Vmware unlocker не работает
This thread is locked. You can follow the question or vote as helpful, but you cannot reply to this thread.
Report abuse
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another. Any content of an adult theme or inappropriate to a community web site. Any image, link, or discussion of nudity. Any behavior that is insulting, rude, vulgar, desecrating, or showing disrespect. Any behavior that appears to violate End user license agreements, including providing product keys or links to pirated software. Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct. Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
VMware Unlocker for OS X 1.3.0
VMware Unlocker for OS X 1.3.0
Для запуска в виртуальной среде Mac OS необходим программный продукт
VMware Unlocker for OS X.
Версию VMware Unlocker for OS X 1.3.0 можно найти по адресу:
The package is a combination of the Unlocker code written by Zenith432 plus some
fixes and scripts written by myself that wrap the actual unlocker code.
It has been tested against:
* Workstation 8/9/10 on Windows and Linux (32 & 64-bit versions)
* Player 4/5/6 on Windows and Linux (32 & 64-bit versions)
* Fusion 4/5/6 on Snow Leopard, Lion, Mountain Lion and Mavericks
* ESXi 5.0/5.1/5.5
The patch code carries out the following modifications dependent on the product
being patched:
* Fix vmware-vmx and derivatives to allow Mac OS X to boot
* Fix vmwarebase .dll or .so to allow Apple to be selected during creation
* Copy darwin.iso if needed to VMware folder
Note that not all products recognise the darwin.iso via install tools menu item.
You will have to manually mount the darwin.iso for example on Workstation.
Also Player is missing vmware-vmx-debug and vmware-vmx-stats files and so an
error is shown during patching as the files are not found. This can be safely
ignored.
OS X guests on ESXi patched hosts cannot be controlled from vCenter, only from
the ESXi host itself. This means power operations have to be run directly on
the server.
The vmwarebase code does not need to be patched on ESXi or OS X so you will see a
message on those systems telling you that it will not be patched.
In all cases make sure VMware is not running, and any background guests have
been shutdown.
2. Windows
----------
On Windows you will need to either run cmd.exe as Administrator or using
Explorer right click on the command file and select "Run as administrator".
install.cmd - patches VMware and copies darwin.iso tools image to VMware
uninstall.cmd - restores VMware and removes darwin.iso tools image from VMware
3. Linux
---------
On Linux you will need to be either root or use sudo to run the scripts.
You may need to ensure the contents of the linux folder have execute permissions
by running chmod +x against the 4 files.
install.sh - patches VMware and copies darwin.iso tools image to VMware
uninstall.sh - restores VMware and removes darwin.iso tools image from VMware
4. Mac OS X
-----------
On Mac OS X you will need to be either root or use sudo to run the scripts.
This is really only needed if you want to use client versions of Mac OS X.
You may need to ensure the contents of the osx folder have execute permissions
by running chmod +x against the 3 files.
install.sh - patches VMware
uninstall.sh - restores VMware
5. ESXi
-------
You will need to transfer the zip file to the ESXi host either using vSphere client or SCP.
Once uploaded you will need to either use the ESXi support console or use SSH to
run the commands. Use the unzip command to extract the files.
Please note that you will need to reboot the host for the patches to become active.
The patcher is embbedded in a shell script local.sh which is run at boot from /etc/rc.local.d.
You may need to ensure the contents of the esxi folder have execute permissions
by running chmod +x against the 3 files.
install.sh - patches VMware
uninstall.sh - restores VMware
Usage: Unlocker [-h] [-u] [target_directory]
-h: print help
-u: remove the patch
target_directory: customize location of vmx executables
On all platforms you must run it with administrator or root privileges.
The source code is provided and Zenith432 makes it freely available for
modification. I have modified the code and it is available as per Zenith432's
original statement.
Thanks to Zenith432 for building the unlocker and Mac Son of Knife for all
the testing and support.
