Installed OpenWRT on LB-Link W1210M AC1200

I installed Open WRT on LB-Link W1210M from Wavlink WL-WN575A3.

It works fine but there are few problems
5G and 2.4g leds not working
Reset button not working
Booting time is around 2 minutes

Product link : https://www.lb-link.com/W1210M-AC1200-Wireless-Dual-Band-Router-pd568675568.html
Firmware link : https://openwrt.org/toh/wavlink/wl-wn575a3

Is there anyway we can get boot time of 20-30 seconds from 2 mintues ?

you installed a firmware for a different device, all bets are off.

firmwares aren't cross flashable, unless confirmed 100% identical.
you just confirmed they're not.

Do you have original flash backed up? You will need factory calibration data for radios which usually is near mac addresses.
LEDs to be explored later. Basically record leds that work, export gpios and check if new ones react.
For 2 minutes check logread/dmesg via serial.
Is there a burn mark near leds?

1 Like

Yes i have orginal firmwares which i can flash anytime with tftpd.

No there isnt burn mark near leds, which works fine in stock

Update : After flashing Zbtlink ZBT-WE2426-B leds and reset buttons also stated working.

You should flash back to vendor firmware, get boot logs from that, which might have some pointers to what addresses / devices need to be configured.
You'd also ideally retrieve a devicetree from the vendor firmware if they've used this in their version (often older firmwares don't use devicetree).
And you'll want to locate where the vendor firmware is storing your unique MAC address on the device.
Also as @brada4 mentioned, you'll want to capture the calibration data for the radios that is unique to the device design.

If the OpenWRT firmware for the Wavlink WL-WN575A3 didn't make the device explode, then that's a pretty good sign. There's likely a significantly amount of shared configuration between the two. If your wifi worked, then the wifi configuration is close enough, just the specific calibration data that should get loaded. It sounds like LEDs, reset button and some other things might not be right though... so you'll need to find data for them, so that you can put together a new device in OpenWRT for it.

Thankyou for the reply i got this

Wed Jun 7 11:33:32 2023 user.emerg syslog: switch reg write offset=40, value=1001

Wed Jun 7 11:33:32 2023 user.emerg syslog: switch reg write offset=44, value=1001

Wed Jun 7 11:33:32 2023 user.emerg syslog: switch reg write offset=48, value=1002

Wed Jun 7 11:33:32 2023 user.emerg syslog: switch reg write offset=70, value=ffff506f

Wed Jun 7 11:33:32 2023 user.emerg syslog: switch reg write offset=74, value=ffffffff

Wed Jun 7 11:33:32 2023 user.emerg syslog: done.

Wed Jun 7 11:33:32 2023 kern.warn kernel: [ 19.528000] ipaddr:192.168.16.1

Wed Jun 7 11:33:32 2023 kern.warn kernel: [ 19.532000] local_ip:110a8c0

Wed Jun 7 11:33:32 2023 kern.warn kernel: [ 19.540000] init ok

Wed Jun 7 11:33:32 2023 kern.warn kernel: [ 19.544000] welcome to use flow_manage.ko version=1.4.0 date=20191120 man=nicexie

Wed Jun 7 11:33:32 2023 user.emerg syslog: ifconfig: br-lan: error fetching interface information: Device not found

Wed Jun 7 11:33:32 2023 user.emerg syslog: no such entry!

