版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、<p><b> 論文附件</b></p><p><b> (一)英文原文:</b></p><p> he single slice machine is also called tiny controller, is because it was used in the industry to control realm a
2、t the earliest stage.Single slice machine from inside chip have CPU appropriation processor to develop only since then.At the earliest stage of design the principle is to pass to integrate a great deal of peripherals and
3、 CPU in a chip, making calculator system smaller, integrating more easily into complicated of but to mention to request a strict control equipments in the middle.The I</p><p> The single slice of the earlie
4、r period all of machines are 8 or 4.Among them, the INTEL is most successful of 8031, because of in brief dependable but the function was quite good to acquire very big good opinion.Henceforth at 8031 up developed MCS51
5、serieses a single slice machine system.According to the single slice of this system machine system is still in the extensive usage till now.Because the industry controls the exaltation of[with] realm request, starting ap
6、pearing 16 single slice machin</p><p> Single slice the machine ratio appropriation processor is the most suitable to match to apply in the built-in system, so it got the most applications.In fact the singl
7、e slice machine is an amount the most calculators are in the world.The modern mankind are living medium use of assemble in almost each electronics and machine product have a single slice machine.All have 1-2 single slice
8、 machine in the computer accessorieses such as cellular phone, telephone, calculator, home appliances, electronic</p><p> SCM system software interference methods</p><p> In improving the abil
9、ity of anti-jamming system hardware, software interference with its flexible design, save hardware resources, more and more attention to reliability. Below the MCS-51 SCM system as an example, the computer system softwar
10、e interference methods for research.</p><p> A method of anti-jamming software</p><p> In engineering practice, anti-jamming software on the content of the main ones being: one, eliminate the
11、analog input signal noise (such as digital filtering technology); two, is running the program when the chaos back to the right track approach. In this paper, which made several effective methods of anti-jamming software.
12、</p><p> 1.1 redundant directives</p><p> CPU process is to take instructions from operating code, and then take a few operators. When the PC interference errors, procedures will be from the n
13、ormal track "flying", when flying to a double-byte instructions, if the instructions for a few moments landed on the operation, as the number-up operation operation code, procedural error will be . If the "
14、;fly" to the three-byte instructions, a greater probability of error.</p><p> In some key areas were inserted into single-byte instructions, or to be effective single-byte command rewrite directive kno
