• 发文章

  • 发资料

  • 发帖

  • 提问

  • 发视频

创作活动
0
登录后你可以
  • 下载海量资料
  • 学习在线课程
  • 观看技术视频
  • 写文章/发帖/加入社区
返回

电子发烧友 电子发烧友

  • 全文搜索
    • 全文搜索
    • 标题搜索
  • 全部时间
    • 全部时间
    • 1小时内
    • 1天内
    • 1周内
    • 1个月内
  • 默认排序
    • 默认排序
    • 按时间排序
  • 全部板块
    • 全部板块
大家还在搜
  • PandaBoard A4启动HDMI中没有任何内容

    您好,我一直在按照本教程将Ubuntu放在Pandaboard Rev A4上:为PandaBoard我遵循了教程,但是当我将SD卡插入pandaboard并通过5V电源插孔给它供电时,HDMI中没有任何内容。这是我的设置问题还是我错过了一步?为了进行初始启动,它是通过hdmi还是通过串行终端完成的?以上来自于谷歌翻译以下为原文Hello, I have been following this tutorial to put Ubuntu on a Pandaboard Rev A4:PandaBoardI followed the tutorial however when I plug the sd card into the pandaboard and give it power through the 5V power jack nothing appears through the HDMI.Is this a problem with my setup or am I missing a step? In order to do the initial boot up is it done through the hdmi or through a serial terminal?

    2018-10-22 14:21

  • ni-VISA生成的u***驱动无法装在WIN7系统上(显示该设备无法启动。 (代码 10))

    INFs in directory: 'C:\Drivers\Board.Intel\C\All_10.1.1.5002\ivybridge'inf:Searched 68 INFs

