B_EXECUTE_AREA
(B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA | B_STACK_AREA)
FLAG_INFO_ENTRY(B_EXECUTE_AREA),
ADD_AREA_FLAG_IF_PRESENT(B_EXECUTE_AREA, protection, "x", _output,
if ((userFlags & B_EXECUTE_AREA) != 0)
B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA, &mappedRegion)
.isExec = (region->protection & B_EXECUTE_AREA) != 0
B_PAGE_SIZE, B_ALREADY_WIRED, B_READ_AREA | B_EXECUTE_AREA);
((attributes & B_EXECUTE_AREA) == 0)) {
attributes |= B_EXECUTE_AREA;
if ((attributes & B_EXECUTE_AREA) == 0)
if ((attributes & B_READ_AREA) != 0 || (attributes & B_EXECUTE_AREA) != 0)
*flags |= B_EXECUTE_AREA;
if ((protection & B_EXECUTE_AREA) != 0
if ((attributes & B_EXECUTE_AREA) != 0) {
*_flags |= B_EXECUTE_AREA;
newPte.isExec = (attributes & B_EXECUTE_AREA) != 0;
&& (protection & B_EXECUTE_AREA) == 0
if ((attributes & B_EXECUTE_AREA) == 0
| ((entry & X86_64_PTE_NOT_EXECUTABLE) == 0 ? B_EXECUTE_AREA : 0);
if ((attributes & B_EXECUTE_AREA) == 0
if ((attributes & B_EXECUTE_AREA) == 0
| ((entry & X86_PAE_PTE_NOT_EXECUTABLE) == 0 ? B_EXECUTE_AREA : 0);
| ((entry & X86_PAE_PTE_NOT_EXECUTABLE) == 0 ? B_EXECUTE_AREA : 0);
if ((attributes & B_EXECUTE_AREA) == 0
B_RANDOMIZED_BASE_ADDRESS, B_READ_AREA | B_EXECUTE_AREA | B_KERNEL_AREA,
if ((protection & B_EXECUTE_AREA) != 0)
protection |= B_EXECUTE_AREA;
& (B_EXECUTE_AREA | (isUser ? 0 : B_KERNEL_EXECUTE_AREA))) == 0) {
& (B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA);
& (B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA);
area->protection &= ~(B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA
protection &= B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA;
if ((protection & ~(B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA)) != 0)
protection |= B_EXECUTE_AREA | B_CLONEABLE_AREA;
protection |= B_EXECUTE_AREA | B_CLONEABLE_AREA;
protection |= B_EXECUTE_AREA;
B_READ_AREA | B_WRITE_AREA | B_EXECUTE_AREA | B_STACK_AREA);
protection |= B_EXECUTE_AREA;
protection |= B_EXECUTE_AREA;
areaProtection |= B_EXECUTE_AREA;
protection |= B_WRITE_AREA | B_EXECUTE_AREA;
protection |= B_EXECUTE_AREA;