blob: 268f0b8fe6a5a5df67e568f540af6195b864ba1d [file] [log] [blame]
Georg Brandl116aa622007-08-15 14:28:22 +00001:mod:`subprocess` --- Subprocess management
2===========================================
3
4.. module:: subprocess
5 :synopsis: Subprocess management.
6.. moduleauthor:: Peter Åstrand <astrand@lysator.liu.se>
7.. sectionauthor:: Peter Åstrand <astrand@lysator.liu.se>
8
9
Georg Brandl116aa622007-08-15 14:28:22 +000010The :mod:`subprocess` module allows you to spawn new processes, connect to their
11input/output/error pipes, and obtain their return codes. This module intends to
12replace several other, older modules and functions, such as::
13
14 os.system
15 os.spawn*
Georg Brandl116aa622007-08-15 14:28:22 +000016
17Information about how the :mod:`subprocess` module can be used to replace these
18modules and functions can be found in the following sections.
19
Benjamin Peterson41181742008-07-02 20:22:54 +000020.. seealso::
21
22 :pep:`324` -- PEP proposing the subprocess module
23
Georg Brandl116aa622007-08-15 14:28:22 +000024
25Using the subprocess Module
26---------------------------
27
Nick Coghlanc29248f2011-11-08 20:49:23 +100028The recommended approach to invoking subprocesses is to use the following
29convenience functions for all use cases they can handle. For more advanced
30use cases, the underlying :class:`Popen` interface can be used directly.
31
32
33.. function:: call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
34
35 Run the command described by *args*. Wait for command to complete, then
36 return the :attr:`returncode` attribute.
37
38 The arguments shown above are merely the most common ones, described below
39 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
40 the abbreviated signature). The full function signature is the same as
41 that of the :class:`Popen` constructor - this functions passes all
42 supplied arguments directly through to that interface.
43
44 Examples::
45
46 >>> subprocess.call(["ls", "-l"])
47 0
48
49 >>> subprocess.call("exit 1", shell=True)
50 1
51
52 .. warning::
53
54 Invoking the system shell with ``shell=True`` can be a security hazard
55 if combined with untrusted input. See the warning under
56 :ref:`frequently-used-arguments` for details.
57
58 .. note::
59
60 Do not use ``stdout=PIPE`` or ``stderr=PIPE`` with this function. As
61 the pipes are not being read in the current process, the child
62 process may block if it generates enough output to a pipe to fill up
63 the OS pipe buffer.
64
65
66.. function:: check_call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
67
68 Run command with arguments. Wait for command to complete. If the return
69 code was zero then return, otherwise raise :exc:`CalledProcessError`. The
70 :exc:`CalledProcessError` object will have the return code in the
71 :attr:`returncode` attribute.
72
73 The arguments shown above are merely the most common ones, described below
74 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
75 the abbreviated signature). The full function signature is the same as
76 that of the :class:`Popen` constructor - this functions passes all
77 supplied arguments directly through to that interface.
78
79 Examples::
80
81 >>> subprocess.check_call(["ls", "-l"])
82 0
83
84 >>> subprocess.check_call("exit 1", shell=True)
85 Traceback (most recent call last):
86 ...
87 subprocess.CalledProcessError: Command 'exit 1' returned non-zero exit status 1
88
89 .. versionadded:: 2.5
90
91 .. warning::
92
93 Invoking the system shell with ``shell=True`` can be a security hazard
94 if combined with untrusted input. See the warning under
95 :ref:`frequently-used-arguments` for details.
96
97 .. note::
98
99 Do not use ``stdout=PIPE`` or ``stderr=PIPE`` with this function. As
100 the pipes are not being read in the current process, the child
101 process may block if it generates enough output to a pipe to fill up
102 the OS pipe buffer.
103
104
105.. function:: check_output(args, *, stdin=None, stderr=None, shell=False, universal_newlines=False)
106
107 Run command with arguments and return its output as a byte string.
108
109 If the return code was non-zero it raises a :exc:`CalledProcessError`. The
110 :exc:`CalledProcessError` object will have the return code in the
111 :attr:`returncode` attribute and any output in the :attr:`output`
112 attribute.
113
114 The arguments shown above are merely the most common ones, described below
115 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
116 the abbreviated signature). The full function signature is largely the
117 same as that of the :class:`Popen` constructor, except that *stdout* is
118 not permitted as it is used internally. All other supplied arguments are
119 passed directly through to the :class:`Popen` constructor.
120
121 Examples::
122
123 >>> subprocess.check_output(["echo", "Hello World!"])
124 b'Hello World!\n'
125
126 >>> subprocess.check_output(["echo", "Hello World!"], universal_newlines=True)
127 'Hello World!\n'
128
129 >>> subprocess.check_output("exit 1", shell=True)
130 Traceback (most recent call last):
131 ...
132 subprocess.CalledProcessError: Command 'exit 1' returned non-zero exit status 1
133
134 By default, this function will return the data as encoded bytes. The actual
135 encoding of the output data may depend on the command being invoked, so the
136 decoding to text will often need to be handled at the application level.
137
138 This behaviour may be overridden by setting *universal_newlines* to
Andrew Svetlov50be4522012-08-13 22:09:04 +0300139 ``True`` as described below in :ref:`frequently-used-arguments`.
Nick Coghlanc29248f2011-11-08 20:49:23 +1000140
141 To also capture standard error in the result, use
142 ``stderr=subprocess.STDOUT``::
143
144 >>> subprocess.check_output(
145 ... "ls non_existent_file; exit 0",
146 ... stderr=subprocess.STDOUT,
147 ... shell=True)
148 'ls: non_existent_file: No such file or directory\n'
149
150 .. versionadded:: 2.7
151
152 .. warning::
153
154 Invoking the system shell with ``shell=True`` can be a security hazard
155 if combined with untrusted input. See the warning under
156 :ref:`frequently-used-arguments` for details.
157
158 .. note::
159
160 Do not use ``stderr=PIPE`` with this function. As the pipe is not being
161 read in the current process, the child process may block if it
162 generates enough output to the pipe to fill up the OS pipe buffer.
