From: Shiji Yang Date: Sat, 10 May 2025 09:19:18 +0000 (+0800) Subject: ltq-deu: fix 6.12 kernel build warnings on lantiq/xrx200 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=d81f8e159a338318c690a1b9720a33544cfa612d;p=thirdparty%2Fopenwrt.git ltq-deu: fix 6.12 kernel build warnings on lantiq/xrx200 This patch fixes various missing-prototypes build warnings by: * Mark some functions as static. * Add missing prototypes. Signed-off-by: Shiji Yang Link: https://github.com/openwrt/openwrt/pull/18744 Signed-off-by: Robert Marko --- diff --git a/package/kernel/lantiq/ltq-deu/src/ifxmips_aes.c b/package/kernel/lantiq/ltq-deu/src/ifxmips_aes.c index 3be7461108d..85234dd7a8c 100644 --- a/package/kernel/lantiq/ltq-deu/src/ifxmips_aes.c +++ b/package/kernel/lantiq/ltq-deu/src/ifxmips_aes.c @@ -148,7 +148,7 @@ extern int disable_multiblock; * \param key_len key lengths of 16, 24 and 32 bytes supported * \return -EINVAL - bad key length, 0 - SUCCESS */ -int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) +static int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) { struct aes_ctx *ctx = crypto_tfm_ctx(tfm); @@ -177,7 +177,7 @@ int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) * \param key_len key lengths of 16, 24 and 32 bytes supported * \return -EINVAL - bad key length, 0 - SUCCESS */ -int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) +static int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) { return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); } @@ -189,7 +189,7 @@ int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigne * \param ctx_arg crypto algo context * \return */ -void aes_set_key_hw (void *ctx_arg) +static void aes_set_key_hw (void *ctx_arg) { /*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ volatile struct aes_t *aes = (volatile struct aes_t *) AES_START; @@ -343,7 +343,7 @@ void ifx_deu_aes (void *ctx_arg, u8 *out_arg, const u8 *in_arg, * \return 0 - SUCCESS * -EINVAL - bad key length */ -int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsigned int key_len) +static int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsigned int key_len) { struct aes_ctx *ctx = crypto_tfm_ctx(tfm); @@ -376,7 +376,7 @@ int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsi * \return 0 - SUCCESS * -EINVAL - bad key length */ -int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t *in_key, unsigned int key_len) +static int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t *in_key, unsigned int key_len) { return ctr_rfc3686_aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); } @@ -413,7 +413,7 @@ int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_aes (ctx, dst, src, NULL, nbytes, encdec, 0); @@ -430,7 +430,7 @@ void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 1); @@ -447,7 +447,7 @@ void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 2); @@ -464,7 +464,7 @@ void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 3); @@ -481,7 +481,7 @@ void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 4); @@ -494,7 +494,7 @@ void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src, * \param out output bytestream * \param in input bytestream */ -void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in) +static void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in) { struct aes_ctx *ctx = crypto_tfm_ctx(tfm); ifx_deu_aes (ctx, out, in, NULL, AES_BLOCK_SIZE, @@ -508,7 +508,7 @@ void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *i * \param out output bytestream * \param in input bytestream */ -void ifx_deu_aes_decrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in) +static void ifx_deu_aes_decrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in) { struct aes_ctx *ctx = crypto_tfm_ctx(tfm); ifx_deu_aes (ctx, out, in, NULL, AES_BLOCK_SIZE, @@ -544,7 +544,7 @@ struct crypto_alg ifxdeu_aes_alg = { * \param req skcipher request * \return err */ -int ecb_aes_encrypt(struct skcipher_request *req) +static int ecb_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -570,7 +570,7 @@ int ecb_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int ecb_aes_decrypt(struct skcipher_request *req) +static int ecb_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -615,7 +615,7 @@ struct skcipher_alg ifxdeu_ecb_aes_alg = { * \param req skcipher request * \return err */ -int cbc_aes_encrypt(struct skcipher_request *req) +static int cbc_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -642,7 +642,7 @@ int cbc_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int cbc_aes_decrypt(struct skcipher_request *req) +static int cbc_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -694,7 +694,7 @@ struct skcipher_alg ifxdeu_cbc_aes_alg = { * \param encdec 1 for encrypt; 0 for decrypt * */ -void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg, +static void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg, u8 *iv_arg, size_t nbytes, int encdec) { /*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ @@ -797,7 +797,7 @@ void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg, * \param req skcipher request * \return err */ -int xts_aes_encrypt(struct skcipher_request *req) +static int xts_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -853,7 +853,7 @@ int xts_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int xts_aes_decrypt(struct skcipher_request *req) +static int xts_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -911,7 +911,7 @@ int xts_aes_decrypt(struct skcipher_request *req) * \param key_len key lengths of 16, 24 and 32 bytes supported * \return -EINVAL - bad key length, 0 - SUCCESS */ -int xts_aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) +static int xts_aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) { struct aes_ctx *ctx = crypto_tfm_ctx(crypto_skcipher_tfm(tfm)); unsigned int keylen = (key_len / 2); @@ -958,7 +958,7 @@ struct skcipher_alg ifxdeu_xts_aes_alg = { * \param req skcipher request * \return err */ -int ofb_aes_encrypt(struct skcipher_request *req) +static int ofb_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -991,7 +991,7 @@ int ofb_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int ofb_aes_decrypt(struct skcipher_request *req) +static int ofb_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1046,7 +1046,7 @@ struct skcipher_alg ifxdeu_ofb_aes_alg = { * \param req skcipher request * \return err */ -int cfb_aes_encrypt(struct skcipher_request *req) +static int cfb_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1079,7 +1079,7 @@ int cfb_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int cfb_aes_decrypt(struct skcipher_request *req) +static int cfb_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1134,7 +1134,7 @@ struct skcipher_alg ifxdeu_cfb_aes_alg = { * \param req skcipher request * \return err */ -int ctr_basic_aes_encrypt(struct skcipher_request *req) +static int ctr_basic_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1167,7 +1167,7 @@ int ctr_basic_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int ctr_basic_aes_decrypt(struct skcipher_request *req) +static int ctr_basic_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1221,7 +1221,7 @@ struct skcipher_alg ifxdeu_ctr_basic_aes_alg = { * \param req skcipher request * \return err */ -int ctr_rfc3686_aes_encrypt(struct skcipher_request *req) +static int ctr_rfc3686_aes_encrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1264,7 +1264,7 @@ int ctr_rfc3686_aes_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int ctr_rfc3686_aes_decrypt(struct skcipher_request *req) +static int ctr_rfc3686_aes_decrypt(struct skcipher_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1576,7 +1576,7 @@ static struct shash_alg ifxdeu_cbcmac_aes_alg = { * \param key_len key lengths of 16, 24 and 32 bytes supported * \return -EINVAL - bad key length, 0 - SUCCESS */ -int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int key_len) +static int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int key_len) { struct aes_ctx *ctx = crypto_aead_ctx(aead); int err; @@ -1601,7 +1601,7 @@ int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int k * \param in_key input authsize * \return -EINVAL - bad authsize length, 0 - SUCCESS */ -int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize) +static int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize) { return crypto_gcm_check_authsize(authsize); } @@ -1612,7 +1612,7 @@ int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize) * \param req aead request * \return err */ -int gcm_aes_encrypt(struct aead_request *req) +static int gcm_aes_encrypt(struct aead_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -1726,7 +1726,7 @@ int gcm_aes_encrypt(struct aead_request *req) * \param req aead request * \return err */ -int gcm_aes_decrypt(struct aead_request *req) +static int gcm_aes_decrypt(struct aead_request *req) { struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; diff --git a/package/kernel/lantiq/ltq-deu/src/ifxmips_des.c b/package/kernel/lantiq/ltq-deu/src/ifxmips_des.c index 953c3feddc7..fc376c4d895 100644 --- a/package/kernel/lantiq/ltq-deu/src/ifxmips_des.c +++ b/package/kernel/lantiq/ltq-deu/src/ifxmips_des.c @@ -126,7 +126,7 @@ extern int disable_deudma; * \param key input key * \param keylen key length */ -int des_setkey(struct crypto_tfm *tfm, const u8 *key, +static int des_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) { struct