diff options
author | Tomasz Konojacki <me@xenu.pl> | 2022-04-19 16:41:23 +0200 |
---|---|---|
committer | xenu <me@xenu.pl> | 2022-05-29 00:54:10 +0200 |
commit | ae6b6b71cdbfb3fb6e1192178fa1e530a2f07ece (patch) | |
tree | 19d644c0277a598f8f5b2062ef20b43d78591c61 /hints/darwin.sh | |
parent | b95d23342a119c6677aa5ad786ca7d002c98bef2 (diff) | |
download | perl-ae6b6b71cdbfb3fb6e1192178fa1e530a2f07ece.tar.gz |
make PERL_USE_SAFE_PUTENV the default and the only option
Now environ isn't owned by Perl and calling setenv/putenv in XS code
will no longer result in memory corruption.
Fixes #19399
Diffstat (limited to 'hints/darwin.sh')
-rw-r--r-- | hints/darwin.sh | 10 |
1 files changed, 0 insertions, 10 deletions
diff --git a/hints/darwin.sh b/hints/darwin.sh index ea521003c3..97a3ec59a9 100644 --- a/hints/darwin.sh +++ b/hints/darwin.sh @@ -509,16 +509,6 @@ esac # the problem. firstmakefile=GNUmakefile; -# Parts of the system call setenv(), in particular in an atfork handler. -# This causes problems when the child tries to clean up environ[], so -# let libc manage environ[]. -cat >> config.over <<'EOOVER' -if test "$d_unsetenv" = "$define" -a \ - `expr "$ccflags" : '.*-DPERL_USE_SAFE_PUTENV'` -eq 0; then - ccflags="$ccflags -DPERL_USE_SAFE_PUTENV" -fi -EOOVER - # if you use a newer toolchain before OS X 10.9 these functions may be # incorrectly detected, so disable them # OS X 10.10.x corresponds to kernel 14.x |