From nobody Mon Dec 1 21:30:54 2025 Received: from mail-ot1-f45.google.com (mail-ot1-f45.google.com [209.85.210.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C8A11311966 for ; Thu, 27 Nov 2025 20:37:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.45 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764275862; cv=none; b=Gk6fDMgOk2QpXj/F9p01WnoimdI3x0T2IMJxx/lmYpzS1HVCIbC9Eb+BergMdFG/qESTE4jzjPXK5ItDPabwQ3Ylip0wcthpDnxG+nlTYFleB6iO7DbbGgAAdI1Vja2kTIoA97C68l1Yq6kJ5yeFs3dOmyec7ndjIcUk3aZEOPo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764275862; c=relaxed/simple; bh=Pa1lPn1d5lHa6gmBqdKRFmSoMYflMNXKO0KazOyybvc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=YnZgSDj4txhEoL+KWl+tLdtuiEukxfRgaZcPLhh3OgOMmxylnWij1wxPUHWg4uPhpAArHwKgq20r/jwtMMlMonpukfoYTqCCA6OuozHidbTTTyasoRBmj6b7au10R7xazQsU6dvo9IV/KzatxVqJGF9mOVDEjQhqupnjw4pR5x4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=QR9S/CvZ; arc=none smtp.client-ip=209.85.210.45 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="QR9S/CvZ" Received: by mail-ot1-f45.google.com with SMTP id 46e09a7af769-7c6ce4f65f7so821175a34.0 for ; Thu, 27 Nov 2025 12:37:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1764275860; x=1764880660; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=VAo/zLdFSCy3ZivNRUcyPkQKSGvTdHQmOTB6uk6YR/E=; b=QR9S/CvZtafMGCQeBzshuyWtXUDHirqF3a0SjtGQX2fedxbKRrf+tRy+x16IQ+i348 zyEoekFLnBhdbT0tTkAYpHBdxFnsWZpLT4SaAg1fLjXXC/owMycgNGt1ihWAMgYLCAjc RR0V09bG4fP7Z4E45P34ftL85mPjzX9fccyLri0iMFzutxnlX9vzhi7/v1lbOnsUEd6C /Z2V8ezbEQ5NtoGkU2elXZ7pGyOa/ctraKHA9vQHu27MYPeFGlCc1259EZy2OuhTmKAd F4EMG3E/UQkf2B83eZnLmQ12gFCpMzXp56n8X3wQQSyjOsTJUj8BlBEV50B7HM8k9JKZ 5fuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764275860; x=1764880660; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=VAo/zLdFSCy3ZivNRUcyPkQKSGvTdHQmOTB6uk6YR/E=; b=iT0cLmXVSuCsx+VuFr7OrPqtiFm52sPhCAT2tAmfC8pBK56bM4ZTJzz3q97IqVRLY0 fZnUlWmezGrDnRlFoVFRXW0436B8nQzF8r0/+ehAGbt65NA8XZakR9eidZZesXHM4o7I jxwyNQbF0M5VqMmlkw1H3NEhWqPsNg8tlJtAAK+mD661IOO5GVVrQtWmQBPCm9tVwmyc kHO7H1Zl/dI2wgV60bCXS1oP81r+qgavwJbbl4CRitRP3qzqxo+/PrhP4OHfNz0i7FS/ 2OUhPyGhLUF+l+xBobD2D76MatUnc2oE4ggv2cymib2ujtNwMG3KX36KgS6RgqLjSnIp M1dA== X-Forwarded-Encrypted: i=1; AJvYcCXJnHQqcXDOoU8+9EOTMrv10lRvl9aX1zrjhuSUfiJbfQ1ysC944L12gDIFlxr/cIy7GGT3YJPzGLSTHI0=@vger.kernel.org X-Gm-Message-State: AOJu0Yw2V6rpYWkri2t5YuYzfxKP2x60VKqbKMmYxhi2uzdNzMLmojBy 0bNY+TzNmphF3yb38bbbYh0N9avYgWNuRS2rxkidi7CvUl1Mgr/UVDqk X-Gm-Gg: ASbGnct3v5mwn2SxBaQAZsJDLEkCjrClR3Ub6mkKWOgkYNIP9jXc7ru9GfuDoCnil0A QiPLWjMe4X2ThpQ1RZ/EuS6T6UgeutEqM89K3dmUZ5R0CrWDA5JM8nNgqT3RDTgbO8zYL7EQPlO jgaAkLo7jxVdH8zTu9xjbhbsDoauwS0pMLQOZnTOsJgK9Yj+BPU0q4952FWpHzWFIUxwniKEBLK sgYTY6EXEN9/jlF4gFIU4gngiPMI/Cjred5N8pJt1FlzWXUKegSUti1v0lHKK1Kfs/67uV5saEZ rikegFJdAMJgy722TVGyCIKrGRJ2SocU1mt/mojhcfx10j25z4MSMJKu2wgc2tRFFaMQnRG598k mG4oVIwy5mnlnCe6wxcQivHq75Ybtsc4Ms6N6rESSpXQ2eqpcxkOwZrJQFmpM60CQmC/DYH5IsA iS0H4pJMGdxoil7JhtUmUq X-Google-Smtp-Source: AGHT+IEITYWy9i5DwKGZeqsAnMC7fmhTam9fuM6t1EFIYEodQWt51NIFnOdOlkyNhfNj6pAmkAkyQQ== X-Received: by 2002:a05:6830:7309:b0:7c7:3416:ff8d with SMTP id 46e09a7af769-7c7c412baf3mr5820407a34.9.1764275859847; Thu, 27 Nov 2025 12:37:39 -0800 (PST) Received: from localhost ([2a03:2880:10ff:43::]) by smtp.gmail.com with ESMTPSA id 46e09a7af769-7c90fe15847sm871772a34.25.2025.11.27.12.37.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 12:37:39 -0800 (PST) From: Usama Arif To: rppt@kernel.org, Andrew Morton Cc: kas@kernel.org, changyuanl@google.com, graf@amazon.com, leitao@debian.org, thevlad@meta.com, pratyush@kernel.org, dave.hansen@linux.intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@meta.com, Usama Arif Subject: [PATCH v2 1/2] mm/memblock: remove CONFIG_MEMBLOCK_KHO_SCRATCH option Date: Thu, 27 Nov 2025 20:33:19 +0000 Message-ID: <20251127203724.3177621-2-usamaarif642@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20251127203724.3177621-1-usamaarif642@gmail.com> References: <20251127203724.3177621-1-usamaarif642@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The only defconfig that selects this is CONFIG_KEXEC_HANDOVER. Replace CONFIG_MEMBLOCK_KHO_SCRATCH with CONFIG_KEXEC_HANDOVER to simplify code. No functional change intended. Suggested-by: Kiryl Shutsemau Signed-off-by: Usama Arif Reviewed-by: Kiryl Shutsemau Reviewed-by: Pratyush Yadav --- include/linux/memblock.h | 2 +- kernel/Kconfig.kexec | 1 - mm/Kconfig | 4 ---- mm/memblock.c | 4 ++-- 4 files changed, 3 insertions(+), 8 deletions(-) diff --git a/include/linux/memblock.h b/include/linux/memblock.h index 221118b5a16e1..8bd9bcaccceb8 100644 --- a/include/linux/memblock.h +++ b/include/linux/memblock.h @@ -611,7 +611,7 @@ static inline void early_memtest(phys_addr_t start, phy= s_addr_t end) { } static inline void memtest_report_meminfo(struct seq_file *m) { } #endif =20 -#ifdef CONFIG_MEMBLOCK_KHO_SCRATCH +#ifdef CONFIG_KEXEC_HANDOVER void memblock_set_kho_scratch_only(void); void memblock_clear_kho_scratch_only(void); void memmap_init_kho_scratch_pages(void); diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec index 54e5810726176..06a7c43652cfd 100644 --- a/kernel/Kconfig.kexec +++ b/kernel/Kconfig.kexec @@ -98,7 +98,6 @@ config KEXEC_HANDOVER bool "kexec handover" depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE depends on !DEFERRED_STRUCT_PAGE_INIT - select MEMBLOCK_KHO_SCRATCH select KEXEC_FILE select DEBUG_FS select LIBFDT diff --git a/mm/Kconfig b/mm/Kconfig index bd0ea5454af82..6d6002f57c18f 100644 --- a/mm/Kconfig +++ b/mm/Kconfig @@ -442,10 +442,6 @@ config HAVE_GUP_FAST depends on MMU