Opened 5 years ago
Last modified 5 years ago
#13333 new Bugs
Child processes started with boost::process have incorrect argv if executable path contains spaces
Reported by: | Owned by: | ||
---|---|---|---|
Milestone: | To Be Determined | Component: | process |
Version: | Boost 1.65.0 | Severity: | Problem |
Keywords: | Cc: |
Description
If an executable to start has spaces in its path, the process started with either boost::process::child or boost::process::system will have a strange argv. Specifically, the segments of the executable's path will be individual elements in the argv array.
To demonstrate this problem, the following program dumps argv:
#include <iostream> int main(int argc, char* argv[]) { // Dump the command line arguments. std::cout << argc << std::endl; for (int i = 0; i < argc; ++i) std::cout << argv[i] << std::endl; return 0; }
Compile this and place the resulting DumpCmdLine.exe in "c:\dir with space\" and "c:\dirwithoutspace\".
The following program runs this executable using boost::process, and demonstrates the problem:
#include "stdafx.h" #include <boost/process.hpp> #include <boost/filesystem.hpp> int main() { boost::filesystem::path toRun{ "c:\\dir with space\\DumpCmdLine.exe" }; auto child = boost::process::child(toRun, L"realArgument"); child.wait(); return 0; }
The child process argv contains 4 elements, "c:\dir", "with", "space\DumpCmdLine.exe", and "realArgument".
When there is no space in the executable path, the child process argv contains 2 elements: "c:\dirwithoutspace\DumpCmdLine.exe", and "realArgument".
When DumpCmdLine.exe is called from the command line, it receives the same 2 arguments. The command line I used is:
"c:\dir with space\DumpCmdLine.exe" realArgument
This was observed on a Windows 10 system, 64 bit build both debug and release configurations. Visual Studio 2017 (15.4.3) was used to build.
Change History (2)
comment:1 by , 5 years ago
comment:2 by , 5 years ago
Confirm this happens in my setup as well, Windows 10 x64, VS 2017, boost 1.65.1
When using the "command style" of execution with a quoted executable path, the expected (2 argument) argv is received by the child process. This is a bit of a hack since quoting the path is likely OS specific.