WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

[Xen-devel] Is it possible that Xen starts without Domain0

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] Is it possible that Xen starts without Domain0
From: "Hu Jia Yi" <jyhu@xxxxxxxxx>
Date: Fri, 7 Sep 2007 12:08:41 +0800
Delivery-date: 2007年9月06日 21:09:38 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acfw4kjSTRljW26xRSCqi4r74gViAgAIaD1A
Thread-topic: Is it possible that Xen starts without Domain0
I have a question which may sound stupid.
Is the dom0 mainly responsible for administration of other VMs?
If a PC only needs running HVM and doesn't need any administration, is
it possible that Xen doesn't start dom0 but setup VM environment and
start-up HVM image?
What modification do I need, such as drivers, memory management, file
systems?
Best regards,
Hu Jia Yi
Ext: 20430
Tel: 65-67510430
-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of
xen-devel-request@xxxxxxxxxxxxxxxxxxx
Sent: Friday, September 07, 2007 8:02 AM
To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: Xen-devel Digest, Vol 31, Issue 26
Send Xen-devel mailing list submissions to
 xen-devel@xxxxxxxxxxxxxxxxxxx
To subscribe or unsubscribe via the World Wide Web, visit
 http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel
or, via email, send a message with subject or body 'help' to
 xen-devel-request@xxxxxxxxxxxxxxxxxxx
You can reach the person managing the list at
 xen-devel-owner@xxxxxxxxxxxxxxxxxxx
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Xen-devel digest..."
Today's Topics:
 1. Likely VMX Assist Issue from Ubuntu bug report (Zulauf, John)
 2. Re: Likely VMX Assist Issue from Ubuntu bug report
 (Mats Petersson)
 3. Re: [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1 mreged code
 for PCI passthrough (John Byrne)
 4. RE: [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1 mreged code
 for PCI passthrough (Kay, Allen M)
----------------------------------------------------------------------
Message: 1
Date: Thu, 6 Sep 2007 15:02:46 -0700
From: "Zulauf, John" <john.zulauf@xxxxxxxxx>
Subject: [Xen-devel] Likely VMX Assist Issue from Ubuntu bug report
To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Message-ID:
 
<BD262A443AD428499D90AF8368C4528DA20404@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"
"fancy isolinux screen on install isos hang xen/kvm HVM guests"
 
https://bugs.launchpad.net/ubuntu/+bug/83642
 
Bug is in state "confirmed" and while the concensus on the bug thread is
"we probably shouldn't be doing fancy things in protected mode", this
seems like a fairly important distro to be borked for 3.2 (or 3.1.1
whatever).
 
I've verified this using the i386 Ubuntu tip:
http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.iso
 