163
164
165.. data:: PIPE
166
167 Special value that can be used as the *stdin*, *stdout* or *stderr* argument
168 to :class:`Popen` and indicates that a pipe to the standard stream should be
169 opened.
170
171
172.. data:: STDOUT
173
174 Special value that can be used as the *stderr* argument to :class:`Popen` and
175 indicates that standard error should go into the same handle as standard
176 output.
177
178
Andrew Svetloveec64202012-08-09 15:20:45 +0300179.. exception:: CalledProcessError
180
181 Exception raised when a process run by :func:`check_call` or
182 :func:`check_output` returns a non-zero exit status.
183
184 .. attribute:: returncode
185
186 Exit status of the child process.
187
188 .. attribute:: cmd
189
190 Command that was used to spawn the child process.
191
192 .. attribute:: output
193
194 Output of the child process if this exception is raised by
195 :func:`check_output`. Otherwise, ``None``.
196
197
198
Nick Coghlanc29248f2011-11-08 20:49:23 +1000199.. _frequently-used-arguments:
200
201Frequently Used Arguments
202^^^^^^^^^^^^^^^^^^^^^^^^^
203
204To support a wide variety of use cases, the :class:`Popen` constructor (and
205the convenience functions) accept a large number of optional arguments. For
206most typical use cases, many of these arguments can be safely left at their
207default values. The arguments that are most commonly needed are:
208
209 *args* is required for all calls and should be a string, or a sequence of
210 program arguments. Providing a sequence of arguments is generally
211 preferred, as it allows the module to take care of any required escaping
212 and quoting of arguments (e.g. to permit spaces in file names). If passing
213 a single string, either *shell* must be :const:`True` (see below) or else
214 the string must simply name the program to be executed without specifying
215 any arguments.
216
217 *stdin*, *stdout* and *stderr* specify the executed program's standard input,
218 standard output and standard error file handles, respectively. Valid values
219 are :data:`PIPE`, an existing file descriptor (a positive integer), an
220 existing file object, and ``None``. :data:`PIPE` indicates that a new pipe
221 to the child should be created. With the default settings of ``None``, no
222 redirection will occur; the child's file handles will be inherited from the
223 parent. Additionally, *stderr* can be :data:`STDOUT`, which indicates that
224 the stderr data from the child process should be captured into the same file
225 handle as for stdout.
226
R David Murray1b00f252012-08-15 10:43:58 -0400227 .. index::
228 single: universal newlines; subprocess module
229
Andrew Svetlov50be4522012-08-13 22:09:04 +0300230 If *universal_newlines* is ``True``, the file objects *stdin*, *stdout*
R David Murray1b00f252012-08-15 10:43:58 -0400231 and *stderr* will be opened as text streams in :term:`universal newlines`
232 mode using the encoding returned by :func:`locale.getpreferredencoding`.
Andrew Svetlov50be4522012-08-13 22:09:04 +0300233 For *stdin*, line ending characters ``'\n'`` in the input will be converted
234 to the default line separator :data:`os.linesep`. For *stdout* and
235 *stderr*, all line endings in the output will be converted to ``'\n'``.
236 For more information see the documentation of the :class:`io.TextIOWrapper`
237 class when the *newline* argument to its constructor is ``None``.
Nick Coghlanc29248f2011-11-08 20:49:23 +1000238
Andrew Svetlov50be4522012-08-13 22:09:04 +0300239 .. note::
240
241 The *universal_newlines* feature is supported only if Python is built
242 with universal newline support (the default). Also, the newlines
243 attribute of the file objects :attr:`Popen.stdin`, :attr:`Popen.stdout`
244 and :attr:`Popen.stderr` are not updated by the
245 :meth:`Popen.communicate` method.
246
247 If *shell* is ``True``, the specified command will be executed through
Ezio Melotti186d5232012-09-15 08:34:08 +0300248 the shell. This can be useful if you are using Python primarily for the
Nick Coghlanc29248f2011-11-08 20:49:23 +1000249 enhanced control flow it offers over most system shells and still want
Ezio Melotti186d5232012-09-15 08:34:08 +0300250 convenient access to other shell features such as shell pipes, filename
251 wildcards, environment variable expansion, and expansion of ``~`` to a
252 user's home directory. However, note that Python itself offers
253 implementations of many shell-like features (in particular, :mod:`glob`,
254 :mod:`fnmatch`, :func:`os.walk`, :func:`os.path.expandvars`,
255 :func:`os.path.expanduser`, and :mod:`shutil`).
Nick Coghlanc29248f2011-11-08 20:49:23 +1000256
257 .. warning::
258
259 Executing shell commands that incorporate unsanitized input from an
260 untrusted source makes a program vulnerable to `shell injection
261 <http://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_,
262 a serious security flaw which can result in arbitrary command execution.
263 For this reason, the use of *shell=True* is **strongly discouraged** in cases
264 where the command string is constructed from external input::
265
266 >>> from subprocess import call
267 >>> filename = input("What file would you like to display?\n")
268 What file would you like to display?
269 non_existent; rm -rf / #
270 >>> call("cat " + filename, shell=True) # Uh-oh. This will end badly...
271
272 ``shell=False`` disables all shell based features, but does not suffer
273 from this vulnerability; see the Note in the :class:`Popen` constructor
274 documentation for helpful hints in getting ``shell=False`` to work.
275
276These options, along with all of the other options, are described in more
277detail in the :class:`Popen` constructor documentation.
278
279
Sandro Tosi1526ad12011-12-25 11:27:37 +0100280Popen Constructor
Sandro Tosi3e6c8142011-12-25 17:14:11 +0100281^^^^^^^^^^^^^^^^^
Nick Coghlanc29248f2011-11-08 20:49:23 +1000282
283The underlying process creation and management in this module is handled by
284the :class:`Popen` class. It offers a lot of flexibility so that developers
285are able to handle the less common cases not covered by the convenience
286functions.
