Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 Jailbreaking       Thread starter stooged       Start date Feb 23, 2018 at 7:49 AM       260      
Status
Not open for further replies.
I have been messing around with trying to get my VR headset to work with 4.05 for a little while, and because the VR headset is updated to the latest firmware it wouldn't work.

Just recently @XVortex pointed out you can poke a memory value to sort of spoof the system firmware version, so I tried what he said and put together a Enable_VR.bin payload (load the HEN payload and then load the VR payload because the Web exploit will say invalid import map, or use this idc.zip modified IDC exploit to launch it as I have added the 5.05 sections so it does not complain about import map) to poke the offset and found it allowed my VR headset to work.

:arrow: Update: Ok I sorted out the problem and merged the enable VR mod into XVortex's HEN 1.3 so you can now just run this 1 HEN payload and play VR with the source code below:

Download: ps4-hen-VR.zip (0.01 MB) / ps4-hen-VR.tar.gz (0.05 MB - Source Code) / usb_hen_vr.zip (0.03 MB - for USB Stick) / Ps4_Serve_v1_8.apk / Enable_VR_455.zip / usb_455_vr_enable.zip (0.02 MB) / ps4-hen-VR.zip (0.01 MB) / Enable-VR-50X

I only have 1 VR game to test on at the moment as I have to download the VR games now, but it is Resident Evil 7 and its working with my latest updated VR 3.10 and 4.05 + HEN.

Huge thanks to @XVortex, as you can see this is my VR information:

PS4 HEN Enable Updated PlayStation VR Payload with Source Code.jpg


And this is the game running on VR:

PS4 HEN Enable Updated PlayStation VR Payload with Source Code 2.jpg


Tested a few more VR games and all works well:

Rush of Blood:

PS4 HEN Enable Updated PlayStation VR Payload with Source Code 3.jpg


VR Worlds:

PS4 HEN Enable Updated PlayStation VR Payload with Source Code 4.jpg


Arkham VR:

PS4 HEN Enable Updated PlayStation VR Payload with Source Code 5.jpg
 

Comments

@Di1Ly

The hen payload has nothing to do with the qwerty rewrite.
The qwerty rewrite is the webkit exploit.

Also the usb host version(.js) webkit was updated 3 days ago with it.
 
@mschumacher69

If you look at the commits you will see he updated the exploit folder which is the webkit self host files.

Nothing in the hen payload was changed because userland.js is just the webkit and it does not matter which webkit you use with the hen payload.
 
@mopoge @Riccardo82 I know but qwerty's rewrite is for the webkit exploit, those are payloads which is something different. This is what @stooged confirmed above.

So after @stooged confirmed that "The hen payload has nothing to do with the qwerty rewrite", I was wondering why @XVortex updated all his payloads with "qwerty's rewrite to webkit".

@stooged he did actually update the payloads as well. I have all his previous payloads (ps4-hen-vtx v1.4, ps4-ftp-vtx v1.2 and ps4-dumper-vtx v1.7) and I downloaded the latest ones which were all posted 2 days ago with the same versions, but the files are different.

I called them a and b to differentiate them, but here are the file sizes:

ps4-hen-vtx-v1.4a 8 KB
ps4-hen-vtx-v1.4b 11 KB

ps4-ftp-vtx-v1.2a 22 KB
ps4-ftp-vtx-v1.2b 17 KB

ps4-dumper-vtx-v1.7a 18 KB
ps4-dumper-vtx-v1.7b 14 KB
 
Something else...
i have had reports of the new webkit rewrite causing the ps4 and games to hang, lagg and people have had to force shutdown With the same people reporting the old webkit works fine.

So the new exploit executes pretty much first time but it may be causing issues in other areas as the hen payload used in both instances was the same.
 
@stooged I reported these errors (on gbatemp) within seconds of Al-Azifs updated userland.js from qwerty.

The MD5 of his is identical to vortex's updated ones.

There are definiely issues with userland here, and its definitely a memory space problem.

BTW props for the apps and payloads, been following your work, youre a legend.
 
Status
Not open for further replies.
Back
Top