Jump to content

Workstation 11/12, Player 7/12, Fusion 7/8 and ESXi 6 Mac OS X Unlocker 2


Donk
 Share

691 posts in this topic

Recommended Posts

 

WARNING - Do NOT use the code on GitHub please wait until a release is announced. The current 2.0.9 code is there but there are serious issues still to be resolved which could render your ESXi host unusable!

 

Support Request

Please, please, please do NOT copy vmx or log files inline in a post. Always attach the log file as an attachment. It slows down the forum editor and puts a lot of junk in the actual post, and I cannot analyse unless it is a separate file. Alternatively post a link to a Gist.

 

Download Links

 

InsanelyMac: http://www.insanelymac.com/forum/files/file/339-unlocker/

My website: http://www.daveparsons.net/unlocker208.zip

 

14/11/15 - Version 2.0.8
  • Player 12 on Linux fixes
  • Get latest VMware tools command
  • Removed firmware files
  • Moved to PyInstaller 3.0

16/09/15 - Version 2.0.7

  • Workstation 12 on Linux fixes

20/06/15 - Version 2.0.6

  • ESXi 6 patch for smcPresent vCenter compatibility. Thanks Sam!

18/06/15 - Version 2.0.5

 

ESXi 6 work was greatly helped by Sam B. Thanks to Sam for helping me out and finding the last piece of the puzzle.

  • ESXi 6 working
  • Latest tools from Fusion 7.1.2

24/01/15 - Version 2.0.4

 

Couple of quick fixes:

  • Added stop and start of VMware View USB Service to Windows batch files
  • Fixed broken GOS Table patching on Linux

03/01/15 - Version 2.0.3

 

Added new EFI firmware files to remove Server check for 10.5 and 10.6.

 

If you are using a 32-bit installation of OS X:

 

1. Copy efi32-srvr.rom to guest folder.

2. Edit the vmx file and add:

 

efi32.filename = "efi32-srvr.rom"

If you are using a 64-bit installation of OS X:

 

1. Copy efi64-srvr.rom to guest folder.

2. Edit the vmx file and add:

efi64.filename = "efi64-srvr.rom"

14/12/14 - Version 2.0.2

 

Uploaded a new version, 2.0.2, which removes need for Python on Windows. Packaged using PyInstaller. If you have already used 2.0.0 successfully then you do not need this as there are no other changes. Also added darwin.iso back into the zip file.

 

http://www.insanelymac.com/forum/files/file/339-unlocker/

 

For installation queries please read MSoK's excellent post http://www.insanelymac.com/forum/topic/290949-how-to-install-os-x-10x-snow-leopard-lion-mountain-lion-mavericks-and-yosemite-in-vmware-workstation-10-or-player-6/.

 

Mac OS X Unlocker for VMware V2.0
=================================


1. Introduction
---------------


Unlocker 2 is designed for Workstation 11, Player 7, ESXi 6 and Fusion 7.


If you are using an earlier product please continue using Unlocker 1 


Version 2 has been tested against:


* Workstation 11/12 on Windows and Linux
* Player 7 & Workstation Player 12 on Windows and Linux
* Fusion 7/8 on Mavericks and Yosemite
* ESXi 6.0


The patch code carries out the following modifications dependent on the product
being patched:


* Fix vmware-vmx and derivatives to allow Mac OS X to boot
* Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
* Fix libvmkctl.so on ESXi 6 to allow use with vCenter
* Download a copy of the latest VMware Tools for OS X


Note that not all products recognise the darwin.iso via install tools menu item.
You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.


The vmwarebase code does not need to be patched on OS X or ESXi so you will see a
message on those systems telling you that it will not be patched.


In all cases make sure VMware is not running, and any background guests have
been shutdown.


The code is now Python as it makes the Unlocker easier to run and maintain on ESXi.
There are some challenges to write the code as ESXi has a subset of Python 2.7 which
constrains some modules that can be used.


2. Prerequisites
----------------


The code requires Python 2.7 to work. Most Linux distros, ESXi and OS X ship with a compatible
Python interpreter and should work without requiring any additional software.


