Jump to content
Donk

Workstation 11/12, Player 7/12, Fusion 7/8 and ESXi 6 Mac OS X Unlocker 2

686 posts in this topic

Recommended Posts

 

WARNING - Do NOT use the code on GitHub please wait until a release is announced. The current 2.0.9 code is there but there are serious issues still to be resolved which could render your ESXi host unusable!

 

Support Request

Please, please, please do NOT copy vmx or log files inline in a post. Always attach the log file as an attachment. It slows down the forum editor and puts a lot of junk in the actual post, and I cannot analyse unless it is a separate file. Alternatively post a link to a Gist.

 

Download Links

 

InsanelyMac: http://www.insanelymac.com/forum/files/file/339-unlocker/

My website: http://www.daveparsons.net/unlocker208.zip

 

14/11/15 - Version 2.0.8
  • Player 12 on Linux fixes
  • Get latest VMware tools command
  • Removed firmware files
  • Moved to PyInstaller 3.0

16/09/15 - Version 2.0.7

  • Workstation 12 on Linux fixes

20/06/15 - Version 2.0.6

  • ESXi 6 patch for smcPresent vCenter compatibility. Thanks Sam!

18/06/15 - Version 2.0.5

 

ESXi 6 work was greatly helped by Sam B. Thanks to Sam for helping me out and finding the last piece of the puzzle.

  • ESXi 6 working
  • Latest tools from Fusion 7.1.2

24/01/15 - Version 2.0.4

 

Couple of quick fixes:

  • Added stop and start of VMware View USB Service to Windows batch files
  • Fixed broken GOS Table patching on Linux

03/01/15 - Version 2.0.3

 

Added new EFI firmware files to remove Server check for 10.5 and 10.6.

 

If you are using a 32-bit installation of OS X:

 

1. Copy efi32-srvr.rom to guest folder.

2. Edit the vmx file and add:

 

efi32.filename = "efi32-srvr.rom"

If you are using a 64-bit installation of OS X:

 

1. Copy efi64-srvr.rom to guest folder.

2. Edit the vmx file and add:

efi64.filename = "efi64-srvr.rom"

14/12/14 - Version 2.0.2

 

Uploaded a new version, 2.0.2, which removes need for Python on Windows. Packaged using PyInstaller. If you have already used 2.0.0 successfully then you do not need this as there are no other changes. Also added darwin.iso back into the zip file.

 

http://www.insanelymac.com/forum/files/file/339-unlocker/

 

For installation queries please read MSoK's excellent post http://www.insanelymac.com/forum/topic/290949-how-to-install-os-x-10x-snow-leopard-lion-mountain-lion-mavericks-and-yosemite-in-vmware-workstation-10-or-player-6/.

 

Mac OS X Unlocker for VMware V2.0
=================================


1. Introduction
---------------


Unlocker 2 is designed for Workstation 11, Player 7, ESXi 6 and Fusion 7.


If you are using an earlier product please continue using Unlocker 1 


Version 2 has been tested against:


* Workstation 11/12 on Windows and Linux
* Player 7 & Workstation Player 12 on Windows and Linux
* Fusion 7/8 on Mavericks and Yosemite
* ESXi 6.0


The patch code carries out the following modifications dependent on the product
being patched:


* Fix vmware-vmx and derivatives to allow Mac OS X to boot
* Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
* Fix libvmkctl.so on ESXi 6 to allow use with vCenter
* Download a copy of the latest VMware Tools for OS X


Note that not all products recognise the darwin.iso via install tools menu item.
You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.


The vmwarebase code does not need to be patched on OS X or ESXi so you will see a
message on those systems telling you that it will not be patched.


In all cases make sure VMware is not running, and any background guests have
been shutdown.


The code is now Python as it makes the Unlocker easier to run and maintain on ESXi.
There are some challenges to write the code as ESXi has a subset of Python 2.7 which
constrains some modules that can be used.


2. Prerequisites
----------------


The code requires Python 2.7 to work. Most Linux distros, ESXi and OS X ship with a compatible
Python interpreter and should work without requiring any additional software.


Windows has a packaged version of the Python script using PyInstaller, and so does not
require Python to be installed.


3. Limitations
--------------


If you are using VMware Player or Workstation on Windows you may get a core dump.


Latest Linux and ESXi products are OK and do not show this problem.


+-----------------------------------------------------------------------------+
| IMPORTANT:                                                                  |
| ==========                                                                  |
|                                                                             |
| If you create a new VM using version 11 or 12 hardware VMware may stop and  |
| create a core dump. There are two options to work around this issue:        |
|                                                                             |
| 1. Change the VM to be HW 10 - this does not affect performance.            |
| 2. Edit the VMX file and add:                                               |
|    smc.version = "0"                                                        |
|                                                                             |
+-----------------------------------------------------------------------------+


4. Windows
----------
On Windows you will need to either run cmd.exe as Administrator or using
Explorer right click on the command file and select "Run as administrator".


win-install.cmd   - patches VMware
win-uninstall.cmd - restores VMware
win-update-tools.cmd - retrieves latest OS X guest tools


5. Linux
---------
On Linux you will need to be either root or use sudo to run the scripts.


You may need to ensure the Linux scripts have execute permissions
by running chmod +x against the 2 files.


lnx-install.sh   - patches VMware
lnx-uninstall.sh - restores VMware
lnx-update-tools.cmd - retrieves latest OS X guest tools


6. Mac OS X
-----------
On Mac OS X you will need to be either root or use sudo to run the scripts.
This is really only needed if you want to use client versions of Mac OS X.


