reference/exec/book.xml
1634a886415d0ab4df195fe49d18a1c150b70758
...
...
@@ -1,9 +1,8 @@
1
1
<?xml version="1.0" encoding="utf-8"?>
2
2
<!-- $Revision$ -->
3
-
<!-- Purpose: fileprocess.process -->
4
-
<!-- Membership: core -->
5
3
6
4
<book xml:id="book.exec" xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink">
5
+
<?phpdoc extension-membership="core" ?>
7
6
<title>System program execution</title>
8
7
<titleabbrev>Program execution</titleabbrev>
9
8
...
...
@@ -14,6 +13,15 @@
14
13
Those functions provide means to execute commands on the
15
14
system itself, and means to secure such commands.
16
15
</para>
16
+
<note>
17
+
<para>
18
+
All execution functions call the commands through
19
+
<literal>cmd.exe</literal> under Windows. Therefore the user calling these
20
+
functions needs appropriate privilege to run this command. The only
21
+
exception is <function>proc_open</function> with
22
+
<literal>bypass_shell</literal> option.
23
+
</para>
24
+
</note>
17
25
</preface>
18
26
<!-- }}} -->
19
27
20
28