Lines Matching refs:which

172  * Mach things for which prototypes are unavailable from Mach headers
266 * int segment from which string comes
326 * int segment from which path comes
344 * "path", which could be an absolute pathname. This might be
412 * size. If this is the case, then break out the arguments, if any, which
820 * uthread are actually those of our parent, and our proc, which we
860 * execve() following a vfork(), which is an unrecoverable condition.
902 * Close file descriptors which specify close-on-exec.
1065 * install new helpers which no longer belong to this process!
1280 /* Use imgp->ip_strings, which contains the copyin-ed exec path */
1366 /* Use imgp->ip_strings, which exec_shell_imgact reset to the interpreter */
1439 act->which, port) != KERN_SUCCESS)
1507 * a path argument, which is normally copied in from
1817 * which depends on it.
1827 * process which does not inherit memory from the parent process,
1828 * which is one of the most expensive things about using fork()
2027 * usage limit, which will generate a resource exceeded exception if any one thread exceeds the
2087 * before check_for_signature(), which uses psignal.
2094 * Drop the signal lock on the child which was taken on our
2108 * We have to delay operations which might throw a signal until after
2519 * which preceed it on the stack are properly aligned.
2606 * which we already know is aligned properly, and ip_argspace
2795 * passed to execve() for interpreters which do not use the PATH
3178 * Note: MAC policies which do not actually end up modifying
3224 * part of the security model, which requires a
3303 * descriptors in this range which has implied meaning
3394 * map Address map in which to allocate the new stack
3644 * depending on which way the stack grows; see the function
4001 * into account the slide, at which point the all_image_infos_address