You may need to ensure the OS X scripts have execute permissions
by running chmod +x against the 2 files.


osx-install.sh   - patches VMware
osx-uninstall.sh - restores VMware


7. ESXi
-------
You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.


Once uploaded you will need to either use the ESXi support console or use SSH to
run the commands. Use the unzip command to extract the files. 


<<< WARNING: use a datastore volume to run the scripts >>>


Please note that you will need to reboot the host for the patches to become active.
The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.


You may need to ensure the ESXi scripts have execute permissions
by running chmod +x against the 2 files.


esxi-install.sh   - patches VMware 
esxi-uninstall.sh - restores VMware 


Note:
1. Any changes you have made to local.sh will be lost. If you have made changes to 
   that file, you will need to merge them into the supplied local.sh file.
2. The unlocker runs at boot time to patch the relevant files and it now survives 
   an upgrade or patch to ESXi as local.sh is part of the persisted local state.
   
8. Thanks
---------


Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
(MSoK) for all the testing and support.


Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
debugging expertise. Sam also wrote the code for patching ESXi ELF files.




History
-------
12/12/14 2.0.0 - First release
13/13/14 2.0.1 - Removed need for Python for Windows
13/13/14 2.0.2 - darwin.iso was missing from zip file
02/01/15 2.0.3 - Added EFI firmware files to remove Server check
               - Refactored Python code
07/01/15 2.0.4 - Added View USB Service to Windows batch files
               - Fixed broken GOS Table patching on Linux
18/06/15 2.0.5 - ESXi 6 working
               - Latest tools from Fusion 7.1.2
20/06/15 2.0.6 - ESXi 6 patch for smcPresent vCenter compatibility
16/09/15 2.0.7 - Workstation 12 on Linux fixes
14/11/15 2.0.8 - Player 12 on Linux fixes
               - Get latest VMware tools command
               - Removed firmware files
               - Moved to PyInstaller 3.0


(c) 2011-2015 Dave Parsons

 

 

 

WARNING - Do NOT use the code on GitHub please wait until a release is announced. The current 2.0.9 code is there but there are serious issues still to be resolved which could render your ESXi host unusable!

 

Support Request

Please, please, please do NOT copy vmx or log files inline in a post. Always attach the log file as an attachment. It slows down the forum editor and puts a lot of junk in the actual post, and I cannot analyse unless it is a separate file. Alternatively post a link to a Gist.

 

Download Links

 

InsanelyMac: http://www.insanelymac.com/forum/files/file/339-unlocker/

My website: http://www.daveparsons.net/unlocker208.zip

 

14/11/15 - Version 2.0.8
  • Player 12 on Linux fixes
  • Get latest VMware tools command
  • Removed firmware files
  • Moved to PyInstaller 3.0

16/09/15 - Version 2.0.7

  • Workstation 12 on Linux fixes

20/06/15 - Version 2.0.6

  • ESXi 6 patch for smcPresent vCenter compatibility. Thanks Sam!

18/06/15 - Version 2.0.5

 

ESXi 6 work was greatly helped by Sam B. Thanks to Sam for helping me out and finding the last piece of the puzzle.

  • ESXi 6 working
  • Latest tools from Fusion 7.1.2

24/01/15 - Version 2.0.4

 

Couple of quick fixes:

  • Added stop and start of VMware View USB Service to Windows batch files
  • Fixed broken GOS Table patching on Linux

03/01/15 - Version 2.0.3

 

Added new EFI firmware files to remove Server check for 10.5 and 10.6.

 

If you are using a 32-bit installation of OS X:

 

1. Copy efi32-srvr.rom to guest folder.

2. Edit the vmx file and add:

 

efi32.filename = "efi32-srvr.rom"

If you are using a 64-bit installation of OS X:

 

1. Copy efi64-srvr.rom to guest folder.

2. Edit the vmx file and add:

efi64.filename = "efi64-srvr.rom"

14/12/14 - Version 2.0.2

 

Uploaded a new version, 2.0.2, which removes need for Python on Windows. Packaged using PyInstaller. If you have already used 2.0.0 successfully then you do not need this as there are no other changes. Also added darwin.iso back into the zip file.

 

http://www.insanelymac.com/forum/files/file/339-unlocker/

 

For installation queries please read MSoK's excellent post http://www.insanelymac.com/forum/topic/290949-how-to-install-os-x-10x-snow-leopard-lion-mountain-lion-mavericks-and-yosemite-in-vmware-workstation-10-or-player-6/.

 

Mac OS X Unlocker for VMware V2.0
=================================


1. Introduction
---------------


Unlocker 2 is designed for Workstation 11, Player 7, ESXi 6 and Fusion 7.


If you are using an earlier product please continue using Unlocker 1 


Version 2 has been tested against:


* Workstation 11/12 on Windows and Linux
* Player 7 & Workstation Player 12 on Windows and Linux
* Fusion 7/8 on Mavericks and Yosemite
* ESXi 6.0


The patch code carries out the following modifications dependent on the product
being patched:


* Fix vmware-vmx and derivatives to allow Mac OS X to boot
* Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
* Fix libvmkctl.so on ESXi 6 to allow use with vCenter
* Download a copy of the latest VMware Tools for OS X


Note that not all products recognise the darwin.iso via install tools menu item.
You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.


The vmwarebase code does not need to be patched on OS X or ESXi so you will see a
message on those systems telling you that it will not be patched.


In all cases make sure VMware is not running, and any background guests have
been shutdown.


The code is now Python as it makes the Unlocker easier to run and maintain on ESXi.
There are some challenges to write the code as ESXi has a subset of Python 2.7 which
constrains some modules that can be used.


