Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3334471ybl; Mon, 20 Jan 2020 21:57:03 -0800 (PST) X-Google-Smtp-Source: APXvYqwbycAaGZnfLssEn/nIZU87eN8KkQg1xv8ZO7gkwnJnS4+v4hAlP0jNceT4aKWCCtKTUore X-Received: by 2002:a05:6830:2147:: with SMTP id r7mr2450739otd.94.1579586223332; Mon, 20 Jan 2020 21:57:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579586223; cv=none; d=google.com; s=arc-20160816; b=eSmNEfABLnWTrAt0ngKkBJUIf2opV794XzemOO1aqDLNTsI9Qfd8tbo45reo38AhNY NCrEM5f4j7ylPhQSvTvua9G7KEXZaUGZzl8Rf8XXK1EnFztHCRVz1Lpi8J46nOtTcEcC o+K3xrriyy+xCmDNkfN64qHbvbM12wXMQ1//6dzmZGjfBJLFrFYFQsejBvfJGrCckqm8 z1hOGuJ9V5KVgfqz6F31AXGgdd6Tic9p1vZ81/MoFNezJ8X4L1Ef/KO4vnnOGes6WvWu 4xHtg8Up2k2fqZLnoJIV8on8t67TxIx0rYm1u3Oo2j1ND00jmrESRZ/XaaK1BmVKXH3M k3zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:message-id:date:subject:cc:from; bh=AO9cgF8RdeGlxBZGTsyKT/qd1+8TcwqX5+nq1gWHbP8=; b=rowgcJU38yoHxGW/L/8tC8UQSHI1GNUyKtsazO56FccWvEVNbOme3LDzTxR3yk4LjM ZskOitDoHWdA5gIC48ORnZVT+C0f1MExIXH+JfGEbmN4Vk+xNXa0knRpLppgQu4MJJxO L/hXsd5cv8YzptrFe5Du3a4I8IYGbNqxXVdP2smaBvNM4KikTdCTNqndQpc7GIBRTC+7 HD0ZPHYvt6PjDeYd9cnguWr7/VjuFDGSM8bNrpJDh+A4LXSlu6TjPjIiBrGfCECCVl+h ebLtz81sEVgovmTLaMXG+sdsC7oicX1qvommMISXiakOoO01YwhcWBowWkcr/zh7y9Yu aDpA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b18si17577622oib.170.2020.01.20.21.56.51; Mon, 20 Jan 2020 21:57:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728896AbgAUFyk (ORCPT + 99 others); Tue, 21 Jan 2020 00:54:40 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:52347 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725916AbgAUFyj (ORCPT ); Tue, 21 Jan 2020 00:54:39 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=alex.shi@linux.alibaba.com;NM=1;PH=DS;RN=3;SR=0;TI=SMTPD_---0ToH3SVv_1579586077; Received: from localhost(mailfrom:alex.shi@linux.alibaba.com fp:SMTPD_---0ToH3SVv_1579586077) by smtp.aliyun-inc.com(127.0.0.1); Tue, 21 Jan 2020 13:54:37 +0800 From: Alex Shi Cc: Steven Rostedt , Ingo Molnar , linux-kernel@vger.kernel.org Subject: [PATCH] trace/kprobe: remove MAX_KPROBE_CMDLINE_SIZE Date: Tue, 21 Jan 2020 13:54:35 +0800 Message-Id: <1579586075-45132-1-git-send-email-alex.shi@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This limitation are never lunched from introduce commit 970988e19eb0 ("tracing/kprobe: Add kprobe_event= boot parameter") Could we remove it if no intention to implement it? Signed-off-by: Alex Shi Cc: Steven Rostedt Cc: Ingo Molnar Cc: linux-kernel@vger.kernel.org --- kernel/trace/trace_kprobe.c | 1 - 1 file changed, 1 deletion(-) diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c index 7f890262c8a3..eafa90d0f760 100644 --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -22,7 +22,6 @@ #define KPROBE_EVENT_SYSTEM "kprobes" #define KRETPROBE_MAXACTIVE_MAX 4096 -#define MAX_KPROBE_CMDLINE_SIZE 1024 /* Kprobe early definition from command line */ static char kprobe_boot_events_buf[COMMAND_LINE_SIZE] __initdata; -- 1.8.3.1