From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0D201E92FC6 for ; Thu, 5 Oct 2023 21:17:01 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 841288E0007; Thu, 5 Oct 2023 17:17:00 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7F0D994000A; Thu, 5 Oct 2023 17:17:00 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 643748E000B; Thu, 5 Oct 2023 17:17:00 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 546378E0007 for ; Thu, 5 Oct 2023 17:17:00 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 2443640337 for ; Thu, 5 Oct 2023 21:17:00 +0000 (UTC) X-FDA: 81312667800.08.D2E4685 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.9]) by imf22.hostedemail.com (Postfix) with ESMTP id 1D094C0025 for ; Thu, 5 Oct 2023 21:16:55 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="Kn/wxTC7"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf22.hostedemail.com: domain of dan.j.williams@intel.com designates 198.175.65.9 as permitted sender) smtp.mailfrom=dan.j.williams@intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1696540616; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=BpmtF691GUW7Yesh67Jff9e4kkloAhl0FsH/OFdkD7Y=; b=zWFy25oPOfDzVmaDvMfKa108mZb4bl2wSCz8Z5nPk55O+EcwLxMQZg4uwAMgDIvuSFyEDM M+g4tjBLRO2mn6ve++3VB92PfBdyb0r18TB+Z9DyT3QBAtNqbLscchPImU61g+AOkECycj moGIZzGGx/1WZqrhyBCvHRW8mZF6vJI= ARC-Authentication-Results: i=2; imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="Kn/wxTC7"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf22.hostedemail.com: domain of dan.j.williams@intel.com designates 198.175.65.9 as permitted sender) smtp.mailfrom=dan.j.williams@intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1696540616; a=rsa-sha256; cv=fail; b=jSC11jJJLbqfw2LQGIsPyib8nEm1xHvEatLuw8kNSFADQyTAkmNleb+lmBkz3JrRs2WGm9 7dEKgaQn0mKMJxBBKufyc2+9ubED2WWBRcbOWp/zqpo2umJYaj2xxZRJLSn3lDtItnYu2R ueq8kkt3408cE09k0Nl2gf8RvFD7R4g= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1696540616; x=1728076616; h=date:from:to:cc:subject:message-id:references: in-reply-to:mime-version; bh=KKUNAdv13jac4BB+rrLim3ABYe0qmwIUw4zInFneuqk=; b=Kn/wxTC7SOVu8avmKXDtOHiBBVq1TpcUzs5Id91xFH2klRDM8pBouMm8 x5VR3K7G7l7S9QTNi5+cs5pyTsn52QUH3xKnOVAvXy/T9Rvnd1U8B+wNX J+uPPNdtypUAPnjZld3Rc2tCx1fXZnirFYcXHun5sRrBREJSfi3diCGOc dzPQC4Ttt8wMBjEciybXjbKzwmR3E5OTuOCX3n/KauC+NITRf5T41dYRw T8GPAYnSqUEubKnHKZIHKWOowB9GPWaUKA9V5gZ/+henkaGrfgAfqiduy B67CkCZ7WmZu0ULyAKVS+Hznnoz0+0b1YrFTmnz6W6kA1qO4MkwXOvyar w==; X-IronPort-AV: E=McAfee;i="6600,9927,10854"; a="2222213" X-IronPort-AV: E=Sophos;i="6.03,203,1694761200"; d="scan'208";a="2222213" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orvoesa101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2023 14:16:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10854"; a="1083173835" X-IronPort-AV: E=Sophos;i="6.03,203,1694761200"; d="scan'208";a="1083173835" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmsmga005.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 05 Oct 2023 14:16:52 -0700 Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Thu, 5 Oct 2023 14:16:51 -0700 Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32 via Frontend Transport; Thu, 5 Oct 2023 14:16:51 -0700 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.32; Thu, 5 Oct 2023 14:16:51 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Zj6YLyN1B3iQAPrQAfgIHf4oV8HopJJmAhhsTQE5enkl2cie6clQLeo8aDN+OuxdacckIQSo0LC7Mj91e5twvy5hQNYEnayssImEiq+ZO+Ur6tzxg00vJwjKXGEWeSEwo/3vf35iiV5+pbCHlMGzWqNZUI7ALOIw+fdt0I6ZuKTPI4uHB/X1mWL/HEwlHQwFDUHBNILLPTksxlKkED9qb63O3lVwR0h8oeHn3oj/SqMSon4VWNkFGkSlXLohEquB4lFOfxZ9pPHUdVgAn2tWBzJfAltv/uwVqOqb8zZyWrYMdWwqMnPHpQqOmXv0R782A8/UdBChjNwA/JqRUsFs2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BpmtF691GUW7Yesh67Jff9e4kkloAhl0FsH/OFdkD7Y=; b=UePYx0SM121Mgow61RqF15bkeyqHJvHQHkTUUNlQfT2RJ39sOGibyB7tphcpUD+hQEpsrS3kzR3OgpCdVL998T6Sl1B3PdnmmzdHstd78Nj98moITsEHmbORONLv6sZWr0OwTz94G1qcey0I5nkQmlepS8Zg2JaptlfFB/Eq7nNHqrm+zspgw7da9qBXc0mkk0Sf0duRAgniZHhV2DBIDBfI2iSfiLAlALFxvN3igrgbuAb+x8/ZHDkAcxc0X7kdLgkfvcZu6M4VjyevwqLgbZeEhrnz7Ge95vDLqu38V3RPIEpIKQjPxCNT71/HD+yTcMIE5+n10tJD9XaI6VKysA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH8PR11MB8107.namprd11.prod.outlook.com (2603:10b6:510:256::6) by IA1PR11MB8248.namprd11.prod.outlook.com (2603:10b6:208:447::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.25; Thu, 5 Oct 2023 21:16:49 +0000 Received: from PH8PR11MB8107.namprd11.prod.outlook.com ([fe80::acb0:6bd3:58a:c992]) by PH8PR11MB8107.namprd11.prod.outlook.com ([fe80::acb0:6bd3:58a:c992%5]) with mapi id 15.20.6838.033; Thu, 5 Oct 2023 21:16:48 +0000 Date: Thu, 5 Oct 2023 14:16:39 -0700 From: Dan Williams To: Vishal Verma , Andrew Morton , David Hildenbrand , "Oscar Salvador" , Dan Williams , "Dave Jiang" CC: , , , , Huang Ying , Dave Hansen , "Aneesh Kumar K.V" , Michal Hocko , Jonathan Cameron , Jeff Moyer , Vishal Verma Subject: RE: [PATCH v5 2/2] dax/kmem: allow kmem to add memory with memmap_on_memory Message-ID: <651f27b728fef_ae7e7294b3@dwillia2-xfh.jf.intel.com.notmuch> References: <20231005-vv-kmem_memmap-v5-0-a54d1981f0a3@intel.com> <20231005-vv-kmem_memmap-v5-2-a54d1981f0a3@intel.com> Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20231005-vv-kmem_memmap-v5-2-a54d1981f0a3@intel.com> X-ClientProxiedBy: MW4PR04CA0133.namprd04.prod.outlook.com (2603:10b6:303:84::18) To PH8PR11MB8107.namprd11.prod.outlook.com (2603:10b6:510:256::6) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PH8PR11MB8107:EE_|IA1PR11MB8248:EE_ X-MS-Office365-Filtering-Correlation-Id: e938cf14-dfed-4ebe-80ca-08dbc5e8628a X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH8PR11MB8107.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(136003)(366004)(376002)(396003)(346002)(39860400002)(230922051799003)(1800799009)(451199024)(64100799003)(186009)(9686003)(2906002)(6636002)(7416002)(8936002)(6666004)(41300700001)(316002)(8676002)(5660300002)(4326008)(110136005)(38100700002)(86362001)(82960400001)(66946007)(6512007)(6506007)(66556008)(54906003)(26005)(66476007)(478600001)(6486002)(83380400001);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?u3q/qOvE0PQBtBidRtX8H+EQppZUWweBA7vOoiKJ01MTLO32S88IJTh1ND6V?= =?us-ascii?Q?UbsU3Y+DO5jXYGhJGU7B5V3ktfGFBw5kVbTdODHz8U2EHNfXxkABg66PNRfz?= =?us-ascii?Q?Ak0RRBsQ1ehx+ZW7hA7CHAiarSlhANMHzcRaz29Vyo+7YHoo3GgrH0HDqTYC?= =?us-ascii?Q?s/9efKPqUj/WPzsDPOtBH7LIpf1jPvm2ihtm2RNf7jsjKJ9E9pqCla1REe72?= =?us-ascii?Q?M7T2Br3HI/7lJAjefB0zBYwYv3cJdnGBINuXpfdssiPOL7rr7nlt+nr8WH+d?= =?us-ascii?Q?2Kor+Zx80CtPFSJJchLbqPYUJzw4QsMhKFnnND41QMpcUi90SwGc5ZplutyG?= =?us-ascii?Q?+MvCLlUAjjzbQk8ExzD7CX1rVIGtaNKkkQkUFIq3TMNEWg1ESqpMhEBA1JbJ?= =?us-ascii?Q?RTpiTmvdAe0JGo3nMEsLcwaWR/rO1spRVXkvMIVmUWECp2spBL4Pyl2cHTnB?= =?us-ascii?Q?EeiblSiupE6/Y5I0gYozvDcFetzRH4gRc8Z1CM8JBIirwrkYSrmsahznGwxr?= =?us-ascii?Q?fXEkbcU3OEWo0jmC/s8xDzK0uezrOQXaCzFt9RzhJiL3kug8cCSWkjZnrjui?= =?us-ascii?Q?ifEwLsRsfxSNHhDuDv987t/o/FmPRywDDw4tJ42oJVSnf1HqobvHJ4SiSOSB?= =?us-ascii?Q?GCaPa1N7FBE6/dt3owqGaA5cF35eAZ9eQIACL5+rxc78DpEqRrpz/nP5x6Ly?= =?us-ascii?Q?EpHkraVDL2U/VvdfiigTdKaaftwboCyKP+3XJoeYN7eFMLkFmV5OYuiBxH5V?= =?us-ascii?Q?moBbsWW9j8uWeJshcBM/A2XQvJC9LdkVJ9P2Bnax7Zuu6U/HeuBD/GsEhxCA?= =?us-ascii?Q?YtFZlH7Jj5P29ztnWYIJpZqxRVUhCp1xOBvKrzGZ/JNNGIebLLlNDHRwGMny?= =?us-ascii?Q?Ku8fDK7VLcF3y2lVDujAVZMNn9Wq7kr2YYRcvHE7Wxrbw0/8g1BzZCYAmP6+?= =?us-ascii?Q?dV6wLq+ByXLgrVmLwcDH6ClwXfXEmyquKSDxRIEitNzuPy0WYrSHDHyLN0Ku?= =?us-ascii?Q?Q9c0khU41Aijb7F4leWV6AQIjDrKWPSxYcwFeSXBte9VUj+2M1S5mp4LHH4A?= =?us-ascii?Q?JhAhK46L5Ye2OxJDEOPsuL0w956KQfWSYCIME232Kpfwyj331g/g+kRp0q1p?= =?us-ascii?Q?M1Za58epl4PBGLxaWRoQfi2H2UpsfTmG631g14ZQnY4L+gMcPdxgE9mXUBHK?= =?us-ascii?Q?9jI8IdP7pD0JsWTpFXClZw3KLg8Ztcp3WZ2u6uVoXqdpRcJHzozfTkjLn6QB?= =?us-ascii?Q?dT5GNR0eQis/6DWn40w3ifQ+EkfVplZnUwJfibCTvpOHeuTloTco6F4Dt4HO?= =?us-ascii?Q?7x3RXZIzvuQ6aWL9+Lxp8FNtnaZRXEXNoyWNhJhDFJto5ZVJ4Ujc46SbCVd3?= =?us-ascii?Q?9xeWcZVinVue0/eumiXcfL93NXmkR9IQId8Qb69x2hT33YzzQuWXFks//ZpL?= =?us-ascii?Q?RVaCuKJintdYWJFY6GHImUNk7SG92EPbpl6/muaK3IX9fQVMJgmAUyKSoQzn?= =?us-ascii?Q?BPqRN1QLCe5zEtyDvrkw4ILv85ZGtYGUWDCLzBpJLDnFgGJPSOq9M7r7M5N5?= =?us-ascii?Q?IAojMHJzqABWUSslcSxMiIbTDMI5QX6+5n2eaL4GOKwN3aTI56dXhCwwk66N?= =?us-ascii?Q?4A=3D=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: e938cf14-dfed-4ebe-80ca-08dbc5e8628a X-MS-Exchange-CrossTenant-AuthSource: PH8PR11MB8107.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Oct 2023 21:16:48.1299 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: nnGNP2EIEkKMWT6R8fCWW1fpt/CjkA2Mlumq4TvphxCNuz9wjVGl+/sUM5rT7hi/GGMDttBDIjVToTtAMwDypdClW2ZHh0qcXmIBV/GA6xo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR11MB8248 X-OriginatorOrg: intel.com X-Rspamd-Queue-Id: 1D094C0025 X-Rspam-User: X-Rspamd-Server: rspam02 X-Stat-Signature: 1e6yabpbuh1okbb9pjaxemq6h3hggh96 X-HE-Tag: 1696540615-254154 X-HE-Meta: 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 y41a6Nlk 2ksBddKrZj/EA1TEWr1v5qK83RuAVpKO0aLrlTTPGuYe7u4xvEajXYsAOmkF4jDLRlCtuYonYx1vcSdg/j0cGGdHR0FxvkZfPkPwsNX8wxrg8UwHY/uphU6GiwFhfjYKkmFQBpx4E/D2LZ0axQ26BjGr9OVniiObKV5rGSOE9T4jlzGF7pIJeNV6msc0uRJz0bDgmkhsOY8es9wDog16B1xXUo4ye1sKmReSuGDHRdYZI6HFm2Zy4OzJS19weE6HPhHcRtRwAGMmMLGM+xAIsjTRVjXyZmgL35SHEN5XBB7murPzVCPiZec9q0czNyLo+t4Tj1SLRTPXbQbheszfIskZGJwynCpIAzuNCZ6MABaXTvyuZjQPBZ6PMBCCtuZm88XfIURCTMBj9W6bTbcfkG8x9uwdOTFxBrFj9szOz4M0EWoIs0vWoIqiG87agT9uhlDASDR/G2Bw14TdO/e4LVoAnLA6aeLbFcN9c X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Vishal Verma wrote: > Large amounts of memory managed by the kmem driver may come in via CXL, > and it is often desirable to have the memmap for this memory on the new > memory itself. > > Enroll kmem-managed memory for memmap_on_memory semantics if the dax > region originates via CXL. For non-CXL dax regions, retain the existing > default behavior of hot adding without memmap_on_memory semantics. > > Add a sysfs override under the dax device to control this behavior and > override either default. > > Cc: Andrew Morton > Cc: David Hildenbrand > Cc: Michal Hocko > Cc: Oscar Salvador > Cc: Dan Williams > Cc: Dave Jiang > Cc: Dave Hansen > Cc: Huang Ying > Reviewed-by: Jonathan Cameron > Reviewed-by: David Hildenbrand > Signed-off-by: Vishal Verma > --- > drivers/dax/bus.h | 1 + > drivers/dax/dax-private.h | 1 + > drivers/dax/bus.c | 38 ++++++++++++++++++++++++++++++++++++++ > drivers/dax/cxl.c | 1 + > drivers/dax/hmem/hmem.c | 1 + > drivers/dax/kmem.c | 8 +++++++- > drivers/dax/pmem.c | 1 + > 7 files changed, 50 insertions(+), 1 deletion(-) > > diff --git a/drivers/dax/bus.h b/drivers/dax/bus.h > index 1ccd23360124..cbbf64443098 100644 > --- a/drivers/dax/bus.h > +++ b/drivers/dax/bus.h > @@ -23,6 +23,7 @@ struct dev_dax_data { > struct dev_pagemap *pgmap; > resource_size_t size; > int id; > + bool memmap_on_memory; > }; > > struct dev_dax *devm_create_dev_dax(struct dev_dax_data *data); > diff --git a/drivers/dax/dax-private.h b/drivers/dax/dax-private.h > index 27cf2daaaa79..446617b73aea 100644 > --- a/drivers/dax/dax-private.h > +++ b/drivers/dax/dax-private.h > @@ -70,6 +70,7 @@ struct dev_dax { > struct ida ida; > struct device dev; > struct dev_pagemap *pgmap; > + bool memmap_on_memory; > int nr_range; > struct dev_dax_range { > unsigned long pgoff; > diff --git a/drivers/dax/bus.c b/drivers/dax/bus.c > index 0ee96e6fc426..43be95a231c9 100644 > --- a/drivers/dax/bus.c > +++ b/drivers/dax/bus.c > @@ -367,6 +367,7 @@ static ssize_t create_store(struct device *dev, struct device_attribute *attr, > .dax_region = dax_region, > .size = 0, > .id = -1, > + .memmap_on_memory = false, > }; > struct dev_dax *dev_dax = devm_create_dev_dax(&data); > > @@ -1269,6 +1270,40 @@ static ssize_t numa_node_show(struct device *dev, > } > static DEVICE_ATTR_RO(numa_node); > > +static ssize_t memmap_on_memory_show(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + struct dev_dax *dev_dax = to_dev_dax(dev); > + > + return sprintf(buf, "%d\n", dev_dax->memmap_on_memory); > +} > + > +static ssize_t memmap_on_memory_store(struct device *dev, > + struct device_attribute *attr, > + const char *buf, size_t len) > +{ > + struct dev_dax *dev_dax = to_dev_dax(dev); > + struct dax_region *dax_region = dev_dax->region; > + ssize_t rc; > + bool val; > + > + rc = kstrtobool(buf, &val); > + if (rc) > + return rc; Perhaps: if (dev_dax->memmap_on_memory == val) return len; ...and skip the check below when it is going to be a nop > + > + device_lock(dax_region->dev); > + if (!dax_region->dev->driver) { Is the polarity backwards here? I.e. if the device is already attached to the kmem driver it is too late to modify memmap_on_memory policy. > + device_unlock(dax_region->dev); > + return -ENXIO; I would expect -EBUSY since disabling the device allows the property to be set and -ENXIO implies a more permanent error. > + } > + > + dev_dax->memmap_on_memory = val; > + > + device_unlock(dax_region->dev); > + return len; > +} > +static DEVICE_ATTR_RW(memmap_on_memory); This new attribute needs a new Documentation/ABI/ entry... in fact all of these attributes need Documentation/ entries. I can help with that base document to get things started. Perhaps split this sysfs ABI into its own patch and, depending on how fast we can pull the Documentation together, start with the region-driver-conveyed approach in the meantime.