Wrt32x - kernel trace back

I just setup this device a few days ago, and I'm 100% sure I did something dumb.. things continue to work well, I just noticed this OOPS in syslog / logread.

Hardware: Linksys WRT32X

Firmware Version: OpenWrt 21.02-SNAPSHOT r16460-93842b20dc / LuCI openwrt-21.02 branch git-21.365.39273-fc3aa65

Fri Jan  7 14:36:37 2022 kern.warn kernel: [166407.975505] ------------[ cut here ]------------
Fri Jan  7 14:36:37 2022 kern.warn kernel: [166407.980257] WARNING: CPU: 0 PID: 0 at backports-5.10.85-1/net/mac80211/rx.c:4966 0xbf0c9a60 [mac80211@75d2a366+0x72000]
Fri Jan  7 14:36:37 2022 kern.warn kernel: [166407.991187] Rate marked as a VHT rate but data is invalid: MCS: 10, NSS: 2
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166407.998184] Modules linked in: xt_connlimit pppoe ppp_async nf_conncount iptable_nat xt_state xt_nat xt_helper xt_conntrack xt_connmark xt_connbytes xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack ipt_REJECT xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY slhc sch_cake rfcomm nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 mwifiex_sdio mwifiex iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables hidp hci_uart crc_ccitt btusb btmrvl_sdio btmrvl btintel bnep bluetooth sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact hid evdev input_core mwlwifi mac80211 cfg80211 compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 ifb ecdh_generic ecc
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166407.998241]  kpp ecb cmac gpio_button_hotplug
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.090840] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.168 #0
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.096958] Hardware name: Marvell Armada 380/385 (Device Tree)
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.102992] Function entered at [<c010edcc>] from [<c010af34>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.108936] Function entered at [<c010af34>] from [<c075eca4>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.114880] Function entered at [<c075eca4>] from [<c0127840>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.120824] Function entered at [<c0127840>] from [<c01278e0>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.126768] Function entered at [<c01278e0>] from [<bf0c9a60>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.132723] Function entered at [<bf0c9a60>] from [<bf0ca0dc>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.138670] Function entered at [<bf0ca0dc>] from [<bf12c434>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.144617] Function entered at [<bf12c434>] from [<c012be78>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.150561] Function entered at [<c012be78>] from [<c0102288>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.156505] Function entered at [<c0102288>] from [<c012c3a0>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.162448] Function entered at [<c012c3a0>] from [<c0171c64>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.168392] Function entered at [<c0171c64>] from [<c042dd04>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.174336] Function entered at [<c042dd04>] from [<c0101a8c>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.180280] Exception stack(0xc0b01f30 to 0xc0b01f78)
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.185440] 1f20:                                     00000000 4a2e6420 dfb589b4 c01147e0
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.193741] 1f40: ffffe000 c0b04e68 c0b04ea8 00000001 00000000 c0a48568 c0b0f080 00000000
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.202041] 1f60: 00000000 c0b01f80 c01082f8 c01082fc 60000013 ffffffff
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.208770] Function entered at [<c0101a8c>] from [<c01082fc>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.214714] Function entered at [<c01082fc>] from [<c0150e78>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.220658] Function entered at [<c0150e78>] from [<c0151140>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.226601] Function entered at [<c0151140>] from [<c0a00e14>]
Fri Jan  7 14:36:38 2022 kern.warn kernel: [166408.232560] ---[ end trace 0944919a00f1234c ]---

root@OpenWrt# grep -v "option key" /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path 'soc/soc:pcie/pci0000:00/0000:00:01.0/0000:01:00.0'
        option band '5g'
        option htmode 'VHT80'
        option country 'US'
        option channel '149'
        option cell_density '0'
        option noscan '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option encryption 'psk2+ccmp'
        option wpa_disable_eapol_key_retries '1'
        option ssid '1521_5Ghz'

config wifi-device 'radio1'
        option type 'mac80211'
        option path 'soc/soc:pcie/pci0000:00/0000:00:02.0/0000:02:00.0'
        option band '2g'
        option country 'US'
        option htmode 'HT40'
        option channel '11'
        option cell_density '0'
        option noscan '1'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option encryption 'psk2+ccmp'
        option wpa_disable_eapol_key_retries '1'
        option ssid '1521_24Ghz'

config wifi-device 'radio2'
        option type 'mac80211'
        option path 'platform/soc/soc:internal-regs/f10d8000.sdhci/mmc_host/mmc0/mmc0:0001/mmc0:0001:1'
        option noscan '1'
        option htmode 'HT20'
        option band '2g'
        option channel '6'
        option cell_density '0'

config wifi-iface 'wifinet3'
        option device 'radio0'
        option mode 'ap'
        option ssid 'Nuclear Missile Silo'
        option encryption 'psk2'
        option wpa_disable_eapol_key_retries '1'
        option network 'xxxx'

config wifi-iface 'wifinet4'
        option device 'radio1'
        option mode 'ap'
        option ssid 'Giant Space Laser'
        option encryption 'psk2+ccmp'
        option wpa_disable_eapol_key_retries '1'
        option network 'xxxx'

config wifi-iface 'wifinet5'
        option device 'radio0'
        option mode 'ap'
        option ssid '1521_iot'
        option encryption 'psk2+ccmp'
        option isolate '1'
        option wpa_disable_eapol_key_retries '1'
        option network 'iot'

config wifi-iface 'wifinet6'
        option device 'radio1'
        option mode 'ap'
        option ssid '1521_iot'
        option encryption 'psk2+ccmp'
        option isolate '1'
        option wpa_disable_eapol_key_retries '1'
        option network 'iot'

config wifi-iface 'wifinet7'
        option device 'radio0'
        option mode 'ap'
        option ssid '1521_guest'
        option encryption 'psk2+ccmp'
        option isolate '1'
        option wpa_disable_eapol_key_retries '1'
        option network 'guest'

config wifi-iface 'wifinet8'
        option device 'radio1'
        option mode 'ap'
        option ssid '1521_guest'
        option encryption 'psk2+ccmp'
        option isolate '1'
        option wpa_disable_eapol_key_retries '1'
        option network 'guest'

I wonder if it is a legit noise source which causes the crash. I have the same crash call stack on a WRT3200ACM with Davidc502 fortified firmware. But I'm dealing with a noise situation.

Try official firmware.