15、wn as redundancy. Is usually double-byte instructions and orders three bytes inserted after more than two bytes of the NOP. This flew to operate even if the number of flying procedures, the air operations of NOP because
16、of the existence of the directive to avoid being behind the operation as a number of implementation, automatically into the right track.</p><p> In addition, the system flows to play an important role in th
17、e directive such as RET, RETI, LCALL, LJMP, JC, and other instructions inserted before the two NOP, also could be flying into the right track procedures to ensure that the implementation of these important directives.<
18、;/p><p> 1.2 interception technology</p><p> The so-called blocking, is flying the procedure will lead the specified location and then an error handling. Traps are usually software used to block
19、flying procedures. Therefore must be reasonably designed trap, trap in the second to the appropriate location.</p><p> 1.2.1 software design traps</p><p> When flying into the non-process proc
20、edures, redundant command will not work. By software traps, interceptors flying procedures, to lead the specified location and then an error handling. Software trap is used to capture the flying process toward reduction
21、of import address 0000 H instructions. EPROM process in Central Africa usually fill in the following areas as software instructions trap:</p><p><b> NOP</b></p><p><b> NOP<
22、;/b></p><p> LJMP 0000H</p><p> Its native code for the 0000020000.</p><p> 1.2.2 trap arrangements</p><p> Usually in the process of the unused space filled EPR
23、OM 0000020000. Finally one should fill 020,000, when flying procedures fell on the area, to automatically orbit. In the user program, and various modules in the margins between the unit can also fill traps command. When
24、using the interference and interruption due to open, in the corresponding interrupt service procedures set up software trap, caught the wrong time can be interrupted. If an application system not yet used an external int
25、errupt,</p><p><b> NOP</b></p><p><b> NOP</b></p><p><b> RETI</b></p><p> Top of instruction available "RETI", can als
26、o be used "LJMP 0000H". If the fault diagnosis procedures and systems since the restoration of the design process reliable, complete with "LJMP 0000H" for the return instructions directly into the fau
27、lt diagnosis procedures, as soon as possible to deal with failure and recovery procedures of the operation.</p><p> Taking into account the capacity of program memory, software trap 1 K space in the general
28、 2-3 can be effectively blocked.</p><p> 1.3 software "watchdog" technology.</p><p> If out-of-control process into the "cycle of death", usually a "watchdog" tec
29、hnology to process from the "death cycle." By constantly testing procedures cycle running time, if the process cycle time exceeds the maximum running time cycle, the system that a "cycle of death", th