Windows has a packaged version of the Python script using PyInstaller, and so does not
require Python to be installed.


3. Limitations
--------------


If you are using VMware Player or Workstation on Windows you may get a core dump.


Latest Linux and ESXi products are OK and do not show this problem.


+-----------------------------------------------------------------------------+
| IMPORTANT:                                                                  |
| ==========                                                                  |
|                                                                             |
| If you create a new VM using version 11 or 12 hardware VMware may stop and  |
| create a core dump. There are two options to work around this issue:        |
|                                                                             |
| 1. Change the VM to be HW 10 - this does not affect performance.            |
| 2. Edit the VMX file and add:                                               |
|    smc.version = "0"                                                        |
|                                                                             |
+-----------------------------------------------------------------------------+


4. Windows
----------
On Windows you will need to either run cmd.exe as Administrator or using
Explorer right click on the command file and select "Run as administrator".


win-install.cmd   - patches VMware
win-uninstall.cmd - restores VMware
win-update-tools.cmd - retrieves latest OS X guest tools


5. Linux
---------
On Linux you will need to be either root or use sudo to run the scripts.


You may need to ensure the Linux scripts have execute permissions
by running chmod +x against the 2 files.


lnx-install.sh   - patches VMware
lnx-uninstall.sh - restores VMware
lnx-update-tools.cmd - retrieves latest OS X guest tools


6. Mac OS X
-----------
On Mac OS X you will need to be either root or use sudo to run the scripts.
This is really only needed if you want to use client versions of Mac OS X.


You may need to ensure the OS X scripts have execute permissions
by running chmod +x against the 2 files.


osx-install.sh   - patches VMware
osx-uninstall.sh - restores VMware


7. ESXi
-------
You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.


Once uploaded you will need to either use the ESXi support console or use SSH to
run the commands. Use the unzip command to extract the files. 


<<< WARNING: use a datastore volume to run the scripts >>>


Please note that you will need to reboot the host for the patches to become active.
The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.


You may need to ensure the ESXi scripts have execute permissions
by running chmod +x against the 2 files.


esxi-install.sh   - patches VMware 
esxi-uninstall.sh - restores VMware 


Note:
1. Any changes you have made to local.sh will be lost. If you have made changes to 
   that file, you will need to merge them into the supplied local.sh file.
2. The unlocker runs at boot time to patch the relevant files and it now survives 
   an upgrade or patch to ESXi as local.sh is part of the persisted local state.
   
8. Thanks
---------


Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
(MSoK) for all the testing and support.


Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
debugging expertise. Sam also wrote the code for patching ESXi ELF files.




History
-------
12/12/14 2.0.0 - First release
13/13/14 2.0.1 - Removed need for Python for Windows
13/13/14 2.0.2 - darwin.iso was missing from zip file
02/01/15 2.0.3 - Added EFI firmware files to remove Server check
               - Refactored Python code
07/01/15 2.0.4 - Added View USB Service to Windows batch files
               - Fixed broken GOS Table patching on Linux
18/06/15 2.0.5 - ESXi 6 working
               - Latest tools from Fusion 7.1.2
20/06/15 2.0.6 - ESXi 6 patch for smcPresent vCenter compatibility
16/09/15 2.0.7 - Workstation 12 on Linux fixes
14/11/15 2.0.8 - Player 12 on Linux fixes
               - Get latest VMware tools command
               - Removed firmware files
               - Moved to PyInstaller 3.0


(c) 2011-2015 Dave Parsons

 

 

 

WARNING - Do NOT use the code on GitHub please wait until a release is announced. The current 2.0.9 code is there but there are serious issues still to be resolved which could render your ESXi host unusable!

 

Support Request

Please, please, please do NOT copy vmx or log files inline in a post. Always attach the log file as an attachment. It slows down the forum editor and puts a lot of junk in the actual post, and I cannot analyse unless it is a separate file. Alternatively post a link to a Gist.

