This repository has been archived by the owner on Apr 24, 2023. It is now read-only.
forked from shanyungyang/esxi-unlocker
-
Notifications
You must be signed in to change notification settings - Fork 21
/
readme.txt
122 lines (84 loc) · 3.57 KB
/
readme.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
macOS Unlocker V3.0.3 for VMware ESXi
=====================================
1. Introduction
---------------
Unlocker 3 for ESXi is designed for VMware ESXi 6.5, 6.7 and 7.0
The patch code carries out the following modifications dependent on the product
being patched:
* Fix vmware-vmx to allow macOS to boot
* Fix libvmkctl to allow vSphere to control the guest
The code is written in Python as it makes the Unlocker easier to run and
maintain on ESXi.
+-----------------------------------------------------------------------------+
| IMPORTANT: |
| ========== |
| |
| Always uninstall the previous version of the Unlocker before using a new |
| version. Failure to do this could render VMware unusable. |
| |
+-----------------------------------------------------------------------------+
2. Installation
---------------
Copy the distribution file to the ESXi host datastore using scp or some other
data transfer system. If you want to use the source version (i.e. from GIT) see
"5. Building" fist.
Decompress the file from the ESXi console or via SSH:
tar xzvf esxi-unlocker-xxx.tgz
(xxx - will be the version number, for example, 300)
Run the command from the terminal:
./esxi-install.sh
Finally reboot the server.
3. Uninstallation
-----------------
Open the ESXi console or login via SSH and change to the folder where the files were extracted.
Run the command from the terminal:
./esxi-uninstall.sh
Finally reboot the server.
4. Notes
--------
A. There is a command added called esxi-smctest.sh which can show if the patch is successful. It must be run from a
terminal or SSH session. The output should be:
/bin/vmx
smcPresent = true
custom.vgz false 32486592 B
Note: The uncompressed size reported for custom.vgz will vary depending on the ESXi version.
B. The unlocker can be temporarily disabled during boot by editing the boot options and adding "nounlocker".
5. Building
-----------
If you want to use a version which is not availbale as a distribution (e.g. the code from "master" branch)
you need to first build the package.
Checkout the repository:
git clone https://github.com/shanyungyang/esxi-unlocker.git
(if you don't have git installed you can download ZIP archive from GitHub instead)
Enter the directory and build:
cd esxi-unlocker
./esxi-build.py
If everything went correctly the ouput should be:
ESXi-Build for macOS
Timestamping files...
Creating unlocker.tgz...
etc/
etc/rc.local.d/
etc/rc.local.d/unlocker.py
Creating esxi-unlocker-300.tgz...
unlocker.tgz
esxi-install.sh
esxi-uninstall.sh
esxi-smctest.sh
readme.txt
The package you need to copy in the example above is esxi-unlocker-300.tgz (NOT unlocker.tgz!).
6. Thanks
---------
Thanks to Zenith432 for originally building the C++ unlocker and Mac Son of Knife
(MSoK) for all the testing and support.
Thanks also to Sam B for finding the solution for ESXi 6 and helping me with
debugging expertise. Sam also wrote the code for patching ESXi ELF files and
modified the unlocker code to run on Python 3 in the ESXi 6.5 environment.
History
-------
26/09/2018 3.0.0 - First release
01/05/2020 3.0.1 - Fix for ESXi 7.0
10/18/2020 3.0.2 - Fix for ESXi 7.0 U1 (7.0.1)
10/17/2020 3.0.3 - Fix for ESXi 7.0 U3 (7.0.3)
(c) 2011-2018 Dave Parsons
Powered by sysin.org