-/*
- * Physical memory is mapped 1-1 with virtual memory starting
- * at VM_MIN_KERNEL_ADDRESS.
- */
-#define phystokv(a) ((vm_offset_t)(a) + VM_MIN_KERNEL_ADDRESS)
-
-/*
- * For 386 only, ensure that pages are installed in the
- * kernel_pmap with VM_PROT_WRITE enabled. This avoids
- * code in pmap_enter that disallows a read-only mapping
- * in the kernel's pmap. (See ri-osc CR1387.)
- *
- * An entry in kernel_pmap is made only by the kernel or
- * a collocated server -- by definition (;-)), the requester
- * is trusted code. If it asked for read-only access,
- * it won't attempt a write. We don't have to enforce the
- * restriction. (Naturally, this assumes that any collocated
- * server will _not_ depend on trapping write accesses to pages
- * mapped read-only; this cannot be made to work in the current
- * i386-inspired pmap model.)
- */
-
-/*#if defined(AT386)
-
-#define PMAP_ENTER_386_CHECK \
- if (cpuid_family == CPUID_FAMILY_386)
-
-#else -- FIXME? We're only running on Pentiums or better */
-
-#define PMAP_ENTER_386_CHECK
-
-/*#endif*/
-
-#define PMAP_ENTER(pmap, virtual_address, page, protection, wired) \
+#define PMAP_ENTER(pmap, virtual_address, page, protection, flags, wired) \