Georg Brandl116aa622007-08-15 14:28:22 +0000287
288
Gregory P. Smith8edd99d2010-12-14 13:43:30 +0000289.. class:: Popen(args, bufsize=0, executable=None, stdin=None, stdout=None, stderr=None, preexec_fn=None, close_fds=True, shell=False, cwd=None, env=None, universal_newlines=False, startupinfo=None, creationflags=0, restore_signals=True, start_new_session=False, pass_fds=())
Georg Brandl116aa622007-08-15 14:28:22 +0000290
291 Arguments are:
292
Chris Jerdonek470ee392012-10-08 23:06:57 -0700293 *args* should be a sequence of program arguments or else a single string.
294 By default, the program to execute is the first item in *args* if *args* is
295 a sequence and the string itself if *args* is a string. However, see the
296 *shell* and *executable* arguments for differences from this behavior.
Georg Brandl116aa622007-08-15 14:28:22 +0000297
Chris Jerdonek470ee392012-10-08 23:06:57 -0700298 On Unix, the :class:`Popen` class uses :meth:`os.execvp`-like behavior to
299 execute the child program. If *args* is a string, the string is
300 interpreted as the name or path of the program to execute; this only works
301 if the program is being given no arguments.
Georg Brandl116aa622007-08-15 14:28:22 +0000302
R. David Murray5973e4d2010-02-04 16:41:57 +0000303 .. note::
304
305 :meth:`shlex.split` can be useful when determining the correct
306 tokenization for *args*, especially in complex cases::
307
308 >>> import shlex, subprocess
R. David Murray73bc75b2010-02-05 16:25:12 +0000309 >>> command_line = input()
R. David Murray5973e4d2010-02-04 16:41:57 +0000310 /bin/vikings -input eggs.txt -output "spam spam.txt" -cmd "echo '$MONEY'"
311 >>> args = shlex.split(command_line)
312 >>> print(args)
313 ['/bin/vikings', '-input', 'eggs.txt', '-output', 'spam spam.txt', '-cmd', "echo '$MONEY'"]
314 >>> p = subprocess.Popen(args) # Success!
315
316 Note in particular that options (such as *-input*) and arguments (such
317 as *eggs.txt*) that are separated by whitespace in the shell go in separate
318 list elements, while arguments that need quoting or backslash escaping when
319 used in the shell (such as filenames containing spaces or the *echo* command
320 shown above) are single list elements.
321
Chris Jerdonek470ee392012-10-08 23:06:57 -0700322 On Windows, the :class:`Popen` class uses ``CreateProcess()`` to
323 execute the child program, which operates on strings. If *args* is a
324 sequence, it will be converted to a string in a manner described in
325 :ref:`converting-argument-sequence`.
326
327 The *shell* argument (which defaults to *False*) specifies whether to use
328 the shell as the program to execute. It is recommended to pass *args* as a
329 sequence if *shell* is *False* and as a string if *shell* is *True*.
330
331 On Unix with ``shell=True``, the shell defaults to :file:`/bin/sh`. If
332 *args* is a string, the string specifies the command
333 to execute through the shell. This means that the string must be
R. David Murray5973e4d2010-02-04 16:41:57 +0000334 formatted exactly as it would be when typed at the shell prompt. This
335 includes, for example, quoting or backslash escaping filenames with spaces in
336 them. If *args* is a sequence, the first item specifies the command string, and
337 any additional items will be treated as additional arguments to the shell
Chris Jerdonek470ee392012-10-08 23:06:57 -0700338 itself. That is to say, :class:`Popen` does the equivalent of::
R. David Murray5973e4d2010-02-04 16:41:57 +0000339
340 Popen(['/bin/sh', '-c', args[0], args[1], ...])
Georg Brandl116aa622007-08-15 14:28:22 +0000341
R. David Murrayc7399d02010-11-12 00:35:31 +0000342 .. warning::
343
Nick Coghlanc29248f2011-11-08 20:49:23 +1000344 Enabling this option can be a security hazard if combined with untrusted
345 input. See the warning under :ref:`frequently-used-arguments`
346 for details.
R. David Murrayc7399d02010-11-12 00:35:31 +0000347
Chris Jerdonek470ee392012-10-08 23:06:57 -0700348 On Windows with ``shell=True``, the :envvar:`COMSPEC` environment variable
349 specifies the default shell. The only time you need to specify
350 ``shell=True`` on Windows is when the command you wish to execute is built
351 into the shell (e.g. :command:`dir` or :command:`copy`). You do not need
352 ``shell=True`` to run a batch file or console-based executable.
Georg Brandl116aa622007-08-15 14:28:22 +0000353
354 *bufsize*, if given, has the same meaning as the corresponding argument to the
355 built-in open() function: :const:`0` means unbuffered, :const:`1` means line
356 buffered, any other positive value means use a buffer of (approximately) that
357 size. A negative *bufsize* means to use the system default, which usually means
358 fully buffered. The default value for *bufsize* is :const:`0` (unbuffered).
359
Antoine Pitrou4b876202010-06-02 17:10:49 +0000360 .. note::
361
362 If you experience performance issues, it is recommended that you try to
363 enable buffering by setting *bufsize* to either -1 or a large enough
364 positive value (such as 4096).
365
Chris Jerdonek470ee392012-10-08 23:06:57 -0700366 The *executable* argument specifies a replacement program to execute. It
367 is very seldom needed. When ``shell=False``, *executable* replaces the
368 program to execute specified by *args*. However, the *args* program is
369 still treated by most programs as the command name, which can then be
370 different from the program actually executed. On Unix, the *args* name
371 becomes the display name for the executable in utilities such as
372 :program:`ps`. If ``shell=True``, on Unix the *executable* argument
373 specifies a replacement shell for the default :file:`/bin/sh`.
Georg Brandl116aa622007-08-15 14:28:22 +0000374
Nick Coghlanc29248f2011-11-08 20:49:23 +1000375 *stdin*, *stdout* and *stderr* specify the executed program's standard input,
Georg Brandlaf265f42008-12-07 15:06:20 +0000376 standard output and standard error file handles, respectively. Valid values
377 are :data:`PIPE`, an existing file descriptor (a positive integer), an
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000378 existing :term:`file object`, and ``None``. :data:`PIPE` indicates that a
Nick Coghlanc29248f2011-11-08 20:49:23 +1000379 new pipe to the child should be created. With the default settings of
380 ``None``, no redirection will occur; the child's file handles will be
381 inherited from the parent. Additionally, *stderr* can be :data:`STDOUT`,
382 which indicates that the stderr data from the applications should be
383 captured into the same file handle as for stdout.