2. Prerequisites
----------------


The code requires Python 2.7 to work. Most Linux distros, ESXi and OS X ship with a compatible
Python interpreter and should work without requiring any additional software.


Windows has a packaged version of the Python script using PyInstaller, and so does not
require Python to be installed.


3. Limitations
--------------


If you are using VMware Player or Workstation on Windows you may get a core dump.


Latest Linux and ESXi products are OK and do not show this problem.


+-----------------------------------------------------------------------------+
| IMPORTANT:                                                                  |
| ==========                                                                  |
|                                                                             |
| If you create a new VM using version 11 or 12 hardware VMware may stop and  |
| create a core dump. There are two options to work around this issue:        |
|                                                                             |
| 1. Change the VM to be HW 10 - this does not affect performance.            |
| 2. Edit the VMX file and add:                                               |
|    smc.version = "0"                                                        |
|                                                                             |
+-----------------------------------------------------------------------------+


4. Windows
----------
On Windows you will need to either run cmd.exe as Administrator or using
Explorer right click on the command file and select "Run as administrator".


win-install.cmd   - patches VMware
win-uninstall.cmd - restores VMware
win-update-tools.cmd - retrieves latest OS X guest tools


5. Linux
---------
On Linux you will need to be either root or use sudo to run the scripts.


You may need to ensure the Linux scripts have execute permissions
by running chmod +x against the 2 files.


lnx-install.sh   - patches VMware
lnx-uninstall.sh - restores VMware
lnx-update-tools.cmd - retrieves latest OS X guest tools


6. Mac OS X
-----------
On Mac OS X you will need to be either root or use sudo to run the scripts.
This is really only needed if you want to use client versions of Mac OS X.


You may need to ensure the OS X scripts have execute permissions
by running chmod +x against the 2 files.


osx-install.sh   - patches VMware
osx-uninstall.sh - restores VMware


7. ESXi
-------
You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.


Once uploaded you will need to either use the ESXi support console or use SSH to
run the commands. Use the unzip command to extract the files. 


<<< WARNING: use a datastore volume to run the scripts >>>


Please note that you will need to reboot the host for the patches to become active.
The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.


You may need to ensure the ESXi scripts have execute permissions
by running chmod +x against the 2 files.


esxi-install.sh   - patches VMware 
esxi-uninstall.sh - restores VMware 


Note:
1. Any changes you have made to local.sh will be lost. If you have made changes to 
   that file, you will need to merge them into the supplied local.sh file.
2. The unlocker runs at boot time to patch the relevant files and it now survives 
   an upgrade or patch to ESXi as local.sh is part of the persisted local state.
   
8. Thanks
---------


Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
(MSoK) for all the testing and support.


Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
debugging expertise. Sam also wrote the code for patching ESXi ELF files.




History
-------
12/12/14 2.0.0 - First release
13/13/14 2.0.1 - Removed need for Python for Windows
13/13/14 2.0.2 - darwin.iso was missing from zip file
02/01/15 2.0.3 - Added EFI firmware files to remove Server check
               - Refactored Python code
07/01/15 2.0.4 - Added View USB Service to Windows batch files
               - Fixed broken GOS Table patching on Linux
18/06/15 2.0.5 - ESXi 6 working
               - Latest tools from Fusion 7.1.2
20/06/15 2.0.6 - ESXi 6 patch for smcPresent vCenter compatibility
16/09/15 2.0.7 - Workstation 12 on Linux fixes
14/11/15 2.0.8 - Player 12 on Linux fixes
               - Get latest VMware tools command
               - Removed firmware files
               - Moved to PyInstaller 3.0


(c) 2011-2015 Dave Parsons

 

Hello Dear User Donk.
 
I ask you to replound your link because the page from which you can
 
Download Unlocker 208 displays Not Found.
 

Share this post


Link to post
Share on other sites
Advertisement

 

Hello Dear User Donk.
 
I ask you to replound your link because the page from which you can
 
Download Unlocker 208 displays Not Found.
 

 

 

I have removed them from my server as I am retiring from this project. Please use the Downloads section of Insanelymac to get the releases.

Share this post


Link to post
Share on other sites

I have removed them from my server as I am retiring from this project. Please use the Downloads section of Insanelymac to get the releases.

I'm a new user on the forum please send me a link
 
Because I'm just learning the forum menu.

Share this post


Link to post
Share on other sites

Donk,

 

I tried sending you a PM asking about this project and how you develop it, but for some reason it would not send. The reason I ask is because I would like to take over the project, but I am not sure if I know what is needed in order to do so.

Share this post


Link to post
Share on other sites

@donk this works for me in workstation player 14

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

Share this post


Link to post
Share on other sites

 

@donk this works for me in workstation player 14

 

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

You guys are geniuses. How do you know what to change?!

Share this post


Link to post
Share on other sites

Genius might be a stretch for me... I'm not going to go into how I came to up with it though since it's fairly complex.

 

My fix definitely isn't backwards compatible and I've only tested it on one product. There's still more work to do to make this fully usable, but hopefully the info I posted will help donk to produce a real fix.

Share this post


Link to post
Share on other sites

Genius might be a stretch for me... I'm not going to go into how I came to up with it though since it's fairly complex.

 

My fix definitely isn't backwards compatible and I've only tested it on one product. There's still more work to do to make this fully usable, but hopefully the info I posted will help donk to produce a real fix.

 

Please help my Friend. 

 

Where in the Vmware Workstation menu is the option to allocate memory for the card
 
graphic?

Share this post


Link to post
Share on other sites

Hi, I think you can fork Don's repo and add it so he is retiring from this project

 

 

@donk this works for me in workstation player 14

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

Share this post


Link to post
Share on other sites

 

Please help my Friend. 

 

Where in the Vmware Workstation menu is the option to allocate memory for the card
 
graphic?

 

 

A bit off topic... I only use the player, but the option shows when you select Display in the Hardware tab of the settings for the VM. Vmware is not the right solution for graphics intensive stuff though. Try KVM where you can do gpu passthrough.

 

 

Hi, I think you can fork Don's repo and add it so he is retiring from this project

It's not quite that simple, especially when Windows executables need to be built. I'm not the right project to take over this project, sorry. Hopefully someone else will come along with better skills and more time on their hands.

Share this post


Link to post
Share on other sites

Sort of related...

I tried installing the new guest tools from Fusion 10 (on VMware Player 12).  Afterwards, my guest macOS VM was stuck in high-DPI mode so everything was really huge.  Has anyone else tried the new VMware Tools yet?

They’ve already released a new set of tools (10.01). Perhaps they found and fixed issues.

Share this post


Link to post
Share on other sites

You guys are geniuses. How do you know what to change?!

 

 

@donk this works for me in workstation player 14

 

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

 

Yep that is the new string to look for in vmwarebase.dll. Great to have someone confirm it independently. I have another issue with the services restarting on Windows before I can apply the patch. Must be something new keeping them running.

Donk,

 

I tried sending you a PM asking about this project and how you develop it, but for some reason it would not send. The reason I ask is because I would like to take over the project, but I am not sure if I know what is needed in order to do so.

 

I disabled PM as had way to many requests for help plus wanting to give money for help. I always did this for fun.

 

If you want to contact me use d_a_v_e_@_d_a_v_e_p_a_r_s_o_n_s_._n_e_t (remove underscore)

 

Very happy to talk to a volunteer about what to do next.

Share this post


Link to post
Share on other sites

A bit off topic... I only use the player, but the option shows when you select Display in the Hardware tab of the settings for the VM. Vmware is not the right solution for graphics intensive stuff though. Try KVM where you can do gpu passthrough.

 

 

It's not quite that simple, especially when Windows executables need to be built. I'm not the right project to take over this project, sorry. Hopefully someone else will come along with better skills and more time on their hands.

Does the Windows executable actually do anything other than run the Python script? If that's all it does, I should think that there is no need to recompile it every time.

 

Yep that is the new string to look for in vmwarebase.dll. Great to have someone confirm it independently. I have another issue with the services restarting on Windows before I can apply the patch. Must be something new keeping them running.

 

I disabled PM as had way to many requests for help plus wanting to give money for help. I always did this for fun.

 

If you want to contact me use d_a_v_e_@_d_a_v_e_p_a_r_s_o_n_s_._n_e_t (remove underscore)

 

Very happy to talk to a volunteer about what to do next.

Great! You will be hearing from me shortly. Although I have the will to take over the project, my concern is that I do not know if I have the knowledge that is needed to take it over.

Share this post


Link to post
Share on other sites

Does the Windows executable actually do anything other than run the Python script? If that's all it does, I should think that there is no need to recompile it every time.

 

Great! You will be hearing from me shortly. Although I have the will to take over the project, my concern is that I do not know if I have the knowledge that is needed to take it over.

Windows executablle contains python script and part of python engine inside. Need to recompile unllocker.exe after changing unlocker.py

Share this post


Link to post
Share on other sites

Windows executablle contains python script and part of python engine inside. Need to recompile unllocker.exe after changing unlocker.py

 

Yep it used pyInstaller so do not need Python on Windows, which was a problem for early on during unlocker development for some users.

 

I will walk through the creation with whoever takes the project on from me.

Share this post


Link to post
Share on other sites

For those of you who want to try out the modifications that hoanglan87 posted here, but want an easy way to do so, I've uploaded an unofficial repack of the VMware Patcher here. As of this posting, the submission is waiting for approval by a moderator, but I'm hoping that it will be available shortly. This repack includes a pyInstaller-built executable for patching VMware on Windows. This has not been thoroughly tested, but I can confirm that this repack is working without any issues for me. (I am running VMware Workstation Pro 14 on Windows 10.)

 

Update: Until a moderator approves the InsanelyMac download link I posted above, here is an off-site download link: https://nofile.io/f/HPYpMCHrQE1/unlocker209-unofficial.zip

 

Update 2: The InsanelyMac download link has been approved.

Share this post


Link to post
Share on other sites

I am going to work with David-B on this and I hope he will take over from me. I am currently on vacation so expect a delay of 2 weeks. Once this version is released I hope David-B can run with the project, abnd I will be available to offer advice to him, and any others who want to join in with the work.

Share this post


Link to post
Share on other sites

Thank you so much Donk for the amazing work you've done with the Unlocker throughout these years. Your work has made life simplier for most of us here and I wish you success in your future project. THANK YOU!

Share this post


Link to post
Share on other sites

Sort of related...

I tried installing the new guest tools from Fusion 10 (on VMware Player 12).  Afterwards, my guest macOS VM was stuck in high-DPI mode so everything was really huge.  Has anyone else tried the new VMware Tools yet?

 

i had the same issue as you when running on my new X1 carbon with HiDPI display. luckily this is an issue in the normal mac world as well.

