Sophie

Sophie

distrib > Mandriva > 2008.1 > x86_64 > by-pkgid > 05cd670d8a02b2b4a0ffb1756f2e8308 > files > 6207

php-manual-zh-5.2.4-1mdv2008.1.noarch.rpm

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML
><HEAD
><TITLE
>exec</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.79"><LINK
REL="HOME"
TITLE="PHP 手册"
HREF="index.html"><LINK
REL="UP"
TITLE="Program Execution Functions"
HREF="ref.exec.html"><LINK
REL="PREVIOUS"
TITLE="escapeshellcmd"
HREF="function.escapeshellcmd.html"><LINK
REL="NEXT"
TITLE="passthru"
HREF="function.passthru.html"><META
HTTP-EQUIV="Content-type"
CONTENT="text/html; charset=UTF-8"></HEAD
><BODY
CLASS="refentry"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
SUMMARY="Header navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>PHP 手册</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="function.escapeshellcmd.html"
ACCESSKEY="P"
>上一页</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
></TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="function.passthru.html"
ACCESSKEY="N"
>下一页</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><H1
><A
NAME="function.exec"
></A
>exec</H1
><DIV
CLASS="refnamediv"
><A
NAME="AEN188865"
></A
><P
>    (PHP 3, PHP 4, PHP 5)</P
>exec&nbsp;--&nbsp;Execute an external program</DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188868"
></A
><H2
>说明</H2
>string <B
CLASS="methodname"
>exec</B
> ( string command [, array &#38;output [, int &#38;return_var]] )<BR
></BR
><P
>&#13;   <B
CLASS="function"
>exec()</B
> executes the given
   <CODE
CLASS="parameter"
>command</CODE
>.
  </P
></DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188885"
></A
><H2
>参数</H2
><P
>&#13;   <P
></P
><DIV
CLASS="variablelist"
><DL
><DT
><CODE
CLASS="parameter"
>command</CODE
></DT
><DD
><P
>&#13;       The command that will be executed.
      </P
></DD
><DT
><CODE
CLASS="parameter"
>output</CODE
></DT
><DD
><P
>&#13;       If the <CODE
CLASS="parameter"
>output</CODE
> argument is present, then the
       specified array will be filled with every line of output from the
       command.  Trailing whitespace, such as <TT
CLASS="literal"
>\n</TT
>, is not
       included in this array.  Note that if the array already contains some
       elements, <B
CLASS="function"
>exec()</B
> will append to the end of the array.
       If you do not want the function to append elements, call
       <A
HREF="function.unset.html"
><B
CLASS="function"
>unset()</B
></A
> on the array before passing it to
       <B
CLASS="function"
>exec()</B
>.
      </P
></DD
><DT
><CODE
CLASS="parameter"
>return_var</CODE
></DT
><DD
><P
>&#13;       If the <CODE
CLASS="parameter"
>return_var</CODE
> argument is present
       along with the <CODE
CLASS="parameter"
>output</CODE
> argument, then the
       return status of the executed command will be written to this
       variable.
      </P
></DD
></DL
></DIV
>
  </P
></DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188911"
></A
><H2
>返回值</H2
><P
>&#13;   The last line from the result of the command.  If you need to execute a 
   command and have all the data from the command passed directly back without 
   any interference, use the <A
HREF="function.passthru.html"
><B
CLASS="function"
>passthru()</B
></A
> function.
  </P
><P
>&#13;   To get the output of the executed command, be sure to set and use the
   <CODE
CLASS="parameter"
>output</CODE
> parameter.
  </P
></DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188917"
></A
><H2
>范例</H2
><P
>&#13;   <TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
CLASS="EXAMPLE"
><TR
><TD
><DIV
CLASS="example"
><A
NAME="AEN188920"
></A
><P
><B
>例 1. An <B
CLASS="function"
>exec()</B
> example</B
></P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
CELLPADDING="5"
><TR
><TD
><code><font color="#000000">
<font color="#0000BB">&lt;?php<br /></font><font color="#FF8000">// outputs the username that owns the running php/httpd process<br />// (on a system with the "whoami" executable in the path)<br /></font><font color="#007700">echo </font><font color="#0000BB">exec</font><font color="#007700">(</font><font color="#DD0000">'whoami'</font><font color="#007700">);<br /></font><font color="#0000BB">?&gt;</font>
</font>
</code></TD
></TR
></TABLE
></DIV
></TD
></TR
></TABLE
>
  </P
></DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188924"
></A
><H2
>注释</H2
><DIV
CLASS="warning"
><P
></P
><TABLE
CLASS="warning"
BORDER="1"
WIDTH="100%"
><TR
><TD
ALIGN="CENTER"
><B
>警告</B
></TD
></TR
><TR
><TD
ALIGN="LEFT"
><P
>如果想允许用户输入的数据被传入本函数,则应使用
<A
HREF="function.escapeshellarg.html"
><B
CLASS="function"
>escapeshellarg()</B
></A
> 或 <A
HREF="function.escapeshellcmd.html"
><B
CLASS="function"
>escapeshellcmd()</B
></A
>
函数来确保用户不能欺骗系统从而执行任意命令。</P
></TD
></TR
></TABLE
></DIV
><DIV
CLASS="note"
><BLOCKQUOTE
CLASS="note"
><P
><B
>注意: </B
>如果用本函数启动一个程序并希望保持在后台运行,必须确保该程序的输出被重定向到一个文件或者其它输出流去,否则
PHP 会在程序执行结束前挂起。</P
></BLOCKQUOTE
></DIV
><DIV
CLASS="note"
><BLOCKQUOTE
CLASS="note"
><P
><B
>注意: </B
>在打开了<A
HREF="features.safe-mode.html"
>安全模式</A
>时,只能执行在
<A
HREF="features.safe-mode.html#ini.safe-mode-exec-dir"
>safe_mode_exec_dir</A
>
之内的程序。为实用起见目前不能在指向程序的路径中包含
<TT
CLASS="literal"
>..</TT
> 成分。</P
></BLOCKQUOTE
></DIV
><DIV
CLASS="warning"
><P
></P
><TABLE
CLASS="warning"
BORDER="1"
WIDTH="100%"
><TR
><TD
ALIGN="CENTER"
><B
>警告</B
></TD
></TR
><TR
><TD
ALIGN="LEFT"
><P
>在打开了<A
HREF="features.safe-mode.html"
>安全模式</A
>时,命令字符串会被 <A
HREF="function.escapeshellcmd.html"
><B
CLASS="function"
>escapeshellcmd()</B
></A
>
转义。从而 <TT
CLASS="literal"
>echo y | echo x</TT
> 就成了 <TT
CLASS="literal"
>echo "y | echo x"</TT
>。</P
></TD
></TR
></TABLE
></DIV
></DIV
><DIV
CLASS="refsect1"
><A
NAME="AEN188943"
></A
><H2
>参见</H2
><P
>&#13;   <P
></P
><TABLE
BORDER="0"
><TBODY
><TR
><TD
><A
HREF="function.system.html"
><B
CLASS="function"
>system()</B
></A
></TD
></TR
><TR
><TD
><A
HREF="function.passthru.html"
><B
CLASS="function"
>passthru()</B
></A
></TD
></TR
><TR
><TD
><A
HREF="function.escapeshellcmd.html"
><B
CLASS="function"
>escapeshellcmd()</B
></A
></TD
></TR
><TR
><TD
><A
HREF="function.pcntl-exec.html"
><B
CLASS="function"
>pcntl_exec()</B
></A
></TD
></TR
><TR
><TD
><A
HREF="language.operators.execution.html"
>backtick operator</A
></TD
></TR
></TBODY
></TABLE
><P
></P
>
  </P
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="function.escapeshellcmd.html"
ACCESSKEY="P"
>上一页</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
ACCESSKEY="H"
>起始页</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="function.passthru.html"
ACCESSKEY="N"
>下一页</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>escapeshellcmd</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="ref.exec.html"
ACCESSKEY="U"
>上一级</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>passthru</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>