ifx_deu_des_ctx *dctx = crypto_tfm_ctx(tfm); @@ -161,7 +161,7 @@ int des_setkey(struct crypto_tfm *tfm, const u8 *key, * \param key_len key lengths of 16, 24 and 32 bytes supported * \return -EINVAL - bad key length, 0 - SUCCESS */ -int des_setkey_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) +static int des_setkey_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) { return des_setkey(crypto_skcipher_tfm(tfm), in_key, key_len); } @@ -296,7 +296,7 @@ void ifx_deu_des (void *ctx_arg, u8 *out_arg, const u8 *in_arg, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_des (ctx, dst, src, NULL, nbytes, encdec, 0); @@ -313,7 +313,7 @@ void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src, +static void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 1); @@ -330,11 +330,13 @@ void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ -void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src, +/* +static void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 2); } +*/ /*! \fn void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) \ingroup IFX_DES_FUNCTIONS @@ -347,11 +349,13 @@ void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src, \param encdec 1 for encrypt; 0 for decrypt \param inplace not used */ -void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src, +/* +static void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 3); } +*/ /*! \fn void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) * \ingroup IFX_DES_FUNCTIONS @@ -364,11 +368,13 @@ void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src, * \param encdec 1 for encrypt; 0 for decrypt * \param inplace not used */ +/* void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace) { ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 4); } +*/ /*! \fn void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in) * \ingroup IFX_DES_FUNCTIONS @@ -377,7 +383,7 @@ void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src, * \param out output bytestream * \param in input bytestream */ -void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in) +static void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(tfm); ifx_deu_des (ctx, out, in, NULL, DES_BLOCK_SIZE, @@ -392,7 +398,7 @@ void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * * \param out output bytestream * \param in input bytestream */ -void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in) +static void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(tfm); ifx_deu_des (ctx, out, in, NULL, DES_BLOCK_SIZE, @@ -420,7 +426,7 @@ void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * * \param key input key * \param keylen key length */ -int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, +static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) { struct ifx_deu_des_ctx *dctx = crypto_tfm_ctx(tfm); @@ -454,7 +460,7 @@ int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, * \param key input key * \param keylen key length */ -int des3_ede_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, +static int des3_ede_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) { return des3_ede_setkey(crypto_skcipher_tfm(tfm), key, keylen); @@ -508,7 +514,7 @@ struct crypto_alg ifxdeu_des3_ede_alg = { * \param req skcipher request * \return err */ -int ecb_des_encrypt(struct skcipher_request *req) +static int ecb_des_encrypt(struct skcipher_request *req) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -534,7 +540,7 @@ int ecb_des_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int ecb_des_decrypt(struct skcipher_request *req) +static int ecb_des_decrypt(struct skcipher_request *req) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -599,7 +605,7 @@ struct skcipher_alg ifxdeu_ecb_des3_ede_alg = { * \param req skcipher request * \return err */ -int cbc_des_encrypt(struct skcipher_request *req) +static int cbc_des_encrypt(struct skcipher_request *req) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; @@ -627,7 +633,7 @@ int cbc_des_encrypt(struct skcipher_request *req) * \param req skcipher request * \return err */ -int cbc_des_decrypt(struct skcipher_request *req) +static int cbc_des_decrypt(struct skcipher_request *req) { struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm); struct skcipher_walk walk; diff --git a/package/kernel/lantiq/ltq-deu/src/ifxmips_deu_vr9.h b/package/kernel/lantiq/ltq-deu/src/ifxmips_deu_vr9.h index fcbda401595..235a393e7f4 100644 --- a/package/kernel/lantiq/ltq-deu/src/ifxmips_deu_vr9.h +++ b/package/kernel/lantiq/ltq-deu/src/ifxmips_deu_vr9.h @@ -321,4 +321,7 @@ struct deu_dma_t { } controlr; }; +u32 input_swap(u32 input); +void chip_version(void); + #endif /* IFXMIPS_DEU_VR9_H */