From 650a0f3fdd8c2b0dfbefd035fa8d8c8691c8c026 Mon Sep 17 00:00:00 2001 From: Hongbo Ni Date: Thu, 27 Aug 2009 11:18:14 +1000 Subject: [PATCH] user32: Fix DLL injection problem using LOAD_WITH_ALTERED_SEARCH_PATH. --- dlls/user32/hook.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dlls/user32/hook.c b/dlls/user32/hook.c index b6dc8e8f2f1..ae4c5f14da2 100644 --- a/dlls/user32/hook.c +++ b/dlls/user32/hook.c @@ -322,7 +322,7 @@ void *get_hook_proc( void *proc, const WCHAR *module ) { TRACE( "loading %s\n", debugstr_w(module) ); /* FIXME: the library will never be freed */ - if (!(mod = LoadLibraryW(module))) return NULL; + if (!(mod = LoadLibraryExW(module, NULL, LOAD_WITH_ALTERED_SEARCH_PATH))) return NULL; } return (char *)mod + (ULONG_PTR)proc; }