bool =20 -# Enable memblock support for scratch memory which is needed for kexec han= dover -config MEMBLOCK_KHO_SCRATCH - bool - # Don't discard allocated memory used to track "memory" and "reserved" mem= blocks # after early boot, so it can still be used to test for validity of memory. # Also, memblocks are updated with memory hot(un)plug. diff --git a/mm/memblock.c b/mm/memblock.c index e23e16618e9b3..8b13d5c28922a 100644 --- a/mm/memblock.c +++ b/mm/memblock.c @@ -112,7 +112,7 @@ unsigned long min_low_pfn; unsigned long max_pfn; unsigned long long max_possible_pfn; =20 -#ifdef CONFIG_MEMBLOCK_KHO_SCRATCH +#ifdef CONFIG_KEXEC_HANDOVER /* When set to true, only allocate from MEMBLOCK_KHO_SCRATCH ranges */ static bool kho_scratch_only; #else @@ -948,7 +948,7 @@ int __init_memblock memblock_physmem_add(phys_addr_t ba= se, phys_addr_t size) } #endif =20 -#ifdef CONFIG_MEMBLOCK_KHO_SCRATCH +#ifdef CONFIG_KEXEC_HANDOVER __init void memblock_set_kho_scratch_only(void) { kho_scratch_only =3D true; --=20 2.47.3 From nobody Mon Dec 1 21:30:54 2025 Received: from mail-ot1-f54.google.com (mail-ot1-f54.google.com [209.85.210.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 09A7F313540 for ; Thu, 27 Nov 2025 20:37:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.54 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764275863; cv=none; b=AfUtPrnp5XLY4TJaLsBRFj7HiXpklwlDzecUtOJ0RPQ3/jkYSNXGmLyBhni0MMzGkBBZR89XUiADZ5W4Ta6OyOkqu/ihBYJXB+ltxwDph0OKk4Y81Wgap5AJUqw6/QUZF7FwyF2+QkfTE2gmIYUrZNFr0I5B+lOGuA9BDWd+eEo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764275863; c=relaxed/simple; bh=BGQA3z0jp+7sm2Rd8JzqInWcdl/WKGZ8ltiV7I+Sut8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EGOGtY9kbPnvn+1RZ4Uq+GhNXN0hbBes7XlM04t6TsFJmcUwHdEdm6a+wa8hmPwO2TcqoTiVnvIMyf3qAEsyv/XQZeGoafa3v00eZkwSJ1qLQSkPrBBYWpH2q/rvxrOq5BMyXcctFWlbX+4Z4Trcjs4mqy/mvqxCY5d24xUH30U= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=BlHcHbUb; arc=none smtp.client-ip=209.85.210.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="BlHcHbUb" Received: by mail-ot1-f54.google.com with SMTP id 46e09a7af769-7c704bf2d9eso606913a34.0 for ; Thu, 27 Nov 2025 12:37:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1764275861; x=1764880661; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=IaLsUxu38y5G+gFtilovMk2bO7Fvh/YwG02/3lmZCaM=; b=BlHcHbUbQmUHbnOwAe/kVdlB2mSH5Ktu2XaCHCWOXkg8lv3k9RpJ8L52DEeoVqtShC DBQTxDmGm4cS6I44O2WajTw6ybOxtZpQQ40Mu/04fLb2ryhb+6GgR3MhIq/TXlZmCXoB Qx/buas8pfM42HtSrQcr6JxZ0ATLhPv3uPHH9HgpLH/Da+cKlNjsRekBUew1zCajadOj rhefPyg6lAnjpwy6S8dFsLsJ07NIff5fSScSGjV0B8hP9Lw4glBVEmRB0ngaAInZV/SN AJ+W8DZ+yHIPIHg+X5uFmVB2NFjNdjCN2OLiEIrkMCKs+e2pWTGRI5n9APTwPFH0WM1s