on
<6>[ 14.355095] Actions configured
<6>[ 14.361594] Mirror/redirect action on
<6>[ 14.374848] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
<5>[ 14.422738] Bridge firewalling registered
<6>[ 14.454458] Loading modules backported from Linux version v4.19.7-0-g61c68f2a2af0
<6>[ 14.462050] Backport generated by backports.git v4.19.7-1-0-g148b072d
<6>[ 14.522900] Ebtables v2.0 registered
<6>[ 14.542221] ip_tables: (C) 2000-2006 Netfilter Core Team
<6>[ 14.753231] nf_tables: (c) 2007-2009 Patrick McHardy <kaber@trash.net>
<6>[ 14.875151] xt_coova: ready
<6>[ 14.902922] xt_time: kernel timezone is -0000
<6>[ 15.284391] PPP generic driver version 2.4.2
<6>[ 15.291637] NET: Registered protocol family 24
<6>[ 15.326423] pci 0000:00:00.0: using irq 40 for pin 1
<4>[ 15.332982] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
<6>[ 15.338893] ath10k_pci 0000:00:00.0: pci irq legacy oper_irq_mode 1 irq_mode 0 reset_mode 0
<4>[ 15.616849] ath10k_pci 0000:00:00.0: Direct firmware load for ath10k/pre-cal-pci-0000:00:00.0.bin failed with error -2
<4>[ 15.627746] ath10k_pci 0000:00:00.0: Falling back to user helper
<3>[ 15.712280] firmware ath10k!pre-cal-pci-0000:00:00.0.bin: firmware_loading_store: map pages failed
<4>[ 15.723061] ath10k_pci 0000:00:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/firmware-6.bin failed with error -2
<4>[ 15.733969] ath10k_pci 0000:00:00.0: Falling back to user helper
<3>[ 15.896893] firmware ath10k!QCA988X!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
<6>[ 15.911193] ath10k_pci 0000:00:00.0: qca988x hw2.0 target 0x4100016c chip_id 0x043222ff sub 0000:0000
<6>[ 15.920605] ath10k_pci 0000:00:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
<6>[ 15.934619] ath10k_pci 0000:00:00.0: firmware ver 10.2.4-1.0-00041 api 5 features no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 f43fa422
<4>[ 16.034525] ath10k_pci 0000:00:00.0: Direct firmware load for ath10k/QCA988X/hw2.0/board-2.bin failed with error -2
<4>[ 16.045149] ath10k_pci 0000:00:00.0: Falling back to user helper
<3>[ 16.145368] firmware ath10k!QCA988X!hw2.0!board-2.bin: firmware_loading_store: map pages failed
<6>[ 16.154761] ath10k_pci 0000:00:00.0: board_file api 1 bmi_id N/A crc32 bebc7c08
<6>[ 17.280771] ath10k_pci 0000:00:00.0: htt-ver 2.1 wmi-op 5 htt-op 2 cal file max-sta 128 raw 0 hwcrypto 1
<7>[ 17.424292] ath: EEPROM regdomain: 0x0
<7>[ 17.424300] ath: EEPROM indicates default country code should be used
<7>[ 17.424303] ath: doing EEPROM country->regdmn map search
<7>[ 17.424318] ath: country maps to regdmn code: 0x3a
<7>[ 17.424324] ath: Country alpha2 being used: US
<7>[ 17.424327] ath: Regpair used: 0x3a
<6>[ 17.577195] batman_adv: B.A.T.M.A.N. advanced openwrt-2018.4-0 (compatibility version 15) loaded
<6>[ 17.590112] l2tp_ppp: PPPoL2TP kernel driver, V2.0
<7>[ 17.616456] ath: EEPROM regdomain: 0x0
<7>[ 17.616464] ath: EEPROM indicates default country code should be used
<7>[ 17.616468] ath: doing EEPROM country->regdmn map search
<7>[ 17.616483] ath: country maps to regdmn code: 0x3a
<7>[ 17.616488] ath: Country alpha2 being used: US
<7>[ 17.616492] ath: Regpair used: 0x3a
<7>[ 17.628435] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
<6>[ 17.630430] ieee80211 phy1: Atheros AR9561 Rev:0 mem=0xb8100000, irq=47
<14>[ 17.653124] kmodloader: done loading kernel modules from /etc/modules.d/*
<4>[ 19.516243] urandom_read: 6 callbacks suppressed
<5>[ 19.516251] random: jshn: uninitialized urandom read (4 bytes read)
<7>[ 27.458602] ath: EEPROM regdomain: 0x8164
<7>[ 27.458611] ath: EEPROM indicates we should expect a country code
