1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Copyright 2022-2025 NXP
4 * Copyright 2024 Furong Xu <0x1207@gmail.com>
5 */
6#include "common.h"
7#include "netlink.h"
8
9struct mm_req_info {
10 struct ethnl_req_info base;
11};
12
13struct mm_reply_data {
14 struct ethnl_reply_data base;
15 struct ethtool_mm_state state;
16 struct ethtool_mm_stats stats;
17};
18
19#define MM_REPDATA(__reply_base) \
20 container_of(__reply_base, struct mm_reply_data, base)
21
22#define ETHTOOL_MM_STAT_CNT \
23 (__ETHTOOL_A_MM_STAT_CNT - (ETHTOOL_A_MM_STAT_PAD + 1))
24
25const struct nla_policy ethnl_mm_get_policy[ETHTOOL_A_MM_HEADER + 1] = {
26 [ETHTOOL_A_MM_HEADER] = NLA_POLICY_NESTED(ethnl_header_policy_stats),
27};
28
29static int mm_prepare_data(const struct ethnl_req_info *req_base,
30 struct ethnl_reply_data *reply_base,
31 const struct genl_info *info)
32{
33 struct mm_reply_data *data = MM_REPDATA(reply_base);
34 struct net_device *dev = reply_base->dev;
35 const struct ethtool_ops *ops;
36 int ret;
37
38 ops = dev->ethtool_ops;
39
40 if (!ops->get_mm)
41 return -EOPNOTSUPP;
42
43 ethtool_stats_init(stats: (u64 *)&data->stats,
44 n: sizeof(data->stats) / sizeof(u64));
45
46 ret = ethnl_ops_begin(dev);
47 if (ret < 0)
48 return ret;
49
50 ret = ops->get_mm(dev, &data->state);
51 if (ret)
52 goto out_complete;
53
54 if (ops->get_mm_stats && (req_base->flags & ETHTOOL_FLAG_STATS))
55 ops->get_mm_stats(dev, &data->stats);
56
57out_complete:
58 ethnl_ops_complete(dev);
59
60 return ret;
61}
62
63static int mm_reply_size(const struct ethnl_req_info *req_base,
64 const struct ethnl_reply_data *reply_base)
65{
66 int len = 0;
67
68 len += nla_total_size(payload: sizeof(u8)); /* _MM_PMAC_ENABLED */
69 len += nla_total_size(payload: sizeof(u8)); /* _MM_TX_ENABLED */
70 len += nla_total_size(payload: sizeof(u8)); /* _MM_TX_ACTIVE */
71 len += nla_total_size(payload: sizeof(u8)); /* _MM_VERIFY_ENABLED */
72 len += nla_total_size(payload: sizeof(u8)); /* _MM_VERIFY_STATUS */
73 len += nla_total_size(payload: sizeof(u32)); /* _MM_VERIFY_TIME */
74 len += nla_total_size(payload: sizeof(u32)); /* _MM_MAX_VERIFY_TIME */
75 len += nla_total_size(payload: sizeof(u32)); /* _MM_TX_MIN_FRAG_SIZE */
76 len += nla_total_size(payload: sizeof(u32)); /* _MM_RX_MIN_FRAG_SIZE */
77
78 if (req_base->flags & ETHTOOL_FLAG_STATS)
79 len += nla_total_size(payload: 0) + /* _MM_STATS */
80 nla_total_size_64bit(payload: sizeof(u64)) * ETHTOOL_MM_STAT_CNT;
81
82 return len;
83}
84
85static int mm_put_stat(struct sk_buff *skb, u64 val, u16 attrtype)
86{
87 if (val == ETHTOOL_STAT_NOT_SET)
88 return 0;
89 if (nla_put_u64_64bit(skb, attrtype, value: val, padattr: ETHTOOL_A_MM_STAT_PAD))
90 return -EMSGSIZE;
91 return 0;
92}
93
94static int mm_put_stats(struct sk_buff *skb,
95 const struct ethtool_mm_stats *stats)
96{
97 struct nlattr *nest;
98
99 nest = nla_nest_start(skb, attrtype: ETHTOOL_A_MM_STATS);
100 if (!nest)
101 return -EMSGSIZE;
102
