B_KERNEL_EXECUTE_AREA
(B_KERNEL_READ_AREA | B_KERNEL_WRITE_AREA | B_KERNEL_EXECUTE_AREA \
B_KERNEL_READ_AREA | B_KERNEL_EXECUTE_AREA, &fHypercallPage, &fHyperCallPhys);
protection &= ~B_KERNEL_EXECUTE_AREA;
ADD_AREA_FLAG_IF_PRESENT(B_KERNEL_EXECUTE_AREA, protection, "x",
if (((attributes & B_KERNEL_EXECUTE_AREA) == 0) &&
attributes |= B_KERNEL_EXECUTE_AREA;
if ((attributes & B_KERNEL_EXECUTE_AREA) == 0)
*flags |= B_KERNEL_EXECUTE_AREA;
if ((attributes & B_KERNEL_EXECUTE_AREA) != 0) {
*_flags |= B_KERNEL_EXECUTE_AREA;
newPte.isExec = (attributes & B_KERNEL_EXECUTE_AREA) != 0;
.isExec = (attributes & B_KERNEL_EXECUTE_AREA) != 0,
const uint32 kernelProtection = B_KERNEL_READ_AREA | B_KERNEL_EXECUTE_AREA;
&& (protection & B_KERNEL_EXECUTE_AREA) != 0) {
| ((entry & X86_64_PTE_NOT_EXECUTABLE) == 0 ? B_KERNEL_EXECUTE_AREA : 0)
? B_KERNEL_EXECUTE_AREA : 0)
? B_KERNEL_EXECUTE_AREA : 0)
B_KERNEL_READ_AREA | B_KERNEL_EXECUTE_AREA);
B_KERNEL_READ_AREA | B_KERNEL_EXECUTE_AREA
& (B_EXECUTE_AREA | (isUser ? 0 : B_KERNEL_EXECUTE_AREA))) == 0) {
if ((*protection & B_KERNEL_EXECUTE_AREA) != 0
| B_KERNEL_READ_AREA | B_KERNEL_WRITE_AREA | B_KERNEL_EXECUTE_AREA);