summaryrefslogtreecommitdiff
path: root/pflocal/io.c
diff options
context:
space:
mode:
Diffstat (limited to 'pflocal/io.c')
-rw-r--r--pflocal/io.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/pflocal/io.c b/pflocal/io.c
index f621bbb3..6d43b6dd 100644
--- a/pflocal/io.c
+++ b/pflocal/io.c
@@ -41,7 +41,7 @@
/* Read data from an IO object. If offset if -1, read from the object
maintained file pointer. If the object is not seekable, offset is
ignored. The amount desired to be read is in amount. */
-error_t
+kern_return_t
S_io_read (struct sock_user *user,
data_t *data, mach_msg_type_number_t *data_len,
off_t offset, vm_size_t amount)
@@ -79,7 +79,7 @@ S_io_read (struct sock_user *user,
object at a time; servers implement congestion control by delaying
responses to io_write. Servers may drop data (returning ENOBUFS)
if they recevie more than one write when not prepared for it. */
-error_t
+kern_return_t
S_io_write (struct sock_user *user,
const_data_t data, mach_msg_type_number_t data_len,
off_t offset, vm_size_t *amount)
@@ -120,7 +120,7 @@ S_io_write (struct sock_user *user,
/* Tell how much data can be read from the object without blocking for
a "long time" (this should be the same meaning of "long time" used
by the nonblocking flag. */
-error_t
+kern_return_t
S_io_readable (struct sock_user *user, vm_size_t *amount)
{
error_t err;
@@ -146,7 +146,7 @@ S_io_readable (struct sock_user *user, vm_size_t *amount)
}
/* Change current read/write offset */
-error_t
+kern_return_t
S_io_seek (struct sock_user *user,
off_t offset, int whence, off_t *new_offset)
{
@@ -154,7 +154,7 @@ S_io_seek (struct sock_user *user,
}
/* Return a new port with the same semantics as the existing port. */
-error_t
+kern_return_t
S_io_duplicate (struct sock_user *user,
mach_port_t *new_port, mach_msg_type_name_t *new_port_type)
{
@@ -282,7 +282,7 @@ io_select_common (struct sock_user *user,
return err;
}
-error_t
+kern_return_t
S_io_select (struct sock_user *user,
mach_port_t reply, mach_msg_type_name_t reply_type,
int *select_type)
@@ -290,7 +290,7 @@ S_io_select (struct sock_user *user,
return io_select_common (user, reply, reply_type, NULL, select_type);
}
-error_t
+kern_return_t
S_io_select_timeout (struct sock_user *user,
mach_port_t reply, mach_msg_type_name_t reply_type,
struct timespec ts,
@@ -310,7 +310,7 @@ copy_time (time_value_t *from, time_t *to_sec, long *to_nsec)
io_statuf_t are meaningful for all objects; however, the access and
modify times, the optimal IO size, and the fs type are meaningful
for all objects. */
-error_t
+kern_return_t
S_io_stat (struct sock_user *user, struct stat *st)
{
struct sock *sock;
@@ -365,7 +365,7 @@ S_io_stat (struct sock_user *user, struct stat *st)
return 0;
}
-error_t
+kern_return_t
S_io_get_openmodes (struct sock_user *user, int *bits)
{
unsigned flags;
@@ -380,7 +380,7 @@ S_io_get_openmodes (struct sock_user *user, int *bits)
return 0;
}
-error_t
+kern_return_t
S_io_set_all_openmodes (struct sock_user *user, int bits)
{
if (!user)
@@ -396,7 +396,7 @@ S_io_set_all_openmodes (struct sock_user *user, int bits)
return 0;
}
-error_t
+kern_return_t
S_io_set_some_openmodes (struct sock_user *user, int bits)
{
if (!user)
@@ -410,7 +410,7 @@ S_io_set_some_openmodes (struct sock_user *user, int bits)
return 0;
}
-error_t
+kern_return_t
S_io_clear_some_openmodes (struct sock_user *user, int bits)
{
if (!user)
@@ -426,7 +426,7 @@ S_io_clear_some_openmodes (struct sock_user *user, int bits)
#define NIDS 10
-error_t
+kern_return_t
S_io_reauthenticate (struct sock_user *user, mach_port_t rendezvous)
{
error_t err;
@@ -477,7 +477,7 @@ S_io_reauthenticate (struct sock_user *user, mach_port_t rendezvous)
return err;
}
-error_t
+kern_return_t
S_io_restrict_auth (struct sock_user *user,
mach_port_t *new_port,
mach_msg_type_name_t *new_port_type,
@@ -490,7 +490,7 @@ S_io_restrict_auth (struct sock_user *user,
return sock_create_port (user->sock, new_port);
}
-error_t
+kern_return_t
S_io_pathconf (struct sock_user *user, int name, int *value)
{
if (user == NULL)
@@ -509,7 +509,7 @@ S_io_pathconf (struct sock_user *user, int name, int *value)
return EINVAL;
}
-error_t
+kern_return_t
S_io_identity (struct sock_user *user,
mach_port_t *id, mach_msg_type_name_t *id_type,
mach_port_t *fsys_id, mach_msg_type_name_t *fsys_id_type,