 

from a terminal window:

sudo defaults write /Library/Preferences/com.apple.windowserver.plist DisplayResolutionEnabled -bool true

and then reboot the VM

 

after it comes back up, go to System Preferences > Display and select the "Scaled" option.

you'll see a new "HiDPI" entry. select this one for beautiful scaled goodness :-)

 

cheers, wizdude

Share this post


Link to post
Share on other sites

Dear David-B,

 

Thank you for the the post. I did try the windows patch and it's working, my VMware Workstation 14.0 Build 6661328 in Windows 10 1703 does now offer the options for MacOS, However the Linux version of the patch is not working. The following issues appear:

 

1) lnx-install.sh doesn't execute because of the brackets on line 4 "VMware Unlocker 2.0.9 (Unofficial Repack)", removing the brackets "VMware Unlocker 2.0.9 Unofficial Repack" does allow the script to execute, but there are a bunch of erros. I am attaching the log to this post, hoping you'll be able to sort it out. I am using Ubuntu 16.04 LTS x64.

VMware Unlocker 2.0.9 Unofficial Repack
===============================
Copyright: Dave Parsons 2011-15
Creating backup folder...
'/usr/lib/vmware/bin/vmware-vmx' -> './backup/vmware-vmx'
'/usr/lib/vmware/bin/vmware-vmx-debug' -> './backup/vmware-vmx-debug'
'/usr/lib/vmware/bin/vmware-vmx-stats' -> './backup/vmware-vmx-stats'
'/usr/lib/vmware/lib/libvmwarebase.so/libvmwarebase.so' -> './backup/libvmwarebase.so'
Patching...
[AppLoader] Use shipped Linux kernel AIO access library.
An up-to-date "libaio" or "libaio1" package from your system is preferred.
File: /usr/lib/vmware/bin/vmware-vmx
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xe11fc0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xe11fe0
+LKS Key:
002 0xe12028 +LKS 01 flag 0x90 0x1e2700 07
OSK0 Key Before:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xe163f0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xe16420
+LKS Key:
004 0xe164f8 +LKS 01 flag 0x90 0x1e2700 01
OSK0 Key Before:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-debug
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0x117f020
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0x117f040
+LKS Key:
002 0x117f088 +LKS 01 flag 0x90 0x2449c0 07
OSK0 Key Before:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0x1183450
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0x1183480
+LKS Key:
004 0x1183558 +LKS 01 flag 0x90 0x2449c0 01
OSK0 Key Before:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-stats
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xec15a0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xec15c0
+LKS Key:
002 0xec1608 +LKS 01 flag 0x90 0x2260b0 07
OSK0 Key Before:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xec59d0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xec5a00
+LKS Key:
004 0xec5ad8 +LKS 01 flag 0x90 0x2260b0 01
OSK0 Key Before:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

GOS Patching: /usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0
Traceback (most recent call last):
File "./14patch.py", line 413, in <module>
main()
File "./14patch.py", line 404, in main
patchbase(vmwarebase)
File "./14patch.py", line 282, in patchbase
f = open(name, 'r+b')
IOError: [Errno 2] No such file or directory: '/usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0'

For those of you who want to try out the modifications that hoanglan87 posted here, but want an easy way to do so, I've uploaded an unofficial repack of the VMware Patcher here. As of this posting, the submission is waiting for approval by a moderator, but I'm hoping that it will be available shortly. This repack includes a pyInstaller-built executable for patching VMware on Windows. This has not been thoroughly tested, but I can confirm that this repack is working without any issues for me. (I am running VMware Workstation Pro 14 on Windows 10.)

 

Update: Until a moderator approves the InsanelyMac download link I posted above, here is an off-site download link: https://nofile.io/f/HPYpMCHrQE1/unlocker209-unofficial.zip

 

 

Update 2: The InsanelyMac download link has been approved.

Share this post


Link to post
Share on other sites

I am going to work with David-B on this and I hope he will take over from me. I am currently on vacation so expect a delay of 2 weeks. Once this version is released I hope David-B can run with the project, abnd I will be available to offer advice to him, and any others who want to join in with the work.

 

Awesome. It is going to stay on GitHub? I only see 2 people have forked and updated the repository recently, not sure either are David-B

Share this post


Link to post
Share on other sites

 

Dear David-B,

 

Thank you for the the post. I did try the windows patch and it's working, my VMware Workstation 14.0 Build 6661328 in Windows 10 1703 does now offer the options for MacOS, However the Linux version of the patch is not working. The following issues appear:

 

1) lnx-install.sh doesn't execute because of the brackets on line 4 "VMware Unlocker 2.0.9 (Unofficial Repack)", removing the brackets "VMware Unlocker 2.0.9 Unofficial Repack" does allow the script to execute, but there are a bunch of erros. I am attaching the log to this post, hoping you'll be able to sort it out. I am using Ubuntu 16.04 LTS x64.

VMware Unlocker 2.0.9 Unofficial Repack
===============================
Copyright: Dave Parsons 2011-15
Creating backup folder...
'/usr/lib/vmware/bin/vmware-vmx' -> './backup/vmware-vmx'
'/usr/lib/vmware/bin/vmware-vmx-debug' -> './backup/vmware-vmx-debug'
'/usr/lib/vmware/bin/vmware-vmx-stats' -> './backup/vmware-vmx-stats'
'/usr/lib/vmware/lib/libvmwarebase.so/libvmwarebase.so' -> './backup/libvmwarebase.so'
Patching...
[AppLoader] Use shipped Linux kernel AIO access library.
An up-to-date "libaio" or "libaio1" package from your system is preferred.
File: /usr/lib/vmware/bin/vmware-vmx
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xe11fc0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xe11fe0
+LKS Key:
002 0xe12028 +LKS 01 flag 0x90 0x1e2700 07
OSK0 Key Before:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xe163f0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xe16420
+LKS Key:
004 0xe164f8 +LKS 01 flag 0x90 0x1e2700 01
OSK0 Key Before:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-debug
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0x117f020
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0x117f040
+LKS Key:
002 0x117f088 +LKS 01 flag 0x90 0x2449c0 07
OSK0 Key Before:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0x1183450
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0x1183480
+LKS Key:
004 0x1183558 +LKS 01 flag 0x90 0x2449c0 01
OSK0 Key Before:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-stats
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xec15a0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xec15c0
+LKS Key:
002 0xec1608 +LKS 01 flag 0x90 0x2260b0 07
OSK0 Key Before:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xec59d0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xec5a00
+LKS Key:
004 0xec5ad8 +LKS 01 flag 0x90 0x2260b0 01
OSK0 Key Before:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