FYI
 
John Zulauf
 
Quoting the Ubuntu bug:
I'm working with ubuntu on Xen right now, and this is a very bad
problem. Both the server and desktop install CD's, for both dapper and
edgy, use fancy full screen (vbe based?) isolinux install screens. Could
we please do away with these screens on the server or alternate install
CD? These fancy screens are causing fully virtualized guests that try to
boot from these CD's to crash before the boot screen is even drawn. This
is true for both Xen and KVM.
To clarify, this does not cause the -host- to crash, just the guest, but
you get a blank screen and wonder what happened.
Background (mostly speculation, but I think it's right):
Intel designed VT in a strange way, such that only protected mode
instructions are allowed o be virtualized. Anything done in real mode
must be emulated...every instruction. The Xen and KVM folks have
emulated enough to get things working, but have not handled every
instruction, including apparently some of the fancy (VBE?) graphics
isolinux on the ubuntu boot cd's is using. (FreeBSD's btx loader also
has problems)
For reference, AMD's SVM analogue does, in fact, virtualize real mode
instructions on the processor, and I'm able to boot all install CD's
just fine on an AMD machine. This is an Intel VT .... 'quirk'.
The mini.iso network install CD loads just fine and works, and I can
install over an emulated network. And that CD includes a splash screen
w/ isolinux, so it's not all VBE operations that cause problems. You
should still be able to have a splash screen, but more then that might
cause the problems.
I've filed a bug against Xen about this, and I just tried KVM and ran
into the same issue, so I'm assuming it's th same problem. But until the
Xen folks figure out what instructions need to be emulated, and take
enough time to care, or Intel comes out with an updated VT
implementation that does what AMD's does, we can't just boot up a ubuntu
install CD on virtual machines and have it work.
My requested solution is that isolinux use just the standard (preferably
text) menu and options on the server and/or alternate install CD. Having
one full, officially supported install CD that doesn't crash Xen/KVM
when trying to install a ubuntu would go a long way towards helping
those of us trying to use ubuntu in a virtual environment out. Besides,
while I really appreciate all the fancy boot options for a desktop
machine, but I would prefer a plain text option for servers anyway. I
do, however, see why some would like the opposite.
Would it be possible to get the feisty 'server' install CD to forgo the
fancy bootup options?
NOTE: I think I understand what's going on, but if I'm missing something
obvious, please tell me.
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://lists.xensource.com/archives/html/xen-devel/attachments/20070906/
c7a1a927/attachment.htm
------------------------------
Message: 2
Date: 2007年9月06日 23:13:37 +0100
From: Mats Petersson <mats@xxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] Likely VMX Assist Issue from Ubuntu bug
 report
To: "Zulauf, John"
 <john.zulauf@xxxxxxxxx>,<xen-devel@xxxxxxxxxxxxxxxxxxx>
Message-ID: <46e07b6e.1185300a.4139.05c4@xxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"; format=flowed
At 23:02 06/09/2007, Zulauf, John wrote:
>Content-class: urn:content-classes:message
>Content-Type: multipart/alternative;
> boundary="----_=_NextPart_001_01C7F0D1.A664E607"
>
>"fancy isolinux screen on install isos hang xen/kvm HVM guests"
>
><https://bugs.launchpad.net/ubuntu/+bug/83642>https://bugs.launchpad.ne 
t/ubuntu/+bug/83642
>
>Bug is in state "confirmed" and while the concensus on the bug 
>thread is "we probably shouldn't be doing fancy things in protected 
>mode", this seems like a fairly important distro to be borked for 
>3.2 (or 3.1.1 whatever).
>
>I've verified this using the i386 Ubuntu tip: 
><http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.is 
o>http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.is
o
As far as I know, this is still the case. And the reason is, as 
stated in the bug-report, that the Intel people decided to not allow 
real-mode code to be virtualized. This is not a problem in itself, 
because VM8086 mode can cover most of the code, with a bit of 
"VMXAssist" to fix up privileged instructions not allows in VM8086 
mode. However, there is a problem, and that is that the state of 
segment registers isn't maintained when switching from protected mode 
back to real-mode. This is often used by boot-loading code to load 
data into memory that is normally not reachable from real-mode (that 
is, memory above 1M).
--
Mats
>
>FYI
>
>John Zulauf
>
>Quoting the Ubuntu bug:
>
>I'm working with ubuntu on Xen right now, and this is a very bad 
>problem. Both the server and desktop install CD's, for both dapper 
>and edgy, use fancy full screen (vbe based?) isolinux install 
>screens. Could we please do away with these screens on the server or 
>alternate install CD? These fancy screens are causing fully 
>virtualized guests that try to boot from these CD's to crash before 
>the boot screen is even drawn. This is true for both Xen and KVM.
>
>To clarify, this does not cause the -host- to crash, just the guest, 
>but you get a blank screen and wonder what happened.
>
>Background (mostly speculation, but I think it's right):
>Intel designed VT in a strange way, such that only protected mode 
>instructions are allowed o be virtualized. Anything done in real 
>mode must be emulated...every instruction. The Xen and KVM folks 
>have emulated enough to get things working, but have not handled 