Cv4A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764275861; x=1764880661; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=IaLsUxu38y5G+gFtilovMk2bO7Fvh/YwG02/3lmZCaM=; b=EB/rrZBaDfIdjaj71wyCX/gwXn8PKip4dh06gIdXWED+UXW18Ohja0OxKPwRwZrIk1 rDaak9jAxGfGLdQ/MvmW/2yPaHz5eufLABZoGmfg83hCWSDKqZXRnDV2eA+rBPR9pPoG Tbek6WoGOUlkfiNTRfN5LVvnvfOW0KXvvLy9+2PDZvHtiFp3MCSyjeNe+sSrxZj6SODu p7Gengq3tlKdUAvZS0X/mWkAUuOhPcjgVfAfsGCtlvagrDC0mDBYyNwb9CD3767bWWGA x3rX8/99/usPF2wdtRvdUc1I5HbNdHdl8YDNqvPTHdsBAo6XDFPi9grZRYp5HGuNOfiI U9sQ== X-Forwarded-Encrypted: i=1; AJvYcCWoFCJPs2Pcck7QBYzKWxNm9a4UXb1WqSIpKwks0uxM4k4WDLq11sTB8NaQMY/pj+ylMCML0etwb48od3A=@vger.kernel.org X-Gm-Message-State: AOJu0YxWfnBW+oneE93B8YPnlysiIC3OTj/ka7OSTb1gxHnY2ht+0riI v6ejK8z3fKUEi3xegJmZSr4cNAJE1Rf3afsYEbIPLPquSugLlXlg1jV6 X-Gm-Gg: ASbGnctVzVnIQshn7cGf28Gfv+ckaYxU8pmRBmtr/dhxYyk9og4TuYYxgv8lKg4Ro98 IjUD/YPd6uOaUE/Cdup7Bcla9npCDQYg4MrxeNLI7rnWS3wdQESfvStk8VBqNzUyWs6T2+Dj5W3 ifB/zU0OOuW/rmHbQjJExJZuvy0OS68x189zbgoCfhj2ocArLD4opaPkvmHClwu+rDGtbzz5r2n Lh5MzruHhgZ7W1NHVpatz8GVOweMD+IiB6JFDOwHveJuBOcfYpvCLtELhaR69xkorhJtXVYO2U3 fcRkwr+C0+txWcwpLHkdlQKT/1CbQ6pmy/Nr+oecKdOQbXlCuHPCpUYk+x1CIgvFdE0aKd+RubU J6VTO8+2ARtiLuMEADkKcVu0GLSle8TVSxIFdUOfah1udpcFlygnyQ/JqPTUPdnkYg8CdZQW0W7 /lOnwmOEkdGtRBPVOP3ezop0NS15u9QDk= X-Google-Smtp-Source: AGHT+IGJhhlLeqRc0DJAlF0MmZoecI9eojRTaaX5K8ZxiyKE2JKVMaUIDPe51FRm+vBCj0A9r0XEDQ== X-Received: by 2002:a05:6808:13c4:b0:450:ac7e:cb7a with SMTP id 5614622812f47-4514e7eed87mr5135527b6e.34.1764275861043; Thu, 27 Nov 2025 12:37:41 -0800 (PST) Received: from localhost ([2a03:2880:10ff:74::]) by smtp.gmail.com with ESMTPSA id 5614622812f47-453169f9f54sm731093b6e.7.2025.11.27.12.37.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 12:37:40 -0800 (PST) From: Usama Arif To: rppt@kernel.org, Andrew Morton Cc: kas@kernel.org, changyuanl@google.com, graf@amazon.com, leitao@debian.org, thevlad@meta.com, pratyush@kernel.org, dave.hansen@linux.intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@meta.com, Usama Arif Subject: [PATCH v2 2/2] mm/memblock: only mark/clear KHO scratch memory when needed Date: Thu, 27 Nov 2025 20:33:20 +0000 Message-ID: <20251127203724.3177621-3-usamaarif642@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20251127203724.3177621-1-usamaarif642@gmail.com> References: <20251127203724.3177621-1-usamaarif642@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The scratch memory for kexec handover is used to bootstrap the kexec'ed kernel. It is only needed when CONFIG_KEXEC_HANDOVER is enabled and only if it is a KHO boot. Add checks to prevent marking a KHO scratch region unless needed. Fixes: a2daf83e10378 ("x86/e820: temporarily enable KHO scratch for memory = below 1M") Reported-by: Vlad Poenaru Signed-off-by: Usama Arif Reviewed-by: Pratyush Yadav --- mm/memblock.c | 74 ++++++++++++++++++++++++++++++--------------------- 1 file changed, 44 