Your Universal Remote Control Center
RemoteCentral.com
Philips Pronto Professional Forum - View Post
Previous section Next section Up level
Up level
The following page was printed from RemoteCentral.com:

Login:
Pass:
 
 

Topic:
Hacking the Pronto Pro Firmware?
This thread has 7 replies. Displaying all posts.
Post 1 made on Sunday October 22, 2023 at 19:14
canavan
Long Time Member
Joined:
Posts:
July 2004
20
Has anyone around here ever attempted to modify or extend the Pronto firmware? Considering that a firmware update consists of just a Linux kernel (2.4.20), and a few JFFS2 firmware images, it may be feasible to replace e.g. wpa_supplicant or mess around with the netifd ([Link: openwrt.org]) binary to improve WiFi handling (or at least extend the delay until the WiFi interface is shut down). The Linux distribution is apparently MontaVista Linux 3.3.1, which is unfortunately commercial. Access to a serial console (there should be a getty running on /dev/ttyMX0) on the remote and the ability to re-flash an unmodified firmware would be almost essential to get anywhere with such a hack.
Post 2 made on Tuesday October 24, 2023 at 19:49
Lyndel McGee
RC Moderator
Joined:
Posts:
August 2001
12,997
It was done once for the TSU9300

[Link: remotecentral.com]

Note that the remote uses BusyBox.
Lyndel McGee
Philips Pronto Addict/Beta Tester
OP | Post 3 made on Wednesday October 25, 2023 at 16:01
canavan
Long Time Member
Joined:
Posts:
July 2004
20
Thanks. The 9300 and 9600 use almost the same firmware, they are both based on Montavista 3.3.1 and use busybox as their shell and for the usual Unix tools.

If anyone wants to try enabling prontoscript in the TSU 9300 with 7.3.3, setting

APPLI_ARGS="-E prontoscript"

in /run.sh in the optfs may be sufficient. Surprisingly, the Appli binary that contains the actual Pronto software is 1.2MB on the 9300 and only 0.8MB on the 9600.
Post 4 made on Thursday October 26, 2023 at 17:51
Lyndel McGee
RC Moderator
Joined:
Posts:
August 2001
12,997
That's because the 9300 and the 9600 have different IR processing engines. The 9600 and the 9800 support more IR code formats than the 9300/9400 IIRC.

I know from past experience that the TSU firmware.exe extracts the image to a temp folder and all the files are read-only at this point. When you exit the program, this folder is removed.

As you seem to be looking inside the 9300 with putty or some other tool, I'm curious as to how you got to connect to the 9300 console. Or by chance did you just mount one of the jffs files from the image?
Lyndel McGee
Philips Pronto Addict/Beta Tester
OP | Post 5 made on Tuesday November 14, 2023 at 17:44
canavan
Long Time Member
Joined:
Posts:
July 2004
20
On October 26, 2023 at 17:51, Lyndel McGee said...
That's because the 9300 and the 9600 have different IR processing engines. The 9600 and the 9800 support more IR code formats than the 9300/9400 IIRC.

I know from past experience that the TSU firmware.exe extracts the image to a temp folder and all the files are read-only at this point. When you exit the program, this folder is removed.

As you seem to be looking inside the 9300 with putty or some other tool, I'm curious as to how you got to connect to the 9300 console. Or by chance did you just mount one of the jffs files from the image?

I only have a 9600, and what I'm doing is simply unpack one layer of the installer after another with the tools available under Linux. The installer can be unpacked using 7z, resulting in a FirmwareUpdater.exe, a few DLLs and maestro_firmware.zip, which can of course be unzipped. The jffs filesystem images from there can be unpacked using jefferson ([Link: github.com]), or mounted directly in Linux using loopback devices.
Post 6 made on Tuesday November 14, 2023 at 18:49
Lyndel McGee
RC Moderator
Joined:
Posts:
August 2001
12,997
On November 14, 2023 at 17:44, canavan said...
I only have a 9600, and what I'm doing is simply unpack one layer of the installer after another with the tools available under Linux. The installer can be unpacked using 7z, resulting in a FirmwareUpdater.exe, a few DLLs and maestro_firmware.zip, which can of course be unzipped. The jffs filesystem images from there can be unpacked using jefferson ([Link: github.com]), or mounted directly in Linux using loopback devices.

On windows, I renamed the installer exe to .7z and when I try to open with WinRar, I can only see the internal jffs2.

Hints?
Lyndel McGee
Philips Pronto Addict/Beta Tester
OP | Post 7 made on Thursday November 16, 2023 at 16:59
canavan
Long Time Member
Joined:
Posts:
July 2004
20
I'm using 7za to extract the files from the installer, and that's apparently the POSIX / Linux port of https://7-zip.org/ (which I would recommend anyway as a superior alternative to winrar).
Post 8 made on Tuesday November 21, 2023 at 15:40
Lyndel McGee
RC Moderator
Joined:
Posts:
August 2001
12,997
Wow. 7-zip actually drills into the EXE and pulls out the resources inside. I'm impressed.
Lyndel McGee
Philips Pronto Addict/Beta Tester


Jump to


Protected Feature Before you can reply to a message...
You must first register for a Remote Central user account - it's fast and free! Or, if you already have an account, please login now.

Please read the following: Unsolicited commercial advertisements are absolutely not permitted on this forum. Other private buy & sell messages should be posted to our Marketplace. For information on how to advertise your service or product click here. Remote Central reserves the right to remove or modify any post that is deemed inappropriate.

Hosting Services by ipHouse