 

Download Links

 

InsanelyMac: http://www.insanelymac.com/forum/files/file/339-unlocker/

My website: http://www.daveparsons.net/unlocker208.zip

 

14/11/15 - Version 2.0.8
  • Player 12 on Linux fixes
  • Get latest VMware tools command
  • Removed firmware files
  • Moved to PyInstaller 3.0

16/09/15 - Version 2.0.7

  • Workstation 12 on Linux fixes

20/06/15 - Version 2.0.6

  • ESXi 6 patch for smcPresent vCenter compatibility. Thanks Sam!

18/06/15 - Version 2.0.5

 

ESXi 6 work was greatly helped by Sam B. Thanks to Sam for helping me out and finding the last piece of the puzzle.

  • ESXi 6 working
  • Latest tools from Fusion 7.1.2

24/01/15 - Version 2.0.4

 

Couple of quick fixes:

  • Added stop and start of VMware View USB Service to Windows batch files
  • Fixed broken GOS Table patching on Linux

03/01/15 - Version 2.0.3

 

Added new EFI firmware files to remove Server check for 10.5 and 10.6.

 

If you are using a 32-bit installation of OS X:

 

1. Copy efi32-srvr.rom to guest folder.

2. Edit the vmx file and add:

 

efi32.filename = "efi32-srvr.rom"

If you are using a 64-bit installation of OS X:

 

1. Copy efi64-srvr.rom to guest folder.

2. Edit the vmx file and add:

efi64.filename = "efi64-srvr.rom"

14/12/14 - Version 2.0.2

 

Uploaded a new version, 2.0.2, which removes need for Python on Windows. Packaged using PyInstaller. If you have already used 2.0.0 successfully then you do not need this as there are no other changes. Also added darwin.iso back into the zip file.

 

http://www.insanelymac.com/forum/files/file/339-unlocker/

 

For installation queries please read MSoK's excellent post http://www.insanelymac.com/forum/topic/290949-how-to-install-os-x-10x-snow-leopard-lion-mountain-lion-mavericks-and-yosemite-in-vmware-workstation-10-or-player-6/.

 

Mac OS X Unlocker for VMware V2.0
=================================


1. Introduction
---------------


Unlocker 2 is designed for Workstation 11, Player 7, ESXi 6 and Fusion 7.


If you are using an earlier product please continue using Unlocker 1 


Version 2 has been tested against:


* Workstation 11/12 on Windows and Linux
* Player 7 & Workstation Player 12 on Windows and Linux
* Fusion 7/8 on Mavericks and Yosemite
* ESXi 6.0


The patch code carries out the following modifications dependent on the product
being patched:


* Fix vmware-vmx and derivatives to allow Mac OS X to boot
* Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
* Fix libvmkctl.so on ESXi 6 to allow use with vCenter
* Download a copy of the latest VMware Tools for OS X


Note that not all products recognise the darwin.iso via install tools menu item.
You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.


The vmwarebase code does not need to be patched on OS X or ESXi so you will see a
message on those systems telling you that it will not be patched.


In all cases make sure VMware is not running, and any background guests have
been shutdown.


The code is now Python as it makes the Unlocker easier to run and maintain on ESXi.
There are some challenges to write the code as ESXi has a subset of Python 2.7 which
constrains some modules that can be used.


2. Prerequisites
----------------


The code requires Python 2.7 to work. Most Linux distros, ESXi and OS X ship with a compatible
Python interpreter and should work without requiring any additional software.


Windows has a packaged version of the Python script using PyInstaller, and so does not
require Python to be installed.


3. Limitations
--------------


If you are using VMware Player or Workstation on Windows you may get a core dump.


Latest Linux and ESXi products are OK and do not show this problem.