30、e need for error handling.</p><p> "Watchdog" technology can be hardware, software can be. In industrial applications, serious interference may sometimes be interrupted damage control word, closur
31、e of interruption. The system can not regularly "Weigou", hardware watchdog circuit failure. The software watchdog to be effective in solving such problems.</p><p> The author in practical applica
32、tion, using ring interrupted surveillance systems. T0 Watchdog timer with T1, with timer T1 surveillance main program, the main program Watchdog T0. This ring used the software "watchdog" has a good anti-jammin
33、g performance, greatly improving the system reliability. The need for frequent use of T1 timer serial communications monitoring and control system, the timer T1 can not be interrupted, may be diverted from the serial int
34、erruption to monitor (if using a MCS-52</p><p> 2 system failure treatment, since the resumption of the design process.</p><p> SCM system caused by interference or brown-out reset after reset
35、 it is an abnormal reduction should be carried out fault diagnosis and automatically reset before the resumption of non-normal state.</p><p> 2.1 normal reduction of non-recognition</p><p> ro
36、cedures for the implementation of always starting from 0000 H, resulting from the 0000 H program started four possibilities: one, booting the system power-on reset; Second, the software fault reset; three, watchdog overt
37、ime not Weigou hardware reset; four tasks Is being implemented in the brown-out reset after the call. In addition to the four cases in the first case, it is an abnormal reduction, the need to be identified.</p>&l
38、t;p> 2.1.1 reset the hardware and software reset of the identification</p><p> Here hardware reset that boot reduction and reset the watchdog, the registers have an impact on the reduction of hardware,
39、such as the reduction after the PC = 0000H, SP = 07H, PSW = 00H, and so on. The software will reset the SP, SPW had no effect. Therefore, the computer monitoring system, when the normal operation of procedures, will addr
40、ess more than SP set up 07 H, or PSW the first five users sign-in system at the normal operation of a set. So just detection system reset or SP-PSW.5 signs o</p><p> Figure 1 hardware and software reset ide
41、ntification flow chart In addition, as hardware reset state-chip RAM is random, and the software reset-chip RAM can be reset to maintain state, to select a film within one or two units as a power symbol. Zuoshang used t
42、o set up 40 H, signs, signs on, the word for the 78 H, if the system reset after 40 H unit content is not equivalent to 78 H, is that hardware reset, or software that is reset, to deal with mistakes. If the two modules f
43、or a power symbol, s</p><p> 2.1.2 boot reduction and reset the watchdog fault identification</p><p> Boot reduction and reset the watchdog fault because of the same hardware reset, to be the