insertions(+), 30 deletions(-) diff --git a/mm/memblock.c b/mm/memblock.c index 8b13d5c28922a..8a2cebcfe0a18 100644 --- a/mm/memblock.c +++ b/mm/memblock.c @@ -1114,36 +1114,6 @@ int __init_memblock memblock_reserved_mark_noinit(ph= ys_addr_t base, phys_addr_t MEMBLOCK_RSRV_NOINIT); } =20 -/** - * memblock_mark_kho_scratch - Mark a memory region as MEMBLOCK_KHO_SCRATC= H. - * @base: the base phys addr of the region - * @size: the size of the region - * - * Only memory regions marked with %MEMBLOCK_KHO_SCRATCH will be considered - * for allocations during early boot with kexec handover. - * - * Return: 0 on success, -errno on failure. - */ -__init int memblock_mark_kho_scratch(phys_addr_t base, phys_addr_t size) -{ - return memblock_setclr_flag(&memblock.memory, base, size, 1, - MEMBLOCK_KHO_SCRATCH); -} - -/** - * memblock_clear_kho_scratch - Clear MEMBLOCK_KHO_SCRATCH flag for a - * specified region. - * @base: the base phys addr of the region - * @size: the size of the region - * - * Return: 0 on success, -errno on failure. - */ -__init int memblock_clear_kho_scratch(phys_addr_t base, phys_addr_t size) -{ - return memblock_setclr_flag(&memblock.memory, base, size, 0, - MEMBLOCK_KHO_SCRATCH); -} - static bool should_skip_region(struct memblock_type *type, struct memblock_region *m, int nid, int flags) @@ -2617,12 +2587,56 @@ static bool __init reserve_mem_kho_revive(const cha= r *name, phys_addr_t size, =20 return true; } + +/** + * memblock_mark_kho_scratch - Mark a memory region as MEMBLOCK_KHO_SCRATC= H. + * @base: the base phys addr of the region + * @size: the size of the region + * + * Only memory regions marked with %MEMBLOCK_KHO_SCRATCH will be considered + * for allocations during early boot with kexec handover. + * + * Return: 0 on success, -errno on failure. + */ +__init int memblock_mark_kho_scratch(phys_addr_t base, phys_addr_t size) +{ + if (is_kho_boot()) + return memblock_setclr_flag(&memblock.memory, base, size, 1, + MEMBLOCK_KHO_SCRATCH); + return 0; +} + +/** + * memblock_clear_kho_scratch - Clear MEMBLOCK_KHO_SCRATCH flag for a + * specified region. + * @base: the base phys addr of the region + * @size: the size of the region + * + * Return: 0 on success, -errno on failure. + */ +__init int memblock_clear_kho_scratch(phys_addr_t base, phys_addr_t size) +{ + if (is_kho_boot()) + return memblock_setclr_flag(&memblock.memory, base, size, 0, + MEMBLOCK_KHO_SCRATCH); + return 0; +} #else static bool __init reserve_mem_kho_revive(const char *name, phys_addr_t si= ze, phys_addr_t align) { return false; } + +__init int memblock_mark_kho_scratch(phys_addr_t base, phys_addr_t size) +{ + return 0; +} + +__init int memblock_clear_kho_scratch(phys_addr_t base, phys_addr_t size) +{ + return 0; +} #endif /* CONFIG_KEXEC_HANDOVER */ =20 /* --=20 2.47.3