+-----------------------------------------------------------------------------+
| IMPORTANT:                                                                  |
| ==========                                                                  |
|                                                                             |
| If you create a new VM using version 11 or 12 hardware VMware may stop and  |
| create a core dump. There are two options to work around this issue:        |
|                                                                             |
| 1. Change the VM to be HW 10 - this does not affect performance.            |
| 2. Edit the VMX file and add:                                               |
|    smc.version = "0"                                                        |
|                                                                             |
+-----------------------------------------------------------------------------+


4. Windows
----------
On Windows you will need to either run cmd.exe as Administrator or using
Explorer right click on the command file and select "Run as administrator".


win-install.cmd   - patches VMware
win-uninstall.cmd - restores VMware
win-update-tools.cmd - retrieves latest OS X guest tools


5. Linux
---------
On Linux you will need to be either root or use sudo to run the scripts.


You may need to ensure the Linux scripts have execute permissions
by running chmod +x against the 2 files.


lnx-install.sh   - patches VMware
lnx-uninstall.sh - restores VMware
lnx-update-tools.cmd - retrieves latest OS X guest tools


6. Mac OS X
-----------
On Mac OS X you will need to be either root or use sudo to run the scripts.
This is really only needed if you want to use client versions of Mac OS X.


You may need to ensure the OS X scripts have execute permissions
by running chmod +x against the 2 files.


osx-install.sh   - patches VMware
osx-uninstall.sh - restores VMware


7. ESXi
-------
You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.


Once uploaded you will need to either use the ESXi support console or use SSH to
run the commands. Use the unzip command to extract the files. 


<<< WARNING: use a datastore volume to run the scripts >>>


Please note that you will need to reboot the host for the patches to become active.
The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.


You may need to ensure the ESXi scripts have execute permissions
by running chmod +x against the 2 files.


esxi-install.sh   - patches VMware 
esxi-uninstall.sh - restores VMware 


Note:
1. Any changes you have made to local.sh will be lost. If you have made changes to 
   that file, you will need to merge them into the supplied local.sh file.
2. The unlocker runs at boot time to patch the relevant files and it now survives 
   an upgrade or patch to ESXi as local.sh is part of the persisted local state.
   
8. Thanks
---------


Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
(MSoK) for all the testing and support.


Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
debugging expertise. Sam also wrote the code for patching ESXi ELF files.




History
-------
12/12/14 2.0.0 - First release
13/13/14 2.0.1 - Removed need for Python for Windows
13/13/14 2.0.2 - darwin.iso was missing from zip file
02/01/15 2.0.3 - Added EFI firmware files to remove Server check
               - Refactored Python code
07/01/15 2.0.4 - Added View USB Service to Windows batch files
               - Fixed broken GOS Table patching on Linux
18/06/15 2.0.5 - ESXi 6 working
               - Latest tools from Fusion 7.1.2
20/06/15 2.0.6 - ESXi 6 patch for smcPresent vCenter compatibility
16/09/15 2.0.7 - Workstation 12 on Linux fixes
14/11/15 2.0.8 - Player 12 on Linux fixes
               - Get latest VMware tools command
               - Removed firmware files
               - Moved to PyInstaller 3.0


(c) 2011-2015 Dave Parsons

 

Hello Dear User Donk.
 
I ask you to replound your link because the page from which you can
 
Download Unlocker 208 displays Not Found.
 
Link to comment
Share on other sites

 

Hello Dear User Donk.
 
I ask you to replound your link because the page from which you can
 
Download Unlocker 208 displays Not Found.
 

 

 

I have removed them from my server as I am retiring from this project. Please use the Downloads section of Insanelymac to get the releases.

  • Like 1
Link to comment
Share on other sites

I have removed them from my server as I am retiring from this project. Please use the Downloads section of Insanelymac to get the releases.

I'm a new user on the forum please send me a link
 
Because I'm just learning the forum menu.
Link to comment
Share on other sites

Donk,

 

I tried sending you a PM asking about this project and how you develop it, but for some reason it would not send. The reason I ask is because I would like to take over the project, but I am not sure if I know what is needed in order to do so.

  • Like 2
Link to comment
Share on other sites

@donk this works for me in workstation player 14

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name
  • Like 1
Link to comment
Share on other sites

 

@donk this works for me in workstation player 14

 

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

You guys are geniuses. How do you know what to change?!

  • Like 2
Link to comment
Share on other sites

Genius might be a stretch for me... I'm not going to go into how I came to up with it though since it's fairly complex.

 

My fix definitely isn't backwards compatible and I've only tested it on one product. There's still more work to do to make this fully usable, but hopefully the info I posted will help donk to produce a real fix.

