Safe Mode restricted functions Daquan
Dbmopen: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Dbase_open: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Filepro: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Filepro_rowcount: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Filepro_retrieve: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
ifx_* Sql_safe_mode limit, (! = Safe Mode)
ingres_* Sql_safe_mode limit, (! = Safe Mode)
mysql_* Sql_safe_mode limit, (! = Safe Mode)
Pg_loimport: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Posix_mkfifo: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
Putenv: Follow the Safe_mode_protected_env_vars and Safe_mode_allowed_env_vars options for INI settings. Please refer to the documentation for the putenv () function.
Move_uploaded_file: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
ChDir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
DL: This function cannot be used when PHP is running in safe mode.
Backtick operator This function cannot be used when PHP is running in safe mode.
Shell_exec: (Functionally and backticks functions are the same) This function cannot be used when PHP is running in safe mode.
EXEC: can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time. Escapeshellcmd () will be applied to the parameters of this function.
System: The operation can only be performed under the directory set by the Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.
Escapeshellcmd: The parameter that will be applied to this function.
PassThru: The operation can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.
Escapeshellcmd: The parameter that will be applied to this function.
Popen: The operation can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.
Escapeshellcmd: The parameter that will be applied to this function.
Fopen: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
mkdir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
RmDir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
Rename: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
Unlink: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
Copy: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (on source and target)
CHGRP: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
Chown: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.
chmod: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Also, you cannot set SUID, SGID, and sticky bits
Touch () checks if the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.
Symlink: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note: test target only)
Link: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note: test target only),
Apache_request_headers: In Safe mode, headers that start with "authorization" (case-sensitive) will not be returned. 、
Header: In Safe mode, if Www-authenticate is set, the UID of the current script is added to the realm portion of the header.
Php_auth variables in safe mode, variables Php_auth_user, PHP_AUTH_PW, and Php_auth_type are not available in $_server. However, you can still use Remote_user to get the user name. (Note: PHP 4.3.0 only works later)
Highlight_file, Show_source: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note that only valid after 4.2.1 version)
Parse_ini_file: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note that only valid after 4.2.1 version)
Set_time_limit: does not work in safe mode.
Max_execution_time does not work in safe mode.
Mail: In Safe mode, the fifth parameter is masked. (note, only from PHP 4.2.3 affected)
Session_Start: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.