@@ -68,9 +68,9 @@ bpf_open(void)
6868
6969 for (i = 0 ; i < 10 ; i ++ ) {
7070 snprintf (path , sizeof (path ), "/dev/bpf%d" , i );
71- enter_blocking_section ();
71+ caml_enter_blocking_section ();
7272 fd = open (path , O_RDWR );
73- leave_blocking_section ();
73+ caml_leave_blocking_section ();
7474 if (fd == -1 && errno == EBUSY )
7575 continue ;
7676 break ;
@@ -258,9 +258,9 @@ af_packet_open(void)
258258{
259259 int fd ;
260260
261- enter_blocking_section ();
261+ caml_enter_blocking_section ();
262262 fd = socket (AF_PACKET , SOCK_RAW , htons (ETH_P_ALL ));
263- leave_blocking_section ();
263+ caml_leave_blocking_section ();
264264
265265 if (fd == -1 )
266266 uerror ("af_packet_open" , Nothing );
@@ -285,9 +285,9 @@ af_packet_setif(int fd, const char *ifname)
285285 sll .sll_ifindex = ifidx ;
286286 sll .sll_protocol = htons (ETH_P_ALL );
287287
288- enter_blocking_section ();
288+ caml_enter_blocking_section ();
289289 r = bind (fd , (struct sockaddr * ) & sll , sizeof (sll ));
290- leave_blocking_section ();
290+ caml_leave_blocking_section ();
291291
292292 if (r == -1 )
293293 uerror ("af_packet_setif: bind" , Nothing );
0 commit comments