@@ -31,7 +31,7 @@ module Unix_tcp_server_ = struct
3131 {
3232 IO.TCP_server. serve =
3333 (fun ~after_init ~handle () : unit ->
34- if self.masksigpipe && not ( Sys. win32) then
34+ if self.masksigpipe && not Sys. win32 then
3535 ignore (Unix. sigprocmask Unix. SIG_BLOCK [ Sys. sigpipe ] : _ list );
3636 let sock, should_bind =
3737 match self.sock with
@@ -83,7 +83,7 @@ module Unix_tcp_server_ = struct
8383 (Thread. id @@ Thread. self () )
8484 (Util. show_sockaddr client_addr));
8585
86- if self.masksigpipe && not ( Sys. win32) then
86+ if self.masksigpipe && not Sys. win32 then
8787 ignore (Unix. sigprocmask Unix. SIG_BLOCK [ Sys. sigpipe ] : _ list );
8888 Unix. set_nonblock client_sock;
8989 Unix. setsockopt client_sock Unix. TCP_NODELAY true ;
@@ -113,7 +113,7 @@ module Unix_tcp_server_ = struct
113113 Sem. acquire 1 self.sem_max_connections;
114114 (* Block INT/HUP while cloning to avoid children handling them.
115115 When thread gets them, our Unix.accept raises neatly. *)
116- if not ( Sys. win32) then
116+ if not Sys. win32 then
117117 ignore Unix. (sigprocmask SIG_BLOCK Sys. [ sigint; sighup ]);
118118 self.new_thread (fun () ->
119119 try
@@ -137,7 +137,7 @@ module Unix_tcp_server_ = struct
137137 (Util. show_sockaddr client_addr)
138138 (Printexc. to_string e)
139139 (Printexc. raw_backtrace_to_string bt)));
140- if not ( Sys. win32) then
140+ if not Sys. win32 then
141141 ignore Unix. (sigprocmask SIG_UNBLOCK Sys. [ sigint; sighup ])
142142 | exception Unix .Unix_error ((Unix. EAGAIN | Unix. EWOULDBLOCK ), _, _)
143143 ->
0 commit comments