>every instruction, including apparently some of the fancy (VBE?) 
>graphics isolinux on the ubuntu boot cd's is using. (FreeBSD's btx 
>loader also has problems)
>
>For reference, AMD's SVM analogue does, in fact, virtualize real 
>mode instructions on the processor, and I'm able to boot all install 
>CD's just fine on an AMD machine. This is an Intel VT .... 'quirk'.
>
>The mini.iso network install CD loads just fine and works, and I can 
>install over an emulated network. And that CD includes a splash 
>screen w/ isolinux, so it's not all VBE operations that cause 
>problems. You should still be able to have a splash screen, but more 
>then that might cause the problems.
>
>I've filed a bug against Xen about this, and I just tried KVM and 
>ran into the same issue, so I'm assuming it's th same problem. But 
>until the Xen folks figure out what instructions need to be 
>emulated, and take enough time to care, or Intel comes out with an 
>updated VT implementation that does what AMD's does, we can't just 
>boot up a ubuntu install CD on virtual machines and have it work.
>
>My requested solution is that isolinux use just the standard 
>(preferably text) menu and options on the server and/or alternate 
>install CD. Having one full, officially supported install CD that 
>doesn't crash Xen/KVM when trying to install a ubuntu would go a 
>long way towards helping those of us trying to use ubuntu in a 
>virtual environment out. Besides, while I really appreciate all the 
>fancy boot options for a desktop machine, but I would prefer a plain 
>text option for servers anyway. I do, however, see why some would 
>like the opposite.
>
>Would it be possible to get the feisty 'server' install CD to forgo 
>the fancy bootup options?
>
>NOTE: I think I understand what's going on, but if I'm missing 
>something obvious, please tell me.
>
>_______________________________________________
>Xen-devel mailing list
>Xen-devel@xxxxxxxxxxxxxxxxxxx
>http://lists.xensource.com/xen-devel 
------------------------------
Message: 3
Date: 2007年9月06日 16:16:29 -0700
From: John Byrne <john.l.byrne@xxxxxx>
Subject: Re: [Xen-devel] [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1
 mreged code for PCI passthrough
To: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>
Cc: Guy Zana <guy@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, Keir
 Fraser <keir@xxxxxxxxxxxxx>
Message-ID: <46E08A4D.8050706@xxxxxx>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
When I use these patches and start a nativedom with a directly-assigned 
NIC and no IOMMU, I get a lock up. Running the same 
domain/configuration/machine with the direct-io.hg tree worked fine. The
crash output is below. If you'd like more information, let me know.
John Byrne
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) WARNING: send pio with something already pending (9)?
(XEN) domain_crash_sync called from hvm.c:485
(XEN) Domain 1 (vcpu#0) crashed on cpu#7:
(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
(XEN) CPU: 7
(XEN) EIP: 0000:[<00100fcb>]
(XEN) EFLAGS: 00000002 CONTEXT: hvm
(XEN) eax: 00000064 ebx: 001390c4 ecx: 001390c4 edx: 000000e9
(XEN) esi: 00103762 edi: 00101bf0 ebp: 00139038 esp: 00139038
(XEN) cr0: 00000011 cr4: 00000000 cr3: 00000000 cr2: 00000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0000
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
....
(XEN) *** [ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN)
----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN) e 
x86_32 debug=n Not tainted ]----
(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
(XEN) CPU: 6
(XEN) CPU: 6(XEN) idle_loop+0x1b/0x90+010246 CONTEXT: hypervisor
(XEN) EFLAGS: 00010246 CONTEXT: hypervisor
(XEN) eax: 00000300 ebx: ffbe7fb4 ecx: 00000000 edx: 00000006
(XEN) esi: ff1a8430 edi: 91d91b27 ebp: 0000001c esp: ffbe7fa8
(XEN) cr0: 8005003b cr4: 000026d0 cr3: 3c6ee000 cr2: b7bf7000
(XEN) ds: e010 es: e010 fs: 0000 gs: 0000 ss: e010 cs: e008
(XEN) do_page_fault+0x45/0x3b0
(XEN) (XEN) Xen stac00010246Xen stac00010246
CR3: 00000000(XEN) ffbea080
 ax: 6563696c ebx: 0000e010 ecx: 00010246 edx: ff1b7fb4(XEN) 
ffbea080 00000001
 si: 0000e010 edi: 00000000 ebp: ff1b40ec esp: ff1b40a8(XEN) 
00000000
 s: e010 es: e010 fs: 0000 gs: 0000 ss: e010(XEN) c1351f90 
00000006 00000006
 00000006
(XEN) c03d7180 00000000 000e0007 c01013a7 00000061 00000246 c1351f8c 
00000069
(XEN) 0000007b 0000007b 00000000 00000000 00000006 ffbea080
(XEN) Xen call trace:
(XEN) [<ff1209fb>] idle_loop+0x1b/0x90
(XEN)
Kay, Allen M wrote:
> The following 6 patches contains merge of Intel VT-d and Neocleus' 1:1
> mapping patches for enabling HVM guest direct device access that were
> last submitted around end of May. These patches applied cleanly to
> changeset 15730. 
>
> To enabled xen vt-d code, add "ioapic_ack=old" to xen boot parameter
in
> grub.conf on systems with VT-d hardware.
>
> To enabled xen 1:1 mapping code, add "enabled_nativedom=1" to xen boot
> parameter in grub.conf.
>
> Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
> Signed-off-by: Guy Zana <guy@xxxxxxxxxxxx>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel 
>
------------------------------
Message: 4
Date: Thu, 6 Sep 2007 17:00:31 -0700
From: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>
Subject: RE: [Xen-devel] [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1
 mreged code for PCI passthrough
To: "John Byrne" <john.l.byrne@xxxxxx>
Cc: Guy Zana <guy@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, Keir
 Fraser <keir@xxxxxxxxxxxxx>
Message-ID:
 
