[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190925101745.3645-1-bhenryj0117@gmail.com>
Date: Wed, 25 Sep 2019 17:17:44 +0700
From: bhenryj0117@...il.com
To: Jonathan Corbet <corbet@....net>, linux-doc@...r.kernel.org,
linux-kernel@...r.kernel.org
Cc: Brendan Jackman <bhenryj0117@...il.com>
Subject: [PATCH 1/2] docs: security: fix section hyperlink
From: Brendan Jackman <bhenryj0117@...il.com>
The reStructuredText syntax is wrong here; not sure how it was
intended but we can just use the section header as an implicit
hyperlink target, with a single "outward" underscore.
Signed-off-by: Brendan Jackman <bhenryj0117@...il.com>
Cc: Jonathan Corbet <corbet@....net>
---
Documentation/security/lsm.rst | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Documentation/security/lsm.rst b/Documentation/security/lsm.rst
index ad4dfd020e0d..aadf47c808c0 100644
--- a/Documentation/security/lsm.rst
+++ b/Documentation/security/lsm.rst
@@ -56,7 +56,7 @@ the infrastructure to support security modules. The LSM kernel patch
also moves most of the capabilities logic into an optional security
module, with the system defaulting to the traditional superuser logic.
This capabilities module is discussed further in
-`LSM Capabilities Module <#cap>`__.
+`LSM Capabilities Module`_.
The LSM kernel patch adds security fields to kernel data structures and
inserts calls to hook functions at critical points in the kernel code to
--
2.22.1
Powered by blists - more mailing lists