  • Like 2
Link to comment
Share on other sites

Genius might be a stretch for me... I'm not going to go into how I came to up with it though since it's fairly complex.

 

My fix definitely isn't backwards compatible and I've only tested it on one product. There's still more work to do to make this fully usable, but hopefully the info I posted will help donk to produce a real fix.

 

Please help my Friend. 

 

Where in the Vmware Workstation menu is the option to allocate memory for the card
 
graphic?
Link to comment
Share on other sites

Hi, I think you can fork Don's repo and add it so he is retiring from this project

 

 

@donk this works for me in workstation player 14

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name
Link to comment
Share on other sites

 

Please help my Friend. 

 

Where in the Vmware Workstation menu is the option to allocate memory for the card
 
graphic?

 

 

A bit off topic... I only use the player, but the option shows when you select Display in the Hardware tab of the settings for the VM. Vmware is not the right solution for graphics intensive stuff though. Try KVM where you can do gpu passthrough.

 

 

Hi, I think you can fork Don's repo and add it so he is retiring from this project

It's not quite that simple, especially when Windows executables need to be built. I'm not the right project to take over this project, sorry. Hopefully someone else will come along with better skills and more time on their hands.

Link to comment
Share on other sites

Sort of related...

I tried installing the new guest tools from Fusion 10 (on VMware Player 12).  Afterwards, my guest macOS VM was stuck in high-DPI mode so everything was really huge.  Has anyone else tried the new VMware Tools yet?

They’ve already released a new set of tools (10.01). Perhaps they found and fixed issues.
Link to comment
Share on other sites

You guys are geniuses. How do you know what to change?!

 

 

@donk this works for me in workstation player 14

 

 

def patchbase(name):
    # Patch file
    print 'GOS Patching: ' + name
    f = open(name, 'r+b')

    # Entry to search for in GOS table
    darwin = (
        '\x10\x00\x00\x00\x10\x00\x00\x00'
        '\x02\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x00\x00\x00\x00\x00\x00\x00\x00'
        '\x3E'
    )

    # Read file into string variable
    base = f.read()

    # Loop through each entry and set top bit
    # 0xBE --> 0xBF
    # Updated for Workstation 14 0x3E --> 0x3F
    offset = 0
    while offset < len(base):
        offset = base.find(darwin, offset)
        if offset == -1:
            break
        f.seek(offset + 32)
        flag = f.read(1)
        if flag == '\x3E':
            f.seek(offset + 32)
            f.write('\x3F')
            print 'GOS Patched flag @: ' + hex(offset)
        else:
            print 'GOS Unknown flag @: ' + hex(offset) + '/' + hex(int(flag))

        offset += 33

    # Tidy up
    f.flush()
    f.close()
    print 'GOS Patched: ' + name

 

Yep that is the new string to look for in vmwarebase.dll. Great to have someone confirm it independently. I have another issue with the services restarting on Windows before I can apply the patch. Must be something new keeping them running.

Donk,

 

I tried sending you a PM asking about this project and how you develop it, but for some reason it would not send. The reason I ask is because I would like to take over the project, but I am not sure if I know what is needed in order to do so.

 

I disabled PM as had way to many requests for help plus wanting to give money for help. I always did this for fun.

 

If you want to contact me use d_a_v_e_@_d_a_v_e_p_a_r_s_o_n_s_._n_e_t (remove underscore)

 

Very happy to talk to a volunteer about what to do next.

  • Like 1
Link to comment
Share on other sites

A bit off topic... I only use the player, but the option shows when you select Display in the Hardware tab of the settings for the VM. Vmware is not the right solution for graphics intensive stuff though. Try KVM where you can do gpu passthrough.

 

 

It's not quite that simple, especially when Windows executables need to be built. I'm not the right project to take over this project, sorry. Hopefully someone else will come along with better skills and more time on their hands.

Does the Windows executable actually do anything other than run the Python script? If that's all it does, I should think that there is no need to recompile it every time.

 

Yep that is the new string to look for in vmwarebase.dll. Great to have someone confirm it independently. I have another issue with the services restarting on Windows before I can apply the patch. Must be something new keeping them running.