Wed Jun 7 11:33:32 2023 user.emerg syslog: /etc/rc.common: line 1: domain: not found

Wed Jun 7 11:33:32 2023 user.emerg syslog: killall: daemon: no process killed

Wed Jun 7 11:33:32 2023 user.emerg syslog: /etc/rc.common: line 1: hwnatBoot.sh: not found

Wed Jun 7 11:33:33 2023 user.emerg syslog: ping: unknown host www.jd.com

Wed Jun 7 11:33:34 2023 user.emerg syslog: this file has been obseleted. please call "/sbin/block mount" directly

Wed Jun 7 11:33:34 2023 user.emerg syslog: device_name=mt7628

Wed Jun 7 11:33:35 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:35 2023 user.emerg syslog: set (8BE2): Network is down

Wed Jun 7 11:33:35 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:35 2023 user.emerg syslog: set (8BE2): Network is down

Wed Jun 7 11:33:35 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:35 2023 user.emerg syslog: set (8BE2): Network is down

Wed Jun 7 11:33:35 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:35 2023 user.emerg syslog: set (8BE2): Network is down

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.640000] ra2880stop()...Done

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.648000] Free TX/RX Ring Memory!

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.740000] 2C:FFFFFFC3:FFFFFFE6:FFFFFFEB:10:FFFFFFD9

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.752000] Raeth v3.1 (Tasklet,SkbRecycle)

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.760000]

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.760000] phy_tx_ring = 0x02322000, tx_ring = 0xa2322000

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.776000]

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.776000] phy_rx_ring0 = 0x02310000, rx_ring[0] = 0xa2310000

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.788000]

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.788000] phy_rx_ring0 = 0x02310000, rx_ring[0] = 0xa2310000

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.820000] GMAC1_MAC_ADRH -- : 0x00002cc3

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.828000] GMAC1_MAC_ADRL -- : 0xe6eb10d9

Wed Jun 7 11:33:35 2023 kern.warn kernel: [ 22.836000] RT305x_ESW: Link Status Changed

Wed Jun 7 11:33:36 2023 kern.info kernel: [ 22.848000] device eth0.1 entered promiscuous mode

Wed Jun 7 11:33:36 2023 kern.info kernel: [ 22.856000] device eth0 entered promiscuous mode

Wed Jun 7 11:33:36 2023 kern.info kernel: [ 22.876000] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready

Wed Jun 7 11:33:36 2023 kern.info kernel: [ 22.896000] br-lan: port 1(eth0.1) entered forwarding state

Wed Jun 7 11:33:36 2023 kern.info kernel: [ 22.908000] br-lan: port 1(eth0.1) entered forwarding state

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'lan' is enabled

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'lan' is setting up now

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'lan' is now up

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'loopback' is enabled

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'loopback' is setting up now

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'loopback' is now up

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'wan' is enabled

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'wan' is setting up now

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Interface 'wan6' is enabled

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Network device 'eth0' link is up

Wed Jun 7 11:33:36 2023 daemon.notice netifd: Bridge 'br-lan' link is up

Wed Jun 7 11:33:36 2023 kern.warn kernel: [ 23.560000] TX_BCN DESC a26ea000 size = 320

Wed Jun 7 11:33:36 2023 kern.warn kernel: [ 23.568000] RX[0] DESC a26ed000 size = 1024

Wed Jun 7 11:33:36 2023 kern.warn kernel: [ 23.580000] RX[1] DESC a26ee000 size = 1024

Wed Jun 7 11:33:37 2023 daemon.notice netifd: wan (1434): udhcpc (v1.23.2) started

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.676000] E2pAccessMode=2

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.684000] cfg_mode=9

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.688000] cfg_mode=9

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.692000] wmode_band_equal(): Band Equal!

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.700000] AndesSendCmdMsg: Could not send in band command due to diable fRTMP_ADAPTER_MCU_SEND_IN_BAND_CMD

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.724000] APSDCapable[0]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.728000] APSDCapable[1]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.736000] APSDCapable[2]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.740000] APSDCapable[3]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.748000] APSDCapable[4]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.752000] APSDCapable[5]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.760000] APSDCapable[6]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.764000] APSDCapable[7]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.768000] APSDCapable[8]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.776000] APSDCapable[9]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.780000] APSDCapable[10]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.788000] APSDCapable[11]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.792000] APSDCapable[12]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.800000] APSDCapable[13]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.804000] APSDCapable[14]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.812000] APSDCapable[15]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 23.816000] default ApCliAPSDCapable[0]=0