GOS Patching: /usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0
Traceback (most recent call last):
File "./14patch.py", line 413, in <module>
main()
File "./14patch.py", line 404, in main
patchbase(vmwarebase)
File "./14patch.py", line 282, in patchbase
f = open(name, 'r+b')
IOError: [Errno 2] No such file or directory: '/usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0'

And we have the first failure of my unofficial pack! Sorry about this. As I said, it wasn't tested, and this proves it. I'll look in to it as soon as I can. The plan so far seems to be that Donk is going to help me learn my way around the project, and after a release is put out that is known to be working, I will take over on my own if Donk thinks I am capable and worthy.

 

Awesome. It is going to stay on GitHub? I only see 2 people have forked and updated the repository recently, not sure either are David-B

I have not forked the project yet, but I will be cloning it soon. It may be a while before I actually make my own fork of it though.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

  • Similar Content

    • By fusion71au
      Run Vanilla OS X El Capitan, Sierra, High Sierra or Mojave in VMware Workstation on a Windows Host
       
      I wanted to make a simple guide on how to create a vanilla OS X El Capitan virtual machine running on a Windows host.  The virtual machine should be useful for testing El Capitan and also for creating installers for use on a real machine/hackintosh.
       
      There are many guides and videos on the net about running OS X on Windows machines using pre-made VMWare disk images but you can never guarantee what else is in there….
       
      I’ve gathered info for this guide from various threads in the Multibooting and Virtualisation section of this forum eg
       
      Workstation 11/12, Player 7/12, Fusion 7/8 and ESXi 6 Mac OS X Unlocker 2 by @Donk How to Install OS X 10.x from Snow Leopard to El Capitan in VMware Workstation 10/12, Player 6/8 or ESXi 5/6 by @MSOK HOW TO: Create a bootable El Capitan ISO for VMware Credit and thanks to @Donk, @Albert Nietsnie and @MSOK for all their hard work in creating and testing the VMware Unlocker program.
       
      Requirements
      Intel PC with four or more CPU cores running Windows 7 X64 or later OS (2 or more cores needed for OS X) 4GB or more RAM (2GB or more will be needed for OS X) Hard Disk with at least 40GB free for Virtual Machine VMware Workstation 12 or later VMware Unlocker 2.0.7 or later Install OS X El Capitan app and Mac or Hack to prepare installation iso <-- Now, no longer necessary to have previous access to a Mac or Hack by building the Installer.app from scratch - see post#41 16GB or larger exFAT formatted USB stick to transfer El Capitan iso from Mac/Hack to Host PC Prepare Installation ISO on your Mac or Hack
      1.  On your Mac or Hack, download "Install OS X El Capitan.app" from the App Store into your Applications folder.
      2.  Unmount any attached install image/InstallESD.dmg (if currently mounted) by rebooting the system or running the hdiutil unmount command in terminal eg
       
      3.  Download and unzip the CECI.tool (attached to this post) into your ~/Downloads folder. The commands in this executable script are shown below for informational purposes….
       
       
       
      4.  Open OS X terminal, then run the following commands to execute the script:
      cd downloads chmod +x CECI.tool ./CECI.tool 5.  At the end of the process, you will have an El Capitan iso on your desktop - copy this onto an exFAT formatted USB for use on the PC Host later.
       
      Updates:
      @shela has created an ISO generating script compatible with OS X 10.6-10.12: create_osx_iso post #362.
      See post#30 for macOS_iso_cim.tool script to create ISO for macOS 10.13+ using Apple's createinstallmedia utility.
       
      Install and Patch VMware Workstation 12 on your PC
      1.  Download and install VMWare Workstation Player 12 or later
      2.  Download and extract Unlocker 2.0.7 or later to your USB stick…
      3.  Run the win-install.cmd as administrator by right clicking the file in Windows explorer or run it from an Administrative Command Prompt.
       



       
      Create an El Capitan Virtual Machine
      1.  Double click on the VMware Workstation 12 Player icon on your desktop and click “Create a New Virtual Machine”.  Choose “I will install the operating system later” at the How will you install screen….
       

      2.  Select Apple Mac OS X as the Guest operating system and OS X 10.11 as the version.  By default, an OS X 10.11 folder will be created in your Documents\Virtual Machines folder.
       


      3.  Under Specify Disk Capacity, you can leave the default 40GB or set a larger value.  I personally store the virtual disk as a single file.  Click Finish and you will see OS X 10.11 on the Main Screen of Workstation 12.
       


      4.  Next, we need to edit the virtual machine settings to map the virtual SATA CD/DVD drive to the El Capitan installation iso we created earlier.
       


       
      5.  To prevent the virtual machine from crashing in Windows, the virtualHW.version set in the vmx configuration file needs to be changed from 12 to 10 (alternatively, the line smc.version = "0" can be added to the file).  The OS X 10.11.vmx file can be edited with the WordPad program (navigate to the OS X 10.11 virtual machine folder with Windows Explorer and right click on the file to open in WordPad).
       