44、correct identification, the use of general non-volatile RAM or EEROM. When the system during normal operation, set up a power-down can protect the observation unit. When normal operation at the time of the interruption W
45、eigou service program Zhongshi the observation unit to maintain the normal value (as AAH), and the main way in the unit cleared, the observation unit can be brown-out protection, the boot By</p><p> 2.1.3 b
46、oots reduction and the reduction of non-normal start-up identification</p><p> Monitoring system to identify the situation as a result of accidents in the system, such as brown-out conditions caused by the
47、boot boot reduction and reset, the process control system is particularly important. If a time for the control of standards of measurement and control systems, monitoring and control tasks required to complete a one hour
48、. In 50 minutes has been monitoring the implementation of the circumstances, the system voltage reduction caused abnormal, and then reset at this time if</p><p> 2.2 Non-normal reset after the system has re
49、sumed operation of the program design</p><p> On the order of some of the demanding process control system, the system of non-normal reset not, generally from out-of-control requirements that mandate a modu
50、le or restore operation. Therefore, monitoring and control system to make important data unit, the backup parameters, such as the system running, the system of the process, the current import, export value, the current v
51、alue of the clock, observation unit value, these data should not only regular backup, and if so Laws should also be back</p><p> When the system has to determine the reduction of non-normal circumstances, w
52、e should first restore the necessary data systems, such as the display module initialization, the expansion of chip-chip, such as the initialization. This was followed by another system of monitoring and control system s
53、tatus, operating parameters to be restored, including the display interface recovery. After further reduction before the mission, parameters, running time of recovery, re-entering the system running.</p><p>
54、 It should be pointed out that the real restoration of the operating system needs very careful to state the system to back up important data and to check the reliability of data to ensure recovery of the reliability of
55、data.</p><p> Secondly, the multi-task, multi-process measurement and control systems, data recovery to consider resumption of the order problem, the author of the practical application of data recovery pro
56、cess flow chart shown in Figure 2.</p><p> Figure in the restoration of basic data system is out of the back-up data covering the current system data. Basic system initialization means the chip, display, in
57、put and output method to initialize, attention should be paid to the initial input and output should not be mistaken action. And reset before the mandate of the mission is to initialize the state of implementation, opera