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.216000] Key1Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.228000] Key1Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.240000] Key2Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.248000] Key2Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.260000] Key3Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.268000] Key3Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.280000] Key4Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.292000] Key4Str is Invalid key length(0) or Type(0)

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.376000] RTMPSetDefaultChannel() : default channel to 1

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.388000] load fw image from fw_header_image

Wed Jun 7 11:33:37 2023 kern.warn kernel: [ 24.396000] AndesMTLoadFwMethod1(2182)::pChipCap->fw_len(64848)

Wed Jun 7 11:33:38 2023 daemon.notice netifd: wan (1434): Sending discover...

Wed Jun 7 11:33:38 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)

Wed Jun 7 11:33:38 2023 daemon.err insmod: module is already loaded - xt_multiport

Wed Jun 7 11:33:38 2023 daemon.err insmod: module is already loaded - xt_comment

Wed Jun 7 11:33:38 2023 daemon.err insmod: module is already loaded - xt_length

Wed Jun 7 11:33:40 2023 daemon.notice netifd: wan (1434): Sending discover...

Wed Jun 7 11:33:43 2023 daemon.notice netifd: wan (1434): Sending discover...

Wed Jun 7 11:33:45 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:45 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:45 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:45 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:46 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:46 2023 user.emerg syslog: set (8BE2): Invalid argument

Wed Jun 7 11:33:46 2023 user.emerg syslog: device_name=mt7628

Wed Jun 7 11:33:47 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:47 2023 daemon.warn odhcpd[1271]: DHCPV6 REQUEST IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:47 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:47 2023 user.emerg syslog: device_name=mt7628

Wed Jun 7 11:33:47 2023 daemon.err insmod: module is already loaded - xt_multiport

Wed Jun 7 11:33:47 2023 daemon.err insmod: module is already loaded - xt_comment

Wed Jun 7 11:33:47 2023 daemon.err insmod: module is already loaded - xt_length

Wed Jun 7 11:33:47 2023 user.emerg syslog: Interface doesn't accept private ioctl...

Wed Jun 7 11:33:47 2023 user.emerg syslog: set (8BE2): Invalid argument

Wed Jun 7 11:33:47 2023 user.emerg syslog: device_name=mt7612e

Wed Jun 7 11:33:48 2023 daemon.warn odhcpd[1271]: DHCPV6 REQUEST IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:33:48 2023 user.emerg syslog: Generating RSA private key, 1024 bit long modulus

Wed Jun 7 11:33:50 2023 user.emerg syslog: Generating selfsigned certificate with subject 'C=ZZ,ST=Somewhere,L=Uknown,CN=OpenWrt,' and validity 20230607060348-20250606060348

Wed Jun 7 11:33:51 2023 daemon.crit xl2tpd[1920]: setsockopt recvref[30]: Protocol not available

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Using l2tp kernel support.

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: xl2tpd version xl2tpd-1.3.6 started on myblink.local PID:1920

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Forked by Scott Balmos and David Stipp, (C) 2001

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Inherited by Jeff McAdams, (C) 2002

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Forked again by Xelerance (www.xelerance.com) (C) 2006

Wed Jun 7 11:33:51 2023 daemon.info xl2tpd[1920]: Listening on IP address 0.0.0.0, port 1701

Wed Jun 7 11:33:52 2023 user.emerg syslog: mount_root done.

Wed Jun 7 11:33:52 2023 user.emerg syslog: emmc_partition_find(0x74b008, rootfs_data)

Wed Jun 7 11:33:52 2023 user.emerg syslog: (null) is not created by block2mtd, skip.

Wed Jun 7 11:33:52 2023 user.emerg syslog: No jffs2 marker was found

Wed Jun 7 11:33:52 2023 user.emerg syslog: rootfs_data, normally, jffs2_switch.