Georg Brandl116aa622007-08-15 14:28:22 +0000384
385 If *preexec_fn* is set to a callable object, this object will be called in the
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000386 child process just before the child is executed.
387 (Unix only)
388
389 .. warning::
390
391 The *preexec_fn* parameter is not safe to use in the presence of threads
392 in your application. The child process could deadlock before exec is
393 called.
394 If you must use it, keep it trivial! Minimize the number of libraries
395 you call into.
396
397 .. note::
398
399 If you need to modify the environment for the child use the *env*
400 parameter rather than doing it in a *preexec_fn*.
401 The *start_new_session* parameter can take the place of a previously
402 common use of *preexec_fn* to call os.setsid() in the child.
Georg Brandl116aa622007-08-15 14:28:22 +0000403
404 If *close_fds* is true, all file descriptors except :const:`0`, :const:`1` and
405 :const:`2` will be closed before the child process is executed. (Unix only).
Gregory P. Smith8edd99d2010-12-14 13:43:30 +0000406 The default varies by platform: Always true on Unix. On Windows it is
407 true when *stdin*/*stdout*/*stderr* are :const:`None`, false otherwise.
Gregory P. Smithd23047b2010-12-04 09:10:44 +0000408 On Windows, if *close_fds* is true then no handles will be inherited by the
Georg Brandl116aa622007-08-15 14:28:22 +0000409 child process. Note that on Windows, you cannot set *close_fds* to true and
410 also redirect the standard handles by setting *stdin*, *stdout* or *stderr*.
411
Gregory P. Smith8edd99d2010-12-14 13:43:30 +0000412 .. versionchanged:: 3.2
413 The default for *close_fds* was changed from :const:`False` to
414 what is described above.
415
416 *pass_fds* is an optional sequence of file descriptors to keep open
417 between the parent and child. Providing any *pass_fds* forces
418 *close_fds* to be :const:`True`. (Unix only)
419
420 .. versionadded:: 3.2
421 The *pass_fds* parameter was added.
Georg Brandl116aa622007-08-15 14:28:22 +0000422
Chris Jerdonekec3ea942012-09-30 00:10:28 -0700423 If *cwd* is not ``None``, the function changes the working directory to
424 *cwd* before executing the child. In particular, the function looks for
425 *executable* (or for the first item in *args*) relative to *cwd* if the
426 executable path is a relative path.
Georg Brandl116aa622007-08-15 14:28:22 +0000427
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000428 If *restore_signals* is True (the default) all signals that Python has set to
429 SIG_IGN are restored to SIG_DFL in the child process before the exec.
430 Currently this includes the SIGPIPE, SIGXFZ and SIGXFSZ signals.
431 (Unix only)
432
433 .. versionchanged:: 3.2
434 *restore_signals* was added.
435
436 If *start_new_session* is True the setsid() system call will be made in the
437 child process prior to the execution of the subprocess. (Unix only)
438
439 .. versionchanged:: 3.2
440 *start_new_session* was added.
441
Christian Heimesa342c012008-04-20 21:01:16 +0000442 If *env* is not ``None``, it must be a mapping that defines the environment
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000443 variables for the new process; these are used instead of the default
444 behavior of inheriting the current process' environment.
Georg Brandl116aa622007-08-15 14:28:22 +0000445
R. David Murray1055e892009-04-16 18:15:32 +0000446 .. note::
R. David Murrayf4ac1492009-04-15 22:35:15 +0000447
Georg Brandl2708f3a2009-12-20 14:38:23 +0000448 If specified, *env* must provide any variables required for the program to
449 execute. On Windows, in order to run a `side-by-side assembly`_ the
450 specified *env* **must** include a valid :envvar:`SystemRoot`.
R. David Murrayf4ac1492009-04-15 22:35:15 +0000451
R. David Murray1055e892009-04-16 18:15:32 +0000452 .. _side-by-side assembly: http://en.wikipedia.org/wiki/Side-by-Side_Assembly
453
Andrew Svetlov50be4522012-08-13 22:09:04 +0300454 If *universal_newlines* is ``True``, the file objects *stdin*, *stdout*
R David Murray1b00f252012-08-15 10:43:58 -0400455 and *stderr* are opened as text streams in universal newlines mode, as
Andrew Svetlov50be4522012-08-13 22:09:04 +0300456 described above in :ref:`frequently-used-arguments`.
Georg Brandl116aa622007-08-15 14:28:22 +0000457
Brian Curtine6242d72011-04-29 22:17:51 -0500458 If given, *startupinfo* will be a :class:`STARTUPINFO` object, which is
459 passed to the underlying ``CreateProcess`` function.
Brian Curtin30401932011-04-29 22:20:57 -0500460 *creationflags*, if given, can be :data:`CREATE_NEW_CONSOLE` or
461 :data:`CREATE_NEW_PROCESS_GROUP`. (Windows only)
Georg Brandl116aa622007-08-15 14:28:22 +0000462
Gregory P. Smithc9557af2011-05-11 22:18:23 -0700463 Popen objects are supported as context managers via the :keyword:`with` statement:
464 on exit, standard file descriptors are closed, and the process is waited for.
Brian Curtin79cdb662010-12-03 02:46:02 +0000465 ::
466
467 with Popen(["ifconfig"], stdout=PIPE) as proc:
468 log.write(proc.stdout.read())
469
470 .. versionchanged:: 3.2
471 Added context manager support.
472
Georg Brandl116aa622007-08-15 14:28:22 +0000473
Georg Brandl116aa622007-08-15 14:28:22 +0000474Exceptions
475^^^^^^^^^^
476
477Exceptions raised in the child process, before the new program has started to
478execute, will be re-raised in the parent. Additionally, the exception object
479will have one extra attribute called :attr:`child_traceback`, which is a string
Georg Brandl81675612010-08-26 14:30:56 +0000480containing traceback information from the child's point of view.