103 if (mm_put_stat(skb, val: stats->MACMergeFrameAssErrorCount,
104 attrtype: ETHTOOL_A_MM_STAT_REASSEMBLY_ERRORS) ||
105 mm_put_stat(skb, val: stats->MACMergeFrameSmdErrorCount,
106 attrtype: ETHTOOL_A_MM_STAT_SMD_ERRORS) ||
107 mm_put_stat(skb, val: stats->MACMergeFrameAssOkCount,
108 attrtype: ETHTOOL_A_MM_STAT_REASSEMBLY_OK) ||
109 mm_put_stat(skb, val: stats->MACMergeFragCountRx,
110 attrtype: ETHTOOL_A_MM_STAT_RX_FRAG_COUNT) ||
111 mm_put_stat(skb, val: stats->MACMergeFragCountTx,
112 attrtype: ETHTOOL_A_MM_STAT_TX_FRAG_COUNT) ||
113 mm_put_stat(skb, val: stats->MACMergeHoldCount,
114 attrtype: ETHTOOL_A_MM_STAT_HOLD_COUNT))
115 goto err_cancel;
116
117 nla_nest_end(skb, start: nest);
118 return 0;
119
120err_cancel:
121 nla_nest_cancel(skb, start: nest);
122 return -EMSGSIZE;
123}
124
125static int mm_fill_reply(struct sk_buff *skb,
126 const struct ethnl_req_info *req_base,
127 const struct ethnl_reply_data *reply_base)
128{
129 const struct mm_reply_data *data = MM_REPDATA(reply_base);
130 const struct ethtool_mm_state *state = &data->state;
131
132 if (nla_put_u8(skb, attrtype: ETHTOOL_A_MM_TX_ENABLED, value: state->tx_enabled) ||
133 nla_put_u8(skb, attrtype: ETHTOOL_A_MM_TX_ACTIVE, value: state->tx_active) ||
134 nla_put_u8(skb, attrtype: ETHTOOL_A_MM_PMAC_ENABLED, value: state->pmac_enabled) ||
135 nla_put_u8(skb, attrtype: ETHTOOL_A_MM_VERIFY_ENABLED, value: state->verify_enabled) ||
136 nla_put_u8(skb, attrtype: ETHTOOL_A_MM_VERIFY_STATUS, value: state->verify_status) ||
137 nla_put_u32(skb, attrtype: ETHTOOL_A_MM_VERIFY_TIME, value: state->verify_time) ||
138 nla_put_u32(skb, attrtype: ETHTOOL_A_MM_MAX_VERIFY_TIME, value: state->max_verify_time) ||
139 nla_put_u32(skb, attrtype: ETHTOOL_A_MM_TX_MIN_FRAG_SIZE, value: state->tx_min_frag_size) ||
140 nla_put_u32(skb, attrtype: ETHTOOL_A_MM_RX_MIN_FRAG_SIZE, value: state->rx_min_frag_size))
141 return -EMSGSIZE;
142
143 if (req_base->flags & ETHTOOL_FLAG_STATS &&
144 mm_put_stats(skb, stats: &data->stats))
145 return -EMSGSIZE;
146
147 return 0;
148}
149
150const struct nla_policy ethnl_mm_set_policy[ETHTOOL_A_MM_MAX + 1] = {
151 [ETHTOOL_A_MM_HEADER] = NLA_POLICY_NESTED(ethnl_header_policy),
152 [ETHTOOL_A_MM_VERIFY_ENABLED] = NLA_POLICY_MAX(NLA_U8, 1),
153 [ETHTOOL_A_MM_VERIFY_TIME] = NLA_POLICY_RANGE(NLA_U32, 1, 128),
154 [ETHTOOL_A_MM_TX_ENABLED] = NLA_POLICY_MAX(NLA_U8, 1),
155 [ETHTOOL_A_MM_PMAC_ENABLED] = NLA_POLICY_MAX(NLA_U8, 1),
156 [ETHTOOL_A_MM_TX_MIN_FRAG_SIZE] = NLA_POLICY_RANGE(NLA_U32, 60, 252),
157};
158
159static void mm_state_to_cfg(const struct ethtool_mm_state *state,
160 struct ethtool_mm_cfg *cfg)
161{
162 /* We could also compare state->verify_status against
163 * ETHTOOL_MM_VERIFY_STATUS_DISABLED, but state->verify_enabled
164 * is more like an administrative state which should be seen in
165 * ETHTOOL_MSG_MM_GET replies. For example, a port with verification
166 * disabled might be in the ETHTOOL_MM_VERIFY_STATUS_INITIAL
167 * if it's down.
