In perl.git, the branch blead has been updated

<http://perl5.git.perl.org/perl.git/commitdiff/33bb4a44218ade1a7fe78a286569fafa4ab02b7d?hp=278372729622ff1b3dfc1ecbf1efe8abb7f5b3fa>

- Log -----------------------------------------------------------------
commit 33bb4a44218ade1a7fe78a286569fafa4ab02b7d
Author: Lars Dɪᴇᴄᴋᴏᴡ 迪拉斯 <[email protected]>
Date:   Wed Jul 21 10:53:50 2010 +0200

    clarify how to enable -DPERL_USE_SAFE_PUTENV
-----------------------------------------------------------------------

Summary of changes:
 INSTALL |    7 ++++---
 1 files changed, 4 insertions(+), 3 deletions(-)

diff --git a/INSTALL b/INSTALL
index 337b447..039e26b 100644
--- a/INSTALL
+++ b/INSTALL
@@ -500,9 +500,10 @@ to avoid these leaks. The default is now to perform direct 
manipulation
 whenever perl is running as a stand alone interpreter, and to call the safe
 but potentially leaky C<putenv()> function when the perl interpreter is
 embedded in another application. You can force perl to always use C<putenv()>
-by compiling with -DPERL_USE_SAFE_PUTENV. You can force an embedded perl to
-use direct manipulation by setting C<PL_use_safe_putenv = 0;> after the
-C<perl_construct()> call.
+by compiling with C<-Accflags="-DPERL_USE_SAFE_PUTENV">, see section
+L</"Altering Configure variables for C compiler switches etc.">.
+You can force an embedded perl to use direct manipulation by setting
+C<PL_use_safe_putenv = 0;> after the C<perl_construct()> call.
 
 =head2 Installation Directories
 

--
Perl5 Master Repository

Reply via email to