Module libloading::os::windows
source · Available on Windows only.
Expand description
Windows implementation of dynamic library loading.
Structs
A symbol from a library.
Constants
Do not check AppLocker rules or apply Software Restriction Policies for the DLL.
Map the file into the calling process’ virtual address space as if it were a data file.
Map the file into the calling process’ virtual address space as if it were a data file.
Map the file into the process’ virtual address space as an image file.
Specifies that the digital signature of the binary image must be checked at load time.
Allow loading a DLL for execution from the current directory only if it is under a directory in
the Safe load list.
Search the application’s installation directory for the DLL and its dependencies.
Search default directories when looking for the DLL and its dependencies.
Directory that contains the DLL is temporarily added to the beginning of the list of
directories that are searched for the DLL’s dependencies.
Search
%windows%\system32
for the DLL and its dependencies.Directories added using the
AddDllDirectory
or the SetDllDirectory
function are searched
for the DLL and its dependencies.If
filename
specifies an absolute path, the system uses the alternate file search strategy
discussed in the [Remarks section] to find associated executable modules that the specified
module causes to be loaded.