168 */
169 cfg->verify_enabled = state->verify_enabled;
170 cfg->verify_time = state->verify_time;
171 cfg->tx_enabled = state->tx_enabled;
172 cfg->pmac_enabled = state->pmac_enabled;
173 cfg->tx_min_frag_size = state->tx_min_frag_size;
174}
175
176static int
177ethnl_set_mm_validate(struct ethnl_req_info *req_info, struct genl_info *info)
178{
179 const struct ethtool_ops *ops = req_info->dev->ethtool_ops;
180
181 return ops->get_mm && ops->set_mm ? 1 : -EOPNOTSUPP;
182}
183
184static int ethnl_set_mm(struct ethnl_req_info *req_info, struct genl_info *info)
185{
186 struct netlink_ext_ack *extack = info->extack;
187 struct net_device *dev = req_info->dev;
188 struct ethtool_mm_state state = {};
189 struct nlattr **tb = info->attrs;
190 struct ethtool_mm_cfg cfg = {};
191 bool mod = false;
192 int ret;
193
194 ret = dev->ethtool_ops->get_mm(dev, &state);
195 if (ret)
196 return ret;
197
198 mm_state_to_cfg(state: &state, cfg: &cfg);
199
200 ethnl_update_bool(dst: &cfg.verify_enabled, attr: tb[ETHTOOL_A_MM_VERIFY_ENABLED],
201 mod: &mod);
202 ethnl_update_u32(dst: &cfg.verify_time, attr: tb[ETHTOOL_A_MM_VERIFY_TIME], mod: &mod);
203 ethnl_update_bool(dst: &cfg.tx_enabled, attr: tb[ETHTOOL_A_MM_TX_ENABLED], mod: &mod);
204 ethnl_update_bool(dst: &cfg.pmac_enabled, attr: tb[ETHTOOL_A_MM_PMAC_ENABLED],
205 mod: &mod);
206 ethnl_update_u32(dst: &cfg.tx_min_frag_size,
207 attr: tb[ETHTOOL_A_MM_TX_MIN_FRAG_SIZE], mod: &mod);
208
209 if (!mod)
210 return 0;
211
212 if (cfg.verify_time > state.max_verify_time) {
213 NL_SET_ERR_MSG_ATTR(extack, tb[ETHTOOL_A_MM_VERIFY_TIME],
214 "verifyTime exceeds device maximum");
215 return -ERANGE;
216 }
217
218 if (cfg.verify_enabled && !cfg.tx_enabled) {
219 NL_SET_ERR_MSG(extack, "Verification requires TX enabled");
220 return -EINVAL;
221 }
222
223 if (cfg.tx_enabled && !cfg.pmac_enabled) {
224 NL_SET_ERR_MSG(extack, "TX enabled requires pMAC enabled");
225 return -EINVAL;
226 }
227
228 ret = dev->ethtool_ops->set_mm(dev, &cfg, extack);
229 return ret < 0 ? ret : 1;
230}
231
232const struct ethnl_request_ops ethnl_mm_request_ops = {
233 .request_cmd = ETHTOOL_MSG_MM_GET,
234 .reply_cmd = ETHTOOL_MSG_MM_GET_REPLY,
235 .hdr_attr = ETHTOOL_A_MM_HEADER,
236 .req_info_size = sizeof(struct mm_req_info),
237 .reply_data_size = sizeof(struct mm_reply_data),
238
239 .prepare_data = mm_prepare_data,
240 .reply_size = mm_reply_size,
241 .fill_reply = mm_fill_reply,
242
243 .set_validate = ethnl_set_mm_validate,
244 .set = ethnl_set_mm,
245 .set_ntf_cmd = ETHTOOL_MSG_MM_NTF,
246};
247
248/* Returns whether a given device supports the MAC merge layer
249 * (has an eMAC and a pMAC). Must be called under rtnl_lock() and
250 * ethnl_ops_begin().
