diff options
author | Sameer Rahmani <lxsameer@gnu.org> | 2020-02-03 20:15:43 +0000 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2020-02-05 10:30:03 -0700 |
commit | ff1e81a7e2239f61d0e9173f113a7de4dcaab661 (patch) | |
tree | 506d72b99f8aa4c4b361fc3058430fb246a75f4a /Documentation/trace/kprobetrace.rst | |
parent | 36a375c6dfad502217898c4c2f0cf05810c30ceb (diff) |
Documentation: build warnings related to missing blank lines after explicit markups has been fixed
Fix for several documentation build warnings related to missing blank lines
after explicit mark up.
Exact warning message:
WARNING: Explicit markup ends without a blank line; unexpected unindent.
Signed-off-by: Sameer Rahmani <lxsameer@gnu.org>
Link: https://lore.kernel.org/r/20200203201543.24834-1-lxsameer@gnu.org
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Diffstat (limited to 'Documentation/trace/kprobetrace.rst')
-rw-r--r-- | Documentation/trace/kprobetrace.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Documentation/trace/kprobetrace.rst b/Documentation/trace/kprobetrace.rst index 55993055902c..cc4c5fc313df 100644 --- a/Documentation/trace/kprobetrace.rst +++ b/Documentation/trace/kprobetrace.rst @@ -97,6 +97,7 @@ which shows given pointer in "symbol+offset" style. For $comm, the default type is "string"; any other type is invalid. .. _user_mem_access: + User Memory Access ------------------ Kprobe events supports user-space memory access. For that purpose, you can use @@ -252,4 +253,3 @@ And you can see the traced information via /sys/kernel/debug/tracing/trace. Each line shows when the kernel hits an event, and <- SYMBOL means kernel returns from SYMBOL(e.g. "sys_open+0x1b/0x1d <- do_sys_open" means kernel returns from do_sys_open to sys_open+0x1b). - |