2 Mar
2019
2 Mar
'19
7:52 a.m.
https://bugs.winehq.org/show_bug.cgi?id=46751 --- Comment #2 from KOLANICH <kolan_n(a)mail.ru> --- OK. Another idea: [intercept syscalls](https://github.com/pmem/syscall_intercept), making the called process understand Windows paths with respect to the prefix. -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.