       
      6.  For HW10, set USB compatibility to USB 2.0, otherwise your mouse and keyboard might not work in the virtual machine.
       

      7.  Finally click “Play virtual machine”
       

      Installation of El Capitan
      Installation should be relatively straight forward, just following the prompts of the OS X installer:
      1.  Select language, agree to legal terms
       

      2.  Use Disk Utility from the Utilities Menu to erase and format the virtual hard drive as a single partition GUID Mac OS X Extended.  I’ve named the drive Macintosh HD but you can enter whatever you like eg El_Capitan.
       



      3.  Quit DU and choose Macintosh HD to install El Capitan on.
       

      4.  After 20-30 min (depending on how fast your system is), the installation will complete and the VM will automatically reboot…
       

      5.  At the welcome screen, choose your country and keyboard layout.  You can skip transfer information, location services and logging in with your Apple ID if you wish…
       


      6.  Create a User Account and select your Time Zone.  You can skip sending diagnostics and usage data to Apple….
       


      7.  Finally, you will arrive at the El Capitan Desktop.  You should eject the Installation iso now by right clicking and selecting “Eject OS X Base System”.  This will allow you to install VMware Tools….
       



      8.  After rebooting, the VM can now be resized or run at full screen resolution.  Audio and network/internet should also work OOB.
       

       
      SMBIOS Customization and iMessage Vars
      To make the Virtual Machine more "Mac like", you can edit the vmx file to add unique identifiers from a real Mac's SMBIOS -
      eg for an iMac 11,3 SMBIOS, you can enter the following lines....
      smbios.reflectHost = "FALSE" board-id.reflectHost = "FALSE" board-id = "Mac-F2238BAE" hw.model.reflectHost = "FALSE" hw.model = "iMac11,3" serialNumber.reflectHost = "FALSE" serialNumber = "W80#######6" Refer How to spoof real Mac in VMware - Multi-booting and Virtualisation.
       
      The critical variables for iMessage/Facetime activation are MLB & ROM.  By default, VMware "reflects" the host's MLB and ROM since it assumes you are running the OSX guest on a real Mac host - see post#42 by @Donk.
       
      If the host is a Windows PC, the following lines need to be added to the vmx file (requires virtualHW.version 12 and smc.version = "0")....
      efi.nvram.var.ROM.reflectHost = "FALSE" efi.nvram.var.MLB.reflectHost = "FALSE" system-id.enable = "TRUE" and the MLB, ROM and optionally system-id entered manually eg
      efi.nvram.var.MLB = "W80######BA1A" (MLB can be 13 or 17 characters long, alphanumeric string) efi.nvram.var.ROM = "<=>?@A" (ROM is entered here as a 6 character ASCII string) uuid.bios = "## ## ## ## ## ## ## ##-## ## ## ## ## ## ## ##" <---Optional (if you want to inject a given system-id hexadecimal value) Note the output for ROM from imessage_debug is a 12 character hexadecimal that needs to be entered here as a 6 character ASCII string eg using an Hex to ASCII converter we find that "3c3d3e3f4041" hex is equivalent to   "<=>?@A".
       
      Vanilla Mavericks and Yosemite
      The same VM settings for El Capitan will also boot and run vanilla installations of OS X Mavericks and Yosemite .  Attached to this post are installer scripts to create bootable Mavericks (CMI.tool) and Yosemite (CYI.tool) ISOs for VirtualBox and VMware.
       
      With the respective OS X installer apps in the Applications folder, download and run the installer tools using terminal ie
       
      To create a Mavericks ISO on your desktop
      cd downloads chmod +x CMI.tool ./CMI.tool To create a Yosemite ISO on your desktop
      cd downloads chmod +x CYI.tool ./CYI.tool Here is a screenshot of the VM running Mavericks 10.9.5...
       

       
      Enjoy
       
      Update for macOS 10.12 Sierra
      The above settings still work for macOS Sierra after upgrading to VMware Workstation 12.5 and unlocker 2.0.8 - see post #13.
       
      Update for macOS 10.13 High Sierra and 10.14 Mojave
      See post#30 for macOS_iso_cim.tool script to create ISO for macOS using Apple's createinstallmedia utility.
      Post#41 describes how to build "Install macOS ******.app" on the fly from installer files downloaded beforehand in /SharedSupport folder.
       
       
      CECI.zip
      CYI.tool.zip
      CMI.tool.zip
    • By David-B
      This version of VMware Unlocker is modified to support VMware Workstation 14. It has not undergone extensive testing, but from the little I have used it, it appears to be working properly on VMware Workstation 14.
       
      The original VMware Unlocker is available here: http://www.insanelymac.com/forum/files/file/339-unlocker/
       
      The changes that were made to the code to enable this patcher to work are available here: http://www.insanelymac.com/forum/topic/303311-workstation-1112-player-712-fusion-78-and-esxi-6-mac-os-x-unlocker-2/?p=2503855. Other than this change, only the install scripts and the patcher exe for Windows was modified.
    • By Donk
      Mac OS X Unlocker for VMware V2.0
       
      Please ask questions in this thread http://www.insanelymac.com/forum/topic/303311-workstation-1112-player-712-fusion-78-and-esxi-6-mac-os-x-unlocker-2/
      1. Introduction
       
      Unlocker 2 is designed for Workstation 11, Player 7, ESXi 6 and Fusion 7.
       
      If you are using an earlier product please continue using Unlocker 1
       
      Version 2 has been tested against:
      Workstation 11/12 on Windows and Linux
      Player 7 & Workstation Player 12 on Windows and Linux
      Fusion 7/8 on Mavericks and Yosemite
      ESXi 6.0

      The patch code carries out the following modifications dependent on the product
      being patched:
      Fix vmware-vmx and derivatives to allow Mac OS X to boot
      Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
      Fix libvmkctl.so on ESXi 6 to allow use with vCenter

      Download a copy of the latest VMware Tools for OS X

      Note that not all products recognise the darwin.iso via install tools menu item.
      You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.
       
