复制代码 代码如下:
ini_set("safe_mode",true);
?>
表 42-2. 安全模式限制函数
Function name | Limitations |
---|---|
dbmopen() | Checks whether the file or directory being operated on has the same UID (owner) as the script being executed. |
dbase_open() | Checks whether the file or directory being operated on has the same UID (owner) as the script being executed. |
filepro() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
filepro_rowcount() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
filepro_retrieve() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
ifx_* | sql_safe_mode limit, (!= safe mode) |
ingres_* | sql_safe_mode limit, (!= safe mode) |
mysql_* | sql _safe_mode limit, (!= safe mode ) |
pg_loimport() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
posix_mkfifo() | Checks if the directory being manipulated has the same UID (owner) as the script being executed. |
putenv() | Follow the safe_mode_protected_env_vars and safe_mode_allowed_env_vars options set by ini. Please refer to the relevant documentation of the putenv() function. |
move_uploaded_file() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
chdir() | Checks if the directory being manipulated has the same UID (owner) as the script being executed. |
dl() | This function is disabled in safe mode. |
backtick operator | This function is disabled in safe mode. |
shell_exec() (functionally the same as the backticks function) | This function is disabled in safe mode. |
exec() | can only be executed in the directory set by safe_mode_exec_dir. For some reason, it is currently not possible to use .. in the path of an executable object. escapeshellcmd() will be applied to the parameters of this function. |
system() | can only be executed in the directory set by safe_mode_exec_dir. For some reason, it is currently not possible to use .. in the path of an executable object. escapeshellcmd() will be applied to the parameters of this function. |
passthru() | can only be executed in the directory set by safe_mode_exec_dir. For some reason, it is currently not possible to use .. in the path of an executable object. escapeshellcmd() will be applied to the parameters of this function. |
popen() | can only be executed in the directory set by safe_mode_exec_dir. For some reason, it is currently not possible to use .. in the path of an executable object. escapeshellcmd() will be applied to the parameters of this function. |
fopen() | Checks whether the directory being operated on has the same UID (owner) as the script being executed. |
mkdir() | Checks if the directory being manipulated has the same UID (owner) as the script being executed. |
rmdir() | Checks if the directory being manipulated has the same UID (owner) as the script being executed. |
rename() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. |
unlink() | Checks whether the file or directory being operated on has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. |
copy() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. (on source and target ) |
chgrp() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
chown() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. |
chmod() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Additionally, SUID, SGID and sticky bits cannot be set |
touch() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. |
symlink() | Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. (Note: Test target only) |
link() | Check if the file or directory being manipulated has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. (Note: Test target only) |
apache_request_headers() | In safe mode, headers starting with "authorization" (case sensitive) will not be returned. |
header() | In safe mode, if WWW-Authenticate is set, the uid of the current script will be added to the realm part of this header. |
PHP_AUTH variable | In safe mode, the variables PHP_AUTH_USER , PHP_AUTH_PW and PHP_AUTH_TYPE are not available in $_SERVER . But anyway, you can still use REMOTE_USER to get the username (USER). (Note: only valid after PHP 4.3.0) |
highlight_file(), show_source() | Check whether the file or directory being operated on has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. (Note, only valid after version 4.2.1) |
parse_ini_file() | Check whether the file or directory being operated on has the same UID (owner) as the script being executed. Check if the directory being manipulated has the same UID (owner) as the script being executed. (Note, only valid after version 4.2.1) |
set_time_limit() | does not work in safe mode. |
max_execution_time | does not work in safe mode. |
mail() | In safe mode, the fifth parameter is blocked. (Note, only affected since PHP 4.2.3) |
Any function using php4/main/fopen_wrappers.c | ?? |
The above introduces the set of functions that are disabled after PHP turns on safe mode in safe mode, including the content of safe mode in which word cannot be opened. I hope it will be helpful to friends who are interested in PHP tutorials.