The simple answer is "no".
The pragmatic answer is "no".
The real answer is more complicated, and utterly device specific…
…and at least I don't find much (any) information about a DIR-612/F/EID (typo, or bad searching on my side?).
First of all there are four potential points of contention:
- how is the switch hard-strapped
meaning, in what configuration will it come up after power-on, before the SOC/ bootloader initializes it
- how does the bootloader configure it/ leave it configured
- what is the default state the kernel module leaves it in
- how long does it take for netifd to apply the user specified configuration
In all of these, timing matters, how long is (are) the period(s) of all ports being bridged together, is it long enough for the DHCP handshake to succeed (and is that 'encouraged' by link-down events) - and yes, this also kind of depends how quick your client reacts (so not really an absolute number). If you want to really fix this, you have to profile the timing of each of these steps, to evaluate where your pinch points are.
These issues are kind of well-known and with the typical design of one CPU to a single (simple) managed onboard switch hard to mitigate, if not properly accounted for by the vendor - in most cases you can't totally remove the periods of full-bridge mode, only mitigate it by reducing the bridged time down to a period that might not allow a DHCP handshake to succeed (cheating).
Some of these mitigations involve an intermediary loader chainloaded between bootloader and kernel, whose only task is to deactivate all bridges/ all ports (it will not fix the situation, but hopefully reduce the time enough in practice), until the kernel/ netifd brings them up again in a sensible manner. There is precedent for this approach, if it succeeds depends on what the first two bullet points do/ how long it takes from ifup (in bridged mode) to the actual configuration. The 'beauty' of this is, that it's relatively generic (apart from the switch specific support) and relatively safe to do and experiment with, as it never touches the OEM bootloader. If this is sufficient depends all on the exact device specific timing.
If that isn't enough, the only remaining option is indeed to change the bootloader, for this to succeed you need:
- the bootloader source
…and hope that the vendor provides you with it, complete and in working order
…and hope that your own compilation (using your toolchain/ configuration) will work
- serial console access
- the ability to rewrite the whole flash chip (or JTAG level access, the former is easier than JTAG, the later gives you more hardware level insight)
you will need it/ you will break it, soldering on a socketed option will be beneficial
- the actual development skills do change the switch bringup sequence to your liking
- a lot of hope that the vendor isn't using secure boot (which is becoming increasingly common on ARMv8 based platforms)
- the hope that the hard-strapping is in your favour/ respectively the bootloader loads quick enough to meet your requirements
If your environment is sensitive to this issue, it might make more sense to switch hardware to something not exposing this issue by design, e.g. to hardware without an integrated switch but using dedicated interfaces (e.g. x86_64, rockchip, RPi, etc.). This would be the most pragmatic (and safest) way out, as it guarantees that there will be no spillover whatsoever.