      The vmwarebase code does not need to be patched on OS X or ESXi so you will see a
      message on those systems telling you that it will not be patched.
       
      In all cases make sure VMware is not running, and any background guests have
      been shutdown.
       
      The code is now Python as it makes the Unlocker easier to run and maintain on ESXi.
      There are some challenges to write the code as ESXi has a subset of Python 2.7 which
      constrains some modules that can be used.
       
      2. Prerequisites
       
      The code requires Python 2.7 to work. Most Linux distros, ESXi and OS X ship with a compatible
      Python interpreter and should work without requiring any additional software.
       
      Windows has a packaged version of the Python script using PyInstaller, and so does not
      require Python to be installed.
       
      3. Limitations
       
      If you are using VMware Player or Workstation on Windows you may get a core dump.
       
      Latest Linux and ESXi products are OK and do not show this problem.
       
      IMPORTANT:
       
      If you create a new VM using version 11 hardware VMware will stop and create a core dump.There are two options to work around this issue:
      1. Change the VM to be HW 10 - this does not affect performance.
      2. Edit the VMX file and add:
      smc.version = "0" |
      4. Windows
       
      On Windows you will need to either run cmd.exe as Administrator or using
      Explorer right click on the command file and select "Run as administrator".
       
      win-install.cmd - patches VMware
      win-uninstall.cmd - restores VMware
      win-update-tools.cmd - retrieves latest OS X guest tools
       
      5. Linux
       
      On Linux you will need to be either root or use sudo to run the scripts.
       
      You may need to ensure the Linux scripts have execute permissions
      by running chmod +x against the 2 files.
       
      lnx-install.sh - patches VMware
      lnx-uninstall.sh - restores VMware
      lnx-update-tools.cmd - retrieves latest OS X guest tools
       
      6. Mac OS X
       
      On Mac OS X you will need to be either root or use sudo to run the scripts.
      This is really only needed if you want to use client versions of Mac OS X.
       
      You may need to ensure the OS X scripts have execute permissions
      by running chmod +x against the 2 files.
       
      osx-install.sh - patches VMware
      osx-uninstall.sh - restores VMware
       
      7. ESXi
       
      You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.
       
      Once uploaded you will need to either use the ESXi support console or use SSH to
      run the commands. Use the unzip command to extract the files.
       
      <<< WARNING: use a datastore volume to run the scripts >>>
       
      Please note that you will need to reboot the host for the patches to become active.
      The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.
       
      You may need to ensure the ESXi scripts have execute permissions
      by running chmod +x against the 2 files.
       
      esxi-install.sh - patches VMware
      esxi-uninstall.sh - restores VMware
       
      Note:
      1. Any changes you have made to local.sh will be lost. If you have made changes to
      that file, you will need to merge them into the supplied local.sh file.
      2. The unlocker runs at boot time to patch the relevant files and it now survives
      an upgrade or patch to ESXi as local.sh is part of the persisted local state.
       
      8. Thanks
       
      Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
      (MSoK) for all the testing and support.
       
      Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
      debugging expertise. Sam also wrote the code for patching ESXi ELF files.
       
       
      History
       
      12/12/14 2.0.0
      First release

      13/13/14 2.0.1
      Removed need for Python for Windows

      13/13/14 2.0.2
      darwin.iso was missing from zip file

      02/01/15 2.0.3
      Added EFI firmware files to remove Server check
      Refactored Python code

      07/01/15 2.0.4
      Added View USB Service to Windows batch files
      Fixed broken GOS Table patching on Linux

      18/06/15 2.0.5
      ESXi 6 working
      Latest tools from Fusion 7.1.2

      20/06/15 2.0.6
      ESXi 6 patch for smcPresent vCenter compatibility

      16/09/15 2.0.7
      Workstation 12 on Linux fixes

      14/11/15 2.0.8
      Player 12 on Linux fixes
      Get latest VMware tools command
      Removed firmware files
      Moved to PyInstaller 3.0

       
      © 2011-2015 Dave Parsons
    • By phantom2000
      I'm tyring to run iATKOS S3 V2 on VMware Fusion 6(on Mavericks). I tried to set up Fusion with the iso file but when I start the VM, it says "The guest operating system is not MacOS X Server". Then I have downloaded the Fusion Unlocker v1.2.0 but I can't seem to get it to work. I have taken the execution permissions for the files install.sh, uninstall.sh and Unlocker.osx file by running the following commands,
      sudo chmod +x /Users/tim/Desktop/VMware/unlock-all-v120/osx/install.sh sudo chmod +x /Users/tim/Desktop/VMware/unlock-all-v120/osx/uninstall.sh sudo chmod +x /Users/tim/Desktop/VMware/unlock-all-v120/osx/unlocker.osx Then I tried to run the install.sh script using the command,
      sudo /Users/tim/Desktop/VMware/unlock-all-v120/osx/install.sh But I get this error message,
      TimBok:~ tim$ sudo /Users/tim/Desktop/VMware/unlock-all-v120/osx/install.sh Password: VMware Unlocker 1.2.0 =============================== Copyright: Dave Parsons 2011-13 Patching... /Users/tim/Desktop/VMware/unlock-all-v120/osx/install.sh: line 12: ./Unlocker.OSX: No such file or directory TimBok:~ tim$ I need to know what I can do here to get rid os this issue and run the VM.
×