 

I disabled PM as had way to many requests for help plus wanting to give money for help. I always did this for fun.

 

If you want to contact me use d_a_v_e_@_d_a_v_e_p_a_r_s_o_n_s_._n_e_t (remove underscore)

 

Very happy to talk to a volunteer about what to do next.

Great! You will be hearing from me shortly. Although I have the will to take over the project, my concern is that I do not know if I have the knowledge that is needed to take it over.

  • Like 2
Link to comment
Share on other sites

Does the Windows executable actually do anything other than run the Python script? If that's all it does, I should think that there is no need to recompile it every time.

 

Great! You will be hearing from me shortly. Although I have the will to take over the project, my concern is that I do not know if I have the knowledge that is needed to take it over.

Windows executablle contains python script and part of python engine inside. Need to recompile unllocker.exe after changing unlocker.py

Link to comment
Share on other sites

Windows executablle contains python script and part of python engine inside. Need to recompile unllocker.exe after changing unlocker.py

 

Yep it used pyInstaller so do not need Python on Windows, which was a problem for early on during unlocker development for some users.

 

I will walk through the creation with whoever takes the project on from me.

  • Like 3
Link to comment
Share on other sites

For those of you who want to try out the modifications that hoanglan87 posted here, but want an easy way to do so, I've uploaded an unofficial repack of the VMware Patcher here. As of this posting, the submission is waiting for approval by a moderator, but I'm hoping that it will be available shortly. This repack includes a pyInstaller-built executable for patching VMware on Windows. This has not been thoroughly tested, but I can confirm that this repack is working without any issues for me. (I am running VMware Workstation Pro 14 on Windows 10.)

 

Update: Until a moderator approves the InsanelyMac download link I posted above, here is an off-site download link: https://nofile.io/f/HPYpMCHrQE1/unlocker209-unofficial.zip

 

Update 2: The InsanelyMac download link has been approved.

  • Like 5
Link to comment
Share on other sites

I am going to work with David-B on this and I hope he will take over from me. I am currently on vacation so expect a delay of 2 weeks. Once this version is released I hope David-B can run with the project, abnd I will be available to offer advice to him, and any others who want to join in with the work.

  • Like 6
Link to comment
Share on other sites

Thank you so much Donk for the amazing work you've done with the Unlocker throughout these years. Your work has made life simplier for most of us here and I wish you success in your future project. THANK YOU!

  • Like 1
Link to comment
Share on other sites

Sort of related...

I tried installing the new guest tools from Fusion 10 (on VMware Player 12).  Afterwards, my guest macOS VM was stuck in high-DPI mode so everything was really huge.  Has anyone else tried the new VMware Tools yet?

 

i had the same issue as you when running on my new X1 carbon with HiDPI display. luckily this is an issue in the normal mac world as well.

 

from a terminal window:

sudo defaults write /Library/Preferences/com.apple.windowserver.plist DisplayResolutionEnabled -bool true

and then reboot the VM

 

after it comes back up, go to System Preferences > Display and select the "Scaled" option.

you'll see a new "HiDPI" entry. select this one for beautiful scaled goodness :-)

 

cheers, wizdude

  • Like 1
Link to comment
Share on other sites

Dear David-B,

 

Thank you for the the post. I did try the windows patch and it's working, my VMware Workstation 14.0 Build 6661328 in Windows 10 1703 does now offer the options for MacOS, However the Linux version of the patch is not working. The following issues appear:

 

1) lnx-install.sh doesn't execute because of the brackets on line 4 "VMware Unlocker 2.0.9 (Unofficial Repack)", removing the brackets "VMware Unlocker 2.0.9 Unofficial Repack" does allow the script to execute, but there are a bunch of erros. I am attaching the log to this post, hoping you'll be able to sort it out. I am using Ubuntu 16.04 LTS x64.