58、tion hours.</p><p><b> (二)英文翻譯:</b></p><p> 單片機也被稱為微控制器(Microcontroler),是因為它最早被用在工業(yè)控制領域。單片機由芯片內(nèi)僅有CPU的專用處理器發(fā)展而來。最早的設計理念是通過將大量外圍設備和CPU集成在一個芯片中,使計算機系統(tǒng)更小,更容易集成進復雜的而對提及要求嚴格的控制設備當中。INTEL
59、的Z80是最早按照這種思想設計出的處理器,從此以后,單片機和專用處理器的發(fā)展便分道揚鑣。</p><p> 早期的單片機都是8位或4位的。其中最成功的是INTEL的8031,因為簡單可靠而性能不錯獲得了很大的好評。此后在8031上發(fā)展出了MCS51系列單片機系統(tǒng)?;谶@一系統(tǒng)的單片機系統(tǒng)直到現(xiàn)在還在廣泛使用。隨著工業(yè)控制領域要求的提高,開始出現(xiàn)了16位單片機,但因為性價比不理想并未得到很廣泛的應用。90年代后隨
60、著消費電子產(chǎn)品大發(fā)展,單片機技術得到了巨大的提高。隨著INTEL i960系列特別是后來的ARM系列的廣泛應用,32位單片機迅速取代16位單片機的高端地位,并且進入主流市場。而傳統(tǒng)的8位單片機的性能也得到了飛速提高,處理能力比起80年代提高了數(shù)百倍。目前,高端的32位單片機主頻已經(jīng)超過300MHz,性能直追90年代中期的專用處理器,而普通的型號出廠價格跌落至1美元,最高端的型號也只有10美元。當代單片機系統(tǒng)已經(jīng)不再只在裸機環(huán)境下開發(fā)和使
61、用,大量專用的嵌入式操作系統(tǒng)被廣泛應用在全系列的單片機上。而在作為掌上電腦和手機核心處理的高端單片機甚至可以直接使用專用的Windows和Linux操作系統(tǒng)。</p><p> 單片機比專用處理器最適合應用于嵌入式系統(tǒng),因此它得到了最多的應用。事實上單片機是世界上數(shù)量最多的計算機?,F(xiàn)代人類生活中所用的幾乎每件電子和機械產(chǎn)品中都會集成有單片機。手機、電話、計算器、家用電器、電子玩具、掌上電腦以及鼠標等電腦配件中都
62、配有1-2部單片機。而個人電腦中也會有為數(shù)不少的單片機在工作。汽車上一般配備40多部單片機,復雜的工業(yè)控制系統(tǒng)上甚至可能有數(shù)百臺單片機在同時工作!單片機的數(shù)量不僅遠超過PC機和其他計算的綜合,甚至比人類的數(shù)量還要多。 </p><p> 單片機系統(tǒng)軟件抗干擾方法</p><p> 在提高硬件系統(tǒng)抗干擾能力的同時,軟件抗干擾以其設計靈活、節(jié)省硬件資源、可靠性好越來越受到重視。下面以MCS
63、-51單片機系統(tǒng)為例,對微機系統(tǒng)軟件抗干擾方法進行研究。</p><p> 1 軟件抗干擾方法的研究</p><p> 在工程實踐中,軟件抗干擾研究的內(nèi)容主要是: 一、消除模擬輸入信號的嗓聲(如數(shù)字濾波技術);二、程序運行混亂時使程序重入正軌的方法。本文針對后者提出了幾種有效的軟件抗干擾方法。</p><p><b> 1.1 指令冗余&
64、lt;/b></p><p> CPU取指令過程是先取操作碼,再取操作數(shù)。當PC受干擾出現(xiàn)錯誤,程序便脫離正常軌道“亂飛”,當亂飛到某雙字節(jié)指令,若取指令時刻落在操作數(shù)上,誤將操作數(shù)當作操作碼,程序?qū)⒊鲥e。若“飛” 到了三字節(jié)指令,出錯機率更大。</p><p> 在關鍵地方人為插入一些單字節(jié)指令,或?qū)⒂行巫止?jié)指令重寫稱為指令冗余。通常是在雙字節(jié)指令和三字節(jié)指令后插入兩個字節(jié)以
65、上的NOP。這樣即使亂飛程序飛到操作數(shù)上,由于空操作指令NOP的存在,避免了后面的指令被當作操作數(shù)執(zhí)行,程序自動納入正軌。</p><p> 此外,對系統(tǒng)流向起重要作用的指令如RET、 RETI、LCALL、LJMP、JC等指令之前插入兩條NOP,也可將亂飛程序納入正軌,確保這些重要指令的執(zhí)行。</p><p><b> 1.2 攔截技術</b></p>
66、;<p> 所謂攔截,是指將亂飛的程序引向指定位置,再進行出錯處理。通常用軟件陷阱來攔截亂飛的程序。因此先要合理設計陷阱,其次要將陷阱安排在適當?shù)奈恢谩?lt;/p><p> 1.2.1 軟件陷阱的設計 當亂飛程序進入非程序區(qū),冗余指令便無法起作用。通過軟件陷阱,攔截亂飛程序,將其引向指定位置,再進行出錯處理。軟件陷阱是指用來將捕獲的亂飛程序引向復位入口地址0000H的
67、指令。通常在EPROM中非程序區(qū)填入以下指令作為軟件陷阱:</p><p><b> NOP</b></p><p><b> NOP</b></p><p> LJMP 0000H</p><p> 其機器碼為0000020000。</p><p> 1.2.2
68、陷阱的安排</p><p> 通常在程序中未使用的EPROM空間填0000020000。最后一條應填入020000,當亂飛程序 落到此區(qū),即可自動入軌。在用戶程序區(qū)各模塊之間的空余單元也可填入陷阱指令。當使用的中斷因干擾而開放時,在對應的中斷服務程序中設置軟件陷阱,能及時捕獲錯誤的中斷。如某應用系統(tǒng)雖未用到外部中斷1,外部中斷1的中斷服務程序可為如下形式:</p><p><b&g
69、t; NOP</b></p><p><b> NOP</b></p><p><b> RETI</b></p><p> 返回指令可用“RETI”,也可用“LJMP 0000H”。如果故障診斷程序與系統(tǒng)自恢復程序的設計可靠、 完善,用“LJMP 0000H”作返回指令可直接進入故障診斷程序,盡早地處
70、理故障并恢復程序的運行??紤]到程序存貯器的容量,軟件陷阱一般1K空間有2-3個就可以進行有效攔截。</p><p> 1.3 軟件“看門狗”技術</p><p> 若失控的程序進入“死循環(huán)”,通常采用“看門狗”技術使程序脫離“死循環(huán)”。通過不斷檢測程序循環(huán)運行時間,若發(fā)現(xiàn)程序循環(huán)時間超過最大循環(huán)運行時間,則認為系統(tǒng)陷入“死循環(huán)”,需進行出錯處理。</p><p>