Wed Jun 7 11:33:52 2023 user.emerg syslog: No jffs2 marker was found

Wed Jun 7 11:33:52 2023 user.emerg syslog: no jffs2 marker found

Wed Jun 7 11:33:53 2023 user.emerg syslog: doing fo cleanup

Wed Jun 7 11:33:53 2023 user.emerg syslog: connect: Network is unreachable

Wed Jun 7 11:33:53 2023 user.emerg syslog: network nok

Wed Jun 7 11:33:53 2023 user.emerg syslog: start cmd_convert: /usr/bin/cmd_convert

Wed Jun 7 11:33:54 2023 user.emerg syslog: start usr_flow: /usr/bin/usr_flow

Wed Jun 7 11:33:54 2023 daemon.info procd: - init complete -

Wed Jun 7 11:33:56 2023 daemon.emerg procd: ----- get wifi config date form /etc/config/wireless. -----

Wed Jun 7 11:33:56 2023 daemon.emerg procd: ssid=LBLINK-10D9-5G, encryption=none, key=123456789, ifc_name=rai0

Wed Jun 7 11:33:56 2023 daemon.emerg procd: --- set SSIDSingle, AuthModeSingle, EncrypType. -----

Wed Jun 7 11:33:56 2023 daemon.emerg procd: ssid=LBLINK-10D9-5G, authmode=OPEN, encryptype=NONE, key=123456789

Wed Jun 7 11:33:56 2023 daemon.emerg procd: set TxPower=100

Wed Jun 7 11:33:56 2023 daemon.emerg procd: authmode=OPEN, encryptype==NONE.

Wed Jun 7 11:33:56 2023 daemon.emerg procd: authmode=OPEN, encryptype==NONE.

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: started, version 2.73 cachesize 150

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: DNS service limited to local subnets

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq-dhcp[2161]: DHCP, IP range 192.168.16.100 -- 192.168.16.249, lease time 12h

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: using local addresses only for domain lan

Wed Jun 7 11:33:57 2023 daemon.warn dnsmasq[2161]: no servers found in /tmp/resolv.conf.auto, will retry

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: read /etc/hosts - 1 addresses

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: read /tmp/hosts/dhcp - 1 addresses

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq[2161]: read /tmp/hosts/odhcpd - 1 addresses

Wed Jun 7 11:33:57 2023 daemon.info dnsmasq-dhcp[2161]: read /etc/ethers - 0 addresses

Wed Jun 7 11:33:57 2023 daemon.err usr_flow[2057]: killall: switch: no process killed

Wed Jun 7 11:33:57 2023 user.emerg syslog: device_name=mt7612e

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=14, value=405555

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=50, value=2001

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=98, value=7f3f

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=e4, value=3f

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=40, value=1001

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=44, value=1001

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=48, value=1002

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=70, value=ffff506f

Wed Jun 7 11:34:00 2023 user.emerg syslog: switch reg write offset=74, value=ffffffff

Wed Jun 7 11:34:01 2023 user.emerg syslog: done.

Wed Jun 7 11:34:01 2023 daemon.info dnsmasq[2161]: exiting on receipt of SIGTERM

Wed Jun 7 11:34:04 2023 daemon.err uhttpd[1904]: no such entry!

Wed Jun 7 11:34:05 2023 daemon.err uhttpd[1904]: no such entry!