<7>[ 27.458616] ath: doing EEPROM country->regdmn map search
<7>[ 27.458621] ath: country maps to regdmn code: 0x5b
<7>[ 27.458628] ath: Country alpha2 being used: IN
<7>[ 27.458632] ath: Regpair used: 0x5b
<7>[ 27.458639] ath: regdomain 0x8164 dynamically updated by user
<7>[ 27.458712] ath: EEPROM regdomain: 0x8164
<7>[ 27.458716] ath: EEPROM indicates we should expect a country code
<7>[ 27.458720] ath: doing EEPROM country->regdmn map search
<7>[ 27.458725] ath: country maps to regdmn code: 0x5b
<7>[ 27.458729] ath: Country alpha2 being used: IN
<7>[ 27.458733] ath: Regpair used: 0x5b
<7>[ 27.458737] ath: regdomain 0x8164 dynamically updated by user
<4>[ 27.458755] ath10k_pci 0000:00:00.0: DFS region 0x0 not supported, will trigger radar for every pulse
<6>[ 29.230626] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
<6>[ 29.255480] br-vlan11: port 1(eth0.11) entered blocking state
<6>[ 29.261325] br-vlan11: port 1(eth0.11) entered disabled state
<6>[ 29.267517] device eth0.11 entered promiscuous mode
<6>[ 29.272469] device eth0 entered promiscuous mode
<6>[ 29.301173] IPv6: ADDRCONF(NETDEV_UP): br-vlan11: link is not ready
<6>[ 29.801857] br-wan: port 1(eth0.1) entered blocking state
<6>[ 29.807399] br-wan: port 1(eth0.1) entered disabled state
<6>[ 29.813212] device eth0.1 entered promiscuous mode
<6>[ 29.840046] IPv6: ADDRCONF(NETDEV_UP): br-wan: link is not ready
<6>[ 30.274716] eth0: link up (1000Mbps/Full duplex)
<6>[ 30.279547] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
<6>[ 30.362693] br-wan: port 1(eth0.1) entered blocking state
<6>[ 30.368190] br-wan: port 1(eth0.1) entered forwarding state
<6>[ 30.374320] br-vlan11: port 1(eth0.11) entered blocking state
<6>[ 30.380156] br-vlan11: port 1(eth0.11) entered forwarding state
<6>[ 30.542663] IPv6: ADDRCONF(NETDEV_CHANGE): br-wan: link becomes ready
<6>[ 30.549459] IPv6: ADDRCONF(NETDEV_CHANGE): br-vlan11: link becomes ready
<6>[ 42.230789] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
<6>[ 44.031389] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
<6>[ 44.044466] br-vlan11: port 2(wlan1) entered blocking state
<6>[ 44.050131] br-vlan11: port 2(wlan1) entered disabled state
<6>[ 44.056155] device wlan1 entered promiscuous mode
<5>[ 46.982644] random: crng init done
<6>[ 52.674904] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
<6>[ 52.681818] br-vlan11: port 2(wlan1) entered blocking state
<6>[ 52.687552] br-vlan11: port 2(wlan1) entered forwarding state
<4>[ 60.206466] ath10k_pci 0000:00:00.0: pdev param 0 not supported by firmware
<6>[ 60.230343] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
<3>[ 63.841806] ath10k_pci 0000:00:00.0: failed to receive initialized event from target: 00000000
<4>[ 63.851279] ath10k_pci 0000:00:00.0: failed to wait for target init: -145
<4>[ 65.361532] ath10k_pci 0000:00:00.0: pdev param 0 not supported by firmware
<6>[ 65.384373] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
<6>[ 65.407702] br-vlan11: port 3(wlan0) entered blocking state
<6>[ 65.414189] br-vlan11: port 3(wlan0) entered disabled state
<6>[ 65.420875] device wlan0 entered promiscuous mode
<6>[ 77.296529] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
<6>[ 77.303234] br-vlan11: port 3(wlan0) entered blocking state
<6>[ 77.308914] br-vlan11: port 3(wlan0) entered forwarding state
<6>[ 85.914516] mtd-rw: mtd0: setting writeable flag
<6>[ 85.919375] mtd-rw: mtd1: setting writeable flag
<6>[ 85.924391] mtd-rw: mtd6: setting writeable flag
<6>[ 85.929085] mtd-rw: mtd7: setting writeable flag
<6>[ 85.933910] mtd-rw: mtd8: setting writeable flag
<6>[ 85.938606] mtd-rw: mtd9: setting writeable flag
