Unbricking DM111Pv2 modem?

3 posts / 0 new
Last post
ilario
ilario's picture
Unbricking DM111Pv2 modem?

Hi all!

I come here after asking on Netgear forums. I bricked my good DM111Pv2 modem upgrading its firmware via web interface to version 2.00.30.

Now the power indicator blinks red-green, it has no network activity at all (as checked using wireshark), it doesn't accept tftp transitions.

Using a USB to UART Bridge Controller with chip CP2012 and minicom I can see some messages from the boot process:

---------------------------------------------------------
Welcome to minicom 2.7

OPTIONS: I18n
Compiled on Jan  1 2014, 09:30:18.
Port /dev/ttyUSB0, 14:39:06

Press CTRL-A Z for help on special keys

U-Boot 1.1.5-1.0.4 (Oct 31 2008 - 14:55:39)

 relocate_code start
 relocate_code finish.

 type is 000000c2
 type is 00000049/n Detect flash id is 300b1 
Flash:  2 MB
In:    serial
Out:   serial
Err:   serial
Net:   Internal Clock
Selected EPHY_MODE
AMAZON_SE Switch

Type "run flash_nfs" to mount root filesystem over NFS

Hit any key to stop autoboot:  0
Checking Images Integrity ...
BUTTON = 1
long_size_data = 001bff46, ulong_size_crc = d28c  Kernel: CRC Error
NetLoop DOWNB command
Download from server 192.168.11.10; our IP address is 192.168.11.30
Filename 'images'.
30:46:ffffff9a:2a:29:7c

Download mode ...
---------------------------------------------------------

And then nothing. Pinging 192.168.11.30 doesn't work, placing a http server on 192.168.11.10 serving the firmware image as a file named 'images' doesn't work (still no network activity). I can't interact with the boot process, for example if I press ctrl+c nothing changes.

What could I try to do?

Thanks,
Ilario Gelmetti

maxfanto
maxfanto's picture
Ciao Ilario,

Ciao Ilario,
I was able to rescue the router... follow your thread on netgear forum.

Max

ilario
ilario's picture
ZOMG thank you so much! Your

ZOMG thank you so much! Your solution worked for me!!
http://forum1.netgear.com/showthread.php?t=91259

I copy and paste here your post on Netgear forum:

From Computer run a TFTP SERVER, you must download from netgear site the firmware, unzip and rename it from:
DM111Pv2_V2.00.31.img to images and put in the directory of TFT server.
1) From uboot (the command is after AMAZON_SE-3M-0.9#) you must load in RAM the firmware:
Code:

AMAZON_SE-3M-0.9# tftp 080400000 images
Using AMAZON_SE Switch device
TFTP from server 192.168.0.3; our IP address is 192.168.0.1
Filename 'images'.
Load address: 0x80400000
Loading: *#################################################################
#################################################################
#################################################################
#################################################################
#################################################################
#################################################################
####################
done
Bytes transferred = 2097152 (200000 hex)

2) *** VERY dangerous, with this command you erase the U-boot, if you are not sure of this operation you can stop here.... ***
We must erase the flash
Code:

AMAZON_SE-3M-0.9# protect off all

Un-Protect Flash Bank # 1

and
AMAZON_SE-3M-0.9# erase all

Erase Flash Bank # 1
............. done

3) We must copy the firmware from RAM to FLASH
AMAZON_SE-3M-0.9# cp.b 80400000 B0000000 1fffff

Copy to Flash... done

4) We can check if the FLASH is OK:
Code:

AMAZON_SE-3M-0.9# md b0000000

b0000000: 10000123 00000000 10000121 00000000 ...#.......!....
b0000010: 688c688c 00000000 10000175 00000000 h.h........u....
b0000020: 10000173 00000000 10000171 00000000 ...s.......q....
b0000030: 1000016f 00000000 1000016d 00000000 ...o.......m....
b0000040: 1000016b 00000000 10000169 00000000 ...k.......i....
b0000050: 10000167 00000000 10000165 00000000 ...g.......e....
b0000060: 10000163 00000000 10000161 00000000 ...c.......a....
b0000070: 1000015f 00000000 1000015d 00000000 ..._.......]....
b0000080: 1000015b 00000000 10000159 00000000 ...[.......Y....
b0000090: 10000157 00000000 10000155 00000000 ...W.......U....
b00000a0: 10000153 00000000 10000151 00000000 ...S.......Q....
b00000b0: 1000014f 00000000 1000014d 00000000 ...O.......M....
b00000c0: 1000014b 00000000 10000149 00000000 ...K.......I....
b00000d0: 10000147 00000000 10000145 00000000 ...G.......E....
b00000e0: 10000143 00000000 10000141 00000000 ...C.......A....
b00000f0: 1000013f 00000000 1000013d 00000000 ...?.......=....

or
Code:

AMAZON_SE-3M-0.9# md b0180000

b0180000: 27051956 033b3d7d 5386c855 0007981d '..V.;=}S..U....
b0180010: 80002000 8017a040 fcd66e2d 05050203 .. [email protected]....
b0180020: 4d495053 204c696e 75782d32 2e342e33 MIPS Linux-2.4.3
b0180030: 31444d31 31312000 00000000 00000000 1DM111 .........
b0180040: 5d000080 0000901a 00000000 00001e00 ]...............
b0180050: 8c81b669 9391a182 56068357 acafe76e ...i....V..W...n
b0180060: 1f2564be aed5c8f7 cf89cef6 4b3ca30a .%d.........K<..> b0180070: 7e683214 e3621b34 c0a59376 67f0797f ~h2..b.4...vg.y.
b0180080: df61f893 de29baa8 ec6066c2 776f6ebb .a...)...`f.won.
b0180090: eb6849ce d3a80b73 91ad6f26 707c9fd4 .hI....s..o&p|..
b01800a0: e933f05d 2ff51acc 51b90d6d 7642742b .3.]/...Q..mvBt+
b01800b0: 9b570623 b9f5edd2 b16892ef f7a57d4e .W.#.....h....}N
b01800c0: bce269e1 90689a92 e5b877b3 3fabbabc ..i..h....w.?...
b01800d0: 6475687a 6faf855c 59a77d0d 2f08104d duhzo..\Y.}./..M
b01800e0: e9024b54 43ab4f89 607d1ca0 7c3ea43d ..KTC.O.`}..|>.=
b01800f0: f7fe6ed4 a039b5a2 644836fe ba8d325f ..n..9..dH6...2_

5) That is all.... pray and now
Code:

AMAZON_SE-3M-0.9# reset