VMware Unlocker 2.0.9 Unofficial Repack
===============================
Copyright: Dave Parsons 2011-15
Creating backup folder...
'/usr/lib/vmware/bin/vmware-vmx' -> './backup/vmware-vmx'
'/usr/lib/vmware/bin/vmware-vmx-debug' -> './backup/vmware-vmx-debug'
'/usr/lib/vmware/bin/vmware-vmx-stats' -> './backup/vmware-vmx-stats'
'/usr/lib/vmware/lib/libvmwarebase.so/libvmwarebase.so' -> './backup/libvmwarebase.so'
Patching...
[AppLoader] Use shipped Linux kernel AIO access library.
An up-to-date "libaio" or "libaio1" package from your system is preferred.
File: /usr/lib/vmware/bin/vmware-vmx
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xe11fc0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xe11fe0
+LKS Key:
002 0xe12028 +LKS 01 flag 0x90 0x1e2700 07
OSK0 Key Before:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xe163f0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xe16420
+LKS Key:
004 0xe164f8 +LKS 01 flag 0x90 0x1e2700 01
OSK0 Key Before:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-debug
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0x117f020
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0x117f040
+LKS Key:
002 0x117f088 +LKS 01 flag 0x90 0x2449c0 07
OSK0 Key Before:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0x1183450
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0x1183480
+LKS Key:
004 0x1183558 +LKS 01 flag 0x90 0x2449c0 01
OSK0 Key Before:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-stats
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xec15a0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xec15c0
+LKS Key:
002 0xec1608 +LKS 01 flag 0x90 0x2260b0 07
OSK0 Key Before:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xec59d0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xec5a00
+LKS Key:
004 0xec5ad8 +LKS 01 flag 0x90 0x2260b0 01
OSK0 Key Before:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

GOS Patching: /usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0
Traceback (most recent call last):
File "./14patch.py", line 413, in <module>
main()
File "./14patch.py", line 404, in main
patchbase(vmwarebase)
File "./14patch.py", line 282, in patchbase
f = open(name, 'r+b')
IOError: [Errno 2] No such file or directory: '/usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0'

For those of you who want to try out the modifications that hoanglan87 posted here, but want an easy way to do so, I've uploaded an unofficial repack of the VMware Patcher here. As of this posting, the submission is waiting for approval by a moderator, but I'm hoping that it will be available shortly. This repack includes a pyInstaller-built executable for patching VMware on Windows. This has not been thoroughly tested, but I can confirm that this repack is working without any issues for me. (I am running VMware Workstation Pro 14 on Windows 10.)

 

Update: Until a moderator approves the InsanelyMac download link I posted above, here is an off-site download link: https://nofile.io/f/HPYpMCHrQE1/unlocker209-unofficial.zip

 

 

Update 2: The InsanelyMac download link has been approved.

  • Like 1
Link to comment
Share on other sites

I am going to work with David-B on this and I hope he will take over from me. I am currently on vacation so expect a delay of 2 weeks. Once this version is released I hope David-B can run with the project, abnd I will be available to offer advice to him, and any others who want to join in with the work.

 

Awesome. It is going to stay on GitHub? I only see 2 people have forked and updated the repository recently, not sure either are David-B

  • Like 1
Link to comment
Share on other sites

 

Dear David-B,

 

Thank you for the the post. I did try the windows patch and it's working, my VMware Workstation 14.0 Build 6661328 in Windows 10 1703 does now offer the options for MacOS, However the Linux version of the patch is not working. The following issues appear:

 

1) lnx-install.sh doesn't execute because of the brackets on line 4 "VMware Unlocker 2.0.9 (Unofficial Repack)", removing the brackets "VMware Unlocker 2.0.9 Unofficial Repack" does allow the script to execute, but there are a bunch of erros. I am attaching the log to this post, hoping you'll be able to sort it out. I am using Ubuntu 16.04 LTS x64.