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: started, version 2.73 cachesize 150

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: DNS service limited to local subnets

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq-dhcp[2483]: DHCP, IP range 192.168.16.100 -- 192.168.16.249, lease time 12h

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: using local addresses only for domain lan

Wed Jun 7 11:34:06 2023 daemon.warn dnsmasq[2483]: no servers found in /tmp/resolv.conf.auto, will retry

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: read /etc/hosts - 1 addresses

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/dhcp - 1 addresses

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/odhcpd - 1 addresses

Wed Jun 7 11:34:06 2023 daemon.info dnsmasq-dhcp[2483]: read /etc/ethers - 0 addresses

Wed Jun 7 11:34:07 2023 daemon.crit stund: configuration (re)loading failed, exit daemon

Wed Jun 7 11:34:09 2023 daemon.notice netifd: VLAN 'eth0.2' link is down

Wed Jun 7 11:34:09 2023 daemon.notice netifd: Interface 'wan' has link connectivity loss

Wed Jun 7 11:34:09 2023 daemon.notice netifd: Interface 'wan6' has link connectivity loss

Wed Jun 7 11:34:09 2023 daemon.notice netifd: wan (1434): Read error: Network is down, reopening socket

Wed Jun 7 11:34:10 2023 daemon.info dnsmasq-dhcp[2483]: DHCPREQUEST(br-lan) 192.168.16.163 30:e1:71:24:d1:af

Wed Jun 7 11:34:10 2023 daemon.info dnsmasq-dhcp[2483]: DHCPACK(br-lan) 192.168.16.163 30:e1:71:24:d1:af DESKTOP-UDLO6BK

Wed Jun 7 11:34:10 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:34:11 2023 daemon.warn odhcpd[1271]: DHCPV6 SOLICIT IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:34:11 2023 daemon.info dnsmasq[2483]: read /etc/hosts - 1 addresses

Wed Jun 7 11:34:11 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/dhcp - 1 addresses

Wed Jun 7 11:34:11 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/odhcpd - 0 addresses

Wed Jun 7 11:34:11 2023 daemon.info dnsmasq-dhcp[2483]: read /etc/ethers - 0 addresses

Wed Jun 7 11:34:11 2023 daemon.err uhttpd[1904]: no such entry!

Wed Jun 7 11:34:12 2023 daemon.warn odhcpd[1271]: DHCPV6 REQUEST IA_NA from 0001000130fb68a530e17124d1af on br-lan: ok fd63:81ab:e564::7d8/128

Wed Jun 7 11:34:12 2023 daemon.info dnsmasq[2483]: read /etc/hosts - 1 addresses

Wed Jun 7 11:34:12 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/dhcp - 1 addresses

Wed Jun 7 11:34:12 2023 daemon.info dnsmasq[2483]: read /tmp/hosts/odhcpd - 1 addresses

Wed Jun 7 11:34:12 2023 daemon.info dnsmasq-dhcp[2483]: read /etc/ethers - 0 addresses

Wed Jun 7 11:34:12 2023 daemon.notice netifd: wan (1434): udhcpc: sendto: Network is down

Wed Jun 7 11:34:12 2023 daemon.notice netifd: wan (1434): Read error: Network is down, reopening socket

Wed Jun 7 11:34:13 2023 daemon.err uhttpd[1904]: uci: Entry not found

Wed Jun 7 11:34:13 2023 daemon.err uhttpd[1904]: uci: Entry not found

Wed Jun 7 11:34:13 2023 daemon.err uhttpd[1904]: uci: Entry not found

Wed Jun 7 11:34:15 2023 daemon.notice netifd: wan (1434): udhcpc: sendto: Network is down

Wed Jun 7 11:34:15 2023 daemon.notice netifd: wan (1434): Read error: Network is down, reopening socket

Wed Jun 7 11:34:16 2023 daemon.err uhttpd[1904]: no such entry!

From AI my device tree looks like

/dts-v1/;

#include "mt7628an.dtsi"

/ {
    compatible = "vendor,device-model", "mediatek,mt7628an-soc";
    model = "LB-LINK MT7628 Wireless Router";

    aliases {
        led-boot = &led_power;
        led-failsafe = &led_power;
    };

    memory@0 {
        device_type = "memory";
        reg = <0x0 0x8000000>; // Likely 128MB RAM based on mt7628 standard
    };
};

&ethernet {
    mtd-mac-address = <&factory 0x28>; // Reference to the MAC ADRH/ADRL in logs
};

&pcie {
    status = "okay";

    pcie-bridge {
        mt7612@0,0 {
            reg = <0x0000 0 0 0 0>;
            mediatek,mtd-eeprom = <&factory 0x8000>; // The 5G chip
        };
    };
};

&wmac {
    status = "okay";
    mediatek,mtd-eeprom = <&factory 0x0000>; // The 2.4G internal radio
};

Please post a complete OEM boot log.