<1>[11302.032958] Data bus error, epc == 8015cc20, ra == 80189840
<4>[11302.038625] Oops[#1]:
<4>[11302.040939] CPU: 0 PID: 27133 Comm: ps Not tainted 4.14.90 #0
<4>[11302.046769] task: 87d5b2a0 task.stack: 85b6c000
<4>[11302.051359] $ 0 : 00000000 00000001 869db000 00000000
<4>[11302.056665] $ 4 : 81102070 00000001 01f78dd9 01f78dda
<4>[11302.061971] $ 8 : 00000000 7f93f367 80165324 242d9ca4
<4>[11302.067277] $12 : 7f93ee78 00000000 00000000 77f7e2c0
<4>[11302.072584] $16 : 85d3d000 fffffff5 86ebfdc0 000003ff
<4>[11302.077891] $20 : 85b6df08 77f72000 77f72000 86ebfdc0
<4>[11302.083196] $24 : 00000fa3 77ee1040
<4>[11302.088503] $28 : 85b6c000 85b6dde0 85d3d030 80189840
<4>[11302.093810] Hi : 00000003
<4>[11302.096731] Lo : 00000000
<4>[11302.099686] epc : 8015cc20 __kmalloc+0x24c/0x254
<4>[11302.104551] ra : 80189840 seq_read+0x140/0x570
<4>[11302.109315] Status: 1100dc03 KERNEL EXL IE
<4>[11302.113567] Cause : 4080941c (ExcCode 07)
<4>[11302.117633] PrId : 00019750 (MIPS 74Kc)
<4>[11302.121609] Modules linked in: mtd_rw ath9k ath9k_common pppoe ppp_async l2tp_ppp batman_adv ath9k_hw ath10k_pci ath10k_core ath pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE ebtable_nat ebtable_filter ebtable_broute cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_coova xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY slhc nft_set_rbtree nft_set_hash nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir_ipv4 nft_redir nft_quota nft_numgen nft_nat nft_meta nft_masq_ipv4 nft_masq nft_log nft_limit nft_exthdr nft_ct nft_counter nft_chain_route_ipv6 nft_chain_route_ipv4
<4>[11302.194631] nft_chain_nat_ipv4 nf_tables_ipv6 nf_tables_ipv4 nf_tables_inet nf_tables nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache libcrc32c iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables ebtables ebt_vlan ebt_stp ebt_snat ebt_redirect ebt_pkttype ebt_nflog ebt_mark_m ebt_mark ebt_log ebt_limit ebt_ip ebt_dnat ebt_arpreply ebt_arp ebt_among ebt_802_3 crc_ccitt compat br_netfilter sch_cake nf_conntrack act_skbedit act_mirred em_u32 cls_u32 cls_tcindex cls_flow cls_route cls_fw sch_tbf sch_htb sch_hfsc sch_ingress ledtrig_gpio xt_set ip_set_list_set ip_set_hash_netiface ip_set_hash_netport ip_set_hash_netnet ip_set_hash_net ip_set_hash_netportnet
<4>[11302.266219] ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables x_tables ifb l2tp_netlink l2tp_core udp_tunnel ip6_udp_tunnel tun ledtrig_transient ehci_platform ehci_hcd gpio_button_hotplug usbcore nls_base usb_common crc16 crc32c_generic crypto_hash
<4>[11302.309117] Process ps (pid: 27133, threadinfo=85b6c000, task=87d5b2a0, tls=77f7fd98)
<4>[11302.317048] Stack : 00000002 00000002 00000000 87b96b28 87c1d9b0 87bc8ee0 80520000 85d3d000
<4>[11302.325538] fffffff5 86ebfdc0 000003ff 85b6df08 77f72000 80189840 77f72000 77f78ddc
<4>[11302.334022] 00000000 801757b8 00000004 00000000 00000041 00000000 86ebfdc0 7f93ef68
<4>[11302.342506] 86ebfdc0 000003ff 000003ff 77f72000 77f72000 77f78ddc 00000000 80164bfc
<4>[11302.350997] 00000000 7f93ef68 000003ff 00000000 00000000 85b6de78 5c5d90c3 242d9ca4
<4>[11302.359481] ...
<4>[11302.361964] Call Trace:
<4>[11302.364462] [<8015cc20>] __kmalloc+0x24c/0x254
<4>[11302.368983] [<80189840>] seq_read+0x140/0x570
<4>[11302.373411] [<80164bfc>] __vfs_read+0x28/0x158
<4>[11302.377925] [<80164dfc>] vfs_read+0xd0/0x17c
<4>[11302.382255] [<8016537c>] SyS_read+0x58/0xc4
<4>[11302.386510] [<80071ccc>] syscall_common+0x34/0x58
<4>[11302.391280] Code: 8fb20024 8fb10020 8fb0001c <03e00008> 27bd0038 27bdffd0 afbf002c afb60028 afb50024
<4>[11302.401184]
<4>[11302.414393] ---[ end trace f5f8e35d1fa0096f ]---