History
-------
11/10/11 1.0.0 - First release
07/11/11 1.0.1 - Fixed typo in Windows command files
07/12/11 1.0.2 - Updated patcher and tools for latest release WKS 8.0.1 & FUS 4.1.1
10/05/12 1.1.0 - Changed the patching mechanism for vmwarebase .dll or .so
& tested against ESXi 5.0 U1 and Tech Previews.
13/07/13 1.1.1 - Changed ESXi scripts to ensure not deleting root /bin folder
- Fixed vmwarebase patching on 32-bit Linux
- Some other code clean-up in Unlocker.cpp
18/09/13 1.2.0 - Updated vmwarebase pattern matching for WKS 10.0.0 & FUS 6.0.0
25/03/14 1.3.0 - New method to run patcher on ESXi
- Fixes crashes when using vCenter
- Tested against ESXi 5.5
- Darwin guest tools from Fusion 6.0.2
- Zip file preserves file attributes for Posix based systems
Facebook Если у вас не работает этот способ авторизации, сконвертируйте свой аккаунт по ссылке ВКонтакте Google RAMBLER&Co ID
Авторизуясь в LiveJournal с помощью стороннего сервиса вы принимаете условия Пользовательского соглашения LiveJournal
Установка macOS на компьютер с помощью VMWare
На всякий случай привожу ее в полном объеме:
Установка macOS Mojave
на компьютер через VMWare
17.08.2017 • Обновлено 14.11.2019
Запустить операционную систему macOS Mojave «поверх» Windows на ПК или ноутбуке можно с помощью виртуальных машин — программ, которые эмулируют работу одной операционной системы в среде другой. На этой странице содержится инструкция по установке полностью бесплатной версии одной из таких программ — VMWare Workstation Player. Работающая на виртуальной машине (далее — ВМ) macOS Mojave отображается как обычная программа для Windows — в окне или режиме полного экрана.
MacOS в качестве виртуальной ОС не предложит всех своих возможностей по техническим причинам и будет работать медленней, в следствие чего не способна оставить полноценные впечатления от своей работы. Но для поверхностного ознакомления с ОС от Apple такой способ установки вполне сгодится.
Добавление поддержки macOS в VMWare
Создание виртуальной машины в VMWare
Выбор версии ОС в VMWare
Если пункт с Mac OS не появился в настройках VMWare, попробуйте другую версию Unlocker, удаляя перед этим предыдущую через win-uninstall.cmd. |
Выбор папки для VMWare
Удаление жесткого диска в VMWare
Добавление жесткого диска в VMWare
Добавление образа в VMWare
Выделение памяти для VMWare
Выделение памяти для VMWare
Редактирование файла VMWare
Загрузка VMWare Tools
Патч VMWare Tools нужен главным образом для того, чтобы VMWare работала быстрее и поддерживала родное разрешение экрана. |
Могут наблюдаться проблемы с производительностью в течении 10-15 минут после появления Рабочего стола, так как процесс установки к тому времени еще не завершен. |
Установка VMWare Tools
Открытие доступа для VMWare Tools
Готово! Теперь macOS Mojave должна работать на Windows как виртуальная ОС! 😊
Replies (7)
Report abuse
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another. Any content of an adult theme or inappropriate to a community web site. Any image, link, or discussion of nudity. Any behavior that is insulting, rude, vulgar, desecrating, or showing disrespect. Any behavior that appears to violate End user license agreements, including providing product keys or links to pirated software. Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct. Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
2 people found this reply helpful
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
Get the following in the text editor.
Report abuse
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another. Any content of an adult theme or inappropriate to a community web site. Any image, link, or discussion of nudity. Any behavior that is insulting, rude, vulgar, desecrating, or showing disrespect. Any behavior that appears to violate End user license agreements, including providing product keys or links to pirated software. Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct. Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
2 people found this reply helpful
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
The file obviously exists and can be examined. Please open it once more with notepad, then copy & paste its contents into your reply.
