1 /* SPDX-License-Identifier: GPL-2.0 */ 2 #ifndef LINUX_KEXEC_INTERNAL_H 3 #define LINUX_KEXEC_INTERNAL_H 4 5 #include <linux/kexec.h> 6 7 struct kimage *do_kimage_alloc_init(void); 8 int sanity_check_segment_list(struct kimage *image); 9 void kimage_free_page_list(struct list_head *list); 10 void kimage_free(struct kimage *image); 11 int kimage_load_segment(struct kimage *image, struct kexec_segment *segment); 12 void kimage_terminate(struct kimage *image); 13 int kimage_is_destination_range(struct kimage *image, 14 unsigned long start, unsigned long end); 15 16 int machine_kexec_post_load(struct kimage *image); 17 18 /* 19 * Whatever is used to serialize accesses to the kexec_crash_image needs to be 20 * NMI safe, as __crash_kexec() can happen during nmi_panic(), so here we use a 21 * "simple" atomic variable that is acquired with a cmpxchg(). 22 */ 23 extern atomic_t __kexec_lock; kexec_trylock(void)24static inline bool kexec_trylock(void) 25 { 26 return atomic_cmpxchg_acquire(&__kexec_lock, 0, 1) == 0; 27 } kexec_unlock(void)28static inline void kexec_unlock(void) 29 { 30 atomic_set_release(&__kexec_lock, 0); 31 } 32 33 #ifdef CONFIG_KEXEC_FILE 34 #include <linux/purgatory.h> 35 void kimage_file_post_load_cleanup(struct kimage *image); 36 extern char kexec_purgatory[]; 37 extern size_t kexec_purgatory_size; 38 #else /* CONFIG_KEXEC_FILE */ kimage_file_post_load_cleanup(struct kimage * image)39static inline void kimage_file_post_load_cleanup(struct kimage *image) { } 40 #endif /* CONFIG_KEXEC_FILE */ 41 #endif /* LINUX_KEXEC_INTERNAL_H */ 42