Clarify '-T' help.

Make it clear that the -T option will prevent all checks on the target
executable.

Bug: 27207746
Change-Id: I80888678530ada6d66d9bee203ee34f03b77f880
diff --git a/elfparse.c b/elfparse.c
index b2b5891..cd032af 100644
--- a/elfparse.c
+++ b/elfparse.c
@@ -69,19 +69,19 @@
 			if (is_elf_magic(pHeader)) {
 				if ((pHeader[EI_DATA] == ELFDATA2LSB) &&
 				    (pHeader[EI_CLASS] == ELFCLASS64)) {
-					/* 64 bit little endian */
+					/* 64-bit little endian. */
 					ret = parseElf64(elf_file, pHeader, 1);
 				} else if ((pHeader[EI_DATA] == ELFDATA2MSB) &&
 					  (pHeader[EI_CLASS] == ELFCLASS64)) {
-					/* 64 bit big endian */
+					/* 64-bit big endian. */
 					ret = parseElf64(elf_file, pHeader, 0);
 				} else if ((pHeader[EI_DATA] == ELFDATA2LSB) &&
 					  (pHeader[EI_CLASS] == ELFCLASS32)) {
-					/* 32 bit little endian */
+					/* 32-bit little endian. */
 					ret = parseElf32(elf_file, pHeader, 1);
 				} else if ((pHeader[EI_DATA] == ELFDATA2MSB) &&
 					  (pHeader[EI_CLASS] == ELFCLASS32)) {
-					/* 32 bit big endian */
+					/* 32-bit big endian. */
 					ret = parseElf32(elf_file, pHeader, 0);
 				}
 			} else {
@@ -90,9 +90,9 @@
 				 * script. We should parse the #! line and
 				 * check the interpreter to guard against
 				 * static interpreters escaping the sandbox.
-				 * As minijail is only called from rootfs
+				 * As Minijail is only called from the rootfs
 				 * it was deemed not necessary to check this.
-				 * So we will just let execve decided if this
+				 * So we will just let execve(2) decide if this
 				 * is valid.
 				 */
 				ret = ELFDYNAMIC;