Report abuse
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another. Any content of an adult theme or inappropriate to a community web site. Any image, link, or discussion of nudity. Any behavior that is insulting, rude, vulgar, desecrating, or showing disrespect. Any behavior that appears to violate End user license agreements, including providing product keys or links to pirated software. Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct. Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
2 people found this reply helpful
Was this reply helpful?
Sorry this didn't help.
Great! Thanks for your feedback.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.
How satisfied are you with this reply?
Thanks for your feedback.
@echo off
setlocal ENABLEEXTENSIONS
echo VMware Unlocker 2.1.1
echo ========================
echo (c) Dave Parsons 2011-17
net session >NUL 2>&1
if %errorlevel% neq 0 (
echo Administrator privileges required!
exit
)
set KeyName="HKLM\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Workstation"
:: delims is a TAB followed by a space
for /F "tokens=2* delims= " %%A in ('REG QUERY %KeyName% /v InstallPath') do set InstallPath=%%B
echo VMware is installed at: %InstallPath%
echo Stopping VMware services.
net stop vmware-view-usbd > NUL 2>&1
net stop VMwareHostd > NUL 2>&1
net stop VMAuthdService > NUL 2>&1
net stop VMUSBArbService > NUL 2>&1
taskkill /F /IM vmware-tray.exe > NUL 2>&1
echo Backing up files.
rd /s /q .\backup > NUL 2>&1
mkdir .\backup
mkdir .\backup\x64
xcopy /F /Y "%InstallPath%x64\vmware-vmx.exe" .\backup\x64
xcopy /F /Y "%InstallPath%x64\vmware-vmx-debug.exe" .\backup\x64
xcopy /F /Y "%InstallPath%x64\vmware-vmx-stats.exe" .\backup\x64
xcopy /F /Y "%InstallPath%vmwarebase.dll" .\backup\
echo Patching.
unlocker.exe
echo Getting VMware Tools.
gettools.exe
xcopy /F /Y .\tools\darwin*.* "%InstallPath%"
echo Starting VMware services.
net start VMUSBArbService > NUL 2>&1
net start VMAuthdService > NUL 2>&1
net start VMwareHostd > NUL 2>&1
net start vmware-view-usbd > NUL 2>&1
Report abuse
Harassment is any behavior intended to disturb or upset a person or group of people. Threats include any threat of suicide, violence, or harm to another. Any content of an adult theme or inappropriate to a community web site. Any image, link, or discussion of nudity. Any behavior that is insulting, rude, vulgar, desecrating, or showing disrespect. Any behavior that appears to violate End user license agreements, including providing product keys or links to pirated software. Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct. Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation.
macOS Unlocker V4 for VMware Workstation
IMPORTANT
False positive from anti-virus software
Some Windows AV programs mistakenly flag the unlocker as having a virus. This is a false positive and it is mainly seen with Windows Defender. The Go Langauge web site documents the problem.
Always download from the releases section here, and if you have any doubts you can compile the source code and will see the false positive from Defender.
Unlocker 4 is designed for VMware Workstation and Player 16 and has been tested against:
- Workstation Pro 16 on Windows and Linux
- Workstation Player 16 on Windows and Linux
The Unlocker enables certain flags and data tables that are required to see the macOS type when setting the guest OS type, and modify the implmentation of the virtual SMC controller device. These capabiltiites are normally exposed in Fusion and ESXi when running on Apple hardware.
The patch code carries out the following modifications dependent on the product being patched:
- Fix vmware-vmx and derivatives to allow macOS to boot
- Fix vmwarebase.dll or libvmwarebase.so to allow Apple guests to be selected during VM creation
- Provide a copy of the macOS VMware Tools for the guest
It is important to understand that the Unlocker cannot add any new capabilities to VMware Workstation and Player but enables support for macOS that is disabled in the VMware products that do not run on Apple Hardware.
The Unlocker cannot:
- add support for new versions of macOS
- add paravirtualized Apple GPU support
- add AMD CPU support
or any other features that are not already in the VMware compiled code.
A patched macSO kernel must be used to run on AMD systems.
