diff --git a/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml b/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml index 0cd77ee50e..c08d2584d6 100644 --- a/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml +++ b/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml @@ -139,7 +139,7 @@ j.ip_number = ntohl(in.s_addr);</programlisting> </sect3> <sect3> - <title>Jailing The Process</title> + <title>Jailing the Process</title> <para>Finally, the userland program jails the process. <application>Jail</application> now becomes an imprisoned @@ -224,7 +224,7 @@ SYSCTL_INT(_security_jail, OID_AUTO, mount_allowed, CTLFLAG_RW, </sect3> <sect3> - <title>&man.jail.2; system call</title> + <title>&man.jail.2; System Call</title> <para>Like all system calls, the &man.jail.2; system call takes two arguments, <literal>struct thread *td</literal> and @@ -617,7 +617,7 @@ socreate(int dom, struct socket **aso, int type, int proto, contains the port, address, length and domain family of the socket which is to be bound. Basically, this disallows any processes from <application>jail</application> to be able to specify the address - that doesn't belong to the <application>jail</application> in which + that does not belong to the <application>jail</application> in which the calling process exists.</para> <programlisting><filename>/usr/src/sys/netinet/in_pcb.c</filename>: