return ret;
        }
  
+       linkmode_copy(support1, support);
+ 
        iface = sfp_select_interface(pl->sfp_bus, id, config.advertising);
        if (iface == PHY_INTERFACE_MODE_NA) {
 -              netdev_err(pl->netdev,
 -                         "selection of interface failed, advertisement %*pb\n",
 -                         __ETHTOOL_LINK_MODE_MASK_NBITS, config.advertising);
 +              phylink_err(pl,
 +                          "selection of interface failed, advertisement %*pb\n",
 +                          __ETHTOOL_LINK_MODE_MASK_NBITS, config.advertising);
                return -EINVAL;
        }
  
        config.interface = iface;
-       ret = phylink_validate(pl, support, &config);
+       ret = phylink_validate(pl, support1, &config);
        if (ret) {
 -              netdev_err(pl->netdev, "validation of %s/%s with support %*pb failed: %d\n",
 -                         phylink_an_mode_str(MLO_AN_INBAND),
 -                         phy_modes(config.interface),
 -                         __ETHTOOL_LINK_MODE_MASK_NBITS, support, ret);
 +              phylink_err(pl, "validation of %s/%s with support %*pb failed: %d\n",
 +                          phylink_an_mode_str(MLO_AN_INBAND),
 +                          phy_modes(config.interface),
 +                          __ETHTOOL_LINK_MODE_MASK_NBITS, support, ret);
                return ret;
        }
  
 
  };
  
  #define TLS_OFFLOAD_CONTEXT_SIZE_TX                                            \
 -      (ALIGN(sizeof(struct tls_offload_context_tx), sizeof(void *)) +        \
 -       TLS_DRIVER_STATE_SIZE)
 +      (sizeof(struct tls_offload_context_tx) + TLS_DRIVER_STATE_SIZE_TX)
  
+ enum tls_context_flags {
+       TLS_RX_SYNC_RUNNING = 0,
+ };
+ 
  struct cipher_context {
        char *iv;
        char *rec_seq;