1 Like

That was the full system log file i got from stock firmware after logging 192.168.16.1

only device tree is from ai , log is orginal

You have to extract (binwalk, dd) and decompile (dtc) device tree from the firmware image. AI generates something that looks like dts but not based on actual fasts. No wonder it does not match the hardware.

I found that the oem stock firmware use too old kernel 2.6.3 so there is no dts but i got the files 01_leds ,02_networks, boot etc . what should i do next

binwalk the firmware you linked or oem mtd bavkup with the purpose if getting dtb bits out of it.

I tried everything but didnt got that dtb

here is oem rom https://www.lb-link.com/phoenix/admin/download?fileId=jvUfAREmKjCt&dp=GvUApKfKKUAU

Stop posting pictures, thanks. They are 101% unrelated to extracting dtb from oem fw.

1 Like

Sorry i dont know much about it ,
Is this dts

xtiger@xtiger-HP-ENVY-x360-Convertible:~/Desktop/openwrt$ grep -r "mtd" squashfs-root/etc/
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary devdata 7)
squashfs-root/etc/board.d/02_network:		lan_mac=$(mtd_get_mac_ascii nvram lanmac)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_ascii nvram wanmac)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_ascii config WAN_MAC_ADDR)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 40)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 32772)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 46)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 4)
squashfs-root/etc/board.d/02_network:		lan_mac=$(mtd_get_mac_binary factory 4)
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 40)
squashfs-root/etc/board.d/02_network:		local index="$(find_mtd_index "board_data")"
squashfs-root/etc/board.d/02_network:		wan_mac="$(grep -m1 mac= "/dev/mtd${index}" | cut -d= -f2)"
squashfs-root/etc/board.d/02_network:		wan_mac=$(mtd_get_mac_binary factory 4)
squashfs-root/etc/board.d/02_network:		lan_mac=$(mtd_get_mac_binary factory 46)
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:	local mtd
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:	mtd=$(find_mtd_part $part)
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:	[ -n "$mtd" ] || \
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:		rt2x00_eeprom_die "no mtd device found for partition $part"
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:	dd if=$mtd of=/lib/firmware/$FIRMWARE bs=1 skip=$offset count=$count 2>/dev/null || \
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:		rt2x00_eeprom_die "failed to extract from $mtd"
squashfs-root/etc/hotplug.d/firmware/10-rt2x00-eeprom:		rt2x00_eeprom_die "Please define mtd-eeprom in $board DTS file!"
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:	local mtd
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:	mtd=$(find_mtd_part $part)
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:	[ -n "$mtd" ] || \
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:		mtk_wifi_e2p_die "no mtd device found for partition $part"
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:	dd if=$mtd of=/lib/firmware/$FIRMWARE bs=$count skip=$offset count=1 2>/dev/null || \
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:		mtk_wifi_e2p_die "failed to extract from $mtd"
squashfs-root/etc/hotplug.d/firmware/11-mtk-wifi-e2p:    EEPROM_size=`cat /proc/mtd | grep "Factory" | cut -d ' ' -f 2`
squashfs-root/etc/uci-defaults/09_fix-seama-header:	mtd fixseama $part

And stop asking AI, it's a f-ing moron.

1 Like

binwalk shows offset where you find DTB, you extract that using dd, then de-compile using dtc, only then you have dts file. Then inside that look fir led gpios etc and adjust your dts accordingly.
Please take care to remove all AI generated content.