Jump to content
patpro

ESXi 5.5 & Unlocker 2.0.8 -> no nested virtualization ?

1 post in this topic

Recommended Posts

Hello,

I'm running a multi-head workstation built on top of ESXi 5.5 (can't upgrade for various reasons) with Unlocker 2.0.8. In particular: I'm running a Windows 10 pro VM and an OSX 10.11 (El capitan) VM. Those two VM uses PCI passthrough, so that each one has a dedicated PCI GPU and a dedicated USB PCI bus (close-to-native graphics performance, native USB devices, etc.).

I've checked everything in my setup and I can't make nested virtualization work, but it worked previously on ESXi 5.0 with Unlocker 1.3.1.

 

Is there any one here who succeeded with nested virtualization on top of ESXi 5.5 with PCI passthrough?

 

Any help appreciated…

Share this post


Link to post
Share on other sites
Advertisement

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

  • Similar Content

    • By Donk
      Verision 3 of the macOS Unlocker for VMware ESXi. Supports versions:
       
      ESXi 6.5 and 6.7  
      https://www.insanelymac.com/forum/files/file/964-macos-unlocker-v30-for-vmware-esxi/
      https://github.com/DrDonk/esxi-unlocker/releases/download/3.0.0/esxi-unlocker-300.tgz
      https://github.com/DrDonk/esxi-unlocker/
       
      readme.txt
       
      Please note that this will not work if Secure Boot is enabled on the ESXi host. This is by design where VMware restricts what can be run when booted using Secure Boot.
    • By Donk
      Here is a new utility to patch the EFI firmware in VMware Workstation and Fusion to allow the non-server versions of Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard) to run. Yoiu will need macOS unlocker 3 if you are using Workstation on non-Apple hardware. I still have to find a way to do this on ESXi as the UEFIPatch utility will not run in the ESXi console.
      This currently supports:
       
      Workstation 11/12/14/15 on Windows and Linux Workstation Player 7/12/14/15 on Windows and Linux Fusion 10/11 on macOS  
      https://github.com/DrDonk/efi-unlocker/releases/download/1.0.0/efi-unlocker100.zip
      https://github.com/DrDonk/efi-unlocker
       
      Please read the readme.txt file for details.
      readme.txt
    • By Donk
      Verision 3 of the macOS Unlocker for VMware Workstation and Player. Supports versions:
       
      Workstation 11/12/14/15 on Windows and Linux Workstation Player 7/12/14/15 on Windows and Linux  
      https://www.insanelymac.com/forum/files/file/963-macos-unlocker-v30-for-vmware-workstation/
      https://github.com/DrDonk/unlocker/releases/download/3.0.2/unlocker302.zip
      https://github.com/DrDonk/unlocker/
      readme.txt
    • By Donk
      macOS Unlocker V3.0 for VMware Workstation ========================================== +-----------------------------------------------------------------------------+ | IMPORTANT: | | ========== | | | | Always uninstall the previous version of the Unlocker before using a new | | version. Failure to do this could render VMware unusable. | | | +-----------------------------------------------------------------------------+ 1. Introduction --------------- Unlocker 3 is designed for VMware Workstation 11-15 and Player 7-15. If you are using an earlier product please continue using Unlocker 1. Version 3 has been tested against: * Workstation 11/12/14/15 on Windows and Linux * Workstation Player 7/12/14/15 on Windows and Linux The patch code carries out the following modifications dependent on the product being patched: * Fix vmware-vmx and derivatives to allow macOS to boot * Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation * Download a copy of the latest VMware Tools for macOS Note that not all products recognise the darwin.iso via install tools menu item. You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7. In all cases make sure VMware is not running, and any background guests have been shutdown. The code is written in Python. 2. Prerequisites ---------------- The code requires Python 2.7 to work. Most Linux distros ship with a compatible Python interpreter and should work without requiring any additional software. Windows Unlocker has a packaged version of the Python script using PyInstaller, and so does not require Python to be installed. 3. Limitations -------------- If you are using VMware Player or Workstation on Windows you may get a core dump. Latest Linux products are OK and do not show this problem. +-----------------------------------------------------------------------------+ | IMPORTANT: | | ========== | | | | If you create a new VM VMware may stop and create a core dump. | | There are two options to work around this issue: | | | | 1. Change the VM to be HW 10 - this does not affect performance. | | 2. Edit the VMX file and add: | | smc.version = "0" | | | +-----------------------------------------------------------------------------+ 4. Windows ---------- On Windows you will need to either run cmd.exe as Administrator or using Explorer right click on the command file and select "Run as administrator". win-install.cmd - patches VMware win-uninstall.cmd - restores VMware win-update-tools.cmd - retrieves latest macOS guest tools 5. Linux --------- On Linux you will need to be either root or use sudo to run the scripts. You may need to ensure the Linux scripts have execute permissions by running chmod +x against the 2 files. lnx-install.sh - patches VMware lnx-uninstall.sh - restores VMware lnx-update-tools.cmd - retrieves latest macOS guest tools 6. Thanks --------- Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife (MSoK) for all the testing and support. Thanks also to Sam B for finding the solution for ESXi 6 and helping me with debugging expertise. Sam also wrote the code for patching ESXi ELF files and modified the unlocker code to run on Python 3 in the ESXi 6.5 environment. History ------- 27/09/18 3.0.0 - First release 02/10/18 3.0.1 - Fixed gettools.py to work with Python 3 and correctly download darwinPre15.iso 10/10/18 3.0.2 - Fixed false positives from anti-virus software with Windows executables - Allow Python 2 and 3 to run the Python code from Bash scripts (c) 2011-2018 Dave Parsons  
    • By Donk
      macOS Unlocker V3.0 for VMware ESXi =================================== 1. Introduction --------------- Unlocker 3 for ESXi is designed for VMware ESXi 6.5 and 6.7. The patch code carries out the following modifications dependent on the product being patched: * Fix vmware-vmx to allow macOS to boot * Fix libvmkctl to allow vSphere to control the guest The code is written in Python as it makes the Unlocker easier to run and maintain on ESXi. +-----------------------------------------------------------------------------+ | IMPORTANT: | | ========== | | | | Always uninstall the previous version of the Unlocker before using a new | | version. Failure to do this could render VMware unusable. | | | +-----------------------------------------------------------------------------+ 2. Installation --------------- Copy the distribution file to the ESXi host datastore using scp or some other data transfer system. Decompress the file from the ESXi console or via SSH: tar xzvf esxi-unlocker-xxx.tgz (xxx - will be the version number, for example, 300) Run the command from the terminal: ./esxi-install.sh Finally reboot the server. 3. Uninstallation ----------------- Open the ESXi console or login via SSH and chnage to the folder where the files were extracted. Run the command from the terminal: ./esxi-uninstall.sh Finally reboot the server. 4. Notes -------- A. There is a command added called esxi-smctest.sh which can show if the patch is successful. It must be run from a terminal or SSH session. The output should be: /bin/vmx smcPresent = true custom.vgz false 38725560 B B. The unlocker can be temporarily disabled during boot by editing the boot options and adding "nounlocker". 5. Thanks --------- Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife (MSoK) for all the testing and support. Thanks also to Sam B for finding the solution for ESXi 6 and helping me with debugging expertise. Sam also wrote the code for patching ESXi ELF files and modified the unlocker code to run on Python 3 in the ESXi 6.5 environment. The code is available at https://github.com/DrDonk/esxi-unlocker History ------- 26/09/18 3.0.0 - First release (c) 2011-2018 Dave Parsons  
×