    2019-07-29 21:50

  • Linux KVM SRIOV欺骗数据包丢帧

    主要问题是在几个小时到几周之后,单个VF将进入客户的糟糕状态,我们将在父母和孩子身上看到以下错误。版本:Centos = 7.5.1804内核= 4.4.121-1.el7.centos.x86_64(当前);试过3.10.0,***,***,4.14.68IXGBE = 5.3.7(当前);试过5.3.5,4.2.1-k,......IXGBEVF = 4.3.5(当前);试过2.12.1-k,....QEMU = 1.5.3(当前);试过2.0.0Libvirt = 3.9.0(当前)在父级上我们将看到此错误:ixgbe 0000:05:00.0 ethx:193检测到欺骗数据包x 0000:05:00.0 ethx:45检测到欺骗数据包x 0000:05:00.0 ethx:3检测到欺骗数据包x 0000:05:00.0 ethx:126检测到欺骗数据包在孩子身上,你会看到丢包的增加。2:eth0:mtu 1500 qdisc mq状态***模式DEFAULT组默认qlen 1000链接/ ether 52:54:00:5e:a9:f8 brd ff:ff:ff:ff:ff:ff RX:字节数据包错误丢弃超限mcast 455429589913 520093667 0 375674 0 375680 TX:丢弃的字节数据包载波collsns 463147231075 514071570 0 0 0 0我没有办法查看出来的欺骗数据包,但我可以看到传入的数据包被客户端损坏和丢弃。最好的例子是ARP,因为它会击中每个父母,孩子。 (IP审查)父捕获:10:36:26.492879 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁拥有ZZZ.ZZZ.ZZZ.ZZZ告诉XXX.XXX.XXX.XXX,长度4610:36:26.540880 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求 - 有BBB.BBB.BBB.BBB告诉XXX.XXX.XXX.XXX,长度4610:36:26.553161 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP( 0x0806),长度60:请求谁拥有AAA.AAA.AAA.AAA告诉XXX.XXX.XXX.XXX,长度4610:36:26.559508 02:00:00:00:00:01> ff:ff:ff: ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁有YYY.YYY.YYY.YYY告诉XXX.XXX.XXX.XXX,长度46儿童捕获:10:36:26.501491 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,ethertype ARP(0x0806),长度60:请求谁有ZZZ.ZZZ.ZZZ.ZZZ告诉XXX.XXX.XXX.XXX,长度4610:36:26.549499 00:00:00:00:00:00> 00:00:00:00:00:00,802.3,长度0:LLC,dsap Null(0x00)个别,ssap Null(0x00)命令,ctrl 0x0000:信息,发送seq 0,rcv seq 0,标志[Command],长度46 0x0000:0000 0000 0000 0000 0000 0000 0000 0000 ........... ..... 0x0010:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0020:0000 0000 0000 0000 0000 0000 0000 .......... .... 10:36:26.561776 00:00:00:00:00:00> 00:00:00:00:00:00,802.3,长度0:LLC,dsap Null(0x00)个人,ssap Null( 0x00)命令,ctrl 0x0000:信息,发送seq 0,rcv seq 0,标志[命令],长度46 0x0000:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0010:0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0020:0000 0000 0000 0000 0000 0000 0000 .............. 10 :36:26.568122 02:00:00:00:00:01> ff:ff:ff:ff:ff:ff,et hertype ARP(0x0806),长度60:请求谁有YYY.YYY.YYY.YYY告诉XXX.XXX.XXX.XXX,长度46在此一个VF处于错误状态期间,所有其他客户将看到与父母相同的数据包。目前唯一的解决方案是重新启动来宾。有时会摧毁客人并重新启动它。以上来自于谷歌翻译以下为原文The primary issue is after several hours to upwards of a couple weeks a single VF will get into a bad state for a guest and we will see the following errors on the parent and child. Versions:Centos = 7.5.1804Kernel = 4.4.121-1.el7.centos.x86_64 (Current); Tried 3.10.0,***, ***, 4.14.68IXGBE = 5.3.7 (Current); Tried 5.3.5,***, ......IXGBEVF = 4.3.5 (Current); Tried 2.12.1-k, ....QEMU = 1.5.3 (Current); Tried 2.0.0Libvirt = 3.9.0 (Current) On the parent we will see this error:ixgbe 0000:05:00.0 ethx: 193 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 45 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 3 Spoofed packets detectedixgbe 0000:05:00.0 ethx: 126 Spoofed packets detectedOn the child you will see an increase in dropped packets.2: eth0:mtu 1500 qdisc mq state *** mode DEFAULT group default qlen 1000 link/ether 52:54:00:5e:a9:f8 brd ff:ff:ff:ff:ff:ff RX: bytespacketserrorsdropped overrun mcast 455429589913 520093667 0 3756740 375680 TX: bytespacketserrorsdropped carrier collsns 463147231075 514071570 0 0 0 0 I don't have a way to view the spoofed packets going out,***, child. (IPs censored) Parent capture:10:36:26.492879 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.540880 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.553161 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.559508 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 46Child Capture:10:36:26.501491 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 4610:36:26.549499 00:00:00:00:00:00 > 00:00:00:00:00:00,***,***,***,***,***,***,***,***, length 460x0000:0000 0000 0000 0000 0000 0000 0000 0000................0x0010:0000 0000 0000 0000 0000 0000 0000 0000................0x0020:0000 0000 0000 0000 0000 0000 0000 ..............10:36:26.561776 00:00:00:00:00:00 > 00:00:00:00:00:00,***,***,***,***,***,***,***,***, length 460x0000:0000 0000 0000 0000 0000 0000 0000 0000................0x0010:0000 0000 0000 0000 0000 0000 0000 0000................0x0020:0000 0000 0000 0000 0000 0000 0000 ..............10:36:26.568122 02:00:00:00:00:01 > ff:ff:ff:ff:ff:ff,***,***, length 46 During the time this one VF is in a bad state, all other guests will see the same packets as the parent. The only current solution is to reboot the guest. Sometimes destroy the guest and start it back up.

    2018-10-24 15:12