--- i386/i386/trap.c | 4 ++-- i386/intel/pmap.c | 4 ++-- i386/intel/read_fault.c | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/i386/i386/trap.c b/i386/i386/trap.c index a9d0d8d2..90650b31 100644 --- a/i386/i386/trap.c +++ b/i386/i386/trap.c @@ -236,7 +236,7 @@ dump_ss(regs); */ result = vm_fault(map, trunc_page((vm_offset_t)subcode), -#if !(__i486__ || __i586__ || __i686__) +#if (__i386__ && !(__i486__ || __i586__ || __i686__)) VM_PROT_READ|VM_PROT_WRITE, #else (code & T_PF_WRITE) @@ -258,7 +258,7 @@ dump_ss(regs); } else #endif /* MACH_KDB */ -#if !(__i486__ || __i586__ || __i686__) +#if (__i386__ && !(__i486__ || __i586__ || __i686__)) if ((code & T_PF_WRITE) == 0 && result == KERN_PROTECTION_FAILURE) { diff --git a/i386/intel/pmap.c b/i386/intel/pmap.c index 49ffd579..fa0f4d29 100644 --- a/i386/intel/pmap.c +++ b/i386/intel/pmap.c @@ -1973,7 +1973,7 @@ void pmap_protect( return; } -#if !(__i486__ || __i586__ || __i686__) +#if (__i386__ && !(__i486__ || __i586__ || __i686__)) /* * If write-protecting in the kernel pmap, * remove the mappings; the i386 ignores @@ -2188,7 +2188,7 @@ void pmap_enter( if (pmap == kernel_pmap && (v < kernel_virtual_start || v >= kernel_virtual_end)) panic("pmap_enter(%lx, %llx) falls in physical memory area!\n", (unsigned long) v, (unsigned long long) pa); -#if !(__i486__ || __i586__ || __i686__) +#if (__i386__ && !(__i486__ || __i586__ || __i686__)) if (pmap == kernel_pmap && (prot & VM_PROT_WRITE) == 0 && !wired /* hack for io_wire */ ) { /* diff --git a/i386/intel/read_fault.c b/i386/intel/read_fault.c index 356145e1..8ff64bbe 100644 --- a/i386/intel/read_fault.c +++ b/i386/intel/read_fault.c @@ -33,7 +33,7 @@ #include <kern/macros.h> -#if !(__i486__ || __i586__ || __i686__) +#if (__i386__ && !(__i486__ || __i586__ || __i686__)) /* * Expansion of vm_fault for read fault in kernel mode. * Must enter the mapping as writable, since the i386 -- 2.49.0