251 */
252bool __ethtool_dev_mm_supported(struct net_device *dev)
253{
254 const struct ethtool_ops *ops = dev->ethtool_ops;
255 struct ethtool_mm_state state = {};
256 int ret = -EOPNOTSUPP;
257
258 if (ops && ops->get_mm)
259 ret = ops->get_mm(dev, &state);
260
261 return !ret;
262}
263
264bool ethtool_dev_mm_supported(struct net_device *dev)
265{
266 const struct ethtool_ops *ops = dev->ethtool_ops;
267 bool supported;
268 int ret;
269
270 ASSERT_RTNL();
271
272 if (!ops)
273 return false;
274
275 ret = ethnl_ops_begin(dev);
276 if (ret < 0)
277 return false;
278
279 supported = __ethtool_dev_mm_supported(dev);
280
281 ethnl_ops_complete(dev);
282
283 return supported;
284}
285EXPORT_SYMBOL_GPL(ethtool_dev_mm_supported);
286
287static void ethtool_mmsv_configure_tx(struct ethtool_mmsv *mmsv,
288 bool tx_active)
289{
290 if (mmsv->ops->configure_tx)
291 mmsv->ops->configure_tx(mmsv, tx_active);
292}
293
294static void ethtool_mmsv_configure_pmac(struct ethtool_mmsv *mmsv,
295 bool pmac_enabled)
296{
297 if (mmsv->ops->configure_pmac)
298 mmsv->ops->configure_pmac(mmsv, pmac_enabled);
299}
300
301static void ethtool_mmsv_send_mpacket(struct ethtool_mmsv *mmsv,
302 enum ethtool_mpacket mpacket)
303{
304 if (mmsv->ops->send_mpacket)
305 mmsv->ops->send_mpacket(mmsv, mpacket);
306}
307
308/**
309 * ethtool_mmsv_verify_timer - Timer for MAC Merge verification
310 * @t: timer_list struct containing private info
311 *
312 * Verify the MAC Merge capability in the local TX direction, by
313 * transmitting Verify mPackets up to 3 times. Wait until link
314 * partner responds with a Response mPacket, otherwise fail.
315 */
316static void ethtool_mmsv_verify_timer(struct timer_list *t)
317{
318 struct ethtool_mmsv *mmsv = timer_container_of(mmsv, t, verify_timer);
319 unsigned long flags;
320 bool rearm = false;
321
322 spin_lock_irqsave(&mmsv->lock, flags);
323
324 switch (mmsv->status) {
325 case ETHTOOL_MM_VERIFY_STATUS_INITIAL:
326 case ETHTOOL_MM_VERIFY_STATUS_VERIFYING:
327 if (mmsv->verify_retries != 0) {
328 ethtool_mmsv_send_mpacket(mmsv, mpacket: ETHTOOL_MPACKET_VERIFY);
329 rearm = true;
330 } else {
331 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_FAILED;
332 }
333
334 mmsv->verify_retries--;
335 break;
336
337 case ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED:
338 ethtool_mmsv_configure_tx(mmsv, tx_active: true);
339 break;
340
341 default:
342 break;
343 }
344
345 if (rearm) {
346 mod_timer(timer: &mmsv->verify_timer,
347 expires: jiffies + msecs_to_jiffies(m: mmsv->verify_time));
348 }
349
350 spin_unlock_irqrestore(lock: &mmsv->lock, flags);
351}
352
353static void ethtool_mmsv_verify_timer_arm(struct ethtool_mmsv *mmsv)
354{
355 if (mmsv->pmac_enabled && mmsv->tx_enabled && mmsv->verify_enabled &&
356 mmsv->status != ETHTOOL_MM_VERIFY_STATUS_FAILED &&
357 mmsv->status != ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED) {
358 timer_setup(&mmsv->verify_timer, ethtool_mmsv_verify_timer, 0);
359 mod_timer(timer: &mmsv->verify_timer, expires: jiffies);
360 }
361}
362
363static void ethtool_mmsv_apply(struct ethtool_mmsv *mmsv)
364{
365 /* If verification is disabled, configure FPE right away.
366 * Otherwise let the timer code do it.