71、; “看門狗”技術可由硬件實現(xiàn),也可由軟件實現(xiàn)。 在工業(yè)應用中,嚴重的干擾有時會破壞中斷方式控制字,關閉中斷。則系統(tǒng)無法定時“喂狗”,硬件看門狗電路失效。而軟件看門狗可有效地解決這類問題。</p><p> 筆者在實際應用中,采用環(huán)形中斷監(jiān)視系統(tǒng)。用定時器T0監(jiān)視定時器T1,用定時器T1監(jiān)視主程序,主程序監(jiān)視定時器T0。采用這種環(huán)形結(jié)構(gòu)的軟件“看門狗”具有良好的抗干擾性能,大大提高了系統(tǒng)可靠性。對于需經(jīng)常使用
72、T1定時器進行串口通訊的測控系統(tǒng),則定時器T1不能進行中斷,可改由串口中斷進行監(jiān)控(如果用的是MCS-52系列單片機,也可用T2代替T1進行監(jiān)視)。這種軟件“看門狗”監(jiān)視原理是:在主程序、T0中斷服務程序、T1中斷服務程序中各設一運行觀測變量,假設為MWatch、T0Watch 、T1Watch,主程序每循環(huán)一次,MWatch加1,同樣T0、T1中斷服務程序執(zhí)行一次,T0Watch、 T1Watch加1。在T0中斷服務程序中通過檢測T1
73、Watch的變化情況判定T1運行是否正常,在T1中斷服務程序中檢測MWatch的變化情況判定主程序是否正常運行,在主程序中通過檢測T0Watch的變化情況判別T0是否正常工作。若檢測到某觀測變量變化不正常,比如應當加1而未加1,則轉(zhuǎn)到出錯處理程序作排除故障處理。當然,對主程序最大循環(huán)周期、定時器T0和T1定時周期應予以全盤合理考慮。限于篇幅不贅述。</p><p> 2 系統(tǒng)故障處理、自恢復程序的設
74、計</p><p> 單片機系統(tǒng)因干擾復位或掉電后復位均屬非正常復位,應進行故障診斷并能自動恢復非正常復位前的狀態(tài)。</p><p> 2.1 非正常復位的識別</p><p> 程序的執(zhí)行總是從0000H開始,導致程序從 0000H開始執(zhí)行有四種可能:一、系統(tǒng)開機上電復位;二、軟件故障復位;三、看門狗超時未喂狗硬件復位; 四、任務正在執(zhí)行中掉電后來電復位。四
75、種情況中除第一種情況外均屬非正常復位,需加以識別。</p><p> 2.1.1 硬件復位與軟件復位的識別</p><p> 此處硬件復位指開機復位與看門狗復位,硬件復位對寄存器有影響,如復位后PC=0000H, SP=07H,PSW=00H等。而軟件復位則對SP、SPW無影響。故對于微機測控系統(tǒng),當程序正常運行時,將SP設置地址大于07H,或者將PSW的第5位用戶標志位在系統(tǒng)正常運行
76、時設為1。那么系統(tǒng)復位時只需檢測PSW.5標志位或SP值便可判此是否硬件復位。圖1是采用PSW.5作上電標志位判別硬、軟件復位的程序流程圖。</p><p> 此外,由于硬件復位時片內(nèi)RAM狀態(tài)是隨機的,而軟件復位片內(nèi)RAM則可保持復位前狀態(tài),因此可選取片內(nèi)某一個或兩個單元作為上電標志。設 40H用來做上電標志,上電標志字為78H,若系統(tǒng)復位后40H單元內(nèi)容不等于78H,則認為是硬件復位,否則認為是軟件復位,轉(zhuǎn)
77、向出錯處理。若用兩個單元作上電標志,則這種判別方法的可靠性更高。</p><p> 圖1 硬、軟件復位識別流程圖</p><p> 2.1.2 開機復位與看門狗故障復位的識別</p><p> 開機復位與看門狗故障復位因同屬硬件復位, 所以要想予以正確識別,一般要借助非易失性RAM或者EEROM。當系統(tǒng)正常運行時,設置一可掉電保護的觀測單元。當系統(tǒng)正常運行時,
78、在定時喂狗的中斷服務程序中使該觀測單元保持正常值(設為 AAH),而在主程中將該單元清零,因觀測單元掉電可保護,則開機時通過檢測該單元是否為正常值可判斷是否看門狗復位。</p><p> 2.1.3 正常開機復位與非正常開機復位的識別</p><p> 識別測控系統(tǒng)中因意外情況如系統(tǒng)掉電等情況引起的開機復位與正常開機復位,對于過程控制系統(tǒng)尤為重要。如某以時間為控制標準的測控系統(tǒng),完成一
79、次測控任務需1小時。在已執(zhí)行測控50分鐘的情況下,系統(tǒng)電壓異常引起復位,此時若系統(tǒng)復位后又從頭開始進行測控則會造成不必要的時間消耗。因此可通過一監(jiān)測單元對當前系統(tǒng)的運行狀態(tài)、系統(tǒng)時間予以監(jiān)控,將控制過程分解為若干步或若干時間段,每執(zhí)行完一步或每運行一個時間段則對監(jiān)測單元置為關機允許值,不同的任務或任務的不同階段有不同的值,若系統(tǒng)正在進行測控任務或正在執(zhí)某時間段,則將監(jiān)測單元置為非正常關機值。那么系統(tǒng)復位后可據(jù)此單元判系統(tǒng)原來的運行狀態(tài),
80、并跳到出錯處理程序中恢復系統(tǒng)原運行狀態(tài)。</p><p> 2.2 非正常復位后系統(tǒng)自恢復運行的程序設計</p><p> 對順序要求嚴格的一些過程控制系統(tǒng),系統(tǒng)非正常復位否,一般都要求從失控的那一個模塊或任務恢復運行。所以測控系統(tǒng)要作好重要數(shù)據(jù)單元、參數(shù)的備份,如系統(tǒng)運行狀態(tài)、系統(tǒng)的進程值、當前輸入、輸出的值,當前時鐘值、觀測單元值等,這些數(shù)據(jù)既要定時備份,同時若有修改也應立即予以備
81、份。</p><p> 當在已判別出系統(tǒng)非正常復位的情況下,先要恢復一些必要的系統(tǒng)數(shù)據(jù),如顯示模塊的初始化、片外擴展芯片的初始化等。其次再對測控系統(tǒng)的系統(tǒng)狀態(tài)、運行參數(shù)等予以恢復,包括顯示界面等的恢復。之后再把復位前的任務、參數(shù)、運行時間等恢復, 再進入系統(tǒng)運行狀態(tài)。</p><p> 應當說明的是,真實地恢復系統(tǒng)的運行狀態(tài)需 要極為細致地對系統(tǒng)的重要數(shù)據(jù)予以備份,并加以數(shù)據(jù)可靠性檢查
82、,以保證恢復的數(shù)據(jù)的可靠性。</p><p> 其次,對多任務、多進程測控系統(tǒng),數(shù)據(jù)的恢復需考慮恢復的次序問題,筆者實際應用的數(shù)據(jù)恢復過程流程圖如圖2所示。圖中恢復系統(tǒng)基本數(shù)據(jù)是指取出備份的數(shù)據(jù)覆蓋當前的系統(tǒng)數(shù)據(jù)。系統(tǒng)基本初始化是指對芯片、顯示、輸入輸出方式等進行初始化,要注意輸入輸出的初始化不應造成誤動作。而復位前任務的初始化是指任務的執(zhí)行狀態(tài)、運行時間等。</p><p> 圖2
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
評論
0/150
提交評論