In perl.git, the branch blead has been updated <http://perl5.git.perl.org/perl.git/commitdiff/33bb4a44218ade1a7fe78a286569fafa4ab02b7d?hp=278372729622ff1b3dfc1ecbf1efe8abb7f5b3fa>
- Log ----------------------------------------------------------------- commit 33bb4a44218ade1a7fe78a286569fafa4ab02b7d Author: Lars Dɪá´á´á´á´á´¡ è¿ªææ¯ <[email protected]> Date: Wed Jul 21 10:53:50 2010 +0200 clarify how to enable -DPERL_USE_SAFE_PUTENV ----------------------------------------------------------------------- Summary of changes: INSTALL | 7 ++++--- 1 files changed, 4 insertions(+), 3 deletions(-) diff --git a/INSTALL b/INSTALL index 337b447..039e26b 100644 --- a/INSTALL +++ b/INSTALL @@ -500,9 +500,10 @@ to avoid these leaks. The default is now to perform direct manipulation whenever perl is running as a stand alone interpreter, and to call the safe but potentially leaky C<putenv()> function when the perl interpreter is embedded in another application. You can force perl to always use C<putenv()> -by compiling with -DPERL_USE_SAFE_PUTENV. You can force an embedded perl to -use direct manipulation by setting C<PL_use_safe_putenv = 0;> after the -C<perl_construct()> call. +by compiling with C<-Accflags="-DPERL_USE_SAFE_PUTENV">, see section +L</"Altering Configure variables for C compiler switches etc.">. +You can force an embedded perl to use direct manipulation by setting +C<PL_use_safe_putenv = 0;> after the C<perl_construct()> call. =head2 Installation Directories -- Perl5 Master Repository