VMware Unlocker 2.0.9 Unofficial Repack
===============================
Copyright: Dave Parsons 2011-15
Creating backup folder...
'/usr/lib/vmware/bin/vmware-vmx' -> './backup/vmware-vmx'
'/usr/lib/vmware/bin/vmware-vmx-debug' -> './backup/vmware-vmx-debug'
'/usr/lib/vmware/bin/vmware-vmx-stats' -> './backup/vmware-vmx-stats'
'/usr/lib/vmware/lib/libvmwarebase.so/libvmwarebase.so' -> './backup/libvmwarebase.so'
Patching...
[AppLoader] Use shipped Linux kernel AIO access library.
An up-to-date "libaio" or "libaio1" package from your system is preferred.
File: /usr/lib/vmware/bin/vmware-vmx
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xe11fc0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xe11fe0
+LKS Key:
002 0xe12028 +LKS 01 flag 0x90 0x1e2700 07
OSK0 Key Before:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xe16360 OSK0 32 ch8* 0x80 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xe163a8 OSK1 32 ch8* 0x80 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xe163f0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xe16420
+LKS Key:
004 0xe164f8 +LKS 01 flag 0x90 0x1e2700 01
OSK0 Key Before:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xe1de30 OSK0 32 ch8* 0x90 0x1e2700 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xe1de78 OSK1 32 ch8* 0x90 0x1e2700 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-debug
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0x117f020
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0x117f040
+LKS Key:
002 0x117f088 +LKS 01 flag 0x90 0x2449c0 07
OSK0 Key Before:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0x11833c0 OSK0 32 ch8* 0x80 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0x1183408 OSK1 32 ch8* 0x80 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0x1183450
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0x1183480
+LKS Key:
004 0x1183558 +LKS 01 flag 0x90 0x2449c0 01
OSK0 Key Before:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0x118ae90 OSK0 32 ch8* 0x90 0x2449c0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0x118aed8 OSK1 32 ch8* 0x90 0x2449c0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

File: /usr/lib/vmware/bin/vmware-vmx-stats
appleSMCTableV0 (smc.version = "0")
appleSMCTableV0 Address : 0xec15a0
appleSMCTableV0 Private Key #: 0xF2/242
appleSMCTableV0 Public Key #: 0xF0/240
appleSMCTableV0 Table : 0xec15c0
+LKS Key:
002 0xec1608 +LKS 01 flag 0x90 0x2260b0 07
OSK0 Key Before:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
241 0xec5940 OSK0 32 ch8* 0x80 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
242 0xec5988 OSK1 32 ch8* 0x80 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

appleSMCTableV1 (smc.version = "1")
appleSMCTableV1 Address : 0xec59d0
appleSMCTableV1 Private Key #: 0x01B4/436
appleSMCTableV1 Public Key #: 0x01B0/432
appleSMCTableV1 Table : 0xec5a00
+LKS Key:
004 0xec5ad8 +LKS 01 flag 0x90 0x2260b0 01
OSK0 Key Before:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK0 Key After:
435 0xecd410 OSK0 32 ch8* 0x90 0x2260b0 6F 75 72 68 61 72 64 77 6F 72 6B 62 79 74 68 65 73 65 77 6F 72 64 73 67 75 61 72 64 65 64 70 6C
OSK1 Key Before:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63
OSK1 Key After:
436 0xecd458 OSK1 32 ch8* 0x90 0x2260b0 65 61 73 65 64 6F 6E 74 73 74 65 61 6C 28 63 29 41 70 70 6C 65 43 6F 6D 70 75 74 65 72 49 6E 63

GOS Patching: /usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0
Traceback (most recent call last):
File "./14patch.py", line 413, in <module>
main()
File "./14patch.py", line 404, in main
patchbase(vmwarebase)
File "./14patch.py", line 282, in patchbase
f = open(name, 'r+b')
IOError: [Errno 2] No such file or directory: '/usr/lib/vmware/lib/libvmwarebase.so.0/libvmwarebase.so.0'

And we have the first failure of my unofficial pack! Sorry about this. As I said, it wasn't tested, and this proves it. I'll look in to it as soon as I can. The plan so far seems to be that Donk is going to help me learn my way around the project, and after a release is put out that is known to be working, I will take over on my own if Donk thinks I am capable and worthy.

 

Awesome. It is going to stay on GitHub? I only see 2 people have forked and updated the repository recently, not sure either are David-B

I have not forked the project yet, but I will be cloning it soon. It may be a while before I actually make my own fork of it though.

  • Like 2
Link to comment
Share on other sites

 Share

×
×
  • Create New...