On Tue, Oct 13, 2015 at 07:43:00PM -0300, Eduardo Habkost wrote: > On Wed, Oct 14, 2015 at 12:18:10AM +0300, Michael S. Tsirkin wrote: > > On Tue, Oct 13, 2015 at 04:10:03PM -0300, Eduardo Habkost wrote: > > > One of the things that may break if guest-visible bits of the machine > > > change is Windows license activation, but the rules Windows use to > > > trigger reactivation aren't very clear. > > > > They are easy to find on the internet. > > I couldn't find them[1]. If you have a pointer to a clear description of > the rules for all Windows versions, I would love to see it.
The detailed info is not hard to find: http://en.wikipedia.org/wiki/Microsoft_Product_Activation links to: http://technet.microsoft.com/en-us/library/bb457054.aspx 1 Display Adapter 00010 (5) 2 SCSI Adapter 00011 (5) 3 IDE Adapter 0011 (4) 4 Network Adapter MAC Address 1001011000 (10) 5 RAM Amount Range (i.e. 0-64mb, 64-128mb, etc) 101 (3) 6 Processor Type 011 (3) 7 Processor Serial Number 000000 (6) 8 Hard Drive Device 1101100 (7) 9 Hard Drive Volume Serial Number 1001000001 (10) 10 CD—ROM / CD-RW / DVD-ROM 010111 (6) - "Dockable" 0 (1) - Hardware Hash version (version of algorithm used) 001 (3) Also: Microsoft defines "substantially different" hardware differently for PCs that are configured to be dockable. Additionally, the network adapter is given a superior "weighting." If the PC is not dockable and a network adapter exists and is not changed, 6 or more of the other above values would have to change before reactivation was required. If a network adapter existed but is changed or never existed at all, 4 or more changes (including the changed network adapter if it previously existed) will result in a requirement to reactivate. So it's also not hard to try it out with kvm. Apply a patch, change 3 other things: nic mac, ram size (by a factor of >2), cpu type and boot. > > > >_______________________________________________ > >Xen-devel mailing list > >xen-de...@lists.xen.org > >http://lists.xen.org/xen-devel > > > >----- > >No virus found in this message. > >Checked by AVG - www.avg.com > >Version: 2014.0.4592 / Virus Database: 3986/7769 - Release Date: 06/30/14 > > > > > -- > Ross Philipson