Export (0) Print
Expand All

PROCESS_MITIGATION_ASLR_POLICY structure

Contains process mitigation policy settings for Address Space Randomization Layout (ASLR). The GetProcessMitigationPolicy and SetProcessMitigationPolicy functions use this structure.

Syntax


typedef struct _PROCESS_MITIGATION_ASLR_POLICY {
  union {
    DWORD  Flags;
    struct {
      DWORD EnableBottomUpRandomization : 1;
      DWORD EnableForceRelocateImages : 1;
      DWORD EnableHighEntropy : 1;
      DWORD DisallowStrippedImages : 1;
      DWORD ReservedFlags : 28;
    };
  };
} PROCESS_MITIGATION_ASLR_POLICY, *PPROCESS_MITIGATION_ASLR_POLICY;

Members

Flags

This member is reserved for system use.

EnableBottomUpRandomization : 1

Thread stacks and other bottom-up allocations are subject to randomization by ASLR if this flag is set. This flag is read-only and cannot be modified after a process has been created.

EnableForceRelocateImages : 1

Images that have not been built with /DYNAMICBASE are forcibly relocated on load if this flag is set.

EnableHighEntropy : 1

Bottom-up allocations are subject to higher degrees of entropy when randomized by ASLR if this flag is set. This flag only applies to 64-bit processes and is read-only.

DisallowStrippedImages : 1

Images that have not been built with /DYNAMICBASE and do not have relocation information will fail to load if this flag and EnableForceRelocateImages are set.

ReservedFlags : 28

This member is reserved for system use.

Requirements

Minimum supported client

Windows 8 [desktop apps only]

Minimum supported server

Windows Server 2012 [desktop apps only]

Header

WinNT.h (include Windows.h)

 

 

Community Additions

ADD
Show:
© 2014 Microsoft