php--functions that are restricted or shielded by Safe mode

Source: Internet
Author: User
Safe Mode restricted functions Daquan

Dbmopen: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Dbase_open: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Filepro: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Filepro_rowcount: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Filepro_retrieve: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

ifx_* Sql_safe_mode limit, (! = Safe Mode)

ingres_* Sql_safe_mode limit, (! = Safe Mode)

mysql_* Sql_safe_mode limit, (! = Safe Mode)

Pg_loimport: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Posix_mkfifo: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

Putenv: Follow the Safe_mode_protected_env_vars and Safe_mode_allowed_env_vars options for INI settings. Please refer to the documentation for the putenv () function.

Move_uploaded_file: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

ChDir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

DL: This function cannot be used when PHP is running in safe mode.

Backtick operator This function cannot be used when PHP is running in safe mode.

Shell_exec: (Functionally and backticks functions are the same) This function cannot be used when PHP is running in safe mode.

EXEC: can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time. Escapeshellcmd () will be applied to the parameters of this function.

System: The operation can only be performed under the directory set by the Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.

Escapeshellcmd: The parameter that will be applied to this function.

PassThru: The operation can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.

Escapeshellcmd: The parameter that will be applied to this function.

Popen: The operation can only be performed under the directory set by Safe_mode_exec_dir. For some reason, it cannot be used in the path of an executable object at this time.

Escapeshellcmd: The parameter that will be applied to this function.

Fopen: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

mkdir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

RmDir: Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

Rename: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

Unlink: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

Copy: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (on source and target)

CHGRP: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

Chown: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed.

chmod: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Also, you cannot set SUID, SGID, and sticky bits
Touch () checks if the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

Symlink: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note: test target only)

Link: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note: test target only),

Apache_request_headers: In Safe mode, headers that start with "authorization" (case-sensitive) will not be returned. 、

Header: In Safe mode, if Www-authenticate is set, the UID of the current script is added to the realm portion of the header.

Php_auth variables in safe mode, variables Php_auth_user, PHP_AUTH_PW, and Php_auth_type are not available in $_server. However, you can still use Remote_user to get the user name. (Note: PHP 4.3.0 only works later)

Highlight_file, Show_source: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note that only valid after 4.2.1 version)

Parse_ini_file: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed. (Note that only valid after 4.2.1 version)

Set_time_limit: does not work in safe mode.

Max_execution_time does not work in safe mode.

Mail: In Safe mode, the fifth parameter is masked. (note, only from PHP 4.2.3 affected)

Session_Start: Checks whether the file or directory being manipulated has the same UID (owner) as the script being executed. Checks whether the directory being manipulated has the same UID (owner) as the script being executed.

  • Contact Us

    The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

    If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

    A Free Trial That Lets You Build Big!

    Start building with 50+ products and up to 12 months usage for Elastic Compute Service

    • Sales Support

      1 on 1 presale consultation

    • After-Sales Support

      24/7 Technical Support 6 Free Tickets per Quarter Faster Response

    • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.