367 */
368 if (!mmsv->verify_enabled) {
369 ethtool_mmsv_configure_pmac(mmsv, pmac_enabled: mmsv->pmac_enabled);
370 ethtool_mmsv_configure_tx(mmsv, tx_active: mmsv->tx_enabled);
371 } else {
372 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_INITIAL;
373 mmsv->verify_retries = ETHTOOL_MM_MAX_VERIFY_RETRIES;
374
375 if (netif_running(dev: mmsv->dev))
376 ethtool_mmsv_verify_timer_arm(mmsv);
377 }
378}
379
380/**
381 * ethtool_mmsv_stop() - Stop MAC Merge Software Verification
382 * @mmsv: MAC Merge Software Verification state
383 *
384 * Drivers should call this method in a state where the hardware is
385 * about to lose state, like ndo_stop() or suspend(), and turning off
386 * MAC Merge features would be superfluous. Otherwise, prefer
387 * ethtool_mmsv_link_state_handle() with up=false.
388 */
389void ethtool_mmsv_stop(struct ethtool_mmsv *mmsv)
390{
391 timer_shutdown_sync(timer: &mmsv->verify_timer);
392}
393EXPORT_SYMBOL_GPL(ethtool_mmsv_stop);
394
395/**
396 * ethtool_mmsv_link_state_handle() - Inform MAC Merge Software Verification
397 * of link state changes
398 * @mmsv: MAC Merge Software Verification state
399 * @up: True if device carrier is up and able to pass verification packets
400 *
401 * Calling context is expected to be from a task, interrupts enabled.
402 */
403void ethtool_mmsv_link_state_handle(struct ethtool_mmsv *mmsv, bool up)
404{
405 unsigned long flags;
406
407 ethtool_mmsv_stop(mmsv);
408
409 spin_lock_irqsave(&mmsv->lock, flags);
410
411 if (up && mmsv->pmac_enabled) {
412 /* VERIFY process requires pMAC enabled when NIC comes up */
413 ethtool_mmsv_configure_pmac(mmsv, pmac_enabled: true);
414
415 /* New link => maybe new partner => new verification process */
416 ethtool_mmsv_apply(mmsv);
417 } else {
418 /* Reset the reported verification state while the link is down */
419 if (mmsv->verify_enabled)
420 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_INITIAL;
421
422 /* No link or pMAC not enabled */
423 ethtool_mmsv_configure_pmac(mmsv, pmac_enabled: false);
424 ethtool_mmsv_configure_tx(mmsv, tx_active: false);
425 }
426
427 spin_unlock_irqrestore(lock: &mmsv->lock, flags);
428}
429EXPORT_SYMBOL_GPL(ethtool_mmsv_link_state_handle);
430
431/**
432 * ethtool_mmsv_event_handle() - Inform MAC Merge Software Verification
433 * of interrupt-based events
434 * @mmsv: MAC Merge Software Verification state
435 * @event: Event which took place (packet transmission or reception)
436 *
437 * Calling context expects to have interrupts disabled.
438 */
439void ethtool_mmsv_event_handle(struct ethtool_mmsv *mmsv,
440 enum ethtool_mmsv_event event)
441{
442 /* This is interrupt context, just spin_lock() */
443 spin_lock(lock: &mmsv->lock);
444
445 if (!mmsv->pmac_enabled)
446 goto unlock;
447
448 switch (event) {
449 case ETHTOOL_MMSV_LP_SENT_VERIFY_MPACKET:
450 /* Link partner has sent verify mPacket */
451 ethtool_mmsv_send_mpacket(mmsv, mpacket: ETHTOOL_MPACKET_RESPONSE);
452 break;
453 case ETHTOOL_MMSV_LD_SENT_VERIFY_MPACKET:
454 /* Local device has sent verify mPacket */
455 if (mmsv->status != ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED)
456 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_VERIFYING;
457 break;
458 case ETHTOOL_MMSV_LP_SENT_RESPONSE_MPACKET:
459 /* Link partner has sent response mPacket */
460 if (mmsv->status == ETHTOOL_MM_VERIFY_STATUS_VERIFYING)
461 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED;
462 break;
463 }
464
465unlock:
466 spin_unlock(lock: &mmsv->lock);
467}
468EXPORT_SYMBOL_GPL(ethtool_mmsv_event_handle);
469
470static bool ethtool_mmsv_is_tx_active(struct ethtool_mmsv *mmsv)
471{
472 /* TX is active if administratively enabled, and verification either
473 * succeeded, or was administratively disabled.