Georg Brandl116aa622007-08-15 14:28:22 +0000481
482The most common exception raised is :exc:`OSError`. This occurs, for example,
483when trying to execute a non-existent file. Applications should prepare for
484:exc:`OSError` exceptions.
485
486A :exc:`ValueError` will be raised if :class:`Popen` is called with invalid
487arguments.
488
Nick Coghlanc29248f2011-11-08 20:49:23 +1000489:func:`check_call` and :func:`check_output` will raise
490:exc:`CalledProcessError` if the called process returns a non-zero return
491code.
Georg Brandl116aa622007-08-15 14:28:22 +0000492
493
494Security
495^^^^^^^^
496
Nick Coghlanc29248f2011-11-08 20:49:23 +1000497Unlike some other popen functions, this implementation will never call a
498system shell implicitly. This means that all characters, including shell
499metacharacters, can safely be passed to child processes. Obviously, if the
500shell is invoked explicitly, then it is the application's responsibility to
501ensure that all whitespace and metacharacters are quoted appropriately.
Georg Brandl116aa622007-08-15 14:28:22 +0000502
503
504Popen Objects
505-------------
506
507Instances of the :class:`Popen` class have the following methods:
508
509
510.. method:: Popen.poll()
511
Christian Heimes7f044312008-01-06 17:05:40 +0000512 Check if child process has terminated. Set and return :attr:`returncode`
513 attribute.
Georg Brandl116aa622007-08-15 14:28:22 +0000514
515
516.. method:: Popen.wait()
517
Christian Heimes7f044312008-01-06 17:05:40 +0000518 Wait for child process to terminate. Set and return :attr:`returncode`
519 attribute.
Georg Brandl116aa622007-08-15 14:28:22 +0000520
Georg Brandl734e2682008-08-12 08:18:18 +0000521 .. warning::
522
Philip Jenveyb0896842009-12-03 02:29:36 +0000523 This will deadlock when using ``stdout=PIPE`` and/or
524 ``stderr=PIPE`` and the child process generates enough output to
525 a pipe such that it blocks waiting for the OS pipe buffer to
526 accept more data. Use :meth:`communicate` to avoid that.
Georg Brandl734e2682008-08-12 08:18:18 +0000527
Georg Brandl116aa622007-08-15 14:28:22 +0000528
529.. method:: Popen.communicate(input=None)
530
531 Interact with process: Send data to stdin. Read data from stdout and stderr,
532 until end-of-file is reached. Wait for process to terminate. The optional
Georg Brandle11787a2008-07-01 19:10:52 +0000533 *input* argument should be a byte string to be sent to the child process, or
Georg Brandl116aa622007-08-15 14:28:22 +0000534 ``None``, if no data should be sent to the child.
535
Georg Brandlaf265f42008-12-07 15:06:20 +0000536 :meth:`communicate` returns a tuple ``(stdoutdata, stderrdata)``.
Georg Brandl116aa622007-08-15 14:28:22 +0000537
Guido van Rossum0d3fb8a2007-11-26 23:23:18 +0000538 Note that if you want to send data to the process's stdin, you need to create
539 the Popen object with ``stdin=PIPE``. Similarly, to get anything other than
540 ``None`` in the result tuple, you need to give ``stdout=PIPE`` and/or
541 ``stderr=PIPE`` too.
542
Christian Heimes7f044312008-01-06 17:05:40 +0000543 .. note::
Georg Brandl116aa622007-08-15 14:28:22 +0000544
Christian Heimes7f044312008-01-06 17:05:40 +0000545 The data read is buffered in memory, so do not use this method if the data
546 size is large or unlimited.
547
Georg Brandl116aa622007-08-15 14:28:22 +0000548
Christian Heimesa342c012008-04-20 21:01:16 +0000549.. method:: Popen.send_signal(signal)
550
551 Sends the signal *signal* to the child.
552
553 .. note::
554
Brian Curtineb24d742010-04-12 17:16:38 +0000555 On Windows, SIGTERM is an alias for :meth:`terminate`. CTRL_C_EVENT and
Senthil Kumaran916bd382010-10-15 12:55:19 +0000556 CTRL_BREAK_EVENT can be sent to processes started with a *creationflags*
Brian Curtineb24d742010-04-12 17:16:38 +0000557 parameter which includes `CREATE_NEW_PROCESS_GROUP`.
Christian Heimesa342c012008-04-20 21:01:16 +0000558
Christian Heimesa342c012008-04-20 21:01:16 +0000559
560.. method:: Popen.terminate()
561
562 Stop the child. On Posix OSs the method sends SIGTERM to the
Georg Brandl60203b42010-10-06 10:11:56 +0000563 child. On Windows the Win32 API function :c:func:`TerminateProcess` is called
Christian Heimesa342c012008-04-20 21:01:16 +0000564 to stop the child.
565
Christian Heimesa342c012008-04-20 21:01:16 +0000566
567.. method:: Popen.kill()
568
569 Kills the child. On Posix OSs the function sends SIGKILL to the child.
570 On Windows :meth:`kill` is an alias for :meth:`terminate`.
571
Christian Heimesa342c012008-04-20 21:01:16 +0000572
Georg Brandl116aa622007-08-15 14:28:22 +0000573The following attributes are also available:
574
Georg Brandl734e2682008-08-12 08:18:18 +0000575.. warning::
576
Ezio Melottiaa935df2012-08-27 10:00:05 +0300577 Use :meth:`~Popen.communicate` rather than :attr:`.stdin.write <Popen.stdin>`,
578 :attr:`.stdout.read <Popen.stdout>` or :attr:`.stderr.read <Popen.stderr>` to avoid
Georg Brandle720c0a2009-04-27 16:20:50 +0000579 deadlocks due to any of the other OS pipe buffers filling up and blocking the
580 child process.
Georg Brandl734e2682008-08-12 08:18:18 +0000581
582
Georg Brandl116aa622007-08-15 14:28:22 +0000583.. attribute:: Popen.stdin
584
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000585 If the *stdin* argument was :data:`PIPE`, this attribute is a :term:`file
586 object` that provides input to the child process. Otherwise, it is ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000587
588
589.. attribute:: Popen.stdout
590
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000591 If the *stdout* argument was :data:`PIPE`, this attribute is a :term:`file
592 object` that provides output from the child process. Otherwise, it is ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000593
594
595.. attribute:: Popen.stderr
596
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000597 If the *stderr* argument was :data:`PIPE`, this attribute is a :term:`file
598 object` that provides error output from the child process. Otherwise, it is
Georg Brandlaf265f42008-12-07 15:06:20 +0000599 ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000600
601
602.. attribute:: Popen.pid
603
604 The process ID of the child process.
605
Georg Brandl58bfdca2010-03-21 09:50:49 +0000606 Note that if you set the *shell* argument to ``True``, this is the process ID
607 of the spawned shell.
608
Georg Brandl116aa622007-08-15 14:28:22 +0000609
610.. attribute:: Popen.returncode
611
Christian Heimes7f044312008-01-06 17:05:40 +0000612 The child return code, set by :meth:`poll` and :meth:`wait` (and indirectly
613 by :meth:`communicate`). A ``None`` value indicates that the process
614 hasn't terminated yet.
Georg Brandl48310cd2009-01-03 21:18:54 +0000615
Christian Heimes7f044312008-01-06 17:05:40 +0000616 A negative value ``-N`` indicates that the child was terminated by signal
617 ``N`` (Unix only).
Georg Brandl116aa622007-08-15 14:28:22 +0000618
619
Brian Curtine6242d72011-04-29 22:17:51 -0500620Windows Popen Helpers
621---------------------
622
623The :class:`STARTUPINFO` class and following constants are only available
624on Windows.
625
626.. class:: STARTUPINFO()
Brian Curtin73365dd2011-04-29 22:18:33 -0500627
Brian Curtine6242d72011-04-29 22:17:51 -0500628 Partial support of the Windows
629 `STARTUPINFO <http://msdn.microsoft.com/en-us/library/ms686331(v=vs.85).aspx>`__
630 structure is used for :class:`Popen` creation.
631
632 .. attribute:: dwFlags
633
Senthil Kumarana6bac952011-07-04 11:28:30 -0700634 A bit field that determines whether certain :class:`STARTUPINFO`
635 attributes are used when the process creates a window. ::
Brian Curtine6242d72011-04-29 22:17:51 -0500636
637 si = subprocess.STARTUPINFO()
638 si.dwFlags = subprocess.STARTF_USESTDHANDLES | subprocess.STARTF_USESHOWWINDOW
639
640 .. attribute:: hStdInput
641
Senthil Kumarana6bac952011-07-04 11:28:30 -0700642 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
643 is the standard input handle for the process. If
644 :data:`STARTF_USESTDHANDLES` is not specified, the default for standard
645 input is the keyboard buffer.
Brian Curtine6242d72011-04-29 22:17:51 -0500646
647 .. attribute:: hStdOutput
648
Senthil Kumarana6bac952011-07-04 11:28:30 -0700649 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
650 is the standard output handle for the process. Otherwise, this attribute
651 is ignored and the default for standard output is the console window's
Brian Curtine6242d72011-04-29 22:17:51 -0500652 buffer.
653
654 .. attribute:: hStdError
655
Senthil Kumarana6bac952011-07-04 11:28:30 -0700656 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
657 is the standard error handle for the process. Otherwise, this attribute is
Brian Curtine6242d72011-04-29 22:17:51 -0500658 ignored and the default for standard error is the console window's buffer.
659
660 .. attribute:: wShowWindow
661
Senthil Kumarana6bac952011-07-04 11:28:30 -0700662 If :attr:`dwFlags` specifies :data:`STARTF_USESHOWWINDOW`, this attribute
Brian Curtine6242d72011-04-29 22:17:51 -0500663 can be any of the values that can be specified in the ``nCmdShow``
664 parameter for the
665 `ShowWindow <http://msdn.microsoft.com/en-us/library/ms633548(v=vs.85).aspx>`__
Senthil Kumarana6bac952011-07-04 11:28:30 -0700666 function, except for ``SW_SHOWDEFAULT``. Otherwise, this attribute is
Brian Curtine6242d72011-04-29 22:17:51 -0500667 ignored.
Brian Curtin73365dd2011-04-29 22:18:33 -0500668
Brian Curtine6242d72011-04-29 22:17:51 -0500669 :data:`SW_HIDE` is provided for this attribute. It is used when
670 :class:`Popen` is called with ``shell=True``.
671
672
673Constants
674^^^^^^^^^
675
676The :mod:`subprocess` module exposes the following constants.
677
678.. data:: STD_INPUT_HANDLE
679
680 The standard input device. Initially, this is the console input buffer,
681 ``CONIN$``.
682
683.. data:: STD_OUTPUT_HANDLE
684
685 The standard output device. Initially, this is the active console screen
686 buffer, ``CONOUT$``.
687
688.. data:: STD_ERROR_HANDLE
689
690 The standard error device. Initially, this is the active console screen
691 buffer, ``CONOUT$``.
692
693.. data:: SW_HIDE
694
695 Hides the window. Another window will be activated.
696
697.. data:: STARTF_USESTDHANDLES
698
699 Specifies that the :attr:`STARTUPINFO.hStdInput`,
Senthil Kumarana6bac952011-07-04 11:28:30 -0700700 :attr:`STARTUPINFO.hStdOutput`, and :attr:`STARTUPINFO.hStdError` attributes
Brian Curtine6242d72011-04-29 22:17:51 -0500701 contain additional information.
702
703.. data:: STARTF_USESHOWWINDOW
704
Senthil Kumarana6bac952011-07-04 11:28:30 -0700705 Specifies that the :attr:`STARTUPINFO.wShowWindow` attribute contains
Brian Curtine6242d72011-04-29 22:17:51 -0500706 additional information.
707
708.. data:: CREATE_NEW_CONSOLE
709
710 The new process has a new console, instead of inheriting its parent's
711 console (the default).
Brian Curtin73365dd2011-04-29 22:18:33 -0500712
Brian Curtine6242d72011-04-29 22:17:51 -0500713 This flag is always set when :class:`Popen` is created with ``shell=True``.
714
Brian Curtin30401932011-04-29 22:20:57 -0500715.. data:: CREATE_NEW_PROCESS_GROUP
716
717 A :class:`Popen` ``creationflags`` parameter to specify that a new process
718 group will be created. This flag is necessary for using :func:`os.kill`
719 on the subprocess.
720
721 This flag is ignored if :data:`CREATE_NEW_CONSOLE` is specified.
722
Brian Curtine6242d72011-04-29 22:17:51 -0500723
Benjamin Petersondcf97b92008-07-02 17:30:14 +0000724.. _subprocess-replacements:
725
Georg Brandl116aa622007-08-15 14:28:22 +0000726Replacing Older Functions with the subprocess Module
727----------------------------------------------------
728
Nick Coghlanc29248f2011-11-08 20:49:23 +1000729In this section, "a becomes b" means that b can be used as a replacement for a.
Georg Brandl116aa622007-08-15 14:28:22 +0000730
731.. note::
732
Nick Coghlanc29248f2011-11-08 20:49:23 +1000733 All "a" functions in this section fail (more or less) silently if the
734 executed program cannot be found; the "b" replacements raise :exc:`OSError`
735 instead.
Georg Brandl116aa622007-08-15 14:28:22 +0000736
Nick Coghlanc29248f2011-11-08 20:49:23 +1000737 In addition, the replacements using :func:`check_output` will fail with a
738 :exc:`CalledProcessError` if the requested operation produces a non-zero
739 return code. The output is still available as the ``output`` attribute of
740 the raised exception.
741
742In the following examples, we assume that the relevant functions have already
743been imported from the subprocess module.
Georg Brandl116aa622007-08-15 14:28:22 +0000744
745
746Replacing /bin/sh shell backquote
747^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
748
749::
750
751 output=`mycmd myarg`
Nick Coghlanc29248f2011-11-08 20:49:23 +1000752 # becomes
753 output = check_output(["mycmd", "myarg"])
Georg Brandl116aa622007-08-15 14:28:22 +0000754
755
Benjamin Petersonf10a79a2008-10-11 00:49:57 +0000756Replacing shell pipeline
757^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000758
759::
760
761 output=`dmesg | grep hda`
Nick Coghlanc29248f2011-11-08 20:49:23 +1000762 # becomes
Georg Brandl116aa622007-08-15 14:28:22 +0000763 p1 = Popen(["dmesg"], stdout=PIPE)
764 p2 = Popen(["grep", "hda"], stdin=p1.stdout, stdout=PIPE)
Gregory P. Smithe09d2f12011-02-05 21:47:25 +0000765 p1.stdout.close() # Allow p1 to receive a SIGPIPE if p2 exits.
Georg Brandl116aa622007-08-15 14:28:22 +0000766 output = p2.communicate()[0]
767
Gregory P. Smithe09d2f12011-02-05 21:47:25 +0000768The p1.stdout.close() call after starting the p2 is important in order for p1
769to receive a SIGPIPE if p2 exits before p1.
Georg Brandl116aa622007-08-15 14:28:22 +0000770
Nick Coghlanc29248f2011-11-08 20:49:23 +1000771Alternatively, for trusted input, the shell's own pipeline support may still
R David Murray28b8b942012-04-03 08:46:48 -0400772be used directly::
Nick Coghlanc29248f2011-11-08 20:49:23 +1000773
774 output=`dmesg | grep hda`
775 # becomes
776 output=check_output("dmesg | grep hda", shell=True)
777
778
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000779Replacing :func:`os.system`
780^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000781
782::
783
784 sts = os.system("mycmd" + " myarg")
Nick Coghlanc29248f2011-11-08 20:49:23 +1000785 # becomes
786 sts = call("mycmd" + " myarg", shell=True)
Georg Brandl116aa622007-08-15 14:28:22 +0000787
788Notes:
789
790* Calling the program through the shell is usually not required.
791
Georg Brandl116aa622007-08-15 14:28:22 +0000792A more realistic example would look like this::
793
794 try:
795 retcode = call("mycmd" + " myarg", shell=True)
796 if retcode < 0:
Collin Winterc79461b2007-09-01 23:34:30 +0000797 print("Child was terminated by signal", -retcode, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000798 else:
Collin Winterc79461b2007-09-01 23:34:30 +0000799 print("Child returned", retcode, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000800 except OSError as e:
Collin Winterc79461b2007-09-01 23:34:30 +0000801 print("Execution failed:", e, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000802
803
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000804Replacing the :func:`os.spawn <os.spawnl>` family
805^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000806
807P_NOWAIT example::
808
809 pid = os.spawnlp(os.P_NOWAIT, "/bin/mycmd", "mycmd", "myarg")
810 ==>
811 pid = Popen(["/bin/mycmd", "myarg"]).pid
812
813P_WAIT example::
814
815 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg")
816 ==>
817 retcode = call(["/bin/mycmd", "myarg"])
818
819Vector example::
820
821 os.spawnvp(os.P_NOWAIT, path, args)
822 ==>
823 Popen([path] + args[1:])
824
825Environment example::
826
827 os.spawnlpe(os.P_NOWAIT, "/bin/mycmd", "mycmd", "myarg", env)
828 ==>
829 Popen(["/bin/mycmd", "myarg"], env={"PATH": "/usr/bin"})
830
831
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000832
833Replacing :func:`os.popen`, :func:`os.popen2`, :func:`os.popen3`
834^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000835
836::
837
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000838 (child_stdin, child_stdout) = os.popen2(cmd, mode, bufsize)
Georg Brandl116aa622007-08-15 14:28:22 +0000839 ==>
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000840 p = Popen(cmd, shell=True, bufsize=bufsize,
841 stdin=PIPE, stdout=PIPE, close_fds=True)
842 (child_stdin, child_stdout) = (p.stdin, p.stdout)
Georg Brandl116aa622007-08-15 14:28:22 +0000843
844::
845
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000846 (child_stdin,
847 child_stdout,
848 child_stderr) = os.popen3(cmd, mode, bufsize)
Georg Brandl116aa622007-08-15 14:28:22 +0000849 ==>
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000850 p = Popen(cmd, shell=True, bufsize=bufsize,
851 stdin=PIPE, stdout=PIPE, stderr=PIPE, close_fds=True)
852 (child_stdin,
853 child_stdout,
854 child_stderr) = (p.stdin, p.stdout, p.stderr)
855
856::
857
858 (child_stdin, child_stdout_and_stderr) = os.popen4(cmd, mode, bufsize)
859 ==>
860 p = Popen(cmd, shell=True, bufsize=bufsize,
861 stdin=PIPE, stdout=PIPE, stderr=STDOUT, close_fds=True)
862 (child_stdin, child_stdout_and_stderr) = (p.stdin, p.stdout)
863
864Return code handling translates as follows::
865
866 pipe = os.popen(cmd, 'w')
867 ...
868 rc = pipe.close()
Stefan Krahfc9e08d2010-07-14 10:16:11 +0000869 if rc is not None and rc >> 8:
Ezio Melotti985e24d2009-09-13 07:54:02 +0000870 print("There were some errors")
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000871 ==>
872 process = Popen(cmd, 'w', stdin=PIPE)
873 ...
874 process.stdin.close()
875 if process.wait() != 0:
Ezio Melotti985e24d2009-09-13 07:54:02 +0000876 print("There were some errors")
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000877
878
879Replacing functions from the :mod:`popen2` module
880^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
881
882.. note::
883
884 If the cmd argument to popen2 functions is a string, the command is executed
885 through /bin/sh. If it is a list, the command is directly executed.
886
887::
888
889 (child_stdout, child_stdin) = popen2.popen2("somestring", bufsize, mode)
890 ==>
891 p = Popen(["somestring"], shell=True, bufsize=bufsize,
892 stdin=PIPE, stdout=PIPE, close_fds=True)
893 (child_stdout, child_stdin) = (p.stdout, p.stdin)
894
895::
896
897 (child_stdout, child_stdin) = popen2.popen2(["mycmd", "myarg"], bufsize, mode)
898 ==>
899 p = Popen(["mycmd", "myarg"], bufsize=bufsize,
900 stdin=PIPE, stdout=PIPE, close_fds=True)
901 (child_stdout, child_stdin) = (p.stdout, p.stdin)
902
903:class:`popen2.Popen3` and :class:`popen2.Popen4` basically work as
904:class:`subprocess.Popen`, except that:
905
906* :class:`Popen` raises an exception if the execution fails.
907
908* the *capturestderr* argument is replaced with the *stderr* argument.
909
910* ``stdin=PIPE`` and ``stdout=PIPE`` must be specified.
911
912* popen2 closes all file descriptors by default, but you have to specify
Gregory P. Smithf5604852010-12-13 06:45:02 +0000913 ``close_fds=True`` with :class:`Popen` to guarantee this behavior on
914 all platforms or past Python versions.
Eli Bendersky046a7642011-04-15 07:23:26 +0300915
Nick Coghlanc29248f2011-11-08 20:49:23 +1000916
Nick Coghlanc29248f2011-11-08 20:49:23 +1000917Legacy Shell Invocation Functions
Nick Coghlan32e4a582011-11-08 21:50:58 +1000918---------------------------------
Nick Coghlanc29248f2011-11-08 20:49:23 +1000919
920This module also provides the following legacy functions from the 2.x
921``commands`` module. These operations implicitly invoke the system shell and
922none of the guarantees described above regarding security and exception
923handling consistency are valid for these functions.
924
925.. function:: getstatusoutput(cmd)
926
927 Return ``(status, output)`` of executing *cmd* in a shell.
928
929 Execute the string *cmd* in a shell with :func:`os.popen` and return a 2-tuple
930 ``(status, output)``. *cmd* is actually run as ``{ cmd ; } 2>&1``, so that the
931 returned output will contain output or error messages. A trailing newline is
932 stripped from the output. The exit status for the command can be interpreted
933 according to the rules for the C function :c:func:`wait`. Example::
934
935 >>> subprocess.getstatusoutput('ls /bin/ls')
936 (0, '/bin/ls')
937 >>> subprocess.getstatusoutput('cat /bin/junk')
938 (256, 'cat: /bin/junk: No such file or directory')
939 >>> subprocess.getstatusoutput('/bin/junk')
940 (256, 'sh: /bin/junk: not found')
941
942 Availability: UNIX.
943
944
945.. function:: getoutput(cmd)
946
947 Return output (stdout and stderr) of executing *cmd* in a shell.
948
949 Like :func:`getstatusoutput`, except the exit status is ignored and the return
950 value is a string containing the command's output. Example::
951
952 >>> subprocess.getoutput('ls /bin/ls')
953 '/bin/ls'
954
955 Availability: UNIX.
956
Nick Coghlan32e4a582011-11-08 21:50:58 +1000957
958Notes
959-----
960
961.. _converting-argument-sequence:
962
963Converting an argument sequence to a string on Windows
964^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
965
966On Windows, an *args* sequence is converted to a string that can be parsed
967using the following rules (which correspond to the rules used by the MS C
968runtime):
969
9701. Arguments are delimited by white space, which is either a
971 space or a tab.
972
9732. A string surrounded by double quotation marks is
974 interpreted as a single argument, regardless of white space
975 contained within. A quoted string can be embedded in an
976 argument.
977
9783. A double quotation mark preceded by a backslash is
979 interpreted as a literal double quotation mark.
980
9814. Backslashes are interpreted literally, unless they
982 immediately precede a double quotation mark.
983
9845. If backslashes immediately precede a double quotation mark,
985 every pair of backslashes is interpreted as a literal
986 backslash. If the number of backslashes is odd, the last
987 backslash escapes the next double quotation mark as
988 described in rule 3.