OpenWrt Firmware for Archer c6 v3.2

On 22.03.2, r19803-9a599fee93 I get almost daily this error message in the logs:

Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.035389] ------------[ cut here ]------------
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.040098] WARNING: CPU: 2 PID: 812 at target-mipsel_24kc_musl/linux-ramips_mt7621/mt76-2022-09-06-d7054646/mt7603/mac.c:208 0x827e4864 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.054611] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_compat nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mt7615e mt7615_common mt7603e mt76_connac_lib mt76 mac80211 libchacha20poly1305 iptable_mangle iptable_filter ipt_REJECT ipt_ECN ip_tables cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY x_tables slhc sch_cake poly1305_mips nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_ipv6 nf_log_ipv4 nf_log_common nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c hwmon crc_ccitt compat chacha_mips sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.055225]  cls_tcindex cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact ifb ip6_udp_tunnel udp_tunnel sha256_generic libsha256 seqiv jitterentropy_rng drbg kpp hmac cmac leds_gpio gpio_button_hotplug crc32c_generic
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.164698] CPU: 2 PID: 812 Comm: napi/phy0-7 Not tainted 5.10.146 #0
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.171213] Stack : 00000000 8072637c 809b0000 80000000 00000000 00000000 00000000 00000000
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.179586]         00000000 00000000 00000000 00000000 00000000 00000001 82507c08 cd70ff73
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.187954]         82507ca0 00000000 00000000 82507ab0 00000038 80399bc4 ffffffea 00000000
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.196326]         82507abc 0000017d 807ca868 ffffffff 82507be8 806f5114 00000000 806f0000
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.204699]         00000009 00000000 00003a98 80000000 00000018 80403500 00000008 80990008
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.213071]         ...
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.215517] Call Trace:
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.215591] [<80399bc4>] 0x80399bc4
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.221515] [<80403500>] 0x80403500
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.225005] [<80007b08>] 0x80007b08
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.228482] [<80007b10>] 0x80007b10
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.231960] [<8037ecd4>] 0x8037ecd4
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.235460] [<827e4864>] 0x827e4864 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.241185] [<8007fb60>] 0x8007fb60
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.244673] [<827e4864>] 0x827e4864 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.250399] [<8003007c>] 0x8003007c
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.253891] [<827e4864>] 0x827e4864 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.259619] [<80030144>] 0x80030144
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.263118] [<827e4864>] 0x827e4864 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.268842] [<8005bd80>] 0x8005bd80
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.272337] [<825b0268>] 0x825b0268 [mt76@bb4be886+0xafe0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.277837] [<827e49f8>] 0x827e49f8 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.283573] [<825b646c>] 0x825b646c [mt76@bb4be886+0xafe0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.289059] [<825b3c0c>] 0x825b3c0c [mt76@bb4be886+0xafe0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.294561] [<827e1b68>] 0x827e1b68 [mt7603e@5f35bd0c+0x96e0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.300319] [<825b50f0>] 0x825b50f0 [mt76@bb4be886+0xafe0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.305852] [<825b1b04>] 0x825b1b04 [mt76@bb4be886+0xafe0]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.311328] [<80060858>] 0x80060858
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.314841] [<8050a284>] 0x8050a284
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.318323] [<806d8590>] 0x806d8590
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.321810] [<8050a448>] 0x8050a448
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.325286] [<8050a464>] 0x8050a464
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.328779] [<80050aec>] 0x80050aec
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.332284] [<8050a3a4>] 0x8050a3a4
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.335758] [<80050d54>] 0x80050d54
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.339235] [<80050c18>] 0x80050c18
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.342725] [<80050c18>] 0x80050c18
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.346207] [<80002f38>] 0x80002f38
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.349699]
Thu Nov 24 22:54:14 2022 kern.warn kernel: [35153.351397] ---[ end trace 9e6415458a7244f3 ]---

I have installed wireguard, DDNS scipts, SQM and WIFI Schedule. I jumped directly to 22.03.2 from 22.03.0. Am I the only one getting the errors? The router is working fine, solid uptime for 2 months, until recent issues with ISP that requested restart.

Hi Cyrusd,

Is this a reply to my post above asking whether I can use the Tplink Archer C6 as a VPN router with ExpressVPN?
If it is then yes, I'm aware they can be unbricked, but from scrolling through the many messages in this thread I understand its no easy process with this TPlink Archer C6, and like anyone I'm hoping to avoid it completely.

In the absence of any help I've been searching around online to find answers myself, and the closest resource I've found is this but it leaves a few questions such as
(1) Will it work in newer OpenWRT builds noting it seems to have been written for 19.07?
(2) Will it run on an M2 Macbook that I'm considering doing all this from? According to the wiki for this package it doesn't have any ARM_64 entries which I'm guessing means I'm SOL?

Again, any replies to my original question from 2 days ago will also earn you special credits .-)

Hey
The unbricking Archer c6 in case of a bad firmware is very easy.
yesterday I tried to install openwrt for ArcherA6 on archer c6 ( so I can user 21 version) which broke the device, all LEDs were solid, then I connect one of it's lan ports to my laptop and give laptop 192.168.0.66 IP address, after about 30 seconds I could login to archer c6 with 192.168.0.1 and upload factory firmware.

1 Like

One week ago i installed latest stable version of openwrt 22.03.2 on my Archer c6us model router .The firmware is rock solid, no disconnection or any wifi related problems. previously i had problems like wifi 2g range issue and other wifi related problem but all of the issues [only 95% of 2g wifi range issue is fixed] are fixed in this update.i only enabled sqm as extra feature.i haven't tested the lan stability yet.
one thing everyone should keep in mind not to apply old backup ,when i first installed this version i applied a backup from January and i faced many issues then i reset and configure the router again and it fixed all the issues.