<13A2F7DE1BAEA345A61DD40F303ED7A66C5CF9@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"
Other than minor changes while rebasing from 15521 to 15730. The
following files have been modified that might affect functionality:
Tools/hvmloader/32bitbios_support.c:
 removed a hack to increase highbiosarea size.
Tools/ioemu/hw/pass-throught.c/pt_pci_write_config():
 for is_native=1 case, pass-through pci config writes. Otherwise,
pass-through only access to command register (for vt-d case). Note that
we will use a different switch variable once it is added.
These are minor changes, you might want to replace these file from the
ones from direct-io tree to see if it fixes your problem.
Allen
>-----Original Message-----
>From: John Byrne [mailto:john.l.byrne@xxxxxx] 
>Sent: Thursday, September 06, 2007 4:16 PM
>To: Kay, Allen M
>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx; Guy Zana; Keir Fraser
>Subject: Re: [Xen-devel] [VTD-NEO][patch 0/6] Intel 
>VT-d/Neocleus 1:1 mreged code for PCI passthrough
>
>When I use these patches and start a nativedom with a 
>directly-assigned 
>NIC and no IOMMU, I get a lock up. Running the same 
>domain/configuration/machine with the direct-io.hg tree worked 
>fine. The 
>crash output is below. If you'd like more information, let me know.
>
>John Byrne
>
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) WARNING: send pio with something already pending (9)?
>(XEN) domain_crash_sync called from hvm.c:485
>(XEN) Domain 1 (vcpu#0) crashed on cpu#7:
>(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
>(XEN) CPU: 7
>(XEN) EIP: 0000:[<00100fcb>]
>(XEN) EFLAGS: 00000002 CONTEXT: hvm
>(XEN) eax: 00000064 ebx: 001390c4 ecx: 001390c4 edx: 000000e9
>(XEN) esi: 00103762 edi: 00101bf0 ebp: 00139038 esp: 00139038
>(XEN) cr0: 00000011 cr4: 00000000 cr3: 00000000 cr2: 00000000
>(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0000
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>....
>(XEN) *** [ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN)
>----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN) e 
>x86_32 debug=n Not tainted ]----
>(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
>(XEN) CPU: 6
>(XEN) CPU: 6(XEN) idle_loop+0x1b/0x90+010246 CONTEXT: hypervisor
>
>(XEN) EFLAGS: 00010246 CONTEXT: hypervisor
>(XEN) eax: 00000300 ebx: ffbe7fb4 ecx: 00000000 edx: 00000006
>(XEN) esi: ff1a8430 edi: 91d91b27 ebp: 0000001c esp: ffbe7fa8
>(XEN) cr0: 8005003b cr4: 000026d0 cr3: 3c6ee000 cr2: b7bf7000
>(XEN) ds: e010 es: e010 fs: 0000 gs: 0000 ss: e010 cs: e008
>(XEN) do_page_fault+0x45/0x3b0
>(XEN) (XEN) Xen stac00010246Xen stac00010246
>CR3: 00000000(XEN) ffbea080
> ax: 6563696c ebx: 0000e010 ecx: 00010246 edx: ff1b7fb4(XEN) 
>ffbea080 00000001
> si: 0000e010 edi: 00000000 ebp: ff1b40ec esp: ff1b40a8(XEN) 
>00000000
> s: e010 es: e010 fs: 0000 gs: 0000 ss: e010(XEN) c1351f90 
>00000006 00000006
> 00000006
>(XEN) c03d7180 00000000 000e0007 c01013a7 00000061 00000246 
>c1351f8c 
>00000069
>(XEN) 0000007b 0000007b 00000000 00000000 00000006 ffbea080
>(XEN) Xen call trace:
>(XEN) [<ff1209fb>] idle_loop+0x1b/0x90
>(XEN)
>
>
>Kay, Allen M wrote:
>> The following 6 patches contains merge of Intel VT-d and 
>Neocleus' 1:1
>> mapping patches for enabling HVM guest direct device access that were
>> last submitted around end of May. These patches applied cleanly to
>> changeset 15730. 
>> 
>> To enabled xen vt-d code, add "ioapic_ack=old" to xen boot 
>parameter in
>> grub.conf on systems with VT-d hardware.
>> 
>> To enabled xen 1:1 mapping code, add "enabled_nativedom=1" 
>to xen boot
>> parameter in grub.conf.
>> 
>> Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
>> Signed-off-by: Guy Zana <guy@xxxxxxxxxxxx>
>> 
>> _______________________________________________
>> Xen-devel mailing list
>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>> http://lists.xensource.com/xen-devel 
>> 
>
------------------------------
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
End of Xen-devel Digest, Vol 31, Issue 26
*****************************************
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: [Xen-devel] [PATCH][RESEND] Bind different tasks' evtchns to different vcpus of Dom0 , Cui, Dexuan
Next by Date: Re: [Xen-devel] Is it possible that Xen starts without Domain0 , pradeep singh rautela
Previous by Thread: [Xen-devel] [PATCH][RESEND] Bind different tasks' evtchns to different vcpus of Dom0 , Cui, Dexuan
Next by Thread: Re: [Xen-devel] Is it possible that Xen starts without Domain0 , pradeep singh rautela
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /