@@ -174,7 +174,7 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
174174 let this = self . eval_context_ref ( ) ;
175175 let os_str = this. read_os_str_from_c_str ( ptr) ?;
176176
177- Ok ( match this. convert_path_separator ( Cow :: Borrowed ( os_str) , PathConversion :: TargetToHost ) {
177+ Ok ( match this. convert_path ( Cow :: Borrowed ( os_str) , PathConversion :: TargetToHost ) {
178178 Cow :: Borrowed ( x) => Cow :: Borrowed ( Path :: new ( x) ) ,
179179 Cow :: Owned ( y) => Cow :: Owned ( PathBuf :: from ( y) ) ,
180180 } )
@@ -188,10 +188,7 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
188188 let this = self . eval_context_ref ( ) ;
189189 let os_str = this. read_os_str_from_wide_str ( ptr) ?;
190190
191- Ok ( this
192- . convert_path_separator ( Cow :: Owned ( os_str) , PathConversion :: TargetToHost )
193- . into_owned ( )
194- . into ( ) )
191+ Ok ( this. convert_path ( Cow :: Owned ( os_str) , PathConversion :: TargetToHost ) . into_owned ( ) . into ( ) )
195192 }
196193
197194 /// Write a Path to the machine memory (as a null-terminated sequence of bytes),
@@ -203,8 +200,8 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
203200 size : u64 ,
204201 ) -> InterpResult < ' tcx , ( bool , u64 ) > {
205202 let this = self . eval_context_mut ( ) ;
206- let os_str = this
207- . convert_path_separator ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
203+ let os_str =
204+ this . convert_path ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
208205 this. write_os_str_to_c_str ( & os_str, ptr, size)
209206 }
210207
@@ -217,8 +214,8 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
217214 size : u64 ,
218215 ) -> InterpResult < ' tcx , ( bool , u64 ) > {
219216 let this = self . eval_context_mut ( ) ;
220- let os_str = this
221- . convert_path_separator ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
217+ let os_str =
218+ this . convert_path ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
222219 this. write_os_str_to_wide_str ( & os_str, ptr, size)
223220 }
224221
@@ -230,18 +227,19 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
230227 memkind : MemoryKind < MiriMemoryKind > ,
231228 ) -> InterpResult < ' tcx , Pointer < Option < Provenance > > > {
232229 let this = self . eval_context_mut ( ) ;
233- let os_str = this
234- . convert_path_separator ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
230+ let os_str =
231+ this . convert_path ( Cow :: Borrowed ( path. as_os_str ( ) ) , PathConversion :: HostToTarget ) ;
235232 this. alloc_os_str_as_c_str ( & os_str, memkind)
236233 }
237234
238- fn convert_path_separator < ' a > (
235+ fn convert_path < ' a > (
239236 & self ,
240237 os_str : Cow < ' a , OsStr > ,
241238 direction : PathConversion ,
242239 ) -> Cow < ' a , OsStr > {
243240 let this = self . eval_context_ref ( ) ;
244241 let target_os = & this. tcx . sess . target . os ;
242+
245243 #[ cfg( windows) ]
246244 return if target_os == "windows" {
247245 // Windows-on-Windows, all fine.
@@ -252,10 +250,35 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
252250 PathConversion :: HostToTarget => ( '\\' , '/' ) ,
253251 PathConversion :: TargetToHost => ( '/' , '\\' ) ,
254252 } ;
255- let converted = os_str
253+ let mut converted = os_str
256254 . encode_wide ( )
257255 . map ( |wchar| if wchar == from as u16 { to as u16 } else { wchar } )
258256 . collect :: < Vec < _ > > ( ) ;
257+ // We also have to ensure that absolute paths remain absolute.
258+ match direction {
259+ PathConversion :: HostToTarget => {
260+ // If this is an absolute Windows path that starts with a drive letter (`C:/...`
261+ // after separator conversion), it would not be considered absolute by Unix
262+ // target code.
263+ if converted. get ( 1 ) . copied ( ) == Some ( ':' as u16 )
264+ && converted. get ( 2 ) . copied ( ) == Some ( '/' as u16 )
265+ {
266+ // We add a `/` at the beginning, to store the absolute Windows
267+ // path in something that looks like an absolute Unix path.
268+ converted. insert ( 0 , '/' as u16 ) ;
269+ }
270+ }
271+ PathConversion :: TargetToHost => {
272+ // If the path is `\C:\`, the leading backslash was probably added by the above code
273+ // and we should get rid of it again.
274+ if converted. get ( 0 ) . copied ( ) == Some ( '\\' as u16 )
275+ && converted. get ( 2 ) . copied ( ) == Some ( ':' as u16 )
276+ && converted. get ( 3 ) . copied ( ) == Some ( '\\' as u16 )
277+ {
278+ converted. remove ( 0 ) ;
279+ }
280+ }
281+ }
259282 Cow :: Owned ( OsString :: from_wide ( & converted) )
260283 } ;
261284 #[ cfg( unix) ]
@@ -270,6 +293,8 @@ pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriInterpCxExt<'mir, 'tcx> {
270293 . iter ( )
271294 . map ( |& wchar| if wchar == from as u8 { to as u8 } else { wchar } )
272295 . collect :: < Vec < _ > > ( ) ;
296+ // TODO: Once we actually support file system things on Windows targets, we'll probably
297+ // have to also do something clever for absolute path preservation here, like above.
273298 Cow :: Owned ( OsString :: from_vec ( converted) )
274299 } else {
275300 // Unix-on-Unix, all is fine.
0 commit comments