474 */
475 return mmsv->tx_enabled &&
476 (mmsv->status == ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED ||
477 mmsv->status == ETHTOOL_MM_VERIFY_STATUS_DISABLED);
478}
479
480/**
481 * ethtool_mmsv_get_mm() - get_mm() hook for MAC Merge Software Verification
482 * @mmsv: MAC Merge Software Verification state
483 * @state: see struct ethtool_mm_state
484 *
485 * Drivers are expected to call this from their ethtool_ops :: get_mm()
486 * method.
487 */
488void ethtool_mmsv_get_mm(struct ethtool_mmsv *mmsv,
489 struct ethtool_mm_state *state)
490{
491 unsigned long flags;
492
493 spin_lock_irqsave(&mmsv->lock, flags);
494
495 state->max_verify_time = ETHTOOL_MM_MAX_VERIFY_TIME_MS;
496 state->verify_enabled = mmsv->verify_enabled;
497 state->pmac_enabled = mmsv->pmac_enabled;
498 state->verify_time = mmsv->verify_time;
499 state->tx_enabled = mmsv->tx_enabled;
500 state->verify_status = mmsv->status;
501 state->tx_active = ethtool_mmsv_is_tx_active(mmsv);
502
503 spin_unlock_irqrestore(lock: &mmsv->lock, flags);
504}
505EXPORT_SYMBOL_GPL(ethtool_mmsv_get_mm);
506
507/**
508 * ethtool_mmsv_set_mm() - set_mm() hook for MAC Merge Software Verification
509 * @mmsv: MAC Merge Software Verification state
510 * @cfg: see struct ethtool_mm_cfg
511 *
512 * Drivers are expected to call this from their ethtool_ops :: set_mm()
513 * method.
514 */
515void ethtool_mmsv_set_mm(struct ethtool_mmsv *mmsv, struct ethtool_mm_cfg *cfg)
516{
517 unsigned long flags;
518
519 /* Wait for the verification that's currently in progress to finish */
520 ethtool_mmsv_stop(mmsv);
521
522 spin_lock_irqsave(&mmsv->lock, flags);
523
524 mmsv->verify_enabled = cfg->verify_enabled;
525 mmsv->pmac_enabled = cfg->pmac_enabled;
526 mmsv->verify_time = cfg->verify_time;
527 mmsv->tx_enabled = cfg->tx_enabled;
528
529 if (!cfg->verify_enabled)
530 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_DISABLED;
531
532 ethtool_mmsv_apply(mmsv);
533
534 spin_unlock_irqrestore(lock: &mmsv->lock, flags);
535}
536EXPORT_SYMBOL_GPL(ethtool_mmsv_set_mm);
537
538/**
539 * ethtool_mmsv_init() - Initialize MAC Merge Software Verification state
540 * @mmsv: MAC Merge Software Verification state
541 * @dev: Pointer to network interface
542 * @ops: Methods for implementing the generic functionality
543 *
544 * The MAC Merge Software Verification is a timer- and event-based state
545 * machine intended for network interfaces which lack a hardware-based
546 * TX verification process (as per IEEE 802.3 clause 99.4.3). The timer
547 * is managed by the core code, whereas events are supplied by the
548 * driver explicitly calling one of the other API functions.
549 */
550void ethtool_mmsv_init(struct ethtool_mmsv *mmsv, struct net_device *dev,
551 const struct ethtool_mmsv_ops *ops)
552{
553 mmsv->ops = ops;
554 mmsv->dev = dev;
555 mmsv->verify_retries = ETHTOOL_MM_MAX_VERIFY_RETRIES;
556 mmsv->verify_time = ETHTOOL_MM_MAX_VERIFY_TIME_MS;
557 mmsv->status = ETHTOOL_MM_VERIFY_STATUS_DISABLED;
558 timer_setup(&mmsv->verify_timer, ethtool_mmsv_verify_timer, 0);
559 spin_lock_init(&mmsv->lock);
560}
561EXPORT_SYMBOL_GPL(ethtool_mmsv_init);
562