The code has no pre-requisites and should run directly from the download. The code is written in Go with some utility Bash and Powershell files.
On Windows you will need to either run a Command or Powershell prompt as Administrator and navigate to the folder where the golocker has been unpacked and run:
On Linux you will need to be either root or use sudo to run the scripts in the terminal and navigate to the folder where the golocker has been unpacked and run:
5. VMware Downloads
These URLs will link to the latest versions of VMware's hosted products:
The Unlocker provides the VMware tools ISO images. There can be newer releases available which can be downloaded from these URLs if the script has not yet been updated:
These URLs require a VMware login to download.
Version 16 of Workstation Pro recognises the darwin.iso files and the tools can be installed in the usual way by using the "Install VMware Tools" menu item. The Player version does not automatically pick up the ISO images and so the ISO must be maually attached to the VM via the guest's settings.
Thanks to Zenith432 for originally building the C++ Unlocker and Mac Son of Knife (MSoK) for all the testing and support.
Thanks also to Sam B for finding the solution for ESXi 6 and helping me with debugging expertise. Sam also wrote the code for patching ESXi ELF files and modified the Unlocker code to run on Python 3 in the ESXi 6.5 environment.
macOS Unlocker V3.0 for VMware Workstation
WINDOWS USERS: Get the tool from the Releases section, you will get a bundled python distribution that avoids the virus warnings and python not found etc.
LINUX USERS: No bundled python for you, but make sure you have python 3.0+ installed. If you have errors like "Python not supported" but you have python installed, change the lines inside of lnx-install.sh from 'python xxxxxxx.py' to 'python3.7 xxxxxxx.py' (if you have python 3.7 installed, otherwise try python3 or other stuff)
Unlocker 3 is designed for VMware Workstation 11-16 and Player 7-16.
If you are using an earlier product please continue using Unlocker 1.
Version 3 has been tested against:
- Workstation 11/12/14/15/16 on Windows and Linux
- Workstation Player 7/12/14/15/16 on Windows and Linux
The patch code carries out the following modifications dependent on the product being patched:
- Fix vmware-vmx and derivatives to allow macOS to boot
- Fix vmwarebase .dll or .so to allow Apple to be selected during VM creation
- Download a copy of the latest VMware Tools for macOS
Note that not all products recognise the darwin.iso via install tools menu item. You will have to manually mount the darwin.iso for example on Workstation 11 and Player 7.
In all cases make sure VMware is not running, and any background guests have been shutdown.
The code is written in Python.
The code requires Python 2.7 or later to work. Most Linux distros ship with a compatible Python interpreter and should work without requiring any additional software.
Windows Unlocker has a packaged version of the Python script using PyInstaller, and so does not require Python to be installed.
If you are using VMware Player or Workstation on Windows you may get a core dump.
Latest Linux products are OK and do not show this problem.
On Windows you will need to either run cmd.exe as Administrator or using Explorer right click on the command file and select "Run as administrator".
- win-install.cmd - patches VMware
- win-uninstall.cmd - restores VMware
- win-update-tools.cmd - retrieves latest macOS guest tools
On Linux you will need to be either root or use sudo to run the scripts.
You may need to ensure the Linux scripts have execute permissions by running chmod +x against the 2 files.
- lnx-install.sh - patches VMware
- lnx-uninstall.sh - restores VMware
- lnx-update-tools.sh - retrieves latest macOS guest tools
Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife (MSoK) for all the testing and support.
Thanks also to Sam B for finding the solution for ESXi 6 and helping me with debugging expertise. Sam also wrote the code for patching ESXi ELF files and modified the unlocker code to run on Python 3 in the ESXi 6.5 environment.
Facebook Если у вас не работает этот способ авторизации, сконвертируйте свой аккаунт по ссылке ВКонтакте Google RAMBLER&Co ID
Авторизуясь в LiveJournal с помощью стороннего сервиса вы принимаете условия Пользовательского соглашения LiveJournal
Читайте также: